0% found this document useful (0 votes)
58 views13 pages

Lanproposal Assignment 2021

Uploaded by

Azmina Najwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views13 pages

Lanproposal Assignment 2021

Uploaded by

Azmina Najwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

ITT459

DATA COMMUNICATIONS
LAN PROPOSAL ASSIGNMENT

NAME: MUHAMMAD RUZAINI BIN ROSLAN


MATRIX NUMBER: 2020813292
GROUP: RCS2553A
LECTURER: AHMAD YUSRI BIN DAK
TABLE OF CONTENT

No. CONTENT PAGE


1.0 INTRODUCTION 2
2.0 PURPOSE 2
3.0 OBJECTIVE 2
4.0 EXISITING INFRASTRUCTURE 3-4
 FIGURE 4.1 3
5.0 NETWORK STRUCTURE/TOPOLOGY 5
6.0 PROTOCOL 6
7.0 SUGGESTED HARDWARE 7
8.0 COSTING 8
9.0 LAN DIAGRAM 9
 FIGURE 9.1 9
10.0 IP ADDRESS 10
11.0 SECURITY AND TROUBLESHOOTING 10
12.0 NETWORK MANAGEMENT 11
REFERENCES 12

1
1.0 INTRODUCTION

ABC technologies Sdn Bhd is a small tech company that does business in areas such as digital
electronics, software, and internet-related services like e-commerce. While most tech companies look
to cut corners and hook customer by providing lower-quality services and higher charges, ABC
technologies believes that high quality servives and appropriate charges will be the key to a success of
any company. So, in order to achieve the key of success, they will need a stable,fast and reliable internet
access. As per discussion, we have agreed to design a wired and wireless connections to each of the staff
in this company.

2.0 PURPOSE
Our main purpose of this proposal is to upgrade the ABC technologies Internet facilities and
infrastructures. Other that that, it is to provide Internet connectivity via wired and wireless
connections on each computer The company employs 13 people in three departments: marketing
(3 people), finance (6 people), and administration (4 staff).

3.0 OBJECTIVE
- Secure Service: The major goal of this network is to provide secure administrative computing
services to the Company. To reduce the possibility of illegal usage, it is designed to be
operationally and physically segregated from those who are not employed by ABC companies.

Manageability-The network should be designed to facilitate network monitoring and


management to ensure ongoing stability of operation

- Scalability: The design allows for the addition network services the company when money
becomes available without having to rework the existing network.

- Reliability: To ensure all the network services consistently performs according to its
specifications.

2
4.0 EXISTING INFRASTRUCTURE

ADMINISTRATION

MARKETING FINANCE

FIGURE 4.1 EXISITING INFRASTRUCTURE OF ABC TECHNOLOGIES

3
Figure 4.1 shows current infrastructure of ABC Technologies Sdn Bhd. As we can see, they are currently
using wireless connection only for all the staff in the building. The problem with these type of
connections are firstly is the speed. Wireless networks are slower than wired networks in terms of speed.
In a wireless network, transferring or exchanging files is much slower. The speed is also affected by the
user's location in relation to the network. The worse the connection becomes the further the user is from
the network. So, it is not suitable to make all of the staff including PC’s user to use wireless connections.
We should prioritize wireless connections only to those user that frequently need to move aroung which
means user that use laptop.
Next is in term of security. When using wireless networks, security is a major concern. A wireless
network that is not properly installed or maintained might pose serious security risks. A wireless network
does not necessitate the use of physical components such as wires. They simply require a wireless
adaptor, which raises the danger of hacking by allowing hackers simple access to the network. If the
network is password protected, things could get a lot worse.
Lastly, There is a considerable risk of interference and jamming in wireless networks due to
environmental variables such as dust storms or fog. Wireless networks are particularly prone to
interference; hence, fog, radiation, radio waves, or any similar interference may create a problem in a
wireless network. When there are too many users in a given location, the air band used to broadcast the
signals can become overloaded.
So, in order to solve this problem, we have come up with a few changes and ideas to make all the
connections better and more organized.

4
5.0 NETWORK STRUCTURE/TOPOLOGY

FIGURE 5.1 NETWORK STRUCTURE/TOPOLOGY

Figure 5.1 shows our proposed network structure or topology. As we can see,we have combined wired
and wireless connection to the ABC company. We have added a few network devices in order to increase
the work efficiency and security of the company.
Firstly we have added 3 more switches in the company. We plan to place the switch in each department
so it will look more neat and organized.These switches will be use for the PC as wired connection and
access point to connect it to the router. We used wired connection for PCs as it will stay at one place
only and to ensure more stable connection. For printer, we will let it stay as wired connection as it much
better from wireless.
Next we also plan to add one more access point to finance department so that each department will have
one access point. This will ensure the signal are very strong and they dont have to share the access point
with other department. Access point will only be used for laptop users and mobile phone as it need to
move around the company.
Lastly, all the connection in each department’s switches will go to the main switch before it will go to
the router. We also add a firewall into the company network. Firewalls provide protection against
outside cyber attackers by shielding your computer or network from malicious or unnecessary network
traffic. Firewalls can also prevent malicious software from accessing a computer or network via the
internet.
For the structure, we have plan it based on star topology. As we can see, all the switch in each department
will be connected to the main switch before it will go to the router. We choose this topology as this
topology is highly reliable and highly efficiency.

5
6.0 PROTOCOL

NETWORK PROTOCOL
TCP/IP
- TCP is one of the basic internet standards, and it is part of the Internet Engineering Task Force's
standards (IETF). It provides end-to-end data delivery and is one of the most widely utilised
protocols in digital network communications.TCP is a protocol that organises data for
transmission between a server and a client. It ensures the data being transmitted over a network
is secure. TCP creates a connection between a source and its destination before transmitting
data, ensuring that it remains active until communication begins. It then decomposes enormous
amounts of data into smaller packets while maintaining data integrity throughout.

DHCP
- This protocol operates on IP networks, allocating IP addresses to networked devices and hosts.
It also permits them to converse effectively with one another. DHCP assigns the subnet mask,
default gateway address, domain name server (DNS) address, and other setup information in
addition to the IP address. A client device sends discovery messages to a DHCP server via the
network, which responds with an offer. After that, the client sends back its request, allowing the
DHCP server to respond.

SFTP
- When a file is delivered remotely from one system to another, the SSH File Transfer Protocol
(SFTP), also known as secure FTP, is used to secure the connection. It employs public-key
encryption to safeguard Internet communication while also facilitating strong user
authentication. This protocol was created in 2006 by the Internet Engineering Task Force (IETF)
to give security to shell protocols. A user can connect to an SFTP server in one of two ways:
through password authentication or using private/public-key authentication. FTP sends data
through two links. SFTP allows you to send a file over a single connection. Server
administrators will no longer be inconvenienced.
HTTPS
- Hypertext Transfer Protocol Secure(HTTPS) is a protocol for transferring encrypted HTTP data
over a secure connection. The privacy and integrity of data are safeguarded, and website
authentication is authenticated, by employing secure connections such as Transport Layer
Security or Secure Sockets Layer.

OSPF
- For routing protocol, we decided to choose The Open Shortest Path First (OSPF) protocol. It is
a link-state IGP that uses the Shortest Path First (SPF) algorithm and was designed specifically
for IP networks. To ensure effective data transmission of packets, the SPF routing method is
employed to construct the shortest path spanning-tree.

6
7.0 SUGGESTED HARDWARE

1. SWITCH

- The TP-Link TL-SG108 is hard to beat when it comes to 8-port network switches for a home or
small office network. It's small, has a fanless metal casing, and uses dimmer, less obtrusive
LEDs than some of its competitors (don't worry, there are still two per port, each with its own
colour and blinking pattern). The TL-SG108 also includes traffic prioritisation QoS, full duplex
flow control, auto-negotiating ports for selecting transfer speeds up to a gigabit, and a simple,
plug-and-play setup. This finest network switch ran cool and performed similarly to other 8-
port switches we examined.

2. ACCESS POINT

- Our top suggested hardware for access point is the Ubiquiti Unifi Dual AC Pro. For a long time,
Ubiquiti has been developing wireless solutions for commercial and residential usage, but the
technology was first evaluated for carrier grade applications such as long-range data transfer
from cell towers. These devices are incredibly reliable, with two 802.11AC radios, MIMO
technology, power-over-Ethernet (PoE), and a slew of other enterprise-class features that can
be utilised at home or in the office.

3. ROUTER
- For router, top performance and enhanced security go hand in hand with the Netgear Nighthawk
AX8 (RAX80) Wi-Fi 6 router, which combines throughput that breaks through the gigabit per
second barrier with malware protection and Disney's Circle app for blocking inappropriate
content and managing family network use. The Nighthawk AX8 will operate just as well in the
real world as it does in the lab, thanks to its exceptional performance through walls and floors.

4. FIREWALL
- For firewall, we suggested to use Cisco ASA 5500-X.It is a threat-focused next-generation
firewall (NGFW) to protect enterprise networks from sophisticated cyberattacks, Cisco ASA
5500-X comes in a variety of specifications to support data transfer between 300 Mbps and 2
Gbps. This firewall can be used with regular or ruggedized desktop or rack-mounted servers.
This firewall also ensure over 99% threat blocking effectiveness and URL filtering for 80+
categories.

7
8.0 COSTING

No Producti Model Quantity Price Per Total(RM)


Unit(RM)
1 Network Switch TP-Link TL-SG108 4 135.99 543.96
2 Wireless Access Ubiquiti Unifi Dual AC 3 698.00 2,094.00
Point Pro
3 Router Netgear Nighthawk AX8 1 1,999.00 1,999.00
(RAX80)
4 Firewall Cisco ASA 5500-X 1 6,000.00 6,000.00
5 Ethernet Cable ProLink Cat5e 3 324.99 974.97
6 Ethernet Cable ProLink Cat6 3 500.00 1,500.00
7 Cisco chasis switch C6513 CHASSIS 1 2,809.99 2809.99
13SLOT 19RU WS-
C6513-E
8 Installation Cost --- --- --- 5,000.00
9 Maintainance Cost --- --- --- 1,000.00
10 Support Cost --- --- --- 300.00
TOTAL COST INVOLVED:
RM 22,221.92

8
9.0 LAN DIAGRAM

ADMINISTRATION

MARKETING FINANCE

FIGURE 9.1 PROPOSED NETWORK TOPOLOGY/STRUCTURE

9
10.0 IP ADDRESS ASSIGNMENT
For Ip address addressing, we have decided to use Class B private address. This is because to strenghten
the network security of this company. It is also because of the privacy it provides to the business. Private
Ip address is Used for communicating within your private network, with other devices in your home or
office.

Range of IP Address: 172.16.0.2 – 172.16.0.26


Administration: 172.16.0.3 – 172.16.0.10
Marketing: 172.16.0.11-172.16.0.16
Finance: 172.16.0.17-172.16.0.26

Subnet Mask: 255.255.0.0


DNS Server: 172.16.0.27
Gateway: 172.16.0.2

11.0 SECURITY AND TROUBLESHOOTING


In term of security, we have ensure it by adding a firewall into the network and use a private IP address
as stated before this. However, if there are any problem regarding the security of the network for example
some attacker or hacker try to infiltrate the company’s network, we will work with vendor to solve it.
In term of troubleshooting, we will have 24/7 support to the company. We will firstly try to solve
remotely if we can. If not, we will send network engineer to the company to solve the problem.

10
12.0 NETWORK MANAGEMENT
For network management, we will provide with a few aspects, such as:
Network Operations
- ensures the network works as expected. That includes monitoring network activity, identifying
problems and remediating issues.
Network Maintainance
- Network maintenance addresses fixes, upgrades and repairs to network resources including
switches, routers, transmission cables, servers and workstations. Vendor will send their
technician every 6 month to do maintainance.
Network Security
- The network security role covers the installation and maintenance of network protection
software, tracking endpoint devices, monitoring network behavior and identifying unusual IP
addresses.

11
REFERENCES
1. Mack, K. (2021, September 18). Advantages Of Private IP Address Over Public IP

Address. Bit Rebels. Retrieved February 9, 2022, from

https://bitrebels.com/technology/advantages-private-ip-address-public-ip-address/

2. Contributor, S. (2022, February 2). What is Network Topology? Best Guide to Types &

Diagrams - DNSstuff. Software Reviews, Opinions, and Tips - DNSstuff. Retrieved

February 10, 2022, from https://www.dnsstuff.com/what-is-network-topology

3. A. (2021, March 15). Network Design Proposal For Office. BohatALA. Retrieved

February 10, 2022, from https://bohatala.com/network-design-proposal-for-office/

4. Williams, L. (2022, January 10). IP Address Classes. Guru99. Retrieved February 10,

2022, from https://www.guru99.com/ip-address-classes.html

5. GeeksforGeeks. (2021, August 31). Types of Network Topology. Retrieved February

10, 2022, from https://www.geeksforgeeks.org/types-of-network-topology/

12

You might also like