Computer Network Reports
Computer Network Reports
Computer Networks
Group Assignment
• Prak Kesa
• Pav Khemerak
• Pet Sereypanha
• Pich Pong
• Peav Sithavai
• Neat Sopheng
• Ny Nai
• Bouth Chansotheareach
• Tourn Chan
2
1. Project Introduction
1.1. Introduction
This specific report will be intended in providing the network design document
for Tech Trend Company. The document will be including the proposed
technologies, network architecture and diagrams, required network services,
security mechanism, IP addressing scheme, routing protocols, type of devices,
software types, overall expenses on the network solutions, future enhancements,
problems and all of the issues which will be faced while maintaining the network.
The project will be involved with planning, designing, and implementation of the
network for the company.
1.2. Problems
Tech Trend Company has been having problems with network traffic and
security for daily usage. One reason for that is because of the network architecture
is not up to date for a long period of time which will eventually affect their business
operations. If they do not adapt to a new technological solution to challenge the
competitor, it may lead to the business downfall. In this case, the upper-level
management team have thought of upgrading the computer network system to
have a better performance in the company operations. The company has planned
on investing a substantial amount of money in redesigning and upgrading the
current computer network system with plan on implementing a new network to
have an uninterrupted, high secured, 99.9% available, highly reliable, fast and
robust computer network system.
3
1.4. Network Designing Criteria
• Consists of 500 staff members (will expand in the future) and will be in 12
different department (Should have four different vlans named
Management, Research, Human Resources, Marketing, Account, Finance,
Logistics, Customer, Guest, Admin, ICT, Server_Room)
2. Network Design
2.1. Network Topology
4
3. IP Addressing
Base Network: 192.168.10.0
➢ First Floor
Department Network Subnet Mask Host Address Broadcast
Address Range Address
Management 192.168.10.0 255.255.255.192/26 192.168.10.1 to 192.168.10.63
192.168.10.62
Research 192.168.10.64 255.255.255.192/26 192.168.10.65 192.168.10.127
to
192.168.10.126
Human Res 192.168.10.128 255.255.255.192/26 192.168.10.129 192.168.10191
to
192.168.10.190
➢ Second Floor
Department Network Subnet Mask Host Address Broadcast
Address Range Address
Marketing 192.168.10.192 255.255.255.192/26 192.168.10.193 192.168.10.255
to
192.168.10.254
Accounting 192.168.11.0 255.255.255.192/26 192.168.11.1 192.168.11.63
to
192.168.11.62
Finance 192.168.11.64 255.255.255.192/26 192.168.11.65 192.168.11.127
to
192.168.11.126
➢ Third Floor
Department Network Subnet Mask Host Address Broadcast
Address Range Address
Logistics 192.168.11.128 255.255.255.192/26 192.168.11.129 192.168.11.191
to
192.168.11.190
Customer 192.168.11.192 255.255.255.192/26 192.168.11.193 192.168.11.255
to
192.168.11.254
Guest 192.168.12.0 255.255.255.192/26 192.168.12.1 192.168.12.63
to
192.168.12.62
➢ Fourth Floor
Department Network Subnet Mask Host Address Broadcast
Address Range Address
5
Admin 192.168.12.64 255.255.255.192/26 192.168.12.65 192.168.12.127
to
192.168.12.126
ICT 192.168.12.128 255.255.255.192/26 192.168.12.129 192.168.12.191
to
192.168.12.190
Server Room 192.168.12.192 255.255.255.192/26 192.168.12.193 192.168.12.255
to
192.168.12.254
6
14 10.10.10.52 255.255.255.252 10.10.10.37 to 10.10.10.39
10.10.10.38
4. VLANs
7
5.2. Trunking
Trunking allows efficient, secure, and manageable communication between
multiple VLANs across different floors and network devices, ensuring a well-
structured and scalable network architecture.
5.3. DHCP
DHCP service will be installed in the DHCP server which resides in the server
room. IP address pool for different VLAN will be create in DHCP server. So
DHCP server dynamically assign the IP address to the hosts in the network.
Static IP address that will be used with in the VLAN can be removed from the
IP address pool (excluded address) in DHCP server. Main advantage of using
this protocol is reliability associated in IP address configuration to hosts. That
is configuration error caused by manual IP assignment can be reduced and
tasks of network administration are simplified.
5.4. DNS
DNS will be configured in the DNS server, which will be placed in the server
room in the 4th floor. All the hosts in this network are assumed to be connected
to be connected to domain. So, each hosts (workstations & other devices) have
their unique domain name. So, users can use the specific domain name to
connect to each host remotely. But computers cannot understand the name. It
should be converted to numbers called IP address. So, DNS server maintain
the map of domain name of each host to its corresponding IP address. Thus,
with DNS, management will be easier and complexity of network can be
reduced.
8
also allows an admin to remotely log on to the server host system. SSH is a
secure networking protocol because it encrypts the login sessions which makes
it impossible for the intruders to collect any vital data as password or message.
It is designed to perform advance application which previous networking
protocol failed to implement, which are less secure older terminal applications
such as telnet or rsh.
5.7. HTTPS
HTTPS server plays a crucial role in securing web communications within the
organization, protecting sensitive information, and ensuring a secure
networking environment.
9
- Management: The centralization of routers and switches simplifies network
management and troubleshooting. IT staff can easily monitor and configure
devices from a central location.
- Redundancy: The presence of multiple routers and interconnections
between them provides redundancy. If one router fails, traffic can be
rerouted through other paths, ensuring network availability.
- Performance: By distributing the network load across different floors and
VLANs, the performance can be optimized. Traffic within a VLAN is
confined to that segment, reducing overall congestion.
7. Cost Analysis
10
Router C2911-CME- 4 $ 1,622.65 $ 6,790.60
SRST/K9
Layer 2 Switch Catalyst 2960-L 12 $ 1,063.00 $ 12,756.00
Layer 3 Switch WS-C3650-24PS- 4 $ 3,059.00 $ 12,236.00
L Catalyst 3650
Access Point UBIQUITI UniFi 11 $ 135.00 $ 1,485.00
U6-Lite
Cable - - - $ 3,000.00
Total $ 659,109.60
8. Conclusion
The network is well-organized with a clear hierarchical structure and
efficient VLAN segmentation. The use of dedicated switches and routers for each
floor and VLAN enhances security, performance, and manageability. The design
incorporates redundancy and wireless connectivity, ensuring robust and flexible
network access for all departments. With this design, the network should support
the organization's needs effectively while allowing for future scalability and
maintenance.
11