0% found this document useful (0 votes)
44 views30 pages

Computer Network Assignment 3 Mid Term - 1711873364743

The document outlines the design and implementation of a computer network for Texas IT Company, focusing on a Three-Tier Architecture to ensure scalability, security, and efficient communication among departments. It details the network requirements, design, security measures, and implementation specifics, including the use of VLANs and various networking devices. The project aims to create a robust infrastructure that supports the company's growth and operational needs while maintaining data integrity and security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views30 pages

Computer Network Assignment 3 Mid Term - 1711873364743

The document outlines the design and implementation of a computer network for Texas IT Company, focusing on a Three-Tier Architecture to ensure scalability, security, and efficient communication among departments. It details the network requirements, design, security measures, and implementation specifics, including the use of VLANs and various networking devices. The project aims to create a robust infrastructure that supports the company's growth and operational needs while maintaining data integrity and security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Computer Network Design and Implementation

Submitted By: Submitted To:


Name: Khem Raj Khadka Department of TI
LCID: LC00017002669

1|Page
Contents
Executive Summary ........................................................................................................................................ 3
Objectives ........................................................................................................................................................ 4
1. Introduction ............................................................................................................................................. 5
2. Network Requirements Analysis............................................................................................................ 5
3. Network Design ....................................................................................................................................... 6
3.1 Benefits of Three-Tier Architecture ............................................................................................... 7
4. Security Measures ................................................................................................................................... 8
5. Network Implementation: ...................................................................................................................... 9
5.1. Router.................................................................................................................................................... 9
5.2. Multi-Layer Switch .............................................................................................................................. 9
5.3. Layer two switch ................................................................................................................................ 10
5.4 Clients................................................................................................................................................... 10
5.5 CAT 6 Cable ........................................................................................................................................ 10
6.Testing and Verification ............................................................................................................................ 20
1. Ping ..................................................................................................................................................... 21
2. Tracert ................................................................................................................................................ 21
3. VLAN .................................................................................................................................................. 21
4. Trunk .................................................................................................................................................. 21
7. Scalability Considerations .................................................................................................................... 30
8. Conclusion .............................................................................................................................................. 30

2|Page
Executive Summary

Network to Network Interconnection business model to build a network provider


to build in Texas IT Company which requires careful calculation and design
because it is related to multi-provider networks and, particularly, related to
investments and operations that must be profitable in the future. I have use Three-
Tier Architecture topology in my Texas IT Company. Three-Tier Architecture is
a well-established architecture which manage the user into two parts i.e. logical
and physical computing tiers. It is also adopting optical fiber Ethernet as the
backbone transmission system of the Network to be interconnected. Presentation
tier where user can interface, the application tier where actual data is processed
and the data tier where application data is store and manage the data.
I have used this architecture because the chief benefit of three-tier architecture is
its logical and physical separation. Each and every tier can run on a separate
operating system and server platform. The data analysis using top-down with the
business case as the objective and is translated into network design and
interconnection modeling between providers from outside the industrial area, and
is carried out qualitatively and quantitatively. The discussion starts with the needs
of end customers, marketing strategies and is manifested in a network design that
can answer all the requirements necessary. Perfect investment calculations, by

3|Page
selecting the right backbone technology and access can be a successful factor in
building network topology for the Texas IT company.
I have used this architecture because the chief benefit of three-tier architecture is
its logical and physical separation. Each and every tier can run on a separate
operating system and server platform. If one connection is lost there will be no
error occur and the system will run smoothly. It provides high security because
the presentation tier and data tier cannot communicate directly so the data cannot
flow.

Objectives

• Network infrastructure tailored to Texas IT Company's needs, considering


departmental requirements and future scalability.
• Implemented high security to protect against unauthorized access and
ensure data integrity.
• Helps to establish logical separation for departments to maintain privacy
and security.
• Helps to establish continuous communication and collaborate among
different department.
• It helps to provide perfect architecture for future growth.

4|Page
1. Introduction

Texas IT Company, a rapidly growing firm, is undergoing as it prepares to move


to a new office space. With a workforce of 100 employees distributed across Sales,
Marketing, and Finance departments, the company which also recognizes the
critical importance of establishing a robust network infrastructure to facilitate
seamless communication, collaboration, and internet access over topology. This
project aims to design a network solution that not only meets the immediate needs
of Texas IT Company but also provides scalability and security to support future
growth and evolving technological demands to the user.

2. Network Requirements Analysis

Before going into the specifics of the network design, it is important to conduct a
comprehensive needs assessment and analysis of any Company's requirements.
So, I have collects some of the information regarding sale, marketing and finance
department of Texas IT Company in my project. This involves understanding the
distinct communication, collaboration, and internet access needs of each
department. Additionally, considerations must be made for the logical separation
of departments to maintain confidentiality and security while enabling VLAN
communication for interdepartmental. For 100 users in different department i.e.
Sales, marketing, finance. I have separate five computers for sales department it
will be easy in billing, four computers for marketing department and three
computers for finance department, for smooth communication. For security
purpose I have logically separated with the help of VLAN.

5|Page
3. Network Design

6|Page
The proposed network architecture for Texas IT Company's new office space
involves the creation of a segmented infrastructure to logically separate the Sales,
Marketing, and Finance departments. There are a lot of topology among them I
have selected Three-Tier Architecture. This segmentation will be achieved
through the implementation of Virtual Local Area Networks (VLANs) ensuring
that each department operates within its designated virtual network while still
allowing secure communication between them. I have choose this architecture
because it logically separate and maintained between Presentation Tier,
Application Tier, and Database Tier. I have taken one router and two multi-layers
switch, three switch of layer two and six computers for may topology. Router
manage overall entire network traffic.

3.1 Benefits of Three-Tier Architecture

• Company data and business logic is more secure because it is stored on


central server.
• High performance, lightweight and easy to move the architecture object.
• This architecture is user friendly and can be re-use.
• It is scalability.
• Easy to maintain and modify the architecture.
• Improve data integrity.
• Improve high security
• Change management is easier and faster to execute, because program logic
business logic is implemented on the centralized server.
• The added modularity makes it easier to modify or replace one tier without
affecting the other tier.

7|Page
4. Security Measures

Security is very much essential in any network infrastructure, especially for a


company handling sensitive information. To safeguard against external threats and
unauthorized access in my network design we will apply factor -two- authorization
in each department. So that only authorized people will be able to get access. This
includes the deployment of firewalls, intrusion detection systems, and encryption
protocols to protect data integrity and confidential document. Additional data will
not be transmitted without admin permission.

8|Page
5. Network Implementation:

5.1. Router

A Router is a networking device that forwards data


packets between computer networks. One or more
packet switched networks or subnetworks can be
connected using a router. By sending data packets to
their intended IP addresses, it manages traffic between different networks and
permits several devices to share an Internet connection.

5.2. Multi-Layer Switch

A multilayer switch is a network device that has the ability


to operate at higher layers of the OSI reference model, unlike
the Data Link Layer (DLL) traditionally used by switches. It
can function a role of routers and switch as well. A switch
traditionally inspects frames, while a multilayer switch
inspects deeper into the protocol description unit (at packet
or even at segment level). Multilayer switches use ASIC
hardware circuits to perform routing functions. This differs
from typical routers, which reside on a microprocessor and use applications
running on it to perform their routing operations.

9|Page
5.3. Layer two switch

A layer 2 switch is a networking device that operates at


the data-link layer of the OSI model. It is designed to
forward and filter Ethernet frames between connected
devices based on their MAC addresses. Layer 2 switches
provide improved performance and security by creating
dedicated collision domains and reducing network
congestion. They also support features such as VLANs,
port mirroring, and link aggregation. In summary, a layer
2 switch enhances network performance by efficiently managing and forwarding
data packets based on MAC addresses.
5.4 Clients

In networking, clients refer to devices or software applications that interact with


a network server to request and access resources or
services. Clients can include computers, laptops,
smartphones, tablets, or any other network-enabled
devices. They communicate with servers through
network protocols like TCP/IP or HTTP to send
requests and receive responses. Clients can be
categorized into two types: 1. Client devices: These are
physical devices such as personal computers, laptops, mobile phones, or IoT
devices that connect to a network to access resources or services.

5.5 CAT 6 Cable

10 | P a g e
Cat 6 cable, also known as Category 6 cable, is a type of
twisted pair cable used in Ethernet networks. It is an
upgraded version of Cat 5e cable and offers higher
performance and faster data transmission speeds. Cat 6
cable is designed to support Gigabit Ethernet and is
backward compatible with previous Ethernet standards. Cat
6 cables consist of four twisted pairs of copper wires, with
each pair individually shielded to minimize crosstalk and
interference. The cables are typically terminated with RJ-45 connectors, which
are commonly used for Ethernet connections.

6. Configuration Details

11 | P a g e
khem_SW6#show vlan brief
Creating VLAN
switch 6 VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
Switch(config)#vlan 10 1 default active Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Switch(config-vlan)#name sales
Fa0/13, Fa0/14, Fa0/15, Fa0/16
Switch(config-vlan)#exit Fa0/17, Fa0/18, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23, Fa0/24
Gig0/1, Gig0/2
Switch(config)#interface range fastEthernet 10 sales active Fa0/3, Fa0/4
0/3-4 1002 fddi-default active
1003 token-ring-default active
Switch(config-if-range)#switchport mode 1004 fddinet-default active
access 1005 trnet-default active
khem_SW6#

Switch(config-if-range)#switchport access vlan


10

Switch(config-if-range)#exit

Switch(config)#hostname khem_SW6

khem_SW6(config)#

12 | P a g e
Creating VLAN khem_SW7#show vlan brief

VLAN Name Status Ports


---- -------------------------------- --------- -------------------------------
1 default active Fa0/5, Fa0/6, Fa0/7, Fa0/8
switch 7 Fa0/9, Fa0/10, Fa0/11, Fa0/12
Fa0/13, Fa0/14, Fa0/15, Fa0/16
Fa0/17, Fa0/18, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23, Fa0/24
Switch(config)#hostname khem_SW7
Gig0/1, Gig0/2
khem_SW7(config)#vlan 20 20 marketing active Fa0/3, Fa0/4
1002 fddi-default active
khem_SW7(config-vlan)#name marketing
1003 token-ring-default active
khem_SW7(config-vlan)#exit 1004 fddinet-default active
1005 trnet-default active
khem_SW7(config)#interface range khem_SW7#
fastEthernet 0/3-4

khem_SW7(config-if-range)#switchport
mode access

khem_SW7(config-if-range)#switchport
access vlan 20

khem_SW7(config-if-range)#exit

khem_SW7(config)#

13 | P a g e
khem_SW8#show vlan brief
switch 8

VLAN Name Status Ports


Switch(config)#hostname khem_SW8
---- -------------------------------- --------- -------------------------------
khem_SW8(config)#vlan 30
1 default active Fa0/5, Fa0/6, Fa0/7, Fa0/8
khem_SW8(config-vlan)#name finance
Fa0/9, Fa0/10, Fa0/11, Fa0/12
khem_SW8(config)#interface range
Fa0/13, Fa0/14, Fa0/15, Fa0/16
fastEthernet 0/3-4
Fa0/17, Fa0/18, Fa0/19, Fa0/20
khem_SW8(config-if-range)#switchport mode
access Fa0/21, Fa0/22, Fa0/23, Fa0/24

khem_SW8(config-if-range)#switchport access Gig0/1, Gig0/2


vlan 30
30 finance active Fa0/3, Fa0/4
khem_SW8(config-if-range)#exit
1002 fddi-default active

1003 token-ring-default active

1004 fddinet-default active

1005 trnet-default active

khem_SW8#

14 | P a g e
Creating VLAN on multilayer switch 6 Switch#show vlan brief
VLAN Name Status Ports

Switch(config)#vlan 10 ---- -------------------------------- --------- -------------------------------

Switch(config-vlan)#name sales 1 default active Fa0/5, Fa0/6, Fa0/7, Fa0/8

Switch(config-vlan)#exit Fa0/9, Fa0/10, Fa0/11, Fa0/12

Switch(config)#vlan 20 Fa0/13, Fa0/14, Fa0/15, Fa0/16

Switch(config-vlan)#name marketing Fa0/17, Fa0/18, Fa0/19, Fa0/20

Switch(config-vlan)#exit Fa0/21, Fa0/22, Fa0/23, Fa0/24

Switch(config)#vlan 30 Gig0/1, Gig0/2

Switch(config-vlan)#name finance 10 sales active


Switch(config-vlan)#exit 20 marketing active
Switch(config)#
30 finance active
Switch(config)#end
1002 fddi-default active

1003 token-ring-default active

1004 fddinet-default active

1005 trnet-default active

15 | P a g e
Trunking multilayer switch Switch#show interfaces trunk

Port Mode Encapsulation Status Native vlan

Switch(config)#interface range fastEthernet Fa0/2 desirable n-802.1q trunking 1


0/2-4 Fa0/3 desirable n-802.1q trunking 1
Switch(config-if-range)#switchport mode Fa0/4 desirable n-802.1q trunking 1
dynamic desirable

Port Vlans allowed on trunk

Fa0/2 1-1005

Fa0/3 1-1005

Fa0/4 1-1005

Port Vlans allowed and active in management domain

Fa0/2 1,10,20,30

Fa0/3 1,10,20,30

Fa0/4 1,10,20,30

Port Vlans in spanning tree forwarding state and not pruned

Fa0/2 1,10,20

Fa0/3 10,20

Fa0/4 10,20

16 | P a g e
IP Address on multilayer switch ip routing
Switch(config)#ip routing
Switch(config)#interface vlan 10 Switch(config)#interface fastEthernet 0/1
Switch(config-if)#ip address 192.168.10.1 Switch(config-if)#no switchport
255.255.255.0
Switch(config-if)#ip address 10.10.10.2
Switch(config)#interface vlan 20 255.255.255.0
Switch(config-if)#ip address 192.168.20.1 Switch(config-if)#exit
255.255.255.0
Switch(config)#ip routing
Switch(config)#interface vlan 30

Switch(config-if)#ip address 192.168.30.1


255.255.255.0

17 | P a g e
Creating VLAN multilayer switch 7 khem_SW(multilayer)#show interfaces trunk

Port Mode Encapsulation Status Native vlan

Switch(config)#hostname khem_SW(multilayer) Fa0/2 desirable n-802.1q trunking 1

khem_SW(multilayer)(config)#vlan 10 Fa0/3 desirable n-802.1q trunking 1

khem_SW(multilayer)(config-vlan)#name sales Fa0/4 desirable n-802.1q trunking 1

khem_SW(multilayer)(config-vlan)#exit

khem_SW(multilayer)(config)#vlan 20 Port Vlans allowed on trunk

khem_SW(multilayer)(config-vlan)#name Fa0/2 1-1005


marketing Fa0/3 1-1005
khem_SW(multilayer)(config-vlan)#exit Fa0/4 1-1005
khem_SW(multilayer)(config)#vlan 30

khem_SW(multilayer)(config-vlan)#name Port Vlans allowed and active in management domain


finance
Fa0/2 1,10,20,30
khem_SW(multilayer)(config-vlan)#exit
Fa0/3 1,10,20,30

Fa0/4 1,10,20,30

Port Vlans in spanning tree forwarding state and not pruned

trunking Fa0/2 1,10,20,30

Fa0/3 1,10,20,30

khem_SW(multilayer)(config)#interface range Fa0/4 1,10,20,30


fastEthernet 0/2-4

khem_SW(multilayer)(config-if-
range)#switchport mode dynamic desirable

18 | P a g e
IP Address IP routing

khem_SW(multilayer)(config)#ip routing
khem_SW(multilayer)(config)#interfac khem_SW(multilayer)(config)#interface
e vlan 10 fastEthernet 0/1
khem_SW(multilayer)(config-if)#ip khem_SW(multilayer)(config-if)#no
address 192.168.10.5 255.255.255.0 switchport

khem_SW(multilayer)(config)#interfac khem_SW(multilayer)(config-if)#ip address


e vlan 20 10.10.10.1 255.255.255.0

khem_SW(multilayer)(config-if)#ip khem_SW(multilayer)(config-if)#no
address 192.168.20.5 255.255.255.0 shutdown

khem_SW(multilayer)(config-if)#exit
khem_SW(multilayer)(config)#interfac
e vlan 30 khem_SW(multilayer)(config)#end

khem_SW(multilayer)(config-if)#ip
address 192.168.30.5 255.255.255.0

19 | P a g e
ROUTER

khem_router(config)#interface gigabitEthernet 0/0/0

khem_router(config-if)#no shutdown

khem_router(config-if)#ip address 10.10.10.2


255.255.255.0

khem_router(config-if)#exit

khem_router(config)#interface gigabitEthernet 0/0/1

khem_router(config-if)#no shutdown

khem_router(config-if)#ip address 10.10.100.1


255.255.255.0

khem_router(config-if)#exit

20 | P a g e
6.Testing and Verification

1. Ping
A ping (Packet Internet Groper) is a basic internet program which allows
us to test and verify if a particular destination IP address exists and can
accept requests in computer network administration. Ping command is used
to test and verify the communication between the computers. I have use
ping command in my topology to test and verify the communication
between VALN and computers.

2. Tracert
Tracert helps us to identifies the route in which packet takes between our
computer and to the destination computers specified in the command.
Troubleshooting a large network where several paths can lead to the same
point or where many intermediate components (routers or bridges) are
involved. I have used this command in my topology to know the data flow
or to check the data packet from where it is flow.

3. VLAN
A virtual local area network (VLAN) is a virtualized connection which
connects multiple devices and network nodes from different LANs into
one logical network. I have crate VLAN in my topology to separate my
department i.e. sales, marketing and finance.

4. Trunk
A trunk is a communication line such as a wire or optical line which is
designed to carry multiple signals simultaneously. It helps to provides
network access between two points. I have created in my topology for
smooth communication between switch to switch and switch to router.
21 | P a g e
22 | P a g e
23 | P a g e
24 | P a g e
Ping form PC 1 VLAN 10 To pc 0 VLAN 20

25 | P a g e
Ping form PC 1 VLAN 10 To pc 5 VLAN 30

26 | P a g e
ping form PC 2 VLAN 10 To pc 6 VLAN 30

27 | P a g e
sTracert form VLAN 30 PC 6 to VLAN 10 PC 1

28 | P a g e
Tracert

29 | P a g e
7. Scalability Considerations
As Texas IT Company continues to expand, scalability is a critical factor in the
network design. The proposed infrastructure will be designed with scalability in
mind, allowing for seamless integration of additional users, devices, and services
as the company grows. This scalability will be achieved through the use of
modular networking equipment, flexible addressing schemes, and provisioning for
future bandwidth requirements.

8. Conclusion
In conclusion, the proposed network infrastructure design for Texas IT Company's
new office space aims to provide a secure, scalable, and efficient platform to
support the company's communication, collaboration, and internet access needs.
By implementing advanced security measures, scalable architecture, and cutting-
edge technology solutions, Texas IT Company will be well-positioned to adapt to
future challenges and continue its trajectory of growth and success.

30 | P a g e

You might also like