Networking Assignment Report
Networking Assignment Report
CT043-3-1-IN
INTRODUCTION TO NETWORKING
UC1F1904CS(IS)
WEIGHTAGE : 70%
Assessment Criteria (Marks Breakdown):
Group Assignment
Alternate Roles 10
Peer Evaluation 5
- Good relationship with group
members
- Respect and accept
opinions
Referencing 5
Topology / IP Addressing 15
Justification
Network Characteristics 10
Individual Reflection 5
Demonstration 10
Practical Test
Configuration 10
Marking Rubrics:
Comments:
Table of Contents
1.0 Introduction 1
1.1 Objectives 1
1.2 Scope 1
1.3 Limitation 1
1.4 Assumption 2
6.0 Conclusion 23
In conclusion, we have worked together to plan out the best network that we can come
out with that has optimized performance, reliability, security and manageability
through selecting the right network devices and cables for our network. We may not
have chosen the best and latest technology to be implemented for in our solution, but
the solution that we have come out with still comes close to the best, at a much cost
efficient cost. 23
7.0 References 24
8.0 Appendices 28
1.0 Introduction
Our group is given a task to propose a network design with its requirements for the expansion
of new premises by Asia Pacific University of Technology and Innovation (APU). We will
build a computer network environment for the training centre that meets the expectations of
the APU Corporate Training Services.
1.1 Objectives
The objective of this project is to design and configure a Local Area Network (LAN)
topology connecting the 2 new buildings, together with configuration of network devices to
be used across the premises. A detailed floor plan of the buildings and the IP addressing
scheme will also be designed to show how the network connect with each other across the
buildings consisting of labs, classrooms, offices, server rooms.
1.2 Scope
This project is focused on building a sustainable network - Local Area Network (LAN) for a
dedicated training centre and an office building. The network will allow all computer systems
and devices such as projectors and printers in the training centre to access the internet as well
as communicating between themselves. The Local Area Network will only be wired
connections, therefore static routing will be used for this project. This is because the size of
the network is small and is not expected to grow significantly and it also allows for easier
maintenance.
1.3 Limitation
Budgeting is one of the limitations that we will encounter when setting up the network for the
building. This is because there are many network devices such as switches, routers, access
points, cables, etc. that are needed when setting up the network. Another limitation is that
setting up the network is time-consuming. This is because there are 2 buildings and each
building has 2 floors. The offices and labs have a lot of PCs and Ethernet cabling has to be set
up for each PC which would take a large amount of time to do so. Each network device in
each building should also be ensured that it is able to communicate with each other.
1
1.4 Assumption
1. There will be 2 buildings in the training center, which are an office building and a
training building.
2. Each building has two floors.
3. There are 7 departments and about 80 employees in the training center.
4. Those departments involved including marketing, human resources, information
technology department, finance department, top management and some departments
specially designed for students like program department, student services department.
5. Assuming that it has a maximum of 180 users including staff, lecturers and students at
the same time.
6. The server room and control room can be accessed by technicians and some staff
only.
2
2.0 Floor Plan Layout
3
Training Building Level 1:
4
Legend:
5
2.2 Justification of Floor Plan Design
Both buildings consist of two floors each and are enough to allocate all the required facilities
i.e. server room, control room and labs.
Staff rooms are situated on level one of both buildings as it is easier for students or visitors to
locate if they need to consult or find any faculty staff. They are not placed at the same floor
as classrooms to avoid congestion among staff and students. The staff rooms are also close to
the main entrance for the convenience of employees working there.
Cafeterias are located on level one for convenience. This saves time from needing to travel a
long distance in the premises during break time. People can take a quick bite if they are in a
rush to class. A staff lounge is also located next to the staff room in the Office Building for
faculty members to rest and relax in. For the Training Building, there is an additional office
for administration purposes and a conference room to conduct meetings in. These are all
located on the ground floor for convenience.
Classrooms and labs are all located on level two of both buildings. Being not on the same
floor as the main entrance, the classrooms will have a quieter environment which is ideal for
learning and teaching purposes. There will be less distractions and noises. All computer labs
are equipped with PCs for lab classes and also training sessions. There is an additional
discussion room on level two of the Office Building for students to conduct discussions and
studies in. It is located right next to classrooms and labs to ease students.
A server room and a control room are located on level two of Office Building and Training
Building respectively. They are both on the top floor as it is not directly accessible from the
main entrance to ensure security. Only authorised personnel are allowed to enter.
6
3.0 Network Devices
3.1 Router
Rack Units 1 2
Interface Slots 4 4
Data packets are forwarded and received through a networking device called a router. The
Cisco 2911 has 1 more rack unit as well as 1 more integrated Ethernet port over the Cisco
2901. Not only that, the Cisco 2911 has 24 modular LAN switch ports compared to the Cisco
2901’s 16. This allows for more end-devices such as PCs, printers, security cameras and so
on to be connected to the router.
7
3.2 Switch
Ports Quantity 24 24
Gigabit Ports - 2
The switches that we have chosen to use is the Cisco 2960-24TT switch. We have decided to
go with this model over the Cisco 2950-24 switch mainly due to the fact that the Cisco
2960-24TT’s forwarding performance is much greater compared to it. Not only that, the
Cisco 2960-24TT has 2 gigabit ports whilst the Cisco 2950-24 does not have any which is a
crucial factor in deciding which switch to be used as the performance differs greatly.
3.3 Cabling
8
Price(Per $112 $355 $446 $680
1000ft/304.8m
in USD)
The cabling type that we have chosen is Cat6a. Cat6a is the happy medium between Cat7 and
Cat5e and is more future-proof than Cat6. Cat5e’s speed is 10 times slower than Cat6a which
was the deciding factor for us opting out of it. Cat7 provides more bandwidth than Cat6a but
due to the nature of the project we are working on that doesn’t require such bandwidth, we
have chosen Cat6a instead. Cat6a is chosen over Cat6 because it has double the bandwidth
and distance compared to Cat6.
9
4.0 Network Design
10
Office Building Level 2:
11
Training Building Level 2:
12
4.3 Network Design (Packet Tracer)
13
5.0 Individual Component
The network topology design used in the Office Building (Building 1) is tree topology. Tree
topology combines the physical and logical layout of both star topology and bus topology to
construct a tree like structure. The main structure of tree is in the form of a bus backbone
cable which later connects to switches that will again be connected more network devices. It
is a flexible approach as you can easily add network devices to this network by extending the
star network at each branch of the tree (Roy, J., 2020).
The reason we chose this topology is because tree topology is useful for organisations with
multiple departments or multi-floor team placements (Roy, J., 2020). Which in our case, the
Office Building has two floors and have several grouping segments i.e. staffroom, labs and
server room requiring multiple switches. If we were to choose the simple star topology
instead, there would be many bottlenecks and problems in the meantime affecting network
performance (Roy, J., 2020). Below is a comparison of tree and star topology to justify our
choices.
14
Features - Ideal if workstations are located - Every node has its own dedicated
in groups. connection to the hub.
- Used in Wide Area Network. - Hub acts as a repeater for data
flow.
All in all, tree topology is highly reliable and fault-tolerant. Failure of one or more computers
will not affect the working of whole computer network. Moreover, computers can be easily
added by extending the star network connected to the main backbone cable (Roy, J., 2020).
This is very useful for the faculty when expansion happens. With the usage of switch or
intelligent hub, network performance will be really good (Roy, J., 2020). That is why we
decided to recommend and adopt the tree topology for our project.
15
5.1.2 Network Performance
Network performance management includes monitoring and optimization practices for key
network performance metrics such as application down time and packet loss. When problems
occur, the two logical outputs are increased network availability and minimized response
time. A holistic approach to managing network performance must consider all of the essential
categories through which problems may be manifested (VIAVI Solutions Inc., 2020).
One of the factors affecting network performance is the infrastructure. The overall network
infrastructure includes network hardware, such as routers, switches and cables, networking
software, including security and operating systems as well as network services such as IP
addressing and wireless protocols. From the infrastructure perspective, we need to
characterize the overall traffic and bandwidth patterns on the network. This network
performance measurement will provide insight into which flows are most congested over
time and could become potential problems. By identifying the over-capacity elements of the
infrastructure, we can get proactive corrections or upgrades that can minimize future
downtime rather than simply responding to any performance crisis that may arise (VIAVI
Solutions Inc., 2020).
16
5.2 TAN GWO YIH (TP051104)
The reliability of the network is the probabilistic factor that decides whether a network
remains functional when unexpectedly its components fail. (Yasamin, 2015) To improve the
reliability of our network, network maintenance must be done regularly. A few examples of
network maintenance are hardware/software configurations, configuration changes,
17
troubleshooting network problems, ensuring the security of the network and monitoring.
Another method to ensure the reliability of our network is to implement RAID.
Advantage Increased read/ the data need Reading data RAID 6 is more
write speed not be replaced, transactions is secure than
they just need to very fast (faster RAID 5. When
be copied to the than RAID1/0) two drives fail,
new drive when Even when the all data will still
drive fails drive fails, still be available,
have access to even if the
all the data failed drives are
replaced.
RAID 5 is the best option to be implemented in our project. This is because RAID 5 is the
best overall that provides fast reading speed and fault-tolerance. It is also the most ideal for
application and file servers that have a fixed amount of data drives.
18
5.3 CHAI HUI TONG (TP054680)
According to the table above, tree topology is the final choice for this assignment. Tree
topology is a hybrid network topology that seen as star topology in physical view and bus
topology in logical view. Tree topology have been chosen among others due to its high
performance, flexibility and reliability. As shown above, data are transmitted on single
direction in bus network topology and multi direction in tree topology. The transmission
speed would decrease as the number of nodes increase when bus topology in used. Hence, it
is more suitable to use tree topology to avoid this problem as there are many devices in the
training building. Besides, the school management will have to increase computers or other
network devices in training building due to different circumstances, such as increment of
student or expansion of school. Tree topology is scalable, provides flexibility to add on and
reduce nodes easily. Tree topology is more reliable than other topology as if the backbone
damaged, the computer in the same star network still be able to connect. In this case, it
would not affect other classes or departments when one of the networks broke down hence
the school could maintain daily operation as usual. In conclusion, tree topology is more
suitable for training building among others.
19
5.3.2 Network Security
Network security is the practice of preventing and protecting against unauthorized intrusion
into corporate networks. (Fruhlinger, 2018) Without good security, the organization’s
network may be hacked easily and causes unimaginable consequences. To enhance security
aspects, the organization should carry out physical precautions first before going to a more
complex solution. Below are the security preventive measures that are recommended for this
assignment.
Intrusion-detection -It can monitor and block the traffic from suspicious IP address
System (IDS) when anomaly detection
Virtual Private -It provides encryption to secure data while using VPN to transmit
Network (VPN) data
20
5.4 DERRIC CHONG WEI SEN (TP054652)
21
5.4.2 Network Manageability
For our network management, the framework that will be used is FCAPS as it covers the
management and monitoring for fault, configuration, accounting, performance and security.
Fault recognition Database handling Activity recording Report generation Log accessing
Network recovery Network auditing Billing managing Data collection Data encryption
22
6.0 Conclusion
In conclusion, we have worked together to plan out the best network that we can come out
with that has optimized performance, reliability, security and manageability through selecting
the right network devices and cables for our network. We may not have chosen the best and
latest technology to be implemented for in our solution, but the solution that we have come
out with still comes close to the best, at a much cost efficient cost.
23
7.0 References
Amazon.com. (n.d.). [online] Available at:
https://www.amazon.com/Cisco-Ws-C2950-24-2950-Port-Switch/dp/B00007MDB2
[Accessed 22 Dec. 2019].
Amazon.com. (n.d.). [online] Available at:
https://www.amazon.com/Cisco-Catalyst-2960-24TT-Ethernet-Switch/dp/B0067F5URA
[Accessed 21 Dec. 2019].
Amazon.com. (n.d.). [online] Available at:
https://www.amazon.com/Cisco-CISCO2901-Integrated-Services-Router/dp/B0030E9EVE
[Accessed 21 Dec. 2019].
Amazon.com. (n.d.). [online] Available at:
https://www.amazon.com/Cisco-CISCO2911-K9-Integrated-Services/dp/B002ZCUCLS#cust
omerReviews [Accessed 22 Dec. 2019].
Bianco, D. (2019). 10 ways to prevent computer security threats from insiders. [online]
SearchSecurity. Available at:
https://searchsecurity.techtarget.com/feature/Ten-ways-to-prevent-insider-security-threats
[Accessed 24 Dec. 2019].
Cfindia.net. (n.d.). Roles and Functions of Network Management. [online] Available at:
http://cfindia.net/roles-and-functions-of-network-management.php [Accessed 21 Dec. 2019].
Cisco. (n.d.). Compare Models 2900 Series Integrated Services Routers. [online] Available
at:
https://www.cisco.com/c/en/us/products/routers/2900-series-integrated-services-routers-isr/m
odels-comparison.html [Accessed 21 Dec. 2019].
Cnet.com. (2020). Cisco Catalyst 2960-24TT - switch - 24 ports - managed - rack-mountable
Series Specs & Prices. [online] Available at:
https://www.cnet.com/products/cisco-catalyst-2950-24-24-port-switch/ [Accessed 20 Dec.
2019].
Datatechprofessionals.com. (2020). Cat5e vs Cat6 vs Cat6a vs Cat7 - Which type of cable
should I use? [online] Available at:
https://www.datatechprofessionals.com/cabletypes.html [Accessed 20 Dec. 2019].
24
Dosal, E. (n.d.). What is a Firewall? The Different Firewall Types & Architectures. [online]
Compuquip.com. Available at:
https://www.compuquip.com/blog/the-different-types-of-firewall-architectures [Accessed 23
Dec. 2019].
Fruhlinger, J. (2018). What is network security? Definition, methods, jobs & salaries.
[online] CSO Online. Available at:
https://www.csoonline.com/article/3285651/what-is-network-security-definition-methods-job
s-and-salaries.html [Accessed 23 Dec. 2019].
Gamingcpus.com. (2020). Cat5 vs Cat6 vs Cat7, Everything About Ethernet Cables | Gaming
CPUs. [online] Available at:
https://gamingcpus.com/cat5-vs-cat6-vs-cat7-ethernet-cables [Accessed 20 Dec. 2019].
Learnpick.in. (n.d.). What are the similarities and dissimilarities between bus and tree
topologies? - Find 1 Answer & Solution | LearnPick Resources. [online] Available at:
https://www.learnpick.in/questions/details/6678/what-are-the-similarities-and-dissimilarities-
between-bus-an [Accessed 22 Dec. 2019].
Medium.com. (2020). Cat6 Vs. Cat7 Cable: Which Is Optimum for A New House. [online]
Available at:
https://medium.com/@fsjoanna/cat6-vs-cat7-cable-which-is-optimum-for-a-new-house-a924
0408efe5 [Accessed 20 Dec. 2019].
Netwerkkabel.eu. (2018). What is the difference between Cat 6 and Cat 7? [online] Available
at:
https://www.netwerkkabel.eu/en/blog/what-is-the-difference-between-cat-6-and-cat-7
[Accessed 20 Dec. 2019].
Networklessons.com. (2020). Network Maintenance | NetworkLessons.com. [online]
Available at:
https://networklessons.com/cisco/ccnp-tshoot/network-maintenance [Accessed 22 Dec.
2019].
25
Perle.com. (n.d.). Using the FCAPS standards model to Managing Large-Scale Deployments.
[online] Available at: https://www.perle.com/supportfiles/fcaps.shtml [Accessed 22 Dec.
2019].
26
Studytonight.com. (2020). Types of Network Topology. [online] Available at:
https://www.studytonight.com/computer-networks/network-topology-types [Accessed 20
Dec. 2019].
Teamkci.com. (n.d.). [online] Available at:
https://teamkci.com/wp-content/uploads/WS-C2950.pdf [Accessed 21 Dec. 2019].
Secureitstore.com. (n.d.). Cisco Catalyst 2960-24TT-L Switch | SecureITStore.com. [online]
Available at: https://www.secureitstore.com/C2960-24TT-L.asp [Accessed 22 Dec. 2019].
Techopedia.com. (n.d.). What is Fault Configuration Accounting Performance Security
(FCAPS)? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/24512/fault-configuration-accounting-performance-se
curity-fcaps [Accessed 24 Dec. 2019].
Techopedia.com. (n.d.). What is Network Management? - Definition from Techopedia.
[online] Available at: https://www.techopedia.com/definition/20974/network-management
[Accessed 23 Dec. 2019].
Tech, R. (n.d.). Cisco 2951 vs. 2921 vs. 2911 vs. Cisco 2901 – Router Switch Blog. [online]
Blog.router-switch.com. Available at:
https://blog.router-switch.com/2014/06/cisco-2951-vs-2921-vs-2911-vs-cisco-2901/
[Accessed 21 Dec. 2019].
the SNMP center. (n.d.). FCAPS functions supported in Network Management Software.
[online] Available at: https://snmpcenter.com/fcaps-network-management/ [Accessed 25 Dec.
2019].
Viavisolutions.com. (2020). How to Measure Network Performance. [online] Available at:
https://www.viavisolutions.com/en-us/how-measure-network-performance [Accessed 21 Dec.
2019].
27
8.0 Appendices
Gantt Chart:
CLO3: Work in a team to propose a network design based on the given scenario
(PLO5: Social Skills, Team Skills & Responsibility)
Section 1 Brennan
(Individual) Chiang Bang Tan Gwo Yih Chai Hui Tong Derric Chong
Chen Wei Sen
CLO2: Follow instruction to design a local area network and segmenting a network using simulation tools
(PLO2: Practical Skills)
28
Meeting Minutes:
Meeting 1
Date: 16 October 2019
Time: 1445-1545(Lab Class)
Via: Group discussion
Attendees:
1. Brennan Chiang Bang Chen
2. Chai Hui Tong
3. Derric Chong Wei Sen
4. Tan Gwo Yih
Agenda:
- To discuss gantt chart
Result:
Meeting 2
Date: 16 October 2019
Time: 1445-1545
Via: Group discussion
Attendees: 1. Brennan Chiang Bang Chen
2. Chai Hui Tong
3. Derric Chong Wei Sen
4. Tan Gwo Yih
Agenda:
29
- To allocate group work for introduction
Conclusion:
- Group work for introduction
Brennan Chiang Bang Chen:Objective
Chai Hui Tong:Assumption
Derric Chong Wei Sen:Scope
Tan Gwo Yih:Limitation
Meeting 3
Date:23 October 2019
Time:1445-1545
Via: Group discussion
Attendees:
1. Brennan Chiang Bang Chen
2. Chai Hui Tong
3. Derric Chong Wei Sen
4. Tan Gwo Yih
Agenda:
- To allocate work for floor plan (drawing)
- To discuss structure of building
Results:
- To discuss and allocate work for floor plan (drawing)
Brennan Chiang Bang Chen: Office Building Level 1
Chai Hui Tong: Training Building Level 1
Derric Chong Wei Sen: Training Building Level 2
Tan Gwo Yih: Office Building Level 2
Meeting 4
Date: 6 November 2019
Time:1445-1545
Via:Group discussion
30
Attendees:
1. Brennan Chiang Bang Chen
2. Chai Hui Tong
3. Derric Chong Wei Sen
4. Tan Gwo Yih
Agenda:
- To update floor plan
- To allocate work for floor plan
Results:
- To allocate work for floor plan
Brennan Chiang Bang Chen:Justification
Chai Hui Tong: Network Devices (Router)
Derric Chong Wei Sen: Network Devices (Switch)
Tan Gwo Yih: Network Devices (Cabling)
Meeting 5
Date: 13 November 2019
Time: 1445-1545
Via: Group discussion
Attendees:
1. Brennan Chiang Bang Chen
2. Chai Hui Tong
3. Derric Chong Wei Sen
4. Tan Gwo Yih
Agenda:
- To allocate group component (Network Diagram)
- To discuss network design
Result:
- To allocate group component (Network Diagram)
Brennan Chiang Bang Chen: Side View
Chai Hui Tong: Aerial View
Derric Chong Wei Sen: Network Design (Packet Tracer)
31
Tan Gwo Yih: Aerial View
Meeting 6
Date: 20 November 2019
Time: 1445-1545
Via: Group discussion
Attendees:
1. Brennan Chiang Bang Chen
2. Chai Hui Tong
3. Derric Chong Wei Sen
4. Tan Gwo Yih
Agenda:
- To allocate individual work
Result:
- To allocate individual work
Building 1:
Brennan Chiang Bang Chen: Topology Justification
Tan Gwo Yih: IP Addressing Justification
Building 2:
Chai Hui Tong:Topology Justification
Derric Chong Wei Sen:IP Addressing
Meeting 7
Date: 18 December 2019
Time: 1445-1545
Via: Group discussion
Attendees:
1. Brennan Chiang Bang Chen
2. Chai Hui Tong
3. Derric Chong Wei Sen
4. Tan Gwo Yih
Agenda:
32
- To allocate individual work
Result:
- To allocate individual work
Brennan Chiang Bang Chen: Network Performance
Chai Hui Tong: Network Security
Derric Chong Wei Sen: Network Manageability
Tan Gwo Yih: Network Reliability
Meeting 8:
Date: 8 January 2020
Time: 1445-1545
Via: Group discussion
Agenda:
- To compile and finalize
33
Peer Evaluation Form for Group Work:
TP NO: TP050473
Write the name of each of your group members in a separate column. For each person,
indicate the extent to which you agree with the statement on the left, using a scale of 1-4
(1=strongly disagree; 2=disagree; 3=agree; 4=strongly agree). Total the numbers in each
column.
TOTALS 20 20 20
34
Peer Evaluation Form for Group Work:
TP NO: TP054680
Write the name of each of your group members in a separate column. For each person,
indicate the extent to which you agree with the statement on the left, using a scale of 1-4
(1=strongly disagree; 2=disagree; 3=agree; 4=strongly agree). Total the numbers in each
column.
TOTALS 20 20 20
35
Peer Evaluation Form for Group Work:
TP NO: TP054652
Write the name of each of your group members in a separate column. For each person,
indicate the extent to which you agree with the statement on the left, using a scale of 1-4
(1=strongly disagree; 2=disagree; 3=agree; 4=strongly agree). Total the numbers in each
column.
TOTALS 20 20 20
36
Peer Evaluation Form for Group Work:
TP NO: TP051104
Write the name of each of your group members in a separate column. For each person,
indicate the extent to which you agree with the statement on the left, using a scale of 1-4
(1=strongly disagree; 2=disagree; 3=agree; 4=strongly agree). Total the numbers in each
column.
TOTALS 20 20 20
37