100% found this document useful (1 vote)
700 views45 pages

Networking Assignment Report

This document outlines a group assignment for an Introduction to Networking module. The group consists of 4 students - Brennan Chiang Bang Chen, Chai Hui Tong, Derric Chong Wei Sen, and Tan Gwo Yih. The assignment is divided into two sections worth 70% and 30% respectively. Section 1 focuses on teamwork and networking skills while Section 2 involves a practical networking test. The assignment is to be handed in by January 9th, 2020 and will be assessed based on specific criteria.

Uploaded by

hdsasdad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
700 views45 pages

Networking Assignment Report

This document outlines a group assignment for an Introduction to Networking module. The group consists of 4 students - Brennan Chiang Bang Chen, Chai Hui Tong, Derric Chong Wei Sen, and Tan Gwo Yih. The assignment is divided into two sections worth 70% and 30% respectively. Section 1 focuses on teamwork and networking skills while Section 2 involves a practical networking test. The assignment is to be handed in by January 9th, 2020 and will be assessed based on specific criteria.

Uploaded by

hdsasdad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

GROUP ASSIGNMENT

CT043-3-1-IN

INTRODUCTION TO NETWORKING

UC1F1904CS(IS)

MEMBERS : 1. BRENNAN CHIANG BANG CHEN (TP050473)

2. CHAI HUI TONG (TP054680)

3. DERRIC CHONG WEI SEN (TP054652)

4. TAN GWO YIH (TP051104)

MODULE CODE : CT043-3-1-IN

INTAKE CODE : UC1F1904CS(IS)

LECTURER : MR. DAVID TAN GEI KAR

HAND IN DATE : 9 JANUARY 2020

WEIGHTAGE : 70%
Assessment Criteria (Marks Breakdown):

Assessment Criteria Students

Student 1 Student 2 Student 3 Student 4

Name: Brennan Chai Hui Derric Tan Gwo


Chiang Bang Tong Chong Yih
Chen Wei Sen

TP. No: TP050473 TP054680 TP054652 TP051104

Group Assignment

Section 1: Teamwork Weight Student 1 Student 2 Student 3 Student 4


Skills

Alternate Roles 10

Peer Evaluation 5
-​ ​Good relationship with group
members
- Respect and accept
opinions

Progress Report (Week 7) 10

Referencing 5

Section 1: Social Skills & Weight


Responsibilities

Topology / IP Addressing 15
Justification

Network Characteristics 10

Individual Reflection 5

Section 1: Practical Skills Weight

Demonstration 10

Subtotal Marks 70%

Practical Test

Section 2: Practical Skills Weight Student 1 Student 2 Student 3 Student 4

Network diagram (Packet 10


Tracer)
IP Addressing Scheme 5

Configuration 10

Ability to complete on time 5

Subtotal Marks 30%

Total Marks 100%

Marking Rubrics:

Only for Section 1

0-1.0 1.5-2.0 2.5-3.0 3.5-4.0 4.5-5.0


Criteria (Fail) (Marginal (Pass) (Credit) (Distinction) Weight Score
Fail)

No clear Attempt to Able to Clear Very clear 2 10


Alternate evidence of demonstrate demonstrate evidence of evidence to
Roles ability to the ability to the ability to ability to assume
assume assume assume assume alternate role
alternate role alternate alternate alternate role as a group
as a group roles as a roles as a as a group leader and
leader and group leader group leader leader and member to
member. and member and member member to demonstrated
with limited with some achieve the in practice.
effect and effect and same goal.
require require
improvement minor
s. improvement
s

Peer Not Attends Adequately Attends Attends group Attends 1 5


Evaluation group attends group group meetings group
meetings and meetings. Not meetings regularly and meetings
also no complete regularly and arrives on regularly and
contribution group work of arrives on time. arrives on
for the group assignment by time but Completes time.
work of time. incomplete group Contributes
assignment. of group assignments meaningfully
work. on time. to group
discussions
and complete
by time.
Not showing Missed out the Presented the Complete Very good 2 10
any progress. progress report progress on work quality of
Progress schedule. time, but presented on work
Report showing time. presented.
Incomplete incomplete However, Well
work work. Need work need prepared, and
presented - has major some changes not doing last
evidence of modification and minute work
last minute s to the work modifications
work done for
improvement.

Referencin No in-text Minimal Sufficient Recent source Very good 1 5


g citation and in-text citation number of of references quality of
very minimal and references references used, with references
references. used. Minor and citation proper used, with
Major issues in issues in the in the report. reference list. proper
the referencing referencing No issue in Limited citation and
format. format. the in-text reference list
referencing citation in the for all facts
format report. and diagrams
used

Topology / Not able to Propose Propose Propose good Propose very 3 15


IP propose for incomplete complete Topology / IP good
Addressin topology and Topology / IP Topology / Addressing Topology / IP
g IP address plan Addressing IP plan with Addressing
Justificatio for the plan with Addressing justification, plan with
n scenario weak plan with suitable for justification,
justification minimal APU suitable for
justification community APU
community
with
supporting
evidence.

Network Limited Minimal Sufficient Good Very good 2 10


Characteri discussion of discussion of discussion of discussion of discussion of
stics network network network network network
characteristics characteristics, characteristic characteristics characteristic
with no s but with with s but with
contribution to limited sufficient excellent
the society contribution contribution contribution
to the society to the society to the society
Individual No positive Minimal Good values Some good Able to show 1 5
Reflection attitude and positive demonstrated values shown good values
good values attitude and in in the in reflection such as
demonstrated good values assignment such as responsible
in the demonstrated based on responsibility, towards their
reflection through reflection and tolerance. own
report reflection report, but no well-being,
report. evidence of Good in time displaying
time management care and
management skills but only concerns,
skills in the related to own tolerance.
work work.
produced. Proactive to
ensure the
completion of
task for all
group
members.

Not turn up for Major issues Minimal Successful Successful 2 10


Demonstra project in issues in network network
t ion demonstration. configuration configuration configuration configuration
(some parts – not fully (able to ping (able to ping
are unable to working to all devices) to all devices)
ping). according to
the proposed Able to Excellent
plan modify the skills in
network modifying
Able to configuration network
modify the without any configuration
network help during during
configuration demonstration demonstratio
with help of n
friends
during
demonstratio
n.

Total Marks (Section -1) 70

Only for Section 2 (Practical Test)

0-1.0 1.5-2.0 2.5-3.0 3.5-4.0 4.5-5.0


Criteria (Fail) (Marginal (Pass) (Credit) (Distinction) Weigh Score
Fail) t
Network Not chosen any No proper Appropriate Good network Good quality / 2 10
Diagram devices and devices and devices and design showing complexity of
cables for the cables chosen cables chosen complete network
given network for the given for the given setting of the design.
diagram. network network network
diagram. diagram.

IP No calculation of Wrong Incomplete Correct Correct 5 5


Addressing IP address calculation of calculation of calculation of calculation of
Scheme scheme. IP address IP address IP addressing IP addressing
scheme. scheme. scheme. scheme with
neat structure.

Configurati Poor Able to show Show good Very good Outstanding 2 10


on understanding on minimal understanding understanding configuration
the configuration understanding in in skills,
on the configuration, configuration. exceeding the
configuration but minimal Able to answer expectation.
done knowledge on most of the
the work questions Able to answer
all questions
posed
perfectly.

Ability to Not able to Incomplete of Partially Completed in Completed 5 5


complete on complete the work within completed the order on time. before on time.
time work on time specific time. work.

Total Marks (Section -2) 30

Comments:
Table of Contents

1.0 Introduction 1
1.1 Objectives 1
1.2 Scope 1
1.3 Limitation 1
1.4 Assumption 2

2.0 Floor Plan Layout 3


2.1 Floor Plan & Legend 3
2.2 Justification of Floor Plan Design 6

3.0 Network Devices 7


3.1 Router 7
3.2 Switch 8
3.3 Cabling 8

4.0 Network Design 10


4.1 Side View of Network Diagram 10
4.2 Aerial View of Network Diagram 10
4.3 Network Design (Packet Tracer) 13

5.0 Individual Component 14


5.1 BRENNAN CHIANG BANG CHEN (TP050473) 14
5.1.1 Topology Justification (Building 1 - Office Building) 14
5.1.2 Network Performance 16
5.2 TAN GWO YIH (TP051104) 17
5.2.1 IP Addressing Justification (Building 1 - Office Building) 17
5.2.2 Network Reliability 17
5.3 CHAI HUI TONG (TP054680) 19
5.3.1 Topology Justification (Building 2 - Training Building) 19
5.3.2 Network Security 20
5.4 DERRIC CHONG WEI SEN (TP054652) 21
5.4.1 IP Addressing Justification (Building 2 - Training Building) 21
5.4.2 Network Manageability 22

6.0 Conclusion 23

In conclusion, we have worked together to plan out the best network that we can come
out with that has optimized performance, reliability, security and manageability
through selecting the right network devices and cables for our network. We may not
have chosen the best and latest technology to be implemented for in our solution, but
the solution that we have come out with still comes close to the best, at a much cost
efficient cost. 23
7.0 References 24

8.0 Appendices 28
1.0 Introduction
Our group is given a task to propose a network design with its requirements for the expansion
of new premises by Asia Pacific University of Technology and Innovation (APU). We will
build a computer network environment for the training centre that meets the expectations of
the APU Corporate Training Services.

1.1 Objectives
The objective of this project is to design and configure a Local Area Network (LAN)
topology connecting the 2 new buildings, together with configuration of network devices to
be used across the premises. A detailed floor plan of the buildings and the IP addressing
scheme will also be designed to show how the network connect with each other across the
buildings consisting of labs, classrooms, offices, server rooms.

1.2 Scope
This project is focused on building a sustainable network - Local Area Network (LAN) for a
dedicated training centre and an office building. The network will allow all computer systems
and devices such as projectors and printers in the training centre to access the internet as well
as communicating between themselves. The Local Area Network will only be wired
connections, therefore static routing will be used for this project. This is because the size of
the network is small and is not expected to grow significantly and it also allows for easier
maintenance.

1.3 Limitation
Budgeting is one of the limitations that we will encounter when setting up the network for the
building. This is because there are many network devices such as switches, routers, access
points, cables, etc. that are needed when setting up the network. Another limitation is that
setting up the network is time-consuming. This is because there are 2 buildings and each
building has 2 floors. The offices and labs have a lot of PCs and Ethernet cabling has to be set
up for each PC which would take a large amount of time to do so. Each network device in
each building should also be ensured that it is able to communicate with each other.

1
1.4 Assumption
1. There will be 2 buildings in the training center, which are an office building and a
training building.
2. Each building has two floors.
3. There are 7 departments and about 80 employees in the training center.
4. Those departments involved including marketing, human resources, information
technology department, finance department, top management and some departments
specially designed for students like program department, student services department.
5. Assuming that it has a maximum of 180 users including staff, lecturers and students at
the same time.
6. The server room and control room can be accessed by technicians and some staff
only.

2
2.0 Floor Plan Layout

2.1 Floor Plan & Legend

Office Building Level 1:

Office Building Level 2:

3
Training Building Level 1:

Training Building Level 2:

4
Legend:

5
2.2 Justification of Floor Plan Design
Both buildings consist of two floors each and are enough to allocate all the required facilities
i.e. server room, control room and labs.

Staff rooms are situated on level one of both buildings as it is easier for students or visitors to
locate if they need to consult or find any faculty staff. They are not placed at the same floor
as classrooms to avoid congestion among staff and students. The staff rooms are also close to
the main entrance for the convenience of employees working there.

Cafeterias are located on level one for convenience. This saves time from needing to travel a
long distance in the premises during break time. People can take a quick bite if they are in a
rush to class. A staff lounge is also located next to the staff room in the Office Building for
faculty members to rest and relax in. For the Training Building, there is an additional office
for administration purposes and a conference room to conduct meetings in. These are all
located on the ground floor for convenience.

Classrooms and labs are all located on level two of both buildings. Being not on the same
floor as the main entrance, the classrooms will have a quieter environment which is ideal for
learning and teaching purposes. There will be less distractions and noises. All computer labs
are equipped with PCs for lab classes and also training sessions. There is an additional
discussion room on level two of the Office Building for students to conduct discussions and
studies in. It is located right next to classrooms and labs to ease students.

A server room and a control room are located on level two of Office Building and Training
Building respectively. They are both on the top floor as it is not directly accessible from the
main entrance to ensure security. Only authorised personnel are allowed to enter.

6
3.0 Network Devices

3.1 Router

Product Name Cisco 2901 Cisco 2911

Rack Units 1 2

Interfaces 2 integrated 10/100/1000 3 integrated 10/100/1000


Ethernet ports (RJ-45 only) Ethernet ports (RJ-45 only)

Wireless/Wired Wired Wired

Interface Slots 4 4

Modular LAN Switch 16 24


Ports

Price $125(Amazon,2019) $310(Amazon,2019)

Data packets are forwarded and received through a networking device called a router. The
Cisco 2911 has 1 more rack unit as well as 1 more integrated Ethernet port over the Cisco
2901. Not only that, the Cisco 2911 has 24 modular LAN switch ports compared to the Cisco
2901’s 16. This allows for more end-devices such as PCs, printers, security cameras and so
on to be connected to the router.

7
3.2 Switch

Product Name Cisco 2950-24 Cisco 2960-24TT

Forwarding Performance Less than 1 Gbps 32Gbps

Switching Capacity 3.6Mpps 6.5Mpps

Ports Quantity 24 24

Gigabit Ports - 2

Wireless/Wired Wired Wired

Price $99(Amazon,2019) $995(Amazon,2019)

The switches that we have chosen to use is the Cisco 2960-24TT switch. We have decided to
go with this model over the Cisco 2950-24 switch mainly due to the fact that the Cisco
2960-24TT’s forwarding performance is much greater compared to it. Not only that, the
Cisco 2960-24TT has 2 gigabit ports whilst the Cisco 2950-24 does not have any which is a
crucial factor in deciding which switch to be used as the performance differs greatly.

3.3 Cabling

Category Cat5e Cat6 Cat6a Cat7

Bandwidth 100MHz 250MHz 500MHz 600MHz

Max Data 1Gbps 10Gbps 10Gbps 10Gbps


Rate(Speed)

Distance 100meters 55meters (to 100meters 100meters


achieve
10Gbps)

Shielding UTP or STP UTP or STP UTP or STP Shielded only

8
Price(Per $112 $355 $446 $680
1000ft/304.8m
in USD)

The cabling type that we have chosen is Cat6a. Cat6a is the happy medium between Cat7 and
Cat5e and is more future-proof than Cat6. Cat5e’s speed is 10 times slower than Cat6a which
was the deciding factor for us opting out of it. Cat7 provides more bandwidth than Cat6a but
due to the nature of the project we are working on that doesn’t require such bandwidth, we
have chosen Cat6a instead. Cat6a is chosen over Cat6 because it has double the bandwidth
and distance compared to Cat6.

9
4.0 Network Design

4.1 Side View of Network Diagram

4.2 Aerial View of Network Diagram

Office Building Level 1:

10
Office Building Level 2:

Training Building Level 1:

11
Training Building Level 2:

12
4.3 Network Design (Packet Tracer)

13
5.0 Individual Component

5.1 BRENNAN CHIANG BANG CHEN (TP050473)

5.1.1 Topology Justification (Building 1 - Office Building)

The network topology design used in the Office Building (Building 1) is tree topology. Tree
topology combines the physical and logical layout of both star topology and bus topology to
construct a tree like structure. The main structure of tree is in the form of a bus backbone
cable which later connects to switches that will again be connected more network devices. It
is a flexible approach as you can easily add network devices to this network by extending the
star network at each branch of the tree (Roy, J., 2020).

The reason we chose this topology is because tree topology is useful for organisations with
multiple departments or multi-floor team placements (Roy, J., 2020). Which in our case, the
Office Building has two floors and have several grouping segments i.e. staffroom, labs and
server room requiring multiple switches. If we were to choose the simple star topology
instead, there would be many bottlenecks and problems in the meantime affecting network
performance (Roy, J., 2020). Below is a comparison of tree and star topology to justify our
choices.

Tree Topology Star Topology

14
Features - Ideal if workstations are located - Every node has its own dedicated
in groups. connection to the hub.
- Used in Wide Area Network. - Hub acts as a repeater for data
flow.

Routing - Transmission propagates - All information passes through


throughout the medium and can central network connection.
be received by all other stations.

Cost - Costly because it is heavily - More expensive of the simple


cabled. topologies, usually cheaper than
hybrid network.

Advantages - Expansion of nodes is possible - High performance with few nodes


and easy. and low network traffic.
- Easily managed and maintained. - Hub can be upgraded easily.
- Error detection is easily done. - If a node fails, it does not affect
the rest of the network.

Disadvantages - Heavily cabled. - Very high installation cost and


- It is difficult to maintain in case very expensive to use.
of more nodes. - If the hub fails then the whole
- If the central hub fails, the entire network is stopped because all the
network fails. nodes depend on the hub.
- Performance is based on the hub
that is it depends on its capacity.

All in all, tree topology is highly reliable and fault-tolerant. Failure of one or more computers
will not affect the working of whole computer network. Moreover, computers can be easily
added by extending the star network connected to the main backbone cable (Roy, J., 2020).
This is very useful for the faculty when expansion happens. With the usage of switch or
intelligent hub, network performance will be really good (Roy, J., 2020). That is why we
decided to recommend and adopt the tree topology for our project.

15
5.1.2 Network Performance

Network performance management includes monitoring and optimization practices for key
network performance metrics such as application down time and packet loss. When problems
occur, the two logical outputs are increased network availability and minimized response
time. A holistic approach to managing network performance must consider all of the essential
categories through which problems may be manifested (VIAVI Solutions Inc., 2020).

One of the factors affecting network performance is the infrastructure. The overall network
infrastructure includes network hardware, such as routers, switches and cables, networking
software, including security and operating systems as well as network services such as IP
addressing and wireless protocols. From the infrastructure perspective, we need to
characterize the overall traffic and bandwidth patterns on the network. This network
performance measurement will provide insight into which flows are most congested over
time and could become potential problems. By identifying the over-capacity elements of the
infrastructure, we can get proactive corrections or upgrades that can minimize future
downtime rather than simply responding to any performance crisis that may arise (VIAVI
Solutions Inc., 2020).

The most important component in maintaining network performance is the implementation of


effective network performance measurement and oversight practices. If problems with
servers, routing, delivery or bandwidth can be detected in real time, expedient solutions and
preventative strategies are the logical byproducts (VIAVI Solutions Inc., 2020).

16
5.2 TAN GWO YIH (TP051104)

5.2.1 IP Addressing Justification (Building 1 - Office Building)

Network Address Used: 192.168.100.0


Subnet Mask Assigned: 255.255.255.224
Subnet Needed: 7 Subnets
Bits Borrowed: 3 Bits

Device Interface Network Address IP Address DefaultGateway

Router 1 S 0/0/0 192.168.100.0/25 192.168.100.1 N/A

G 0/0 192.168.100.32/25 192.168.100.33 N/A

G 0/1 192.168.100.64/26 192.168.100.65 N/A

G 0/2 192.168.100.96/26 192.168.100.97 N/A

PC1-PC23 FA0 192.168.100.32/25 192.168.100.34-56 192.168.100.33

PC24-PC47 FA0 192.168.100.64/26 192.168.100.66-89 192.168.100.65

PC48-PC61 FA0 192.168.100.96/26 192.168.100.98-111 192.168.100.97

Laptop1-Laptop9 192.168.100.96/26 192.168.100.112-12 192.168.100.97


0

Printer1 192.168.100.32/25 192.168.100.57 192.168.100.33

Server1 192.168.100.96/26 192.168.100.121 192.168.100.97

5.2.2 Network Reliability

The reliability of the network is the probabilistic factor that decides whether a network
remains functional when unexpectedly its components fail. (Yasamin, 2015) To improve the
reliability of our network, network maintenance must be done regularly. A few examples of
network maintenance are hardware/software configurations, configuration changes,

17
troubleshooting network problems, ensuring the security of the network and monitoring.
Another method to ensure the reliability of our network is to implement RAID.

RAID type RAID 0 RAID 1 RAID 5 RAID 6

Advantage Increased read/ the data need Reading data RAID 6 is more
write speed not be replaced, transactions is secure than
they just need to very fast (faster RAID 5. When
be copied to the than RAID1/0) two drives fail,
new drive when Even when the all data will still
drive fails drive fails, still be available,
have access to even if the
all the data failed drives are
replaced.

Disadvantage Is not-fault Total storage writing data Write speed


tolerance, one capacity is only transactions are 20% lower than
drive failure half the total a little slower. RAID 5.
will cause all drive capacity, Restoring data
data in the array since​ ​all data is takes a long
to be lost written twice time(around 1
day).
If another disk
is corrupted
during
restoration, data
is lost forever.

RAID 5 is the best option to be implemented in our project. This is because RAID 5 is the
best overall that provides fast reading speed and fault-tolerance. It is also the most ideal for
application and file servers that have a fixed amount of data drives.

18
5.3 CHAI HUI TONG (TP054680)

5.3.1 Topology Justification (Building 2 - Training Building)

Characteristic Tree Topology Bus Topology

Type of connection Connect to backbone Hierarchy Structure

Direction of data Single flow direction Multi flow direction

Cost Cheap Expensive

Complexity Simple Complex

Security Low security due to broadcast

According to the table above, tree topology is the final choice for this assignment. Tree
topology is a hybrid network topology that seen as star topology in physical view and bus
topology in logical view. Tree topology have been chosen among others due to its high
performance, flexibility and reliability. As shown above, data are transmitted on single
direction in bus network topology and multi direction in tree topology. The transmission
speed would decrease as the number of nodes increase when bus topology in used. Hence, it
is more suitable to use tree topology to avoid this problem as there are many devices in the
training building. Besides, the school management will have to increase computers or other
network devices in training building due to different circumstances, such as increment of
student or expansion of school. Tree topology is scalable, provides flexibility to add on and
reduce nodes easily. Tree topology is more reliable than other topology as if the backbone
damaged, the computer in the same star network still be able to connect. In this case, it
would not affect other classes or departments when one of the networks broke down hence
the school could maintain daily operation as usual. In conclusion, tree topology is more
suitable for training building among others.

19
5.3.2 Network Security

Network security is the practice of preventing and protecting against unauthorized intrusion
into corporate networks. (Fruhlinger, 2018) Without good security, the organization’s
network may be hacked easily and causes unimaginable consequences. To enhance security
aspects, the organization should carry out physical precautions first before going to a more
complex solution. Below are the security preventive measures that are recommended for this
assignment.

Preventive Measures Description

Closed-circuit -It can monitor the situation in building


Television (CCTV) -It acts as the evidence when stealing case happened

Security Lock -It limit the access to server room


-It prevent unauthorized access

Firewall -It block the admission of threats

Intrusion-detection -It can monitor and block the traffic from suspicious IP address
System (IDS) when anomaly detection

Virtual Private -It provides encryption to secure data while using VPN to transmit
Network (VPN) data

Antivirus Software -A software install in computer to ​identify and destroy the


computer virus

Encryption -Credential information of the center should be encrypted to


prevent leaked out

20
5.4 DERRIC CHONG WEI SEN (TP054652)

5.4.1 IP Addressing Justification (Building 2 - Training Building)

Network Address Used: 192.168.100.0


Subnet Mask Assigned: 255.255.255.224
Subnet Needed: 7 Subnets
Bits Borrowed: 3 Bits

Device Interface Network Address IP Address Default Gateway

Router 2 S 0/0/0 192.168.100.0/25 192.168.100.2 N/A

G 0/0 192.168.100.128/27 192.168.100.129 N/A

G 0/1 192.168.100.160/27 192.168.100.161 N/A

G 0/2 192.168.100.192/27 192.168.100.193 N/A

PC62-PC82 FA0 192.168.100.128/27 192.168.100.130-150 192.168.100.129

PC83-PC106 FA0 192.168.100.160/27 192.168.100.162-185 192.168.100.161

PC107-PC125 FA0 192.168.100.192/27 192.168.100.194-212 192.168.100.193

Laptop10-Laptop12 192.168.100.192/27 192.168.100.213-215 192.168.100.193

Printer2 192.168.100.128/27 192.168.100.151 192.168.100.129

21
5.4.2 Network Manageability

Network management maintains and organizes network components by identifying faults,


investigate and troubleshoot, managing configuration while making OS changes to fulfill the
requirements stated ​(Cfindia.net, 2020)​. The process done concerns the reliability, efficiency,
capacity and capabilities of data transfer channels ​(Techopedia.com, 2020)​. So, administration,
operation, maintenance and provisioning are measures taken to ensure the network
manageability as it monitors the software’s performance while addressing and fixing
problems then having timely repairs with configuration of network resources. It keeps track
of information about the programs, versions, and updates installed in network computers
when setting up the network connections for better tracking and managing of equipment.
Through network management, downtime of a network system could be reduced.

For our network management, the framework that will be used is FCAPS as it covers the
management and monitoring for fault, configuration, accounting, performance and security.

Fault Management Configuration Accounting Performance Security


Management Management Management Management

Fault recognition Database handling Activity recording Report generation Log accessing

Network recovery Network auditing Billing managing Data collection Data encryption

Downtime Network Resource Throughput NE access controlling


minimizing restoration distributing maximization

Network problem Network Service usage Performance NE function enabling


correction provisioning tracking analysis

Network state System Cost of operation Network Protection against


visualizing modification minimizing parameter tracking sabotage

Identifying of Storing Network user data Network Confidential securing


potential problem configuration data collection efficiency
monitoring

22
6.0 Conclusion
In conclusion, we have worked together to plan out the best network that we can come out
with that has optimized performance, reliability, security and manageability through selecting
the right network devices and cables for our network. We may not have chosen the best and
latest technology to be implemented for in our solution, but the solution that we have come
out with still comes close to the best, at a much cost efficient cost.

23
7.0 References
Amazon.com. (n.d.). [online] Available at:
https://www.amazon.com/Cisco-Ws-C2950-24-2950-Port-Switch/dp/B00007MDB2
[Accessed 22 Dec. 2019].
Amazon.com. (n.d.). [online] Available at:
https://www.amazon.com/Cisco-Catalyst-2960-24TT-Ethernet-Switch/dp/B0067F5URA
[Accessed 21 Dec. 2019].
Amazon.com. (n.d.). [online] Available at:
https://www.amazon.com/Cisco-CISCO2901-Integrated-Services-Router/dp/B0030E9EVE
[Accessed 21 Dec. 2019].
Amazon.com. (n.d.). [online] Available at:
https://www.amazon.com/Cisco-CISCO2911-K9-Integrated-Services/dp/B002ZCUCLS#cust
omerReviews [Accessed 22 Dec. 2019].
Bianco, D. (2019). ​10 ways to prevent computer security threats from insiders​. [online]
SearchSecurity. Available at:

https://searchsecurity.techtarget.com/feature/Ten-ways-to-prevent-insider-security-threats
[Accessed 24 Dec. 2019].

Cfindia.net. (n.d.). ​Roles and Functions of Network Management.​ [online] Available at:
http://cfindia.net/roles-and-functions-of-network-management.php [Accessed 21 Dec. 2019].

Cisco. (n.d.). ​Compare Models 2900 Series Integrated Services Routers​. [online] Available
at:
https://www.cisco.com/c/en/us/products/routers/2900-series-integrated-services-routers-isr/m
odels-comparison.html [Accessed 21 Dec. 2019].
Cnet.com. (2020). ​Cisco Catalyst 2960-24TT - switch - 24 ports - managed - rack-mountable
Series Specs & Prices.​ [online] Available at:
https://www.cnet.com/products/cisco-catalyst-2950-24-24-port-switch/ ​[Accessed 20 Dec.
2019].
Datatechprofessionals.com. (2020). ​Cat5e vs Cat6 vs Cat6a vs Cat7 - Which type of cable
should I use?​ [online] Available at:
https://www.datatechprofessionals.com/cabletypes.html​ [Accessed 20 Dec. 2019].

24
Dosal, E. (n.d.). ​What is a Firewall? The Different Firewall Types & Architectures.​ [online]
Compuquip.com. Available at:
https://www.compuquip.com/blog/the-different-types-of-firewall-architectures [Accessed 23
Dec. 2019].

Fruhlinger, J. (2018). ​What is network security? Definition, methods, jobs & salaries​.
[online] CSO Online. Available at:
https://www.csoonline.com/article/3285651/what-is-network-security-definition-methods-job
s-and-salaries.htm​l​ ​[Accessed 23 Dec. 2019].
Gamingcpus.com. (2020). ​Cat5 vs Cat6 vs Cat7, Everything About Ethernet Cables | Gaming
CPUs.​ [online] Available at:
https://gamingcpus.com/cat5-vs-cat6-vs-cat7-ethernet-cables ​[Accessed 20 Dec. 2019].

Learnpick.in. (n.d.). ​What are the similarities and dissimilarities between bus and tree
topologies? - Find 1 Answer & Solution | LearnPick Resources.​ [online] Available at:
https://www.learnpick.in/questions/details/6678/what-are-the-similarities-and-dissimilarities-
between-bus-an [Accessed 22 Dec. 2019].

Medium.com. (2020). ​Cat6 Vs. Cat7 Cable: Which Is Optimum for A New House​. [online]
Available at:
https://medium.com/@fsjoanna/cat6-vs-cat7-cable-which-is-optimum-for-a-new-house-a924
0408efe5 ​[Accessed 20 Dec. 2019].
Netwerkkabel.eu. (2018). ​What is the difference between Cat 6 and Cat 7? [online] Available
at:
https://www.netwerkkabel.eu/en/blog/what-is-the-difference-between-cat-6-and-cat-7
[Accessed 20 Dec. 2019].
Networklessons.com. (2020). Network Maintenance | NetworkLessons.com. [online]
Available at:
https://networklessons.com/cisco/ccnp-tshoot/network-maintenance ​[Accessed 22 Dec.
2019].

25
Perle.com. (n.d.). ​Using the FCAPS standards model to Managing Large-Scale Deployments​.
[online] Available at: https://www.perle.com/supportfiles/fcaps.shtml [Accessed 22 Dec.
2019].

Prepressure.com. (2020). RAID level 0, 1, 5, 6 and 10 | Advantage, disadvantage, use.


[online] Available at:
https://www.prepressure.com/library/technology/raid ​[Accessed 22 Dec. 2019].

Router-switch.com. (n.d.). ​WS-C2960-24TT-L Price & Datasheet - Cisco Catalyst


2960-24TT-L.​ [online] Available at:
https://www.router-switch.com/ws-c2960-24tt-l-p-429.html [Accessed 21 Dec. 2019].

Roy, J. (2020). ​What is Tree Topology Network? Definition | Advantages | Disadvantages.​


[online] Network Topology. Available at:
https://topologynetwork.com/what-is-tree-topology-network-definition-advantages-disadvant
ages/ [Accessed 20 Dec. 2019].

Scribd. (n.d.). ​Comparison Between Network Topologies | Network Topology | Networks.​


[online] Available at:
https://www.scribd.com/document/302259510/Comparison-Between-Network-Topologies
[Accessed 22 Dec. 2019].

SearchNetworking. (n.d.). ​What is FCAPS (fault-management, configuration, accounting,


performance, and security)? - Definition from WhatIs.com.​ [online] Available at:
https://searchnetworking.techtarget.com/definition/FCAPS [Accessed 24 Dec. 2019].
SearchNetworking. (n.d.). ​What is network management system? - Definition from
WhatIs.com.​ [online] Available at:
https://searchnetworking.techtarget.com/definition/network-management-system [Accessed
25 Dec. 2019].
Shekhar, A. (2018). ​What Is Tree Topology? Advantages And Disadvantages Of Tree
Topology​. [online] Fossbytes. Available at:
https://fossbytes.com/tree-topology-advantage-disadvantage/ ​[Accessed 22 Dec. 2019].

26
Studytonight.com. (2020). ​Types of Network Topology​. [online] Available at:
https://www.studytonight.com/computer-networks/network-topology-types [Accessed 20
Dec. 2019].
Teamkci.com. (n.d.). [online] Available at:
https://teamkci.com/wp-content/uploads/WS-C2950.pdf [Accessed 21 Dec. 2019].
Secureitstore.com. (n.d.). ​Cisco Catalyst 2960-24TT-L Switch | SecureITStore.com.​ [online]
Available at: https://www.secureitstore.com/C2960-24TT-L.asp [Accessed 22 Dec. 2019].
Techopedia.com. (n.d.). ​What is Fault Configuration Accounting Performance Security
(FCAPS)? - Definition from Techopedia.​ [online] Available at:
https://www.techopedia.com/definition/24512/fault-configuration-accounting-performance-se
curity-fcaps [Accessed 24 Dec. 2019].
Techopedia.com. (n.d.). ​What is Network Management? - Definition from Techopedia.​
[online] Available at: https://www.techopedia.com/definition/20974/network-management
[Accessed 23 Dec. 2019].
Tech, R. (n.d.). ​Cisco 2951 vs. 2921 vs. 2911 vs. Cisco 2901 – Router Switch Blog.​ [online]
Blog.router-switch.com. Available at:
https://blog.router-switch.com/2014/06/cisco-2951-vs-2921-vs-2911-vs-cisco-2901/
[Accessed 21 Dec. 2019].
the SNMP center. (n.d.). ​FCAPS functions supported in Network Management Software.​
[online] Available at: https://snmpcenter.com/fcaps-network-management/ [Accessed 25 Dec.
2019].
Viavisolutions.com. (2020). ​How to Measure Network Performance.​ [online] Available at:
https://www.viavisolutions.com/en-us/how-measure-network-performance [Accessed 21 Dec.
2019].

Webopedia.com. (n.d.). ​What is FCAPS? Webopedia Definition.​ [online] Available at:


https://www.webopedia.com/TERM/F/FCAPS.html [Accessed 22 Dec. 2019].

27
8.0 Appendices

Gantt Chart:

Work Breakdown Structure:

CLO3: Work in a team to propose a network design based on the given scenario
(PLO5: Social Skills, Team Skills & Responsibility)

Section 1 (Team) Introduction


-​ ​Objective / Scope / Limitations
-​ ​Assumptions (number of hosts, departments
etc.)

Floor Plan (Layout)


-​ ​Justification
-​ ​Network Devices

Section 1 Brennan
(Individual) Chiang Bang Tan Gwo Yih Chai Hui Tong Derric Chong
Chen Wei Sen

(Building 1) (Building 1) (Building 2) (Building 2)

Topology IP Topology IP Addressing


Justification Addressing Justification Justification
Justification

Network Network Network Network


Performance Reliability Security Manageability

CLO2: Follow instruction to design a local area network and segmenting a network using simulation tools
(PLO2: Practical Skills)

Cisco Packet Tracer Building 1 Building 2


(Demo - Section 1)

28
Meeting Minutes:

Meeting 1
Date: ​16 October 2019
Time:​ 1445-1545(Lab Class)
Via:​ Group discussion
Attendees:
1. Brennan Chiang Bang Chen
2. Chai Hui Tong
3. Derric Chong Wei Sen
4. Tan Gwo Yih
Agenda:
- To discuss gantt chart
Result:

Meeting 2
Date: ​16 October 2019
Time: ​1445-1545
Via: ​Group discussion
Attendees: 1. Brennan Chiang Bang Chen
2. Chai Hui Tong
3. Derric Chong Wei Sen
4. Tan Gwo Yih
Agenda:

29
- To allocate group work for introduction

Conclusion:
- Group work for introduction
Brennan Chiang Bang Chen:Objective
Chai Hui Tong:Assumption
Derric Chong Wei Sen:Scope
Tan Gwo Yih:Limitation

Meeting 3
Date:​23 October 2019
Time:​1445-1545
Via:​ Group discussion
Attendees:
1. Brennan Chiang Bang Chen
2. Chai Hui Tong
3. Derric Chong Wei Sen
4. Tan Gwo Yih
Agenda:
- To allocate work for floor plan (drawing)
- To discuss structure of building
Results:
- To discuss and allocate work for floor plan (drawing)
Brennan Chiang Bang Chen: Office Building Level 1
Chai Hui Tong: Training Building Level 1
Derric Chong Wei Sen: Training Building Level 2
Tan Gwo Yih: Office Building Level 2

Meeting 4
Date:​ 6 November 2019
Time:​1445-1545
Via:​Group discussion

30
Attendees:
1. Brennan Chiang Bang Chen
2. Chai Hui Tong
3. Derric Chong Wei Sen
4. Tan Gwo Yih
Agenda:
- To update floor plan
- To allocate work for floor plan
Results:
- To allocate work for floor plan
Brennan Chiang Bang Chen:Justification
Chai Hui Tong: Network Devices (Router)
Derric Chong Wei Sen: Network Devices (Switch)
Tan Gwo Yih: Network Devices (Cabling)

Meeting 5
Date:​ 13 November 2019
Time:​ 1445-1545
Via:​ Group discussion
Attendees:
1. Brennan Chiang Bang Chen
2. Chai Hui Tong
3. Derric Chong Wei Sen
4. Tan Gwo Yih
Agenda:
- To allocate group component (Network Diagram)
- To discuss network design
Result:
- To allocate group component (Network Diagram)
Brennan Chiang Bang Chen: Side View
Chai Hui Tong: Aerial View
Derric Chong Wei Sen: Network Design (Packet Tracer)

31
Tan Gwo Yih: Aerial View

Meeting 6
Date: ​20 November 2019
Time: ​1445-1545
Via:​ Group discussion
Attendees:
1. Brennan Chiang Bang Chen
2. Chai Hui Tong
3. Derric Chong Wei Sen
4. Tan Gwo Yih
Agenda:
- To allocate individual work
Result:
- To allocate individual work
Building 1:
Brennan Chiang Bang Chen: Topology Justification
Tan Gwo Yih: IP Addressing Justification
Building 2:
Chai Hui Tong:Topology Justification
Derric Chong Wei Sen:IP Addressing

Meeting 7
Date: 18 December 2019
Time: ​1445-1545
Via: ​Group discussion
Attendees:
1. Brennan Chiang Bang Chen
2. Chai Hui Tong
3. Derric Chong Wei Sen
4. Tan Gwo Yih
Agenda:

32
- To allocate individual work
Result:
- To allocate individual work
Brennan Chiang Bang Chen: Network Performance
Chai Hui Tong: Network Security
Derric Chong Wei Sen: Network Manageability
Tan Gwo Yih: Network Reliability

Meeting 8:
Date:​ 8 January 2020
Time: ​1445-1545
Via:​ Group discussion
Agenda:
- To compile and finalize

33
Peer Evaluation Form for Group Work:

Your name: ​Brennan Chiang Bang Chen

TP NO: ​TP050473

Write the name of each of your group members in a separate column. For each person,
indicate the extent to which you agree with the statement on the left, using a scale of 1-4
(1=strongly disagree; 2=disagree; 3=agree; 4=strongly agree). Total the numbers in each
column.

Evaluation Criteria Student Name: Student Name: Student Name:


Chai Hui Tong Derric Chong Wei Tan Gwo Yih
TP NO: ​TP054680 Sen TP NO: T​ P051104
TP NO: ​TP054652

Attends group meetings regularly 4 4 4


on time.

Contributes meaningful to the 4 4 4


group discussions.

Prepares a quality of work and 4 4 4


completes on time.

Demonstrates a cooperative and 4 4 4


supportive attitude.

Contributes significantly to the 4 4 4


success of the project.

TOTALS 20 20 20

34
Peer Evaluation Form for Group Work:

Your name: ​Chai Hui Tong

TP NO: ​TP054680

Write the name of each of your group members in a separate column. For each person,
indicate the extent to which you agree with the statement on the left, using a scale of 1-4
(1=strongly disagree; 2=disagree; 3=agree; 4=strongly agree). Total the numbers in each
column.

Evaluation Criteria Student Name: Student Name: Student Name:


Brennan Chiang Derric Chong Wei Tan Gwo Yih
Bang Chen Sen TP NO: T​ P051104
TP NO: ​TP050473 TP NO: ​TP054652

Attends group meetings regularly 4 4 4


on time.

Contributes meaningful to the 4 4 4


group discussions.

Prepares a quality of work and 4 4 4


completes on time.

Demonstrates a cooperative and 4 4 4


supportive attitude.

Contributes significantly to the 4 4 4


success of the project.

TOTALS 20 20 20

35
Peer Evaluation Form for Group Work:

Your name: ​Derric Chong Wei Sen

TP NO: ​TP054652

Write the name of each of your group members in a separate column. For each person,
indicate the extent to which you agree with the statement on the left, using a scale of 1-4
(1=strongly disagree; 2=disagree; 3=agree; 4=strongly agree). Total the numbers in each
column.

Evaluation Criteria Student Name: Student Name: Student Name:


Brennan Chiang Chai Hui Tong Tan Gwo Yih
Bang Chen TP NO: T​ P054680 TP NO: ​TP051104
TP NO: ​TP050473

Attends group meetings regularly 4 4 4


on time.

Contributes meaningful to the 4 4 4


group discussions.

Prepares a quality of work and 4 4 4


completes on time.

Demonstrates a cooperative and 4 4 4


supportive attitude.

Contributes significantly to the 4 4 4


success of the project.

TOTALS 20 20 20

36
Peer Evaluation Form for Group Work:

Your name: ​Tan Gwo Yih

TP NO: ​TP051104

Write the name of each of your group members in a separate column. For each person,
indicate the extent to which you agree with the statement on the left, using a scale of 1-4
(1=strongly disagree; 2=disagree; 3=agree; 4=strongly agree). Total the numbers in each
column.

Evaluation Criteria Student Name: Student Name: Student Name:


Brennan Chiang Chai Hui Tong Derric Chong Wei
Bang Chen TP NO: T​ P054680 Sen
TP NO: ​TP050473 TP NO: ​TP054652

Attends group meetings regularly 4 4 4


on time.

Contributes meaningful to the 4 4 4


group discussions.

Prepares a quality of work and 4 4 4


completes on time.

Demonstrates a cooperative and 4 4 4


supportive attitude.

Contributes significantly to the 4 4 4


success of the project.

TOTALS 20 20 20

37

You might also like