Академический Документы
Профессиональный Документы
Культура Документы
Introduction ............................................................................................................................................. 3
Benefits of having networks ................................................................................................................... 3
List of Software and Hardware ............................................................................................................... 4
Hardware Requirement: ...................................................................................................................... 4
Software requirement: ......................................................................................................................... 5
Costing ................................................................................................................................................ 5
Requirements Collection:........................................................................................................................ 6
Development Methodology&cabling diagram........................................................................................ 8
Implementation of Network .................................................................................................................... 9
Configuration ...................................................................................................................................... 9
Simulation ......................................................................................................................................... 11
Future improvements &Maintenance Plan ........................................................................................... 14
Conclusion ............................................................................................................................................ 16
References: ........................................................................................................................................... 17
Introduction
The idea of building a networked environment within the organization is not new. A lot of
enterprise corporations offer different kinds of tools, and hardware to design the network and
to make it operational and functional. Computer Networks (CN) can purely facilitate multinodal transmitting and receiving data with one another regardless of considering their
locality. Online bank transactions, internet and video or voice conversations are some
examples of CN (Jing 2010) which have become essential part of our lives. Entire globe is
revolving around CN. From small businesses to medium scale or even larger enterprises,
people are investing gigantic amount to make it more convenient and advanced. It must be
developed and programmed carefully to obtain 99.99% of communicational success (Bera et
al. 2010). Other objective of CN is its security from the internal or external intimidations.
Lack of security may harm the networks, resulted in facing huge amount of economical and
data loss.
elaborated in (Kuo et al. 2009). Several advantages that can be seen by having a networked
environment will be discussed below:
File organization: Tracking down documents from piles of files in the office is a chaos. The
most useful way of its storage is in central shared space where workers could easily and
quickly obtain necessary data information (Raptis et al. 2009).
Mobility: Smart phones and notebooks have made office easily accessible but there is a need
to secure the business contacts, files or personal details as it makes us connected to the
internet all the time (Thorenoor 2010).
Association: Server-based networks could easily associate clients with the workers so that
they can communicate together across any distance and even print their documents by using
remote printer. It helps in getting a job done in less span of time (Raptis et al. 2009).
Safety and Security: Administrator of a server-based network could easily investigate and
guard the private files from person to person in order to prevent it from external threats
(Mbarushimana&Shahrabi 2008).
Performance: Well-equipped server with efficient data storage capacity and easy file access
helps to simply calculate or print the job. Innovations like Gigabit Ethernet or multicore
processors are helping globe to perform well in technology world (Kosta et al. 2010).
10 x Main PCs
1 x Backup Server
1 x Printer
1 x Internet connection
1 x Back up device (Network Attached Storage)
3
Software requirement:
Product
Estimated Cost
10 x PCs
1 x Printer
1 x Internet connection
1 x Back-up server
1 x Broadband Wireless Router
1 x 2960-24TT Network Switch
15 x 100 meter Patch Cables
11 x Operating system for each PC
11 x Antivirus for each system
10 x Word processing utility for application and letters
10 x Spread sheet utility for worksheets
10 x Sales and purchase system for shop
10 x Inventory control system for stock room
Total
1534.99
Requirements Collection:
It is very significant to follow the appropriate life cycle development model to keep this
project on the right track and inside resources. Since our investigation involves a liner
method we have taken the linear model i.e. analysed the system first, then offered the design
and afterwards implemented the system and keep the maintenance afterwards. Life
development model is being showed in figure 2.
We have briefly discussed the development plan for our project. For this reason we have
discussed proposed network with Mr Roberts via email so that he can provide with some
feedback and then we have incorporated all those recommendation in project. Initially
network plan was to divide network into two small networks as shown in figure 3. This
network contains more internetworking devices which increases the cost. But Mr. Roberts
wants cost effective network. So the network is break to a single main network.
Implementation of Network
The proposed network is properly configured first according to the requirements. Further, it is
implemented and simulation has been development.
Configuration
TCP/IP protocol is used for communication among different node within the network. For
this reason each node will be given a specific unique IP address which act as name for the
device to be distinguish among other devices. Using the unique IP address of a specific node
other devices can communicate with it. Class C address has been used as we dont need lot of
network and number of computer is limited. 192.168.0.0 Network address scheme has been
used. Host can have address from 192.168.0.1 to 192.168.0.254 as not sub netting is required.
It is easier to configure the network if IP addresses have been chosen in ranges for devices
according to their location, The IP address has been allocated using following ranges:
a)
b)
c)
d)
After configuration, the device and the network location is protected for that device. This
allows identifying the location of the device by the administrator. The online status of a
specific device can be checked by sending ping packed to a specific IP address using ping
command.E.g. C:> Ping 192.168.0.101
Device
Configuration Information
1 x Internet Port
BT ADSL
192.168.0.1
1 x Back-up server
192.168.0.200
1 x Desktop Pc
192.168.1.210
6 x Desktop Pcs
192.168.0.100
192.168.0.101
192.168.0.102
192.168.0.103
192.168.0.104
192.168.0.105
1 x Printer
192.168.0.125
192.168.0.50
192.168.0.51
192.168.0.75
192.168.0.76
2 x Shop Pcs
1 x Laptop
192.168.0.27
Following is the feedback from Mr Robert which has been incorporated in the report
afterwards:
Please use DHCP to assign IP Address to the PCs in the Shop, Office, and Stock room.
Please use wireless encryption.
How is the firewall configured? Perhaps you could remove that from your design and
suggest it as a possible future improvement in requirement h in your assignment.
DHCP option has been enabled on our Backup Server as per the feedback. We have given a
pool Class C address to DHCP serveras shown in figure 5.
The server will allocate address randomly to all the system in office, shop and stock room
rather than statically as shown in figure 6 and this DHCP address assignment is successfully
incorporated after getting feedback from Mr. Roberts.
Simulation
Cisco packet tracer has been used as model software in this project .Packet tracer also permits
to organize all the devices. Figure 7 shows how to arrange an end device. Various
possibilities can be utilised to construct a network device according to the project.
10
An initial design was conscripted by using packet tracer. Figure 8 describes the topology of
one of the department where network was sketched. Figure shows that each 11 stable nodes
were linked to an Ethernet switch in the department.
11
With advancements in technology the use of wireless networking gave many benefits to
wired networks. The aim has been to provide wireless access to the laptops. Wireless access
point was organized in the network providing wireless access to operators. Figure 9 shows its
design feature.
Wireless is being protected by WPA2 Personal type of security having a pass key as
P@a$$word as shown in figure 10.
12
Once the whole network is set up and feedback from Mr Roberts has been received on
prototype the final network has been implemented and traffic has been sent from host to
destination which received successfully as shown in following figure .
13
14
15
16
17
18
19
Computer networks needs regular maintenance just like other type of machines to run
smoothly. Following are few maintenance guidelines to be reviewed regularly:
Conclusion
In this project, we have reflected a case-study of small office involving maximum of 15
computer system with a combination of wired and wireless nodes. The network diagram has
been designed and established, moreover distinct portions of the network e.g. wired users are
presented as well. Complete design of the project has been defined and provided a security
network to the office in order to prevent it from external threats.
20
References:
Balasubramanian, M. et al., 2005. Evidence Combination for Traffic Adaptive Routing. 18th
International Conference on Systems Engineering (ICSEng05), pp.355362. Available at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1562877.
Bera, P. et al., 2010. A Query based Formal Security Analysis Framework for Enterprise
LAN. 2010 10th IEEE International Conference on Computer and Information Technology,
(Cit),
pp.407414.
Available
at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5578175
[Accessed
December 10, 2012].
He, G. & Li, L., 2009. Design and Realize Communication System Based on LAN of C/S
Architecture. 2009 WRI World Congress on Software Engineering, pp.7881. Available at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5319365
[Accessed
December 10, 2012].
Jing, L., 2010. The Practice and Defense of LAN Monitor. 2010 International Forum on
Information
Technology
and
Applications,
pp.8082.
Available
at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5635188
[Accessed
December 10, 2012].
Kosta, Y.., Dalal, U.D. & Jha, R.K., 2010. Security Comparison of Wired and Wireless
Network with Firewall and Virtual Private Network (VPN). 2010 International Conference
on Recent Trends in Information, Telecommunication and Computing, pp.281283. Available
at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5460559 [Accessed
December 13, 2012].
Kuo, C., Pang, A. & Chan, S., 2009. Dynamic Routing with Security Considerations. IEEE
Transactions on Parallel and Distributed Systems, 20(1), pp.4858. Available at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4522540.
Mbarushimana, C. & Shahrabi, A., 2008. TCP Enhancement in IEEE 802.11e Wireless
Networks. 2008 14th IEEE International Conference on Parallel and Distributed Systems,
pp.407414.
Available
at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4724346
[Accessed
December 13, 2012].
OPNET, A. and N.P. with, No Title. Available at: http://www.opnet.com.
Raptis, P. et al., 2009. Voice and Data Traffic Analysis in IEEE 802.11 DCF Infrastructure
WLANs. 2009 Second International Conference on Advances in Mesh Networks, pp.3742.
Available
at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5223003
[Accessed December 13, 2012].
21
Riley, G.F., 2004. Simulating Realistic Packet Routing Without Routing Protocols .
Riley, G.F. & Road, N., 2006. No Title. , (Riley 2003), pp.21542161.
Systems,
C.P.T.-C.,
No
Title.
Available
at:
/web/learning/netacad/course_catalog/PacketTracer.html .
http://www.cisco.com/web/
22