Вы находитесь на странице: 1из 22

TABLE OF CONTENTS

Introduction ............................................................................................................................................. 3
Benefits of having networks ................................................................................................................... 3
List of Software and Hardware ............................................................................................................... 4
Hardware Requirement: ...................................................................................................................... 4
Software requirement: ......................................................................................................................... 5
Costing ................................................................................................................................................ 5
Requirements Collection:........................................................................................................................ 6
Development Methodology&cabling diagram........................................................................................ 8
Implementation of Network .................................................................................................................... 9
Configuration ...................................................................................................................................... 9
Simulation ......................................................................................................................................... 11
Future improvements &Maintenance Plan ........................................................................................... 14
Conclusion ............................................................................................................................................ 16
References: ........................................................................................................................................... 17

Introduction
The idea of building a networked environment within the organization is not new. A lot of
enterprise corporations offer different kinds of tools, and hardware to design the network and
to make it operational and functional. Computer Networks (CN) can purely facilitate multinodal transmitting and receiving data with one another regardless of considering their
locality. Online bank transactions, internet and video or voice conversations are some
examples of CN (Jing 2010) which have become essential part of our lives. Entire globe is
revolving around CN. From small businesses to medium scale or even larger enterprises,
people are investing gigantic amount to make it more convenient and advanced. It must be
developed and programmed carefully to obtain 99.99% of communicational success (Bera et
al. 2010). Other objective of CN is its security from the internal or external intimidations.
Lack of security may harm the networks, resulted in facing huge amount of economical and
data loss.

Benefits of having networks


Efficient network is the crucial constraint in computer network, which eases administrator of
network to keep network run smoothly. (He & Li 2009) has offered affective explanation for
switched network monitoring and management in footings of LAN monitoring of modern nonswitched networks and affective approaches have been suggested. A client/server linkage
design for communication is presented by (Bera et al. 2010) which offer LAN users the
convenience and safety to interconnect with each other in actual time. A connection is
established by client on a port known; the server receives the connection request and after the
confirming the connection establishment both server and client perform as peer nodes (Uchida
et al. 2006). Currently there are restrictions in wireless/wired networks that appeal formal
policy for security configurations. An official security analysis framework for LAN has been

elaborated in (Kuo et al. 2009). Several advantages that can be seen by having a networked
environment will be discussed below:
File organization: Tracking down documents from piles of files in the office is a chaos. The
most useful way of its storage is in central shared space where workers could easily and
quickly obtain necessary data information (Raptis et al. 2009).
Mobility: Smart phones and notebooks have made office easily accessible but there is a need
to secure the business contacts, files or personal details as it makes us connected to the
internet all the time (Thorenoor 2010).
Association: Server-based networks could easily associate clients with the workers so that
they can communicate together across any distance and even print their documents by using
remote printer. It helps in getting a job done in less span of time (Raptis et al. 2009).
Safety and Security: Administrator of a server-based network could easily investigate and
guard the private files from person to person in order to prevent it from external threats
(Mbarushimana&Shahrabi 2008).
Performance: Well-equipped server with efficient data storage capacity and easy file access
helps to simply calculate or print the job. Innovations like Gigabit Ethernet or multicore
processors are helping globe to perform well in technology world (Kosta et al. 2010).

List of Software and Hardware


The detailed structure of the design of security network will be described later in the report.
The aim is to (a) Design and validate a computer network comprising of 15 wires and
wireless nodes;(b) Introducing obligatory security policy for network to personalise data
information for secured and smooth business.We will use Microsoft Visio diagrams and
packet tracer to elaborate our network design model. Afterward the design will be deployed
and proposed network will be simulated using packet tracer using cisco utilities.
Hardware Requirement:

Following hardware is required for business of Mr. Roberts:

10 x Main PCs
1 x Backup Server
1 x Printer
1 x Internet connection
1 x Back up device (Network Attached Storage)
3

1 x Broadband Wireless Router


1 x 2960-24TT Network Switch
15 x 100 meter Patch Cables

Software requirement:

Following software's are required for business of Mr. Roberts


Software required for a small business includes:
Operating system for each PC
Antivirus for each system
Word processing utility for application and letters
Spread sheet utility for worksheets
Sales and purchase system for shop
Inventory control system for stock room
Costing

Product

Estimated Cost

10 x PCs
1 x Printer
1 x Internet connection
1 x Back-up server
1 x Broadband Wireless Router
1 x 2960-24TT Network Switch
15 x 100 meter Patch Cables
11 x Operating system for each PC
11 x Antivirus for each system
10 x Word processing utility for application and letters
10 x Spread sheet utility for worksheets
10 x Sales and purchase system for shop
10 x Inventory control system for stock room

700 (70 each)


40
BT ADSL
90
Free (Provided by BT)
99.99
75 (5 each)
275 (25 each)
55 (5 each)
60 (6 each)
60 (6 each)
40 (4 each)
40 (4 each)

Total

1534.99

The implementation of a system unavoidablyneeds a computer simulation compendium that


is proficient to mimic the real events in a real-life situation. Simulation is broadly of two
kinds: i.e., computer and analytical. A general classification of simulation is elaborated in
figure 1.

Figure 1 Simulation Modelling classification (Systems n.d., OPNET n.d.)

Requirements Collection:
It is very significant to follow the appropriate life cycle development model to keep this
project on the right track and inside resources. Since our investigation involves a liner
method we have taken the linear model i.e. analysed the system first, then offered the design
and afterwards implemented the system and keep the maintenance afterwards. Life
development model is being showed in figure 2.

Figure 2 Life Cycle Development Model

We have briefly discussed the development plan for our project. For this reason we have
discussed proposed network with Mr Roberts via email so that he can provide with some
feedback and then we have incorporated all those recommendation in project. Initially
network plan was to divide network into two small networks as shown in figure 3. This
network contains more internetworking devices which increases the cost. But Mr. Roberts
wants cost effective network. So the network is break to a single main network.

Figure 3: Initial network design

Development Methodology cabling diagram


It is very significant to observe performance of the network. A lot of simulation techniques
and tools are available to analyse behaviour of network. Simulation is most important way for
analysis of network performance. Cisco Packet Tracer (Systems n.d.)has been used to design
this project. It is one of the best simulation tools which deliver a true scenario of network in
real life implementation. It provides many selections for router and switch models. It also
stretches the liberty to connect multiple typesnetwork peripheral over physical links. A
detailed cabling diagram is been elaborated in figure 4.

Figure 4 Block Diagram of Wired Network

Implementation of Network
The proposed network is properly configured first according to the requirements. Further, it is
implemented and simulation has been development.
Configuration

TCP/IP protocol is used for communication among different node within the network. For
this reason each node will be given a specific unique IP address which act as name for the
device to be distinguish among other devices. Using the unique IP address of a specific node
other devices can communicate with it. Class C address has been used as we dont need lot of
network and number of computer is limited. 192.168.0.0 Network address scheme has been
used. Host can have address from 192.168.0.1 to 192.168.0.254 as not sub netting is required.
It is easier to configure the network if IP addresses have been chosen in ranges for devices
according to their location, The IP address has been allocated using following ranges:
a)
b)
c)
d)

100 125for the office room,


50-60 for the stock room,
70 -80 for the shop area
25 -50 for the wireless devices.

After configuration, the device and the network location is protected for that device. This
allows identifying the location of the device by the administrator. The online status of a
specific device can be checked by sending ping packed to a specific IP address using ping
command.E.g. C:> Ping 192.168.0.101
Device

Configuration Information

1 x Internet Port

BT ADSL

1 x Broadband Wireless Router

192.168.0.1

1 x Back-up server

192.168.0.200

1 x Desktop Pc

192.168.1.210

6 x Desktop Pcs

192.168.0.100
192.168.0.101
192.168.0.102
192.168.0.103
192.168.0.104
192.168.0.105

1 x Printer

192.168.0.125

2 x Stock room Pcs

192.168.0.50
192.168.0.51
192.168.0.75
192.168.0.76

2 x Shop Pcs
1 x Laptop

192.168.0.27

Following is the feedback from Mr Robert which has been incorporated in the report
afterwards:

Please use DHCP to assign IP Address to the PCs in the Shop, Office, and Stock room.
Please use wireless encryption.

Please show the internet working on your network simulation.

How is the firewall configured? Perhaps you could remove that from your design and
suggest it as a possible future improvement in requirement h in your assignment.

DHCP option has been enabled on our Backup Server as per the feedback. We have given a
pool Class C address to DHCP serveras shown in figure 5.

Figure 5 DHCP Sever pool

The server will allocate address randomly to all the system in office, shop and stock room
rather than statically as shown in figure 6 and this DHCP address assignment is successfully
incorporated after getting feedback from Mr. Roberts.

Figure 6 DHCP enabled on clients

Simulation

Cisco packet tracer has been used as model software in this project .Packet tracer also permits
to organize all the devices. Figure 7 shows how to arrange an end device. Various
possibilities can be utilised to construct a network device according to the project.

10

Figure 7 Configuration dialogue of an End Device

An initial design was conscripted by using packet tracer. Figure 8 describes the topology of
one of the department where network was sketched. Figure shows that each 11 stable nodes
were linked to an Ethernet switch in the department.

11

Figure 8 Wired users

With advancements in technology the use of wireless networking gave many benefits to
wired networks. The aim has been to provide wireless access to the laptops. Wireless access
point was organized in the network providing wireless access to operators. Figure 9 shows its
design feature.

Figure 9 Wireless user

Wireless is being protected by WPA2 Personal type of security having a pass key as
P@a$$word as shown in figure 10.

12

Figure 7 Wireless Security

Once the whole network is set up and feedback from Mr Roberts has been received on
prototype the final network has been implemented and traffic has been sent from host to
destination which received successfully as shown in following figure .

13

14

15

16

17

Successful Packet Transmissions

18

A glance of final network could be seen in Figure 12.

Figure 8 Final Operational Network

Future improvements &Maintenance Plan


A firewall could be installed to prevent any opening ports and all inbound attacks on the
system to give network an optimum security as shown in figure 13.

Figure 9 Future Network

19

Computer networks needs regular maintenance just like other type of machines to run
smoothly. Following are few maintenance guidelines to be reviewed regularly:

System errors logs for potential problems


Service pack for updates and hot fix history of installation
Storage space of disk and its health reports
System backup and recovery in case of disaster status
Emergency repair disks updating
Testing of backup media
Antivirus Protection status
Scan history for virus alerts
Exemption and exclusions list for possible issues
Planned scan of system
Scheduled updates should be performed
Document network devices (hubs/switches/routers)
Review device configuration
Review firewall configuration

Conclusion
In this project, we have reflected a case-study of small office involving maximum of 15
computer system with a combination of wired and wireless nodes. The network diagram has
been designed and established, moreover distinct portions of the network e.g. wired users are
presented as well. Complete design of the project has been defined and provided a security
network to the office in order to prevent it from external threats.

20

References:
Balasubramanian, M. et al., 2005. Evidence Combination for Traffic Adaptive Routing. 18th
International Conference on Systems Engineering (ICSEng05), pp.355362. Available at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1562877.
Bera, P. et al., 2010. A Query based Formal Security Analysis Framework for Enterprise
LAN. 2010 10th IEEE International Conference on Computer and Information Technology,
(Cit),
pp.407414.
Available
at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5578175
[Accessed
December 10, 2012].
He, G. & Li, L., 2009. Design and Realize Communication System Based on LAN of C/S
Architecture. 2009 WRI World Congress on Software Engineering, pp.7881. Available at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5319365
[Accessed
December 10, 2012].
Jing, L., 2010. The Practice and Defense of LAN Monitor. 2010 International Forum on
Information
Technology
and
Applications,
pp.8082.
Available
at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5635188
[Accessed
December 10, 2012].
Kosta, Y.., Dalal, U.D. & Jha, R.K., 2010. Security Comparison of Wired and Wireless
Network with Firewall and Virtual Private Network (VPN). 2010 International Conference
on Recent Trends in Information, Telecommunication and Computing, pp.281283. Available
at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5460559 [Accessed
December 13, 2012].
Kuo, C., Pang, A. & Chan, S., 2009. Dynamic Routing with Security Considerations. IEEE
Transactions on Parallel and Distributed Systems, 20(1), pp.4858. Available at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4522540.
Mbarushimana, C. & Shahrabi, A., 2008. TCP Enhancement in IEEE 802.11e Wireless
Networks. 2008 14th IEEE International Conference on Parallel and Distributed Systems,
pp.407414.
Available
at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4724346
[Accessed
December 13, 2012].
OPNET, A. and N.P. with, No Title. Available at: http://www.opnet.com.
Raptis, P. et al., 2009. Voice and Data Traffic Analysis in IEEE 802.11 DCF Infrastructure
WLANs. 2009 Second International Conference on Advances in Mesh Networks, pp.3742.
Available
at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5223003
[Accessed December 13, 2012].

21

Riley, G.F., 2004. Simulating Realistic Packet Routing Without Routing Protocols .
Riley, G.F. & Road, N., 2006. No Title. , (Riley 2003), pp.21542161.
Systems,
C.P.T.-C.,
No
Title.
Available
at:
/web/learning/netacad/course_catalog/PacketTracer.html .

http://www.cisco.com/web/

Thorenoor, S.G., 2010. Dynamic Routing Protocol Implementation Decision between


EIGRP, OSPF and RIP Based on Technical Background Using OPNET Modeler. 2010
Second International Conference on Computer and Network Technology, pp.191195.
Available
at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5474509
[Accessed December 13, 2012].
Uchida, N., Hashimoto, K. & Shibata, Y., 2006. QoS Control for Continuous Media over
Heterogeneous Environment by Wired and Wireless Network. 7th International Conference
on
Mobile
Data
Management
(MDM06),
pp.118118.
Available
at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1630654.

22

Вам также может понравиться