University of Technology, Malaysia
Faculty of Engineering, School of Computing
Semester 1 2021/2022
SECR1213 – 04
Network Communication
LAB2: Task 1 & Task 2
Lecturer: Dr. Firoz Bin Yusuf Patel Dawoodi
Name Matrics No.
Nur Izra Zulaika Binti Zull Kiffly B20EC3016
Nur Alisa Maisara Binti Zanuar B20EC3014
Aishah Afina Binti Abd Aziz B20EC3001
Suvimon A/p Sam Khan B20EC3021
Table of Contents
1.0 Task 1: Project Setup ................................................................................................. 1
1.1 Floor Plan............................................................................................................. 1
2.0 Task 2: Initial Design – Preliminary Analysis ............................................................ 2
2.1 List of question to ask the user. .............................................................................. 2
3.0 Feasibility Study .......................................................................................................... 6
4.0 References ................................................................................................................... 7
5.0 Task 1 And Task 2 Minute Meeting............................................................................ 8
6.0 Photo of Meeting ......................................................................................................... 9
1.0 TASK 1: PROJECT SETUP
1.1 Floor Plan
Figure 1: Ground Floor.
Figure 2: First Floor.
1
2.0 TASK 2: INITIAL DESIGN – PRELIMINARY ANALYSIS
2.1 List of question to ask the user.
1. Which of Internet Service Provider (ISP) is the best for the building?
TM Unifi. This is because it has download speeds up to 30 Mbps to 800Mbps
and 10Mbps to a speed of 200Mbps to upload. So, there will be no problem to
access the internet.
2. For every workstation, what is the standard software needed?
Browsing purpose
Google chrome
Mozilla Firefox
Documentation purpose
Microsoft Office 2019 – Excel, Powerpoint and Words
For editing and reading PDF
Adobe Acrobat DC Pro
3. To construct network infrastructure, what devices are needed?
Routers – router receive and sends data on computer networks, connect multiple
IP networks
Switches – to receive information from any source connected and send the
information to the appropriate destination.
Servers – to access, hold and transfer all files and data from other computer
machine over the computer networks
4. What is the minimum standard specification hardware that is used in every
lab?
Operating System: Windows 10 x64
Processor: Intel Core i5-11500 Processor (12M Cache, up to 4.60 GHz)
Graphics: Nvidia GeForce GTX 1050 Ti Twin X2
System Memory: 16GB RAM
Storage: 128GB Hard Drive Space
Network Adapter: 802.11ac 2.4/5 GHz wireless adapter
5. What type of antivirus that you want us to install on each PC
2
Figure 3 : Bitdefender antivirus
Minimum requirement is Windows 8 and above
Extensive privacy protection, including firewall, webcams & microphones
Bitdefender’s standard protection suite, against adware, malware, web attacks
& ransomware
Complete and real-time data protection
Web attack prevention
Anti-phishing
Anti-fraud
6. What are the course of actions that you will implement to withstand against
cyber security attacks
Set up a firewall to protect from all incoming and outgoing traffic.
Encrypt important information for user’s usernames and password and set to
limited access.
Making sure the software had been updated. Updates will fix security flaws and
important upgrade for recent viruses and attacks
7. What is the minimum network uptime required for the network to be reliable
in this system?
LANs and WANs are functioning at 99.99% uptime with 0.01% error rate which
is 43 minutes and 50 seconds of downtime. Measured downtime includes times
where the network system is down, unplanned failure or the time it takes for the
system to recover.
3
8. What type of physical media do you want to use for network plan?
We will choose Ethernet for wired since the speed of an Ethernet connection is
substantially faster than that of a wireless connection. It also has a greater degree
of security since it can regulate who uses the network and prevent security
breaches. Because there are no radio frequency disruptions, Ethernet
connections are very reliable.
Multiple devices may share files and other resources through a wireless
network, allowing them to enjoy the same internet connection from afar. It will
also let mobile devices such as laptops, tablets and phones to roam freely inside
the network region while maintaining internet and network connectivity.
9. Is the transaction or activities being reported?
Figure 4: DataDog Modern Monitoring & Security
Yes, the DataDog analytics application would be deployed to guarantee that the
data of people attempting to access is visible and transparent.
10. How much bandwidth is required for conference room?
The effective speed for video conferencing in the room is 10Mbps for
downloading and 3Mbps for uploading.
The maximum bandwidth for sending and receiving video are based on the
following:
- High-definition video: sending 3.0Mbps, receiving 2.5Mbps
- High-quality video: sending 1.5Mbps, receiving 1.0Mbps
- Standard-quality video: sending 0.5Mbps, receiving 0.5Mbps
4
11. What is load variation estimation to avoid network congestion?
Depending on the traffic, the average necessary throughput on any LANs and
WANs will vary. During peak hour, there will be more traffic and the average
LAN throughput will be roughly 9.6Mbps while the average WAN throughput
will be 5.8Mbps. Any other time of day, including weekends and public
holidays, will have a throughput of just 0.4Mbps for LAN and 0.06Mbps for
WAN.
12. What type of servers that will be used together in the lab?
File servers – All files may be simply assessed from a single spot. It also allows
you to restrict assess so that your data does not fall into the wrong hands.
Web servers – It’s necessary that your web server runs smoothly so that visitors
may access site content as quickly as possible.
13. Type of network protocol that you wish to use in the network plan.
Transmission Control Protocol (TCP) is used because it necessitates the
establishment of a link between applications prior to data transmission. TCP
offers substantial error checking via flow control and data acknowledgement.
TCP guarantees data packet sequencing, ensuring that data packets arrive in the
correct sequence at the receiving end. TCP allows for the retransmission of lost
data packets.
14. What type of network architecture would be acceptable for the building’s
layout?
Each lab may have 30 devices linked by cables. An entry-level server would
allow for shared file storage and the secure backup of vital information.
15. Type of network topology that you want to use for network plan.
The star network is one of the most frequent and best types of computer network
topologies because it improves efficiency by limiting data packets from
travelling through an excessive number of nodes. Despite the fact that this
architecture experts a significant burden on the central hub, with sufficient
capacity the hub can withstand extremely high use by one device without
harming other devices. The connection that links each device to the hub is
naturally isolating. The isolation also protects the network from being harmed
by non-centralized failures. Because the central hub is bottleneck, expanding its
capacity or connecting more devices to it simply expands the network’s size.
5
It’s simple to spot flaws and eliminate sections. When attaching or
disconnecting devices, there are no network interruptions.
3.0 Feasibility Study
In the new era, a network infrastructure become more important to our daily operation
as everything in this world are connected to the network so that we can operate everything
smoothly and successfully. A network need to be reliable as users enjoy increasing speed and
connectivity to get a better performance while using the network. Moreover, a secure network
can be ensured by the downtime and productivity that remains consistent in any situation. In
the meantime, an appropriate network infrastructure will allow for improved performance,
improved availability and solutions for various issues.
The main objective for this network is to provide an efficient and secure services to the
user in the building that also includes a practical and substantial inaccessibility by people who
don’t have the credentials on the system itself. The network for educational community will
able to share information and ideas so that they can work more efficiently and being productive.
In addition, the design for the network will be scalable so that many different users can be added
to the network without having to redo the installed network.
As the network need to be transparent among the users, the executed file transfer,
application and others should be ideally appeared to operate as quickly as processes executed
within an end station. The Internet Service Provider (ISP), TM UNIFI has the download speeds
up to 30 Mbps to 800Mbps and 10Mbps to a speed of 200Mbps for upload speeds. This will
provide the users a good internet connection with no problem at all.
Other than that, the storage requirement need to be large enough to store all important
data about educational community such as student and lecturer with each user need an average
of 100MB with 2 GB storage each user. The data need to be secure from any possible breaches
because it will expose the important information but also can be accessed by the people who
really need it. This is why an authentication are needed to avoid any data breaches from
happening.
In order to maintain the network, the regular network maintenance plan which is
DataDog will be provided in order to spot and patch usage problem across the network. Next,
if any small problem happened in network, network maintenance providers should do
troubleshooting if any issues arise to avoid the problem become more complicated and need an
expensive maintenance.
6
4.0 REFERENCES
Eero. (2016, September 15). 5 Important Router Specs, Explained. Retrieved from The
Download: [Link]
Gyarmathy, K. (2019, March 28). What Do "9s" Mean, Anyway? Retrieved from VCHNGE:
[Link]
Ishak, M. I. (2020). SECR1213-Network Communication. Network Design Project Task 2 -
Initial Design & Preliminary Analysis, 2-6.
[Link], N. (2021, December 7). The Best Security Suites for 2022. Retrieved from PC:
[Link]
[Link]. (n.d.). Computer Hardware for Business. Retrieved from
[Link]: [Link]
components-and-specifications
support, i. (2021, October). Minimum Software and Hardware Requirements. Retrieved from
intuiface support: [Link]
Minimum-software-and-hardware-requirements
Unifi. (n.d.). Why Unifi Fibre? Retrieved from Unifi:
[Link]
broadband?utm_source=google&utm_medium=SEM&utm_campaign=Unifi_Always
_On_Q2&utm_term=Brand&gclid=CjwKCAiAtouOBhA6EiwA2nLKH8YFvd-
HzQyY_Q865wupM8FMKySdP0JGYQ19LPYbClUE6GCm4CQRahoCbKsQAvD_
BwE
7
5.0 TASK 1 AND TASK 2 MINUTE MEETING
Group Members Meeting Date and Agenda
Time
1. Nur Izra Zulaika Binti 29/11/2021 -Discussion about the task
Zul Kiffly (B20EC3016) Monday given.
2. Nur Alisa Maisara Binti -Brainstorming idea.
Zanuar (B20EC3014) -Drawing floor plan.
3. Aishah Afina Binti Abd
Aziz (B20EC3001)
4. Suvimon A/P Sam Khan
(B20EC3021)
1. Nur Izra Zulaika Binti 7/12/2021 -Continue drawing floor
Zul Kiffly (B20EC3016) Tuesday plan.
2. Nur Alisa Maisara Binti -List out question.
Zanuar (B20EC3014)
3. Aishah Afina Binti Abd
Aziz (B20EC3001)
4. Suvimon A/P Sam Khan
(B20EC3021)
1. Nur Izra Zulaika Binti 10/12/2021 -Check and identify question
Zul Kiffly (B20EC3016) Friday to short list.
2. Nur Alisa Maisara Binti -Elaborate on feasibility
Zanuar (B20EC3014) study.
3. Aishah Afina Binti Abd
Aziz (B20EC3001)
4. Suvimon A/P Sam Khan
(B20EC3021)
1. Nur Izra Zulaika Binti 17/12/2021 -Answering question.
Zul Kiffly (B20EC3016) Friday -Finalize report.
2. Nur Alisa Maisara Binti -Prepare for submission.
Zanuar (B20EC3014)
3. Aishah Afina Binti Abd
Aziz (B20EC3001)
4. Suvimon A/P Sam Khan
(B20EC3021)
8
6.0 PHOTO OF MEETING
Figure 5: Meeting Task 1 and Task 2.