0% found this document useful (0 votes)
10 views45 pages

In Assignment Updated

This document outlines a group assignment for a networking course at Technology Park Malaysia, detailing the objectives, scope, limitations, and marking scheme for the project. The assignment involves designing a network for a two-block building with three floors each, using simulation software to demonstrate the planned network's functionality. It includes sections on network devices, layout, topology, IP addressing, and characteristics, along with individual contributions from team members.

Uploaded by

hiremajd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views45 pages

In Assignment Updated

This document outlines a group assignment for a networking course at Technology Park Malaysia, detailing the objectives, scope, limitations, and marking scheme for the project. The assignment involves designing a network for a two-block building with three floors each, using simulation software to demonstrate the planned network's functionality. It includes sections on network devices, layout, topology, IP addressing, and characteristics, along with individual contributions from team members.

Uploaded by

hiremajd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

INTRODUCTION TO IN 1

GROUP ASSIGNMENT
TECHNOLOGY PARK MALAYSIA

CT043-3-1
INTRODUCTION TO NETWORKING

APU1F1902
MOHAMMED KHIER ALSAHEN - TP054385

SYED GHAZI ABBAS RIZVI -

WAJID ZAHOOR – TP054982

MAZAHIR – TP048154

HAND OUT DATE:


HAND IN DATE:
DUE DATE:
LECTURER NAME: Dr. KAMALAKANNAN MACHAP
ASSIGNMENT MARK: 50%

1|Page
INTRODUCTION TO IN 2

Content

1. s
2. MARKING SCHEME............................................................................................................... 4
3. MARKING RUBRIC.................................................................................................................6
3.1 FOR SECTION 1............................................................................................................... 6
3.2 FOR SECTION 2............................................................................................................... 9
4. INTRODUCTION (Mohammed Khier Alsahen TP054385)....................................................11
4.1 OBJECTIVES...................................................................................................................11
4.2 SCOPE........................................................................................................................... 11
4.3 LIMITATIONS................................................................................................................ 11
4.4 ASSUMPTIONS..............................................................................................................11
5. FLOOR PLAN....................................................................................................................... 12
5.1 BLOCK A........................................................................................................................12
5.1.1 Ground Floor (Mazahir and Mohammed Khier Alsahen).......................................12
5.1.2 First Floor (Mazahir and Syed Ghazi Abbas)..........................................................13
5.1.3 Second Floor (Mazahir and Syed Ghazi Abbas)......................................................14
5.2 BLOCK B (Wajid Zahoor)...............................................................................................15
5.2.1 Ground Floor (Wajid Zahoor).................................................................................15
5.2.2 First Floor (Wajid Zahoor)......................................................................................16
5.2.3 Second Floor (Wajid Zahoor).................................................................................17
6. Network Devices................................................................................................................ 18
6.1 Routers (Mohammed Khier Alsahen)...........................................................................18
Usage in the network design..........................................................................................18
6.2 Servers (Wajid Zahoor).................................................................................................19
Definition........................................................................................................................19
Usage of server in network design.................................................................................19
6.3 Switches (Syed Ghazi Abbas)........................................................................................20
Usage in network design................................................................................................20
6.4 Cables – Mazahir (TP048154).......................................................................................21
Straight through............................................................................................................. 21
Cross-Over Cable............................................................................................................ 21
Serial cable..................................................................................................................... 22

2|Page
INTRODUCTION TO IN 3

7. Network Layout (Wajid Zahoor).........................................................................................23


7.1 Building 1......................................................................................................................23
7.2 Building 2......................................................................................................................23
8. Network Topology:.............................................................................................................25
8.1 Topology of Office Building (Mohammed Khier Alsahen TP054385)............................25
Topologies used in the network.....................................................................................25
8.2 Topology of Office Building (Individual work Sayed Ghazi).......................................28
Topologies used in the network.....................................................................................28
9.0 IP Addressing scheming and Justification.........................................................................31
9.1 IP Addressing of Office building (Individual work for Mazahir):...................................31
For Level 1...................................................................................................................... 31
For level 2 (in general)....................................................................................................31
For Level 2 (server room)............................................................................................... 31
For Level 3...................................................................................................................... 32
IP addresses assigned for links between routers............................................................32
Static Routing configuration on routers.........................................................................32
9.2 IP Addressing of Office building (Individual work for Wajid TP054982):......................33
For ground floor............................................................................................................. 33
For floor one corporate office........................................................................................33
For floor one computer lab, auditorium, print shop.......................................................34
For floor one cybersecurity lab.......................................................................................34
For floor 2.......................................................................................................................34
In between routers.........................................................................................................35
Static Routing configuration on routers.........................................................................35
10.0 Network characteristics (individual work):.....................................................................36
10.1 Network Manageability training building (TP054982 – Wajid Zahoor).......................36
References..............................................................................................................................37
R............................................................................................................................................. 39
APPENDIX............................................................................................................................... 39
WORK BREAKDOWN STRUCTURE.......................................................................................39
GANTT CHART.................................................................................................................... 40

3|Page
INTRODUCTION TO IN 4

2. Marking scheme
Students
Student 4 Student 3 Student 2 Student 1
Name: Assessment Criteria
TP. No:
Group Assignment
Student 4 Student 3 Student 2 Student 1 Weight Section 1: Teamwork Skills
10 Alternate Roles
Peer Evaluation
5 - Good relationship with
group members
- Respect and accept
opinions
10 Progress Report (Week 7)
5 Referencing
Section 1: Social Skills &
Weight
Responsibilities
Topology / IP Addressing
15
Justification
10 Network Characteristics

5 Individual Reflection

Weight Section 1: Practical Skills


10 Demonstration

70% Subtotal Marks

Practical Test
Student 4 Student 3 Student 2 Student 1 Weight Section 2: Practical Skills
10 Network diagram (Packet Tracer)
5 IP Addressing Scheme
10 Configuration
5 Ability to complete on time
30% Subtotal Marks

4|Page
INTRODUCTION TO IN 5

100% Total Marks

3. Marking rubric

3.1 For section 1

Only for Section 1

4.5-5.0 3.5-4.0 2.5-3.0 1.5-2.0 0-1.0


Score Weight Criteria
(Distinction) (Credit) (Pass) (Marginal (Fail)
Fail)
Very clear Clear Able to Attempt to No clear
evidence to evidence demonstrate demonstrate evidence of
assume of ability the ability to the ability to ability to
alternate role to assume assume assume assume
as a group alternate alternate roles alternate roles alternate
leader and role as a as a group as a group role as a Alternate
10 2 member to group leader and leader and group Roles
demonstrated leader and member with member with leader and
in practice. member some effect limited effect member.
to achieve and require and require
the same minor improvements.
goal. improvements

5 1 Attends group Attends Attends group Adequately Not Peer


meetings group meetings attends group Attends Evaluation
regularly and meetings regularly and meetings. Not group
arrives on regularly arrives on time complete meetings
time. and but incomplete group work of and also no
Contributes arrives on of group work. assignment by contributio
meaningfully time. time. n for the
to group Complete group work
discussions s group of

5|Page
INTRODUCTION TO IN 6

and complete assignme assignment.


by time. nts on
time.

Very good Complete Presented the Missed out the Not


quality of work progress on progress report showing
work presented time, but schedule. any
presented. on time. showing progress.
Well prepared, However, incomplete Incomplete
and not doing work work. Need work
last minute need major presented - has
Progress
10 2 work some modifications evidence of
Report
changes to the work last minute
and done work
modificati
ons for
improvem
ent.

Very good Recent Sufficient Minimal in- No in-text


quality of source of number of text citation citation and
references references references and and references very
used, with used, with citation in the used. Minor minimal
proper citation proper report. No issues in the references.
Referencin
5 1 and reference reference issue in the referencing Major
g
list for all facts list. referencing format. issues in
and diagrams Limited format the
used in-text referencing
citation in format.
the report.
15 3 Propose very Propose Propose Propose Not able to Topology /
good good complete incomplete propose for IP
Topology / IP Topology Topology / IP Topology / IP topology Addressin
Addressing / IP Addressing Addressing and IP g
plan with Addressin plan with plan with address Justificatio
justification, g plan minimal weak plan for the n
suitable for with justification justification scenario
6|Page
INTRODUCTION TO IN 7

APU justificati
community on,
with suitable
supporting for APU
evidence. communit
y

Very good Good Sufficient Minimal Limited


discussion of discussion discussion of discussion of discussion
network of network network of network
characteristics network characteristics characteristics, characterist
Network
but with characteri but with with no ics
10 2 Characteri
excellent stics with limited contribution to
stics
contribution to sufficient contribution to the society
the society contributi the society
on to the
society
Able to show Some Good values Minimal No positive
good values good demonstrated positive attitude and
such as values in in the attitude and good values
responsible shown in assignment good values demonstrat
towards their reflection based on demonstrated ed in the
own well- such as reflection through reflection
being, responsibi report, but no reflection report
displaying care lity, and evidence of report.
and concerns, tolerance. time Individual
5 1
tolerance. management Reflection
Good in skills in the
Proactive to time work
ensure the managem produced.
completion of ent skills
task for all but only
group related to
members. own
work.

7|Page
INTRODUCTION TO IN 8

Successful Successfu Minimal issues Major issues Not turn up


network l network in in for project
configuration configurat configuration configuration demonstrati
(able to ping to ion (able – not fully (some parts on.
all devices) to ping to working are unable to
all according to ping).
Excellent devices) the proposed
skills in plan
modifying Able to Demonstra
10 2 network modify Able to t ion
configuration the modify the
during network network
demonstration configurat configuration
ion with help of
without friends during
any help demonstration
during
demonstra
tion

70 Total Marks (Section -1)

3.2 For section 2

Only for Section 2 (Practical Test)

4.5-5.0 3.5-4.0 2.5-3.0 1.5-2.0 0-1.0


Score Weight Criteria
(Distinction) (Credit) (Pass) (Marginal (Fail)
Fail)
10 2 Good quality / Good Appropriate No proper Not Network
complexity of network devices and devices and chosen Diagram
network design. design cables cables any
showing chosen for chosen for devices
complete the given the given and

8|Page
INTRODUCTION TO IN 9

setting of network network cables


the network diagram. diagram. for the
given
network
diagram.
Correct Correct Incomplete Wrong No
calculation of IP calculation calculation calculation calculati
IP Addressing
5 5 addressing scheme of IP of IP address of IP on of IP
Scheme
with neat addressing scheme. address address
structure. scheme. scheme. scheme.
Outstanding Very good Show good Able to Poor
configuration understandi understandin show understa
skills, exceeding ng in g in minimal nding on
the expectation. configuratio configuration understandi the
n. , but minimal ng on the configur
10 2 Configuraion
Able to answer all Able to knowledge configurati ation
questions posed answer on the work on done
perfectly. most of the
questions

Completed before Completed Partially Incomplete Not able


on time. in order on completed of work to
Ability to
time. the work. within complet
5 5 complete on
specific e the
time
time. work on
time
30 Total Marks (Section -2)
Comments:

9|Page
INTRODUCTION TO IN 10

4. Introduction (Mohammed Khier Alsahen TP054385)

4.1 Objectives

As network technicians, our team aims to deliver a network design that is optimal in
terms of its usability, reliability, security and maintenance, as well as in terms of the
architecture of the target buildings. In the process of delivering such standards, we are
required to ensure the effectiveness of the planned network design through an appropriate
simulation software such as packet tracer. This software will simulate the functionality of
various features in our planned network design including network devices such as router and
switches along with the IP addressing scheme.

4.2 Scope

Our Team will start the project with the design of a floor plan consisting of 2 blocks
with 3 floors each. The design will be constructed via the Visio Professional tool, following a
specific guideline to maintain the general promised quality of our system. We will then
decide on the network devices, networking schemes, and IP configurations for use in the
campus building. An appropriate justification of these will be given and later we will proceed
to the construction of a functioning network simulation through the Cisco Packet Tracer
afterwards.

4.3 Limitations

While the simulation is meant to serve as an estimation of the functionality of a real


network, it must be understood that this estimation is rather limited and do not cover all the
relevant aspects of the functionality of a network. One such example is the length of wire as
well as the way it is used (twisted or turned around the corners) may limit the its
functionality. Same goes for the usage of wireless access points, the functionality of which
may get affected by its surrounding as well as the number of users using it.

10 | P a g e
INTRODUCTION TO IN 11

4.4 Assumptions

Despite being an estimation, packet tracer will give a good enough picture of the
actual functionality of network design. The IP addressing used in the packet tracer for various
segments of a network, where large number of end-devices are used, is represented by only
two end devices. These two end devices are given the first and the last IP address of the range
of IP addresses assigned to those. Furthermore, the switch being used in packet tracer has 24
ports, while at some places the number of end devices is more than the number of available
ports in one switch or even two switches, in that case only one switch has been used since, in
real-life these switches can be daisy-chained to get the desired functionality.

5. Floor plan
The following are floor plans along with appropriate justification for each. These have
been designed by our team for the new training center that is managed by APU’s cooperate
training services. The training center consists of two blocks of building each with three
floors.

5.1 Block A

5.1.1 Ground floor (Mazahir and Mohammed Khier Alsahen)

11 | P a g e
INTRODUCTION TO IN 12

The ground floor is less occupied then all the other floors as it mainly includes the
administration services and facilities. It consists of two departments which are the
administration office and the finance department. It also includes two auditoriums and a staff
lounge accompanied with an activity area in the center of the floor for the staff. The
auditoriums can withstand the capacity of 100 students and are well equipped with projectors
and a display area along with a personal computer for the lecturer or the host. The restrooms
are located at the bottom area of the floor near the stairs where it is the most accessible to
everyone entering or leaving the floor. All in all, most of the facilities of this floor are easily
accessible since it’s a less dense floor which is mainly to avoid traffic in the opening view of
the premise - administrations office.

5.1.2 First floor (Mazahir and Syed Ghazi Abbas)

First floor consists of two auditoriums each one is of same size having capacity of
around 100 students where mostly seminars and big lectures are held, one is on the left-hand
side next to the server room and two conference rooms. These conference rooms are mainly
for the teacher or management meetings and the other auditorium is on the right-hand side
with all the computer labs and they are four in number. All the management and admin
offices are also on the right-hand side. Also, there in one class room next to the library.

12 | P a g e
INTRODUCTION TO IN 13

Library is quite easily accessible as its near to the left side lifts and staircase in
between those. Library has a wide range of books to help students with their studies and has
all the relevant material to aid them in their studies. In the middle there is a fountain to give
some natural mildness to the technical architecture of this floor, and washrooms are also near
to it to be used by both genders: male and female. There are two more lifts between the
auditorium and the conference rooms and one more staircase between the lifts.

5.1.3 Second floor (Mazahir and Syed Ghazi Abbas)

Second floor consists of classrooms and the lecturers’ office. On the right side there
are classes rooms where all the lectures and tutorials are held and on the left-hand side there
are all the lecturers’ offices. In the middle there is a sitting area for the students and the
teachers for a breather.
Washrooms are midway of classes and the offices and these facilitate both genders:
males and females. Moreover, there are two conference rooms on the top, which are used for
the faculty meetings and also by students for discussion or for any event planning.
There are four lifts and two staircase, two lifts and one staircase at the bottom near the
washrooms and other two lifts and the staircase on the right side near the classes and the
conference rooms allowing the students and lecturers easy access.

13 | P a g e
INTRODUCTION TO IN 14

5.2 Block B (Wajid Zahoor)

5.2.1 Ground floor (Wajid Zahoor)

The ground floor includes two spacious auditoriums, each with 60 chairs for students
as well as a desk and a chair for the lecturer. The lecturer has access to PC as well as a printer
present on the table to aid his teaching and to take care of any unexpected printing. The
Auditorium has two air conditioners to give the attendants a calm environment for study, and
one projector to aid the teaching of the lecturer.
Furthermore, right outside the auditoriums is a fountain along with some tables, where
the students who are waiting for their turn of lecture in auditorium can wait, as well as those
students who have just attended their lectures. Incase if they need some more refreshment,
they can enjoy the pool on the two available pool tables on the top of the auditorium on the
left. They have sitting arrangement along with the pool tables as well. Just above that are
washrooms for both genders. Right in the center of the floor is a larger dining lounge where
students and faculty can enjoy their meals and above it is the kitchen along with the counter
to buy the desired food.
On the right of the ground floor, above auditorium, is the award room where all the
awards won till date by the students in various competitions along with the awards given to
the training center for its excellent services are present for the students to view and

14 | P a g e
INTRODUCTION TO IN 15

particularly to boast as the pride of the training center to various visiting dignitaries. There is
also a CCTV camera present in the award room to ensure the security of these precious
prizes. Above it, there are two lifts and stairs two allow the people access to above two floors.

5.2.2 First floor (Wajid Zahoor)

On the first floor there is one auditorium with similar facilities as that of the ones on
the ground floor. On the left is a large computer lab for students to practice their skills and if
to meet their printing needs on the top of the auditorium a print shop is available as well. On
the left of the computer lab is the area for co-operate services. In the center of it is briefing
place where experts can be briefed about the technicalities of their projects along with the is a
workstation where various professional do their part on the relevant projects. There is a
discussion room and a waiting area available as well. Each of these rooms are monitored with
CCTV seeing the sensitiveness of the co-operate projects. Above the co-operate services area
are the praying areas for each gender to help them with their spiritual needs.
In the center is the fountain along with some tables for those who wish to relax
themselves a bit. On the top left we have washrooms for each gender, and in the center, there
is the computer security lab as well as a set of classrooms. The class rooms are used for small
lectures, or tutorials by various trainers, while the computer security lab is a specialized lab
for the information security specialists for the future generations to develop their skills and to
work on their assignments and projects. One the right most, again there are two lifts and
stairs, which gives access to floor above and below.

15 | P a g e
INTRODUCTION TO IN 16

5.2.3 Second floor (Wajid Zahoor)

On the second floor there is again an auditorium with similar facilities as the ones
present on the floors below. On the left of the auditorium is a computer lab similar to floor
two, however above the auditorium is the store room. Where additional furniture, computer
peripherals, and other hardware is stored among other things as backup. In the center there is
again a fountain along with table to give the faculty members and students a place to sit and
relax a bit. For further refreshment there is a refreshment center.
Above the refreshment center are two prayer rooms for each gender to help them with
their spiritual needs. Above it is washrooms for each gender. On its right is the control room,
from where the security personals monitor various important areas of the training center.
Further to the right is a set of classrooms to help students and instructors with the training.
These classrooms are mostly meant to be used for short tutorials. Lastly there are two lifts
and stairs on the right of the classrooms for the members of the training to center to access
the floors below.

Significant aspects of block B


One significant aspect which is noteworthy that the position of washrooms, praying
areas, lifts and stairs are in similar position for either for the access or because in case of lifts
and stairs, it had to be in the same place obviously. The control room has been decided to be
placed in the second floor seeing the significance of security. Anyone planning anything

16 | P a g e
INTRODUCTION TO IN 17

troublesome will have to go through two floors to access it. Lastly seeing the specialist set of
software programs which cyber security students need, it has been decided that a special
isolated lab will be given to these students with access to appropriate software programs.

6. Network devices
Following is a brief description of the network devices used to create network design
in Packet Tracer.

6.1 Routers (Mohammed Khier Alsahen)

Router is a layer 3 device that essentially contains or isolates broadcast domains


(networks). Arguably, its main functionality is to stop broadcast from spreading across it.
Rather it allows unicast and multicast communication between devices across its interfaces.
Commonly for a single router, it is said that each of its interface represents a separate device.
And unlike switches it is software based, hence is feature rich and upgradeable.

Usage in the network design


The router used in the network design is Cisco’s 2911 router, the pic of which is given
below. One router is used for each floor in both buildings. Depending on the floor and the
number of networks used, one or more of router’s interfaces are utilized to provide the
relevant isolation and connecting between different networks. Furthermore, all the routers in
each building are interconnected as well.

17 | P a g e
INTRODUCTION TO IN 18

6.2 Servers (Wajid Zahoor)

Definition
A server is a program which provides some form of functionality or service to other
computer programs which are usually known as its clients or users (WhatIs.com, 2014).

Usage of server in network design


In this case for our network we are going to use a total of 5 servers with the following
features.

FreeIPA on a Linux server for the AAA service


Linux servers for being the opensource servers are the primary choice. The source
code Linux operating is freely available under various open-source licenses including GPL.
However, for the complementary services (such as troubleshooting), you need buy
subscription from respective companies such as Red Hat in case of Red Hat Enterprise Linux
(RHEL) or from Suse in case of using their services for their operating system (Suse).
FreeIPA can be used for Authorization, Authentication, and Accounting of various
members of APU new building. Freeipa includes other services such as Kerberos
authentication, DNS server, and Network time protocol (NTP) server etc. These features
when utilized fully provide quite a robust system for AAA.

Samba server
Samba is another open source package available on Linux servers under GPLv3. it is
used primarily for robust interoperability of Linux and Windows by providing file and print
service to various Microsoft clients, which is quite useful seeing that most of the members of
APU’s new building will be Microsoft Window users. (LINAGORA, 2019)

Apache HTTP server


Apache http server or commonly known as Apache web server is an open-source
software released under apache license 2.0. (B, 2019) It mostly works with Linux servers
however can also provide similar functionality on Microsoft servers and other Unix-likes
servers as well.

Mysql as database server

MySQL is a popular opensource relational database management system (MySQL


Tutorial, 2019). MySQL can be used to record key facts and figures about the members and
18 | P a g e
INTRODUCTION TO IN 19

various resources in APU’s new building; this is especially useful for the library provided in
Block 1.

Postfix as a mail server


Postfix is free and open-source mail transfer agent under IBM’s public license 1.0 and
is easily available on various Linux distribution. (Postfix.org, 2019) This can be used to
provide various members of APU’s new building a centralized mail server.

6.3 Switches (Syed Ghazi Abbas)

A switch is a third generation, smart device which falls in layer 2 of OSI model. It
serves as a single broadcast domain and multiple collision domains. In layman terms, a
switch serves as a central connection point for the devices plugged into it within a network. It
is basically packed with ASIC chips which are meant to provide the same functionality as
bridges, however ASIC is hardware based which bridges are software-based. Due to ASIC
switches can transmit data to relevant port at wire speed. While switches typically have 24 or
48 ports but these can be connected together to serve bigger networks.

Usage in network design


The switch used in the network design is Cisco’s 2960 24TT switch, the pic of which
is given below. It has a total of 24 Fast Ethernet and 2 Gigabit Ethernet ports. These switches
have been used to allow the access layer devices to communicate within a single network.
Wherever needed, switched were connected to serve larger networks. Any link from a switch
to router or firewall went through Gigabit Ethernet port taking into consideration any high
bandwidth requirements.

19 | P a g e
INTRODUCTION TO IN 20

6.4 Cables – Mazahir (TP048154)

Straight through
This type of cable is also known as a patch cable and are mainly used in places where a
wireless connection is not available. The straight through cable could be used mostly in four
different ways-
 To connect a computer to a switch port
 Connecting a computer to a cable or DSL modem LAN port
 Connecting a routers WAN port to a cable or DSL modem LAN port
 Connecting a switch to a router’s LAN port.

In this project we decided to use straight through cables to


connect all the routers with switches and switches with
firewalls and end devices present in the floor plan
developed. This cable was the technically the right option
for us as the straight through cable is best in connecting

(Anon, 2019) unlike devices together compared to the cross-over and the
serial cable.

Cross-Over Cable
A cross-over cable is generally used to connect two
computing devices together. It also known as an ethernet
cable. it is used to connect a LAN port of a router to a switch
or a hub port and also to connect two switches together by
using a regular port.
(Anon, 2019)
In this project the cross-over cable was mainly used to connect
all the like devices together such as two switches together. A crossover able could be Cat5,
Cat5e, Cat6, the difference between each of these cables is the different quality of these
cables due to their differing amount of twists of copper wire present in the cable.

Serial cable

20 | P a g e
INTRODUCTION TO IN 21

A serial port in a computer is usually used to transfer information or data between devices
using communication or bit to bit techniques. These cables are mainly differentiated
according to their interface and standards. In the case of a serial cable it, in this assignment, is
generally used to establish a connection between two routers. Some of the different types of
serial cables used around the world are
 Basic DTE-DCE
 Null modem cable
 Two-wire DTE-DCE
 V.35 Crossover

21 | P a g e
INTRODUCTION TO IN 22

7. Network layout (Wajid Zahoor)

7.1 Building 1

7.2 Building 2

22 | P a g e
INTRODUCTION TO IN 23

8. Network topology:

8.1 Topology of office building (Mohammed Khier Alsahen


TP054385)

Topologies should be studied before implementing since there is a certain manner by which a
network and peripheral devices should be connected to ultimately have a smooth and stable
connectivity stability.
Network topologies come in different standard layouts and design patterns and those should
be chosen accordingly as they are the fundamental building blocks of a successful network
design. Some of the most common topologies are mesh, ring, tree, star and bus etc. Following
figure gives some example of various topologies

Google.com, 2019

Topologies used in the network


Partial mesh topology for access layer
Partial mesh topology essentially provides some redundancy (where deemed necessary) while
in cases where the network doesn’t get affected significantly adversary in case of a failure,
only single connection is provided. This topology is used to connect devices within each

23 | P a g e
INTRODUCTION TO IN 24

floor. The switches are interconnected with two crossover wires to ensure redundancy, while
end devices are connected to only one device at access layer.

ground floor

first floor

24 | P a g e
INTRODUCTION TO IN 25

Second floor

Full mesh topology between routers


Full mesh topology is best when redundancy is a significant factor, which in this case is. One
router has been allocated for each floor. To get certain critical services, such as those offered
by servers on first floor, end-devices on other floors must communicate through these routers.
Hence redundancy is critically important to ensure continuous availability of service.

Building 1 routers

25 | P a g e
INTRODUCTION TO IN 26

8.2 Topology of Office Building (Individual work Sayed Ghazi)


Network topology refers to the physical and logical arrangement of devices in a network. It
also represents how the data is exchanged between the devices in a network. Physical
topology looks at the physical aspects of a network like how the devices been connected
physically in a network whereas the logical topology goes through the logical aspects like
how the data is exchanged or transferred among the network devices.
There are five basic models of topology which includes:
 Bus topology: all the devices are connected in the same transmission line sequentially,
it’s a simple and low-cost topology.
 Star topology: all the devices are connected to a single hub or switch via cables if any
devices has some failure it doesn’t affects the network but if the center device goes
down it causes a network failure, it’s the most popular topology model used.
 Ring topology: its kind of same as bus topology as all the devices are connected in the
same transmission line except that it starts and end with the same node making a ring,
it shares the same features as of bus topology.
 Tree topology: a root node is connected to one or more sub level nodes it has features
of both bus and star topology as it may have the same backbone while the low-level
nodes connect using star topology
 Mesh topology: each node is connected to some or all other nodes present in a
network which makes the network highly fault tolerant although it’s quite costly and
used in highly critical networks.
 Hybrid topology: it uses mixture of two or more topologies which includes the bus,
star, ring, mesh and tree topology.

Topologies used in the network


As far as building 2 is concerned we have used partial-mesh and mesh topologies. Floor wise
topology used is partial-mesh whereas mesh is used among the routers to fault tolerant
connection between networks of different floors as shown in the following figures.

26 | P a g e
INTRODUCTION TO IN 27

ground floor

first floor

27 | P a g e
INTRODUCTION TO IN 28

second floor

Mesh topology between routers

28 | P a g e
INTRODUCTION TO IN 29

9. IP Addressing scheme and justification

9.1 IP addressing of office building (individual work by


Mazahir)

Ground floor
Network IP:192.168.10.0
Subnet mask: 255.255.255.0
Default gateway: 192.168.10.1
Range of assignable IP addresses: 192.168.10.2 – 192.168.10.254
Broadcast ID: 192.168.10.255
Justification
The devices that are going to connect to the network are mostly going to use wireless
as a medium and the range is not well defined; in-fact it may vary with time. Hence a total of
252 IP addresses are made available for end device (excluding the IP assigned to camera).

For first floor (in general)


Network used: 192.168.11.0
Subnet mask: 255.255.255.0
Default gateway: 192.168.11.1
Range of assignable IP addresses: 192.168.11.2 – 192.168.11.254
Broadcast ID: 192.168.11.255

Justification
In this case, there is a mix of end-devices using wired connections and wireless. The
wired ones (such as those in labs) are going to be assigned fixed IPs while remaining cause
use any from the large pool of over 200 available IPs.

For first floor (server room)


Network used: 192.168.12.0
Subnet mask: 255.255.255.248
Default gateway: 192.168.12.1
Range of assignable IP addresses: 192.168.12.1 – 192.168.12.6

29 | P a g e
INTRODUCTION TO IN 30

Justification
The available range meets the limited number of server (5 in total) used in the
building.

For second floor


Network used: 192.168.13.0
Subnet mask: 255.255.255.0
Default gateway: 192.168.13.1
Range of useable IP addresses by hosts: 192.168.13.2 – 192.168.13.254
Broadcast ID: 192.168.13.255

Justification
Again, a range of wireless and wired devices with get connected to the network, hence
a large pool of IP addresses in made available.

IP addresses assigned for links between routers


Router0 to Router1
192.168.14.5/30 to 192.168.14.6/30 respectively
Router0 to Router 2
192.168.14.1/30 to 192.168.14.2/30 respectively
Router1 to Router2
192.168.14.9/30 to 192.168.14.10/30 respectively

Justification
Here the subnet mask of 252 is used seeing that each serial connection between
routers needs only two IP addresses.

Static routing configuration on routers


Router 0
Network ID Subnet Next hop
192.168.11.0 255.255.255.0 192.168.14.6
192.168.12.0 255.255.255.248 192.168.14.6
192.168.13.0 255.255.255.0 192.168.14.2

Router 1
Network ID Subnet Next hop
192.168.10.0 255.255.255.0 192.168.14.5

30 | P a g e
INTRODUCTION TO IN 31

192.168.13.0 255.255.255.0 192.168.5.14.10

Router 2
Network ID Subnet Next hop
192.168.10.0 255.255.255.0 192.168.14.1
192.168.11.0 255.255.255.0 192.168.14.9
192.168.12.0 255.255.255.248 192.168.14.9

9.2 IP addressing of training building (individual work by


Wajid TP054982):

For ground floor


Network used: 192.168.0.0
Subnet mask: 255.255.255.0
Default gateway: 192.168.0.1
Range of useable IP addresses by hosts: 192.168.0.2 – 192.168.0.254
Broadcast ID: 192.168.0.255

Justification
A range of devices are going to be used and these will mostly be served by wireless
access points present throughout the ground floor. Hence a range of 253 available IP
addresses (other than NID, BID, and default gateway) is enough to meet the needs of the
various members, visitors, and other user of APU.

For floor one corporate office


Network used: 192.168.1.0
Subnet mask: 255.255.255.192
Default gateway: 192.168.1.1
Range of useable IP addresses by hosts: 192.168.1.2 – 192.168.1.62
Broadcast ID: 192.168.1.63

Justification
Since this is the corporate office and the number of users is fixed (about 50) along
with 5 cameras, they have been granted an appropriate range to meet the needs of their

31 | P a g e
INTRODUCTION TO IN 32

devices. Seeing the security concerns, no WAP is given and all the devices are statically
assigned their respective IP addresses and for the same range of IP addresses in also limited.

For floor one computer lab, auditorium, print shop


Network used: 192.168.2.0
Subnet mask: 255.255.255.0
Default gateway: 192.168.2.1
Range of useable IP addresses by hosts: 192.168.2.2 – 192.168.2.254
Broadcast ID: 192.168.2.255

Justification
For all these three places a number of WAP are available to suit the dynamic
networking needs of various members along with some fixed IP addresses for the printers in
printshop and for the computers in computer lab.

For floor one cybersecurity lab


Network used: 192.168.3.0
Subnet mask: 255.255.255.192
Default gateway: 192.168.3.1
Range of useable IP addresses by hosts: 192.168.3.2 – 192.168.3.62
Broadcast ID: 192.168.3.63

Justification
The number of computers in the cybersecurity lab are fixed and hence have been
provided the relevant IP addresses statically for the security reason. The range of available IP
addresses is also limited and no WAP is provided seeing the security concerns.

For floor 2
Network used: 192.168.4.0
Subnet mask: 255.255.255.0
Default gateway: 192.168.4.1
Range of useable IP addresses by hosts: 192.168.4.2 – 192.168.4.254
Broadcast ID: 192.168.4.255
Justification
There is range of devices that need network connectivity from various wireless
devices to PC is computer lab through a wired connection or by the means of wireless access
points. Hence a class C network with a total of 253 useable hosts has been used.
32 | P a g e
INTRODUCTION TO IN 33

In between routers
The serial cable between router0 and router1 has been given the IP addresses of
192.168.5.1/30 and 192.168.5.2/30 respectively. For the serial cable between router0 and
router2, the IP addresses of 192.168.5.5/30 and 192.168.5.6/30 has been used respectively.
Lastly the serial cable between router1 and router2 has been giver the addresses of
192.168.5.9/30 and 192.168.5.10/30 respectively. Seeing the fact that only two useable
addresses are needed for one serial cable between two routers, the subnet mask of 30 is used.

Static Routing configuration on routers


Router 0
Network ID Subnet Next hop
192.168.1.0 255.255.255.192 192.168.5.2
192.168.2.0 255.255.255.0 192.168.5.2
192.168.3.0 255.255.255.192 192.168.5.2
192.168.4.0 255.255.255.0 192.168.5.6

Router 1
Network ID Subnet Next hop
192.168.0.0 255.255.255.0 192.168.5.1
192.168.4.0 255.255.255.0 192.168.5.10

Router 2
Network ID Subnet Next hop
192.168.0.0 255.255.255.0 192.168.5.5
192.168.1.0 255.255.255.192 192.168.5.9
192.168.2.0 255.255.255.0 192.168.5.9
192.168.3.0 255.255.255.192 192.168.5.9

33 | P a g e
INTRODUCTION TO IN 34

10. Network characteristics (individual work)

10.1 Network manageability training building (TP054982 –


Wajid Zahoor)

Management of network can include installation of various software packages or


patches on various end devices including servers and clients, to the management of switches
or related layer 2 devices, to management of routers (layer 3 devices), all the way to the
management of interconnecting cablings (layer 1).
These devices can be managed either by approaching to them physically and using an
appropriate connecting device, such as console cable in case of the management of various
cisco devices, or by connecting to them remotely by using telnet or SSH.
The physical presence of network or system administrator is required either when the
device is not yet setup for telnet or SSH: a fresh unconfigured device for example, or when
the connectivity to the device is broken. Usually however, after doing the basic configuration,
these devices are managed through SSH or telnet. Both of these require basic IP addressing to
be configured on the relevant devices. The difference between telnet and SSH is that telnet is
insecure meaning that the data transferred through it is unencrypted or plain text, while SSH
send data after encrypting it essentially protecting the data from a man in the middle attack.
Furthermore, telnet uses TCP port 23 (Gridelli, 2018) while SSH uses TCP port 22
(Linux.com, 2017). Particularly these devices can either be password protected or for ease of
manageability, keypairs can also be used in-place of password.
Various software packages, such as putty and Tera Term, can be used to manage these
devices locally or remotely.

34 | P a g e
INTRODUCTION TO IN 35

References
Amazon.com. (2019). Wired Gigabit Router: Amazon.com. [online] Available at:
https://www.amazon.com/slp/wired-gigabit-router/8xgzkxc8pzhb4kz [Accessed 14 Oct.
2019].
Itstillworks.com. (2019). [online] Available at: https://itstillworks.com/different-types-
routers-8594987.html [Accessed 14 Oct. 2019].
Anon, (2019). [online] Available at: https://www.techwalla.com/articles/what-is-the-purpose-
of-a-router-in-a-network [Accessed 14 Oct. 2019].
Test King. (2019). Describe the purpose and functions of various network devices.. [online]
Available at: https://www.test-king.com/guide-describe-the-purpose-and-functions-of-
various-network-devices.htm [Accessed 14 Oct. 2019].
WhatIs.com. (2014). What is server? - Definition from WhatIs.com. [online] Available at:
https://whatis.techtarget.com/definition/server [Accessed 5 Oct. 2019].
LINAGORA. (2019). Samba. [online] Available at: https://linagora.com/open-source-
technologies/samba [Accessed 5 Oct. 2019].
B, G. (2019). What is Apache? An In-Depth Overview of Apache Web Server. [online]
Hostinger Tutorials. Available at: https://www.hostinger.my/tutorials/what-is-apache
[Accessed 5 Oct. 2019].
MySQL Tutorial. (2019). What Is MySQL? & Why It Is the World’s Most Popular Open
Source Database. [online] Available at: https://www.mysqltutorial.org/what-is-mysql/
[Accessed 5 Oct. 2019].
Postfix.org. (2019). The Postfix Home Page. [online] Available at: http://www.postfix.org
[Accessed 5 Oct. 2019].
Globalknowledge.com. (2017). What’s the Difference Between Hubs, Switches & Bridges?.
[online] Available at:
https://www.globalknowledge.com/us-en/resources/resource-library/articles/what-s-the-
difference-between-hubs-switches-bridges/ [Accessed 8 Oct. 2019].
SearchNetworking. (2019). Bridge vs. switch comparison: What's the difference?. [online]
Available at: https://searchnetworking.techtarget.com/answer/Bridge-vs-switch [Accessed 8
Oct. 2019].

35 | P a g e
INTRODUCTION TO IN 36

Fiber Optical Networking. (2017). Different Types of Switches in Networking. [online]


Available at: http://www.fiber-optical-networking.com/different-types-of-switches-in-
networking.html [Accessed 8 Oct. 2019].
Lifewire. (2019). What Can a Switch Device Do for Your Computer Network?. [online]
Available at: https://www.lifewire.com/definition-of-network-switch-817588 [Accessed 8
Oct. 2019].
Gridelli, S. (2018). How to use telnet to test connectivity to TCP ports. [online] NetBeez.
Available at: https://netbeez.net/blog/telnet-to-test-connectivity-to-tcp/ [Accessed 8 Oct.
2019].
Linux.com. (2017). The Story of Getting SSH Port 22 - Linux.com. [online] Available at:
https://www.linux.com/news/story-getting-ssh-port-22/ [Accessed 8 Oct. 2019].
Google.com. (2019). Redirect Notice. [online] Available at: https://www.google.com/url?
sa=i&rct=j&q=&esrc=s&source=images&cd=&ved=2ahUKEwil0pem_JrlAhVJs48KHbCSC
YYQjB16BAgBEAM&url=https%3A%2F%2Fwww.educba.com%2Ftypes-of-network-
topology%2F&psig=AOvVaw0o8NL2rfHOKlH_wRPS1uZP&ust=1571115499275109
[Accessed 14 Oct. 2019].

36 | P a g e
INTRODUCTION TO IN 37

APPENDIX

WORK BREAKDOWN STRUCTURE

GROUP SECTION

Member’s Name Member’s Name


Introduction
 Objective
 Scope /
Limitations
 Assumptions
Floor Plan
 Diagram
 Justification
Network Design
 Network
Diagram
 Topology
 Packet Tracer
Configuration
IP Addressing

INDIVIDUAL
SECTION

37 | P a g e
INTRODUCTION TO IN 38

  Servers (software)  Routing  Transmission


 Devices Medium
(Hardware)
 Internet of Things  Network  Network Security
 Cloud Computing (IoT) Reliability

GANTT CHART

REMINDER OF INSTRUCTIONS

38 | P a g e
INTRODUCTION TO IN 39

1. As part of project management, you are required to develop a Gantt chart (project plan) that indicates clearly the activities
that are required in order for the project to be a success.

2. Attach the completed Work Breakdown Structure (WBS) and Marking Scheme in your final report. WBS must be signed and
agreed by all group members.

3. Your report must be typed using Microsoft Word with Times New Roman font size 12. Word count 3500 with +/- 10% words.
You need to include a word count at the end of the report. Report should be in 1.5 spacing.

4. The report has to be well presented and should be typed. Submission of reports that are unprofessional in its outlook will not
fare well when marks are allocated.

5. Your report must combine all the deliverables in one coherent document.

6. Ensure that the report is printed on standard A4 (210 X 297 mm) sized paper. Paper weight of 80 grams and above is highly
recommended.

7. The report should have a one (1”) margin all around the page as illustrated below:

1 inch 1 inch
1 inch

1 inch
The Typed Text
1 inch

1 inch

1 inch 1 inch

8. The assignment should attach front cover, table of contents and marking scheme. A transparent plastic sheet can be placed in
front of the report to protect the front cover.

39 | P a g e
INTRODUCTION TO IN 40

Table: Assessment Criteria (Marks Breakdown)

Students
Student 4 Student 3 Student 2 Student 1
Name: Assessment Criteria
TP. No:
Group Assignment
Student 4 Student 3 Student 2 Student 1 Weight Section 1: Teamwork Skills
10 Alternate Roles
Peer Evaluation
5 - Good relationship with
group members
- Respect and accept
opinions
10 Progress Report (Week 7)
5 Referencing
Section 1: Social Skills &
Weight
Responsibilities
Topology / IP Addressing
15
Justification
10 Network Characteristics

5 Individual Reflection

Weight Section 1: Practical Skills


10 Demonstration

70% Subtotal Marks

Practical Test
Student 4 Student 3 Student 2 Student 1 Weight Section 2: Practical Skills

40 | P a g e
INTRODUCTION TO IN 41

10 Network diagram (Packet Tracer)


5 IP Addressing Scheme
10 Configuration
5 Ability to complete on time
30% Subtotal Marks

100% Total Marks

Only for Section 1

4.5-5.0 3.5-4.0 2.5-3.0 1.5-2.0 0-1.0


Scor Wei Criteria
e ght (Distinction) (Credit) (Pass) (Marginal (Fail)
Fail)
Very clear Clear evidence Able to Attempt to No clear
evidence to of ability to demonstrate the demonstrate evidence of
assume alternate assume alternate ability to the ability to ability to
role as a group role as a group assume assume assume
leader and leader and alternate roles alternate roles alternate role Alternate
10 2 member to member to as a group as a group as a group Roles
demonstrated in achieve the leader and leader and leader and
practice. same goal. member with member with member.
some effect and limited effect
require minor and require
improvements improvements.
5 1 Attends group Attends group Attends group Adequately Not Attends Peer
meetings regularly meetings meetings attends group group Evaluation
and arrives on regularly and regularly and meetings. Not meetings and
time. arrives on time. arrives on time complete also no
Contributes Completes but incomplete group work of contribution

41 | P a g e
INTRODUCTION TO IN 42

meaningfully to group of group work. assignment by for the group


group discussions assignments on time. work of
and complete by time. assignment.
time.
Very good quality Complete work Presented the Missed out the Not showing
of work presented. presented on progress on progress report any progress.
Well prepared, time. However, time, but schedule.
and not doing last work need some showing
minute work changes and incomplete Incomplete Progress
10 2
modifications work. Need work Report
for major presented - has
improvement. modifications to evidence of
the work done last minute
work
Very good quality Recent source of Sufficient Minimal in- No in-text
of references used, references used, number of text citation citation and
with proper with proper references and and references very minimal
citation and reference list. citation in the used. Minor references.
5 1 Referencing
reference list for Limited in-text report. No issue issues in the Major issues
all facts and citation in the in the referencing in the
diagrams used report. referencing format. referencing
format format.
Propose very good Propose good Propose Propose Not able to
Topology / IP Topology / IP complete incomplete propose for
Addressing plan Addressing plan Topology / IP Topology / IP topology and Topology /
with justification, with Addressing plan Addressing IP address IP
15 3
suitable for APU justification, with minimal plan with weak plan for the Addressing
community with suitable for APU justification justification scenario Justification
supporting community
evidence.
10 2 Very good Good discussion Sufficient Minimal Limited Network
discussion of of network discussion of discussion of discussion of Characterist
network characteristics network network network ics
characteristics but with sufficient characteristics characteristics, characteristics
with excellent contribution to but with limited with no
contribution to the the society contribution to contribution to

42 | P a g e
INTRODUCTION TO IN 43

society the society the society


Able to show good Some good Good values Minimal No positive
values such as values shown in demonstrated in positive attitude and
responsible reflection such in the attitude and good values
towards their own as responsibility, assignment good values demonstrated
well-being, and tolerance. based on demonstrated in the
displaying care reflection through reflection
and concerns, Good in time report, but no reflection report Individual
5 1
tolerance. management evidence of report. Reflection
skills but only time
Proactive to related to own management
ensure the work. skills in the
completion of task work produced.
for all group
members.
Successful Successful Minimal issues Major issues in Not turn up
network network in configuration configuration for project
configuration configuration – not fully (some parts are demonstration.
(able to ping to all (able to ping to working unable to
devices) all devices) according to the ping).
proposed plan Demonstrat
Excellent skills in Able to modify ion
10 2
modifying the network Able to modify
network configuration the network
configuration without any help configuration
during during with help of
demonstration demonstration friends during
demonstration

70 Total Marks (Section -1)

43 | P a g e
INTRODUCTION TO IN 44

Checklist for floor plans.

There is one server room and staff lounge located in the office building, meanwhile the
training building has cafeteria and a control room for the Technical Assistant to be on
standby to manage and monitor the network

44 | P a g e
INTRODUCTION TO IN 45

45 | P a g e

You might also like