You are on page 1of 14

NETWORK MANAGEMENT OF BUSSINESS COMPANY

By
James Isaac
Student No. 18ZAD103279
Supervisor: Henry Kane

A Dissertation Submitted in Partial Fulfilment of the Requirements for the Degree/Diploma of Computer
Science, School of Computing Sciences University
Denver, USA

Date Submitted
29/11/2020

Declaration
I declare that this or any other University has not previously submitted this work for the awarding of the
course marks. To the best of my knowledge and belief, this wok contains no material previously
published or written by another person except where due reference is made.

Student Name:
Ahmed Salim Hussein
Signature:
………………………………………….
Date:
29/11/2020

APPROVAL
The project proposal of student name was reviewed and approved by the following:
Supervisor Name: Paul Mwaniki
Signature: …………………

Dedication
I dedicate this study to my friends

Acknowledgement
I thank Mr. Paul Mwaniki for the help in the making of the project

Abstract
The project is about network management in a company to facilitate the activities in the company.
This project aims in making the work done in the company to be easy and achievable. The project also
Makes the company to run well without any problems. It also makes the communication between
employees easy and safe.
The project also aims in making sure that the company data is well secured and the
Connections of computers to the network is also good. The project also shows how the computers
are well connected making the needs and work to be achieved easily in the company. It also shows
how the network is well managed to prevent loss of connections.

Table of Contents

DECLARATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
DEFINITION OF TERMS
ABBREVIATIONS
ACRONYMS
LIST OF FIGURES
LIST OF TABLES

⦁ CHAPTER 1: INTRODUCTION
Networking
Networking is a practice of linking of two or more computing devices such as PCs, printers, faxes etc.,
with each other Connection between two devices is through physical media or logical media to share
information, data and resources. Networks are made with the hardware and software.

There are many different ways to connect your computer to another computer or a network. Using
Windows 2000, you can connect your computer to
- Another computer using a direct cable connection.
-A private network using a modem or an integrated service digital network (ISDN) adapter or a
network adopter card.
- A network using a virtual private network (VPN) connection.
-Another computer by having another computer call your computer.

The interconnected collection of autonomous computers is called computer network. Two computers
are said to be interconnected if they are able to exchange information. The connection need not be via
a copper wire; fiber optics, microwaves and communication satellites can be used.

1.2 Types of Networking:


Wired network
Wireless network
Wired networks:
Wired networks are almost always faster and less expensive than wireless networks. Once connected,
there is little that can disrupt a good-wired connection. Wired networks come in many forms, but the
most popular are HomePNA and Ethernet. HomePNA uses the existing phone line wires in your home
and Ethernet needs special network cabling.

Fig1.2: Wired network


Wireless Networks:
Mobile computers, such as notebook computers and personal digital assistants (PDAs) are the fastest-
growing segment of the computer industry. Many of the owner of these computers have desktop
machines on LANs and WANs back at the office and want to be connected to their home base even when
away from home or en route. Since having a wired connection is impossible in cars and airplanes, there
is a lot of interest in wireless networks.

1.3 Models of Networking


Model means the connectivity of two computers. We have many types of networking models.
(i) Client – Server Model
(ii) Peer to Peer Model (Workgroup Model)
(iii) Domain Model

(i) Client –Server Model


In a Client server model we have one server and many clients. A Client can share the resources of server,
but a server cannot share the resources on clients.
On the point of view of administrator it’s very easy to control the network because we combine with the
server also at security point of view. It is very useful because it uses user level security in which users
have to remember only one password to share the resources.

(ii) Peer to Peer Model (Workgroup Model)


In Peer to Peer networking model all computers are in equal status, that is we cannot manage
centralization, administration security. In Peer to Peer networking client use operating system like
Window 98, Window XP, Window 2000, Window Vista.
(iii) Domain Model
It is a mixture of client server and peer-to-peer model. In this clients can share their resources as peer-
to-peer but with the permission of the server as in client server model therefore it is commonly used
model because in this security is more as we can put restriction on both server and clients.

1.4 Categories of Network


Local Area Network (LAN)
LAN is a computer network that is used to connect computers and work station to share data and
resources such as printers or faxes. LAN is restricted to a small area such as home, office or college.
Devices used in LAN are: HUB and switch. Media for LAN is UTP cables.

Campus Area Network (CAN)


Campus Area Network is a computer network made up of two or more LANs within a limited area. It can
cover many buildings in an area. The main feature of CAN is that all of the computers which are
connected together have some relationship to each other. It will help to interconnect academic
departments, library and computer laboratories. CAN is larger than LAN but smaller than WAN. Devices
used in CAN are: HUB, Switch, Layer-3 switch, Access Point.

Metropolitan Area Network (MAN)


MAN is the interconnection of networks in a city. MAN is not owned by a single organization. MAN can
also be formed by connecting remote LANs through telephone lines or radio links. MAN supports data
and voice transmission. The best example of MAN is cable T.V network in a Wide Area Network (WAN)
WAN covers a wide geographical area which includes multiple computers or LANs. It connects computer
networks through public networks like, telephone system, microwave, satellite link or leased line.
Most of the WANs use leased lines for internet access as they provide faster data transfer. WAN helps an
organization to establish network between all its departments and offices located in the same or
different cities. It also enables communication between the organization and rest world. Devices used in
WAN is only Router

Importance of Networks:
1. Strength business connections
2. Get fresh ideas
3. Advance your career
4. Get access to job opportunities
5. Interconnected business contacts
6. Get career advice and support
7. Build confidence
8. Gain a different perspective

1.2 Problem Statement

Life without internet is pretty hard to fathom. We use it for virtually everything in our lives, even for
connecting with those around us. Life without internet would be hard because there will be no easy and
fast communication between people. It will also be hard because the work that is expected to be done in
a particular duration will take longer to be completed or ending up to be incomplete. It will also make
the economy to not grow.

1.3. Objectives
Objective of project is to make communication possible between far away branches, head-offices of any
organization with lower cost and higher efficiency. In this project we use routing protocols to have
communication of an organization with it’s far away branches. Also to make the work to get done faster
in the required period of time without any delay.

1.4. Justification
The network is important because it helps positively in many ways. Here are some of its importance:
1. An avenue to exchange ideas
2. It makes you noticeable
3. Avenue for newer opportunities
4. Reassessing your qualification
5. Improves your creative intellect
6. An extra resource library
7. Growth in status
8. Growth in self-confidence
9. Develop long-lasting relationships
10. Support from high profiles individuals

1.5 Scope
I am creating a network for a business company which makes the company to run its activities.

⦁ CHAPTER 2: LITERATURE REVIEW

2.1. History of networks


Computer networking as we know it today may be said to have gotten its start with the
ARPANET development in the late 1960s and early 1970s. Prior to that time there were computer
vendor" networks" designed primarily to connect terminals and remote job entry stations to a
mainframe. But the notion of networking between computers viewing each other as equal
peers to achieve "resource sharing" was fundamental to the ARPANET design [1]. The other strong
emphasis of the ARPANET work was its reliance on the then novel technique of packet switching to
efficiently share communication resources among" bursty" users, instead of the more traditional
message or circuit switching. Although the term "network architecture" was not yet widely
used, the initial ARPANET design did have a definite structure and introduced another key concept:
protocol layering, or the idea that the total communications functions could be divided into
several layers, each building upon the services of the one below. The original design had three
major layers, a network layer, which included the network access and switch-to-switch (IMP-to-
IMP) protocols, a host-to-host layer (the Network Control Proto-color NCP), and a "function-
oriented protocol" layer, where specific applications such as file transfer, mail, speech, and
remote terminal support were provided.

2.2 Advantages of networks


These are main advantages of Computer Networks:
• Central Storage of Data –
• Files can be stored on a central node (the file server) that can be shared and made
available to each and every user in an organization.
• Anyone can connect to a computer network –
• There is a negligible range of abilities required to connect to a modern computer
network. The effortlessness of joining makes it workable for even youthful kids to start
exploiting the data.
• Faster Problem solving –
• Since an extensive procedure is disintegrated into a few littler procedures and each is
taken care of by all the associated gadgets, an explicit issue can be settled in lesser time.
• Reliability –
• Reliability implies backing up of information. Due to some reason equipment crash, and
so on, the information gets undermined or inaccessible on one PC, another duplicate of
similar information is accessible on another workstation for future use, which prompts
smooth working and further handling without interruption.
• It is highly flexible –
• This innovation is known to be truly adaptable, as it offers clients the chance to
investigate everything about fundamental things, for example, programming without
influencing their usefulness.
• Security through Authorization –
• Security and protection of information is additionally settled through system. As just the
system clients are approved to get to specific records or applications, no other individual
can crack the protection or security of information.
• It boosts storage capacity –
• Since you will share data, records and assets to other individuals, you need to guarantee
all information and substance are legitimately put away in the framework. With this
systems administration innovation, you can do the majority of this with no issue, while
having all the space you requirement for capacity.

2.3. Disadvantages of networks


These are main disadvantages of Computer Networks:
• It lacks robustness –
• If a PC system’s principle server separates, the whole framework would end up futile.
Also, if it has a bridging device or a central linking server that fails, the entire network
would also come to a standstill. To manage these issues, gigantic systems ought to have
a ground-breaking PC to fill in as document server to influence setting to up and keeping
up the system less demanding.
• It lacks independence –
• PC organizing includes a procedure that is worked utilizing PCs, so individuals will
depend a greater amount of PC work, rather than applying an exertion for their jobs that
needs to be done. Beside this, they will be subject to the primary document server,
which implies that, in the event that it separates, the framework would end up futile,
making clients inactive.
• Virus and Malware –
• On the off chance that even one PC on a system gets contaminated with an infection,
there is a possibility for alternate frameworks to get tainted as well. Infections can
spread on a system effectively, in view of the between availability of different gadgets.4.
Lack of Independence
• Cost of network –
• The expense of executing the system including cabling and equipment can be expensive.

2.4 Simulation of networks

♦Modeling networks of many sizes, from global to within a single floor


♦Tools for diagramming a network's physical layout, including the ability to place vendor-specific
hardware and software
♦The ability to layer network diagrams, collapsing and expanding smaller units, such as a wiring closet,
within a larger unit (for example, a floor)
♦Storage for customized network configuration documentation, including quotes from vendors,
equipment speeds, and so on
♦The ability to specify traffic loads through specific nodes on the network and to use animation to
simulate the performance of the network under those assumptions
♦Simulation of failures of any network device and viewing animated simulations of how routers and
switches can reroute traffic
2.5 Packet tracer
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users
to create network topologies and imitate modern computer networks. The software allows users to
simulate the configuration of Cisco routers and switches using a simulated command line interface.

⦁ CHAPTER 3: METHODOLOGY
3.1 IP Addressing:
An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network.
An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits,
in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal"
notation. Example: 140.179.220.200 It is sometimes useful to view the values in their binary form. 140 .
179 .220 .200 10001100.10110011.11011100.11001000 Every IP address consists of two parts, one
identifying the network and one identifying the node. The Class of the address and the subnet mask
determine which part belongs to the network address and which part belongs to the node address. The
four numbers in an IP address are called octets, because they each have eight positions when viewed in
binary form. If you add all the positions together, you get 32, which is why IP addresses are considered
32-bit numbers. Since each of the eight positions can have two different states (1 or 0) the total number
of possible combinations per octet is 28 or 256. So each octet can contain any value between 0 and 255.
Combine the four octets and you get 232 or a possible 4,294,967,296 unique values. Out of the almost
4.3 billion possible combinations, certain values are restricted from use as typical IP addresses. For
example, the IP address 0.0.0.0 is reserved for the default network and the address 255.255.255.255 is
used for broadcasts. Understanding IP Addresses
An IP address is an address used in order to uniquely identify a device on an IP network. The address is
made up of 32 binary bits, which can be divisible into a network portion and host portion with the help
of a subnet mask. The 32 binary bits are broken into four octets (1 octet = 8 bits). Each octet is converted
to decimal and separated by a period (dot). For this reason, an IP address is said to be expressed in
dotted decimal format (for example, 172.16.81.100).
The value in each octet ranges from 0 to 255 decimal, or 00000000 - 11111111 binary. Here is how
binary octets convert to decimal: The right most bit, or least significant bit, of an octet holds a value of
20. The bit just to the left of that holds a value of 21. This continues until the left-most bit, or most
significant bit, which holds a value of 27. So if all binary bits are a one, the decimal equivalent would be
255 as shown here: 1 1 1 11 1 1 128 64 32 16 8 4 2 1 (128+64+32+16+8+4+2+1=255) Here is a sample
octet conversion when not all of the bits are set to 1. 0 1 0 0 0 0 0 1 0 64 0 0 0 0 0 1
(0+64+0+0+0+0+0+1=65) And this is sample shows an IP address represented in both binary and
decimal. 10. 1. 23. 19 (decimal) 00001010.00000001.00010111.00010011 (binary) There are five IP
classes plus certain special addresses:
Default Network :-
The IP address of 0.0.0.0 is used for the default network.

Broadcast:-
Messages that are intended for all computers on a network are sent as broadcasts. These messages
always use the IP address 255.255.255.255.

Address:-
The unique number ID assigned to one host or interface in a network.

Subnet:-
A portion of a network sharing a particular subnet address.

Subnet mask:-
A 32-bit combination used to describe which portion of an address refers to the subnet and which part
refers to the host.

⦁ CHAPTER 4: IMPLEMENTATION
The project is a communication model which represents a mesh of networking elements
including routers, switches, servers (DHCP and DNS in this model), frame relay, access points, computers
and different types of cables to connect them. The project is based on the technology of Hardware and
Networking, typically on CCNA (Cisco Certified Network Associate). The essence of this project lies in the
configuration of these network elements so that they can communicate with each other as required by
the network administrator.
The kind of access rights given to each network element and the services each computer can use
depends on the configuration done by the network administrator. The project typically shows the
communication model for an organization with its two branches and one headoffice. The objective of
planning such a network model is to make easy the task of actual set up of a network. The
communication model prepared (as in this project) acts as a guide while connecting the real computers
and other network devices like routers, switches, and different types of servers. The detailed objectives
are given as:
Easy to set up actual network:
It becomes so easy to set up an network that is prepared in the
model. It acts in similar way as a map of a building to be built. As it is so difficult job to construct a house
whose map is not available, similarly it is very cumbersome job to start connecting a lot of networking
devices available in absence of a model.
IP addressing:
Assigning the IP addresses to the network is the first and the most important task. IP
addresses are actually unique addresses to each network element. It is the unique code that identified
the network element in the network. In the network model, we have all the elements visible to us at a
time, so we can assign them IP addresses easily, but the same job will be difficult to do on a group of
computers, at different locations.
Easy to make changes and extend the network:
It becomes easy to make further changes in the network if is
network model is available. We can have a look on the settings and the implementations already done
on it and so can modify it. the same job is really hectic to be done on actual network and can result the
introduction of errors in it.
Easy to understand:
A network can be easily understood for its structure, characteristics and
configuration from the network model. In the absence of this, each network element will need to be
visited at different locations and checked for its configuration.
Estimation of the computers and hardware required:
Any organization first prepares a network model, before
actual set up. The main things like number of departments, ad number of computers in each department
etc. are taken care of while preparing the network model. After the network model is ready, the
organization can easily estimate the cost required to have such network, the type of network elements
required and the number of these, thereby avoiding the wastage.
Cabling:
Different network elements needed to be connected by different types of cables. In actual,
mistake can be done while connecting different elements with wrong type of cables and on the wrong
interfaces as well. But a network model provides the types of cables and the detail of interfaces on
which they should be connected, which helps a lot while its actual implementation.

Configuration of network:
A lot of computers, routers and switches connected together can’t be called a
network. Configuration is to be done on each network element that decides the working of network. All
that configuration is already done in the network model. It is easy to do the configuration on the model
itself than to do the same on the actual network first time. This will cause a lot of time waste and errors
as well. When we have a network model, we can easily see the configuration done in the model and can
implement the same on the actual network. This reduces the errors and saves the time.
Routing protocols:
Whenever a group of elements are connected in a network, a routing protocol must be
used in order to tell each network element the way or path to use for transmitting a packet from a
particular source to the destination. The routing protocols are also implemented in a communication
model much easily. The software used for the development of the project is “cisco packet tracer” whose
opening window is shown below in the figure. This work area is used to prepare the network model.
Here we can select the necessary hardware needed to prepare the model and also can alter its
properties such as, we can add interfaces to the routers, wireless LAN cards to the computers.
Before coming to the project, here are some main points that demonstrate the features of packet
tracer, which will be required later to operate the project. Whenever we place the cursor on the
terminal, the packet tracer shows its IP address allocated, gateway, and all other properties which are
assigned to it when it works within a network.
Same is the case, when the cursor is pointed on the router, which is also a networking element, its
various interfaces, active interfaces, IP address, MAC address its hostname etc. are shown to enhance
the understandability
At the bottom of the packet tracer screen, various devices are available for constructing a
communication model. When any device is selected, its corresponding models are available. Example,
when a router is selected, its models in different series eg. 2500, 2600 are displayed. Same in the case of
terminals, different kinds of computers like desktops, laptops, telephones that can be used as data
terminal devices in a network are available.

two similar kind of devices, eg both DTE or DCE, then a cross cable (shown with dotted lines) will be
used. And when different types of devices are being connected, like one DTE and other DCE, the n serial
cables will be used (with an exception of routers).

4.2 Project Details:


The network model which we are designing will be consisting of routers, switches, computers, servers,
hubs. All the above elements together represent an organization. In project, different technology of
networking is implemented. These technologies are like named below:
Routing protocol : OSPF (Open Shortest Path First Protocol)
VLAN (Virtual Local Area Networks)
ACL(Access Control List) both standard and extended ACL implementation
DNS (Domain Name Space)
HTTP
DNS
DHCP server
Configuration of routers, switches, servers, access points and PC’s.
When ever any computer in the communication model is selected, packet tracer shows the window,
shown in the figure below. This window basically shows the options that any computer have. E.g.
command prompt, option to allocate IP address etc. we can use any of the service to ensure that the
terminal connected is working correctly in the network.
Below is the example given to check if one computer is communicating to another. This is done by using
“ping” command in the command prompt. Typing the keyword “ping” and then the IP address shows the
result. The reply is shown from the address to which we wanted to communicate, if they are connected
in right manner, or not blocked explicitly, otherwise, failure is shown.

⦁ CHAPTER 5: CONCLUSION
Computer Networking is a very vast project in the present developing era of electronics and
communication. Now days, computers are used in a wider range. All the organizations are using multiple
computers within their departments to perform their day to day work. Computer network allows the
user to share data, share folders and files with other users connected in a network. Computer
Networking has bound the world in a very small area with it wide networking processes like LAN, MAN,
WAN. Networking inside your organization is valuable also. In larger companies, many people never
meet others in the organization that can facilitate solving problems or getting resources. This project is
forward compatible as we can add more branches at low cost and high efficiency with effective
communication between head office and various branches of an organization.

You might also like