You are on page 1of 25

PROGRAM TITLE: NETWORKING

UNIT TITLE: Unit 02: networking

ASSIGNMENT NUMBER: ASSIGNMENT 2

ASSIGNMENT NAME: Network Design and Implement 

SUBMISSION DATE: 12/10/2021

DATE RECEIVED: …………………………………………….

TUTORIAL LECTURER: TRẦN HOÀNG BÁCH

WORD COUNT: 1000

STUDENT NAME: Hoàng Thanh Lịch

STUDENT ID: BKC12253

MOBILE NUMBER: 0366642541

1
Summative Feedback:

GRADE :

Internal verification:

2
Table of Contents

I. The current status and the need to build the network of Gold Star.

1. Current state of the company.

2. Demand.

LO3: Design efficient networked systems.

[P5] Design a networked system to meet a given specification.

I. Recommend networking devices that will be utilized to set up the network system of the new
office. The recommendation should include the device image and specification.
1. Switch
2. Router
3. Server
4. Optical fiber
5. Firewall
6. Modem
II. Using appropriate tools, design a network diagram showing the physical topology of the network.
[P6] Test and evaluate the design to meet the requirements and analyze user feedback
1. Recommended Network Devices
2. Network Addressing implementation
3. Network Design Physical Topology

[M3] Install and configure network services and applications on your choice.

1. Router configuration
2. Server configuration
3. SSH configuration
4. Firewall configuration
LO4: Implement and diagnose networked systems.

1
[P7] Implement a networked system based on a prepared design.
[P8] Document and analyse test results against expected results.
[M4]Recommend potential enhancements for the networked systems
[D2] Design a maintenance schedule to support the networked system.
[D3] Use critical reflection to evaluate own work and justify valid conclusions.

2
I) The current status and the need to build the network of Gold Star 1. Current state
of the company
1. Current state of the company
- With completely new construction status (or already have a network but not standardized).

-Companies with less than 100 people are divided into departments: General Manager, administration,
IT Operations, Software Engineers, HR.

4. Demand

- Requires each room to have a private network, have servers to store information, and run mail, dns,
dhcp services and need to access outside the internet, no high availability required.

- No redundancy and high availability is required when designing the network Initial
investment costs are limited.

- Provides easy administration and quick fixes when problems occur


- Still offers later network scalability.
LO3: Design efficient networked systems.

[P5] Design a networked system to meet a given specification.

I. Recommend networking devices that will be utilized to set up the network system of the new office. The
recommendation should include the device image and specification.
1. Switch (WS-C2960 + 24LC-S)
Information: Cisco is introducing the Cisco Catalyst 2960 Series Power over Ethernet (PoE) Switches
with LAN Lite Software, new members of the Cisco Catalyst 2960 Series of fixed-configuration
standalone switches for entry-level enterprise, midmarket, and small branch office networks. These
three Cisco Catalyst 2960 Switches with LAN Lite Cisco IOS Software simplify the migration from
nonintelligent hubs and unmanaged switches to a fully scalable managed network. The LAN Lite Cisco
IOS Software provides entry-level security, quality of service (QoS), PoE, and availability capabilities
while lowering the network total cost of ownership. Below table provides brief descriptions of the Cisco
Catalyst LAN Lite switches.

3
Table shows the quick parameters.

Table shows the Specification.

4
5
6
7
2.
Router (Cisco 2911/K9)

The Cisco 2911 Integrated Services Router (ISR) delivers highly secure data, voice, video, and application
service. Key features include:
 3 integrated 10/100/1000 Ethernet ports (RJ-45 only)
 1 service module slot
 4 enhanced high-speed WAN interface card slots
 2 onboard digital signal processor (DSP) slots
 1 Internal Service Module slot for application services
 Fully integrated power distribution to modules supporting 802.3af Power over Ethernet (PoE) and
Cisco Enhanced PoE
- Security
 Embedded hardware-accelerated VPN encryption for secure connectivity and collaborative
communications Integrated threat control using Cisco IOS Firewall, Cisco IOS Zone-Based Firewall,
Cisco IOS IPS, and Cisco IOS Content Filtering
 Identity management using authentication, authorization, and accounting (AAA) and public key
infrastructure
- Voice
 High-density-packet voice DSP module, optimized for voice and video support
 Standards-certified VoiceXML browser services
 Cisco Unified Border Element capabilities
 Cisco Unity Express voicemail support
 Support for Cisco Communications Manager Express and Survivable Remote Site Telephony

8
Specification

9
3. Server

A server is a computer or system that provides resources, data, services, or programs to other
computers, known as clients, over a network. In theory, whenever computers share resources with client
machines they are considered servers. There are many types of servers, including web servers, mail servers,
and virtual servers.

An individual system can provide resources and use them from another system at the same time. This
means that a device could be both a server and a client at the same time.

Some of the first servers were mainframe computers or minicomputers. Minicomputers were much
smaller than mainframe computers, hence the name. However, as technology progressed, they ended up
becoming much larger than desktop computers, which made the term microcomputer somewhat farcical.

Initially, such servers were connected to clients known as terminals that did not do any actual
computing. These terminals, referred to as dumb terminals, existed simply to accept input via a keyboard or
card reader and to return the results of any computations to a display screen or printer. The actual computing
was done on the server.

Later, servers were often single, powerful computers connected over a network to a set of less-
powerful client computers. This network architecture is often referred to as the client-server model, in which
both the client computer and the server possess computing power, but certain tasks are delegated to servers.
In previous computing models, such as the mainframe-terminal model, the mainframe did act as a server even

10
though it wasn’t referred to by that name.

As technology has evolved, the definition of a server has evolved with it. These days, a server may be
nothing more than software running on one or more physical computing devices. Such servers are often
referred to as virtual servers. Originally, virtual servers were used to increase the number of server functions a
single hardware server could do. Today, virtual servers are often run by a third-party on hardware across the
Internet in an arrangement called cloud computing.

A server may be designed to do a single task, such as a mail server, which accepts and stores email and
then provides it to a requesting client. Servers may also perform several tasks, such as a file and print server,
which both stores files and accepts print jobs from clients and then sends them on to a network-attached
printer.

4. Optical fiber

Fiber optics, or optical fiber, refers to the medium and the technology associated with the transmission of information as
light pulses along a glass or plastic strand or fiber. Fiber optics is used for long-distance and high-performance data
networking.

Fiber optics is also commonly used in telecommunication services such as internet, television and telephones. For
example, Verizon and Google use fiber optics in their Verizon FIOS and Google Fiber services, respectively, providing
Gigabit internet speeds to users.
Fiber optic cables are used as they hold a number of advantages over copper cables, such as higher bandwidth and
transmit speeds.
A fiber optic cable can contain a varying number of these glass fibers -- from a few up to a couple hundred. Surrounding
the glass fiber core is another glass layer called cladding. A layer known as a buffer tube protects the cladding, and a
jacket layer acts as the final protective layer for the individual strand.
- How fiber optics works
Fiber optics transmit data in the form of light particles -- or photons -- that pulse through a fiber optic cable. The glass
fiber core and the cladding each have a different refractive index that bends incoming light at a certain angle. When light
signals are sent through the fiber optic cable, they reflect off the core and cladding in a series of zig-zag bounces,

11
adhering to a process called total internal reflection. The light signals do not travel at the speed of light because of the
denser glass layers, instead traveling about 30% slower than the speed of light. To renew, or boost, the signal
throughout its journey, fiber optics transmission sometimes requires repeaters at distant intervals to regenerate the
optical signal by converting it to an electrical signal, processing that electrical signal and retransmitting the optical signal.
Fiber optic cables are moving toward supporting up to 10-Gbps signals. Typically, as the bandwidth capacity of a fiber
optic cable increases, the more expensive it becomes.
- Advantages and disadvantages
Fiber optic cables are used mainly for their advantages over copper cables. Advantages include:
 Support of higher bandwidth capacities.
 Light can travel further without needing as much of a signal boost.
 They are less susceptible to interference, such as electromagnetic interference.
 They can be submerged in water -- fiber optics are used in more at-risk environments like undersea cables.
 Fiber optic cables are stronger, thinner and lighter than copper wire cables.
 They do not need to be maintained or replaced as frequently.
However, it is important to note that fiber optics do have disadvantages users should know about. These disadvantages
include:
 Copper wire is often cheaper than fiber optics.
 Glass fiber requires more protection within an outer cable than copper.
 Installing new cabling is labor-intensive.
 Fiber optic cables are often more fragile. For example, the fibers can be broken or a signal can be lost if the
cable is bent or curved around a radius of a few centimeters.
- Fiber optics uses
Computer networking is a common fiber optics use case due to optical fiber's ability to transmit data and provide high
bandwidth. Similarly, fiber optics is frequently used in broadcasting and electronics to provide better connections and
performance. Internet and cable television are two of the more commonly found usages of fiber optics. Fiber optics can
be installed to support long-distance connections between computer networks in different locations.
Military and space industries also make use of optical fiber as a means of communication and signal transfer, in addition
to its ability to provide temperature sensing. Fiber optic cables can be beneficial due to their lighter weight and smaller
size.
Fiber optics is frequently used in a variety of medical instruments to provide precise illumination. It also increasingly
enables biomedical sensors that aid in minimally invasive medical procedures. Because optical fiber is not subject to
electromagnetic interference, it is ideal for various tests like MRI scans. Other medical applications for fiber optics
include X-ray imaging, endoscopy, light therapy and surgical microscopy.

5. Firewall ASA 5520


The term FireWall is derived from an in-built design technique to prevent and limit fires. In Information Network
Technology, FireWall is a technique integrated into the network system to prevent unauthorized access to protect
internal information sources as well as limit the intrusion into the system of some parameters. Other unwanted news.
FireWall Internet is a collection of devices (including hardware and software) placed between the network of an
organization, a company, or a country (Intranet) and the Internet.

12
Technical specifications Detail
Product code ASA5520-K9
Display 5 Fast Ethernet ports; 2 Gigabit Ethernet + 3
Fast Ethernet ports*
performance 256 MB
RAM 64 MB Flash
Throughput:
Application Control (AVC) Up to 170 Mbps

Serial Ports 2 RJ-45, console and auxiliary


SSL VPN Peers* Included/ Maximum) 2/750
Concurrent Connections  50,000; 130,000*
New Connections/ Second 9000
Firewall Throughput Up to 450 Mbps
Maximum Firewall and IPS Throughput Up to 225 Mbps with AIP-SSM-10
Up to 375 Mbps with AIP-SSM-20
Up to 450 Mbps with AIP-SSM-40
3DES/AES VPN Throughput Up to 225 Mbps
Size (H x W x D) 1.75 x 7.89 x 6.87 in. (4.45 x 20.04 x 17.45 cm)

6. Modem

13
Wifi Modem is a device that connects to the ISP network via phone lines, Coax or external Ethernet
connections. Meanwhile, the Wifi Router is the gateway to share the Internet connection for devices such as
laptops, phones and tablets.
II. Using appropriate tools, design a network diagram showing the physical topology of the network.

[P6] Test and evaluate the design to meet the requirements and analyze user feedback
1. Recommended Network Devices

14
- Switches have switching performance suitable to meet the requirements of the system.
- Designed in an open structure, complying with international standards for design,
construction and installation
- Initial cost is low
- Helps to maximize the operational coordination between devices while providing easy and flexible

management in detection and recovery

2. Network Addressing implementation


- Implementing the connection, testing IPv6 transformation (after reviewing and evaluating the
overall network, the service will be proposed to the connected units to test);
- Scope of testing applications and services: Testing IPv6 application for Internet connection, small-
scale DNS and Website services; Tested with LAN and Wifi systems connected to the Internet using
IPv6.
- There are 2 protocols that are IPv4 and IPv6

- Usually people use IPv6 because it has many advantages over IPv4:

 TCP / IP management process made easier.


 Routing ability, good configuration and more stable than IPv4.

 Better support for mobile devices.


3. Network Design Physical Topology
- Provides a full range of tools to manage WLAN operations under the Unified Wireless Network model,
easily scalable.
- Low investment costs, only invest for the right needs at the beginning.
- With the centralized management of APs, Wireless LAN Controller (WLC), brings the following
highlights:
+ Management: Centralized management and security of Access Points. Reduce deployment time
as well as manage and operate APs. Easy to manage as the number of APs grows
+ Layer 2 Fast Secure Roaming: allows users to roam freely between APs in a subnets (VLAN)
+ Layer 3 Fast Secure Roaming: allows users to roam freely between APs in different subnets
+ Load Balancing: Automatically balancing the load data from wireless users between adjacent
APs
+ Guest Networking: provides WLAN connectivity for customers and business partners while
ensuring the highest level of network security.
[M3] Install and configure network services and applications on your choice.

15
1. Router configuration
- enable all routers, enable ports and set ip addresses for them.

- learn unknown network ranges and send ip helper-address to dhcp server.

2. Server configuration
 DHCP server
- Server’s ip configuration

- service configuration

16
 DNS server
- Server’s ip configuration

- give gmail server 1 domain name

17
 Gmail server
- create user and password for each employee

- configure mail on each device

18
3. SSH configuration
- repeat the same between switch and router

4. Firewall configuration
Step 1: Access Global Configuration Mode:
Step 2: Configure hostname, domain name, enable password, banner mode:
Step 3: Configure AES to encrypt Password:
Step 4: VLAN configuration
Step 5: Configure the Default Static Route on the Cisco ASA
Step 6: Configure Telnet, SSH on Cisco ASA
Step 7: Configure NTP on Cisco ASA

19
Step 8: Configure DHCP Server on Cisco ASA
LO4: Implement and diagnose networked systems.
[P7] Implement a networked system based on a prepared design.

- Configure router, switch,server,…

- Perform ping check between computers:

+ Step 1: Use the Windows + R key combination to open the Run dialog box. Then, type cmd in the search box,
and click OK.

+ Step 2: Check the network ping in cmd:

[P8] Document and analyse test results against expected results.


1. Test No : 4

2. Test Plan Name

- Test connection between devices other

- Test ping between computers

- Check for network security

3. Test Procedures

20
- Check the physical connections

- Verify that you can log on

- Check the network configuration: Click the Start button, type cmd and press Enter. Then, enter the command ip
config /all and press Enter.

- Verify that the computers can ping each other

4. Expected Result: The network is working relatively well

5. Actual Result: There are still some security gaps

[M4] Recommend potential enhancements for the networked systems.

- The network topology has been optimized quite well but it is still quite simple and may stop working if a key device
fails. so the network structure can be further improved in the future:

 add routers to increase redundancy

 add redundant servers

 upgrade to private network

- Wireless technology based on the "cloud" model (centralized management over the network) has been changing the
way wireless networks are managed. Meraki with online control system model "cloud" - Cloud Controller and with a
variety of equipment, suitable for deploying network systems for any model.

[D2] Design a maintenance schedule to support the networked system.

Maintenance is to protect and minimize system failures, this can increase the productivity and profit of the user. Can
warn about problems that may occur in a short time so that businesses have a backup plan, ensuring the management
of the operating system at the highest efficiency. Make sure the device is replaced when the system has a problem that
cannot be overcome. Checked software, data backup and new system software utilities.

Periodic maintenance items:

1. Server maintenance

To maintain the server server, it is necessary to understand the procedures to maintain and control the
following items:

 Test your network security configurations

 Install, test and optimize configuration of anti-virus, anti-virus and other software

 Control access rights and network, server

21
 Store important documents in storage devices before performing maintenance

 Ensuring that all browsers and applications can operate stably

 Backup server configuration to ensure the server works normally and correct specified parameters

 Clearly record, maintenance time

2.Workstation maintenance

 Check the configuration and anti-virus software of the workstation when connecting to the server

 Backup and store important documents to devices to avoid loss or reversal during maintenance

 Optimizing software, applications and cleaning garbage of the system

 Make sure the applications are operating properly

 Clearly record, maintenance time

3.Network maintenance

 Configure the network for computers to access the system

 Check network cabling systems

 Arranging server map and connecting machines in accordance with technical standards

 Check, test and test the cable network to confirm whether the transmission speed is correct or not

 Clearly record, maintenance time

 - Inspection frequency: Once a month, the sending company should check the entire system and troubleshoot
problems of the system. In addition to the periodic system check, when the company has a system
problem or has a problem needing advice on the system, I will send a technician to support to ensure
the operation of the company during that time.

[D3] Use critical reflection to evaluate own work and justify valid conclusions.
After designing and building this system, I found that this system is very useful and effective for the
company's operation. Here are the reviews that I give after building the system:

22
o Thanks to the centralized management of the file server and other systems, the company's operations
are also faster and more cost-effective.

o Convenient for use by employees and management team in the company

o Information is more secure and easier to manage

o Help the manager can access information quickly and anywhere, just there is the internet

o Budget issue suitable for a small and medium company

o It is possible to develop the system in the future

REFERENCES

https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-c03393415

http://techsys.vn/thiet-bi-chuyen-mach-cisco-wsc2960-24lcs-poe-2646.html

https://www.router-switch.com/cisco2911-k9-p-156.html#tab-specification

https://www.techtarget.com/searchnetworking/definition/fiber-optics-optical-fiber

And so on.

23

You might also like