You are on page 1of 13

PROJECT FRONT SHEET

Unit number and


Unit 2: Networking Foundation
title

Submission date Unit 2: Networking Infrastructure

Student Name Student ID GBH220099

Class Assessor name

❒ Summative Feedback:
Feedback:

Grade: Assessor Signature: Date: 04/11/2022

Task 1 - Provide a logical/physical design of the


networked system with clear explanation and
addressing table
1. Physical Topology:
- Physical topology shows how the different elements of the network are organized. The
physical layout represents a network of connected devices and wires. It focuses on the
important elements of the network, ignoring small details such as data transfer and system
type. The design of nodes (computers) and network cables depends on the ease of
installation and configuration of the network. Cost and bandwidth are affected depending
on the system solution. Consider location and distance between nodes. Applications can be
arranged in a ring topology or in a linear connection with a bus topology.
2. Logical topology:
- Logical topology reflects the arrangement and connection of objects. It is the transfer of
data using physical topology. It has no knowledge of the node structure regardless of the
physical topology. Information on the network, such as the type of device selected and its
type, affects the speed and speed of packet transfer. Logical topology guarantees optimal
traffic network control. Data can flow either as a linear pattern of a logic bus or as a logic
loop.

Difference between logical and physical design:

+Physical:
-Physical Topology means the physical layout of the network.

-For example − Ring, Bus, Star, and Mesh.

-In this topology, we are concerned with how data will be transferred from the actual path.

-As per the requirement, we can modify the layout of the network.

-It can affect cost, bandwidth, scalability etc.

-Types of physical topologies are star, mesh, bus, and ring.

-It is an actual route concerned with transmission.

-Physical connection of the network.

+Logical:

-Logical topology means how the network device layout will be shown and how the data will be
transferred.

-For example − Ring and Bus.

-This topology is concerned with the high-level representation of the data transfer.

-There is no change accepted.

-It can affect data delivery.

-Types of logical topologies are logical bus, and logical ring.

-It is a high level representation of data flow.

-Data path followed on the network.

User Requirements

From the model of system components in our generic system, the user component is at the highest
layer. The term user represents primarily the end users of the system, but it can be expanded to
include everyone involved in the system, such as network and system administrators and
management. User requirements is the set of requirements gathered or derived from user input and
is what is needed by users to successfully accomplish their tasks on the system. Typically, when
gathering requirements, everyone involved with that network is considered a potential user.
Figure 2.2 shows some example user requirements.

Figure 2.2: Types of user requirements.

We begin describing requirements at this layer, which will lead to the development of more
specific requirements as we work through each of the components.

From the user perspective, we can ask, "What does it take to get the job done?" This will usually
result in a set of qualitative, not quantitative, requirements. Part of our job in gathering and
deriving user requirements is to make them quantitative whenever possible.

In general, the system should adapt to users and their environments, provide quick and reliable
information access and transfer, and offer quality service to the user. This indicates the following
general requirements:

Timeliness

Interactivity

Reliability

Presentation quality

Adaptability

Security

Affordability

Functionality

Supportability

Future growth

User requirements are the least technical and are also the most subjective. As shown in Figure 2.3,
requirements become more technical as they move from users to the network. All of these
requirements will be developed in more detail as we proceed through the application, device, and
network components.

A logical design of the network based on the specific requirements of the user:

A physical design of this network based on the specific requirements of the user:
Task 2 - Evaluate the design to meet the requirements
DHCP request successfully for all floors
2. Ping from Network Administrator pc - Teacher PC Successful
3. Ping from Network Administrator - Admin's pc Successful
4. Ping between teacher’s PC Successful
5. Ping between student’s PC Successful
6. Ping Student’s PC - Printers Successful
7. Ping Teacher’s PC - Printers Successful

Evaluation of the network design:


Network design refers to the planning of the implementation of a computer network
infrastructure. Network design is generally performed by network designers, engineers, IT
administrators and other related staff. It is done before the implementation of a network
infrastructure.
Here are some Pros and Cons of my network design based on user requirements
+Benefits:
- Central data storage
Files can be stored on a central node (file server) that can be shared and used by all users in the
organization.
Anyone can connect to a computer network.
Connecting to modern computer networks requires certain skills. With easy participation, even
young children can start using data.
- Faster Troubleshooting -
An advanced procedure can be split into several smaller procedures, and each procedure is
handled by all the devices involved, so clear problems can be resolved in less time.
- Reliability
Reliability means backing up your information. If information becomes corrupted or unavailable
on one computer for any reason, such as equipment failure, another copy of similar information
is available on another workstation for future reference, ensuring smooth operation and
uninterrupted further processing.
- It is very flexible
This innovation is known for its adaptability, allowing customers to explore all about basics like
programming without compromising on comfort.
- Security by Authorization -
Security and information protection are also regulated by the system. Only system clients have
access to certain records or applications, so no one else can breach the protection or security of
your information.
- This increases the storage capacity
When you share data, records, and assets with others, you must ensure that all information and
content is properly stored in the box. This system management innovation allows you to perform
most tasks smoothly while keeping all the storage space you need.
+Drawbacks:
- Lack of Durability
If the main server was separated from the PC system, the whole structure would be meaningless.
If a bridge device or central link server fails, the entire network goes down. To handle these
issues, a huge system had to have a new computer to populate with a document server that would
affect the installation and make the system less demanding.
- Lack of independence
Cleaning a personal computer involves procedures carried out with the help of a PC so that
people do not put effort into what they have to do and rely on large amounts of work on the
computer. It is also affected by the original document server, so when split, the structure becomes
meaningless and the client is disabled.
- Viruses and Malware
If a PC in the system is infected, the alternate framework may also be infected. Given the
availability of various gadgets, the infection can effectively spread throughout the system.
- Network cost
The cost of running a system, including cabling and hardware, can be expensive.
Solution for enhance my network design:
Wireless: Wireless connections are very popular these days because they save expensive wires.
However, it is inherently dangerous. Although modern wireless communications have become
much more secure, transmitting data wirelessly in all directions still raises serious security
issues. The most secure way to implement a wireless solution is to ensure that only wireless users
have access to the Internet. This method requires the employee to log back in to work over the air
using a VPN.

Task 2.1 - Install and configure network services and


applications on your choice
DHCP DNS and Web Server
Default DNS
Device Interface IP Address Subnet Mask Gateway Server
PT- FastEthernet0/0/0 192.168.2.2 255.255.255.0
Router FastEthernet0/0/1 192.168.1.2 255.255.255.0
DHCP NIC 192.168.1.4 255.255.255.0 192.168.1.2 192.168.1.9
DNS NIC 192.168.1.9 255.255.255.0 192.168.1.2 192.168.1.9
WEB NIC 192.168.1.7 255.255.255.0 192.168.1.2 192.168.1.9

DHCP SETTINGS
Router Settings
Router(config-if)# ip dhcp pool p1
Router(config)# network 192.168.1.0 255.255.255.0
Router(dhcp-config)# default-router 192.168.1.2
Router(dhcp-config)#exit

Router(config)# ip dhcp pool p2


Router(config)# network 192.168.2.0 255.255.255.0
Router(dhcp-config)# default-router 192.168.2.2
Router(dhcp-config)#exit

Dual Server is a freeware open source self-integrated DNS server for Windows/Linux. It has an
optional built-in DHCP server.

The DHCP server assigns IP addresses to computers, while the DNS server resolves them. You need
a DHCP server if you don't want to manage IP addresses manually or if you have fewer IP addresses
than computers, because the dynamic DHCP server recycles IP addresses across computers.

The DNS server is needed to resolve host names to their IP addresses. Normally your ISP will provide
you with DNS service. You may have your own DNS server, which will resolve hostnames by
forwarding them to the ISP's DNS server and caching the addresses as well.

If you have a home / small office network with Unix / Linux machines, these machines will not be
resolved by each other, as Unix / Linux machines do not support NBNS protocol and you need your
own DNS server. But what about troubleshooting local machines? Your ISP's DNS server doesn't
have this list and neither does your DNS server. Most DNS servers cannot do this (unless you
configure dynamic updates or use static IP addresses and enter them manually).

In addition to remote hosts, this server also automatically resolves DHCP-assigned local machines,
with the added benefit that both DHCP and DNS servers are always synchronous. Plus, there's no
need to create and maintain bulky zone files. Dual DHCP DNS Server is open source freeware.
Additionally, this server is designed for replicated load sharing operation

DNS features include forward and reverse lookup, zone transfer, primary / secondary mode of
operation, MX records, wildcard records, conditional and default forwarding. DHCP Fearures
supports 125 static and dynamic DHCP ranges, range filters, relay agents, and BOOTs. Options can
be specified for DHCP ranges, global, or static hosts.

Both DHCP and DNS can be used. If both services are used, DHCP-assigned hosts are automatically
added to DNS zones.

Task 3 - Implement a networked system based on a


prepared design

Step-by-step how to configure networking devices and


computers in the network.
Task 1: Cable, Erase, and Reload the Routers.
Router#erase startup-config
Router#reload
Task 2: Perform Basic Router Configuration.

R1- R2 – R3 - Configuration
Step 1: Use global configuration commands.
Router1(config)#hostname R1
R1(config)#no ip domain-lookup
R1(config)#enable secret class
Step 2: Configure the console and virtual terminal line passwords on each of the routers.
R1(config)#line console 0
R1(config-line)#password cisco
R1(config-line)#login
R1(config-line)#exec-timeout 0 0
R1(config-line)#line vty 0 4
R1(config-line)#password cisco
R1(config-line)#login
R1(config-line)#exec-timeout 0 0
R1(config-line)#logging synchronous

Step 3: Add the logging synchronous command to the console and virtual terminal lines.
Repeat the same commands for R2 and R3

Task 3- configure interface router

R1(config)#interface fa0/0
R1(config-if)#ip address 172.16.3.1 255.255.255.0
R1(config-if)#no sh

Configure Serial port

R1(config)#interface s0/0/0
R1(config-if)#ip address 172.16.2.1 255.255.255.0
R1(config-if)#clock rate 64000
R1(config-if)#no sh
R1(config-if)#description

R2 Interface

R2(config)#interface fa0/0
R2(config-if)#ip address 172.16.1.1 255.255.255.0
R2(config-if)#no sh

Configure serial ports

R2(config)#interface s0/0/0
R2(config-if)#ip address 172.16.2.2 255.255.255.0
R2(config-if)#no sh

Connecting DTE
R2(config)#interface s0/0/1
R2(config-if)#ip address 192.168.1.2 255.255.255.0
R2(config-if)#clock rate 64000
R2(config-if)#no sh

R3 Interface

R3(config)#interface fa0/0
R3(config-if)#ip address 192.168.2.1 255.255.255.0
R3(config-if)#no sh

R3(config)#interface s0/0/1
R3(config-if)#ip address 192.168.1.1 255.255.255.0
R2(config-if)#no sh

The subnet mask of PC1 is wrong. In real world, should be 255.255.255.0


Pc 1

The subnet mask of PC2 is wrong. In real world, should b 255.255.255.0


Pc2

Pc 3

Static Routing
R1(config)#interface Serial0/0/0
R1(config-if)#ip route 0.0.0.0 0.0.0.0 172.16.2.2
R1 with default route

R2(config)#ip route 192.168.2.0 255.255.255.0 192.168.1.1


R2(config)#ip route 172.16.3.0 255.255.255.0 s0/0/0

R2 with next hub and exit interface


R3(config)#ip route 172.16.0.0 255.255.255.0 192.168.1.2
R3(config)#ip route 172.16.1.0 255.255.255.0 192.168.1.2
R3(config)#ip route 172.16.2.0 255.255.255.0 Serial0/0/1

Configuring simple E-Mail server. Automatic cable configuration

Device Interface IP Address Subnet Mask Default Gateway


GigabitEthernet0/0/0 192.168.1.1 255.255.255.0
R1
GigabitEthernet0/0/1 192.168.2.1 255.255.255.0
PC 1 NIC 192.168.1.2 255.255.255.0 192.168.1.1
PC 2 NIC 192.168.1.3 255.255.255.0 192.168.1.1
SW FastEthernet0/1 - - -
Sever0 NIC 192.168.2.2 255.255.255.0 192.168.2.1

Email Server Configuration


Make sure you configure email for clients in the server and set the domain name.

Client PC configuration
Network maintenance basically means you have to do what it takes
in order to keep a network up and running and it includes a number
of tasks:

Troubleshooting network problems.

Hardware and software installation/configuration.

Monitoring and improving network performance.

Planning for future network growth.

Creating network documentation and keeping it up-to-date.

Ensuring compliance with company policies.

Ensuring compliance with legal regulations.

Securing the network against all kind of threats.

To give you an idea what a network maintenance model is about and


what it looks like, here’s an example for FCAPS:

Fault management: we will configure our network devices (routers, switches, firewalls, servers,
etc.) to capture logging messages and send them to an external server. Whenever an interface
goes down or the CPU goes above 80% we want to receive an e-mail so we can see what is going
on.

Configuration management: Any changes made to the network have to be logged. We will use a
change management so relevant personnel will be notified of planned network changes. Changes
to network devices have to be reported and acknowledged before they are implemented.

Accounting management: We will charge (guest) users for usage of the wireless network so
they’ll pay for each 100MB of data or something. It’s also commonly used to charge people for
long distance VoIP calls.
Performance management: Network performance will be monitored on all LAN and WAN links
so we know when things go wrong. QoS (Quality of Service) will be configured on the
appropiate interfaces.

Security management: We will create a security policy and implement it by using firewalls,
VPNs, intrusion prevention systems and use AAA (Authorization, Authentication and
Accounting) servers to validate user credentials. Network breaches have to be logged and a
appropiate response has to be made.

Test Results:

DHCP at the 2nd failed DHCP Overall Successful rate is 100% (13/13 devices got IP address
from DHPC).

Overall: I have a network system still not working properly and the process. It didn't work as
expected. Also, my network solution still does not meet the original user requirements. A nearby
educational institution due to a dangerous ping between devices on the 3rd floor above On the
positive side, the evidence above shows that the network system operates with little or no delay
or error on the first two floors. Network systems can also be upgraded and expanded to
accommodate additional computers. You can improve network security by installing a wireless
access point device and a firewall.

Things I need to improve: As mentioned above, due to the large number of computers, devices
are connected to the switch by: The cost of the cable itself or the cost of repairing/buying a new
cable is high. More wireless settings These costs can be effectively reduced. It also identifies
other ways to improve the security of this system. It is necessary if the design is practical.
Extension is only possible when two conditions are met Network systems can grow significantly.

CONCLUSION

When I completed this projectt , I learned and partially understood how to design and implement
a simple network. The project is a simple educational institution based on your requirements.
However, my work had some errors. Fix configurations that have not yet been recognized. To
help I learn and explore networks in the future, improve and develop my networking skills and
focus more on other big projects.

References:

https://www.tutorialspoint.com/what-are-the-differences-between-physical-and-logical-
topology
https://flylib.com/books/en/2.809.1.24/1/

https://networklessons.com/cisco/ccie-routing-switching-written/network-maintenance

https://www.linkedin.com/pulse/11-tips-design-secure-efficient-scalable-network-joe-baker

https://www.geeksforgeeks.org/advantages-and-disadvantages-of-computer-networking/

https://graduateway.com/difference-logical-physical-design-network/

You might also like