You are on page 1of 41

INDIVIDUAL ASSIGNMENT

CT043-3-1-IN
INTRODUCTION TO NETWORKING
APU1F2203CS(IS/DF), APU1F2109IT, APU1F2109SE,
APD1F2109IT, APD1F2203CS(IS/DF), APD1F2203SE
HAND OUT DATE: 8th April 2022 [Wk3]
HAND IN DATE: 19th June 2022 [Wk12]
Weightage: 40%
Online Submission Time before = 23: 59 PM Malaysia Time
Student Name: Chang Zun Ni
Student ID: TP067980
INSTRUCTIONS TO CANDIDATES:
1. Assignment is to be submitted through online submission (Moodle).
2. Students are advised to underpin their answers with the use of
references (cited using the APA name system of Referencing).
3. Late submission will be awarded zero (0) unless Extenuating
Circumstances (EC) are upheld.
4. Cases of plagiarism will be penalized.
5. You must obtain 50% overall to pass this module.
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

TABLE OF CONTENTS

1.0 Introduction……………………………………………………...………………………………2

2.0 Floor Plan


2.1 Image of the Floor Plan……………………………………...…………………………..3
2.2 Design Concept of the Floor Plan……………………………………………………….4

3.0 Analysis and Justification


3.1 Central Area…………………………………………………………….……………….6
3.2 Technical Assistants’ Department………………………………………………………8
3.3 Development Hub……………………………………………………………………….9
3.4 Server Room and Break Room………………………………………………………...10
3.5 Conference Room……………………………………………………..……………….11
3.6 Restroom……………………………………………………………………………….12

4.0 Individual Network Diagram


4.1 Zone 6: Technical Assistants’ Department…………………………………………….14
4.2 Zone 7: Server room and Break room………………………………………………….14
4.3 Zone 8: Development Hub and Central Area……………………….…………………15
4.4 Zone 9: Conference room and Restroom…………………………...………………….15

5.0 Configurations
5.1 Routers and Switches Configurations…………...……………………………………..16
5.2 Access Point and Cloud Configurations……………………………………………….24
5.3 Server Configurations………………………………………………………………….26
5.4 End Devices and IoT Devices Configurations…………………………………………33

6.0 Conclusion……………………………………………….…………………………………….38

7.0 References…………………………………………………………..…………………….……39

1
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

1.0 Introduction

System Auto.com is a well-known enterprise software company that provides scalable


solutions for both the corporation and B2B SaaS sectors. Many of the world's largest corporations rely
on them as a technology partner to manage and monitor their Microsoft BizTalk and Azure Serverless
deployments. System Auto has been striving since 2011 in Kuala Lumpur, Malaysia. The company
emphasizes employee values and creates an environment for employees may learn, grow, invent, and
create initiatives. Recently, CEO of System Auto.com has announced a new branch situated in Penang
will be operating soon. However, the CEO wishes to rearrange the current network infrastructure in
the KL site and establish to a new network architecture. The KL building features two stories, as does
the proposed Penang building.

This particular assignment focuses on the second floor of KL site which will be emphasized in
terms of its floor plan, restructured network design, devices used, and ways to configure them. Starting
from its uniquely built premise and floor plan, followed by the meaning behind the structure. By
implementing digital transformation within the company, this floor may also contain a variety of IoT
devices from the basic such as lights and fans to CCTV and RFID devices. System Auto has ensured
employees’ comfort and convenience while working here as to prepare suitable workplaces where
there are PCs, tables and chairs which are considered as essential. VOIP are readily available in each
department as to communicate with people from different location. And lastly, step by step
configurations are explained alongside with the usage.

2
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

2.0 Individual Floor Plan

2.1 Image of the Floor Plan & Legends

Figure 1 Floor Plan

3
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

2.2 Design Concept of the Floor Plan


The new KL site floorplan for System Auto.com is inspired by one of the rarest and exotic
flowers on earth, the Rafflesia flower. It is the biggest flower found in Malaysia, Southeast Asia, and
the world; In which the company aspires and aims to expand as a unique multinational company. The
flower has no leaves, stems, or roots. Therefore, our building site will only consist of the shape of the

Figure 2.1 A Hibiscus Flower (Rafflesia Arnoldii - the Largest Flower on Earth, n.d.)

There are a few characteristics of the Rafflesia flower that we have implemented in the
building and floor plan design.

Figure 2.2 Characteristics of the Hibiscus Flower (Diway et al., 2022)

4
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

The Rafflesia flower has five petals, that will act as separation for the departments given and a
few sections added on. As this specific individual component is dedicated in creating only the second
floor of KL floor plan, this will include a conference room, development hub, rooms for technical
assistants to monitor the network, server room which is combined with the break room and finally the
restroom.

The perigon lobes which is known as the dots on petals, will represent the furniture and devices
in the layout. To make the floor plan even more interesting, some of the building petals will be
sectioned differently.

5
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

3.0 Analysis and Justification

3.1 Central Area

Figure 3.1 Floor Plan of Central area

The central disc acts as the platform for the middle ground on the second floor for people to
walk around to different sections. This part of the building is equipped with a few tables and chairs to
let people settle down in an open-air place. Not to mention it has a piano situated there for whoever
that wishes to play with it, the sounds will travel to nearby areas of the building so people can enjoy
the sound of music.

The anthers of the flower, represents the spiral staircase is situated in the central part of the
building to enable people to go up and down from the first to the second floor. The diaphragm
aperture, which is the middle part that looks similar like a dome with a hole in the middle concept will
be applied as a skylight above the staircase for the purpose of letting natural lighting in the building.
This design was inspired by the staircase at Bank Negara Malaysia Museum and Art Gallery.

6
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

Figure 3.2 Spiral Staircase and Skylight reflection at Bank Negara Malaysia Museum and Art Gallery.

Malaysia is a tropical country, so chances of getting sunlight are very high. As an


environmentally sustainable company, System Auto.com implemented a solar panel which will
convert the sunlight into electrical energy. Thus, saving the earth and its wallet while operating the
business.

7
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

As safety is priority, this area is equipped with two CCTVs to monitor the people going

through this area. In terms of fire hazards, a smoke detector is present to automatically enable the siren
to ensure all employees can hear and are aware there is an emergency.3.2 Technical Assistants’
Department

The technical assistants’ department is located on the upper right side of the building. Its layout
is inspired by the iconic geometric spiral shape of spider webs. The threads symbolize the importance
of networking on establishing strong connections so devices can link together, adding more devices
and layers to make the networking ecosystem larger. As this is a technical assistants department to
monitor the network, they are the ones that will troubleshoot problems related to ensure all devices can
communicate with each other in the network (KayO, 2016). Metaphorically speaking as if they are the
spiders, when bugs appear in the web or the threads are broken, they are responsible to fix the web and
make sure everything is functioning smoothly.

Altogether there are ten technical assistants’ rooms, equipped with the essentials such as tables,
chairs, PCs, and plants. The most interesting part of the rooms are the doors. Every individual
employee who works in this area shall be granted a RFID card because there will be RFID readers

Figure 3.3 Floor Plan of Technical Assistants' Department


situated beside the doors. Every card and reader are already set with a special dentification number. A

8
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

card and a reader with the same identification number to pair with each other can enable access to
open the door. Employees are requested to scan the card to the reader to enable access to a specific
door which will open after, one can only gain access to a specific room as it is their own workplace.
This will ensure the security of no outsider can simply enter the rooms to steal private information.

Outside the technical assistants’ rooms, there lies a small hallway equipped with a CCTV to
monitor the people going through the area, three printers for employees to print their work if required,
a bookcase for archived record books and files, lastly a VOIP dedicated for this department to received
and call employees from other departments.

3.3 Development Hub

Figure 3.4 Floor Plan of Development Hub

The development hub is located on the lower left side of the building. Its layout is inspired by
the pinnate vernation pattern veins on the leaves. Veins on the leaves are to transport nutrients between
stem and leaf to keep the whole plant alive and growing. Just like the purpose of the development hub,
it is for employees have a space to share ideas from different backgrounds so that it helps the company
to create and develop new outputs to enable the company grow to greater heights (no_name12, 2019).

There are in total of six rooms in the development hub. Each room are equipped with a table,
multiple chairs depending on which room is used, and a TV which is used as a medium to project

9
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

employee’s work etc. Six laptops are included which shows if there were employees around which
will be wirelessly connected to a Access Point. Outside the development hub’s rooms, there lies a
small hallway equipped with a CCTV to monitor the people going through the area, three printers for
employees to print their work if required, a bookcase for archived record books and files, lastly a
VOIP dedicated for this department to received and call employees from other departments.

3.4 Server room and break room

Figure 3.5 Floor Plan of Breakroom and Server room

The server room is combined with the break rooms, located at the lower right side of the
building. This side of the block is sectioned as a simple maze. The first server carries the HTTP, Email
and Web server, meanwhile the second server is dedicated for the IoT server. Therefore, there is a
small room dedicated to becoming the company’s server room. A temperature monitor is present to
ensure the server room’s temperature is stable.

Meanwhile the other rooms are meant for employees to take a break and have some time to rest
and play games. The middle part which has a sofa, and the hallway down to the ball pool has a coffee
making machine placed for employees to grab coffee on the second floor. Meanwhile, the closed room
near the end is provided with a sofa, coffee table and a TV which employees can connect their laptops
or consoles to play games or watch movies. That particular room will also feature a music player and a
speaker so employees can enjoy some relaxing music.

10
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

11
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

3.5 Conference room

Figure 3.6 Floor Plan of Conference room

The conference room is located on the middle upper part of the building, promising a large area
for all employees to have meetings on notable events. The waiting area is furnished with a few seats
and a cooler to fill up water, it is a place for employees to gather before and after meetings. Two
CCTVs are situated each in the conference room itself and waiting area to monitor the area. The
conference room is furnished with a large glass and wood table, and multiple chairs on the side, and a
big television for presenters to project their content. A printer is readily available in the room for
employees to print out their work if needed and a VOIP to receive from or call to different
departments. Six tablets are included shows if there were employees around which will be wirelessly
connected to an Access Point. Besides that, the aircon and windows in this room can be controlled via
WIFI is placed to ensure employees feel cool and comfortable alternating the sources while not
required to manually adjust anything. Lastly, a humidifier is present to increase the humidity of the
room.

12
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

3.6 Restroom

Figure 3.7 Floor Plan of Restroom

The restroom is located at the upper left side of the building. To ensure a wide and comfortable
area, have decided to separate the male and female restrooms for privacy and safety. The restroom is
equipped with a few toilets and sinks, a separation part at the front with a bench for people to wait for
someone. Restrooms are places which people rarely gather; therefore, sensors are built into each
restroom. When the sensors detect someone going in, it will automatically turn on the lights and fans
which will be connected to an Access Point. This can help save electricity as it will only be used when
needed; plus, there is no need for people to manually turn them on.

13
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

4.0 Individual Network Diagram

Figure 4.1 Network Diagram of KL site Floor 2

14
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

4.1 Zone 6: Technical Assistants’ Department

Figure 4.1 Network Diagram of Zone 6: Technical Assistants' Department

4.2 Zone 7: Server room and Break room

Figure 4.3 Network Diagram of Zone 7: Server room and Break room

15
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

4.3 Zone 8: Development Hub and Central Area

Figure 4.4 Network Diagram of Zone 8: Development Hub and Central Area

4.4 Zone 9: Conference room and Restroom

16
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

5.0 Configurations

5.1 Router & Switches

Hostnames

Figure 5.1.1.1 Router hostname in show run


mode

Figure 5.1.1.2 Router hostname in privileged EXEC mode

Configuration for Router and Switch


All routers and switches will have their hostnames changed to indicated with device is located in.
Packet Tracer has factory set names for all devices; hence it is recommended to change it for easier
recognition. To configure the hostname, administrator must enable privilege execution mode, then
configure terminal. Afterwards, ‘hostname’ followed by the name itself is typed. Once hostname is
configured, the new hostname will appear beside every line command.

System Clock

Figure 5.1.11 System Clock in show run mode at PC Terminal

Configuration for Switch


A system clock is implemented so all the devices in the network has a time protocol to follow, hence
the timing is standardized. Having a system clock is helpful in terms of having a record to trace back
when specific events happen in various aspects such as security, important announcements and etc.
To configure the internal clock of the switch, enable privilege executive mode and type ‘clock set ?’.
From there the configurations will progress from the time [hh:mm:ss ?], month and day [mmm
dd ?], year [yyyy ?] then save. Users can check the clock system using ‘show clock’ command.

17
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

Line Console 0

Figure 5.1.2.1 Line console configuration in show run mode

Figure 5.1.2.3 Requesting passwords to enable User EXEC mode at Router

Configuration for Router and Switch


Line console is the console port of the switch and router which enables administrators to have direct
access to the devices mentioned. For security reasons, administrators must configure passwords for
the devices. It acts as the immediate first layer security to ensure the person accessing the device is
one of the administrators. Once the person has entered the correct password, he/she can access user
execution mode >. Password can be configured in privilege execution mode under line console by
first activating with the command ‘line con 0’. Afterwards, type ‘password’ followed by the
password wished to set. Lastly, the next command line ‘login’ shall indicate the password is set for
the router or switch. One can verify the configurations by exiting from the device. Once back to the
device’s CLI, the MOTD banner will appear and it requires the user to sign into the device.

Enable Password

Figure 5.1.12.1 Enable password and secret password configurations in

Figure 5.1.12.2 Requesting passwords to enable Privileged EXEC mode at Router

Configuration for Router and Switch


‘Enable password’ is another password is set again to ensure tighter security. One can only access
privilege execution mode after going through the secret password. It acts as a second layer security
to ensure the is actually the administrators person accessing the device. This can be easily
configured under line console of the devices using the command ‘enable secret’ followed by the
password. Enable password can be verified after users reach User execution mode, going into
privilege execution mode.

18
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

IP Default Gateway

Figure 5.1 3 IP default gateway at the Switch show run mode

Configuration for Switch


The default gateway is used when the host seeks to transmit a packet to a device on another network.
In most cases, the default gateway address is the router interface address associated with the local
network to which the host is connected; regarding to the diagram, it is the switches. One must use
the first valid host from the range of IP addresses. To configure on the switch, one must type ‘ip
defaualt gateway’ followed by its IP address in privellege execution mode.

VLAN

Figure 5.1.4 Interface VLAN and Switch IP address in show run mode

Configuration for Switch


VLAN is a virtual interface which users can access the switch remotely but still within the local area
network. To do so, one must configure VLAN 1 by stating the first valid host of its IPv4 address and
subnet mask in enable mode. Afterwards, type ‘no shutdown’ to save the interface configuration.

Line AUX 0

Configuration for Router Figure 5.1.5 Line AUX in show run mode

The Auxiliary Port (AUX Port) enables remote connections to the router without the need of a
network. The AUX Port provides a connection type for modems to plug into, allowing
administrators to remotely access the router, similar to the console port.

19
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

Execution Time Out

Figure 5.1.6 EXEC time out in show run mode

Configuration for Router and Switch


The 'exec-timeout' command specifies a time after which idle execution sessions must be
disconnected. The execution timeout is set to 10 minutes by default. Administrators may also
establish a time limit by specifying the length of time idle execution session will continue before
timeout. If no user input is received within the specified period, the session would be terminated
(Cisco Exec-Timeout and Absolute-Timeout Commands, 2021). In the line configuration mode, the
command is entered. System Auto.com implemented the execution time out time limit to 1 minute
and 30 seconds as the time length was just right with not being too long nor too short.

Service Password Encryption

Figure 5.1.7.1 Service password encryption in show run mode

Figure 5.1.7.2 Passwords presented are encrypted in show run mode

Configuration for Router and Switch


Service Password Encryption is vastly used in devices where passwords are set. This is because it is
important to encrypt all passwords as to make sure it cannot be seen by outsiders. Before setting a
service encrypted password, the password will be shown in the show run mode; This will risk the
security by exposing the raw password. Using the command ‘service password-encryption’ in the
privilege executive mode, the password will be shown in a gibberish form when in show run mode.

20
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

MOTD Banner

Figure 5.1.8.1 Banner MOTD in show run mode Figure 5.1.8.2 Banner MOTD in user EXEC mode

Configuration for Router and Switch


Message Of The Day (MOTD) is a banner which is set as a message for people to see once in the
device CLI tab before requesting to fill in the password. Usually, authorized persons only are
allowed to access and configure routers and switches, therefore administrators may set a warning
message as a reminder to whoever is handling the devices. The MOTD banner can be easily
implemented in the CLI tab at the respective devices. Enable privilege execution mode, type ‘banner
motd’ followed by the message wished to be presented, then save. One can simply check the
configured command in show run mode or exit the device then coming back again in the CLI tab
which will preview the message banner.

Line VTY

Figure 5.1.9.1 Line VTY 0 4 in show run mode Figure 5.1.9.2 Line VTY 5 15 in show run mode

Configuration for Router and Switch


VTY is an abbreviation for Virtual Teletype. VTY is a virtual port that is used to connect to the
device using Telnet or SSH. The summary 0 - 4 indicates that the device may support up to 5
concurrent virtual connections, such as SSH. In a way, 5 (0-4) are router or switch connection ports.
VTY lines are the router's virtual terminal lines and are solely used to manage inbound SSH
connections. A line which lacks a password cannot be used to administer the device. Administrators
may opt to enable subordinate workers to utilise line 0 4 while supervisors use line 5 15 (Bhardwaj,
2020). To configure VTY lines, users must enable privilege execution mode in the CLI tab, type in
the lines. In this case, ‘line vty 0 5’ and ‘line vty 5 15’ are used. Afterwards, administrators shall
implement time execution and transport input SSH.

21
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

SSH

Figure 5.1.10.1 IP domain name, username and


secret password configuration in show run mode

Figure 5.1.10.2 Signing into switch SSH to


check if it is enabled in Command Prompt

Configuration for Router and Switch


Secure Socket Shell (SSH) is a network protocol that allows system administrators to access a
device securely over an insecure network, the communication between devices wis encrypted. SSH
can be configured through any end device that has Command Prompt.

Before configuring SSH, it is also suggested to check if Telnet is implemented in the device. It is not
recommended to use Telnet as it communicates using insecure plain text. SSH is a better option
compared to Telnet as it ensures the security of remote connections by encrypting all data
transmitted between devices. Therefore, for management connections, SSH should be used instead
of Telnet.

To configure SSH, an IP domain name must be set which will be named after the company
‘systemautokl.com’. After that, RSA keys are generated as secure keys are needed to encrypt the
data. Selecting a bigger size modulus may take time but it can guarantee higher security. Afterwards,
create an administrator user by stating its username and secret password. Lastly, reconfigure the
VTY lines for SSH only access by adding in ‘login local’, ‘transport input ssh’, and removing the
previous password given.

To verify the SHH configurations, one can head to command prompt, first type down ssh -l (small
letter L, not 1 one), administrator username, followed by the switch’s IP address. After that the
administrator is required to sign in the user privilege and execution passwords. Once done, type in
‘show ip ssh’, it will state SSH Enabled if successfully configured.

22
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

Interfaces

Figure 5.1.12 Interfaces and its default gateway from Router show run mode

Configuration for Router


Interfaces are the ports of the devices where wires will connect to anothr device which leads both
devices to have a connection and interact with each other. It is much important as we want to the
whole networking system to connect with one another to communicate effectively. Interfaces can be
easily configured at the router CLI by stating the interfaces connected to the router’s ports, then the
switches’ default gateway and subnet mask.

23
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

IP DHCP Excluded Addresses

Figure 5.1.13 Configurations of IP DHCP Excluded addresses


along with subnet's DHCP pool, IP addresses of Network ID,
default router and DNS server

Configuration for Router


The Dynamic Host Configuration Protocol (DHCP) is a server protocol which segregates an amount
of IP addresses for devices which has dynamic IPv4 addresses, alongside with the hosts’ netword
ID, default gateway, subnet mask, and DNS server. Every subnet from the router is required to
configure a DHCP excluded IP address range if the respective sub network consists of wireless
devices. Administrators must first count how many devices will be using DHCP. In the router CLI,
state down the number of IP DHCP excluded address starting from the first valid IP address (default
gateway), followed by the IP address added with the number wished to exclude. Afterwards, fill in
the name of the subnet to categorize the IP DHCP pool, the subnet’s network ID, the default router’
IP address (default gateway), then the DNS server’s IP address. Lasty, save the file. One can
preview the file in show run mode to double check if the information inserted in correct.

24
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

5.2 Access Point and Cloud Configurations

Access Point

Figure 5.2.1 Configurations in Access Point Config tab at Port 1 Interface

An access point acts as a device which establishes a Wireless Local Area Network (WLAN) in a
building. An access point uses an Ethernet connection to connect to a wired router or switch and
broadcasts a Wi-Fi signal to a specific place. To configure the Access Point, make sure the Port
Status at Interface Port 1 is enabled. It is mandatory to fill in the SSID (Service Set Identifier) which
is the name of the respective network. In the Authentication part, WPA2-PSK (Wi-Fi Protected
Access Pre-Shared Key) which is an encryption system utilised authenticate users in a WLAN is
chosen and create its password (What Is a Wi-Fi Protected Access Pre-Shared Key (WPA-PSK)? -
Definition from Techopedia, n.d.). The SSID and its password filled in the Access Point is used for
the wireless and IoT devices to connect to the network wirelessly by simply filling in the same
credentials(What Is Service Set Identifier (SSID)? - Definition from WhatIs.com, n.d.). Lastly,
choose AES (Advanced Encryption Standard) as encryption type for advanced security (Encrypting
Passwords by Using AES, n.d.).

25
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

Cloud

Figure 5.2.2.1 Cloud physical device view and its modules

Figure 5.2.2.2 A file added into TV Settings at Cloud Config tab

A cloud is used to connect the TV to the network diagram. TVs cannot connect to Switches as TV
only uses the Coaxial cable; Switches do not have the suitable port for that specific cable. Hence, a
cloud will act as the middleman between TVs and Switches. Before turning the Cloud on, the PT-
CLOUD-NM-1CFE module will be inserted in as it offers a single Fast-Ethernet interface to be used
with copper media, this enables the Switch and Cloud connected via copper straight through cable.
The PT-CLOUD-NM-1CX card has a single coaxial port for connecting to a cable modem service.

26
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

5.3 Server

IP Addressing

Figure 5.3.1.1 Global Settings Configuration Figure 5.3.1.2 Interface Configuration


in Server at Config tab in Server Config tab
Domain Name System (DNS) converts domains to IP addresses. Each domain is being assigned an
IP address. Both the servers are configured by filling in the IPv4 address and its subnet mask of the
respective servers, the default gateway and the DNS server which is the same as its IPv4 address.

Email server

Figure 5.3.4.1 Email server configurations in server Services tab Figure 5.3.4.2 User information of email account;
opened via Configure Mail in Email application,
Desktop tab of a Laptop

27
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

Figure 5.3.4.3 Email sent from a laptop


using Zun Ni's email account

Figure 5.3.4.4 Email received and


replied from Lim Min's email account

An email server is created for System Auto.com to send and receive emails that contains messages
between employees and even customers. At the server Services, there lies Email at the side panel.
Both SMTP and POP3 services are enabled. A domain name is used for the company’s email
‘systemautokl.com. Users are required to set their respective username and password, lastly tap on
the + sign to add in the account. To test out the email server, users must first log into their email
account by filling up the details. Then compose a mail which will require the sender to fill in the
receiver’s email address, subject, and the message itself. Once done, sender will tap on the Send
button. Receivers from another device may find the email by tapping on the Receive button, they
can also reply to the senders. Senders and receivers will know the email is sent when the message by
tapping on the receive button as it will show Receive Mail Success below.

28
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

HTTP/ Web server

Figure 5.3.2.1 Configurations in HTTP server service tab

Figure 5.3.2.2 Edited index.html version in HTTP server

HTTP (Hypertext Transfer Protocol) or also known as Web server is an application layer protocol
which is used on the World Wide Web to digitally send files and other data. The HTTP server's
principal duty is to store, process, and distribute web pages to clients. On the side panel, HTTP is
chosen, both HTTP and HTTPS is turned on. Under file manager, administrators will be able to edit
and design System Auto.com’s webpage by simply choosing index.html; factors such as editing the
title, colours, font size, captions, and name of other hyperlinks. Once complete, the file is saved. To
view the website design, one can type in the domain name or IP address of the server.

29
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

DNS server

Figure 5.3.3.1 Configuration in DNS server service tab

Figure 5.3.3.2 Accessing System Auto.com’s Figure 5.3.3.3 Accessing System Auto.com’s
Website using Domain Name via Web Browser Website using Server IP Address via Web Browser

DNS converts domain names to IP addresses, enabling browsers to connect to Internet resources.
Each Internet-connected device has its own IP address, which other machines may use to find it.
DNS servers remove the need for people to remember IP addresses. The DNS service is enabled at
the server, a domain name is assigned for our company ‘systemautokl.com’ at the resource records,
and the server’s IP address is also filled in, then saved. To clarify the existence of the website, users
can type down the domain name or the server’s IP address in the Web Browser of the end devices.
Once entered, System Auto.com’s website should appear. To edit the website, one can head to
HTTP panel in the server services.

30
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

IoT server

Figure 5.3.6.1 Configurations in IoT server service tab Figure 5.3.6.2 IoT server sign in page

Figure 5.3.6.3 IoT server available devices online Figure 5.3.6.4 IoT server Device Conditions

IoT server is a network that accommodates IoT devices which includes the servers and storage
necessary for processing real-time operations. An IoT server is configured at the second server. The
registration server of the service is turned on, then it is required to sign up as a user through an end
device such as PC, laptop, smartphone or even tablet. In the desktop tab of the devices, there are two
options to sign up as a user via web browser by typing the server IP address or by the IoT monitor.
After signing up. The IoT account will appear at the server IoT service.

31
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

FTP server

Figure 5.3.5.1 User FTP account configuration in server Figure 5.3.5.2 Admin FTP account configuration in server

Figure 5.3.5.3 ‘Put’ (Upload) HariRaya.txt file


(Created earlier in Text Editor application at Tablet)
in FTP server through Admin account,
verified in FTP directory Figure 5.3.5.4 Signing into User FTP account
via Command Prompt in Tablet and checking directory for HariRaya.txt file
via Command Prompt in PC

32
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

Figure 5.3.5.5 'Get' (Fetch) HariRaya.txt file Figure 5.3.5.6 HariRaya.txt file opened via Text Editor in PC
in FTP server using User account
via Command Prompt in Laptop

File Transfer Protocol (FTP) is a protocol of connecting two computers so that files may be safely
exchanged between them. To configure an FTP server, one must first enable the FTP Service at the
server. The main usage for System Auto.com’s FTP server is for CEO/Admins to spread messages
to employees. Next, sign-up account dedicated for administrator (admin) and employees (user) with
username and password. Administrators get the full permission of to write, read, delete, rename, and
list the messages; While employees have limited permission of only read and list. In any device
where there is Text Editor, create a text file with a title and message, then save the file. Head to
Command Prompt, enable FTP server by typing out ‘ftp’ followed by the domain name or the server
IP address. Once loaded, administrator would log in to the respective (admin) account. Admin shall
upload the file type down a command ‘put’ followed by the .txt file name. Admins can verify the
presence of the file listed in the directory by typing the command ‘dir’, then exit the FTP client by
typing ‘quit’. In another end device at Command Prompt, enable FTP server by typing out ‘ftp’
followed by the domain name or the server IP address. Enter the employee (user) account’s
credentials, then type ‘get’ followed by the .txt file to achieve it. One can verify the presence of the
text file by inserting ‘dir’ in Command Prompt; or just by directly going to Text Editor, open file,
then the file will appear.

33
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

5.4 End Devices and IoT Devices Configurations

End Devices Screenshots of Configurations Justification of Configurations


Configurations using Static IP Address
PC Both the PCs and Printers are
configured using static IP addresses.
In terms of static IP addresses, one
shall manually configure the IP
address related information of said
device such as its default gateway,
DNS server, its own IP address,
alongside with its subnet mask. First
and foremost, devices must be turned
on by pressing its on/off button in
Figure 5.4.1.1 Static IP configurations
Printer in PC Global settings
the physical mode, device is turned
on when a green light is shown. Next
up in the Config tab, change the
display name to make it convenient
to differentiate the devices’ location
and number. In the gateway/DNS
IPv4, Static is chosen; then, insert
the IP address of its default gateway
and DNS server. On the side panel,
choose its Interface, and make sure
the Port Status is enabled.
Figure 5.4.1.2 Static IP configurations in PC Afterwards, head to IP
Interface
Configurations and choose Static, fill
in its respective IPv4 address and its
subnet mask.

34
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

Configurations for Wireless Devices


Laptop Initially used in packet tracer
laptops, the PT-LAPTOP-NM-1CFE
Module offers a Fast-Ethernet
interface for usage with copper
media. As the intention is to make
the laptops available wireless, hence
the given module will be removed
and replaced as the Linksys-
WPC300N module which features a

Figure 5.4.2.1 Laptop in physical


single 2.4GHz wireless interface
view and its modules; wireless allowing access to wireless
module implemented in laptop
networks. A reminder to turn off
before altering the modules; and turn
it back on after switching modules.

(Refer to Configurations for


Wireless and IoT Devices using
DHCP below for next step)

Tablet Turn on the tablet by pressing the


button on the lower left corner, it
will turn green once it is on.

(Refer to Configurations for


Wireless and IoT Devices using
DHCP below for next step)

Figure 5.4.2.2 Tablet in physical view


Smartphone (Refer to Configurations for
Wireless and IoT Devices using
DHCP below for next step)

35
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

Configurations for IoT Devices


CCTV All IoT devices are included in this
(Webcam) category. One must first insert the
Solar panel IoT power adapter on the side, then
Smoke turn it on.
Detector
Siren (Refer to Configurations for

Temperature Wireless and IoT Devices using

Monitor DHCP below for next step)

Coffee
Maker Figure 5.4.3.1 IoT device and its
power adapter in physical view Usually having IoT devices means
Speaker
the devices will be connected to an
Music Player
IoT server. In the IoT server is where
Humidifier
administrators can monitor and set
Aircon
conditions for IoT devices to
Window
function. But before all these, IoT
Door
devices must enable its server.
RFID Card
Assuming an IoT server is already
Reader
created, in the Config tab at IoT
server box, select Remote Server.
Fill in the IoT server address, its
username and password. Lastly,
press connect; once it is connected to
the server, it will turn to Refresh.
Administrators can check the device
Figure 5.4.3.2 Global settings configurations,
IoT server in IoT device is online when logged into the IoT
server account.

36
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

RFID Card Although there is no need to actually


configure an RFID Card other than
turning on the power and changing
its display name, it is vital to set the
number at Attributes as it makes the
card have a unique number. This
helps specify whether the card can
access a specific door to open with
the help of an RFID card reader
which has been programmed with
Figure 5.4.3.3 RFID Card value conditions for limited accessibility to
altered in Attributes tab
ensure security.

Configurations for Wireless and IoT Devices using DHCP

Figure 5.4.4.1 Global Settings of Figure 5.4.4.2 Wireless Interface is


Wireless and IoT devices using DHCP enabled for Wireless and IoT devices
In the Config tab, replace the factory set display name. Choose DHCP at the Gateway/DNS IPv4,
witness the default gateway and DNS server automatically filled in. On the side panel, enable the
Wireless0 port status and enter the SSID of the Access Point (name) it is connected to. Select
WPA2-PSK in the Authentication box, then it is required to fill in the PSK Pass Phrase (password)
of the respective Access Point; It is important to choose AES as encryption type for advanced
security. Lastly, DHCP is chosen again, the device’s IPv4 Address and subnet mask will be
automatically generated.

37
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

TV and VOIP
TV TVs shall be connected to a Cloud
via Coaxial cable. A preview of the
medium which one has inserted in
the Cloud will appear once TV is
turned on to verify it is connected.

Figure 5.4.5.1 Physical view of TV,


projecting file inserted in Cloud TV Settings

VOIP A power adapter is connected to the


VOIP to establish a connection int
the network diagram.

Figure 5.4.5.2 Physical view of VOIP


connected with VOIP power adapter

38
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

6.0 Conclusion

To sum up, this assignment has emphasized the importance of building a secure and functional
network while also implementing a tint of creativity into the design. The company must think ahead to
future in terms of the stepping up a notch by modernizing the networking tools needed while executing
a contemporary floorplan design. For instance, the digital era has led the world utilizing more IoT
technology hence investing in IoT related devices may provide convenience and higher security
towards the company.

Various elements must be taken into consideration before the construction of a network
architecture as such devices used, predicting number of hosts, IP addressing and more while also not
neglecting quality assured aspect of acquiring a reliable network which covers fault tolerance,
scalability, quality of service and security. The base line of every device must be correctly connected
and configured, added in functions to enable extra features for security and connectivity reasons.
Factors such as the functionality, cost and number of devices used must be considered as well to
ensure a logical design while crafting the network diagram.

Besides that, the goal of restructuring the floorplan is similar to the network architecture; it is
to offer an ergonomic layout which could increase the productivity and comfort among all staffs and
visitors, while still having enough space to expand for the future. Designing the floorplan challenges
individuals to improvise ideas on existing shapes or objects to create innovative designs. With that,
System Auto.com has achieved in implementing a creative yet functioning network and floorplan.

39
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT

References

Rafflesia arnoldii - The Largest Flower On Earth. (n.d.). WorldAtlas.


https://www.worldatlas.com/articles/rafflesia-arnoldii-the-largest-flower-on-earth.html

Diway, B., Yasui, Y., Innan, H., & Takeuchi, Y. (2022). New locality and bud growth of the world
biggest flower, Rafflesia tuan-mudae, in Naha Jaley, Sarawak, Malaysia. Tropics, 30(4),
71–82. https://doi.org/10.3759/tropics.ms21-14

KayO. (2016, June 8). Networks and Webs – inspired by a metaphor. Linking Learning.
https://www.linkinglearning.com.au/networks-and-webs-inspired-by-a-metaphor/

no_name12. (2019, October 31). Types of Tree Leaves with Pictures for Easy Identification.
Leafy Place. https://leafyplace.com/types-of-tree-leaves/

Bhardwaj, R. (2020, May 20). Meaning of line vty 0 4 in configuration of Cisco Router or Switch
- IP With Ease. Ipwithease.com. https://ipwithease.com/what-is-meaning-of-line-vty-0-4-in-
configuration-of-cisco-router-or-switch/#:~:text=VTY%20is%20a%20virtual%20port

Cisco exec-timeout and absolute-timeout Commands. (2021, December 20). Study CCNP.
https://study-ccnp.com/cisco-exec-timeout-absolute-timeout-commands/

What is a Wi-Fi Protected Access Pre-Shared Key (WPA-PSK)? - Definition from Techopedia. (n.d.).
Techopedia.com. from
https://www.techopedia.com/definition/22921/wi-fi-protected-access-pre-shared-key-wpa-
psk#:~:text=Wi%2DFi%20Protected%20Access%20Pre%2DShared%20Key%20or%20WPA
%2D

What is service set identifier (SSID)? - Definition from WhatIs.com. (n.d.). SearchMobileComputing.
from https://www.techtarget.com/searchmobilecomputing/definition/service-set-
identifier#:~:text=A%20service%20set%20identifier%20(SSID

Encrypting passwords by using AES. (n.d.). Www.ibm.com.


https://www.ibm.com/docs/en/was-zos/9.0.5?topic=files-encrypting-passwords-by-using-aes

40

You might also like