Professional Documents
Culture Documents
IN Individual Assignment
IN Individual Assignment
CT043-3-1-IN
INTRODUCTION TO NETWORKING
APU1F2203CS(IS/DF), APU1F2109IT, APU1F2109SE,
APD1F2109IT, APD1F2203CS(IS/DF), APD1F2203SE
HAND OUT DATE: 8th April 2022 [Wk3]
HAND IN DATE: 19th June 2022 [Wk12]
Weightage: 40%
Online Submission Time before = 23: 59 PM Malaysia Time
Student Name: Chang Zun Ni
Student ID: TP067980
INSTRUCTIONS TO CANDIDATES:
1. Assignment is to be submitted through online submission (Moodle).
2. Students are advised to underpin their answers with the use of
references (cited using the APA name system of Referencing).
3. Late submission will be awarded zero (0) unless Extenuating
Circumstances (EC) are upheld.
4. Cases of plagiarism will be penalized.
5. You must obtain 50% overall to pass this module.
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
TABLE OF CONTENTS
1.0 Introduction……………………………………………………...………………………………2
5.0 Configurations
5.1 Routers and Switches Configurations…………...……………………………………..16
5.2 Access Point and Cloud Configurations……………………………………………….24
5.3 Server Configurations………………………………………………………………….26
5.4 End Devices and IoT Devices Configurations…………………………………………33
6.0 Conclusion……………………………………………….…………………………………….38
7.0 References…………………………………………………………..…………………….……39
1
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
1.0 Introduction
This particular assignment focuses on the second floor of KL site which will be emphasized in
terms of its floor plan, restructured network design, devices used, and ways to configure them. Starting
from its uniquely built premise and floor plan, followed by the meaning behind the structure. By
implementing digital transformation within the company, this floor may also contain a variety of IoT
devices from the basic such as lights and fans to CCTV and RFID devices. System Auto has ensured
employees’ comfort and convenience while working here as to prepare suitable workplaces where
there are PCs, tables and chairs which are considered as essential. VOIP are readily available in each
department as to communicate with people from different location. And lastly, step by step
configurations are explained alongside with the usage.
2
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
3
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
Figure 2.1 A Hibiscus Flower (Rafflesia Arnoldii - the Largest Flower on Earth, n.d.)
There are a few characteristics of the Rafflesia flower that we have implemented in the
building and floor plan design.
4
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
The Rafflesia flower has five petals, that will act as separation for the departments given and a
few sections added on. As this specific individual component is dedicated in creating only the second
floor of KL floor plan, this will include a conference room, development hub, rooms for technical
assistants to monitor the network, server room which is combined with the break room and finally the
restroom.
The perigon lobes which is known as the dots on petals, will represent the furniture and devices
in the layout. To make the floor plan even more interesting, some of the building petals will be
sectioned differently.
5
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
The central disc acts as the platform for the middle ground on the second floor for people to
walk around to different sections. This part of the building is equipped with a few tables and chairs to
let people settle down in an open-air place. Not to mention it has a piano situated there for whoever
that wishes to play with it, the sounds will travel to nearby areas of the building so people can enjoy
the sound of music.
The anthers of the flower, represents the spiral staircase is situated in the central part of the
building to enable people to go up and down from the first to the second floor. The diaphragm
aperture, which is the middle part that looks similar like a dome with a hole in the middle concept will
be applied as a skylight above the staircase for the purpose of letting natural lighting in the building.
This design was inspired by the staircase at Bank Negara Malaysia Museum and Art Gallery.
6
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
Figure 3.2 Spiral Staircase and Skylight reflection at Bank Negara Malaysia Museum and Art Gallery.
7
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
As safety is priority, this area is equipped with two CCTVs to monitor the people going
through this area. In terms of fire hazards, a smoke detector is present to automatically enable the siren
to ensure all employees can hear and are aware there is an emergency.3.2 Technical Assistants’
Department
The technical assistants’ department is located on the upper right side of the building. Its layout
is inspired by the iconic geometric spiral shape of spider webs. The threads symbolize the importance
of networking on establishing strong connections so devices can link together, adding more devices
and layers to make the networking ecosystem larger. As this is a technical assistants department to
monitor the network, they are the ones that will troubleshoot problems related to ensure all devices can
communicate with each other in the network (KayO, 2016). Metaphorically speaking as if they are the
spiders, when bugs appear in the web or the threads are broken, they are responsible to fix the web and
make sure everything is functioning smoothly.
Altogether there are ten technical assistants’ rooms, equipped with the essentials such as tables,
chairs, PCs, and plants. The most interesting part of the rooms are the doors. Every individual
employee who works in this area shall be granted a RFID card because there will be RFID readers
8
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
card and a reader with the same identification number to pair with each other can enable access to
open the door. Employees are requested to scan the card to the reader to enable access to a specific
door which will open after, one can only gain access to a specific room as it is their own workplace.
This will ensure the security of no outsider can simply enter the rooms to steal private information.
Outside the technical assistants’ rooms, there lies a small hallway equipped with a CCTV to
monitor the people going through the area, three printers for employees to print their work if required,
a bookcase for archived record books and files, lastly a VOIP dedicated for this department to received
and call employees from other departments.
The development hub is located on the lower left side of the building. Its layout is inspired by
the pinnate vernation pattern veins on the leaves. Veins on the leaves are to transport nutrients between
stem and leaf to keep the whole plant alive and growing. Just like the purpose of the development hub,
it is for employees have a space to share ideas from different backgrounds so that it helps the company
to create and develop new outputs to enable the company grow to greater heights (no_name12, 2019).
There are in total of six rooms in the development hub. Each room are equipped with a table,
multiple chairs depending on which room is used, and a TV which is used as a medium to project
9
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
employee’s work etc. Six laptops are included which shows if there were employees around which
will be wirelessly connected to a Access Point. Outside the development hub’s rooms, there lies a
small hallway equipped with a CCTV to monitor the people going through the area, three printers for
employees to print their work if required, a bookcase for archived record books and files, lastly a
VOIP dedicated for this department to received and call employees from other departments.
The server room is combined with the break rooms, located at the lower right side of the
building. This side of the block is sectioned as a simple maze. The first server carries the HTTP, Email
and Web server, meanwhile the second server is dedicated for the IoT server. Therefore, there is a
small room dedicated to becoming the company’s server room. A temperature monitor is present to
ensure the server room’s temperature is stable.
Meanwhile the other rooms are meant for employees to take a break and have some time to rest
and play games. The middle part which has a sofa, and the hallway down to the ball pool has a coffee
making machine placed for employees to grab coffee on the second floor. Meanwhile, the closed room
near the end is provided with a sofa, coffee table and a TV which employees can connect their laptops
or consoles to play games or watch movies. That particular room will also feature a music player and a
speaker so employees can enjoy some relaxing music.
10
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
11
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
The conference room is located on the middle upper part of the building, promising a large area
for all employees to have meetings on notable events. The waiting area is furnished with a few seats
and a cooler to fill up water, it is a place for employees to gather before and after meetings. Two
CCTVs are situated each in the conference room itself and waiting area to monitor the area. The
conference room is furnished with a large glass and wood table, and multiple chairs on the side, and a
big television for presenters to project their content. A printer is readily available in the room for
employees to print out their work if needed and a VOIP to receive from or call to different
departments. Six tablets are included shows if there were employees around which will be wirelessly
connected to an Access Point. Besides that, the aircon and windows in this room can be controlled via
WIFI is placed to ensure employees feel cool and comfortable alternating the sources while not
required to manually adjust anything. Lastly, a humidifier is present to increase the humidity of the
room.
12
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
3.6 Restroom
The restroom is located at the upper left side of the building. To ensure a wide and comfortable
area, have decided to separate the male and female restrooms for privacy and safety. The restroom is
equipped with a few toilets and sinks, a separation part at the front with a bench for people to wait for
someone. Restrooms are places which people rarely gather; therefore, sensors are built into each
restroom. When the sensors detect someone going in, it will automatically turn on the lights and fans
which will be connected to an Access Point. This can help save electricity as it will only be used when
needed; plus, there is no need for people to manually turn them on.
13
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
14
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
Figure 4.3 Network Diagram of Zone 7: Server room and Break room
15
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
Figure 4.4 Network Diagram of Zone 8: Development Hub and Central Area
16
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
5.0 Configurations
Hostnames
System Clock
17
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
Line Console 0
Enable Password
18
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
IP Default Gateway
VLAN
Figure 5.1.4 Interface VLAN and Switch IP address in show run mode
Line AUX 0
Configuration for Router Figure 5.1.5 Line AUX in show run mode
The Auxiliary Port (AUX Port) enables remote connections to the router without the need of a
network. The AUX Port provides a connection type for modems to plug into, allowing
administrators to remotely access the router, similar to the console port.
19
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
20
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
MOTD Banner
Figure 5.1.8.1 Banner MOTD in show run mode Figure 5.1.8.2 Banner MOTD in user EXEC mode
Line VTY
Figure 5.1.9.1 Line VTY 0 4 in show run mode Figure 5.1.9.2 Line VTY 5 15 in show run mode
21
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
SSH
Before configuring SSH, it is also suggested to check if Telnet is implemented in the device. It is not
recommended to use Telnet as it communicates using insecure plain text. SSH is a better option
compared to Telnet as it ensures the security of remote connections by encrypting all data
transmitted between devices. Therefore, for management connections, SSH should be used instead
of Telnet.
To configure SSH, an IP domain name must be set which will be named after the company
‘systemautokl.com’. After that, RSA keys are generated as secure keys are needed to encrypt the
data. Selecting a bigger size modulus may take time but it can guarantee higher security. Afterwards,
create an administrator user by stating its username and secret password. Lastly, reconfigure the
VTY lines for SSH only access by adding in ‘login local’, ‘transport input ssh’, and removing the
previous password given.
To verify the SHH configurations, one can head to command prompt, first type down ssh -l (small
letter L, not 1 one), administrator username, followed by the switch’s IP address. After that the
administrator is required to sign in the user privilege and execution passwords. Once done, type in
‘show ip ssh’, it will state SSH Enabled if successfully configured.
22
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
Interfaces
Figure 5.1.12 Interfaces and its default gateway from Router show run mode
23
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
24
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
Access Point
An access point acts as a device which establishes a Wireless Local Area Network (WLAN) in a
building. An access point uses an Ethernet connection to connect to a wired router or switch and
broadcasts a Wi-Fi signal to a specific place. To configure the Access Point, make sure the Port
Status at Interface Port 1 is enabled. It is mandatory to fill in the SSID (Service Set Identifier) which
is the name of the respective network. In the Authentication part, WPA2-PSK (Wi-Fi Protected
Access Pre-Shared Key) which is an encryption system utilised authenticate users in a WLAN is
chosen and create its password (What Is a Wi-Fi Protected Access Pre-Shared Key (WPA-PSK)? -
Definition from Techopedia, n.d.). The SSID and its password filled in the Access Point is used for
the wireless and IoT devices to connect to the network wirelessly by simply filling in the same
credentials(What Is Service Set Identifier (SSID)? - Definition from WhatIs.com, n.d.). Lastly,
choose AES (Advanced Encryption Standard) as encryption type for advanced security (Encrypting
Passwords by Using AES, n.d.).
25
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
Cloud
A cloud is used to connect the TV to the network diagram. TVs cannot connect to Switches as TV
only uses the Coaxial cable; Switches do not have the suitable port for that specific cable. Hence, a
cloud will act as the middleman between TVs and Switches. Before turning the Cloud on, the PT-
CLOUD-NM-1CFE module will be inserted in as it offers a single Fast-Ethernet interface to be used
with copper media, this enables the Switch and Cloud connected via copper straight through cable.
The PT-CLOUD-NM-1CX card has a single coaxial port for connecting to a cable modem service.
26
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
5.3 Server
IP Addressing
Email server
Figure 5.3.4.1 Email server configurations in server Services tab Figure 5.3.4.2 User information of email account;
opened via Configure Mail in Email application,
Desktop tab of a Laptop
27
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
An email server is created for System Auto.com to send and receive emails that contains messages
between employees and even customers. At the server Services, there lies Email at the side panel.
Both SMTP and POP3 services are enabled. A domain name is used for the company’s email
‘systemautokl.com. Users are required to set their respective username and password, lastly tap on
the + sign to add in the account. To test out the email server, users must first log into their email
account by filling up the details. Then compose a mail which will require the sender to fill in the
receiver’s email address, subject, and the message itself. Once done, sender will tap on the Send
button. Receivers from another device may find the email by tapping on the Receive button, they
can also reply to the senders. Senders and receivers will know the email is sent when the message by
tapping on the receive button as it will show Receive Mail Success below.
28
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
HTTP (Hypertext Transfer Protocol) or also known as Web server is an application layer protocol
which is used on the World Wide Web to digitally send files and other data. The HTTP server's
principal duty is to store, process, and distribute web pages to clients. On the side panel, HTTP is
chosen, both HTTP and HTTPS is turned on. Under file manager, administrators will be able to edit
and design System Auto.com’s webpage by simply choosing index.html; factors such as editing the
title, colours, font size, captions, and name of other hyperlinks. Once complete, the file is saved. To
view the website design, one can type in the domain name or IP address of the server.
29
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
DNS server
Figure 5.3.3.2 Accessing System Auto.com’s Figure 5.3.3.3 Accessing System Auto.com’s
Website using Domain Name via Web Browser Website using Server IP Address via Web Browser
DNS converts domain names to IP addresses, enabling browsers to connect to Internet resources.
Each Internet-connected device has its own IP address, which other machines may use to find it.
DNS servers remove the need for people to remember IP addresses. The DNS service is enabled at
the server, a domain name is assigned for our company ‘systemautokl.com’ at the resource records,
and the server’s IP address is also filled in, then saved. To clarify the existence of the website, users
can type down the domain name or the server’s IP address in the Web Browser of the end devices.
Once entered, System Auto.com’s website should appear. To edit the website, one can head to
HTTP panel in the server services.
30
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
IoT server
Figure 5.3.6.1 Configurations in IoT server service tab Figure 5.3.6.2 IoT server sign in page
Figure 5.3.6.3 IoT server available devices online Figure 5.3.6.4 IoT server Device Conditions
IoT server is a network that accommodates IoT devices which includes the servers and storage
necessary for processing real-time operations. An IoT server is configured at the second server. The
registration server of the service is turned on, then it is required to sign up as a user through an end
device such as PC, laptop, smartphone or even tablet. In the desktop tab of the devices, there are two
options to sign up as a user via web browser by typing the server IP address or by the IoT monitor.
After signing up. The IoT account will appear at the server IoT service.
31
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
FTP server
Figure 5.3.5.1 User FTP account configuration in server Figure 5.3.5.2 Admin FTP account configuration in server
32
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
Figure 5.3.5.5 'Get' (Fetch) HariRaya.txt file Figure 5.3.5.6 HariRaya.txt file opened via Text Editor in PC
in FTP server using User account
via Command Prompt in Laptop
File Transfer Protocol (FTP) is a protocol of connecting two computers so that files may be safely
exchanged between them. To configure an FTP server, one must first enable the FTP Service at the
server. The main usage for System Auto.com’s FTP server is for CEO/Admins to spread messages
to employees. Next, sign-up account dedicated for administrator (admin) and employees (user) with
username and password. Administrators get the full permission of to write, read, delete, rename, and
list the messages; While employees have limited permission of only read and list. In any device
where there is Text Editor, create a text file with a title and message, then save the file. Head to
Command Prompt, enable FTP server by typing out ‘ftp’ followed by the domain name or the server
IP address. Once loaded, administrator would log in to the respective (admin) account. Admin shall
upload the file type down a command ‘put’ followed by the .txt file name. Admins can verify the
presence of the file listed in the directory by typing the command ‘dir’, then exit the FTP client by
typing ‘quit’. In another end device at Command Prompt, enable FTP server by typing out ‘ftp’
followed by the domain name or the server IP address. Enter the employee (user) account’s
credentials, then type ‘get’ followed by the .txt file to achieve it. One can verify the presence of the
text file by inserting ‘dir’ in Command Prompt; or just by directly going to Text Editor, open file,
then the file will appear.
33
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
34
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
35
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
Coffee
Maker Figure 5.4.3.1 IoT device and its
power adapter in physical view Usually having IoT devices means
Speaker
the devices will be connected to an
Music Player
IoT server. In the IoT server is where
Humidifier
administrators can monitor and set
Aircon
conditions for IoT devices to
Window
function. But before all these, IoT
Door
devices must enable its server.
RFID Card
Assuming an IoT server is already
Reader
created, in the Config tab at IoT
server box, select Remote Server.
Fill in the IoT server address, its
username and password. Lastly,
press connect; once it is connected to
the server, it will turn to Refresh.
Administrators can check the device
Figure 5.4.3.2 Global settings configurations,
IoT server in IoT device is online when logged into the IoT
server account.
36
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
37
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
TV and VOIP
TV TVs shall be connected to a Cloud
via Coaxial cable. A preview of the
medium which one has inserted in
the Cloud will appear once TV is
turned on to verify it is connected.
38
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
6.0 Conclusion
To sum up, this assignment has emphasized the importance of building a secure and functional
network while also implementing a tint of creativity into the design. The company must think ahead to
future in terms of the stepping up a notch by modernizing the networking tools needed while executing
a contemporary floorplan design. For instance, the digital era has led the world utilizing more IoT
technology hence investing in IoT related devices may provide convenience and higher security
towards the company.
Various elements must be taken into consideration before the construction of a network
architecture as such devices used, predicting number of hosts, IP addressing and more while also not
neglecting quality assured aspect of acquiring a reliable network which covers fault tolerance,
scalability, quality of service and security. The base line of every device must be correctly connected
and configured, added in functions to enable extra features for security and connectivity reasons.
Factors such as the functionality, cost and number of devices used must be considered as well to
ensure a logical design while crafting the network diagram.
Besides that, the goal of restructuring the floorplan is similar to the network architecture; it is
to offer an ergonomic layout which could increase the productivity and comfort among all staffs and
visitors, while still having enough space to expand for the future. Designing the floorplan challenges
individuals to improvise ideas on existing shapes or objects to create innovative designs. With that,
System Auto.com has achieved in implementing a creative yet functioning network and floorplan.
39
CT108-3-1-IN INDIVIDUAL ASSIGNMENT APU1F2203IT
References
Diway, B., Yasui, Y., Innan, H., & Takeuchi, Y. (2022). New locality and bud growth of the world
biggest flower, Rafflesia tuan-mudae, in Naha Jaley, Sarawak, Malaysia. Tropics, 30(4),
71–82. https://doi.org/10.3759/tropics.ms21-14
KayO. (2016, June 8). Networks and Webs – inspired by a metaphor. Linking Learning.
https://www.linkinglearning.com.au/networks-and-webs-inspired-by-a-metaphor/
no_name12. (2019, October 31). Types of Tree Leaves with Pictures for Easy Identification.
Leafy Place. https://leafyplace.com/types-of-tree-leaves/
Bhardwaj, R. (2020, May 20). Meaning of line vty 0 4 in configuration of Cisco Router or Switch
- IP With Ease. Ipwithease.com. https://ipwithease.com/what-is-meaning-of-line-vty-0-4-in-
configuration-of-cisco-router-or-switch/#:~:text=VTY%20is%20a%20virtual%20port
Cisco exec-timeout and absolute-timeout Commands. (2021, December 20). Study CCNP.
https://study-ccnp.com/cisco-exec-timeout-absolute-timeout-commands/
What is a Wi-Fi Protected Access Pre-Shared Key (WPA-PSK)? - Definition from Techopedia. (n.d.).
Techopedia.com. from
https://www.techopedia.com/definition/22921/wi-fi-protected-access-pre-shared-key-wpa-
psk#:~:text=Wi%2DFi%20Protected%20Access%20Pre%2DShared%20Key%20or%20WPA
%2D
What is service set identifier (SSID)? - Definition from WhatIs.com. (n.d.). SearchMobileComputing.
from https://www.techtarget.com/searchmobilecomputing/definition/service-set-
identifier#:~:text=A%20service%20set%20identifier%20(SSID
40