Professional Documents
Culture Documents
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature Bui Thai
Grading grid
P5 P6 P7 P8 M3 M3 D2 D3
❒ Summative Feedback: ❒ Resubmission Feedback:
Introduction
o Introduce the project and explain what the project is all about
o Explain the problems that requires address and give solutions to the
problems
o Talk about what the important parts of the assignment you will address
Conclusion
o The summary of the entire assignment that brings the report to a
satisfying and logical end.
Evaluation
o You must provide your opinion or verdict on whether an argument, or
set of research findings, is accurate.
References
o Inline text citations are required (Sources of information)
o You must use Harvard referencing style for this report.
Table of Contents
Ⅰ. Introduction...............................................................................................................................................7
II. Content.....................................................................................................................................................8
P5. Provide a logical/physical design of the networked system with clear explanation and
addressing table......................................................................................................................................8
1. Explain the difference between logical and physical design.....................................................8
2. Discuss and explain the USER Requirement for the design.....................................................8
3. Logical design................................................................................................................................9
4. Physical design............................................................................................................................10
5. Provide addressing table for the network you design.............................................................11
P6. Evaluate the design to meet the requirements.............................................................................13
P7 Implement a networked system based on a prepared design......................................................13
P8. Document and analyze test results against expected results......................................................21
1.Document......................................................................................................................................21
2. Testing..........................................................................................................................................28
III. Conclusion.............................................................................................................................................33
IV. Reference List.......................................................................................................................................34
II. Content.
P5. Provide a logical/physical design of the networked system with clear explanation
and addressing table.
- Logical Design is the definition of an abstract design for computer programming in that
the programmer will arrange any sequence of logical relationships collectively known as
properties or entities. Identifier Entity refers to information and attributes that uniquely
identify an entity.
- Physical Design focus on storing and accessing objects. The physical design converts the
logical structure into a structural description of the physical database. Additionally, the
physical design allows the creation of things from the database, such as tables, columns,
and primary and foreign keys.
Table 1: Explain there are main three differences between logical and physical design
- First about users: 200 students, 15 teachers, 12 marketing staff and administrators, five
senior managers, including the head of academic and program management, and three
computer network administrators count.
- Second in terms of resources: 50 student lab computers, 35 staff computers, and three
printers.
- Third in terms of infrastructure: the building has three floors, all computers and printers
are on the ground floor except for the IT room which is separated between the 1st and 2nd
floors.
- Note:
3. Logical design
In this 3-story building's network configuration, several key network components are
employed, including a Router, Layer 3 Switch, PCs, Printers, Wireless Access Points,
Servers, and standard Switches. The primary aim is to establish robust connectivity
throughout the premises while catering to a considerable number of concurrent users.
The Router serves as the gateway to the internet and is linked to the Layer 3 Switch, which
in turn connects to the standard Switches on each floor. This intricate setup ensures that
internet access is extended to all connected devices, including the Wireless Access Points.
The latter is crucial for accommodating the network needs of teachers and staff who
require wireless connectivity.
Acknowledging the substantial demand for connectivity, the network design incorporates
ample bandwidth capacity. By embracing this approach, the network aims to sustain
seamless performance even during peak usage periods.
The pivotal role of the Layer 3 Switch involves not only facilitating interconnectivity but
also providing DHCP services to PCs situated on each floor. This centralized control
mechanism allows for efficient management of IP addresses and network resources.
In summary, the network blueprint for this 3-floor building encompasses an array of
interconnected devices and employs strategic configurations to ensure reliable and high-
capacity connectivity for the diverse range of users and their devices.
4. Physical design
Floor1:
Floor2:
Floor3:
Printer01,
10.22.3.0/25
AP of Staff
Print
10.22.2.0/24
er02, AP of
Student
Computer, Use DHCP Service with network ID. 10.22.0.1
Smartphone
10.22.0.0/23
of Guest
Advantage:
Disadvantage:
Absence of a backup WAN line results in a critical vulnerability; if the primary WAN
line fails, the entire school network could experience a collapse.
Inability to manage the wireless network via user and password authentication poses a
limitation in terms of access control.
The network lacks a dedicated firewall for comprehensive management of inbound and
outbound data flow, posing potential security risks for company data.
Configure Security
#banner motd z
He thong dang chay on dinh, can that khi thay doi cau hinh z.
#line console 0
#password betc@123
#login
#line vty 0 4
#password betc@123
Step 2:
DHCP service for Student PCs, Staff PCs, Printer, IT, Server on Router:
Figure 16: DHCP service for Student PCs, Staff PCs, Printer, IT, Server on
Complete configuration:
1.Document
Step 1: Configure switch layer 3 to become VTP server.
Set name for VLAN, to provide V-Lan for the Client Mode.
Help network administrators reduce IP static configuration manually. DHCP is used for
registration to update information about IP addresses and help the network work stably.
Network administrators can change the network configuration in an easy way when the
network change.
Student
Staff
2. Testing
PCs in the school can ping Successful. Switches has been trunked
each other.
All school devices can access Successful. Router has been routed.
the internet
PCs of student, guest, staff, Successful. VLANs has been routed
management can ping to
other devices in the school
All PCs are given address by Successful. DHCP has been routed
virtue of (DHCP)
Ping Realtime:
III. Conclusion
By completing this exercise, I've gained a deeper understanding of both logical and
physical network design. I've also learned how to present complex network architectures
effectively. As part of this exercise, I've created a diagram for a network in an educational
institute. The institute spans three floors and includes three servers along with computers
designated for IT, staff, and students. The network design encompasses router and switch
configurations that allow for internet connectivity. It's important to note that devices within
the school can successfully ping both internal school resources and external internet
destinations. However, certain aspects are still in progress. For instance, the scheme could
benefit from enhanced security measures, which could involve the incorporation of a
firewall.
Additionally, there are key elements that are currently absent from the design:
https://www.airtel.in/blog/business/physical-and-logical-design-of-iot/#:~:text=A
%20physical%20design%20focuses%20on,requirements%2C%20constraints%2C%20and
%20assumptions [Accessed 20 August 2022].