You are on page 1of 29

Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

GROUP ASSIGNMENT
TECHNOLOGY PARK MALAYSIA
CT043-3-1-IN
INTRODUCTION TO NETWORKING

STUDENT DETAILS:
NAME TP No
CHAI ZI HAN TP067353
SK ABDUR RAHMAN RIDOY TP061108
MAAHER TP072081
YUMA HIGA TP066555

INTAKE CODE: APD1F2211SE & APU1F2111SE


ASSIGNMENT HAND OUT DATE: 2nd/3rd Week of Semester
ASSIGNMENT HAND IN DATE: 1st March 2023

Asia Pacific University 1


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Work Breakdown Structure


Student Work Signature
ST
MAAHER KL BRANCH 1 FLOOR

CHAI ZI HAN KL BRANCH 2ND FLOOR


INTRODUCTION
CONCLUSION
YUMA HIGA CYBER JAYA BRANCH 1ST
FLOOR
SK ABDUR RAHMAN CYBER JAYA BRANCH 2nd
RIDOY FLOOR

Table of Contents

Asia Pacific University 2


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Introduction...............................................................................................................................................4
Network Diagram......................................................................................................................................4
Student 1: MAAHER (TP072081)............................................................................................................5
KL branch 1st Floor...............................................................................................................................5
3.1 Topology with Justification.........................................................................................................5
3.2 IP Addressing with Justification.................................................................................................7
Student 2:CHAI ZI HAN (TP067353)...................................................................................................9
KL branch 2nd Floor...................................................................................................................................9
4.1 Topology with Justification.........................................................................................................9
4.2 IP Addressing with Justification...............................................................................................11
Student 3: YUMA HIGA (TP066555)....................................................................................................13
Cyber Jaya branch 1st Floor................................................................................................................13
5.1 Topology with Justification.......................................................................................................13
5.2 IP Addressing with Justification...............................................................................................14
Student 4: SK ABDUR RAHMAN RIDOY (TP061108)......................................................................17
Cyber Jaya branch 2nd Floor...............................................................................................................17
6.1 Topology with Justification.......................................................................................................17
6.2 IP Addressing with Justification...............................................................................................19
7. Conclusion............................................................................................................................................21
8. Reference..............................................................................................................................................22
9.Alternate Roles.....................................................................................................................................23
10. Peer Evaluation..................................................................................................................................24
Student Name / TP Number : Sk Abdur Rahman Ridoy (TP061108)..........................................24
Self-Reflection (what I did best and what I should improve in future):................................................25
Student Name / TP Number : Chai Zi Han (TP067353)...............................................................26
Self-Reflection (what I did best and what I should improve in future):............................................27
Student Name / TP Number : YUMA HIGA/TP066555................................................................27
Self-Reflection (what I did best and what I should improve in future):............................................28
Student Name / TP Number : Maaher (TP072081)........................................................................28
Self-Reflection (what I did best and what I should improve in future):............................................29

Asia Pacific University 3


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Introduction
Network topology refers to the physical or logical arrangement of devices and connections in a
network. The choice of topology can significantly impact the performance, reliability, scalability,
and security of the network. In a company network, topology plays a crucial role in ensuring that
the network meets the business requirements and supports the communication and collaboration
needs of the employees. A well-designed topology can improve productivity, reduce downtime,
and enhance the overall efficiency of the company (Contributor, 2022).

Network Diagram

Asia Pacific University 4


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Student 1: MAAHER (TP072081)


KL branch 1st Floor

3.1 Topology with Justification

In the case of the KL-Floor 1 network diagram, a star topology would be a good choice for the
following reasons:

Easy to manage: With a star topology, all the devices are connected to a central hub or switch,
making it easy to manage the network. This means that if there is a problem with one device, it
can be easily identified and fixed without affecting the other devices on the network.

Scalability: A star topology is highly scalable and can easily accommodate new devices as the
network grows. This means that if more devices need to be added to the KL-Floor 1 network in
the future, it can be easily done without having to restructure the entire network.

High performance: In a star topology, each device has its own dedicated connection to the central
hub or switch, which means that the performance of the network is not affected by the number of
devices connected to it. This ensures that the KL-Floor 1 network will be able to handle the high
volume of traffic that is expected from a modern office environment.

Asia Pacific University 5


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Fault tolerance: With a star topology, if one device fails, it does not affect the rest of the
network. This is because each device has its own dedicated connection to the hub or switch. This
ensures that the KL-Floor 1 network will be highly reliable and will be able to continue
functioning even if there is a problem with one device.

Security: A star topology provides a high level of security as each device is isolated from the
other devices on the network. This means that if there is a security breach on one device, it will
not affect the other devices on the network. Additionally, a central hub or switch provides a point
of control for network security, making it easier to manage and monitor network security.

In summary, a star topology is a good choice for the KL-Floor 1 network diagram because it is
easy to manage, scalable, provides high performance, fault tolerance, and security. These factors
are all important for a modern office environment, and a star topology is well-suited to meet
these requirements

Here's how some of the devices commonly used in a network can support a star topology:

RECEPTION AREA àThe reception area consists of an Air conditioning which is installed for
the comfort of the clients in the waiting area. There is an IP phone connected to a switch to
improve communication, the IP Phone itself powers a PC, for which clients can work using the
console cable connected. A printer is also present to aid users to be able to print materials. In a
star topology, the CCTV cameras will be connected to a central hub or switch, allowing the
footage to be easily monitored and managed from a single location.

CAFETERIA à Again, similarly an AC along with a printer has been implemented and in use to
support workload management. A PC is used connected directly to the switch using a DHCP
address. A smartphone is connected to an Accesses Point, which uses a WEP2 Key Pass and a
password to authenticate connection. In a star topology, the webcam is to be connected to a
computer, which would in turn be connected to a central hub or switch. This would enable the
webcam to communicate with other devices on the network, such as other computers or video
conferencing equipment.

WAITING ROOM à: A webcam configured and connected directly to the switch to secure and
monitor the area. A Cloud has been used which connects a TV to provide a connection and the
Cloud itself is configures directly connected to a switch. An AC connected to the switch using a

Asia Pacific University 6


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Static address is configured. A personal computer (PC) can be used as a node in a star topology
network. The PC will be connected to a central hub or switch, which would allow it to
communicate with other devices on the network

MONITOR ROOM à: Similarly, a Cloud connected from the switch directly is solely responsible
of connecting the TV using a DHCP connection. RFID reader, AC, IOT devices all use a Static
IP address configured manually. In a star topology network, IoT devices would be connected to a
central hub or switch, which would allow them to ping messages from one device to another

What is Star Topology?

- Star topology is a computer network architecture in which all devices are connected to a
central hub or switch. In this type of topology, the hub or switch acts as a central point of
communication, facilitating the flow of data between different devices. Each device is
connected to the hub or switch through a separate cable, which enables fast and efficient
communication (Star Topology, n.d.). One of the major advantages of star topology is its
scalability, as new devices can be easily added without affecting the overall network
performance. Additionally, in case of any cable failure or device malfunction, the rest of
the network can continue to operate without interruption. However, the reliance on a
single central hub or switch also means that it can be a single point of failure, which may
affect the entire network if it malfunctions.

3.2 IP Addressing with Justification


Network NWID Usable Range Broadcast Hos Prefix Subnet
IP t Lengt Mask
h
Receptio 198.128.10.20 198.128.10.209 198.128.10.21 8 /29 255.255.255.24
n Area 8 - 5 8
198.128.10.214
Cafeteria 198.128.10.22 198.128.10.225 198.128.10.23 8 /29 255.255.255.24
4 - 1 8
198.128.10.230
Waiting 198.128.10.21 198.128.10.217 198.128.10.22 8 /30 255.255.255.24
Room 6 - 3 8

Asia Pacific University 7


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

198.128.10.222
CCTV 198.128.10.23 198.128.10.233 198.128.10.23 16 /30 255.255.255.24
Monitor 2 - 9 8
Room 198.128.10.238

The IP scheme of 192.168.10.208 with a subnet mask of 255.255.255.248 has been chosen for
level 1 of the building in Kuala Lumpur (KL) because it allows for a small network with up to 6
usable host addresses.

To explain the need for an IP scheme, it is important to understand that an IP address is a unique
identifier assigned to every device on a network, allowing for communication between devices.
Without a proper IP scheme, devices on a network may not be able to communicate with each
other, leading to network issues and downtime (IP Scheme, n.d.). An IP address range and subnet
mask are needed to help define the boundaries of a network and its subnetworks. An IP address
range specifies the range of IP addresses that can be assigned to devices on a network, while a
subnet mask helps define which part of the IP address represents the network portion and which
part represents the host portion (Subnet Mask, n.d.). This is important because it allows for
proper routing of network traffic and ensures that devices on different subnetworks are able to
communicate with each other.

The subnet mask of 255.255.255.248 is important because it allows for a small network with a
limited number of devices. In this case, the network on level 1 of the building in KL is limited to
6 usable host addresses, which is sufficient for a small network in that area. Using a smaller
subnet mask would have resulted in more host addresses, but it would have also created a larger
broadcast domain and potentially reduced network performance. Conversely, using a larger
subnet mask would have resulted in a smaller broadcast domain but also limited the number of
hosts addresses available.

Asia Pacific University 8


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Student 2:CHAI ZI HAN (TP067353)


KL branch 2nd Floor

4.1 Topology with Justification

Two topologies were used on SudaJayaTech's KL branch's second-floor network, and they are
star and point-to-point topologies.

The star topology was used to connect the switches in the different rooms together and then to
the router. The reasons for using star topology to connect the switches are its high reliability,
ease of installation and management, ease of troubleshooting, scalability and efficiency of using
the resource (Prasanna, 2022). First, the star topology is highly reliable because each device is
connected directly to the central device. If one device on the network fails, the rest of the
network remains unaffected. This will help to improve the stability of the company's network so
that the company will not face numerous departments going down simultaneously. Secondly, the

Asia Pacific University 9


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

ease of instalment and management and troubleshooting of star topology can save time and
resources for IT staff. Since each device is connected directly to the central device, the central
device can be used to configure and manage the network. Moreover, star topology is easily
scalable. It allows the company to grow in the future. When building a new department or
expanding the company, the owner can add a new network by simply connecting them to the
central device. Finally, star topology is efficient in the use of resources. In a star topology, the
bandwidth is shared by all the devices on the network. This means that each device can use the
full bandwidth when needed, which helps to improve the network performance.

The point-to-point topology was used to connect the devices in the room and department to the
network. Point-to-point topology was used to connect the devices in the room and department
because of its low latency, security, scalability, ease of troubleshooting and high
reliability(Jahejo, 2020). Point-to-point topology provides a direct and dedicated communication
path between two endpoints, which means that the communication can be faster and has lower
latency than other topologies. This is particularly important for real-time applications, such as
video conferencing and voice over IP (VoIP). This advantage can increase the work efficiency of
the departments. Furthermore, point-to-point topology provides a high level of security because
communication between two endpoints is not accessible to other devices on the network. This
makes it difficult for attackers to eavesdrop on the communication or intercept the data. This
helps to protect the trade secrets and important information of SudaJayaTech. Moreover, the
scalability of point-to-point topology allows the company to add new devices to their department
and room when they need. For instance, the employee can simply add more printers or connect
their phone or laptop to the network. Point-to-point topology is easily scalable because new
connections can be added without affecting the existing connections. This makes it an ideal
topology for applications that require a high degree of flexibility and adaptability, such as cloud
computing or Internet of Things (IoT) networks. On the other hand, point-to-point topology
enables the staff to troubleshoot easily because there are only two endpoints to check and isolate
the problem. This can save time and resources for network administrators and technicians when
some devices have problems and are not working.

Asia Pacific University 10


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

In conclusion, both star and point-to-point topologies offer unique benefits for a SudaJayaTech
network. Star topology provides centralized management and scalability, while point-to-point
topology offers low latency, security, scalability, and ease of troubleshooting.

4.2 IP Addressing with Justification


Network NWID Usable Range Broadcast Hos Prefix Subnet
IP t Lengt Mask
h
Administrati 198.128.10.0 198.128.10.1- 198.128.10.1 128 /25 255.255.255.1
ve Office 198.128.10.12 27 28
Room 6
Human 198.128.10.1 198.128.10.12 198.128.10.1 32 /27 255.255.255.2
Resource 28 9- 59 24
Department 198.128.10.15
8
Finance 198.128.10.1 198.128.10.16 198.128.10.1 32 /27 255.255.255.2
Department 60 1- 91 24
198.128.10.19
0
CEO Room 198.128.10.1 198.128.10.19 198.128.10.1 8 /29 255.255.255.2
92 3- 99 48
198.128.10.19
8
KL Branch 198.128.10.2 198.128.10.20 198.128.10.2 8 /29 255.255.255.2
Manager 00 1- 07 48
Room 198.128.10.20
6

Asia Pacific University 11


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

The network ID 198.128.10.0, 198.128.10.128, 198.128.10.160, 198.128.10.192, 198.128.10.200


are used in the KL branch 2nd floor as this floor is the main administrative areas of
SudaJayaTech and it uses the most devices in this building.

For the administrative office room, network ID 198.128.10.0 was used. There are 72 devices
used in this room. The prefix length for this room is /25. The usable range of IP addresses for
this room is from 198.128.10.1 to 198.128.10.126. The broadcast address for this subnet is
198.128.10.127, which is the last address in the subnet. The subnet mask used in this room is
255.255.255.128. This addressing scheme was chosen because it allows for up to 126 hosts to be
connected to the network in the Administrative Office Room.

For the human resource department, network ID 198.128.10.128 was used. There are 23 devices
used in this room. The prefix length for this room is /27. The usable range of IP addresses for
this room is from 198.128.10.129 to 198.128.10.158. The broadcast address for this subnet is
198.128.10.159, and the subnet mask used in this room is 255.255.255.224. This addressing
scheme was chosen because it allows up to 30 hosts to connect to the network in this room.

For the finance department, network ID 198.128.10.160 was used. There are 18 devices used in
this room. The prefix length for this room is /27. The usable range of IP addresses for this room
is from 198.128.10.161 to 198.128.10.190. The broadcast address for this subnet is
198.128.10.191, and the subnet mask used in this room is 255.255.255.224. This addressing
scheme was chosen because it allows up to 30 hosts to connect to the network in this room.

For the CEO room and KL branch manager room, as the number of devices used in both rooms
is the same, 6 devices, the prefix length, /29, was used in both rooms. The network ID
198.128.10.192 was used in the CEO room, and 198.128.10.200 was used in the KL branch
manager room. The usable range of IP addresses for the CEO room and KL branch manager
room is from 198.128.10.193 to 198.128.10.198 and 198.128.10.201-198.128.10.206. The
broadcast address for the CEO room is 198.128.10.199, and 198.128.10.207 is the broadcast IP
for the KL branch manager room. The same subnet mask, 255.255.255.248, was used in both
rooms. This addressing is chosen because it allows up to 6 hosts to connect to the network in
each room.

Asia Pacific University 12


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Student 3: YUMA HIGA (TP066555)


Cyber Jaya branch 1st Floor
5.1 Topology with Justification

Tree topology is chosen for Cyber Jaya branch 1st Floor, A network topology known as "tree
topology" is organized hierarchically, much like a tree's branches. The root, the branches, and the
leaves are the minimal number of levels that it has. Additionally, the tree topology is highly
scalable, meaning that it can easily accommodate more nodes as the network grows (What Is
Tree Topology? Definition and Explanation - Javatpoint, 2021). First advantage of tree topology
is that tree topology easily detect fault in network, since this branch is just organized, it is no
doubt that this new network diagram contains the possibility of failure, Hence, the network will
benefit from the ease of fault detection since a device problem may be tracked up the hierarchy
to identify the faulty device, for instance, If a device is not communicating, either the problem
lies with the device itself or with the parent device, this easiness of fault detection comes from
Hierarchical Structure, Because of its hierarchical structure, tree topology is simple to administer

Asia Pacific University 13


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

and keep up with. Its structure makes it simple to distinguish between the network's many layers,
including the root, branches, and leaves. This makes it simple for network managers to find and
fix any potential problems. This process of tracking the error while going up the hierarchy from
the leaf node is known as "tracing up" (Singh, 2022). and another one of the key benefits of tree
topology is that it is scalable. When the Cyberjaya branch expands, it can therefore readily
accommodate new devices and networks. For instance, adding a new branch to the tree
architecture would make it simple for the Cyberjaya branch to expand its activities to a new site
and connect it to the existing network (Advantages and Disadvantages of Tree Topology, 2023).
But why tree topology is scalable? It is because it permits relatively minimum network
disturbance when new nodes are added. Improving performance is one of the important key
features as well, Because of the network's hierarchical structure, which enables traffic dispersion,
tree topology enhances performance by lowering network traffic. The degree of network
congestion is decreased by spreading out the traffic among several nodes, improving overall
performance. Cheapness can be a benefit to any company, and Sudajaya tech is no exception as
well. From this perspective, employing tree topology for Cyberjaya branch is certainly beneficial
since tree topology is cost friendly by enabling the utilization of shared resources, tree topology
greatly lowers expenses. For instance, a single central server can act as a resource for several
network branches, avoiding the need for multiple servers, which can be expensive to buy and
operate and offer services like printing, storage, and other functions. Tree topology can also help
the network run faster and more reliably by optimizing traffic flow and supplying redundancy.
These are the justifications I found through the research, in conclusion, tree topology is the most
suitable logic topology for Cyber Jaya branch 1st Floor.

5.2 IP Addressing with Justification


Network NWID Usable Range Broadcast Ho Prefix Subnet
IP st Length Mask
Pantry 198.128.20.48 198.128.20.49- 198.128.20.5 8 /29 255.255.255.24
198.128.20.54 5 8
Reception 198.128.20.56 198.128.20.57- 198.128.20.6 8 /29 255.255.255.24
Area 198.128.20.62 3 8
CTO 198.128.20.64 198.128.20.65- 198.128.20.7 8 /29 255.255.255.24

Asia Pacific University 14


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Room 198.128.20.70 1 8
Cyber 198.128.20.72 198.128.20.73- 198.128.20.7 8 /29 255.255.255.24
Jaya 198.128.20.78 9 8
Branch
Manager
Room
For subnetting, we selected the prefix length /29; it is a good subnet size for small networks that
don't require a lot of hosts or subnets. Given that the Cyber Jaya branch's first floor office is a
compact facility with a finite number of IP addresses, it is particularly helpful. It is especially
helpful for point-to-point links because it enables the creation of a specific subnet just for the
connection, like one between two routers. Furthermore, as it enables more effective use of the
wireless spectrum, the /29 subnet mask is especially helpful for wireless networks. The number
of wireless channels that must be used is decreased by subnetting the wireless network into
smaller subnets, enabling improved efficiency. The fifth digit from the left in the last binary
section is called the magic number (NetAcad Course UI, 2023).

The IP addressing scheme for the Cyberjaya first floor is intended to give each network a special
address and enable communication between them. Each network is given a distinct network ID, a
usable range of IP addresses, a broadcast IP address, and a subnet mask as part of a hierarchical
distribution of network addresses. To help with packet routing between several networks, the
subnet mask splits the IP address into network and host components.

A thorough reason for the IP addressing for Cyberjaya's first level is provided below:

Pantry: The pantry network is a small network with a limited number of hosts, making it ideal for
the pantry area of a business. The network is assigned a /29 prefix, which is a Class C network,
meaning it has a maximum capacity of 8 hosts. This is sufficient for the pantry area, which only
needs a few hosts. The valid IP address range for this network is 198.128.20.49–198.128.20.54,
with an IP address of 198.128.20.55 for broadcasting. This small network is an efficient way to
manage the pantry area, as it allows for the limited number of hosts needed while avoiding
unnecessary waste of IP addresses.

Asia Pacific University 15


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Reception: The reception area network is a private network that can accommodate up to 8 hosts.
It is identified by the network ID 198.128.20.56 with a prefix of /29. This means that the valid IP
address range for this network is 198.128.20.57–198.128.20.62. The broadcast address for this
network is 198.128.20.63. This network is designed to serve the reception area, which only
requires a few hosts. It is important to note that because this is a private network, hosts on this
network must be properly configured with the appropriate IP address, subnet mask, and other
settings in order to communicate with each other.

CTO room: The CTO Room Network is a private network that can accommodate up to 8 hosts. It
has been assigned the IP address 198.128.20.64 and a /29 prefix, which provides 6 useable IP
addresses for hosts in the range of 198.128.20.65 - 198.128.20.70. The broadcast IP address is
198.128.20.71. This network is used by the CTO Room, and only a few hosts are required. The
network can be used for internal communications and other data transfers, and provides a secure
and reliable platform for businesses.

Manager room: The Cyber Jaya Branch Manager Room utilizes the network 198.128.20.72/29 to
provide access to up to 8 hosts. The valid IP address range for this network includes 6 addresses,
which are 198.128.20.73–198.128.20.78. The broadcast IP address is 198.128.20.79. With this
network, the Cyber Jaya Branch Manager Room can provide secure and reliable access to a few
hosts. This network is also capable of handling any traffic without any interruption or disruption.

The IP addressing scheme for the Cyberjaya first floor is intended to give each network the
appropriate number of addresses without wasting any. Each network uses the /29 prefix, which
offers eight addresses total—the network ID, the broadcast address, and six host-usable
addresses. The IP address is split into network and host parts thanks to the subnet mask, which is
set at 255.255.255.248. This enables communication between the various networks. Each
network on the Cyberjaya first floor has specific needs, and those needs are met by the IP
addressing scheme.

Asia Pacific University 16


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Student 4: SK ABDUR RAHMAN RIDOY (TP061108)


Cyber Jaya branch 2nd Floor

6.1 Topology with Justification

The scenario's network diagram shows a hybrid architecture that blends the bus and tree
topologies. The tree topology establishes a hierarchical structure by tying together several
smaller networks (bus topology). The central hub (core switch) that links to other nodes to
produce branches is known as the root node. With this topology, network administration is
simpler and network traffic may be better controlled.

Bus topologies make it possible to efficiently distribute network traffic and expand networks
quickly since new devices may be connected to an existing bus by simply plugging them in. This

Asia Pacific University 17


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

architecture is a great option for small- to medium-sized networks since it also has low latency
and is economical.

The tree topology, on the other hand, offers a central hub for the switches in many departments,
making network management, monitoring, and troubleshooting simple. Since the failure of one
switch does not affect the entire network, this architecture also provides excellent dependability.
Also, the tree topology offers a flexible and scalable network that makes it simple to integrate
additional devices or departments without compromising the performance of the current network.

The switches in this hybrid topology are coupled to form a tree topology on the inner layer, while
the switches on the outermost layer form a bus topology that links several devices. The switches
serve as middlemen, taking data packets from one device and sending them on to the next. The
switches may isolate network problems by segmenting the network into smaller parts, which
enhances network performance and dependability.

In the network diagram, each switch has a distinct function and is connected to different pieces
of machinery. The switches in the development hub, technical support center,
meeting/conference room, and server room each have a specific purpose and are connected to
various gadgets. Every department will have access to the resources they require to function
properly thanks to this arrangement.

The Development Hub switch, which provides network access to a printer, a PC with an IP
phone, a CCTV, and an AC, serves as the main hub for the development department. Thanks to
the IP phone's connection to the PC and switch, employees have voice communication
capabilities, enabling departmental cooperation and information sharing. The printer makes it
simpler to print important documents, while the CCTV cameras keep an eye on the area to
preserve security.

The major node for the technical help division is the Technical Assistant switch, which grants
access to the network to an RFID reader, an IP phone connected to a PC, a CCTV, and AC. The
IP phone attached to the computer enables voice communication between staff members, while
the RFID reader helps track the movement of items or personnel inside the company.

Two servers, a CCTV, an RFID reader, and an AC are all connected via the server room switch.
The servers are fundamental to the running of the business since they hold important data and

Asia Pacific University 18


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

applications. Both the CCTV and the RFID reader help with space monitoring and object and
person tracking.

The printer, TV, laptop-linked IP phone, CCTV, and AC are all connected through the
meeting/conference room switch. The IP phone attached to the laptop allows for voice
connection between staff members, and the switch permits communication and information
exchange among the gadgets in space. Important documents may be quickly printed with the
printer, presentations can be facilitated, and useful information is shown on the TV.

In conclusion, the hybrid network architecture in the scenario offers an effective and efficient
solution to distribute resources in a big organizational environment and control network traffic.
The switches have distinct connections and particular functions, ensuring that each department
has access to the resources they require. The top layer's tree topology helps with network control,
while the bottom layer's bus architecture enables effective traffic distribution.

6.2 IP Addressing with Justification


Network NWID Usable Range Broadcast Host Prefix Subnet
IP Length Mask
Development 198.128.20.0 198.128.20.1- 198.128.2 16 /28 255.255.255.
Hub 198.128.20.14 0.15 240
Technical 198.128.20.16 198.128.20.17 198.128.2 16 /28 255.255.255.
Assistant to - 0.31 240
Monitor the 198.128.20.30
Network
Server Room 198.128.20.32 198.128.20.33 198.128.2 8 /29 255.255.255.
- 0.39 248
198.128.20.38
Meeting 198.128.20.40 198.128.20.41 198.128.2 8 /29 255.255.255.
Room - 0.47 248
198.128.20.46

According to the subnetting concept, which enables the network to be divided into smaller sub-
networks, each with its own distinct network address and a constrained number of hosts, the IP

Asia Pacific University 19


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

addressing for the Cyberjaya 2nd floor has been created. This method has various advantages,
including better network administration, higher security, and improved network performance.

There are four separate regions or rooms on the second level of Cyberjaya, and each one requires
a different number of devices to be linked to the network. As a result, the network has been
separated into four subnets, each of which has its own network ID, useable range, broadcast IP,
prefix, subnet mask, and number of hosts.

We have given the Development Hub a /28 subnet with a network ID of 198.128.20.0 because it
has 8 devices. As a result, a workable range of 198.128.20.1-198.128.20.14 is provided, which
can support up to 16 hosts. This allocation makes sure that every device in the Development Hub
is on the same subnet, facilitating simple management and communication.

As there are 7 devices in the technical assistant room, we have additionally assigned it a /28
subnet with the network ID 198.128.20.16. Hence, a workable range of 198.128.20.17–
198.128.20.30 is made available, which may support up to 16 hosts. Once more, this distribution
makes sure that every device in the technical assistant room is on the same subnet, facilitating
simple management and communication.

With 5 devices in the server room, we have allotted a /29 subnet with the network ID
198.128.20.32. With up to 8 hosts fit inside, this gives a useful range of 198.128.20.33–
198.12.38. This distribution makes sure that every device in the server room is connected to the
same subnet, making maintenance and communication simple. Also, by reducing the number of
devices on the network, the lower subnet size enhances security.

Six devices were found in the Meeting/Conference Room, thus we allocated another /29 subnet
with the network ID 198.128.20.40. Thus, a usable range of 198.128.20.41–198.128.20.46 is
provided, which can support up to 8 hosts. This distribution makes sure that every device in the
meeting/conference room is on the same subnet, facilitating simple management and
communication.

To make effective use of IP addresses and optimum network performance, the IP addressing
system for the Cyberjaya 2nd level has been meticulously planned. Subnetting has improved
security and network administration while enabling us to build smaller, easier-to-manage
subnets.

Asia Pacific University 20


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

7. Conclusion
In conclusion, topology and IP addressing are two crucial components of a company network
that directly impact its performance and functionality. Topology defines the physical and logical
layout of the network, while IP addressing ensures that data packets are routed correctly to their
destination. Choosing the right topology and IP addressing scheme can improve network
efficiency, reduce latency, and enhance overall network performance. A well-designed network
topology and IP addressing scheme can also improve network security and scalability, ensuring
that the network can grow and adapt to meet the company's changing needs. Therefore, it is
essential to consider topology and IP addressing carefully when designing a company network,
as they are critical factors that contribute to the success of the network and the business as a
whole.

Asia Pacific University 21


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

8. Reference
Contributor, S. (2022, October 20). What is network topology? best guide to types & diagrams.
from https://www.dnsstuff.com/what-is-network-topology

Jahejo, A. (2020, May 22). Point to point topology - advantages & disadvantages: Network
topology. from https://computernetworktopology.com/point-to-point-topology/

Prasanna. (2022, January 07). Star topology advantages and disadvantages: What is star
topology? advantages and disadvantages of Star Network topology. from
https://www.aplustopper.com/star-topology-advantages-and-disadvantages/

NetAcad Course UI. (2023). Netacad.com. https://contenthub.netacad.com/itn-dl/11.5.4

What is Tree Topology? Definition and Explanation - javatpoint. (2021). Www.javatpoint.com.


https://www.javatpoint.com/what-is-tree-topology

Singh, C. (2022, September 24). What is Tree Topology – Advantages and Disadvantages.
BeginnersBook. https://beginnersbook.com/2022/09/what-is-tree-topology/

Advantages and Disadvantages of Tree Topology. (2023). Tutorialspoint.com.


https://www.tutorialspoint.com/advantages-and-disadvantages-of-tree-
topology#:~:text=Scalability,networks%20as%20the%20organization%20grows

Prasanna. (2022, January 25). Tree Topology Advantages and Disadvantages | What is Tree
Topology? Advantages and Disadvantages of Tree Topology. A plus Topper.
https://www.aplustopper.com/tree-topology-advantages-and-disadvantages/

Subnet Mask. (n.d.). https://www.spiceworks.com/tech/networking/articles/what-is-subnet-


mask/#:~:text=A%20subnet%20mask%20is%20defined,its%20benefits%20to
%20network%20infrastructure.

IP Scheme. (n.d.). https://ipwithease.com/ip-addressing-scheme-ipv4/

Asia Pacific University 22


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Star Topology. (n.d.). https://www.techopedia.com/definition/13335/star-


topology#:~:text=Explains%20Star%20Topology-,What%20Does%20Star%20Topology
%20Mean%3F,connecting%20nodes%20act%20like%20clients.

9.Alternate Roles
STUDENT TP NO. WORK SIGNATURE
Chai Zi Han TP067353 -Compile network diagram
-Subnetting and IP addressing for all
branch
YUMA HIGA TP066555 -complete Cyberjaya 1st floor part
-help Chai zi Han to check address
SK ABDUR TP061108 -Making sure if all the subnetting is
RAHMAN
correct or not.
RIDOY
- Completing Cyberjaya 2nd Floor
MAAHER TP072081 -

Asia Pacific University 23


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

10. Peer Evaluation

Student Name / TP Number : Sk Abdur Rahman Ridoy (TP061108)

Please answer ‘Yes’ / ‘No’

Myself Member 2 Member 3 Member 4


TP NO: TP NO: TP NO: TP NO:
TP061108 TP066555 TP072081 TP067353
Participated in group Yes Yes Yes Yes
discussion

Helped to monitor Yes Yes Yes Yes


group progress

Contributed useful Yes Yes Yes Yes


ideas

Completed work on Yes Yes Yes Yes


time

Submitted good Yes Yes Yes Yes


quality of work

Communicated Yes Yes Yes Yes


effectively with group
members

Helped others with Yes Yes Yes Yes


their work when
needed

Asia Pacific University 24


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Good relationship Yes Yes Yes Yes


with group members

Overall was a valuable Yes Yes Yes Yes


member of the team

Self-Reflection (what I did best and what I should improve in future):


It needs careful planning and close attention to detail to create a network design for a whole
organisation and subnet it. During this project, I gained knowledge about networking basics and
how to use them to build a network architecture that satisfies the requirements of a particular
firm. This task helped me comprehend how to partition the network of a business into smaller,
more manageable subnetworks, which is a crucial component of networking. I gained knowledge
about IP address allocation and conflict avoidance through subnetting. Overall, the Introduction
to Networking Group Assignment provided me with a great chance to practise networking in
real-world situations and to hone my analytical and problem-solving abilities. I gained
knowledge on how to create a network architecture that satisfies organisational goals while
assuring dependability, security, and scalability by completing this project.

Asia Pacific University 25


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Student Name / TP Number : Chai Zi Han (TP067353)

Please answer ‘Yes’ / ‘No’

Myself Member 2 Member 3 Member 4


TP NO: TP NO: TP NO: TP NO:
TP067353 TP066555 TP061108 TP072081
Participated in group Yes Yes Yes Yes
discussion

Helped to monitor Yes Yes Yes Yes


group progress

Contributed useful Yes Yes Yes Yes


ideas

Completed work on Yes Yes Yes Yes


time

Submitted good Yes Yes Yes Yes


quality of work

Communicated Yes Yes Yes Yes


effectively with group
members

Helped others with Yes Yes Yes Yes


their work when
needed

Good relationship Yes Yes Yes Yes


with group members

Asia Pacific University 26


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Overall was a Yes Yes Yes Yes


valuable member of
the team

Self-Reflection (what I did best and what I should improve in future):


In this Assignment, I have learned how to design a network diagram, subnetting, routing and IP
addressing. I used what I learned to complete the network diagram perfectly. All devices in the
network diagram are working and enable to ping each other. However, I have encountered
frustration in my communication with my teammate when doing the assignment. I should
improve my communication skills in the future.

Student Name / TP Number : YUMA HIGA/TP066555

Please answer ‘Yes’ / ‘No’

Myself Member 2 Member 3 Member 4


TP NO: TP NO: TP NO: TP NO:
TP066555 TP061108 TP067353
TP072081
Participated in group YES YES YES YES
discussion
Helped to monitor YES YES YES YES
group progress
Contributed useful YES YES YES YES
ideas
Completed work on YES YES YES YES
time
Submitted good YES YES YES YES
quality of work
Communicated YES YES YES YES
effectively with group
members

Asia Pacific University 27


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

Helped others with YES YES YES YES


their work when
needed

Good relationship YES YES YES YES


with group members

Overall was a valuable YES YES YES YES


member of the team

Self-Reflection (what I did best and what I should improve in future):


Through working on this assignment, I felt I have a basic knowledge of networking, but when I
try to put a bit more detailed information on my part, I was quit struggling with it. It means that
my knowledge about this subject is still limited, and I haven’t reached advanced level yet. In
conclusion, I must work on deepening my knowledge of networking.

Student Name / TP Number : Maaher (TP072081)

Please answer ‘Yes’ / ‘No’

Myself Member 2 Member 3 Member 4


TP NO: TP NO: TP NO: TP NO:
072081 TP061108 TP067353 TP066555
Participated in group YES YES YES YES
discussion
Helped to monitor YES YES YES YES
group progress
Contributed useful YES YES YES YES
ideas
Completed work on YES YES YES YES

Asia Pacific University 28


Group Assignment CT043-3-1-Introduction to Networking APD1F2111SE

time
Submitted good YES YES YES YES
quality of work
Communicated YES YES YES YES
effectively with group
members

Helped others with YES YES YES YES


their work when
needed

Good relationship YES YES YES YES


with group members

Overall was a valuable YES YES YES YES


member of the team

Self-Reflection (what I did best and what I should improve in future):


After accomplishing my role in this assignment, I have grasped how to deal with the immense
pressure and how to face it with ease. I have also learned how to cope with my partners in this
group and how not to panic during my work. What made me happy is that I have created my own
diagram which made me feel like I have achieved something in my IT career. Well, there is still a
lot to learn and improve. I still need to learn a lot about CISCO packet tracer and the
configuration of networking.

Asia Pacific University 29

You might also like