You are on page 1of 36

ASSIGNMENT 2 FRONT SHEET

Qualification TEC Level 5 HND Diploma in Computing

Unit number and title Unit 2: Networking

Submission date 03/04/2024 Date Received 1st submission 03/04/2024

Re-submission Date Date Received 2nd submission

Student Name PHAN DO THANH LONG Student ID BS00758

Class SE07102 Assessor name DO PHI HUNG

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature

Page | 1
Grading grid

P5 P6 P7 P8 M3 M4 D2

Page | 2
 Summative Feedback:  Resubmission Feedback:

Grade: Assessor Signature: Date:


Internal Verifier’s Comments:

Signature & Date:

Page | 3
Contents
Introduction.................................................................................................................................................. 6
1. Provide a logical/physical design of the networked system with clear explanation and addressing table
(P5):.............................................................................................................................................................. 6
1.1 Explain the difference between logical and physical design:..............................................................6
The logical design................................................................................................................................. 6
The physical design:..............................................................................................................................6
1.2 Discuss and explain the USER Requirement for the design:...............................................................6
1.3 Provide a logical design of the network base on user requirement...................................................7
1.4 Provide a physical design of the network based on user requirement..........................................9
1.5 Provide addressing table for the network you design......................................................................10
2. Evaluate the design to meet the requirements (P6):.............................................................................10
2.1 Provide test plan (Screen shot of evidence of test such as ping test – connectivity test etc.)..........10
2.2 Evaluate the design of the network..................................................................................................11
2.3 Show limitation of your design based on the user requirement and the strength..........................12
2.4What advice and solution would you provide to the network for efficiency and usage....................12
3. Implement a networked system based on a prepared design (P7)........................................................13
3.1 Show evidence of a working network you’ve design........................................................................13
3.2 Show the implemented system........................................................................................................ 15
3.2 Show the implemented system........................................................................................................ 24
4.................................................................................................................................................................. 26
4.1 • Provide a step by step configuration of network devices in the network.................................26
4.1.1 Router configuration:.................................................................................................................26
4.1.2 Switch configuration:.................................................................................................................27
4.1.3 Access Point (AP) configuration:................................................................................................27
4.2 The first step is to set up the server such as setting the address for DNS server and Default
Gateway.................................................................................................................................................. 28
Sever 0-1............................................................................................................................................. 28
The Router (FastEthernet0/0).............................................................................................................30
The Multilayer Switch connected to the computers...........................................................................31
Page | 4
DHCP SERVER...................................................................................................................................... 32
4.3 Test results against test plans...........................................................................................................32
5. References.............................................................................................................................................. 33

Page | 5
Introduction

1. Provide a logical/physical design of the networked system with clear


explanation and addressing table (P5):

1.1 Explain the difference between logical and physical design:


The logical design: is more intellectual and abstract than the physical design. In logical design, you
examine the logical links between items. In physical design, you look at storing and retrieving the objects
effectively. Your design should be focused on the demands of the end-users.

The physical design: Physical design considers efficient storage and retrieval of objects. The physical
design process involves converting circuit descriptions into physical layouts that define the locations of
cells and the routes that connect them. In the physical design, you look at the most effective way of
storing and retrieving the objects.

1.2 Discuss and explain the USER Requirement for the design:
User requirements is that the set of requirements gathered or derived from user input and is what's
needed by users to user the good network design[ CITATION Jam03 V 1033 ]. Typically, when gathering
requirements, everyone attached that network design is taken into account a potential user. Some of
user requirements for general network design can be told as Interactivity, presentation quality,
functionality, supportability and future growth.

Thus, designing a network can be a challenging task. To design reliable, expendable internetworks,
network designers must realize that components of an internetwork have distinct design to meet user
requirements.

From there, there are design and implement the networking project based on the specific user
requirements below:

Objects:

 200 students
 15 teachers
 12 marketing and administration staff
 5 higher managers including the head of academics and the programmer manager
 3 computer network administrators

Page | 6
Actual Resources: 50 student lab computers, 35 staff computers, and 3 printers.

System structure: 3 floors, all system computers and printers are on the ground floor apart from the IT
labs - one lab located on the first floor with 25 lab computers and another located on the second floor
with 25 left computers.

Prepare for design:

 9 PCs
 1 Laptop
 1 Router (1841)
 5 Switch (2960)
 2 Sever
 1 Multilayer Switch

1.3 Provide a logical design of the network base on user requirement


User Requirements (Based on previous discussions): 3-story school building

Users:

 200 Students (likely in labs or classrooms)


 15 Teachers (likely in staff rooms)
 12 Marketing & Admin Staff (likely on ground floor)
 2 Senior Managers (likely on a separate floor)

Security needs:

 Segregate traffic for different user groups (students, staff, management)


 Reliable internet access for all users

Logical Network Design:

1. Hierarchies:
 Core Layer (Centralized): A single core switch located in a central network closet will handle high-
bandwidth traffic between floors and connect to the internet.
 Distribution Layer (Distributed): One distribution switch will be placed on each floor. These
switches will connect to access points (wireless) and access switches (wired) on their respective
floors.

Page | 7
 Access Layer (Distributed): Access switches will be located in strategic areas like classrooms, labs,
and staff rooms. These switches will connect user devices (computers) and printers. Wireless
access points (WAPs) will also be deployed for wireless connectivity throughout the school.

VLANs (Virtual LANs):

1. Implement VLANs to logically segment the network for different user groups:
 VLAN 80: (limits access to sensitive resources)
 VLAN 90: KT (provides access to administrative tools)
 VLAN 100 : PGD Management (high security for critical data)
 VLAN 110 : Guest (limited access for visitors)
 Printers can be assigned to appropriate VLANs based on location and usage.

Security:

 Implement a firewall at the core layer to filter incoming and outgoing traffic and enforce security
policies.
 Utilize Access Control Lists (ACLs) on switches and ports to restrict unauthorized access between
VLANs.

Addressing:

Use a private IP address range (192.168.) for the internal network. Assign subnets within this range for
each VLAN for efficient management.

In this network design, 9 Computers, 1 Laptop, 5 Switches and 1 Routers. 9

Computers are separated into three floors to suit with requirements. 4 Computers representing for 50
lab computers on first and second floor, the others are set for different functions room in ground floor.
And each switch is set for each floor.

 On first floor, Student Lab 1 has 2 computers, 1 switch. The reason why student Lab 1 has 1
switch is because one switch contains 24 port so that this can connect more computer to
representing for 25 lab computers only with 2 lab computers.
 On Second floor, Student Lab 2 has 2 computer, 1 switch. Switch connected 2 computer is enough
for representing left 25 computer.
 Staff room has 6 computers include: 2 for teacher room(representing for 15 teacher computers):
4 for Admin and marketing room(representing for 12 AD & MAR computers): Manager
room(representing for 5 computers): Network admin room(representing for 3 computers) and 1
router, 1 switch, 2 sever

Page | 8
 Configure IP Address:
- in my logical network design I do not provide ip address for each computer as usual, but I
give the address through DHCP server. Specifically, i configure one router(1941) with host
name "R-Center". With the a router(R-center) configuration, it sets the full DHCP server

implementation that assigns and manages IP addresses from specified address 3 pools
within the router(R- Center) through Gigabit-thernet ports to computer 3 floor which use
ip address DHCP sever.

1.4 Provide a physical design of the network based on user requirement

Page | 9
1.5 Provide addressing table for the network you design.

2. Evaluate the design to meet the requirements (P6):


2.1 Provide test plan (Screen shot of evidence of test such as ping test –
connectivity test etc.)
2.1.1 Ping test

 Test Objectives
o Validate network connectivity between all devices across different floors.
o Verify internet access for all devices.
o Test performance metrics like bandwidth, latency, and jitter.
o Ensure proper VLAN segmentation for different network segments (e.g.,
administration, staff, students).
o Evaluate security features like access control lists (ACLs) and firewall
functionality.
o Assess wireless network coverage and signal strength throughout the school.
 Scope

o This test plan covers the entire 3-story Cisco network including:
o Core switches and routers
o Distribution switches
o Access switches
Page | 10
o Wireless Access Points (WAPs)
o Firewalls
o Security features (ACLs, VLANs)
 Test Approach

o Configuration Testing: Verify proper configuration of all network devices


using Cisco CLI commands.
o Connectivity Testing: Use tools like ping and traceroute to test connectivity
between devices across different floors and to the internet.
o Performance Testing: Utilize tools like iperf3 to measure network bandwidth,
latency, and jitter.
o Security Testing: Simulate security attacks using ethical hacking tools to
assess the effectiveness of firewalls and ACLs.
o Wireless Testing: Conduct Wi-Fi site surveys to measure signal strength and
coverage throughout the school. Devices with Wi-Fi scanning capabilities can
be used for this purpose.
 Test Data
o Use a variety of test traffic types (data, voice, video) to simulate real-world
network usage.
o Generate varying traffic loads to test network performance under stress.
 Pass/Fail Criteria
o All devices should be reachable by ping and traceroute.
o Internet access should be functional for all devices.
o Bandwidth, latency, and jitter should meet pre-defined performance
benchmarks.
o Security measures should prevent unauthorized access and malicious
activity.
o Wireless coverage should be sufficient to ensure consistent signal strength
throughout the school.

Page | 11
2.2 Evaluate the design of the network
1. Determine requirements:

• Purpose of using the network: to help access the internet and share documents at
BTEC FPT College

• Number of users: 250 including students, lecturers, collaborators

• Performance requirements: The network needs to meet very good speed and
reliability requirements

2. Partition design:

• Network Architecture: Network architecture is consistent with clearly defined


requirements.

• Network devices: Network devices are properly selected.

• Network configuration: Network configuration ensures performance and security.

• Design documents: Complete and accurate design documents

3. Testing and evaluation:

• Network testing: The network has been tested and guaranteed to function correctly
and meet requirements.

• Problem Solving: Any problems discovered during testing should be resolved.

• Result evaluation:

• Evaluation of the results was performed ensuring the network met the
requirements.

2.3 Show limitation of your design based on the user requirement and the
strength.
2.4What advice and solution would you provide to the network for efficiency
and usage.
• Analyze Network Traffic:
Page | 12
Understand how your network is currently being used. Network traffic analysis tools can
help you identify peak usage times, applications consuming the most bandwidth, and
potential bottlenecks. This information is crucial for implementing effective optimization
strategies.

• Implement Traffic Prioritization:

Not all data is created equal. Prioritize critical traffic like video conferencing or VoIP calls
over less urgent tasks like file downloads. Quality of Service (QoS) settings can be used to
ensure important data gets transmitted with minimal delays.

• Network Management Systems (NMS):

Consider using an NMS to gain real-time insights into your network health. These tools
provide comprehensive views of bandwidth usage, allowing you to identify problem areas
and optimize resource allocation.

• Data Compression:

Techniques like ZIP or GZIP can reduce the size of data packets before transmission. This
frees up bandwidth and improves transfer speeds, especially for large files.

• Strategic Network Configuration:

Regularly review your network configuration to ensure optimal performance. This may
involve optimizing routing protocols, upgrading outdated firmware, or implementing
bandwidth limitations for specific users or devices.

• Monitor and Maintain:

Network efficiency is an ongoing process. Regularly monitor performance metrics like


latency, packet loss, and bandwidth usage. Proactive maintenance can help identify and
address potential issues before they significantly impact network performance.

Page | 13
3. Implement a networked system based on a prepared design (P7)
3.1 Show evidence of a working network you’ve design

• Router: Manages network traffic flow, directing data packets between the internet
and internal devices. (Evidence: Router configuration file showing settings for DHCP, NAT,
and security)

• Switch: Connects all network devices (computers, printers, etc.) and facilitates data
exchange within the office. (Evidence: Switch configuration file showing port allocation

Page | 14
and VLAN settings)

• Wireless Access Point (WAP): Provides secure Wi-Fi access for laptops and mobile
devices. (Evidence: Screenshots of the WAP's web interface displaying SSID name and
security settings)

• While I can't deploy a physical network, I can utilize network simulation software to
model the designed network. This simulation would demonstrate data flow, connectivity
between devices, and basic functionality like internet access and file sharing.

Planning Documents:

• Network Diagram: A visual representation of the network layout, including all


devices and their connections.

• Configuration Files: Sample configuration files for the router, switch, WAP, and
firewall would showcase the specific settings implemented for security and functionality.

• Security Policy: A document outlining the network's security protocols, user access
controls, and procedures for maintaining a secure environment.

Page | 15
3.2 Show the implemented system
 PC0 ( ip 192.168.90.3)

 PC1 (ip 192.168.100.3)

Page | 16
 PC2 ( ip 192.168.110.2)

Page | 17
 PC3 (ip 192.168.110.3)

Page | 18
 PC4 (192.168.80.2)

Page | 19
 PC5( 192.168.80.3)

Page | 20
 PC6( 192.168.90.3)

Page | 21
 PC7( 192.168.90.4)

Page | 22
 PC8 (192.168.90.5)

Page | 23
 Laptop0( 192.168.90.3)

Page | 24
3.2 Show the implemented system

In this network design, 9 Computers, 1 Laptop, 5 Switches and 1 Routers.

Page | 25
Computers are separated into three floors to suit with requirements. 4 Computers representing for 50
lab computers on first and second floor, the others are set for different functions room in ground floor.
And each switch is set for each floor.

Page | 26
 On first floor, Student Lab 1 has 2 computers, 1 switch. The reason why student Lab 1 has 1
switch is because one switch contains 24 port so that this can connect more computer to
representing for 25 lab computers only with 2 lab computers.
 On Second floor, Student Lab 2 has 2 computer, 1 switch. Switch connected 2 computer is enough
for representing left 25 computer.
 Staff room has 6 computers include: 2 for teacher room(representing for 15 teacher computers):
4 for Admin and marketing room(representing for 12 AD & MAR computers): Manager
room(representing for 5 computers): Network admin room(representing for 3 computers) and 1
router, 1 switch, 2 sever

C
onfigure IP Address:
- in my logical network design I do not provide ip address for each computer as usual, but I
give the address through DHCP server. Specifically, i configure one router(1941) with host
name "R-Center". With the a router(R-center) configuration, it sets the full DHCP server
implementation that assigns and manages IP addresses from specified address 3 pools
within the router(R- Center) through Gigabit-thernet ports to computer 3 floor which use
ip address DHCP sever.

4. Document and analyze test results against expected results (P8)

4.1• Provide a step by step configuration of network devices in the network


4.1.1 Router configuration:
a. Access the configuration interface:

Connect the computer to the router using an Ethernet cable.


Page | 27
Open a web browser and enter the router's IP address in the address bar.

Enter username and password to log in.

b. Basic configuration:

Select internet connection type (PPPoE, DHCP, Static IP).

Configure the Wi-Fi network name (SSID) and password.

Enable DHCP to automatically assign IP addresses to devices.

c. Advanced configuration (optional):

Port forwarding settings for specific applications.

Enable DMZ (Demilitarized Zone) for devices that need external access.

Configure VPN (Virtual Private Network) to access the network remotely.

4.1.2 Switch configuration:


a. Access the configuration interface:

Connect the computer to the switch using an Ethernet cable.

Open a web browser and enter the switch's IP address in the address bar.

Enter username and password to log in.

b. Basic configuration:

Change the default name and password.

Configure VLAN (Virtual Local Area Network) to divide the network into separate groups.

c. Advanced configuration (optional):

Enable STP (Spanning Tree Protocol) to avoid network loops.

Configure QoS (Quality of Service) to prioritize network traffic.

4.1.3 Access Point (AP) configuration:


a. Access the configuration interface:

Connect the computer to the AP using an Ethernet cable.

Open a web browser and enter the AP's IP address in the address bar.

Page | 28
Enter username and password to log in.

b. Basic configuration:

Select the Wi-Fi network name (SSID) and password.

Select security mode (WPA2-PSK recommended).

Configure Wi-Fi channels.

c. Advanced configuration (optional):

Enable DHCP to automatically assign IP addresses to devices.

Configure bandwidth limits for devices.

Page | 29
4.2The first step is to set up the server such as setting the address for DNS
server and Default Gateway
Sever 0-1

Page | 30
Page | 31
The Router (FastEthernet0/0)

Page | 32
The Multilayer Switch connected to the computers

Page | 33
DHCP SERVER

4.3 Test results against test plans

Page | 34
5. References

2 overview of Logical Design (no date) Overview of Logical Design. Available at:
https://docs.oracle.com/cd/A84050_01/NT816CLI/DOC/server.816/a76994/logical.htm (Accessed:
03 April 2024).

Page | 35
Explain the difference between physical and logical databases (no date) Tutorialspoint. Available at:
https://www.tutorialspoint.com/explain-the-difference-between-physical-and-logical-databases
(Accessed: 03 April 2024).

Inc, C. (2024) Introduction to logical design, Introduction to Logical Design. Available at:
https://techdocs.broadcom.com/us/en/ca-mainframe-software/database-management/ca-idms/19-0/
administrating/database-design/introduction-to-logical-design.html (Accessed: 03 April 2024).

Physical Design (electronics) (2024) Wikipedia. Available at:


https://en.wikipedia.org/wiki/Physical_design_(electronics) (Accessed: 03 April 2024).

Physical design: Kiến Thức CƠ Bản (2021) Cộng Đồng Vi Mạch Việt Nam. Available at:
https://congdongvimach.vn/vi/forums/topic/kien-thuc-co-ban-danh-cho-sinh-vien-muon-theo-mang-
physical-design/ (Accessed: 03 April 2024).

Page | 36

You might also like