Professional Documents
Culture Documents
GROUP ASSIGNMENT
NETWORK SIMULATION VIA PACKET TRACER REPORT
PREPARED BY
Student ID Name Group
2022406588 Mariatulkaftiah binti Othman NBCS2554A
2022242348 Mohamad Rizky bin Mohd Jamil NBCS2554A
2022999659 Muhammad Amir bin Mohd Azmi NBCS2554A
2022671538 Siti Nur Amirah binti Abu Bakar NBCS2554A
PREPARED FOR
MADAM NOR ADORA BINTI ENDUT
SUBMISSION DATE
JAN 14, 2024
1|Page
TABLE OF CONTENTS
LIST OF TABLES 3
LIST OF PICTURES 4
1.0 INTRODUCTION 5
6.0 CONLUSION 19
7.0 REFERENCES 20
2|Page
LIST OF TABLES
3|Page
LIST OF PICTURES
4|Page
1.0 INTRODUCTION
Our client, The InnoTech Hub located in Jasin Heights stands as a model of innovation.
As the city's administration and local businesses seek practical solutions, they aim to make urban
living more efficient. InnoTech Hub has been selected to explore possible solutions to address
critical city challenges like traffic congestion, resource management and environmental
sustainability. These issues will affect how smoothly the city runs and how the company operates.
With a current team of 30, the InnoTech Hub plans to:
This technical report outlines the network design proposed by us, the network team from
VirtuTech Sdn Bhd for InnoTech Hub in Jasin Heights. In response to the pressing need for a
scalable and efficient network infrastructure, our team has devised a comprehensive plan to
accommodate the increased number of workforce and facilitate IoT lab experimentation. The
report includes an IP addressing scheme, a topology diagram and details of the network setup.
We appreciate the opportunity to assist InnoTech Hub in addressing the pressing challenges
faced due to urbanization by providing a robust network infrastructure solution. As experts in
network architecture, we understand the criticality of creating an efficient, scalable and secure
network to facilitate your research centre.
5|Page
1.1 VirtuTech Sdn Bhd Network Team
Refer to below table for our network team members and responsibilities for this project.
2.
Network - Design physical topology
Field Engineer - Select appropriate physical
device and cabling
MOHAMAD RIZKY
3.
Network - In-charge and implement
Security security features to network
environment
MUHAMMAD AMIR
4.
Network - Subnetting the main subnet
Planning - Proposed IP addressing
scheme
6|Page
2.0 PROPOSED IP ADDRESSING SCHEME
To cater to the distinct subnets within the allocated IP address block 10.0.0.0/24, a clear
and non-overlapping IP addressing scheme has been devised as per Table 2. We have divided
the network into two, which is network A and network B. Network A located at Ayer Keroh, in
which where InnoTech Hub Data Center is located. While Network B located at Jasin Height, in
which InnoTech Hub main office located that have four department which are Research Lab
Department, Administration Department, Library Department and new created department which
is IoT Devices Department. Each department will have their own network.
For this task, our Network Planning Siti Nur Amirah did perform a task of subnetting a
subnet, or Variable Length Subnet Masking (VLSM) which is a technique used to further divide
an existing subnet into smaller subnets, each with a unique subnet mask. This approach is
beneficial when the existing subnets have different requirements for the number of hosts as
InnoTech Hub have required different total number of hosts for different network / department.
There are two main reasons why we do this task, which explain as below:
7|Page
LAN VLAN Decimal Subnet *CIDR Network IP First Usable IP Last Usable IP Broadcast IP
SM (Default Gateway)
Research Lab
Network 10 255.255.255.224 /27 10.0.0.0 10.0.0.1 10.0.0.30 10.0.0.31
***Network B
Administration
Network 20 255.255.255.224 /27 10.0.0.32 10.0.0.33 10.0.0.62 10.0.0.63
***Network B
Library
Network 30 255.255.255.240 /28 10.0.0.64 10.0.0.65 10.0.0.78 10.0.0.79
***Network B
Data Center
Network N/A 255.255.255.240 /28 10.0.0.80 10.0.0.81 10.0.0.94 10.0.0.95
**Network A
IoT Devices
Network 40 255.255.255.240 /28 10.0.0.96 10.0.0.97 10.0.0.110 10.0.0.111
***Network B
*CIDR SM: CIDR Subnet Mask ****DHCP Server: 10.0.0.82 ****DNS Server: 10.0.0.83
8|Page
3.0 PROPOSED PHYSICAL TOPOLOGY DIAGRAM
The network topology diagram, designed using Cisco Packet Tracer, illustrates the LAN
setup for InnoTech Hub. It shows cases the connections, devices and accurately labelled network
equipment. For this task, our Network Field Engineer Mohamad Rizky have chosen combination
of Star Topology and Tree Topology. For Network B the Star Topology is an ideal choice for a
LAN due to several advantages that explained as below:
Meanwhile for Network A, the Tree Topology was chosen. Tree topology is a network
topology in which devices are connected hierarchically, resembling a tree's branches. The root
node is at the top, and the leaves are at the bottom. The advantages of tree topology include:
(i) Scalability
New devices can be easily added by connecting them to existing nodes. This
makes it a suitable choice for small to medium-sized networks that are expected
to grow over time [4].
(ii) Flexibility
Tree topology is more flexible than other topologies, such as bus topology, as it
does not require puncturing the main backbone cable to add devices. Since it was
combination of bus and star topology, it provides the characteristics of both
topology [5].
9|Page
3.1. Whole Network Topology Diagram
10 | P a g e
3.2 Research Lab Network
We have designed the Research Lab Network as per requirement by InnoTech Hub as
per below. Picture 2 shows the physical topology in the packet tracer environment.
11 | P a g e
3.3 Administration Network
12 | P a g e
3.4 Library Network
We have designed the Library Network as per requirement by InnoTech Hub as per
below. Picture 4 shows the physical topology in the packet tracer environment.
13 | P a g e
3.5 Data Center Network
We have designed the Data Center Network as per requirement by InnoTech Hub as per
below. Picture 4 shows the physical topology in the packet tracer environment.
14 | P a g e
3.6 IoT Lab Network
We have designed the IoT Lab Network as per requirement by InnoTech Hub as per
below. Picture 5 shows the physical topology in the packet tracer environment.
15 | P a g e
3.7 Listing of Important Device Used in Design
Our Network Field Engineer, Mohammad Rizky have performed to select the physical
devices that used in packet tracer. Based on his expertise, the devices were selected and
explained in more details as per Table 3 below.
Advantages:
• Scalability and flexibility
• Reliability & performance
3 Routers
Cisco ISR 4331 Used as Data Center Router, ISP 1 and ISP 2 router
Advantages:
• Largest range of available network services
• Simplified management
• Threat protection
• Lower total cost of ownership (TCO)
16 | P a g e
4.0 LISTING OF SOFTWARE AND SERVICE REQUIRED IN DESIGN
In the design and configuration of the network, several software and services are
essential. These include VLAN configuration, DHCP services, and the implementation of a routing
protocol. This task was performed by our Network Engineer Mariatulkaftiah.
Advantages:
• Scalable, reliable, and efficient [9] [10] [11].
• Provides redundancy by automatically
detecting and rerouting traffic around failed
links or devices.
TABLE 4: List of Software and Service Required in Design
17 | P a g e
5.0 SECURITY FEATURE
In today's interconnected and digital landscape, the importance of robust security features
cannot be overstated. As the InnoTech Hub embarks on a network expansion to accommodate a
larger workforce and incorporate IoT smart sensors, prioritizing security becomes paramount. The
security feature was handled by our Network Security expert, Muhammad Amir.
No. Security Feature Explanation
1 ACL - Fundamental component of network security.
Access Control Lists - Provide strategic layer of control over traffic flow.
- Controls and filters network traffic based on defines rules.
- Defines rules for permitting or denying traffic based on criteria
such as source and destination IP address, ports and protocols
- Crucial for enforcing security policies and restricting
unauthorized access to the networks.
Advantages:
- Protection Against Cyber Threats.
- Confidentiality and Privacy.
- Compliance Requirements.
- Mitigating Insider Threats.
2 GUEST WIFI - Guest network is a portion of company’s Wi-Fi network that’s set
up to be used by temporary visitors.
- Within this sub-network, guests are able to enjoy full internet
connectivity without being able to access your internal network
information.
Advantages:
- Control who has access to company’s network of computers,
servers, storage appliances and printers.
- Not only protecting confidential company information from
outsiders, you’re also protecting your entire network from
potential infection by viruses or malware.
- Implement bandwidth control on the guest network to ensure the
availability of resources for employees, enhancing overall
network reliability.
18 | P a g e
6.0 CONLUSION
Overall, the proposed network design aligns with InnoTech Hub's goals, in order to ease
them in facilitating innovation, efficient collaboration and addressing urban challenges. Our
planned IP addressing scheme ensures smooth operations across diverse subnets while the
topology diagram provides a clear visualization of the network infrastructure. In summary, this
network architecture blueprint is prepared to meet the demands of InnoTech Hub's expansion,
offering a scalable, well-connected and technologically advanced network infrastructure.
19 | P a g e
7.0 REFERENCES
[1] https://www.dnsstuff.com/subnet-ip-subnetting-guide
[2] https://www.cloudflare.com/learning/network-layer/what-is-a-subnet/
[3] https://www.zenarmor.com/docs/network-basics/what-is-tree-topology
[4] https://www.dcsupplies.net/switching/3293-juniper-ex3400-48t-layer-3-switch-48-network-4-
stack-2-stack-manageable.html
[5] https://www.zenarmor.com/docs/network-basics/what-is-tree-topology
[6] https://www.guru99.com/vlan-definition-types-advantages.html
[7] https://www.greenlight-itc.com/blog/the-real-advantages-of-a-virtual-lan-vlan
[8]https://documents.uow.edu.au/~blane/netapp/ontap/nag/networking/concept/c_oc_netw_vlan-
advantages.html
[9]https://www.reddit.com/r/networking/comments/jbtvr6/is_there_any_reason_why_using_static
_routes_would/?rdt=49549
[10]https://learningnetwork.cisco.com/s/question/0D53i00000Kt6vdCAB/static-routes-vs-routing-
protocols-such-as-ospf-and-eigrp
[11] https://www.techtarget.com/searchnetworking/answer/Static-and-dynamic-routing
20 | P a g e