You are on page 1of 20

PRINCIPLES AND PRACTICE OF MANAGEMENT

DATA COMMUNICATIONS (ITT 459)

GROUP ASSIGNMENT
NETWORK SIMULATION VIA PACKET TRACER REPORT

PREPARED BY
Student ID Name Group
2022406588 Mariatulkaftiah binti Othman NBCS2554A
2022242348 Mohamad Rizky bin Mohd Jamil NBCS2554A
2022999659 Muhammad Amir bin Mohd Azmi NBCS2554A
2022671538 Siti Nur Amirah binti Abu Bakar NBCS2554A

BACHELOR OF COMPUTER SCIENCE (HONS) COMPUTER NETWORKS (CS255)

PREPARED FOR
MADAM NOR ADORA BINTI ENDUT

SUBMISSION DATE
JAN 14, 2024

1|Page
TABLE OF CONTENTS

TABLE OF CONTENTS PAGE

LIST OF TABLES 3

LIST OF PICTURES 4

1.0 INTRODUCTION 5

1.1 VirtuTech Sdn Bhd Network Team 6

2.0 PROPOSED IP ADDRESSING SCHEME 7 -8

3.0 PROPOSED PHYSICAL TOPOLOGY DIAGRAM 9

3.1 Whole Network Topology Diagram 10

3.2 Research Lab Network 11

3.3 Administration Network 12

3.4 Library Network 13

3.5 Data Center Network 14

3.6 IoT Lab Network 15

3.7 Listing of Important Device Used in Design 16

4.0 LISTING OF SOFTWARE AND SERVICE REQUIRED IN DESIGN 17

5.0 SECURITY FEATURE 18

6.0 CONLUSION 19

7.0 REFERENCES 20

2|Page
LIST OF TABLES

No. Tables Page

1. TABLE 1: VirtuTech Sdn. Bhd Network team 6

2. TABLE 2: Proposed IP Addressing Scheme 8

3. TABLE 3: List of Main Device used in Packet Tracer Network Simulation 16

4. TABLE 4: List of Software and Service Required in Design 17

5. TABLE 5: List of Security Feature 18

3|Page
LIST OF PICTURES

No. Pictures Page

1. PICTURE 1: Whole Network Topology Diagram 10

2. PICTURE 2: Research Lab Network Topology Diagram 11

3. PICTURE 3: Administration Network Topology Diagram 12

4. PICTURE 4: Library Network Topology Diagram 13

5. PICTURE 4: Library Network Topology Diagram 14

6. PICTURE 4: Library Network Topology Diagram 15

4|Page
1.0 INTRODUCTION

Our client, The InnoTech Hub located in Jasin Heights stands as a model of innovation.
As the city's administration and local businesses seek practical solutions, they aim to make urban
living more efficient. InnoTech Hub has been selected to explore possible solutions to address
critical city challenges like traffic congestion, resource management and environmental
sustainability. These issues will affect how smoothly the city runs and how the company operates.
With a current team of 30, the InnoTech Hub plans to:

• Expand its building network to accommodate up to 100 workforces.


• Aim to establish a lab for experimenting with IoT smart sensors and applications.

This technical report outlines the network design proposed by us, the network team from
VirtuTech Sdn Bhd for InnoTech Hub in Jasin Heights. In response to the pressing need for a
scalable and efficient network infrastructure, our team has devised a comprehensive plan to
accommodate the increased number of workforce and facilitate IoT lab experimentation. The
report includes an IP addressing scheme, a topology diagram and details of the network setup.
We appreciate the opportunity to assist InnoTech Hub in addressing the pressing challenges
faced due to urbanization by providing a robust network infrastructure solution. As experts in
network architecture, we understand the criticality of creating an efficient, scalable and secure
network to facilitate your research centre.

5|Page
1.1 VirtuTech Sdn Bhd Network Team

Refer to below table for our network team members and responsibilities for this project.

NO. TEAM MEMBER POSITION RESPONSIBILITIES


1.
Network - Configure all network
Engineer hardware
- Select appropriate network
architecture, protocols, and
technologies to meet
MARIATULKAFTIAH
business needs

2.
Network - Design physical topology
Field Engineer - Select appropriate physical
device and cabling

MOHAMAD RIZKY
3.
Network - In-charge and implement
Security security features to network
environment

MUHAMMAD AMIR
4.
Network - Subnetting the main subnet
Planning - Proposed IP addressing
scheme

SITI NUR AMIRAH

TABLE 1: VirtuTech Sdn. Bhd Network team

6|Page
2.0 PROPOSED IP ADDRESSING SCHEME

To cater to the distinct subnets within the allocated IP address block 10.0.0.0/24, a clear
and non-overlapping IP addressing scheme has been devised as per Table 2. We have divided
the network into two, which is network A and network B. Network A located at Ayer Keroh, in
which where InnoTech Hub Data Center is located. While Network B located at Jasin Height, in
which InnoTech Hub main office located that have four department which are Research Lab
Department, Administration Department, Library Department and new created department which
is IoT Devices Department. Each department will have their own network.

For this task, our Network Planning Siti Nur Amirah did perform a task of subnetting a
subnet, or Variable Length Subnet Masking (VLSM) which is a technique used to further divide
an existing subnet into smaller subnets, each with a unique subnet mask. This approach is
beneficial when the existing subnets have different requirements for the number of hosts as
InnoTech Hub have required different total number of hosts for different network / department.
There are two main reasons why we do this task, which explain as below:

(i) Reduced Network Congestion


Subnetting allows for the organization of a network into smaller, more manageable
subnetworks. By grouping specific parts of the network into separate sections, traffic
can be confined to the local subnetwork, reducing the need for data to traverse the
entire network. This can lead to decreased network congestion and improved overall
network performance [1].

(ii) Optimized Address Space Utilization


Subnetting enables the efficient allocation of IP address space. By dividing the network
into smaller subnets, organizations can assign IP addresses more precisely based on
the needs of each subnetwork. This can help prevent the wastage of IP addresses and
ensure that each subnet has a suitable number of addresses for its specific
requirements. As a result, address space is utilized more effectively, which is
particularly important as the demand for IP addresses continues to grow [2].

7|Page
LAN VLAN Decimal Subnet *CIDR Network IP First Usable IP Last Usable IP Broadcast IP
SM (Default Gateway)
Research Lab
Network 10 255.255.255.224 /27 10.0.0.0 10.0.0.1 10.0.0.30 10.0.0.31
***Network B
Administration
Network 20 255.255.255.224 /27 10.0.0.32 10.0.0.33 10.0.0.62 10.0.0.63
***Network B
Library
Network 30 255.255.255.240 /28 10.0.0.64 10.0.0.65 10.0.0.78 10.0.0.79
***Network B
Data Center
Network N/A 255.255.255.240 /28 10.0.0.80 10.0.0.81 10.0.0.94 10.0.0.95
**Network A
IoT Devices
Network 40 255.255.255.240 /28 10.0.0.96 10.0.0.97 10.0.0.110 10.0.0.111
***Network B

TABLE 2: Proposed IP Addressing Scheme

*CIDR SM: CIDR Subnet Mask ****DHCP Server: 10.0.0.82 ****DNS Server: 10.0.0.83

**Network A: Data Center located at Ayer Keroh

***Network B: Department located at InnoTech Hub Main Office, Jasin Height

8|Page
3.0 PROPOSED PHYSICAL TOPOLOGY DIAGRAM

The network topology diagram, designed using Cisco Packet Tracer, illustrates the LAN
setup for InnoTech Hub. It shows cases the connections, devices and accurately labelled network
equipment. For this task, our Network Field Engineer Mohamad Rizky have chosen combination
of Star Topology and Tree Topology. For Network B the Star Topology is an ideal choice for a
LAN due to several advantages that explained as below:

(i) Centralized Control and Management


In a star network, each node is directly connected to a central device, such as a
switch. This centralized structure allows for easier control and management of the
network. It simplifies tasks such as monitoring, troubleshooting, and configuring
the network, making it an efficient choice for LANs [3].

(ii) Scalability and Flexibility


The star network is well-suited for LANs with a moderate number of nodes that
require high performance, reliability, and centralized control. It also allows for easy
expansion and modification of the network. New nodes can be added or removed
without disrupting the entire network, making it a flexible and scalable option [3].

Meanwhile for Network A, the Tree Topology was chosen. Tree topology is a network
topology in which devices are connected hierarchically, resembling a tree's branches. The root
node is at the top, and the leaves are at the bottom. The advantages of tree topology include:

(i) Scalability
New devices can be easily added by connecting them to existing nodes. This
makes it a suitable choice for small to medium-sized networks that are expected
to grow over time [4].

(ii) Flexibility
Tree topology is more flexible than other topologies, such as bus topology, as it
does not require puncturing the main backbone cable to add devices. Since it was
combination of bus and star topology, it provides the characteristics of both
topology [5].

9|Page
3.1. Whole Network Topology Diagram

PICTURE 1: Whole Network Topology Diagram

10 | P a g e
3.2 Research Lab Network

We have designed the Research Lab Network as per requirement by InnoTech Hub as
per below. Picture 2 shows the physical topology in the packet tracer environment.

▪ Total Host: 20 hosts (5 PCs, 5 Printers, 10 Laptops)


▪ Wired connections for PCs and printers to "Research Lab Switch"
▪ Wireless access for laptops via an Access Point

PICTURE 2: Research Lab Network Topology Diagram

11 | P a g e
3.3 Administration Network

We have designed the Administration Network as per requirement by InnoTech Hub as


per below. Picture 3 shows the physical topology in the packet tracer environment.

▪ Total hosts: 15 hosts (2 PCs, 1 Server, 3 Printers, 9 Laptops)


▪ PCs, Server, and Printers must be connected to the "Admin Switch" using
Wired Ethernet
▪ Laptops must connect wirelessly to the network via an Access Point.

PICTURE 3: Administration Network Topology Diagram

12 | P a g e
3.4 Library Network

We have designed the Library Network as per requirement by InnoTech Hub as per
below. Picture 4 shows the physical topology in the packet tracer environment.

▪ Total hosts: 10 hosts (1 Server, 2 PCs, 2 Printers, 5 Laptops)


▪ PCs and Printers must be connected to the "Library Switch" using Wired
Ethernet
▪ Laptops must connect wirelessly to the network via an Access Point

PICTURE 4: Library Network Topology Diagram

13 | P a g e
3.5 Data Center Network

We have designed the Data Center Network as per requirement by InnoTech Hub as per
below. Picture 4 shows the physical topology in the packet tracer environment.

▪ Total hosts: 8 server hosts


▪ The servers must host the following services: DNS, DHCP, and File
Storage
▪ All servers must be connected to the "Data Center Switch" using Wired
Gigabit Ethernet ports

PICTURE 5: Data Center Network Topology Diagram

14 | P a g e
3.6 IoT Lab Network

We have designed the IoT Lab Network as per requirement by InnoTech Hub as per
below. Picture 5 shows the physical topology in the packet tracer environment.

▪ Total hosts: 10 (Smart sensors, cameras, and other IoT devices)


▪ Connect all IoT devices to the "IoT Switch" using a combination of Wired
and Wireless connections as required for the specific devices

PICTURE 6: IoT Lab Network Topology Diagram

15 | P a g e
3.7 Listing of Important Device Used in Design

Our Network Field Engineer, Mohammad Rizky have performed to select the physical
devices that used in packet tracer. Based on his expertise, the devices were selected and
explained in more details as per Table 3 below.

Bil Device Explanation


1 Core Switch Act as “central router” to connect all subnets including the
Cisco 3560 Multilayer IoT Subnet.
Switch
Advantages:
• Can perform inter-VLAN routing for different subnets
(e.g., /28 and /29)
• Resiliency and high availability
• Flexibility & scalability
2 Network Switch Used as: "Research Lab Switch", "Admin Switch", "Library
Cisco 2560 Switch Switch", "Data Center Switch" and "IoT Switch".

Advantages:
• Scalability and flexibility
• Reliability & performance
3 Routers
Cisco ISR 4331 Used as Data Center Router, ISP 1 and ISP 2 router

Advantages:
• Largest range of available network services
• Simplified management
• Threat protection
• Lower total cost of ownership (TCO)

TABLE 3: List of Main Device used in Packet Tracer Network Simulation

16 | P a g e
4.0 LISTING OF SOFTWARE AND SERVICE REQUIRED IN DESIGN

In the design and configuration of the network, several software and services are
essential. These include VLAN configuration, DHCP services, and the implementation of a routing
protocol. This task was performed by our Network Engineer Mariatulkaftiah.

Bil Software and Service Explanation


1. VLAN Inter VLAN routing:
Virtual Local Area Networks • VLAN 10: Research Lab Network
• VLAN 20: Administration Network
• VLAN 30: Library Network
• VLAN 40: IoT Lab Network
Advantages:
• Reduced broadcast domains [6].
• Security [6] [7].
• Ease of administration [8].
2 DHCP - Automatically assigning IP address to devices
Dynamic Host such as PCs.
Configuration Protocol - Reducing the manual effort in IP address
management.
- Configure IP Helper Address in Network B as
Network A already equipped with DHCP server at
Data Center.
3. Dynamic Routing: OSPF Using dynamic routing to connect Network A (Data
Open Shortest Path First Center at Ayer Keroh) and Network B (InnoTech
Hub Main Office at Jasin Heights).

Advantages:
• Scalable, reliable, and efficient [9] [10] [11].
• Provides redundancy by automatically
detecting and rerouting traffic around failed
links or devices.
TABLE 4: List of Software and Service Required in Design

17 | P a g e
5.0 SECURITY FEATURE

In today's interconnected and digital landscape, the importance of robust security features
cannot be overstated. As the InnoTech Hub embarks on a network expansion to accommodate a
larger workforce and incorporate IoT smart sensors, prioritizing security becomes paramount. The
security feature was handled by our Network Security expert, Muhammad Amir.
No. Security Feature Explanation
1 ACL - Fundamental component of network security.
Access Control Lists - Provide strategic layer of control over traffic flow.
- Controls and filters network traffic based on defines rules.
- Defines rules for permitting or denying traffic based on criteria
such as source and destination IP address, ports and protocols
- Crucial for enforcing security policies and restricting
unauthorized access to the networks.
Advantages:
- Protection Against Cyber Threats.
- Confidentiality and Privacy.
- Compliance Requirements.
- Mitigating Insider Threats.
2 GUEST WIFI - Guest network is a portion of company’s Wi-Fi network that’s set
up to be used by temporary visitors.
- Within this sub-network, guests are able to enjoy full internet
connectivity without being able to access your internal network
information.
Advantages:
- Control who has access to company’s network of computers,
servers, storage appliances and printers.
- Not only protecting confidential company information from
outsiders, you’re also protecting your entire network from
potential infection by viruses or malware.
- Implement bandwidth control on the guest network to ensure the
availability of resources for employees, enhancing overall
network reliability.

TABLE 5: List of Security Feature

18 | P a g e
6.0 CONLUSION

Overall, the proposed network design aligns with InnoTech Hub's goals, in order to ease
them in facilitating innovation, efficient collaboration and addressing urban challenges. Our
planned IP addressing scheme ensures smooth operations across diverse subnets while the
topology diagram provides a clear visualization of the network infrastructure. In summary, this
network architecture blueprint is prepared to meet the demands of InnoTech Hub's expansion,
offering a scalable, well-connected and technologically advanced network infrastructure.

19 | P a g e
7.0 REFERENCES

[1] https://www.dnsstuff.com/subnet-ip-subnetting-guide

[2] https://www.cloudflare.com/learning/network-layer/what-is-a-subnet/

[3] https://www.zenarmor.com/docs/network-basics/what-is-tree-topology

[4] https://www.dcsupplies.net/switching/3293-juniper-ex3400-48t-layer-3-switch-48-network-4-
stack-2-stack-manageable.html

[5] https://www.zenarmor.com/docs/network-basics/what-is-tree-topology

[6] https://www.guru99.com/vlan-definition-types-advantages.html

[7] https://www.greenlight-itc.com/blog/the-real-advantages-of-a-virtual-lan-vlan

[8]https://documents.uow.edu.au/~blane/netapp/ontap/nag/networking/concept/c_oc_netw_vlan-
advantages.html

[9]https://www.reddit.com/r/networking/comments/jbtvr6/is_there_any_reason_why_using_static
_routes_would/?rdt=49549

[10]https://learningnetwork.cisco.com/s/question/0D53i00000Kt6vdCAB/static-routes-vs-routing-
protocols-such-as-ospf-and-eigrp

[11] https://www.techtarget.com/searchnetworking/answer/Static-and-dynamic-routing

20 | P a g e

You might also like