Professional Documents
Culture Documents
Data Communications and Networks: DCN Final Project Sir Zaka 02/05/2018
Data Communications and Networks: DCN Final Project Sir Zaka 02/05/2018
Data Communications and Networks: DCN Final Project Sir Zaka 02/05/2018
To Make a university’s network using cisco packet Tracer and being able enough to make
our own enhancements to the project. Developing our own web server and a client, making them
able to share messages between them. We created a project somehting like this using cisco
packet tracer and the screenshot is pasted along with this document. This campus network will
provide different activities, from sharing messages to submitting online assignments, without
much trouble. Once you are connected to the university’s network by providing your roll number
as username and a custom password that can/might change on weekly basis, you can register on
the network and do all the activities that are permissible to you. As it covers entire university, we
also have networked cameras that only the authority can access. Neither the teacher, nor the
students are allowed to access security system, only management has been given authority to
access them and store information. We have connected all the departments with each other,
including labs and arts. Network for administrative works is different and cannot be accessed
from any department. Only the people who do administrative tasks are eligible/permitted to read,
store, edit, delete, share and do certain more actions.
Project Introduction
Our Annual project for data communication and networks consists of several numbers of
nodes/computers that are meant to be inter-connected just like the networks in any varsity. As we
cannot possibly come up with tens of machines for a single practical and even if we do, it would
not be a viable option. For practical demonstration, we have made use of virtual machines that
The software that we are using is named CisCo Packet Tracer that was provided and taught by
our respected instructor in the labs and the concepts were clarified in the theory lectures. We
designed or more likely, we simulated entire university network using that particular software
provided as an apparatus for the hands-on practice project.
We will approach the project in the procedural and structural manner. First things first technique,
we will create a prototype for the project using cissco packet tracer and then we will create the
blueprint of entire structure or architecture of the network. Network also consists of network
cameras. Cameras
will be connected to the server that is to be monitored by security agent or whatever the
appropriate designation maybe awarded to do the job. We, specifically, will create a web-server
also, it would be working but cannot be used to replace a real-time working prototype deployed
in the university for
several issues. We have been awarded freedom to use any software and any programming
language to code the web-server and we can also write the firewall rules. As for the
introduction, abstract we will close it by saying the protection and security aspect of our project
will also be included and monitored by the group lead.
There are many devices that were used in designing the network, such as routers, switches,
backup, firewall, and servers. All devices were connected to each other to make integration
mechanisms including a firewall device that prevents any unfavorable data from entering into the
network.
Network Design
Network design refers to the planning of the implementation of a computer network
infrastructure.
Network design involves evaluating, understanding and scoping the network to be implemented.
The whole network design is usually represented as a network diagram that serves as the
blueprint for implementing the network physically. Typically, network design includes the
following:
aimed at ensuring that a new telecommunications network or service meets the needs of the
subscriber and operator.
T
here are a wide variety of tools available for network planning and design depending on the
technologies being used. These include:
Although we had use packet tracer to create the network and were able to send/broadcast the
information or message to other servers plus several other clients, we still haven’t used NetSim
and didn’t know much about it either.
Plan a phased approach to implementation. Introduce the computer room core switches first,
providing connectivity to the servers. Depending on the size of the company and business
process needs, it might be possible to immediately follow this activity on the same day by
implementing the new access layer switches. Schedule wide area connectivity following the
introduction of the core switches in the computer room, selecting a time that does not conflict
with the access layer installation. Coordinate wide area connectivity with the telecommunication
vendor providing this portion of the network service.
Step 2
Inform all employees of the scope of implementation for each phase, along with dates and times.
Implementation of new equipment generally means systems and data will not be available at the
time of the change. This gives employees the opportunity to plan their work around the resulting
downtime.
Step 3
Step 4
Schedule the personnel and support needed from among IT department staff members and any
vendor staff that must support the implementation.