Data Communications and Networks: DCN Final Project Sir Zaka 02/05/2018

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

LAHORE GARRISON UNIVERSITY

Data Communications And


Networks
DCN final project
Sir ZAKA
02/05/2018
Group Members

 Ghulam Ghose - Roll Number: 410


 Hafiz Abdul Haseeb – Roll Number: 429

Annual Project Documentation


Abstract

To Make a university’s network using cisco packet Tracer and being able enough to make
our own enhancements to the project. Developing our own web server and a client, making them
able to share messages between them. We created a project somehting like this using cisco
packet tracer and the screenshot is pasted along with this document. This campus network will
provide different activities, from sharing messages to submitting online assignments, without
much trouble. Once you are connected to the university’s network by providing your roll number
as username and a custom password that can/might change on weekly basis, you can register on
the network and do all the activities that are permissible to you. As it covers entire university, we
also have networked cameras that only the authority can access. Neither the teacher, nor the
students are allowed to access security system, only management has been given authority to
access them and store information. We have connected all the departments with each other,
including labs and arts. Network for administrative works is different and cannot be accessed
from any department. Only the people who do administrative tasks are eligible/permitted to read,
store, edit, delete, share and do certain more actions.

Project Introduction

Our Annual project for data communication and networks consists of several numbers of
nodes/computers that are meant to be inter-connected just like the networks in any varsity. As we
cannot possibly come up with tens of machines for a single practical and even if we do, it would
not be a viable option. For practical demonstration, we have made use of virtual machines that

Annual Project Documentation


we will connect through SSH. Secure Shell is primarily used in Linux or *Nix based operating
systems. Windows has her own Desktop Remote Tool also known as WinRT. For the command
line windows basically use Telnet rather than SSH. SSH is an encrypted connection between a
client and a client or a client and a server. Other than just simple tcp encrypted connections, it
also offers the tunneling.

The software that we are using is named CisCo Packet Tracer that was provided and taught by
our respected instructor in the labs and the concepts were clarified in the theory lectures. We
designed or more likely, we simulated entire university network using that particular software
provided as an apparatus for the hands-on practice project.

We will approach the project in the procedural and structural manner. First things first technique,
we will create a prototype for the project using cissco packet tracer and then we will create the
blueprint of entire structure or architecture of the network. Network also consists of network
cameras. Cameras

will be connected to the server that is to be monitored by security agent or whatever the
appropriate designation maybe awarded to do the job. We, specifically, will create a web-server
also, it would be working but cannot be used to replace a real-time working prototype deployed
in the university for

several issues. We have been awarded freedom to use any software and any programming
language to code the web-server and we can also write the firewall rules. As for the
introduction, abstract we will close it by saying the protection and security aspect of our project
will also be included and monitored by the group lead.

There are many devices that were used in designing the network, such as routers, switches,
backup, firewall, and servers. All devices were connected to each other to make integration

Annual Project Documentation


network system and configured by putting IP addresses to all devices. Although the budget for
this design network was low, it needed to have a high level of security. Accordingly, it
incorporated several

mechanisms including a firewall device that prevents any unfavorable data from entering into the
network.

Network Design
Network design refers to the planning of the implementation of a computer network
infrastructure.

Network design is generally performed by network designers, engineers, IT administrators and


other related staff.

Understanding the Concepts

Network design involves evaluating, understanding and scoping the network to be implemented.
The whole network design is usually represented as a network diagram that serves as the
blueprint for implementing the network physically. Typically, network design includes the
following:

 Logical map of the network to be designed


 Cabling structure
 Quantity, type and location of network devices (router, switches, servers)
 IP addressing structure

Annual Project Documentation


 Network security architecture and overall network security processes.
 Network planning and design is an iterative process, encompassing
topological design, network-synthesis, and network-realization, and is

aimed at ensuring that a new telecommunications network or service meets the needs of the
subscriber and operator.

T
here are a wide variety of tools available for network planning and design depending on the
technologies being used. These include:

 Cissco Packet Tracer


 NetSim

Although we had use packet tracer to create the network and were able to send/broadcast the
information or message to other servers plus several other clients, we still haven’t used NetSim
and didn’t know much about it either.

Annual Project Documentation


Network Implementation

Annual Project Documentation


Step 1

Plan a phased approach to implementation. Introduce the computer room core switches first,
providing connectivity to the servers. Depending on the size of the company and business
process needs, it might be possible to immediately follow this activity on the same day by
implementing the new access layer switches. Schedule wide area connectivity following the
introduction of the core switches in the computer room, selecting a time that does not conflict
with the access layer installation. Coordinate wide area connectivity with the telecommunication
vendor providing this portion of the network service.

Step 2

Inform all employees of the scope of implementation for each phase, along with dates and times.
Implementation of new equipment generally means systems and data will not be available at the
time of the change. This gives employees the opportunity to plan their work around the resulting
downtime.

Step 3

Pre-configure network equipment and test it prior to implementation.

Step 4

Schedule the personnel and support needed from among IT department staff members and any
vendor staff that must support the implementation.

Annual Project Documentation


Annual Project Documentation

You might also like