Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Royal University of Phnom Penh

Department of Computer Science and Engineering

Computer Networks

Group Assignment

• Prak Kesa
• Pav Khemerak
• Pet Sereypanha
• Pich Pong
• Peav Sithavai
• Neat Sopheng
• Ny Nai
• Bouth Chansotheareach
• Tourn Chan

Lecturer – Mr. Khiev Sopheaktra


Class – A4
Group – 4
Table of Contents
1. Project Introduction…………………………………………………………………………
1.1. Introduction……………………………………………………………………………...
1.2. Problems………………………………………………………………………………….
1.3. Objectives of the Project……………………………………………………………….
1.4. Network Designing Criteria………………………………………………………….
2. Network Design……………………………………………………………………………...
2.1. Network Topology………………………………………………………………………
2.2. Assumptions Made on Designing the Network…………………………………….
3. IP Addressing………………………………………………………………………………...
4. VLANs …………….………………………………………………………………………….
5. Network Protocols used in the Network Design………………………………………..
5.1. Routing…………………………………………………………………………………..
5.2. Trunking…………………………………………………………………………………
5.3. DHCP…………………………………………………………………………………….
5.4. DNS………………………………………………………………………………………
5.5. Wireless Network………………………………………………………………………
5.6. SSH……………………………………………………………………………………….
5.7. HTTPS and SMTP………..……………………………………………………………
6. Pros and Cons………………………………………………………………………………..
6.1. Pros of the Network Topology………………………………………………………..
6.2. Cons of the Network Topology……………………………………………………….
7. Cost Analysis…………………………………………………………………………………
8. Conclusion…………………………………………………………………………………….

2
1. Project Introduction
1.1. Introduction
This specific report will be intended in providing the network design document
for Tech Trend Company. The document will be including the proposed
technologies, network architecture and diagrams, required network services,
security mechanism, IP addressing scheme, routing protocols, type of devices,
software types, overall expenses on the network solutions, future enhancements,
problems and all of the issues which will be faced while maintaining the network.
The project will be involved with planning, designing, and implementation of the
network for the company.

1.2. Problems
Tech Trend Company has been having problems with network traffic and
security for daily usage. One reason for that is because of the network architecture
is not up to date for a long period of time which will eventually affect their business
operations. If they do not adapt to a new technological solution to challenge the
competitor, it may lead to the business downfall. In this case, the upper-level
management team have thought of upgrading the computer network system to
have a better performance in the company operations. The company has planned
on investing a substantial amount of money in redesigning and upgrading the
current computer network system with plan on implementing a new network to
have an uninterrupted, high secured, 99.9% available, highly reliable, fast and
robust computer network system.

1.3. Objective of the Project


As the key business goals and objectives of the project, designing, developing
and implementing network system with following key functional characteristics
can be identified.
• Providing a high rate of performance in providing connection to existing
systems
• 24/7 operation capability at a 99.99% highest rate of availability
• Providing enough storage capability and high data transfer rates
• Providing the maximum possible security, integrity and confidentiality
for the company’s operations
• Future scalability should be manageable such that network should cope
with the future expansions of the company
• Capacity or the network bandwidth should be enough for the existing
network operations, future enhancements and should be providing a
maximum amount of simultaneous user load.

3
1.4. Network Designing Criteria
• Consists of 500 staff members (will expand in the future) and will be in 12
different department (Should have four different vlans named
Management, Research, Human Resources, Marketing, Account, Finance,
Logistics, Customer, Guest, Admin, ICT, Server_Room)

2. Network Design
2.1. Network Topology

2.2. Assumptions Made on Designing the Network


- Actual VLAN architecture will be different such that each of the floors
will decide which devices belong to different VLANS
- The total building complex will be covered with wireless LAN
- VPN over Internet can be used for establishing a secured
communication link between the main office and the remote office
- Remote Workers can work remotely by using VPN over Internet.
- For security purposes CCTV will be used in each of the floor.
- Cloud based services and storage will be used frequently through the
network for different operations.

4
3. IP Addressing
Base Network: 192.168.10.0

➢ First Floor
Department Network Subnet Mask Host Address Broadcast
Address Range Address
Management 192.168.10.0 255.255.255.192/26 192.168.10.1 to 192.168.10.63
192.168.10.62
Research 192.168.10.64 255.255.255.192/26 192.168.10.65 192.168.10.127
to
192.168.10.126
Human Res 192.168.10.128 255.255.255.192/26 192.168.10.129 192.168.10191
to
192.168.10.190

➢ Second Floor
Department Network Subnet Mask Host Address Broadcast
Address Range Address
Marketing 192.168.10.192 255.255.255.192/26 192.168.10.193 192.168.10.255
to
192.168.10.254
Accounting 192.168.11.0 255.255.255.192/26 192.168.11.1 192.168.11.63
to
192.168.11.62
Finance 192.168.11.64 255.255.255.192/26 192.168.11.65 192.168.11.127
to
192.168.11.126

➢ Third Floor
Department Network Subnet Mask Host Address Broadcast
Address Range Address
Logistics 192.168.11.128 255.255.255.192/26 192.168.11.129 192.168.11.191
to
192.168.11.190
Customer 192.168.11.192 255.255.255.192/26 192.168.11.193 192.168.11.255
to
192.168.11.254
Guest 192.168.12.0 255.255.255.192/26 192.168.12.1 192.168.12.63
to
192.168.12.62

➢ Fourth Floor
Department Network Subnet Mask Host Address Broadcast
Address Range Address

5
Admin 192.168.12.64 255.255.255.192/26 192.168.12.65 192.168.12.127
to
192.168.12.126
ICT 192.168.12.128 255.255.255.192/26 192.168.12.129 192.168.12.191
to
192.168.12.190
Server Room 192.168.12.192 255.255.255.192/26 192.168.12.193 192.168.12.255
to
192.168.12.254

Base Network Address: 10.10.10.0

No. Network Address Subnet Mask Host Address Broadcast


Range Address
1 10.10.10.0 255.255.255.252 10.10.10.33 to 10.10.10.35
10.10.10.34
2 10.10.10.4 255.255.255.252 10.10.10.37 to 10.10.10.39
10.10.10.38
3 10.10.10.8 255.255.255.252 10.10.10.41 to 10.10.10.43
10.10.10.42
4 10.10.10.12 255.255.255.252 10.10.10.45 to 10.10.10.47
10.10.10.46
5 10.10.10.16 255.255.255.252 10.10.10.49 to 10.10.10.51
10.10.10.50
6 10.10.10.20 255.255.255.252 10.10.10.53 to 10.10.10.55
10.10.10.54
7 10.10.10.24 255.255.255.252 10.10.10.33 to 10.10.10.35
10.10.10.34
8 10.10.10.28 255.255.255.252 10.10.10.37 to 10.10.10.39
10.10.10.38
9 10.10.10.32 255.255.255.252 10.10.10.41 to 10.10.10.43
10.10.10.42
10 10.10.10.36 255.255.255.252 10.10.10.45 to 10.10.10.47
10.10.10.46
11 10.10.10.40 255.255.255.252 10.10.10.49 to 10.10.10.51
10.10.10.50
12 10.10.10.44 255.255.255.252 10.10.10.53 to 10.10.10.55
10.10.10.54
13 10.10.10.48 255.255.255.252 10.10.10.33 to 10.10.10.35
10.10.10.34

6
14 10.10.10.52 255.255.255.252 10.10.10.37 to 10.10.10.39
10.10.10.38

4. VLANs

VLAN Number VLAN Name IP Address

VLAN 10 Management 192.168.10.1


VLAN 20 Research 192.168.10.65
VLAN 30 Human_Resource 192.168.10.129
VLAN 40 Marketing 192.168.10.193
VLAN 50 Account 192.168.11.1
VLAN 60 Finance 192.168.11.65
VLAN 70 Logistics 192.168.11.129
VLAN 80 Customer 192.168.11.193
VLAN 90 Guest 192.168.12.1
VLAN 100 Admin 192.168.12.65
VLAN 110 ICT 192.168.12.129
VLAN 120 Server Room 192.168.12.193

5. Network Protocols used in the Network Design


5.1. Routing
- Default Routing – The configuration will be implemented on the core router to
route traffic from inside of the Network to ISP router for unknown traffic.
- Dynamic Routing – OSPF v2 (Open Shortest Path First) protocol which is
based on RFC 2328 standards is proposed to be used as the routing protocol to
route inside network traffic to outside of the network. This protocol can be
considered as the key alternative to EIGRP in most LAN routing deployments
and unlike in EIGRP, OSPF is always an open standard protocol for any
modern enterprise network architecture. In OSPF the metric is to calculate the
cost to traverse router links to get to the destination, taking the bandwidth of
the links into account. It develops adjacencies with its neighbors when the link
status changes and sends updates to neighbors in every 30 minutes of time
after link state changes happen. As this protocol consists with some
advantages when compared with other types of protocols, like converging
quickly compared to distance vector protocols, not prone to routing loops,
supporting VLSM or CIDR, small size of the routing packets, matching for any
kind of network ranging from small to very large it is the ideal type of routing
protocol for this network.

7
5.2. Trunking
Trunking allows efficient, secure, and manageable communication between
multiple VLANs across different floors and network devices, ensuring a well-
structured and scalable network architecture.

5.3. DHCP
DHCP service will be installed in the DHCP server which resides in the server
room. IP address pool for different VLAN will be create in DHCP server. So
DHCP server dynamically assign the IP address to the hosts in the network.
Static IP address that will be used with in the VLAN can be removed from the
IP address pool (excluded address) in DHCP server. Main advantage of using
this protocol is reliability associated in IP address configuration to hosts. That
is configuration error caused by manual IP assignment can be reduced and
tasks of network administration are simplified.

5.4. DNS
DNS will be configured in the DNS server, which will be placed in the server
room in the 4th floor. All the hosts in this network are assumed to be connected
to be connected to domain. So, each hosts (workstations & other devices) have
their unique domain name. So, users can use the specific domain name to
connect to each host remotely. But computers cannot understand the name. It
should be converted to numbers called IP address. So, DNS server maintain
the map of domain name of each host to its corresponding IP address. Thus,
with DNS, management will be easier and complexity of network can be
reduced.

5.5. Wireless Network


For wireless access or WiFi connection also different 12 VLANs are proposed
to remove uncontrolled broadcast traffic reaching the network in and out.
VLANs also helpful in providing a layer of network security and cost reduction
option by logically separating hosts which are connected to the same switch
(no need for additional switches). Here each VLAN is assigned with different
IP address subnet. VTP (VLAN Trunking Protocol) is used here to manage
VLANs and maintain consistency throughout the network. VTP can mange
the addition, renaming, deletion of VLANs from a centralized point without
manual intervention thus it reduces the overhead of network administration.

5.6. Secure Shell (SSH)


SSH is termed as secure socket shell. It is a type of network protocol which
facilitates secure communications between users of two different servers. It

8
also allows an admin to remotely log on to the server host system. SSH is a
secure networking protocol because it encrypts the login sessions which makes
it impossible for the intruders to collect any vital data as password or message.
It is designed to perform advance application which previous networking
protocol failed to implement, which are less secure older terminal applications
such as telnet or rsh.

5.7. HTTPS
HTTPS server plays a crucial role in securing web communications within the
organization, protecting sensitive information, and ensuring a secure
networking environment.

5.8. SMTP (Simple Mail Transfer Protocol)


SMTP Mail server will be placed in the server room in the 4th floor. SMTP
servers are more reliable when sending mails to clients. They deliver mail to
recipient quickly, they offer reliability in sending email messages (SMTP
server will always try to re–send the same email until the transmission
become successful), spam message can be controlled in the central location and
mailbox capacity is limited to hardware capacity.

6. Pros and Cons


The network topology is an enterprise network with multiple VLANs spread
across different floors of a building. Each floor has its own switch connected to a
router, and these routers are interconnected to form the network backbone. The
given network topology offers several advantages in terms of segmentation,
scalability, and performance, making it suitable for a large enterprise
environment. However, it also introduces complexity and higher costs, requiring
skilled personnel for effective management. Proper planning and maintenance are
essential to maximize the benefits and minimize the drawbacks of this network
setup.

6.1. Pros of the Network Topology


- Segmentation: The use of VLANs allows for logical segmentation of the
network, improving security and traffic management. Each department can
be isolated from others, reducing the risk of broadcast storms and
enhancing security.
- Scalability: The topology is scalable, allowing for the addition of more
devices and VLANs without major restructuring. Additional switches and
routers can be incorporated as needed.

9
- Management: The centralization of routers and switches simplifies network
management and troubleshooting. IT staff can easily monitor and configure
devices from a central location.
- Redundancy: The presence of multiple routers and interconnections
between them provides redundancy. If one router fails, traffic can be
rerouted through other paths, ensuring network availability.
- Performance: By distributing the network load across different floors and
VLANs, the performance can be optimized. Traffic within a VLAN is
confined to that segment, reducing overall congestion.

6.2. Cons of the Network topology


- Complexity: The network is complex, requiring skilled IT staff for
management and troubleshooting. Configuration of VLANs, switches, and
routers can be challenging. Misconfigurations can lead to security
vulnerabilities and network issues.
- Cost: The setup involves significant costs due to the need for multiple high-
performance routers, switches, and cabling. Maintenance and upgrades
also add to the ongoing expenses.
- Single Points of Failure: Although there is redundancy, certain devices (e.g.,
central routers or switches) still represent single points of failure. If these
devices fail, they can disrupt a significant portion of the network.
- Physical Constraints: The physical layout of the network may be
constrained by the building’s architecture, leading to potential
inefficiencies in cable management and device placement.

7. Cost Analysis

Item Model Units Units Price Total Cost

Monitors ViewSonic Omni 242 $ 199.00 $ 48,158.00


VX2728J-2K
Workstations HP Z2 Tower G9 242 $ 2000.00 $ 484,000.00
Keyboard and Logitech MK270r 242 $ 23.00 $ 5,566.00
Mouse Wireless
Laptops Lenovo ThinkPad 40 $ 1499.40 $ 59,976.00
X1 Carbon Gen 12
Printers Brother MFC- 34 $ 299.00 $ 10,166.00
L2715DW
Servers Dell PowerEdge 3 $ 4,992.00 $ 14,976.00
T550

10
Router C2911-CME- 4 $ 1,622.65 $ 6,790.60
SRST/K9
Layer 2 Switch Catalyst 2960-L 12 $ 1,063.00 $ 12,756.00
Layer 3 Switch WS-C3650-24PS- 4 $ 3,059.00 $ 12,236.00
L Catalyst 3650
Access Point UBIQUITI UniFi 11 $ 135.00 $ 1,485.00
U6-Lite
Cable - - - $ 3,000.00
Total $ 659,109.60

8. Conclusion
The network is well-organized with a clear hierarchical structure and
efficient VLAN segmentation. The use of dedicated switches and routers for each
floor and VLAN enhances security, performance, and manageability. The design
incorporates redundancy and wireless connectivity, ensuring robust and flexible
network access for all departments. With this design, the network should support
the organization's needs effectively while allowing for future scalability and
maintenance.

11

You might also like