0% found this document useful (0 votes)
103 views

ASM2

The document describes the logical and physical designs of a networked system. The logical design shows the flow of data between different parts, while the physical design shows how devices are connected with cables. Figures are included to illustrate the topology, requirements, and proposed designs. The logical design routes data between student computers, teacher computers, staff computers, and manager computers. The physical design places student computers on two floors and connects them to separate switches which connect to a router. Various rooms for teachers, staff, managers, and administrators each contain a number of PCs and printers.

Uploaded by

Nguyễn Đại
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views

ASM2

The document describes the logical and physical designs of a networked system. The logical design shows the flow of data between different parts, while the physical design shows how devices are connected with cables. Figures are included to illustrate the topology, requirements, and proposed designs. The logical design routes data between student computers, teacher computers, staff computers, and manager computers. The physical design places student computers on two floors and connects them to separate switches which connect to a router. Various rooms for teachers, staff, managers, and administrators each contain a number of PCs and printers.

Uploaded by

Nguyễn Đại
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

ASSIGNMENT 2 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 2: Networking

Submission date 11.08.2022 Date Received 1st submission 11.08.2022

Re-submission Date 18.08.2022 Date Received 2nd submission 18.08.2022

Student Name Nguyen Trong Dai Student ID BC00017

Class IT05101-NW Assessor name Nguyen Minh Triet

Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature Dai

Grading grid

P5 P6 P7 P8 M3 M4 D2 D3

1
 Summative Feedback:  Resubmission Feedback:

Grade: Assessor Signature: Date:


Lecturer Signature:

2
Table of Contents
I. Introduction: ........................................................................................................................................ 5
II. Provide a logical/physical design of the networked system with clear explanation and addressing
table:(P5) ................................................................................................................................................. 5
III. Evaluate the design to meet the requirements: (P6) ........................................................................ 9
IV. Implement a networked system based on a prepared design:(P7) ................................................ 11
V. Document and analyse test results against expected results:(P8) ................................................... 16
VI. Recommend potential enhancements for the networked systems:(M4) ........................................ 22
VII. Design a maintenance schedule to support the networked system:(D2) ...................................... 23
VIII. Use critical reflection to evaluate own work and justify valid conclusions:(D3) ....................... 24
IX. Conclusion: ...................................................................................................................................... 24
X. References: ........................................................................................................................................ 26

3
Table of Figure
Figure 1: Physical topology. .................................................................................................................................. 5
Figure 2: Logical topology. .................................................................................................................................... 6
Figure 3: User requirements and System requirement. ....................................................................................... 6
Figure 4: The logical design for my network. ....................................................................................................... 7
Figure 5: The physical design for my network. .................................................................................................... 8
Figure 6: Test Ping PC1 to R0............................................................................................................................. 10
Figure 7: Test Ping PC8 to PC12. ....................................................................................................................... 10
Figure 8: My designed network. ......................................................................................................................... 11
Figure 9: Configure Switch6. .............................................................................................................................. 12
Figure 10: Configure Router0. ............................................................................................................................ 13
Figure 11: Configure Switch3. ............................................................................................................................ 14
Figure 12: Configure Switch4. ............................................................................................................................ 14
Figure 13: Configure Switch2. ............................................................................................................................ 15
Figure 14: Configure Switch1. ............................................................................................................................ 15
Figure 15: Configure IP on Router0. .................................................................................................................. 16
Figure 16: Configure IP on Switch3.................................................................................................................... 16
Figure 17: Test Ping PC10 to PC3. ..................................................................................................................... 19
Figure 18: Test Ping Staff PC3 to Managers PC9. ............................................................................................. 20
Figure 19: Test Ping Student PC1 to Teacher PC11. ......................................................................................... 20
Figure 20: Test Ping Student PC7 to Staff PC3. ................................................................................................. 21
Figure 21: PC gets dynamic IP. ........................................................................................................................... 22

4
I. Introduction:
This report covers the process from solution design to implementation of the designed network. An
evaluation of my designed network and future improvements.

II. Provide a logical/physical design of the networked system with clear explanation
and addressing table:(P5)
Logical layouts determine the flow of data or communication between two network, while physical
layout is a communication between two computers connected by cables. Depending on the availability and
selection of devices, the physical topology has a significant impact on the cost, scalability and bandwidth
capacity of the network. The logical topology has a significant impact on the delivery and speed of data
packets. It also controls the flow of data and ensures that data packets are delivered on time. The topology
only exists in the bus and ring topology.

Figure 1: Physical topology.

5
Figure 2: Logical topology.
There are two types of security requirements engineering concepts used to determine security constraints:

User requirements and System requirements.

Figure 3: User requirements and System requirement.

6
The user requirements include diagrams, constraints, and operational statements of the user’s language of
the services that the organization may provide. The systems requirements include descriptions of systems
function, operational constraints and structed documents that define how and what system implementation
is required as part of the development.

The user requirements definitions include systems of customers, suppliers, distributors and staff systems
usage activities. For instance, the AMI will generate a monthly statement detailing the amount of
electricity used. Payments will be made via direct debit. The system will generate a monthly management
report detailing the use of electric power in an area for those who have paid their utility bill regularly and
those who don’t. Systems requirements specifications will include a sum mary of all activities and
transactions carried out on the systems and the various interactions with external entities, bank, suppliers,
distributors, and customers.

A logical design of the network based on the specific requirements of the user:

Figure 4: The logical design for my network.


A physical design of the network based on the specific requirements of the user:

In my bodily design, I installation all of the computer systems and printer at the floor ground, 25 lab
computer systems on the primary ground and the opposite 25 ones on the second one ground. I join 25 lab
computer systems in eachfloor to a separate transfer then join the transfer to a router placed in 2nd ground.
On theground ground, there might be four rooms such as: teachers’ room, staffs’ room, managers’ room,
and community administrators’ room. In the teachers’ room, there are 15 PCs and 1 printer. In the staffs’
room, there consists of 12 PCs and 1 printer. In the managers’ room, there consists of five PCs and 1
printer. In the community administrators’ room, there consists of three PCs. All computer systems and

7
printer at the floor ground might be cabled to a transfer this is linked to a router. Then this router might be
connect with the router on the primary and 2nd ground.

Figure 5: The physical design for my network.


The address table of the network devices used:

Device IP Address Subnet Mask

Router0 192.168.6.1 255.255.255.0


Switch6 192.168.6.6 255.255.255.0

Switch1 192.168.6.2 255.255.255.0


Switch2 192.168.6.3 255.255.255.0

Switch3 192.168.6.7 255.255.255.0

Switch4 192.168.6.5 255.255.255.0

PC1-PC26 192.168.6.8 – 255.255.255.0


192.168.6.100

8
DNS server 192.168.6.4 255.255.255.0

III. Evaluate the design to meet the requirements: (P6)

w How to test Expected result


1 Ping from Student PC 0 to R0 Enabled

2 Ping from Student PC 1 to R0 Enabled

3 Ping from Student PC 2 to R0 Enabled

4 Ping from Student PC 12 to R0 Enabled

5 Ping from Student PC 1 to Student PC 26 Enabled

6 Ping from Student PC 1 to Teacher PC 10 Enabled

7 Ping from Student PC 1 to Teacher PC 11 Enabled

8 Ping from PC 3 to PC 9 Enabled

9 Ping from Teacher PC 11 to R0 Enabled

10 Ping from Teacher PC 10 to R0 Enabled

11 Ping from PC3 to PC9 Enabled

12 Ping from PC6 to PC5 Enabled

13 Ping from PC2 to PC1 Enabled

9
Figure 6: Test Ping PC1 to R0.

Figure 7: Test Ping PC8 to PC12.

Evaluate my network design:

In my community design, I use big name topology to attach all gadgets speak with every different
circuitously thru the significant switch. By the usage of this topology, there are numerous advantages and
a few barriers in my design.

Advantages:

- User can control the entire community from a unmarried location


- User can add, remove, or alter gadgets with out taking whole community offline
- It is excessive appearing as no information collisions can occur, which could be very crucial
customers to transmit information among gadgets.

10
- It could be very dependable due to the fact if one cable or tool fails then all of the others will
nonetheless work.

Disadvantages:

- The relaxation of community couldn't paintings if the imperative transfer turns down. This is
inconvenient to show down the complete community if the faculty want to keep and improve
handiest the imperative transfer.
- Switch calls for greater assets and normal protection due to the fact it’s the imperative gadget of
star.
- More high-priced than linear bus topology because of the price of the connecting devices
(community switches) and requiring greater cable
- Extra hardware is required (hubs or switches) which provides to value as well.

By thinking about the limitations of my design, to make this community paintings effectively, I want to
have a few spare switches and routers. In case a router or transfer turns down, the relaxation community
could now no longer paintings, therefore, we want an opportunity router and transfer to apply in place of
looking to repair that. Also, to save you the turning down of a transfer or router, we want to keep
regularly.

IV. Implement a networked system based on a prepared design:(P7)


Firstly, I cable a network as shown in the topology diagram below.

Figure 8: My designed network.

11
Then I Configure the Wireless Router0, Switch6, Switch1, Switch2, Switch3 and Switch4 according to the
following guidelines:

 Configure the device hostname.


 Disable DNS lookup.
 Configure a privileged EXEC mode password.
 Configure a message-of-the-day banner.
 Configure a password for the console connections.
 Configure a password for all vty connections.

Figure 9: Configure Switch6.

12
Figure 10: Configure Router0.

13
Figure 11: Configure Switch3.

Figure 12: Configure Switch4.

14
Figure 13: Configure Switch2.

Figure 14: Configure Switch1.


Configure IP addresses on all routers:

15
Figure 15: Configure IP on Router0.

Figure 16: Configure IP on Switch3.

V. Document and analyse test results against expected results:(P8)


Implementation process’s logbook:

 On Router0:
dairouter#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.

16
dairouter (config) # line console 0
dairouter (config-line) #password 12345678
dairouter (config-line) #login
dairouter (config-line) #exit
dairouter (config) #
dairouter (config) #
dairouter (config) #
dairouter (config) #
dairouter (config) #
dairouter (config) #line vty 0 4
dairouter (config-line) # password 12345678
dairouter (config-line) #login
dairouter (config-line) #exit
dairouter (config) #
dairouter (config) #
dairouter (config) #
dairouter (config) #
dairouter (config) #
dairouter (config) #interface fastEthernet 0/0
dairouter (config-if) #no shutdown
dairouter (config-if) #ip address 192.168.6.1 255.255.255.0
dairouter (config-if) #exit
dairouter (config) #
dairouter (config) #
dairouter (config) #

dairouter(config)#ip dhcppool
dairouter(config)#ip dhcp pool subnet192
dairouter(dhcp-config)#net
dairouter(dhcp-config)#network 192.168.6.0 255.255.255.0
dairouter(dhcp-config)#de
dairouter(dhcp-config)#default-router 192.168.6.1
dairouter(dhcp-config)#dns
dairouter(dhcp-config)#dns-server 192.168.6.4

dairouter(config)#ip dhcp ex
dairouter(config)#ip dhcp excluded-address 192.168.6.1 192.168.6.10
dairouter(config)#
 On Switch6:
Switch (config) #hostname dai123

17
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #line console 0
Dai123 (config-line) #password 1234567
Dai123 (config-line) #login
Dai123 (config-line) #exit
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #line vty 0 4
Dai123 (config-line) #password 1234567
Dai123 (config-line) #login
Dai123 (config-line) #exit
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #interface vlan 1
Dai123 (config-if) #no shutdown
Dai123 (config-if) #ip address 192.168.6.0 255.255.255.0
Dai123 (config-if) #exit
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #
Dai123 (config) #

Testing result:

Test How to test Expected result Evaluate


Case
ID
1 Ping from Student PC 0 to R0 Enabled Pass
2 Ping from Student PC 1 to R0 Enabled Pass
3 Ping from Student PC 2 to R0 Enabled Pass
4 Ping from Student PC 12 to R0 Enabled Pass
5 Ping from Student PC 1 to Enabled Pass
Student PC 26
6 Ping from Student PC 1 to Enabled Pass
Teacher PC 10

18
7 Ping from Student PC 1 to Enabled Pass
Teacher PC 11
8 Ping from Student PC 3 to PC Enabled Pass
9
9 Ping from Teacher PC 11 to R0 Enabled Pass
10 Ping from Teacher PC 10 to R0 Enabled Pass
11 Ping from Teacher PC 10 to Enabled Pass
Staff PC3

Figure 17: Test Ping PC10 to PC3.

19
Figure 18: Test Ping Staff PC3 to Managers PC9.

Figure 19: Test Ping Student PC1 to Teacher PC11.

20
Figure 20: Test Ping Student PC7 to Staff PC3.

21
Figure 21: PC gets dynamic IP.

VI. Recommend potential enhancements for the networked systems:(M4)


Five ways to Improve Network Performance:

 Go For the Virtual Local Area Networks (VLANs): A VLAN creates its broadcasting area with
the aid of using splitting a bodily community this is in life into severa logical networks. Thereby
making sure that thru a collection of gadgets is placed on distinctive LAN segments, they talk as
though they're at the identical wire. Thus growing an possibility for community assets and
additives to be partitioned and remoted in a community on the information hyperlink layer. As a
result, an workplace profits the advantages of walking a couple of networks in a single community,
with out rewiring the workplace unnecessarily.

22
 Provide a Different Network for Guests: Having too many customers on a community may be
likened to having too many cars on a road, the probabilities of getting a visitors jam might be
higher, and with a visitors jam, all of the cars on the street will generally tend to transport slowly –
each the joyriders and people which have emergency duties to accomplish. In comparison, terrible
community overall performance may be a end result of getting too many customers on a
community. Having one or visitors at an workplace foyer streaming videos, may not be a reason
for sluggish overall performance. But whilst it’s an agency that has as much as 100 visitors at any
given hour, well, so that it will maximum in all likelihood be a reason of community slowdowns.
 Data Compression: Bandwidth obstacles are not anything new in community management; it
appears as though they'll usually be there. Before now, networks used to have spare bandwidths
which usually featured as spare bandwidths – simply what they're supposed to be – however with
developing wishes including records restoration in case of emergency, growing centralized
community infrastructure and business enterprise boom which ends up in extra team of workers
users, nearly each little bit of bandwidth is used up. Consequentially, bandwidth hassle is sort of
unavoidable.
 Do the Necessary Updates and Upgrades: With technology, not anything is ever the identical for
lengthy; there'll usually be changes, and you'll want to preserve up with them in case you need to
live applicable and extra productive. In essence, for a community to characteristic optimally, all
issue software program and firmware worried will want to be up to date as new updates are rolled
out. If you've got got used a software program for too lengthy with out making any sizable extrade
to it, whilst your workplace duties growth exponentially each day in a bid to fulfill new customer
needs, you'll maximum probable be aware that duties aren't finished as speedy as they used to be.
 Monitoring Tools Are a Sure Way to Improve Network Performance: Network control
structures exist due to the fact there are community tracking equipment to make matters less
difficult than ever before. Monitoring equipment offer specified perception and evaluation at the
reasons of community mistakes and in which they're located, thereby putting off the downtime
skilled at the same time as attempting to find the supply of mistakes. Though by and large
dependent to proactively offer statistics at the fitness of a community to be used via way of means
of community engineers, tracking equipment can cross as a long way as troubleshooting sure
mistakes if computerized to do so.

VII. Design a maintenance schedule to support the networked system:(D2)


Network Maintenance Tasks: Some common network maintenance tasks that should be performed on
a day-to-day basis include:

 Upgrading Hardware and Software: Installing, changing, and upgrading hardware and software
program is an essential a part of community renovation as it guarantees that your IT community
isn't made inclined with the aid of using previous technology. Upgrading hardware and software

23
program can consist of the entirety from changing older or failed hardware to upgrading patch
levels.
 Network Monitoring: Proactive tracking is critical to growing an powerful community upkeep
method for any enterprise as it permits capability troubles to be detected and solved earlier than
they are able to negatively effect a enterprise’ operations. When tracking a community, it's miles
crucial to report any capability troubles to make certain that the whole lot is being treated properly.
 Network Security: One of the maximum essential components of community operation and
renovation is community protection. Having a committed protection crew that constantly video
display units your IT community and facilitates maintained a dependent renovation technique will
assist you find out capability vulnerabilities and protection threats, each internally and externally,
earlier than they are able to have an effect on your business.
 Scheduling Backups: While lots of companies have a tendency to provide low precedence to
appearing recurring protection duties like facts backups, frequently backing up your business’
crucial facts may be vital in convalescing records misplaced because of a severe or important
community failure. Making certain to schedule, monitor, and affirm all backups of center
community additives and gadgets will make it simpler and quicker to get better a community or
man or woman community additives after a hardware or software program failure.
 IT infrastructure compliance: Maintaining internal compliance with company practices as well
as external government regulations and industry policies.

VIII. Use critical reflection to evaluate own work and justify valid conclusions:(D3)
 Overall, with the aid of using thinking about the benefits and the risks from above, I
determined that my community has a number of blessings in preference to constraints. The
boundaries of my community are pretty much the value of putting in place and the protection
of the important transfer and router. And I assume the person can cope with those issues.
 My designed community became efficiently exceeded my check plan. All the gadgets can
ping with every other. And the IP deal with of the gadgets are routinely supplied with the aid
of using the server. Therefore, my community has met the requirement that the person need.
 In conclusion, even though my designed community has efficiently met all of the person
requirement, however withinside the future, I could improve and offer greater offerings to my
community in order that the person can have a brilliant enjoy whilst the usage of my
designed community.

IX. Conclusion:
In conclusion, my network project has met the user requirements and successfully passed the test.
From this assignment, I learned how to design and implement a networking project from a local

24
educational institute based on their requirement. In the future, I will improve my network so that, it can
connect to the internet or connect to another outside network.

25
X. References:
1. Doug-lowe (2018) Networking All-in-One For Dummies, 7th Edition.

2. Edward Tetz (2011) Cisco Networking All-in-One For Dummies, 10th Edition.

26

You might also like