0% found this document useful (0 votes)
293 views

Lan Proposal

The document proposes a LAN network for XYZ Technologies consisting of wired and wireless connections. It will use a star topology with switches in each department connecting to a main switch, then to a router and server, with a firewall providing security. Hardware including Cisco switches, routers, access points, and an HP server are suggested. The network will use private IP addresses for security and privacy. Protocols like TCP, HTTPS, SFTP and SMTPS will enable reliable and secure data transfer and email communications within the network. Cost is estimated to be around RM207,000. Diagrams show the proposed network structure and LAN layout.

Uploaded by

Aqeel Abqari
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
293 views

Lan Proposal

The document proposes a LAN network for XYZ Technologies consisting of wired and wireless connections. It will use a star topology with switches in each department connecting to a main switch, then to a router and server, with a firewall providing security. Hardware including Cisco switches, routers, access points, and an HP server are suggested. The network will use private IP addresses for security and privacy. Protocols like TCP, HTTPS, SFTP and SMTPS will enable reliable and secure data transfer and email communications within the network. Cost is estimated to be around RM207,000. Diagrams show the proposed network structure and LAN layout.

Uploaded by

Aqeel Abqari
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

UNIVERSITI TEKNOLOGI MARA (UiTM)

CAWANGAN MELAKA
KAMPUS JASIN

SEMESTER 3
OKTOBER 2023 – FEBRUARI 2024

COURSE:
ITT459
DATA COMMUNICATIONS

TITLE:
LOGIC AREA NETWORK (LAN) PROPOSAL

PROGRAMME:
CDCS255
BACHELOR OF COMPUTER SCIENCE
(HONS.) COMPUTER NETWORKS

STUDENT’S NAME:
AQEEL ABQARI BIN MOHD HAPIZ

MATRIC NUMBER:
2022645886

GROUP:
M3CDCS2553A

LECTURES’S NAME:

SUBMISSION DATE:
TABLE OF CONTENT

NO. CONTENT PAGE

1.0 INTRODUCTION 1

2.0 OBJECTIVES 1

NETWORK STRUCTURE/TOPOLOGY
3.0 2
 FIGURE 3.1

4.0 PROTOCOL 3

5.0 SUGGESTED HARDWARE 4

COSTING
6.0 5
 TABLE 6.1

LAN DIAGRAM
7.0 6
 FIGURE 7.1

8.0 IP ADDRESS 7

9.0 SECURITY AND TROUBLESHOOTING 8

10.0 NETWORK MANAGEMENT 9

11.0 REFERENCES 10
1.0 INTRODUCTION

XYZ Technologies Sdn Bhd is a dynamic and innovative small company that conducts
business in the field, specializing in various internet-related services. With a proven history
of delivering cutting-edge solutions, XYZ Technologies Sdn Bhd leads the digital arena,
providing comprehensive services tailored to various requirements. From website
development and digital marketing to cloud computing and cybersecurity, XYZ Technologies
Sdn Bhd is a benchmark of technological excellence, ready to enhance business in the
continuously evolving realm of the internet. After all discussions, we have agreed to design
wired and wireless connections for every computer in this company. The organization, with a
total of 19 employees, is structured into 4 distinct departments: marketing (4 employees),
finance (7 employees), production (4 employees) and administration (4 employees).

2.0 OBJECTIVES

1. Create extensive connectivity to guarantee dependable and smooth connectivity


between all of the company’s computers.

2. Enhance departmental networking to raise the efficiency of communication and


network capabilities across all departments.

3. Bolster cybersecurity procedures to prevent future cyber risks and safeguard critical
company data.

4. Improve the user experience to make sure that users have a seamless and practical
online experience.
1

3.0 NETWORK STRUCTURE/TOPOLOGY

FIGURE 3.1

Figure 3.1 shows our proposed network structure or topology. As we can see, we have
combined wired and wireless connections to XYZ Technology Sdn Bhd. We choose to
structure this combination of network connections based on star topology because it is highly
reliable and efficient. By using this type of topology, the rest of the network will not be
affected by the failure of one node. Therefore, we can easily add new nodes or remove
damaged units in this network topology to maintain productivity. Besides, within the star
topology, when each device is connected to the central core, the chances of data collision
are relatively lower, increasing the system’s performance. We provide a few network devices
to each department for staff use, including workstations and printers for wired connections
and laptops for wireless connections using wireless access points in each department. All
the connections in each department’s switches will connect to the main switch to transfer all
the data to the router and server. A firewall is also provided to monitor incoming and outgoing
network traffic. It will decide whether to allow or block specific traffic based on a defined set
of security rules.
2
4.0 PROTOCOL

 TCP

Transmission Control Protocol (TCP) is a connection-oriented protocol where the


communicating devices should establish a connection before transmitting data and close the
connection after transmitting the data. It helps in the exchange of messages between
different devices over a network. TCP is reliable as it guarantees data delivery to the
destination router. It also provides extensive error-checking mechanisms as it has flow
control and acknowledgment data.

 HTTPS

Hypertext Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the primary
protocol used to send data between a web browser and a website. HTTPS is encrypted to
increase the security of data transfer. It prevents websites from having their information
broadcast in a way that’s easily viewed by anyone snooping on the network.

 SFTP

Secure File Transfer Protocol (SFTP) is a secure and encrypted version of FTP that ensures
the protected and confidential transfer of files over a network. SFTP is a secure method for
transferring files among different devices within the network. Its primary function is securely
exchanging sensitive and confidential files between servers, workstations, and other network
devices.

 SMTPS

Simple Mail Transfer Protocol Secure (SMTPS) is a secure extension of SMTP for handling
email transmissions. It operates over a secure and encrypted connection. Its primary role is
to ensure the confidentiality and integrity of email exchanges within the internal network,
protecting sensitive information from unauthorized access. SMTPS is crucial in securing
email communications, especially for departments like administration and finance that often
deal with confidential information via email within the organization’s company.
3
5.0 SUGGESTED HARDWARE

 SWITCH
The Cisco SG350 series blends reliability, scalability, and advanced features for small to
medium-sized companies. Known for dependable performance, it ensures uninterrupted
operations with port configurations ranging from 10 to 52 ports. The intuitive web interface
simplifies setup and management while robust security measures fortify the network. Despite
enterprise-level features, the SG350 series remains cost-effective, delivering stellar
performance capabilities and comprehensive support services.

 ROUTER
The Cisco ISR 4000 Series routers are reliable and adaptable, catering to small to medium-
sized enterprises. They accommodate growing demands without compromising speed or
reliability, offering embedded security features and application optimization. Diverse models
and user-friendly interfaces empower IT personnel, and redundancy features mitigate
downtime risks. Supported by Cisco's services and firmware updates, these routers remain a
dependable, adaptable, and secure networking solution.

 FIREWALL
The Cisco ASA 5506-X is a pinnacle in firewall solutions for small to medium-sized
companies. Robust security features provide a comprehensive shield against cyber threats,
scalability accommodates evolving needs, and a user-friendly interface simplifies
management. Integration with Cisco's security ecosystem enhances appeal, ensuring
reliability and fortified protection. Supported by Cisco's services and firmware updates, the
ASA 5506-X remains resilient against emerging threats.

 ACCESS POINT
The Cisco Aironet 2800 Series Access Points cater to the intricate demands of small- to
medium-sized enterprises. They accommodate data-rich applications and mobile devices,
supporting 2.4 and 5 GHz bands for network optimization. User-friendly interfaces streamline
tasks, and scalability allows seamless integration of additional access points. Quality of
Service (QoS) features prioritize critical applications, ensuring a reliable wireless experience.
Supported by Cisco's reliability, services, and firmware updates, the Aironet 2800 Series
remains optimal for small to medium-sized enterprises.
4

6.0 COSTING

NO. ITEM MODEL QUANTITY PRICE PER TOTAL PRICE


UNIT (RM) (RM)

1 Server HPE ProLiant 1 19,499.38 19,499.38


ML350 Gen10

2 Firewall Cisco ASA 1 7,327.33 7,327.33


5506-X

3 Router Cisco ISR 1 5,233.70 5,233.70


4000

4 Switch Cisco SG350 5 2,087.13 10,435.65

5 Access Point Cisco Aironet 4 5,743.75 22,975.00


2800

6 Printer Sharp BP- 4 8,208.69 32,834.76


20C25

7 Workstation Dell Precision 11 6,169.00 67,859.00


3660

8 Laptop Dell XPS 13 8 5,499.00 43,992.00

9 Ethernet Cable Cat 7 100 68.00 6,800.00

10 Bluetooth Asus USB- 19 50.74 964.06


Adapters BT400

11 Antennas Alfa APA- 4 99.00 396.00


M25
Dual Band

Total Price (RM) 207,891.67


5

7.0 LAN DIAGRAM

FIGURE 7.1
6
8.0 IP ADDRESS ASSIGNMENT

We have opted for a Class B private address to bolster our network security and ensure
enhanced privacy for our business operations. This choice allows us to use private IP
addresses within our internal network, enabling secure communication among devices within
our office environment and maintaining confidentiality and security.

Department Network Range of IP Subnet DNS Gateway


Address Address Mask Server

(Additional IP
address reserved
for future use)

Marketing 172.16.2.0 172.16.2.1 -


172.16.2.14

Finance 172.16.2.16 172.16.2.17 -


172.16.2.30 255.255.0.0 172.16.2.6 172.16.2.1
5
Administration 172.16.2.32 172.16.2.33 -
172.16.2.46

Production 172.16.2.48 172.16.2.49 -


172.16.2.62
7
9.0 SECURITY AND TROUBLESHOOTING

SECURITY
Network security is the protection of the underlying networking infrastructure from
unauthorized access, misuse, or theft. Here are 4 types of network security that we use for
our company:
 Network firewalls - Monitors incoming and outgoing network traffic and decide
whether to allow or block specific traffic based on a defined set of security rules
 VPN - Encrypts the connection from an endpoint to a network over the internet.
 Cloud Security - Defends online IP, services, applications, and other imperative
data by shielding users against threats anywhere they access the internet in the
cloud.
 Anti-virus and anti-malware software - Scan for malware upon entry and
continuously track files afterward to find anomalies, remove malware, and fix the
damage.

TROUBLESHOOTING
We outline a meticulous troubleshooting process to maintain the network’s resilience and
swiftly address any issues that may arise:
1. IP-configuration checks - Assigning a new IP address can resolve an issue if a
previous address is incorrect.
2. Ping and tracert testing - Use the ping utility or the tracert command to test
connections with remote servers and return information about the signal path.
3. DNS checks - When performing a DNS check and receiving results such as
"Request timed out" or "No response from server," the problem might originate in the
DNS server for the destination.
4. Service provider checks - Providers' status pages will report outages that might be
affecting network performance.
5. Virus and malware checks - Use security tools to see whether new attacks have
been flagged.
6. Database logs - A fresh review of database logs will show whether this is the case.
7. Command-line tools - The most common command-line tools are ipconfig and
nslookup, which can also help identify network issues.
8. Test environments - Construct test environments where they can recreate problems
and test solutions.
8

10.0 NETWORK MANAGEMENT

Network management strategically coordinates network traffic and data flow throughout the
organizational ecosystem. Its responsibility lies in efficiently managing the inflow and outflow
of data across various host environments, ensuring the delivery of a secure, reliable, and
high-performance network to end-users. Hence, we use all these types of network
management in designing our LAN for our company based on the FCAPS model:

 Network fault management: Focuses on identifying, isolating, and fixing problems


or faults in a network system. The objective is to minimize network outages and
guarantee the uninterrupted and dependable functioning of network services.

 Network configuration management: Involves the organizing, recording, and


monitoring modifications made to a network's configurations and settings. The aim is
to ensure network devices function effectively and securely while enabling effective
troubleshooting and adherence to organizational regulations.

 Network accounting and utilization management: Focuses on tracking resource


usage, managing network traffic, and optimizing overall efficiency. It plays a crucial
role in ensuring that the network operates effectively, resources are utilized
efficiently, and potential issues are proactively addressed.

 Network performance management: To maintain a responsive and reliable network


infrastructure. By adopting a proactive approach to monitoring, analysis, and
optimization, we can ensure that our networks meet the demands of users and
applications while adapting to evolving requirements.

 Network security management: To implement and manage robust security


protocols, including firewalls, intrusion detection systems, regular security updates,
and access controls to safeguard the network against cyber threats.
9

11.0 REFERENCES

‌1. Mack, K. (2021, September 17). Advantages Of Private IP Address Over Public IP
Address | Bit Rebels. Retrieved December 29, 2023, from Bit Rebels website:
https://bitrebels.com/technology/advantages-private-ip-address-public-ip-address/

2. Best Networking Hardware Software in 2023 | 6sense. (2023). Retrieved December


29, 2023, from 6sense website: https://6sense.com/tech/networking-hardware

3. Awati, R. (2022, March 2). Hypertext Transfer Protocol Secure (HTTPS). Software
Quality. https://www.techtarget.com/searchsoftwarequality/definition/HTTPS

4. Yasar, K., & Lutkevich, B. (2023, December 11). Transmission Control Protocol
(TCP). Networking. https://www.techtarget.com/searchnetworking/definition/TCP

5. SFTP Server Definition - SFTP Client | Serv-U. (2023, January 11). Serv-U.
https://www.serv-u.com/what-is-ssh-file-transfer-protocol#:~:text=SFTP%20

6. SMTPS: Securing SMTP and the differences between SSL, TLS, and the ports they
use. (n.d.). https://www.agari.com/blog/smtps-how-to-secure-smtp-with-ssl-tls-which-port-to-
use

7. What is network security? (2023, July 4). Cisco.


https://www.cisco.com/c/en/us/products/security/what-is-network-security.html

8. What is network troubleshooting? (2023, October 5). Cisco.


https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-network-
troubleshooting.html

9. What is network Management? Definition, key components, and best practices -


Spiceworks. (2022, February 10). Spiceworks.
https://www.spiceworks.com/tech/networking/articles/what-is-network-management/
10

You might also like