Lan Proposal
Lan Proposal
CAWANGAN MELAKA
KAMPUS JASIN
SEMESTER 3
OKTOBER 2023 – FEBRUARI 2024
COURSE:
ITT459
DATA COMMUNICATIONS
TITLE:
LOGIC AREA NETWORK (LAN) PROPOSAL
PROGRAMME:
CDCS255
BACHELOR OF COMPUTER SCIENCE
(HONS.) COMPUTER NETWORKS
STUDENT’S NAME:
AQEEL ABQARI BIN MOHD HAPIZ
MATRIC NUMBER:
2022645886
GROUP:
M3CDCS2553A
LECTURES’S NAME:
SUBMISSION DATE:
TABLE OF CONTENT
1.0 INTRODUCTION 1
2.0 OBJECTIVES 1
NETWORK STRUCTURE/TOPOLOGY
3.0 2
FIGURE 3.1
4.0 PROTOCOL 3
COSTING
6.0 5
TABLE 6.1
LAN DIAGRAM
7.0 6
FIGURE 7.1
8.0 IP ADDRESS 7
11.0 REFERENCES 10
1.0 INTRODUCTION
XYZ Technologies Sdn Bhd is a dynamic and innovative small company that conducts
business in the field, specializing in various internet-related services. With a proven history
of delivering cutting-edge solutions, XYZ Technologies Sdn Bhd leads the digital arena,
providing comprehensive services tailored to various requirements. From website
development and digital marketing to cloud computing and cybersecurity, XYZ Technologies
Sdn Bhd is a benchmark of technological excellence, ready to enhance business in the
continuously evolving realm of the internet. After all discussions, we have agreed to design
wired and wireless connections for every computer in this company. The organization, with a
total of 19 employees, is structured into 4 distinct departments: marketing (4 employees),
finance (7 employees), production (4 employees) and administration (4 employees).
2.0 OBJECTIVES
3. Bolster cybersecurity procedures to prevent future cyber risks and safeguard critical
company data.
4. Improve the user experience to make sure that users have a seamless and practical
online experience.
1
FIGURE 3.1
Figure 3.1 shows our proposed network structure or topology. As we can see, we have
combined wired and wireless connections to XYZ Technology Sdn Bhd. We choose to
structure this combination of network connections based on star topology because it is highly
reliable and efficient. By using this type of topology, the rest of the network will not be
affected by the failure of one node. Therefore, we can easily add new nodes or remove
damaged units in this network topology to maintain productivity. Besides, within the star
topology, when each device is connected to the central core, the chances of data collision
are relatively lower, increasing the system’s performance. We provide a few network devices
to each department for staff use, including workstations and printers for wired connections
and laptops for wireless connections using wireless access points in each department. All
the connections in each department’s switches will connect to the main switch to transfer all
the data to the router and server. A firewall is also provided to monitor incoming and outgoing
network traffic. It will decide whether to allow or block specific traffic based on a defined set
of security rules.
2
4.0 PROTOCOL
TCP
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the primary
protocol used to send data between a web browser and a website. HTTPS is encrypted to
increase the security of data transfer. It prevents websites from having their information
broadcast in a way that’s easily viewed by anyone snooping on the network.
SFTP
Secure File Transfer Protocol (SFTP) is a secure and encrypted version of FTP that ensures
the protected and confidential transfer of files over a network. SFTP is a secure method for
transferring files among different devices within the network. Its primary function is securely
exchanging sensitive and confidential files between servers, workstations, and other network
devices.
SMTPS
Simple Mail Transfer Protocol Secure (SMTPS) is a secure extension of SMTP for handling
email transmissions. It operates over a secure and encrypted connection. Its primary role is
to ensure the confidentiality and integrity of email exchanges within the internal network,
protecting sensitive information from unauthorized access. SMTPS is crucial in securing
email communications, especially for departments like administration and finance that often
deal with confidential information via email within the organization’s company.
3
5.0 SUGGESTED HARDWARE
SWITCH
The Cisco SG350 series blends reliability, scalability, and advanced features for small to
medium-sized companies. Known for dependable performance, it ensures uninterrupted
operations with port configurations ranging from 10 to 52 ports. The intuitive web interface
simplifies setup and management while robust security measures fortify the network. Despite
enterprise-level features, the SG350 series remains cost-effective, delivering stellar
performance capabilities and comprehensive support services.
ROUTER
The Cisco ISR 4000 Series routers are reliable and adaptable, catering to small to medium-
sized enterprises. They accommodate growing demands without compromising speed or
reliability, offering embedded security features and application optimization. Diverse models
and user-friendly interfaces empower IT personnel, and redundancy features mitigate
downtime risks. Supported by Cisco's services and firmware updates, these routers remain a
dependable, adaptable, and secure networking solution.
FIREWALL
The Cisco ASA 5506-X is a pinnacle in firewall solutions for small to medium-sized
companies. Robust security features provide a comprehensive shield against cyber threats,
scalability accommodates evolving needs, and a user-friendly interface simplifies
management. Integration with Cisco's security ecosystem enhances appeal, ensuring
reliability and fortified protection. Supported by Cisco's services and firmware updates, the
ASA 5506-X remains resilient against emerging threats.
ACCESS POINT
The Cisco Aironet 2800 Series Access Points cater to the intricate demands of small- to
medium-sized enterprises. They accommodate data-rich applications and mobile devices,
supporting 2.4 and 5 GHz bands for network optimization. User-friendly interfaces streamline
tasks, and scalability allows seamless integration of additional access points. Quality of
Service (QoS) features prioritize critical applications, ensuring a reliable wireless experience.
Supported by Cisco's reliability, services, and firmware updates, the Aironet 2800 Series
remains optimal for small to medium-sized enterprises.
4
6.0 COSTING
FIGURE 7.1
6
8.0 IP ADDRESS ASSIGNMENT
We have opted for a Class B private address to bolster our network security and ensure
enhanced privacy for our business operations. This choice allows us to use private IP
addresses within our internal network, enabling secure communication among devices within
our office environment and maintaining confidentiality and security.
(Additional IP
address reserved
for future use)
SECURITY
Network security is the protection of the underlying networking infrastructure from
unauthorized access, misuse, or theft. Here are 4 types of network security that we use for
our company:
Network firewalls - Monitors incoming and outgoing network traffic and decide
whether to allow or block specific traffic based on a defined set of security rules
VPN - Encrypts the connection from an endpoint to a network over the internet.
Cloud Security - Defends online IP, services, applications, and other imperative
data by shielding users against threats anywhere they access the internet in the
cloud.
Anti-virus and anti-malware software - Scan for malware upon entry and
continuously track files afterward to find anomalies, remove malware, and fix the
damage.
TROUBLESHOOTING
We outline a meticulous troubleshooting process to maintain the network’s resilience and
swiftly address any issues that may arise:
1. IP-configuration checks - Assigning a new IP address can resolve an issue if a
previous address is incorrect.
2. Ping and tracert testing - Use the ping utility or the tracert command to test
connections with remote servers and return information about the signal path.
3. DNS checks - When performing a DNS check and receiving results such as
"Request timed out" or "No response from server," the problem might originate in the
DNS server for the destination.
4. Service provider checks - Providers' status pages will report outages that might be
affecting network performance.
5. Virus and malware checks - Use security tools to see whether new attacks have
been flagged.
6. Database logs - A fresh review of database logs will show whether this is the case.
7. Command-line tools - The most common command-line tools are ipconfig and
nslookup, which can also help identify network issues.
8. Test environments - Construct test environments where they can recreate problems
and test solutions.
8
Network management strategically coordinates network traffic and data flow throughout the
organizational ecosystem. Its responsibility lies in efficiently managing the inflow and outflow
of data across various host environments, ensuring the delivery of a secure, reliable, and
high-performance network to end-users. Hence, we use all these types of network
management in designing our LAN for our company based on the FCAPS model:
11.0 REFERENCES
1. Mack, K. (2021, September 17). Advantages Of Private IP Address Over Public IP
Address | Bit Rebels. Retrieved December 29, 2023, from Bit Rebels website:
https://bitrebels.com/technology/advantages-private-ip-address-public-ip-address/
3. Awati, R. (2022, March 2). Hypertext Transfer Protocol Secure (HTTPS). Software
Quality. https://www.techtarget.com/searchsoftwarequality/definition/HTTPS
4. Yasar, K., & Lutkevich, B. (2023, December 11). Transmission Control Protocol
(TCP). Networking. https://www.techtarget.com/searchnetworking/definition/TCP
5. SFTP Server Definition - SFTP Client | Serv-U. (2023, January 11). Serv-U.
https://www.serv-u.com/what-is-ssh-file-transfer-protocol#:~:text=SFTP%20
6. SMTPS: Securing SMTP and the differences between SSL, TLS, and the ports they
use. (n.d.). https://www.agari.com/blog/smtps-how-to-secure-smtp-with-ssl-tls-which-port-to-
use