Assignment networking- IT Aakriti
Assignment networking- IT Aakriti
FACULTY OF COMPUTING
STUDENT DETAILS
STUDENT ID 2022-I
ASSESSOR
Ruman Thapa
NAME
ESTIMATED 8000
WORD LENGTH
SUBMISSION
1. I declare that:
a) this assignment is entirely my own work, except where I have included fully-
documented references to the work of others,
b) the material contained in this assignment has not previously been submitted
for any other subject at the University or any other educational institution,
except as otherwise permitted,
c) no part of this assignment or product has been submitted by me in another
(previous or current) assessment, except where appropriately referenced, and
with prior permission from the Lecturer / Tutor / Unit Coordinator for this unit.
2. I acknowledge that:
a) if required to do so, I will provide an electronic copy of this assignment to the
assessor;
b) the assessor of this assignment may, for the purpose of assessing this
assignment:
I. reproduce this assignment and provide a copy to another member of
academic staff;
II. communicate a copy of this assignment to a plagiarism checking
service such as Plagiarism Check (which may then retain a copy of this
assignment on its database for the purpose of future plagiarism
checking).
I am aware of and understand that any breaches to the Academic Code of Conduct will
be investigated and sanctioned in accordance with the College Policy.
Optimizing Network Connectivity and Security for Park IT Solutions: The Butwal
Expansion.
Introduction
The main goal of this project is to create and put into operation a network infrastructure for the
new Butwal branch that is both safe, efficient, and capable of handling increased demands. This
network must meet the operational requirements of multiple departments, guaranteeing strong
security, uninterrupted connectivity, and exceptional performance. The suggested network design
would include both wired and wireless connectivity, as well as departmental separation,
extensive security measures, and improved performance to satisfy the company's present and
future needs.
This report will provide a comprehensive overview of the concepts of managing network
infrastructure, which encompasses various aspects such as network types, standards, topology,
devices, and protocols. Additionally, it will suggest an appropriate network design for the Butwal
branch, guaranteeing that the network can effectively and securely support the company's
operations.
Network Types: Benefits and Constraints
Wired Networks
Wireless Networks
Hybrid Network
802.x Standards
Network Topology and Its Impact
Common Network Topologies:
Bus Topology
Star Topology
Ring topology
Mesh Topology
Networking Principles and Protocols
Network Protocols
IPv4
IPv6
HTTPS
For an efficient network connection, it is essential that the physical components of a workstation,
such as network interface cards and CPUs, are compatible with the networking software,
including operating systems and network drivers. For best performance and security, the
hardware capabilities need to be compatible with the software requirements.
Proposed Network Topology for Park IT Solutions Butwal Branch
Topology Design
The Butwal branch is divided into four departments: this branch houses four essential teams: the
IT team, finance team, human resources team, and server room, with separate needs. Every
department demands unique security measures, plus performance standards, plus access control
setup.
Our design targets secure spaces for departments, plus teamwork features and document sharing
for the entire company. Our design incorporates advanced network devices such as routers,
switches, and servers, together with detailed IP planning, to achieve optimal system performance
and security standards. At task completion, the network setup will be operational and able to
handle all Butwal branch functions.
Network Design
At Park IT Solution's Butwal branch, the network is designed to provide safe department
communication with dedicated features for each section of the office. We designed three stories
within our office building to host network components for optimal speed and data protection.
Router: The router takes charge of linking our entire office network to both internet access and
outside networks. We place the router on top, above where servers are stored, to handle all data
exchanges between departments and outside networks. The router controls IP address allocation
and department networking while delivering secure and optimized system connections.
Switch: Each network floor features switch units that merge PCs and printers into the local
networking system. Each department has its own switch that directs data traffic within the
department to match proper devices and improves network speed.
Top floor: At the top level, switches provide connectivity between the IT team and server
room. A dedicated switch handles all IT team device communications, whereas servers
connect to a distinct switch for network access.
Second Floor: Each finance team computer connects through a switch to help them share
data and use department resources.
First Floor: HR employees work off a standalone switch that creates a secure bubble for
their network traffic to avoid mixing with other groups' data.
Servers: The top floor The Room features four servers offering file storage services plus email
backup capabilities and multiple database operations. Every department gets its own set of access
rights through the switch network because security policies restrict what each department sees.
The network divides department traffic using
Virtual Local Area Networks (VLANs): The different departments get separate VLANs to
keep their data protected from other departments through better security.
Wireless Access Points (APs): The building has wireless internet available on every level to
support staff using laptops and mobile phones. We place wireless access points throughout each
floor to keep employees connected everywhere while avoiding signal gaps.
Firewall: A firewall protects the internal network by screening traffic between internal and
external internet connections. It stops dangerous internet traffic while letting only approved users
connect to office systems.
Park IT Solution's Butwal branch will experience a protected and efficient network system that
supports all departments' work requirements today and accommodates growth needs for
tomorrow.
Fig: Network design
Router Configuration
The router directs traffic between VLANs to unite departments and gives them internet and
company network access. Below are the essential configuration steps for the router:
IP Address Assignments:
We set up the router to handle inter-VLAN communication, which lets different VLAN
subnetworks connect to each other. When inter-VLAN routing is absent, devices from
separate VLAN groups remain isolated from one another.
Sub-interface configuration on router-on-a-stick lets the router efficiently process VLAN
communications. The router sub-interfaces have their specific VLAN IDs established for
IT at VLAN 10, VLAN 20 for Finance, and more.
Security Measures:
Our security policies control traffic flow between VLANs through the ACL configurations on
our router device. The network design allows the IT team VLAN to connect to the server room
VLAN while blocking finance and HR teams from viewing server information. The router
applies security rules to regulate connection requests from internal staff members who want to
use external services.
Fig: IP of DHCP Server
Fig: IP of DNS Server
Fig: IP of ADDS Servers
Fig: IP configuration in router
Fig: CLI Command for Router
Fig: successfully Login Park IT solution
Activity 3:
Introduction
Park IT Solution needs its reliable network infrastructure to maintain high-quality service
operations for its clients. Park IT Solution needs a network solution that enables secure access
control systems and real-time monitoring capabilities. Our network should deliver continuous
service without failure while growing and maintaining data security. The network needs to
ensure fast communication speed with backup systems plus remote surveillance features that
meet quality standards and follow industry regulations. This report evaluates the network
strategy that Park IT Solution uses to deliver efficient and secure services by meeting their
networking requirements.
Network Requirements
High Availability: Maintenance teams must design the network to keep working reliably at all
times. Network interruptions create problems that cause customer frustration and damage to
parking facility income. We need to put multiple components in place and backup systems to
keep the network running smoothly.
Scalability: The network system must support Park IT Solution's expanding business scope with
more customers and services. Our network needs to expand easily without requiring extended
service interruptions.
Security: We need strict security systems because our data contains private payment information
and access restrictions. Our network setup will employ firewalls, intrusion detection systems,
and encryption systems to keep unauthorized access at bay and shield data from breaches.
Low Latency: The success of parking management relies on real-time systems to process
payments and track available parking spots. The network needs to provide fast response times to
run important applications effectively.
Redundancy: We must build redundant backup systems into essential network devices to keep
them running at maximum availability. When system components fail, our network continues to
operate using backup systems and automatic failover methods.
Quality of Service (QoS): We must establish a traffic prioritization system to give essential
applications, including payment processing and access control, their required bandwidth.
Network traffic for critical operations will get preferential handling through our Quality-of-
Service configuration.
Cost-Efficiency: We need a network that offers superior performance and protection with
minimal expense on equipment, programs, and support work. We will develop a setup that
combines appropriate costs with performance needs for the business.
Overview of Virtual Network Simulator/Platform
We choose Cisco Packet Tracer as our virtual network simulator to develop our design.We will
build our network layout using Cisco Packet Tracer, which helps us design the best possible
network solution. This platform offers users tools to design and examine sophisticated network
designs and configurations. Cisco Packet Tracer provides several key features that make it
suitable for this project:
User-friendly interface: You can build network configurations by easily moving devices on the
platform.
Large device library: The platform includes a full set of routers, switches, firewalls, and end-user
devices for our advanced network modeling.
Protocol and technology compatibility: It enables various network protocols and technologies to
comply with essential design requirements.
Simulation and testing: network simulation tool lets us test and fix problems before we put our
network into service.
Create our network design through Cisco Packet Tracer first and then check it works before
putting it into physical systems.
Network Design
Network design involves setting up a network to meet specific business communication needs
through proper system connections. A proper network design helps deliver secure data while
growing and protecting data flow. The network design combines physical arrangements, IP
address management, routing methods, and security protocols. solution requires a network design
that delivers maximum uptime with fast performance and protection features, plus features and
expansion options at a reasonable cost.
All network components, including components, routers, switches, firewalls, and devices, will
unite to meet specified company demands. VLAN segments will divide the network to maintain
traffic separation and boost security levels.
Implementation Details:
Hardware Installation and Procurement:
Hardware needed: Our setup demands servers, routers, switches, cables, and end-user
devices.
Procurement: Our hardware choices meet both current network demands and support
expansion options.
Deployment: Our network design guides the exact placement of hardware devices.
Setup and configuration:
When setting up routers and switches, we need to define their network parameters with IP
addresses and security features alongside VLANs and routing protocols.
Our network will contain assigned and dynamic IP addresses that work with OSPF or RIP
route systems and access control lists to monitor network exchanges.
Cables and Physical Connectivity:
Cable Installation: The chosen network design requires Ethernet cables and fiber optics to
join different devices together.
Cable Management: The network will work better and stay more dependable when we
use correct cable organization methods to avoid signal disruptions.
Installation of software and firmware:
software deployment: Our network management software and operating system
installations will take place across system servers and devices.
software updates: Updating all devices to the newest software versions will protect
security and keep everything in proper working order.
Security Measures:
Firewalls: A firewall system will be positioned to secure the network edges against
unauthorized access.
Intrusion Detection and Prevention Systems: Our system will include Intrusion Detection
and Prevention Systems to find and stop security attacks before they occur. Data
encryption methods will secure our network activity.
Test and Verification:
Connectivity tests: Verify that devices communicate with each other to maintain proper
data transfer speed.
Bandwidth tests: Test your network by putting heavy stress on it to verify that both speed
and response time stay optimal.
Security tests: Check that your network defenses, including firewalls, access controls, and
intrusion prevention systems, properly monitor and block any unauthorized attempts to
access your systems.
Redundancy tests: Test alternate components to make sure they perform correctly for
uninterrupted service delivery.
The Butwal branch of Park IT Solution operates with star network topology. Every device
attaches to one central switch before routing through it to reach the external router. We selected
the star topology because it offers better scalability while making network management easy and
helping isolate problems. Each floor contains its own network equipment and users that connect
to one centralized switch, while the router controls both outside connections and traffic between
departments.
Fault Isolation: Network devices remain unaffected when a device or cable stops working. A
network problem stays isolated to its origin point, causing minimal impact on surrounding
equipment.
Ease of Management: The network's central point’s let IT teams work efficiently to handle
problems and run maintenance tasks.
Protocols Selected:
IPv4 Protocol: The network operates through IPv4 addresses, which it applies to discover and
exchange messages with devices. Because our network remains small and addresses are plentiful,
IPv4 works well enough to meet our current requirements.
VLANs (Virtual Local Area Networks): The network structure divides into different VLANs
for IT, HR, finance, and server room operations. Our network partitioning creates security
benefits by restricting who can access resources and controlling how data travels between
segments.
Routing Protocols (OSPF and RIP): Our analysis compared OSPF and RIP as inter-VLAN
routing protocols. We selected OSPF instead of RIP due to its higher scalability and faster
network restoration ability.
Evaluation of protocols:
IPv4: IPv4 satisfies today's requirements, but the network growth requires IPv6 because this
protocol provides more addresses and enhanced routing functions.
VLANs: By using VLANs, the network becomes more secure and runs faster as it meets the
company's security and performance goals.
Routing Protocols: OSPF routes network traffic better as the network expands, while RIP acts
as a backup when static routing suits older subnets.
Evaluation of Network Topology and Protocols for Efficient Use of the Networking
System:
The selected network structure and protocols in many ways indicate an effective use of the
networking system for Park IT Solution's needs.
Efficient Resource Utilization: The star topology makes more effective use of network
equipment by connecting all devices to the centralized switches, which in return makes network
management and resource allocation easier. This approach reduces the hardware required, which
makes the network more manageable and economic.
Security and traffic management: VLANs are crucial in departmental segregation and the
maintenance of data confidentiality. VLANs reduce the risk of inside attacks by segmenting
departments and allowing for access control. The usage of VLAN in combination with
appropriate firewall configuration ensures that the traffic follows the predetermined rules,
reducing congestion and possible bottlenecks.
Optimized Routing: OSPF delivers effective inter-VLAN routing, ensuring that data flows
optimally between departments while retaining scalability and reducing the likelihood of routing
loops. Using OSPF ensures faster convergence and greater performance than traditional static
routing systems.
Network Security: VLANs and firewalls are good measures for security, but to take security up
a notch, advanced protocols such as 802.1X to do port-based access control, VPNs to safely
access a remote network, or any other secured method of gaining remote access must also be
utilized. IDSs and IPSs also need to be implemented.
Monitoring and Maintenance: In this network design, there is no kind of deep monitoring. The
implementation of the network management systems, such as SolarWinds or PRTG, would
enable real-time performance monitoring of networks; also, problems can come up right away.
Critical Reflection of the Decisions Made to Enhance the Network Design and
Implemented Solution:
Several decisions have been made to improve the network architecture and execution, including:
VLAN Implementation: The choice to use VLANs was motivated by the requirement for
security and traffic control. We improved network access management and reduced broadcast
traffic by splitting departments into separate subnets. This decision significantly improved the
network's performance and security.
Routing Protocol Selection: The reason for choosing OSPF instead of RIP was because of its
scalability, faster convergence, and efficiency in handling larger networks. This ensures that the
network can grow easily without performance degradation.
Security Improvement: Though the initial setup was pretty secure, still more enhancements
regarding redundancy, real-time monitoring, and improved security procedures are necessary to
ensure that the network can sustain complex threats as it grows.
Conclusion
In conclusion, the network topology and protocols chosen for Park IT Solution's Butwal branch
meet all the scalability, security, and performance requirements of the company. A star topology,
along with VLANs and OSPF routing, provides a stable and scalable foundation for the network.
These actions improved traffic management, provided data isolation, and optimized resource
consumption. Improving redundancy on essential equipment, advanced security with 802.1X and
VPNs, and adding a real-time network monitoring system will ensure that the network remains
stable and resilient enough to handle the company's operations. Downtime will be reduced, and
future growth and technology will be accomplished effectively.
References
Cisco Systems. (n.d.). Cisco Packet Tracer. Retrieved from
https://www.netacad.com/courses/packet-tracer
Stallings, W. (2021). Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud (2nd
ed.). Pearson.
Tanenbaum, A. S., & Wetherall, D. J. (2013). Computer Networks (5th ed.). Pearson Education.
Kurose, J. F., & Ross, K. W. (2020). Computer Networking: A Top-Down Approach (8th ed.).
Pearson.