Designing an internet work, Computer Networking

Assignment Help:

1. Introduction

This document describes the research-based assignment for this module. This assignment consists of two parts:

  1. A formal report
  2. And a presentation

2. Purpose of the assessment

  1. To enable students to design a network by applying the theory and practice of networks, network operating systems, and network technologies they have learnt.
  2. To enable students to select appropriate networking technologies for particular environment.
  3. To enable students to design a simulated network with LAN, WAN and Internet functionalities.

3.Organisation

This coursework should be undertaken individually. Students should apply the theory and concepts that they have learnt in the class, and are advised to research extensively by using the library, browsing the internet and other resources on the data communications in LAN, WAN, inter-site networking, NOS's and network technologies underpinning good network design and management to computersry out this assignment.

a. Overview

This assignment presents a scenario in which the XYZ COMPUTERS Company has hired your team to design their computer network. In order to help you organize this project, the scenario has been divided into seven phases listing the requirements for each phase. You have to accomplish each phase and prepare a formal report that can be given to the company.

This assignment requires that you accomplish the following:

  1. Identify the Network Components for XYZCOMPUTERS.
  2. Identify the topology and technology to be used for LAN/WAN Interconnectivity
  3. Identify the Network media to be used.
  4. Identify the Transmission equipment to be used
  5. Determine the protocols, and the NOS to be used.
  6. Perform VLSM design.
  7. Provide detail documentation in the appropriate format.
  8. Provide a written report.

b. Scenario

Satyam Computers is a newly established company that sells computers accessories. It has a chain of stores in four cities namely Kuala Lumpur, Ipoh, Penang, and Johor Bharu. Each store is housed in a building with Sales, Purchase, and Marketing and Administration departments in separate floors or rooms. Each employee has his/her own computer with access to Internet.
The company is implementing a wired network that should support 10% scalability over the next five to ten years. Your task is to design and document the network that will meet the requirements Satyam Computers.

c. XYZ Computers requirements

  1. Each store has a LAN with separated subnet for each department and all the four individual stores LANs are connected into a WAN.
  2. Each subnet has its own server and a printer.
  3. Assume an IP address for connection to the Internet router.
  4. Assume any public Class B Network IP address for internal addressing.
  5. Use a VLSM for IP addressing.
  6. All networking devices must have an IP address.

i. Kuala Lumpur

  • 18 employees in Sales.
  • 9 employees in Marketing
  •  7 employees each in Purchase and Administration.

 

ii. Ipoh

  • 9 employees in Sales
  • 5 employees in Marketing
  • 4 employees in Purchase and Administration

 

iii, Johor Bharu

  • 15 employees in Sales
  • 7 employees in Marketing
  • 5 employees in Purchase and Administration

 

iv. Penang

  • 12 employees in Sales
  • 5 employees in each Marketing, Purchase and Administration.

 

4 Deliverables

The Deliverables consist of the following (contribution to the overall module mark is given in brackets):

a. A formal written report containing

Phase -1: Satyam Computers Network Composition.

  1. Outline
  2. Summary of the Companies Network requirements
  3. Identify all the network components that would be included in the Satyam Computers network.

Phase - 2: LAN/WAN Interconnectivity

  1. Identify the LAN and WAN topology, and technology you would recommend and give the rationale behind.
  2. Create a table as shown below, and enter the network devices/components that you would be using in the Satyam Computers network under the corresponding layers they function in the right column

OSI model

Device /Components

Application

 

Presentation

 

Session

 

Transport

 

Network

 

Data Link

 

Physical

 

 

 Phase -3 : Physical Transmission options

  1. Identify the network media you would recommend to use in Satyam Computers network for the interconnection of devices, LAN and WAN.
  2. Briefly explain your reasons behind which should include pricing, bandwidth needs, and equipment needs.

Phase - 4: Transmission Equipments

  1.  Identify the transmission equipment like routers, switches and other transmission equipments that you would use in Satyam Computers network to provide LAN and WAN connectivity.Explain in brief the reasons for using those devices that you have identified.

 Phase -5: Network Protocol Architecture.

  1. Based on the requirements of Satyam Computers and which NOS you would recommend. Briefly explain your reasons.
  2. Determine which LAN and WAN protocols are supported by the NOS you recommended.
  3. Create a table as shown below, and enter the protocols under the corresponding layers they function in the right column.

TCP/IP Model

Protocols

Application

 

Transport

 

Internet

 

Host-to-network

 

Phase -6: Routing Protocols.

  1. Identify the routing protocols that you would recommend for the Satyam Computers  network. The possible routing protocol alternatives and properties should be identified in a brainstorming session. Each property is assigned a numeric value from 0 to 4. A recommendation be made and the decision matrix should be presented in the report as shown below.

Routing Protocol

Property 1

Property 2

Property 3

Total

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Group recommendation for Routing Protocol:

Phase -7: VLSM Design

  1. Your team has decided to use VLSM to maximize the use of IP address. Produce a table showing all possible subnets that meets the Satyam Computers requirements using VLSM.
  2. For each location, a set of tables for the Switches and Routers should be given as shown below.

 

 Phase -8: Network Design

Produce a logical diagram that includes:

  1. Router Switch Names
  2. Router Interface Details
  3. Network Addresses
  4. Number of Hosts per Network

Related Discussions:- Designing an internet work

What is aspects of security, Q. What is Aspects of Security? - Securit...

Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th

Explain what a digital signature is and how it works, Question: a) Out...

Question: a) Outline the concept of the Real Time Gross Settlement (RTGS) system in Mauritius and name the three main system components of the MACSS. b) Differentiate bet

Use of coaxial cable, Has a central core conductor covered in an insulating...

Has a central core conductor covered in an insulating sheath encased in an outer conductor of metal foil  RG numbers indicate physical specs such as thickness and type of insula

What is workstation, What is workstation? A workstation is a node in ne...

What is workstation? A workstation is a node in network that is more useful and can occur local information processing or graphics processing. A workstation generally has an in

What is a web server, This new model of Client/Server having of thin, porta...

This new model of Client/Server having of thin, portable, "universal" clients those talks to super fat servers. In the easiest form, a web server returns documents when clients ask

Give the types of firewalls, Give the types of firewalls Conceptually,...

Give the types of firewalls Conceptually, there are two types of firewalls: 1.  Network Level 2.  Application Level Network Level Firewall/Packet Filters The Net

Explain the structure of a typical ethernet frame, Question: (a) The IE...

Question: (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, r

Describe some common threats to the hardware, Describe some common threats ...

Describe some common threats to the hardware Theft of a computer, printer, or other resources. Tampering by a disinterested or frustrated employee who takes every chan

Snort deployed in the dmz network, Let's consider the network shown in Figu...

Let's consider the network shown in Figure 1 where Snort is deployed. In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? In Figure 1, say True or

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd