Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web...

22
TABLE OF CONTENTS Introduction.......................................................3 Benefits of having networks........................................3 List of Software and Hardware......................................4 Hardware Requirement:............................................ 4 Software requirement:............................................ 5 Costing.......................................................... 5 Requirements Collection:...........................................6 Development Methodology&cabling diagram............................8 Implementation of Network..........................................9 Configuration.................................................... 9 Simulation...................................................... 11 Future improvements &Maintenance Plan.............................14 Conclusion........................................................16 References:.......................................................17 1

Transcript of Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web...

Page 1: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

TABLE OF CONTENTS

Introduction...........................................................................................................................................3

Benefits of having networks..................................................................................................................3

List of Software and Hardware..............................................................................................................4

Hardware Requirement:.....................................................................................................................4

Software requirement:.......................................................................................................................5

Costing..............................................................................................................................................5

Requirements Collection:......................................................................................................................6

Development Methodology&cabling diagram.......................................................................................8

Implementation of Network...................................................................................................................9

Configuration.....................................................................................................................................9

Simulation........................................................................................................................................11

Future improvements &Maintenance Plan..........................................................................................14

Conclusion...........................................................................................................................................16

References:..........................................................................................................................................17

1

Page 2: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

Introduction

The idea of building a networked environment within the organization is not new. A lot of

enterprise corporations offer different kinds of tools, and hardware to design the network and

to make it operational and functional. Computer Networks (CN) can purely facilitate multi-

nodal transmitting and receiving data with one another regardless of considering their

locality. Online bank transactions, internet and video or voice conversations are some

examples of CN (Jing 2010) which have become essential part of our lives. Entire globe is

revolving around CN. From small businesses to medium scale or even larger enterprises,

people are investing gigantic amount to make it more convenient and advanced. It must be

developed and programmed carefully to obtain 99.99% of communicational success (Bera et

al. 2010). Other objective of CN is its security from the internal or external intimidations.

Lack of security may harm the networks, resulted in facing huge amount of economical and

data loss.

Benefits of having networks

Efficient network is the crucial constraint in computer network, which eases administrator of

network to keep network run smoothly. (He & Li 2009) has offered affective explanation for

switched network monitoring and management in footings of LAN monitoring of modern non-

switched networks and affective approaches have been suggested. A client/server linkage

design for communication is presented by (Bera et al. 2010) which offer LAN users the

convenience and safety to interconnect with each other in actual time. A connection is

established by client on a port known; the server receives the connection request and after the

confirming the connection establishment both server and client perform as peer nodes (Uchida

et al. 2006). Currently there are restrictions in wireless/wired networks that appeal formal

policy for security configurations. An official security analysis framework for LAN has been

2

Page 3: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

elaborated in (Kuo et al. 2009). Several advantages that can be seen by having a networked

environment will be discussed below:

File organization: Tracking down documents from piles of files in the office is a chaos. The

most useful way of its storage is in central shared space where workers could easily and

quickly obtain necessary data information (Raptis et al. 2009).

Mobility: Smart phones and notebooks have made office easily accessible but there is a need

to secure the business contacts, files or personal details as it makes us connected to the

internet all the time (Thorenoor 2010).

Association: Server-based networks could easily associate clients with the workers so that

they can communicate together across any distance and even print their documents by using

remote printer. It helps in getting a job done in less span of time (Raptis et al. 2009).

Safety and Security: Administrator of a server-based network could easily investigate and

guard the private files from person to person in order to prevent it from external threats

(Mbarushimana&Shahrabi 2008).

Performance: Well-equipped server with efficient data storage capacity and easy file access

helps to simply calculate or print the job. Innovations like Gigabit Ethernet or multicore

processors are helping globe to perform well in technology world (Kosta et al. 2010).

List of Software and Hardware

The detailed structure of the design of security network will be described later in the report.

The aim is to (a) Design and validate a computer network comprising of 15 wires and

wireless nodes;(b) Introducing obligatory security policy for network to personalise data

information for secured and smooth business.We will use Microsoft Visio diagrams and

packet tracer to elaborate our network design model. Afterward the design will be deployed

and proposed network will be simulated using packet tracer using cisco utilities.

Hardware Requirement:

Following hardware is required for business of Mr. Roberts:

10 x Main PC’s 1 x Backup Server 1 x Printer 1 x Internet connection 1 x Back up device (Network Attached Storage)

3

Page 4: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

1 x Broadband Wireless Router 1 x  2960-24TT Network Switch 15 x 100 meter Patch Cables

Software requirement:

Following software's are required for business of Mr. Roberts Software required for a small business includes: Operating system for each PC Antivirus for each system Word processing utility for application and letters Spread sheet utility for worksheets Sales and purchase system for shop Inventory control system for stock room

Costing

Product Estimated Cost

10 x PC’s £ 700 (£70 each)1 x Printer £ 401 x Internet connection £ BT ADSL1 x Back-up server £ 901 x Broadband Wireless Router £ Free (Provided by BT)1 x  2960-24TT Network Switch £99.9915 x 100 meter Patch Cables £ 75 (£5 each)11 x Operating system for each PC £ 275 (£25 each)11 x Antivirus for each system £ 55 (£5 each)10 x Word processing utility for application and letters £ 60 (£6 each)10 x Spread sheet utility for worksheets £ 60 (£6 each)10 x Sales and purchase system for shop £ 40 (£4 each)10 x Inventory control system for stock room £ 40 (£4 each)

Total £1534.99

The implementation of a system unavoidablyneeds a computer simulation compendium that

is proficient to mimic the real events in a real-life situation. Simulation is broadly of two

kinds: i.e., computer and analytical. A general classification of simulation is elaborated in

figure 1.

Figure 1 Simulation Modelling classification (Systems n.d., OPNET n.d.)

Requirements Collection:

4

Page 5: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

It is very significant to follow the appropriate life cycle development model to keep this

project on the right track and inside resources. Since our investigation involves a liner

method we have taken the linear model i.e. analysed the system first, then offered the design

and afterwards implemented the system and keep the maintenance afterwards. Life

development model is being showed in figure 2.

Figure 1 Life Cycle Development Model

We have briefly discussed the development plan for our project. For this reason we have

discussed proposed network with Mr Roberts via email so that he can provide with some

feedback and then we have incorporated all those recommendation in project. Initially

network plan was to divide network into two small networks as shown in figure 3. This

network contains more internetworking devices which increases the cost. But Mr. Roberts

wants cost effective network. So the network is break to a single main network.

Figure 1: Initial network design

5

Page 6: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

Development Methodology cabling diagram

It is very significant to observe performance of the network. A lot of simulation techniques and tools are available to analyse behaviour of network. Simulation is most important way for analysis of network performance. Cisco Packet Tracer (Systems n.d.)has been used to design this project. It is one of the best simulation tools which deliver a true scenario of network in real life implementation. It provides many selections for router and switch models. It also stretches the liberty to connect multiple typesnetwork peripheral over physical links. A detailed cabling diagram is been elaborated in figure 4.

Figure 1 Block Diagram of Wired Network

Implementation of Network

The proposed network is properly configured first according to the requirements. Further, it is implemented and simulation has been development.

Configuration

TCP/IP protocol is used for communication among different node within the network. For this reason each node will be given a specific unique IP address which act as name for the device to be distinguish among other devices. Using the unique IP address of a specific node

6

Page 7: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

other devices can communicate with it. Class C address has been used as we don’t need lot of network and number of computer is limited. 192.168.0.0 Network address scheme has been used. Host can have address from 192.168.0.1 to 192.168.0.254 as not sub netting is required.It is easier to configure the network if IP addresses have been chosen in ranges for devices according to their location, The IP address has been allocated using following ranges:

a) 100 – 125for the office room, b) 50-60 for the stock room, c) 70 -80 for the shop area  d) 25 -50 for the wireless devices.

After configuration, the device and the network location is protected for that device. This allows identifying the location of the device by the administrator. The online status of a specific device can be checked by sending ping packed to a specific IP address using ping command.E.g. C:> Ping 192.168.0.101

Device Configuration Information

1 x Internet Port BT ADSL

1 x Broadband Wireless Router 192.168.0.1

1 x Back-up server 192.168.0.200

1 x Desktop Pc 192.168.1.210

6 x Desktop Pc’s

192.168.0.100192.168.0.101192.168.0.102192.168.0.103192.168.0.104192.168.0.105

1 x Printer 192.168.0.125   

2 x Stock room Pc’s192.168.0.50192.168.0.51

2 x Shop Pc’s192.168.0.75192.168.0.76

1 x Laptop 192.168.0.27

Following is the feedback from Mr Robert which has been incorporated in the report

afterwards:

Please use DHCP to assign IP Address to the PCs in the Shop, Office, and Stock room.Please use wireless encryption.

Please show the internet working on your network simulation.

7

Page 8: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

How is the firewall configured? Perhaps you could remove that from your design and suggest it as a possible future improvement in requirement “h” in your assignment.

DHCP option has been enabled on our Backup Server as per the feedback. We have given a pool Class C address to DHCP serveras shown in figure 5.

Figure 1 DHCP Sever pool

The server will allocate address randomly to all the system in office, shop and stock room rather than statically as shown in figure 6 and this DHCP address assignment is successfully incorporated after getting feedback from Mr. Roberts.

8

Page 9: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

Figure 1 DHCP enabled on clients

Simulation

Cisco packet tracer has been used as model software in this project .Packet tracer also permits

to organize all the devices. Figure 7 shows how to arrange an end device. Various

possibilities can be utilised to construct a network device according to the project.

Figure 7 Configuration dialogue of an End Device

An initial design was conscripted by using packet tracer. Figure 8 describes the topology of

one of the department where network was sketched. Figure shows that each 11 stable nodes

were linked to an Ethernet switch in the department.

Figure 8 Wired users

9

Page 10: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

With advancements in technology the use of wireless networking gave many benefits to

wired networks. The aim has been to provide wireless access to the laptops. Wireless access

point was organized in the network providing wireless access to operators. Figure 9 shows its

design feature.

Figure 9 Wireless user

Wireless is being protected by WPA2 Personal type of security having a pass key as ‘P@a$$word’ as shown in figure 10.

10

Page 11: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

Figure 1 Wireless Security

Once the whole network is set up and feedback from Mr Roberts has been received on

prototype the final network has been implemented and traffic has been sent from host to

destination which received successfully as shown in following figure .

11

Page 12: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

12

Page 13: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

13

Page 14: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

14

Page 15: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

Successful Packet Transmissions

15

Page 16: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

A glance of final network could be seen in Figure 12.

Figure 1 Final Operational Network

Future improvements &Maintenance Plan

A firewall could be installed to prevent any opening ports and all inbound attacks on the system to give network an optimum security as shown in figure 13.

16

Page 17: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

Figure 1 Future Network

Computer networks needs regular maintenance just like other type of machines to run smoothly. Following are few maintenance guidelines to be reviewed regularly:

System errors logs for potential problems Service pack for updates and hot fix history of installation Storage space of disk and its health reports System backup and recovery in case of disaster status Emergency repair disks updating Testing of backup media Antivirus Protection status Scan history for virus alerts Exemption and exclusions list for possible issues Planned scan of system Scheduled updates should be performed Document network devices (hubs/switches/routers) Review device configuration Review firewall configuration

Conclusion

17

Page 18: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

In this project, we have reflected a case-study of small office involving maximum of 15

computer system with a combination of wired and wireless nodes. The network diagram has

been designed and established, moreover distinct portions of the network e.g. wired users are

presented as well. Complete design of the project has been defined and provided a security

network to the office in order to prevent it from external threats.

References:

Balasubramanian, M. et al., 2005. Evidence Combination for Traffic Adaptive Routing. 18th International Conference on Systems Engineering (ICSEng’05), pp.355–362. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1562877.

Bera, P. et al., 2010. A Query based Formal Security Analysis Framework for Enterprise LAN. 2010 10th IEEE International Conference on Computer and Information Technology, (Cit), pp.407–414. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5578175 [Accessed December 10, 2012].

He, G. & Li, L., 2009. Design and Realize Communication System Based on LAN of C/S Architecture. 2009 WRI World Congress on Software Engineering, pp.78–81. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5319365 [Accessed December 10, 2012].

Jing, L., 2010. The Practice and Defense of LAN Monitor. 2010 International Forum on Information Technology and Applications, pp.80–82. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5635188 [Accessed December 10, 2012].

Kosta, Y.., Dalal, U.D. & Jha, R.K., 2010. Security Comparison of Wired and Wireless Network with Firewall and Virtual Private Network (VPN). 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, pp.281–283. Available

18

Page 19: Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx  · Web viewWord processing utility for ... is proficient to mimic the real events in a real-life

at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5460559 [Accessed December 13, 2012].

Kuo, C., Pang, A. & Chan, S., 2009. Dynamic Routing with Security Considerations. IEEE Transactions on Parallel and Distributed Systems, 20(1), pp.48–58. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4522540.

Mbarushimana, C. & Shahrabi, A., 2008. TCP Enhancement in IEEE 802.11e Wireless Networks. 2008 14th IEEE International Conference on Parallel and Distributed Systems, pp.407–414. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4724346 [Accessed December 13, 2012].

OPNET, A. and N.P. with, No Title. Available at: http://www.opnet.com.

Raptis, P. et al., 2009. Voice and Data Traffic Analysis in IEEE 802.11 DCF Infrastructure WLANs. 2009 Second International Conference on Advances in Mesh Networks, pp.37–42. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5223003 [Accessed December 13, 2012].

Riley, G.F., 2004. Simulating Realistic Packet Routing Without Routing Protocols ∗.

Riley, G.F. & Road, N., 2006. No Title. , (Riley 2003), pp.2154–2161.

Systems, C.P.T.-C., No Title. Available at: http://www.cisco.com/web/ /web/learning/netacad/course_catalog/PacketTracer.html .

Thorenoor, S.G., 2010. Dynamic Routing Protocol Implementation Decision between EIGRP, OSPF and RIP Based on Technical Background Using OPNET Modeler. 2010 Second International Conference on Computer and Network Technology, pp.191–195. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5474509 [Accessed December 13, 2012].

Uchida, N., Hashimoto, K. & Shibata, Y., 2006. QoS Control for Continuous Media over Heterogeneous Environment by Wired and Wireless Network. 7th International Conference on Mobile Data Management (MDM’06), pp.118–118. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1630654.

19