Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx · Web...
Transcript of Introduction - Bonafideassignmentbonafideassignment.com/.../2014/11/engineering-1.docx · Web...
TABLE OF CONTENTS
Introduction...........................................................................................................................................3
Benefits of having networks..................................................................................................................3
List of Software and Hardware..............................................................................................................4
Hardware Requirement:.....................................................................................................................4
Software requirement:.......................................................................................................................5
Costing..............................................................................................................................................5
Requirements Collection:......................................................................................................................6
Development Methodology&cabling diagram.......................................................................................8
Implementation of Network...................................................................................................................9
Configuration.....................................................................................................................................9
Simulation........................................................................................................................................11
Future improvements &Maintenance Plan..........................................................................................14
Conclusion...........................................................................................................................................16
References:..........................................................................................................................................17
1
Introduction
The idea of building a networked environment within the organization is not new. A lot of
enterprise corporations offer different kinds of tools, and hardware to design the network and
to make it operational and functional. Computer Networks (CN) can purely facilitate multi-
nodal transmitting and receiving data with one another regardless of considering their
locality. Online bank transactions, internet and video or voice conversations are some
examples of CN (Jing 2010) which have become essential part of our lives. Entire globe is
revolving around CN. From small businesses to medium scale or even larger enterprises,
people are investing gigantic amount to make it more convenient and advanced. It must be
developed and programmed carefully to obtain 99.99% of communicational success (Bera et
al. 2010). Other objective of CN is its security from the internal or external intimidations.
Lack of security may harm the networks, resulted in facing huge amount of economical and
data loss.
Benefits of having networks
Efficient network is the crucial constraint in computer network, which eases administrator of
network to keep network run smoothly. (He & Li 2009) has offered affective explanation for
switched network monitoring and management in footings of LAN monitoring of modern non-
switched networks and affective approaches have been suggested. A client/server linkage
design for communication is presented by (Bera et al. 2010) which offer LAN users the
convenience and safety to interconnect with each other in actual time. A connection is
established by client on a port known; the server receives the connection request and after the
confirming the connection establishment both server and client perform as peer nodes (Uchida
et al. 2006). Currently there are restrictions in wireless/wired networks that appeal formal
policy for security configurations. An official security analysis framework for LAN has been
2
elaborated in (Kuo et al. 2009). Several advantages that can be seen by having a networked
environment will be discussed below:
File organization: Tracking down documents from piles of files in the office is a chaos. The
most useful way of its storage is in central shared space where workers could easily and
quickly obtain necessary data information (Raptis et al. 2009).
Mobility: Smart phones and notebooks have made office easily accessible but there is a need
to secure the business contacts, files or personal details as it makes us connected to the
internet all the time (Thorenoor 2010).
Association: Server-based networks could easily associate clients with the workers so that
they can communicate together across any distance and even print their documents by using
remote printer. It helps in getting a job done in less span of time (Raptis et al. 2009).
Safety and Security: Administrator of a server-based network could easily investigate and
guard the private files from person to person in order to prevent it from external threats
(Mbarushimana&Shahrabi 2008).
Performance: Well-equipped server with efficient data storage capacity and easy file access
helps to simply calculate or print the job. Innovations like Gigabit Ethernet or multicore
processors are helping globe to perform well in technology world (Kosta et al. 2010).
List of Software and Hardware
The detailed structure of the design of security network will be described later in the report.
The aim is to (a) Design and validate a computer network comprising of 15 wires and
wireless nodes;(b) Introducing obligatory security policy for network to personalise data
information for secured and smooth business.We will use Microsoft Visio diagrams and
packet tracer to elaborate our network design model. Afterward the design will be deployed
and proposed network will be simulated using packet tracer using cisco utilities.
Hardware Requirement:
Following hardware is required for business of Mr. Roberts:
10 x Main PC’s 1 x Backup Server 1 x Printer 1 x Internet connection 1 x Back up device (Network Attached Storage)
3
1 x Broadband Wireless Router 1 x 2960-24TT Network Switch 15 x 100 meter Patch Cables
Software requirement:
Following software's are required for business of Mr. Roberts Software required for a small business includes: Operating system for each PC Antivirus for each system Word processing utility for application and letters Spread sheet utility for worksheets Sales and purchase system for shop Inventory control system for stock room
Costing
Product Estimated Cost
10 x PC’s £ 700 (£70 each)1 x Printer £ 401 x Internet connection £ BT ADSL1 x Back-up server £ 901 x Broadband Wireless Router £ Free (Provided by BT)1 x 2960-24TT Network Switch £99.9915 x 100 meter Patch Cables £ 75 (£5 each)11 x Operating system for each PC £ 275 (£25 each)11 x Antivirus for each system £ 55 (£5 each)10 x Word processing utility for application and letters £ 60 (£6 each)10 x Spread sheet utility for worksheets £ 60 (£6 each)10 x Sales and purchase system for shop £ 40 (£4 each)10 x Inventory control system for stock room £ 40 (£4 each)
Total £1534.99
The implementation of a system unavoidablyneeds a computer simulation compendium that
is proficient to mimic the real events in a real-life situation. Simulation is broadly of two
kinds: i.e., computer and analytical. A general classification of simulation is elaborated in
figure 1.
Figure 1 Simulation Modelling classification (Systems n.d., OPNET n.d.)
Requirements Collection:
4
It is very significant to follow the appropriate life cycle development model to keep this
project on the right track and inside resources. Since our investigation involves a liner
method we have taken the linear model i.e. analysed the system first, then offered the design
and afterwards implemented the system and keep the maintenance afterwards. Life
development model is being showed in figure 2.
Figure 1 Life Cycle Development Model
We have briefly discussed the development plan for our project. For this reason we have
discussed proposed network with Mr Roberts via email so that he can provide with some
feedback and then we have incorporated all those recommendation in project. Initially
network plan was to divide network into two small networks as shown in figure 3. This
network contains more internetworking devices which increases the cost. But Mr. Roberts
wants cost effective network. So the network is break to a single main network.
Figure 1: Initial network design
5
Development Methodology cabling diagram
It is very significant to observe performance of the network. A lot of simulation techniques and tools are available to analyse behaviour of network. Simulation is most important way for analysis of network performance. Cisco Packet Tracer (Systems n.d.)has been used to design this project. It is one of the best simulation tools which deliver a true scenario of network in real life implementation. It provides many selections for router and switch models. It also stretches the liberty to connect multiple typesnetwork peripheral over physical links. A detailed cabling diagram is been elaborated in figure 4.
Figure 1 Block Diagram of Wired Network
Implementation of Network
The proposed network is properly configured first according to the requirements. Further, it is implemented and simulation has been development.
Configuration
TCP/IP protocol is used for communication among different node within the network. For this reason each node will be given a specific unique IP address which act as name for the device to be distinguish among other devices. Using the unique IP address of a specific node
6
other devices can communicate with it. Class C address has been used as we don’t need lot of network and number of computer is limited. 192.168.0.0 Network address scheme has been used. Host can have address from 192.168.0.1 to 192.168.0.254 as not sub netting is required.It is easier to configure the network if IP addresses have been chosen in ranges for devices according to their location, The IP address has been allocated using following ranges:
a) 100 – 125for the office room, b) 50-60 for the stock room, c) 70 -80 for the shop area d) 25 -50 for the wireless devices.
After configuration, the device and the network location is protected for that device. This allows identifying the location of the device by the administrator. The online status of a specific device can be checked by sending ping packed to a specific IP address using ping command.E.g. C:> Ping 192.168.0.101
Device Configuration Information
1 x Internet Port BT ADSL
1 x Broadband Wireless Router 192.168.0.1
1 x Back-up server 192.168.0.200
1 x Desktop Pc 192.168.1.210
6 x Desktop Pc’s
192.168.0.100192.168.0.101192.168.0.102192.168.0.103192.168.0.104192.168.0.105
1 x Printer 192.168.0.125
2 x Stock room Pc’s192.168.0.50192.168.0.51
2 x Shop Pc’s192.168.0.75192.168.0.76
1 x Laptop 192.168.0.27
Following is the feedback from Mr Robert which has been incorporated in the report
afterwards:
Please use DHCP to assign IP Address to the PCs in the Shop, Office, and Stock room.Please use wireless encryption.
Please show the internet working on your network simulation.
7
How is the firewall configured? Perhaps you could remove that from your design and suggest it as a possible future improvement in requirement “h” in your assignment.
DHCP option has been enabled on our Backup Server as per the feedback. We have given a pool Class C address to DHCP serveras shown in figure 5.
Figure 1 DHCP Sever pool
The server will allocate address randomly to all the system in office, shop and stock room rather than statically as shown in figure 6 and this DHCP address assignment is successfully incorporated after getting feedback from Mr. Roberts.
8
Figure 1 DHCP enabled on clients
Simulation
Cisco packet tracer has been used as model software in this project .Packet tracer also permits
to organize all the devices. Figure 7 shows how to arrange an end device. Various
possibilities can be utilised to construct a network device according to the project.
Figure 7 Configuration dialogue of an End Device
An initial design was conscripted by using packet tracer. Figure 8 describes the topology of
one of the department where network was sketched. Figure shows that each 11 stable nodes
were linked to an Ethernet switch in the department.
Figure 8 Wired users
9
With advancements in technology the use of wireless networking gave many benefits to
wired networks. The aim has been to provide wireless access to the laptops. Wireless access
point was organized in the network providing wireless access to operators. Figure 9 shows its
design feature.
Figure 9 Wireless user
Wireless is being protected by WPA2 Personal type of security having a pass key as ‘P@a$$word’ as shown in figure 10.
10
Figure 1 Wireless Security
Once the whole network is set up and feedback from Mr Roberts has been received on
prototype the final network has been implemented and traffic has been sent from host to
destination which received successfully as shown in following figure .
11
12
13
14
Successful Packet Transmissions
15
A glance of final network could be seen in Figure 12.
Figure 1 Final Operational Network
Future improvements &Maintenance Plan
A firewall could be installed to prevent any opening ports and all inbound attacks on the system to give network an optimum security as shown in figure 13.
16
Figure 1 Future Network
Computer networks needs regular maintenance just like other type of machines to run smoothly. Following are few maintenance guidelines to be reviewed regularly:
System errors logs for potential problems Service pack for updates and hot fix history of installation Storage space of disk and its health reports System backup and recovery in case of disaster status Emergency repair disks updating Testing of backup media Antivirus Protection status Scan history for virus alerts Exemption and exclusions list for possible issues Planned scan of system Scheduled updates should be performed Document network devices (hubs/switches/routers) Review device configuration Review firewall configuration
Conclusion
17
In this project, we have reflected a case-study of small office involving maximum of 15
computer system with a combination of wired and wireless nodes. The network diagram has
been designed and established, moreover distinct portions of the network e.g. wired users are
presented as well. Complete design of the project has been defined and provided a security
network to the office in order to prevent it from external threats.
References:
Balasubramanian, M. et al., 2005. Evidence Combination for Traffic Adaptive Routing. 18th International Conference on Systems Engineering (ICSEng’05), pp.355–362. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1562877.
Bera, P. et al., 2010. A Query based Formal Security Analysis Framework for Enterprise LAN. 2010 10th IEEE International Conference on Computer and Information Technology, (Cit), pp.407–414. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5578175 [Accessed December 10, 2012].
He, G. & Li, L., 2009. Design and Realize Communication System Based on LAN of C/S Architecture. 2009 WRI World Congress on Software Engineering, pp.78–81. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5319365 [Accessed December 10, 2012].
Jing, L., 2010. The Practice and Defense of LAN Monitor. 2010 International Forum on Information Technology and Applications, pp.80–82. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5635188 [Accessed December 10, 2012].
Kosta, Y.., Dalal, U.D. & Jha, R.K., 2010. Security Comparison of Wired and Wireless Network with Firewall and Virtual Private Network (VPN). 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, pp.281–283. Available
18
at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5460559 [Accessed December 13, 2012].
Kuo, C., Pang, A. & Chan, S., 2009. Dynamic Routing with Security Considerations. IEEE Transactions on Parallel and Distributed Systems, 20(1), pp.48–58. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4522540.
Mbarushimana, C. & Shahrabi, A., 2008. TCP Enhancement in IEEE 802.11e Wireless Networks. 2008 14th IEEE International Conference on Parallel and Distributed Systems, pp.407–414. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4724346 [Accessed December 13, 2012].
OPNET, A. and N.P. with, No Title. Available at: http://www.opnet.com.
Raptis, P. et al., 2009. Voice and Data Traffic Analysis in IEEE 802.11 DCF Infrastructure WLANs. 2009 Second International Conference on Advances in Mesh Networks, pp.37–42. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5223003 [Accessed December 13, 2012].
Riley, G.F., 2004. Simulating Realistic Packet Routing Without Routing Protocols ∗.
Riley, G.F. & Road, N., 2006. No Title. , (Riley 2003), pp.2154–2161.
Systems, C.P.T.-C., No Title. Available at: http://www.cisco.com/web/ /web/learning/netacad/course_catalog/PacketTracer.html .
Thorenoor, S.G., 2010. Dynamic Routing Protocol Implementation Decision between EIGRP, OSPF and RIP Based on Technical Background Using OPNET Modeler. 2010 Second International Conference on Computer and Network Technology, pp.191–195. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5474509 [Accessed December 13, 2012].
Uchida, N., Hashimoto, K. & Shibata, Y., 2006. QoS Control for Continuous Media over Heterogeneous Environment by Wired and Wireless Network. 7th International Conference on Mobile Data Management (MDM’06), pp.118–118. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1630654.
19