Você está na página 1de 5

Phase 2: Network Design, Configuration and Maintenance: -

Section 1: Introduction (LO1): -

In this section we analysed the abacus institute network and given an overview of the
organization and statistics of the network being analysed. The network of abacus
institute has following configuration.
 It has a server room in which one router and one main switch is present.
 Wired and wireless both types of network are used for the connection purpose.
 Each room has different switches and various software Visio and Packet
switching etc. are present.
The purpose of this report is to highlight the configuration and statistical analysis of
abacus network with the different types of network analysis tool like Wireshark. The
scope of this report is limited. It is used for some part of the abacus network. This
report is for the abacus lab network.

Section 2: Method (Simulation Network Details) (LO2): -


There are different types of method can be used for this purpose but I have used
Packet tracer for the show of the Abacus infrastructure. In this way we can configure
the network in it and we can also track the problem related to this in it. The packet
tracer is the specific tool being used and visio is not begin used the reason behind this
is that in visio we cannot send or receive the packet. There is not any shortcoming in
this simulation and it act like a real setup.

Section 3: Network Design (LO4): -


Abacus Institute Infrastructure: -
We an ISP which provides an internet connection for the computers in the campus.
After that it’s cable is connected to the router and switches and from that all the
computers in the campus are connected. Communication protocol used are TCP
(Transmission Control Protocol), HTTP (Hypertext Transfer Protocol), IP (Internet
Protocol), ADP (Address Resolution Protocol), etc.
3.1 Network Topology: -

There is different network topology like as

 BUS TOPOLOGY
 RING TOPOLOGY
 STAR TOPOLOGY
 MESH TOPOLGY, etc

All the topologies have their pros and cons. The most common topology that is used
in the organization is the star topology hence we are using this topology for the abacus
network infrastructure. In this topology all the end devices are connected individually
to switch.

Advantages: -

 If any single computer fails then it does not affect the entire network of an
organization.
 To monitor the network, it has less burden because it has centralized network
infrastructure.
 It is easy to connect the new devices to the network.

Disadvantages: -

 For every individual computer more cables are required.


 Dependency of whole networks on main switch. If it gets down whole network
will be down.
 Bandwidth is depending on the central devices like router, switches.

3.2 Network Nodes: -

The node name is configured according to the rooms as in computer lab computers
are named as lab-1, lab-2, etc and in Business class computers are named as
Business-1, Business-2, etc. Whereas in tutorial room Computers are named as
tutorial-1, tutorial-2, etc. Operating System installed on the end devices computers is
windows 10 Home on all the computers. Network communication protocol used by
node is Ethernet. The device connected to node is NIC (Network Interface Card).

3.3 Internal Network Interfaces: -

3.3.1 Labels: -

CLASS INTERFACE NAME


COMPUTER LAB LAB 1, LAB 2, etc
BUSINESS BUSINESS-1, BUSINESS-2, etc
TUTORIAL ROOM TUTORIAL-1, TUTORIAL-2, etc
STAFF STAFF-1, STAFF-2, etc
WIRELESS ROUTER Its connected to personal devices. So,
different names.

3.3.2 IP address range used in network is as following: -

CLASS NETWORK ID
COMPUTER LAB 192.168.10.0
BUSINESS 192.168.20.0
TUTORIAL ROOM 192.168.30.0
STAFF 192.168.40.0
WIRELESS ROUTER 192.168.50.0

3.3.3 DNS Server Address: -

The DNS Server address for our institute is 8.8.8.8 and second DNS Server address
is 8.8.4.4.

3.4 Ethernet links: -

Firstly, the ethernet cable from main switch goes into each room and marked as the
room name like for Computer Lab it is marked with Lab on both ends. Whereas
ethernet for Business room is marked as Business on both ends. Same way all others
are labelled. Then patch panel is used after the switch which is marked with number
and the same number are mentioned on the wall ports. So, this way nodes are
numbered and easily identified.

Section 4: Network Simulation Process (LO4): -

The network simulation process is a process in which the actual network design is
virtual made in the software for fault finding or finding limitations in network. It is very
easy in simulated network instead of walking here and there in large building which is
very difficult, and we don’t know which wire is going where in the ceiling. So, through
simulation we can easily configure the large network in very less time using network
simulation. All the configuration of real setup can be done virtually in software and get
the result that how will changes in network will increase or decrease (speed or security)
on network.

Section 5: Simulated Network Analysis (LO4): -

We can track the packets in the network and see where the packet is falling and not
going forward. By upgrading the server in simulated network and the proxy server with
good firewall we can see the performance and security increase in the network before
buying the actual equipment which is very beneficial and cost effective for the owner
and network administrative.
Section 6: Network Performance Improvements (LO4): -

There are some improvements needed to be done on the network like server client
system should be implemented in the Abacus Institute. It will increase 90% of the
security in the network. Whereas proxy should be used in the network using proxy it
will decrease the traffic on network and improve the speed and performance of
network. There should be high level firewall at the incoming internet connection so that
no unwanted attacker can enter to Abacus network.

Section 7: Conclusion: -

The setup of entire Abacus network is fine it just needs a few improvements to increase
the security and performance of network. After the setup of server and second backup
line it will be at its maximum security and performance bandwidth. So, after this there
will be no limitation left on Abacus network.

Você também pode gostar