Advance Network Design for PBL Industry
Table of Contents
2.1. Network Design Diagram.. 3
2.3. Routing Protocol Justification. 5
3.1. Packet Tracer Network diagram.. 5
3.2. IP CONFIGURATION IN ROUTER: 6
3.3. RIP ROUTING CONFIGURATION: 16
3.4. VLAN CONFIGURATION IN SWITCH: 21
3.5. HOST SPECIFIC IP ADDRESS. 23
3.7. ACCESS LIST CONFIGURATION: 32
3.8. PING RESULT AFTER CONFIGURING ACCESS LIST: 33
4.1. Hardware and Software Requirements. 34
4.2. Human Resources and Logistics. 34
4.4. Tentative Timeline Specifications. 35
1. Project Scope and Requirements
1.1. Project Scope:
The purpose of this project is to design the network of the visited industry. The visit was arranged at RMIT (Royal Melbourne Institute of Technology) public research university situated in Melbourne, Victoria. The university requires an effective network design to connect their computers, laptops and mobile with internet connectivity, Not only in single department however overall university campus. In the current scenario, the network is inferior and lack various functionalities. To name a few; colleges go through issues like an invasion of a computer virus, DDoS attack, spyware, phishing, junk emails, and abuse of internet platforms [1]. Therefore, the scope of the project is developing a network design for RMIT University Campus. Additionally, this network can offer solution over security and privacy concern.
1.2. Project Requirements
The brief session held with RMIT university network engineer at their campus lab. After the current network assessment, some of the new network project requirements are presented.
- Network design requires for campus only through VLAN, and the concept of IPs configuration [2].
- Flexible and reduce complexity in context to cabling, control plane, and manageability [2].
- Use of appropriate protocols, addressing scheme, and budget estimation for hardware/software resources is mandatory.
- Network design with a minimum of 5 routers, 15 personal computers, 4 VLAN, and 7 switches should be available.
- Use of appropriate network simulation software such as CISCO packet tracer is mandatory.
2. Network Design and Justification
2.1. Network Design Diagram
In this setup of the Network, there are 15 PCs, 7 switches, 4 VLAN, and 5 2911 routers.
2.2. IP Addressing Scheme
An IP address is a crucial part of the network design of the RMIT University campus. Internet Protocol is a mechanism which provides communication on the internet-connected on a network [3]. Concerning the current network IP addressing scheme is identified in the table. The components of the IP addressing scheme are as follows.
- Device: 20 personal computers attached to the network.
- IP address: IP address uniquely identify information from one computer to another [3].
- Interface ID: The interface identity is unique and determines an interface on network link [4].
- Subnet Mask: The subnet mask separates a large number of hosts into a small portion of a larger network [5].
- Class: The IP addresses divides as per bit position of a network ID and host ID in categories A, B, C, D, and E [5].
Device | IP address | Interface ID | Subnet Mask | Class |
PC-0 | 2.168.0.2 | FastEthernet0 | 255.0.0.0 | A |
PC-1 | 2.168.0.3 | FastEthernet0 | 255.0.0.0 | A |
PC-2 | 1.172.0.2 | FastEthernet0 | 255.0.0.0 | A |
PC-3 | 1.172.0.3 | FastEthernet0 | 255.0.0.0 | A |
PC-4 | 128.168.0.2 | FastEthernet0 | 255.255.0.0 | B |
PC-5 | 128.168.0.3 | FastEthernet0 | 255.255.0.0 | B |
PC-6 | 132.168.0.1 | FastEthernet0 | 255.255.0.0 | B |
PC-7 | 132.168.0.1 | FastEthernet0 | 255.255.0.0 | B |
PC-8 | 132.168.0.1 | FastEthernet0 | 255.255.0.0 | B |
PC-9 | 192.168.0.2 | FastEthernet0 | 255.255.255.0 | C |
PC-10 | 192.168.0.3 | FastEthernet0 | 255.255.255.0 | C |
PC-11 | 192.168.0.4 | FastEthernet0 | 255.255.255.0 | C |
PC-12 | 200.168.0.2 | FastEthernet0 | 255.255.255.0 | C |
PC-13 | 200.168.0.3 | FastEthernet0 | 255.255.255.0 | C |
PC-14 | 120.168.1.2 | FastEthernet0 | 255.0.0.0 | A |
Router-0 | 1.172.0.1 | (Gig0/1) | 255.0.0.0 | A |
Router-0 | 2.168.0.1 | (Gig0/0) | 255.0.0.0 | A |
Router-0 | 3.168.0.1 | (Gig0/2) | 255.0.0.0 | A |
Router-1 | 3.168.0.2 | (Gig0/2) | 255.0.0.0 | A |
Router-1 | 3.168.0.2 | (Gig0/0) | 255.0.0.0 | A |
Router-1 | 111.0.0.1 | (Gig0/1) | 255.0.0.0 | A |
Router-2 | 192.168.0.1 | (Gig0/2) | 255.255.0.0 | B |
Router-2 | 10.0.0.1 | (Gig0/1) | 255.0.0.0 | A |
Router-2 | 128.0.0.1 | (Gig0/0) | 255.255.0.0 | B |
Router-3 | 128.168.0.1 | (Gig0/0) | 255.255.0.0 | B |
Router-3 | 132.168.0.1 | (Gig0/1) | 255.255.0.0 | B |
Router-3 | 128.0.0.2 | (Gig0/2) | 255.255.0.0 | B |
Router-4 | 200.168.0.1 | (Gig0/0) | 255.255.0.0 | B |
Router-4 | 111.0.0.2 | (Gig0/1) | 255.0.0.0 | A |
Router-4 | 120.168.1.1 | (Gig0/2) | 255.0.0.0 | A |
2.3. Routing Protocol Justification
In this case, a dynamic routing protocol is implemented to exchange routing information for unknown traffic. The data is automatically gets collected in routing tables. We propose the use of RIP routing protocol for router connection in section 3.3 RIP configuration. RIP protocol is known as distance vector routing that works on hop count to achieve remote network [6]. We are using RIP protocol because it is dynamic and works well in a small university campus. During Access Control List will provide network engineer traffic control over RMIT university campus network effectively [6].
3. Network Topology Diagram and Implementation
3.1. Packet Tracer Network diagram
3.2. IP CONFIGURATION IN ROUTER:
Router 0:
Router 1:
Router 2:
Router 3:
Router 4:
3.3. RIP ROUTING CONFIGURATION:
Router 0: (RIP)
Router 1: (RIP)
Router 2 (RIP):
Router 3 (RIP):
Router 4 (RIP):
3.4. VLAN CONFIGURATION IN SWITCH:
Switch 0:
–
Switch 1:
3.5. HOST SPECIFIC IP ADDRESS
3.6. PING RESULT:
3.7. ACCESS LIST CONFIGURATION:
3.8. PING RESULT AFTER CONFIGURING ACCESS LIST:
4. Timeline and Budget Estimation
The time and budget estimation are determined for hardware, software and network requirements. The hardware is required to connect on the network designed for university. As per request, we invested on 15 computers, five routers, seven switches, data cables, and servers. For CISCO packet tracer software, we had licensed copy. Additionally, human resources were implemented from university and network consultant. We estimate a total budget of $25850 out of which hardware and software components are $23,200, and human resources are $2650. Further, the tentative project timeline is calculated as 25 days since the first meeting to the final delivery.
4.1. Hardware and Software Requirements
Networking Equipment | Manufacturing Company | Per Unit Cost | Unit Number | Total Cost Per Unit Cost * Unit No. |
Router | 2911 – CISCO | $700 | 5 | $3500 |
Switch | PT – CISCO | $500 | 7 | $3500 |
Server | Power Server | $500 | 1 | $500 |
Data Cable | Optical fibre | $100 | 10 | $700 |
Computer | Commercial Desktop Dell | $1000 | 15 | $15,000 |
CISCO packet tracer software | CISCO | Free | 1 | – |
4.2. Human Resources and Logistics
Human Resources | Per day income | Working Days | Cost | Total Budget |
Authority Head for Project | $100 | 5 | $500 | $500 |
Outsourced network consultant | $100 | 5 | $500 | $500 |
University Admin | $100 | 5 | $500 | $500 |
Network Engineer Professional | $ 150 | 5 | $750 | $750 |
Network Configuration Test Expert | $100 | 3 | $300 | $300 |
Additional university staff | $50 | 2 | $100 | $100 |
4.3. Total Estimation
Budget Specification | Total |
Hardware, software and network requirements | $23200 |
Human Resources and Logistics | $2650 |
Estimated Budget | $25850 |
4.4. Tentative Timeline Specifications.
Task Name | Duration (Days) |
1. Meeting with the network engineer professional | 1 |
2. Gather information on the current network. | 3 |
3. Propose a new network design for the university. | 6 |
4. Budget estimation for resources. | 1 |
5. Use hardware and software resources | 3 |
6. Design Network on simulation software. | 3 |
7. Implement network at the university campus. | 5 |
8. Prepare complete report will include lab manuals. | 1 |
9. Project closure. | 1 |
10. Clear due payments. | 1 |
11. Maintain the system every three months. | After every 90 days 1-day visit a university campus. |
5. Summary
In brief, RMIT university needed a network which could protect them from threats and cyber-crime. Therefore, project demand was to make a network design that is safe and secure for university staff. We identified project requirements in the first meeting and discussed basic needs with university professional network engineer. He discussed current issues and explored the concept of a network that will provide privacy and security over the internet. The IP addressing scheme is also identified for a large number of hosts in a systematic tabular form. Dynamic routing protocol was established to provide traffic route checking. The configurations are projected with proper snapshots in the report. The total estimated budget for hardware, software and networking components, as well as human resource and logistics, is proposed as $25850. Therefore, network design for university is sent for approval to achieve better employee workspace.
References
[1] M. Huang, W. Luo and X. Wan, “Research on Network Security of Campus Network”, Journal of Physics: Conference Series, vol. 1187, no. 4, p. 042113, 2019. Available: 10.1088/1742-6596/1187/4/042113 [Accessed 21 December 2019].
[2] Network Design Requirements: Analysis and Design Principles, 1st ed. CISCO, 2019, pp. 1-27.
[3] I. Definitions and C. Hope, “What is IP?” Computerhope.com. [Online]. Available: https://www.computerhope.com/jargon/i/ip.htm. [Accessed: 21- Dec- 2019].
[4] J. Vasseur and A. Dunkels, Interconnecting smart objects with IP. Burlington, MA: Morgan Kaufmann Publishers/Elsevier, 2012.
[5] N. Mir, Computer and communication networks, 2nd ed. Prentice-Hall, Pearson Education, 2017, pp. 1-912.
[6] M. Valentine and K. Barker, CCNA Routing and Switching Complete Study Guide. [Place of publication not identified]: Pearson Education, 2013.