The document outlines an assignment for a network analysis and design course, focusing on the evaluation of electromycycle's network needs due to their recent growth and operational challenges. Students must research, analyze, and propose improvements for the company's network infrastructure, considering scalability, performance, and stakeholder requirements. The work emphasizes collaboration, creativity, and adherence to technical specifications and deadlines for report submission.
Assignment 1
CSNB423 NetworkAnalysis and Design
Fahmy Khawarizmy BinZainan SN097085
Muhammad Irfan Bin Hashim SN097050
Muhammad Mu'izuddinBinMuhsinon SN097083
2.
Assignment 1
CSNB423 NetworkAnalysis and Design
Instructions:
1. Work in group, maximum 4 persons. Study the scenario below and answer the
questions given.
2. You need to do some research in order to get the suitable solutions. Please provide
references at the end of your report.
3. Full report submission in hardcopy is required with maximum 10 pages, not including
the front page and the reference page.
4. Use your creativity in arranging your solution, you may have appropriate diagrams to
support your solution.
5. Use Times New Roman with font size of 12 in your report.
6. Submit your report on 19/8/2016 before 5 pm.
DesignScenario1 - “Analyzing Business Goals andConstraints”
You are a network consultant who has been asked to attend an initial meeting with the
executive management team of ElectroMyCycle. ElectroMyCycle manufactures motorcycles. Its
new electric motorcycle was just picked up by a large retail chain.
ElectroMyCycle is upgrading its manufacturing capacity and hiring new employees. recently,
ElectroMyCycle employees have started saying, “The Internet is slow.” They are also
experiencing problems sending email, accessing web-based applications, and printing.
In the past, when the company was small, it didn’t have these problems. The operations
manager outsourced computer services to a local business called Network Rogues, which
installed new workstations and servers as needed, provided desktop support, and managed the
switches, router, and firewall. ElectroMyCycle is now considering bringing computer services in-
house and is wondering how its network should evolve as it increases production of its electric
motorcycle.
3.
1. What researchwill you do before your initial meeting with the executive management
team?
Before our initial meeting with the executive management team of
ElectroMyCycle we would research their external relations such as the market that
they are in, their customers, suppliers, competitors, products produced, services
supplied, financial viability, and competitive advantages.
By identify the business requirements, it can help to modify the network
design according to their specific requirement. This will allow us to position
technologies and products to help strengthen the customer’s status in their industry.
By understanding the customer’s business goals and constraints we will be able to
propose a network design that would meet the customer needs.
2. What general problems does ElectroMyCycle seem to be experiencing? What network
design principles may have been ignored when Network Rogues designed and operated the
existing network?
The problem that ElectroMyCycle encounter:
i. Slow Internet
ii. Sending email
iii. Network printing problem
iv. Slow Surfing website
Design principles that may have been ignored by Network Rogues could include
analyzing
ElectroMyCycle’s initial requirements, scalability (the ability of a network to handle a
growing
amount of work or its ability to be enlarged toaccommodate that growth), bandwidth
(the average rate of successful data transfer through a communication path), and
latency (the measure of the time delay experienced by a system).
We don’t believe that Network Rogues were expecting the major jump in growth of
the company which was caused by the increase in the production of the electric
motorcycle and unfortunately did not design the network to handle this growth and
the complexity of ElectroMyCycle’s network.
4.
3. List fourmajor stakeholders for a new network design for ElectroMyCycle. For each
stakeholder, list some design goals, constraints, and biases.
i. End Users
Design goals – ease of use, good performance, response time
Constraints – number of stations, size of the network
Biases – may only want to use certain applications or certain e-mail programs,
equipment preferences
ii. Executives
Design goals – increased employee productivity, increased profits, less
overhead
Constraints – budget, staffing
Biases – biases toward certain technologies, acquisition
iii. Managers
Design goals – network performance, security, availability
Constraints –scheduling, politics and policies
Biases – familiarity of the system and how rapidly the system is available for
use
iv. Customers
Design goals – better customer support, offer new customer service, ease of
access
Constraints – data security, ease of use
Biases – has to be easy to access, simple, appearance of ease of use or they
won’t use it, has to look like what the customers are used to using
5.
4. List fivequestions you will pose to the executive management team. Why will you pose
those questions?
1. What is your organizational structure?
Posing this question will allow us to gain an understanding of how the
company is structured in
departments, lines of business, vendors, partners, and field or remote offices.
This will eventually
help us locate major user communities and will suggest users to account for as
well as suggest
geographical locations to account for. By Understanding their organizational
structure can also help us recognize their management hierarchy which will
allow us to determine who the decision makers are.
2. What is your overall goal of the network design project?
Asking the customer for a concise statement of their goals will allow us to
determine the problems they are trying to solve and how the new technology
will help them be more successful in their business. It will enable for us to
understand what the business is trying to achieve so that we can create a
compelling proposal for their new network.
3. What will the new network be used for?
As a network designer we need to have a good understanding of what the
network will be used for and also what network assets should be protected.
We need to know who will be using this network and also what type of
activities it will be used for. With a better understanding of our client’s
expectations and needs for the new network, thus we will be able to
concentrate on exactly what they are looking for and design the network per
their request.
4. What is the expected budget for this project?
We need to know how much customer’s budget to meet with their network
requirement. Their budget should include allocations for equipment purchases,
software licenses, maintenance and support agreements, testing, training, and
staffing. It should also include consulting fees and fees for outsourcing. In order
for this project to be successful we have to try to stay in the company’s budget
and chose the most affordable solution determined by their budget.
5. May we obtain your security policy?
We would ask the executive management team for a copy of their security
policy so that we would able to get a better understanding of how the policy
will affect the new design, how the new design would affect the policy, and
whether or not the policy is too strict to where we won’t be able to do our job.
6.
DesignScenario2
ElectroMyCycle has chosenyou to design a new network that will let the company scale to a
larger size. In Scenario 2, you learned that ElectroMyCycle’s network will support about 200
employees. The network will include a data center and a new state-of-the-art manufacturing
facility. Users in the campus network will access the servers in the data center from their PCs.
For online sales, ElectroMyCycle plans to have a DMZ that connects a web server, a DNS server,
and an email server. ElectroMyCycle also plans to open a branch sales office in a city that is
about 500 miles from ElectroMyCycle’s headquarters.
Design and document an IP addressing scheme to meet ElectroMyCycle’s needs. Specify
which IP address blocks will be assigned to different modules of your network design.
Document whether you will use public or private addressing for each module. Document
whether you will use manual or dynamic addressing for each module. Specify where (if
anywhere) route summarization will occur.
Review Questions
1. Many basic networking books state that there are three network topologies, a bus, a ring,
and a star. Based on the knowledge you gained in this course, explain why these simple
topologies may not meet the needs of modern networks.
Modern network is more focusing onto using the established technologies to solve
client business problems rather than just make a good component selection and
configuration towards the network architecture. Same goes to the network topologies
likes bus, ring and star topologies. These simple topologies may not meet the needs of
modern network that will be built in ElectroMyCycle. Their new network must support
about 200 employees. At this point, bus topology can’t be chosen due it is suitable for
low traffic networks. The high traffic networks at their environment will dropdowns
the network efficiency.
Furthermore, ElectroMyCycle will include data center in their modern network to
allow the user get data faster from the server in the data center. However, ring
topology can’t be selected because the data sent must go through all intermediate
nodes that will make the transmission speed becoming slower. Lastly, the star
topology also not seems suitable with the modern network because the network
operation depends on the functioning of the central hub.
For instance, the ElectroMyCycle plans to have a web server, a DNS server and an
email server. Even they want to have a DMZ for their servers, this topology is still not
relevant hence central hub failure, and it leads to failure of the entire network. That’s
7.
why another networktopology is looks more suited with the modern network like
hybrid topology
2. Compare and contrast full- and partial-mesh topologies. What advantages does a partial
mesh have compared to a full mesh? What advantages does a full mesh have compared to a
partial mesh?
A mesh topology does not have a pattern when it comes to relaying the data. The flow
of the information comes in randomly since all of the nodes are interconnected with
each other. One of the most used network connection in the world that uses mesh
topology is the internet. The internet users consist of millions of people all over the
world. Data transmission is done through sending signals to different paths connected
in the internet connection.
Full Mesh Topology
The Mesh diagram is related with the Reed’s Law wherein communication of
groups is proportional with the exponent of the subscribers. It can be specified
into two categories; the full mesh topology and the partial mesh topology. Full
mesh topology requires each node to be interconnected with each other. This
is used to connect devices without the need to broadcast or switch.
Partial Mesh Topology
In Partial mesh topology, nodes are allowed to connect with more than one
node present in the network through the uses of a point-to-point link. The
point-to-point link advantage is that the redundancy provided by full mesh
topology can be taken to its maximum capability without the complexity
required for the node in the network.
Advantages
A broken node won’t distract the transmission of data in a mesh network. Each
node is connected to several other nodes which make it easier to relay data. A
broken device will be ignored by the signals and will then find a new one that is
connected with the node. Additional devices in a mesh topology will not affect
its network connection. Hence it will improve the traffic in the network. Mesh
topology makes a large data center that simulates useful information to its
nodes.
A mesh topology can handle high amount of network traffic since every
additional device into the network is considered a node. Interconnected
devices can simultaneously transfer data smoothly and will not complicate the
network connection.
Disadvantages
8.
Maintaining mesh networkscan be very hard to manage. It requires
continuous supervision because of the redundancy present in the network.
Skilled network administrators will find it easy to manage this kind of topology.
Due to the fact that building this topology requires a lot of devices it will need
a lot of capital to invest in. It may be expensive but the service it provides you
will definitely give back the invested capital.
Every network topology has its own ups and downs. It will only matter on how
you structure it very well and if the nature of your business requires a bigger
network system. It is important to keep learning about what you need in your
business or place to be able to come up with an effective system where in your
investment won’t go to waste and your revenue will give you excellent output.
3. The following network numbers are defined at a branch office. Can they be summarized,
and if so, what is the network number and prefix length?
10.108.48.0
10.108.49.0
10.108.50.0
10.108.51.0
10.108.52.0
10.108.53.0
10.108.54.0
10.108.55.0
10.108.48.0 = 00001010.01101100.00110000 .00000000
10.108.49.0 = 00001010.01101100.00110001 .00000000
10.108.50.0 = 00001010.01101100.00110010 .00000000
10.108.51.0 = 00001010.01101100.00110011 .00000000
10.108.52.0 = 00001010.01101100.00110100 .00000000
10.108.53.0 = 00001010.01101100.00110101 .00000000
10.108.54.0 = 00001010.01101100.00110110 .00000000
10.108.55.0 = 00001010.01101100.00110111 .00000000
21 Bits
Network number: 10.108.48.0/21
Subnet Mask: 255.255.248.0
9.
4. What isa discontiguous subnet? Why do some enterprise networks have discontiguous
subnets? Why don’t classful routing protocols support discontiguous subnets?
A discontiguous subnet is two or more portions of a major network that are divided by
another major network. A discontiguous network in a network is that there are one or
few route in the network for which they only route to a subnet passes through
subnets of other networks.
Discontiguous subnets are a mean to travel from one subnet to another on the same
network you would need togo through of a subnet on the different network. Classful
routing protocols don’t support discontiguous subnets because they summarize routes
to only one network they are on. Discontiguous subnets can’t access other networks
5. Compare and contrast distance-vector and link-state routing. If you were designing a new
routing protocol, which would you use and why?’
Distance Vector
Distance vector involved with two factors which are the distance, metric of a
destination and the vector or direction to take to get there. The routing information
only exchange between directly connected neighbors. This means a router will know
from which neighbor a route learned but it does not know where the neighbor learned
the route. This means that the router cannot see beyond it own neighbor. This aspect
of distance vector routing sometimes referred to as routing by rumor measures like
split horizon and poison reverse are employed to avoid routing loops.
Link-state
Link-state routing will require all routers that all router know about the path
reachable by all other router in the network. Link-state protocols track the status and
connection type of each link and produce a calculated metric based on these and
other factors, including some set by the network administrator. Link-state information
is flooded throughout the link state domain to ensure all routers possess a
10.
synchronized copy ofthe area link-state database. From this database, each router
constructs it own relative shortest path tree with itself as the root for all known
routes.
11.
Comparison Link-State andDistance Vector
If all routers were running a Distance Vector protocol, the path or 'route'
chosen would be from A B directly over the ISDN serial link, even though that link is
about 10 times slower than the indirect route from A C D B.
A Link State protocolwould choose the A C D B path because it's using a faster
medium (100 Mb Ethernet). In this example, it would be better to run a Link State
routing protocol, but if all the links in the network are the same speed, then a
Distance Vector protocol is better.
Design New protocol
From this routing protocol, I will choose link state because link state is design
to operate in large and enterprise level network. Even though the routing protocol are
very complex and are much more difficult to configure, maintain, and troubleshoot
than distance vector routing protocols. However, link state routing protocol
overcomes many of shortcomings of distance vector protocols. Link state protocols
use a different algorithm than distance vector protocols for calculating the best path
to a destination. This algorithm takes into account bandwidth as well as other factors
when calculating the best path for a packet to traverse the network. Additionally, link
state convergence occurs faster than distance vectorconvergence. This is because link
state establishes a neighbour relationship with directly connected peers and shares
12.
routing information withits neighbours only when there are changes in the network
topology.
6. Analyze the routing table on your computer. In Windows you can view it with a route print
command. On a Mac, you can view it with a netstat -rn command. What entries are in your
routing table and why are they there? Is your default route in the table and, if yes, what is
it?
A routing table contains the information necessary to forward packet along the best
path forward its destination. Each packet contains information about its origin and
destination. When a packet is received, a network device examines the packet and
matches it to the routing table entry providing the best match for its destination. The
table provides the device with instruction for sending the packet to the next hop on its
route across the network
13.
Basic Routing Table
DestinationThe IP address of the packet's final destination
Next hop The IP address to which the packet is forwarded
Interface The outgoing network interface the device should use when forwarding the
packet to the next hop or final destination
Metric Assigns a cost to each available route so that the most cost-effective path
can be chosen
Routes Includes directly-attached subnets, indirect subnets that are not attached
to the device but can be accessed through one or more hops, and default
routes to use for certain types of traffic or when information is lacking.
Default Route
Routes that is used when no other routes for the destination are found in the routing
table. If a router or end system (such as a PC running Microsoft Windows or Linux),
cannot find a route for a destination, the default route is used. The default route is
used if no other host or network route matches the destination address.
The default route generally points to another router, which treats the packet the same
way. If a route matches, the packet is forwarded. Otherwise the packet is forwarded
to the default route of that router. The route evaluation process in each router uses
the longest prefix match method to obtain the most specific route. The network with
the longest subnet mask that matches the destination IP address is the next-hop
network gateway. The process repeats until a packet is delivered to the destination.
Each router traversal counts as one hop in the distance calculation for the
transmission path.