SlideShare a Scribd company logo
1 of 26
WOLKITE UNIVERSITY CLUSTER CAMPUS
LOCALAREA NETWORK
.
Introduction
Wolkite University is one of the 3rd generation University in Ethiopia.
 WKU Cluster Campus is the name of the one branch that is situated in Wolkite Town.
Due to a number of ongoing issues The WKU cluster campus is interested in switching to a new,
full-featured LAN network design to replace the current one.
For the WKU Cluster Campus, we will generally construct a secure, scalable, high performance,
fault tolerance and reliable network design.
4/25/2023 2
WKU CLUSTER CAMPUS LAN
Statement of Probem
Weak security mechanism.
It lacks a data center of its own.
The network has no redundancy.
No a smart room, video conference , a CCTV camera, and no WiFi accessibility.
Casecade network topology is present.
There is no backup for the main campus.
4/25/2023 3
WKU CLUSTER CAMPUS LAN
General Objective of the project
The general Objective of this project is to design and implement secure, scalable, high
performance, fault tolerance and reliable LAN network design for WKU cluster campus.
Specific Objectives
 Implement redundancy to ensure reliability.
 Ensure network security.
 Enable Local services to make them locally available.
 Providing CCTV camera, video conference and others.
4/25/2023 4
WKU CLUSTER CAMPUS LAN
Scope of the Project
To Enhancing security mechanism and using appropriate security policy.
Ensure reliability by implementing redundancy.
To Optimize Wired LAN and wireless LAN access.
To Design network topology that meets current business and technical requirements
Limitation of the project
Future constructions are not taken into account
Only considers the WKU cluster campus LAN.
4/25/2023 5
WKU CLUSTER CAMPUS LAN
Developmental Methodology
 The methods We use when dealing with network design or network layout is prepare, plan,
design, implement, operate and optimize (PPDIOO) is an overall deployment method.
 We gathered data using a variety of techniques like observation, interview, document analaysis
and questionnaire.
To create our projects, we use hardware and software standards.
4/25/2023 6
WKU CLUSTER CAMPUS LAN
Introduction of Existing System
The 60 Mb fiber connection to the Wolkite university cluster campus is now provided by
Ethiopia Telecom.
The network as a whole has Two class B IP addresses.
One router is directly connected to the distribution switch, which is linked to the access switch
and the VPN that linked the cluster campus to the main campus.
In contrast to how the distribution switch is set up with DHCP, VLAN, and routing
capabilities, the router is configured using NAT and ACL.
4/25/2023 7
WKU CLUSTER CAMPUS LAN
Cont...
There are Seven VLANs that have been created on the distribution switch.
Both the router and the distribution switch have dynamic routing set up(EGRP).
They uses a fiber optic connection to connect the distribution switch and access switch.
There are 12 access switches with port number 48.
WKU cluster campus is connected to the main campus via a VPN, which enables the cluster
campus to access the services from the main campus
4/25/2023 8
WKU CLUSTER CAMPUS LAN
cont...
However, for this connection to function, an internet connection between the two campuses is
necessary.
These services can be accessed locally at the main campus even without an internet connection,
however this is not possible in the cluster campus.
As a remedy, a direct fiber cable connection between the main campus and the cluster campus
was envisioned, but this was not allowed by Ethiopian telecom regulations.
4/25/2023 9
WKU CLUSTER CAMPUS LAN
Existing Network Design of WKU Cluster Campus
4/25/2023 10
WKU CLUSTER CAMPUS LAN
Cont...
The WKU Cluster Campus presently has a two-tier architecture.
This type of architecture has some advantages, such as simplicity and ease of
management, there are also some disadvantages :
- Performance - Security
- Limited fault tolerance - Scalability
4/25/2023 11
WKU CLUSTER CAMPUS LAN
Cont...
A two-tier architecture is a network design in which client devices communicate directly with
a server.
There is no redundancy in this network, and the distribution switch manages most network
operations.
 If there is a problem and there is an internet outage, there won't be any backup systems, so it
will be a total outage.
4/25/2023 WKU CLUSTER CAMPUS LAN 12
The proposed network
The network flow is planned to begin with the firewall, move via the router, core layer,
distribution layer, and goes with the access layer.
The proposed network will enhance the existing network's performance, scalability, availability,
and manageability, and redundancy issues.
We adopt a three-tier network architecture in our proposed network design.
In order to address the problems with the two-tier architecture, such as scalability, flexibility,
security, performance, and ease of maintenance, we employ a three-tier network architecture.
4/25/2023 WKU CLUSTER CAMPUS LAN 13
Functional requirements
 Connectivity: enables communication and data exchange between networked devices, which
is essential for the network to perform its intended function.
 Sizing the network: Our suggested network will evaluate the organization's present and
future needs in order to determine the proper network capacity..
Following a standard approach: Governing organizations and industry experts have created
standards, procedures, and best practices that our planned network will abide by.
4/25/2023 WKU CLUSTER CAMPUS LAN 14
Non-Functional Requirements
 Availability: Our new network architecture is accessible through and provides redundant, 24
hour, consistent, and dependable performance.
 Performance: The network shall be capable of providing a minimum end-to-end throughput of
60Mb/s between end devices.
 Scalability: Our suggested network infrastructure is expandable to accommodate new user.
4/25/2023 WKU CLUSTER CAMPUS LAN 15
Cont...
 Reliability: The network should pertain to all the situations so that it can be sustain in any
error conditions.
 Manageability: The suggested network makes it possible to control, watch over, and maintain
the network.
 Security: Our suggested network can be secured by employing a firewall as the primary
security measure.
4/25/2023 WKU CLUSTER CAMPUS LAN 16
Architectural Design For Building
4/25/2023 WKU CLUSTER CAMPUS LAN 17
Network Design
The network topology we used are the three-tier network architecture.
The three layers are the access layer, distribution layer, and core layer.
The reason we used these hierarchical model is due to its scalability, redundancy, performance,
security, manageability, maintainability, etc
The Core layer and Distribution Layer’s are placed in the data center and the Access layer is
within the building to provide services to the end-user in the campus.
4/25/2023 WKU CLUSTER CAMPUS LAN 18
Logical Network Design
4/25/2023 WKU CLUSTER CAMPUS LAN 19
Data Center
The Data center contains internal WKU cluster campus servers.
These servers include file, DHCP, proxy server,Mail server and database and other servers
that are necessary for the network solutions.
The Data Center should have to be secured since it has so many important instruments are
there.
 These security may be in two forms either physical and logical security.
4/25/2023 WKU CLUSTER CAMPUS LAN 20
IP and VLAN plan
 We use class B ip addresses for the network we have proposed.
 Subnetting was implemented to decrease ip waste.
 We use the host number to assign the IP address.
 The network will have a total of 14 vlans, each with its own distinct ip address.
4/25/2023 WKU CLUSTER CAMPUS LAN 21
Protocols
EIGRP: we use a Cisco proprietary routing protocol that combines the features of both
distance-vector and link-state routing protocols.
STP : It ensures network stability and reliability by preventing loops and providing
redundancy.
Without STP, loops can occur in the network topology, which can cause broadcast storms,
network congestion, and even network downtime.
4/25/2023 WKU CLUSTER CAMPUS LAN 22
Cont...
HSRP: In our proposed network design, HSRP is commonly used to improve network
availability and prevent service disruptions in the event of a router failure.
Redundant network designs let us meet requirements for network availability by duplicating
network links and inter connectivity devices.
VTP: is a protocol used in Cisco network devices for managing VLANs.
This allows network administrators to configure VLANs on a single switch and have those
VLAN configurations propagated to other switches in the network.
4/25/2023 WKU CLUSTER CAMPUS LAN 23
Wireless Design
4/25/2023 WKU CLUSTER CAMPUS LAN 24
Network Management Strategy and Software
 We will use Zabbix Network monitoring tools to monitor the performance and health of
the network and use Cisco Prime Infrastructure for Network configuration management.
 We use Cisco Identity Services Engine (ISE) for network secuirty management and Nagios
XI for network performance management.
The purpose of our network security policy is to protect the WKU cluster campus network
from unauthorized access, malicious activity, and other security threats.
4/25/2023 WKU CLUSTER CAMPUS LAN 25
.
4/25/2023 WKU CLUSTER CAMPUS LAN 26

More Related Content

Similar to Networking and data communication on the LAN and WAN networks.ppt

CCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtCCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtEzxprt
 
SRWE_Module_12.pptx
SRWE_Module_12.pptxSRWE_Module_12.pptx
SRWE_Module_12.pptxNguyenNM
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxParthaDas754073
 
WIMAN , wireless communication technology
WIMAN , wireless communication technology WIMAN , wireless communication technology
WIMAN , wireless communication technology JadduKota
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:Cisco Canada
 
Chapter1 introductiontoscalingnetworks
Chapter1 introductiontoscalingnetworksChapter1 introductiontoscalingnetworks
Chapter1 introductiontoscalingnetworksjosepholaguer
 
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Prince Mishra
 
Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Motty Ben Atia
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperMarc Curtis
 
Backhauling Small Cells
Backhauling Small CellsBackhauling Small Cells
Backhauling Small CellsADVA
 
Taking MicroMux to the edge and the core
Taking MicroMux to the edge and the coreTaking MicroMux to the edge and the core
Taking MicroMux to the edge and the coreADVA
 
Extricom white paper_enterprise wlan & the broadband myth
Extricom white paper_enterprise wlan & the broadband mythExtricom white paper_enterprise wlan & the broadband myth
Extricom white paper_enterprise wlan & the broadband mythExtricom
 

Similar to Networking and data communication on the LAN and WAN networks.ppt (20)

CCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtCCNA(R&S) By Ezxprt
CCNA(R&S) By Ezxprt
 
Ccna (200 125)
Ccna (200 125)Ccna (200 125)
Ccna (200 125)
 
Wireless Backhaul
Wireless BackhaulWireless Backhaul
Wireless Backhaul
 
WiMax Technology
WiMax TechnologyWiMax Technology
WiMax Technology
 
SRWE_Module_12.pptx
SRWE_Module_12.pptxSRWE_Module_12.pptx
SRWE_Module_12.pptx
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptx
 
main_phase1 _3.pptx
main_phase1 _3.pptxmain_phase1 _3.pptx
main_phase1 _3.pptx
 
WIMAN , wireless communication technology
WIMAN , wireless communication technology WIMAN , wireless communication technology
WIMAN , wireless communication technology
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
 
Chapter1 introductiontoscalingnetworks
Chapter1 introductiontoscalingnetworksChapter1 introductiontoscalingnetworks
Chapter1 introductiontoscalingnetworks
 
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
 
Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging
 
Bhanuprakash123
Bhanuprakash123Bhanuprakash123
Bhanuprakash123
 
CCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptxCCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptx
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_Paper
 
Backhauling Small Cells
Backhauling Small CellsBackhauling Small Cells
Backhauling Small Cells
 
Taking MicroMux to the edge and the core
Taking MicroMux to the edge and the coreTaking MicroMux to the edge and the core
Taking MicroMux to the edge and the core
 
Evolution of internet by Ali Kashif
Evolution of internet  by Ali KashifEvolution of internet  by Ali Kashif
Evolution of internet by Ali Kashif
 
Extricom white paper_enterprise wlan & the broadband myth
Extricom white paper_enterprise wlan & the broadband mythExtricom white paper_enterprise wlan & the broadband myth
Extricom white paper_enterprise wlan & the broadband myth
 

Recently uploaded

Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...mikehavy0
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样wsppdmt
 
DBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTS
DBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTSDBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTS
DBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTSSnehalVinod
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshareraiaryan448
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证zifhagzkk
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabiaahmedjiabur940
 
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Klinik Aborsi
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteedamy56318795
 
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证acoha1
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Klinik kandungan
 
如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样
如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样
如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样wsppdmt
 
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...Voces Mineras
 
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...ThinkInnovation
 
Huawei Ransomware Protection Storage Solution Technical Overview Presentation...
Huawei Ransomware Protection Storage Solution Technical Overview Presentation...Huawei Ransomware Protection Storage Solution Technical Overview Presentation...
Huawei Ransomware Protection Storage Solution Technical Overview Presentation...LuisMiguelPaz5
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...Elaine Werffeli
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives23050636
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证pwgnohujw
 

Recently uploaded (20)

Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
 
DBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTS
DBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTSDBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTS
DBMS UNIT 5 46 CONTAINS NOTES FOR THE STUDENTS
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshare
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
 
Abortion pills in Jeddah |+966572737505 | get cytotec
Abortion pills in Jeddah |+966572737505 | get cytotecAbortion pills in Jeddah |+966572737505 | get cytotec
Abortion pills in Jeddah |+966572737505 | get cytotec
 
Abortion pills in Riyadh Saudi Arabia| +966572737505 | Get Cytotec, Unwanted Kit
Abortion pills in Riyadh Saudi Arabia| +966572737505 | Get Cytotec, Unwanted KitAbortion pills in Riyadh Saudi Arabia| +966572737505 | Get Cytotec, Unwanted Kit
Abortion pills in Riyadh Saudi Arabia| +966572737505 | Get Cytotec, Unwanted Kit
 
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样
如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样
如何办理澳洲拉筹伯大学毕业证(LaTrobe毕业证书)成绩单原件一模一样
 
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...
Las implicancias del memorándum de entendimiento entre Codelco y SQM según la...
 
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
 
Huawei Ransomware Protection Storage Solution Technical Overview Presentation...
Huawei Ransomware Protection Storage Solution Technical Overview Presentation...Huawei Ransomware Protection Storage Solution Technical Overview Presentation...
Huawei Ransomware Protection Storage Solution Technical Overview Presentation...
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
 

Networking and data communication on the LAN and WAN networks.ppt

  • 1. WOLKITE UNIVERSITY CLUSTER CAMPUS LOCALAREA NETWORK .
  • 2. Introduction Wolkite University is one of the 3rd generation University in Ethiopia.  WKU Cluster Campus is the name of the one branch that is situated in Wolkite Town. Due to a number of ongoing issues The WKU cluster campus is interested in switching to a new, full-featured LAN network design to replace the current one. For the WKU Cluster Campus, we will generally construct a secure, scalable, high performance, fault tolerance and reliable network design. 4/25/2023 2 WKU CLUSTER CAMPUS LAN
  • 3. Statement of Probem Weak security mechanism. It lacks a data center of its own. The network has no redundancy. No a smart room, video conference , a CCTV camera, and no WiFi accessibility. Casecade network topology is present. There is no backup for the main campus. 4/25/2023 3 WKU CLUSTER CAMPUS LAN
  • 4. General Objective of the project The general Objective of this project is to design and implement secure, scalable, high performance, fault tolerance and reliable LAN network design for WKU cluster campus. Specific Objectives  Implement redundancy to ensure reliability.  Ensure network security.  Enable Local services to make them locally available.  Providing CCTV camera, video conference and others. 4/25/2023 4 WKU CLUSTER CAMPUS LAN
  • 5. Scope of the Project To Enhancing security mechanism and using appropriate security policy. Ensure reliability by implementing redundancy. To Optimize Wired LAN and wireless LAN access. To Design network topology that meets current business and technical requirements Limitation of the project Future constructions are not taken into account Only considers the WKU cluster campus LAN. 4/25/2023 5 WKU CLUSTER CAMPUS LAN
  • 6. Developmental Methodology  The methods We use when dealing with network design or network layout is prepare, plan, design, implement, operate and optimize (PPDIOO) is an overall deployment method.  We gathered data using a variety of techniques like observation, interview, document analaysis and questionnaire. To create our projects, we use hardware and software standards. 4/25/2023 6 WKU CLUSTER CAMPUS LAN
  • 7. Introduction of Existing System The 60 Mb fiber connection to the Wolkite university cluster campus is now provided by Ethiopia Telecom. The network as a whole has Two class B IP addresses. One router is directly connected to the distribution switch, which is linked to the access switch and the VPN that linked the cluster campus to the main campus. In contrast to how the distribution switch is set up with DHCP, VLAN, and routing capabilities, the router is configured using NAT and ACL. 4/25/2023 7 WKU CLUSTER CAMPUS LAN
  • 8. Cont... There are Seven VLANs that have been created on the distribution switch. Both the router and the distribution switch have dynamic routing set up(EGRP). They uses a fiber optic connection to connect the distribution switch and access switch. There are 12 access switches with port number 48. WKU cluster campus is connected to the main campus via a VPN, which enables the cluster campus to access the services from the main campus 4/25/2023 8 WKU CLUSTER CAMPUS LAN
  • 9. cont... However, for this connection to function, an internet connection between the two campuses is necessary. These services can be accessed locally at the main campus even without an internet connection, however this is not possible in the cluster campus. As a remedy, a direct fiber cable connection between the main campus and the cluster campus was envisioned, but this was not allowed by Ethiopian telecom regulations. 4/25/2023 9 WKU CLUSTER CAMPUS LAN
  • 10. Existing Network Design of WKU Cluster Campus 4/25/2023 10 WKU CLUSTER CAMPUS LAN
  • 11. Cont... The WKU Cluster Campus presently has a two-tier architecture. This type of architecture has some advantages, such as simplicity and ease of management, there are also some disadvantages : - Performance - Security - Limited fault tolerance - Scalability 4/25/2023 11 WKU CLUSTER CAMPUS LAN
  • 12. Cont... A two-tier architecture is a network design in which client devices communicate directly with a server. There is no redundancy in this network, and the distribution switch manages most network operations.  If there is a problem and there is an internet outage, there won't be any backup systems, so it will be a total outage. 4/25/2023 WKU CLUSTER CAMPUS LAN 12
  • 13. The proposed network The network flow is planned to begin with the firewall, move via the router, core layer, distribution layer, and goes with the access layer. The proposed network will enhance the existing network's performance, scalability, availability, and manageability, and redundancy issues. We adopt a three-tier network architecture in our proposed network design. In order to address the problems with the two-tier architecture, such as scalability, flexibility, security, performance, and ease of maintenance, we employ a three-tier network architecture. 4/25/2023 WKU CLUSTER CAMPUS LAN 13
  • 14. Functional requirements  Connectivity: enables communication and data exchange between networked devices, which is essential for the network to perform its intended function.  Sizing the network: Our suggested network will evaluate the organization's present and future needs in order to determine the proper network capacity.. Following a standard approach: Governing organizations and industry experts have created standards, procedures, and best practices that our planned network will abide by. 4/25/2023 WKU CLUSTER CAMPUS LAN 14
  • 15. Non-Functional Requirements  Availability: Our new network architecture is accessible through and provides redundant, 24 hour, consistent, and dependable performance.  Performance: The network shall be capable of providing a minimum end-to-end throughput of 60Mb/s between end devices.  Scalability: Our suggested network infrastructure is expandable to accommodate new user. 4/25/2023 WKU CLUSTER CAMPUS LAN 15
  • 16. Cont...  Reliability: The network should pertain to all the situations so that it can be sustain in any error conditions.  Manageability: The suggested network makes it possible to control, watch over, and maintain the network.  Security: Our suggested network can be secured by employing a firewall as the primary security measure. 4/25/2023 WKU CLUSTER CAMPUS LAN 16
  • 17. Architectural Design For Building 4/25/2023 WKU CLUSTER CAMPUS LAN 17
  • 18. Network Design The network topology we used are the three-tier network architecture. The three layers are the access layer, distribution layer, and core layer. The reason we used these hierarchical model is due to its scalability, redundancy, performance, security, manageability, maintainability, etc The Core layer and Distribution Layer’s are placed in the data center and the Access layer is within the building to provide services to the end-user in the campus. 4/25/2023 WKU CLUSTER CAMPUS LAN 18
  • 19. Logical Network Design 4/25/2023 WKU CLUSTER CAMPUS LAN 19
  • 20. Data Center The Data center contains internal WKU cluster campus servers. These servers include file, DHCP, proxy server,Mail server and database and other servers that are necessary for the network solutions. The Data Center should have to be secured since it has so many important instruments are there.  These security may be in two forms either physical and logical security. 4/25/2023 WKU CLUSTER CAMPUS LAN 20
  • 21. IP and VLAN plan  We use class B ip addresses for the network we have proposed.  Subnetting was implemented to decrease ip waste.  We use the host number to assign the IP address.  The network will have a total of 14 vlans, each with its own distinct ip address. 4/25/2023 WKU CLUSTER CAMPUS LAN 21
  • 22. Protocols EIGRP: we use a Cisco proprietary routing protocol that combines the features of both distance-vector and link-state routing protocols. STP : It ensures network stability and reliability by preventing loops and providing redundancy. Without STP, loops can occur in the network topology, which can cause broadcast storms, network congestion, and even network downtime. 4/25/2023 WKU CLUSTER CAMPUS LAN 22
  • 23. Cont... HSRP: In our proposed network design, HSRP is commonly used to improve network availability and prevent service disruptions in the event of a router failure. Redundant network designs let us meet requirements for network availability by duplicating network links and inter connectivity devices. VTP: is a protocol used in Cisco network devices for managing VLANs. This allows network administrators to configure VLANs on a single switch and have those VLAN configurations propagated to other switches in the network. 4/25/2023 WKU CLUSTER CAMPUS LAN 23
  • 24. Wireless Design 4/25/2023 WKU CLUSTER CAMPUS LAN 24
  • 25. Network Management Strategy and Software  We will use Zabbix Network monitoring tools to monitor the performance and health of the network and use Cisco Prime Infrastructure for Network configuration management.  We use Cisco Identity Services Engine (ISE) for network secuirty management and Nagios XI for network performance management. The purpose of our network security policy is to protect the WKU cluster campus network from unauthorized access, malicious activity, and other security threats. 4/25/2023 WKU CLUSTER CAMPUS LAN 25
  • 26. . 4/25/2023 WKU CLUSTER CAMPUS LAN 26