2. Introduction
Wolkite University is one of the 3rd generation University in Ethiopia.
WKU Cluster Campus is the name of the one branch that is situated in Wolkite Town.
Due to a number of ongoing issues The WKU cluster campus is interested in switching to a new,
full-featured LAN network design to replace the current one.
For the WKU Cluster Campus, we will generally construct a secure, scalable, high performance,
fault tolerance and reliable network design.
4/25/2023 2
WKU CLUSTER CAMPUS LAN
3. Statement of Probem
Weak security mechanism.
It lacks a data center of its own.
The network has no redundancy.
No a smart room, video conference , a CCTV camera, and no WiFi accessibility.
Casecade network topology is present.
There is no backup for the main campus.
4/25/2023 3
WKU CLUSTER CAMPUS LAN
4. General Objective of the project
The general Objective of this project is to design and implement secure, scalable, high
performance, fault tolerance and reliable LAN network design for WKU cluster campus.
Specific Objectives
Implement redundancy to ensure reliability.
Ensure network security.
Enable Local services to make them locally available.
Providing CCTV camera, video conference and others.
4/25/2023 4
WKU CLUSTER CAMPUS LAN
5. Scope of the Project
To Enhancing security mechanism and using appropriate security policy.
Ensure reliability by implementing redundancy.
To Optimize Wired LAN and wireless LAN access.
To Design network topology that meets current business and technical requirements
Limitation of the project
Future constructions are not taken into account
Only considers the WKU cluster campus LAN.
4/25/2023 5
WKU CLUSTER CAMPUS LAN
6. Developmental Methodology
The methods We use when dealing with network design or network layout is prepare, plan,
design, implement, operate and optimize (PPDIOO) is an overall deployment method.
We gathered data using a variety of techniques like observation, interview, document analaysis
and questionnaire.
To create our projects, we use hardware and software standards.
4/25/2023 6
WKU CLUSTER CAMPUS LAN
7. Introduction of Existing System
The 60 Mb fiber connection to the Wolkite university cluster campus is now provided by
Ethiopia Telecom.
The network as a whole has Two class B IP addresses.
One router is directly connected to the distribution switch, which is linked to the access switch
and the VPN that linked the cluster campus to the main campus.
In contrast to how the distribution switch is set up with DHCP, VLAN, and routing
capabilities, the router is configured using NAT and ACL.
4/25/2023 7
WKU CLUSTER CAMPUS LAN
8. Cont...
There are Seven VLANs that have been created on the distribution switch.
Both the router and the distribution switch have dynamic routing set up(EGRP).
They uses a fiber optic connection to connect the distribution switch and access switch.
There are 12 access switches with port number 48.
WKU cluster campus is connected to the main campus via a VPN, which enables the cluster
campus to access the services from the main campus
4/25/2023 8
WKU CLUSTER CAMPUS LAN
9. cont...
However, for this connection to function, an internet connection between the two campuses is
necessary.
These services can be accessed locally at the main campus even without an internet connection,
however this is not possible in the cluster campus.
As a remedy, a direct fiber cable connection between the main campus and the cluster campus
was envisioned, but this was not allowed by Ethiopian telecom regulations.
4/25/2023 9
WKU CLUSTER CAMPUS LAN
11. Cont...
The WKU Cluster Campus presently has a two-tier architecture.
This type of architecture has some advantages, such as simplicity and ease of
management, there are also some disadvantages :
- Performance - Security
- Limited fault tolerance - Scalability
4/25/2023 11
WKU CLUSTER CAMPUS LAN
12. Cont...
A two-tier architecture is a network design in which client devices communicate directly with
a server.
There is no redundancy in this network, and the distribution switch manages most network
operations.
If there is a problem and there is an internet outage, there won't be any backup systems, so it
will be a total outage.
4/25/2023 WKU CLUSTER CAMPUS LAN 12
13. The proposed network
The network flow is planned to begin with the firewall, move via the router, core layer,
distribution layer, and goes with the access layer.
The proposed network will enhance the existing network's performance, scalability, availability,
and manageability, and redundancy issues.
We adopt a three-tier network architecture in our proposed network design.
In order to address the problems with the two-tier architecture, such as scalability, flexibility,
security, performance, and ease of maintenance, we employ a three-tier network architecture.
4/25/2023 WKU CLUSTER CAMPUS LAN 13
14. Functional requirements
Connectivity: enables communication and data exchange between networked devices, which
is essential for the network to perform its intended function.
Sizing the network: Our suggested network will evaluate the organization's present and
future needs in order to determine the proper network capacity..
Following a standard approach: Governing organizations and industry experts have created
standards, procedures, and best practices that our planned network will abide by.
4/25/2023 WKU CLUSTER CAMPUS LAN 14
15. Non-Functional Requirements
Availability: Our new network architecture is accessible through and provides redundant, 24
hour, consistent, and dependable performance.
Performance: The network shall be capable of providing a minimum end-to-end throughput of
60Mb/s between end devices.
Scalability: Our suggested network infrastructure is expandable to accommodate new user.
4/25/2023 WKU CLUSTER CAMPUS LAN 15
16. Cont...
Reliability: The network should pertain to all the situations so that it can be sustain in any
error conditions.
Manageability: The suggested network makes it possible to control, watch over, and maintain
the network.
Security: Our suggested network can be secured by employing a firewall as the primary
security measure.
4/25/2023 WKU CLUSTER CAMPUS LAN 16
18. Network Design
The network topology we used are the three-tier network architecture.
The three layers are the access layer, distribution layer, and core layer.
The reason we used these hierarchical model is due to its scalability, redundancy, performance,
security, manageability, maintainability, etc
The Core layer and Distribution Layer’s are placed in the data center and the Access layer is
within the building to provide services to the end-user in the campus.
4/25/2023 WKU CLUSTER CAMPUS LAN 18
20. Data Center
The Data center contains internal WKU cluster campus servers.
These servers include file, DHCP, proxy server,Mail server and database and other servers
that are necessary for the network solutions.
The Data Center should have to be secured since it has so many important instruments are
there.
These security may be in two forms either physical and logical security.
4/25/2023 WKU CLUSTER CAMPUS LAN 20
21. IP and VLAN plan
We use class B ip addresses for the network we have proposed.
Subnetting was implemented to decrease ip waste.
We use the host number to assign the IP address.
The network will have a total of 14 vlans, each with its own distinct ip address.
4/25/2023 WKU CLUSTER CAMPUS LAN 21
22. Protocols
EIGRP: we use a Cisco proprietary routing protocol that combines the features of both
distance-vector and link-state routing protocols.
STP : It ensures network stability and reliability by preventing loops and providing
redundancy.
Without STP, loops can occur in the network topology, which can cause broadcast storms,
network congestion, and even network downtime.
4/25/2023 WKU CLUSTER CAMPUS LAN 22
23. Cont...
HSRP: In our proposed network design, HSRP is commonly used to improve network
availability and prevent service disruptions in the event of a router failure.
Redundant network designs let us meet requirements for network availability by duplicating
network links and inter connectivity devices.
VTP: is a protocol used in Cisco network devices for managing VLANs.
This allows network administrators to configure VLANs on a single switch and have those
VLAN configurations propagated to other switches in the network.
4/25/2023 WKU CLUSTER CAMPUS LAN 23
25. Network Management Strategy and Software
We will use Zabbix Network monitoring tools to monitor the performance and health of
the network and use Cisco Prime Infrastructure for Network configuration management.
We use Cisco Identity Services Engine (ISE) for network secuirty management and Nagios
XI for network performance management.
The purpose of our network security policy is to protect the WKU cluster campus network
from unauthorized access, malicious activity, and other security threats.
4/25/2023 WKU CLUSTER CAMPUS LAN 25