Project Goals and Objectives
In this particular network design project, business and technical goals are addressed for stating the entire project goals and objectives. Significant business goals are identified as following:
- To increase business production and to reduce wastage of resources
- To enhance efficiency and increase production as per business requirement
- To gain real-time update regarding demand and increase efficiency of supply chain business architecture
As per business goals and to reach the business goals in practice, the technical goals and objectives are identified to be following:
- To design efficient yet appropriate network as per stated requirement of business and assist the organization to gain leading position in business
- To develop interface and build application for connecting it inside current network infrastructure
As per stated project goals and objectives, the project scope is decided on designing a network over the selected organization. The project scopes are determined as:
- Physically and logically the network should be designed so that design requirements could be properly addressed
- The network should be designed in Cisco packet tracer based on proper configuration process
- The network should be tested and outcomes should be discussed in the report
Business goals and constraints are depicted in this section. Significant business goals are identified as following:
- To increase business production and to reduce wastage of resources
- To enhance efficiency and increase production as per business requirement
- To gain real-time update regarding demand and increase efficiency of supply chain business architecture
Identified constraints are discussed in the section that are necessary for discussion and those can affect business goals are listed as following.
- Primary constraint in the project is that considered organization is start-up and the organization requires more resources to develop network architecture
- Secondly, the organization requires employing technical personnel to manage proposed network design
As per business goals and to reach the business goals in practice, the technical goals and objectives are identified to be following:
- To design efficient yet appropriate network as per stated requirement of business and assist the organization to gain leading position in business
- To develop interface and build application for connecting it inside current network infrastructure
List of tradeoffs are considered in the section for achieving technical goals in the project; the tradeoffs are mentioned as following;
- Primary trade-off of the project is designing network diagram and configuration of the network device for making service available for daily basis.
- Another trade-off is considered as major that is to secure network from unauthorized access and removal of congestion in the network.
User communities are considered for showing user communities and their individual responses. The following table shows the user comments and considerations in the project.
User Community Name |
Number Of User Community |
Location |
Application Used By Community |
Employee of AG |
20-30 |
Northern Territory |
Email and Web Services |
Fisherman |
100-150 |
Northern Territory (Sea) |
Web and Mobile Platforms |
Employee of Distribution Centre |
40-50 |
Northern Territory |
Email and Web |
Student |
20 |
Darwin |
Email, Software for Training |
Customer |
1000-1500 |
Northern Territory |
Apps, Online Forum, Email |
Training Centre Employee |
4 |
Darwin |
Internal Software, Apps, Software For Training, Email |
Table 1: User Communities Considered for the project
(Source: Sezer et al. 2013, pp. 39)
The network applications are identified in the following table as well. The table shows applications as underneath:
Data Store |
Location |
Applications |
Used by user community |
Simple Files |
Cloud |
Database storage |
Users of the system |
Emails |
Server installed by Darwin |
SMTP |
Employees and staff |
Requisition |
Local Server |
Database Storage |
Suppliers and Fishery |
Invoice |
Local Server |
Cluster |
Suppliers and Accountant |
Media |
Cloud Server |
Streaming Media Files |
Trainer and Student |
Table 2: Network Applications
(Source: Nunes et al. 2014, pp. 1624)
The project includes some assumptions that are relevant for network designing and operation. The assumptions are listed as:
- IT department demonstrates flow of data packets from source and destination
- Network load is essential for balancing and session
- Network behaviour can enhance the security for monitoring the traffic
Figure 3: Designed Logical Network Diagram
(Source: Created by author)
Addressing and naming conventions:
IP address specification is included as with devices, interfaces, and address specified for each network element.
Device |
Interface |
IP Address |
R1 |
S1/0 |
192.168.10.1/30 |
R1 |
F0/0 |
192.168.20.1/24 |
R2 |
S1/0 |
192.168.10.2/30 |
R2 |
S1/1 |
10.10.10.130/30 |
R2 |
F0/0 |
192.168.30.1/24 |
ISP |
S1/0 |
10.10.10.129/30 |
SW1 |
VLAN1 |
192.168.20.2/24 |
SW2 |
VLAN1 |
192.168.30.2/24 |
Table 4: IP addressing and devices
(Source: Created by auhtor)
For outlining network chart, the examiner has utilized Cisco Packet tracer programming. In this plan fragment, three layers are to be considered for securing them in OSI demonstrate. Also, the session, introduction, and application layers ought to be secured for OSI show with including segments in Cisco interface (Misra, Tourani and Majd 2013). To accomplish whole networking movement, transport and star topology is used. Here, in this area, short exchange is put for indicating topology and its use. For planning bus topology, single LAN link is utilized for running association in single building and network engineering. The association is put under two terminals called as Bus or spine of network. In this network, multipoint information is guided from source switch to goal PC while control information stream enables the arrangement to get simple transmission of bundles around the framework.
Business Goals and Constraints
In this network, one switch is associated with single switch and switch is associated with one PC (PC0). The association is performed with taking copper straight wire between the switch and switch and PC. In this outline, the session administration is to be performed from switch side; the arrangement can be performed from switch CLI interface (Alrajeh et al. 2013). Once more, the application layer administration can be performed from customer side PC (PC0). The design can be seen from customer side PC order incite. In this outline, significant security segment is taken as telnet and SSH arrangement.
Interior Gateway Protocols (IGP): This Protocol Is For The Most Part For Inner Network Of The Organization This Protocol Is Utilized It Gives Upkeep To Different Measurements Inside Every Switch (Khan 2014). This network protocol in this manner is utilized for measuring distinctive measurements in network. These protocols depend on the self-sufficient framework; it is an accumulation of switches in an organization which are ordinarily utilized.
Exterior Gateway Protocols (EGP): This is the official protocol for utilizing when interfacing with the web and by remote clients to get to the organization (Chen et al. 2014). EGP is utilized as it empowers the remote clients for getting to web.
Distance Vector Routing Protocols: It helps us to recognize how far the device we getting data from henceforth pick the most ideal approach to hand-off data to the client, or we can channel the client to pick data from the closest server to diminish the issue of postponements. Remove Vector steering Protocol measure separate in light of separation of the devices from the switch and vector for reason for the heading (Chen, Tang and Wang 2013). These will empower the framework pick the best most brief course to convey the parcels to goal. This protocol is not utilized as separation vector steering protocol can be used with course astute decrease of issues. This specific network is paying little mind to bearing and thus, not used.
Figure 5: Final network design
(Source: Created by author)
In this section, network details are provided based on the network design is finalized. Moreover, the devices and IP addresses are included in the table.
Device |
Device Name |
Interface |
IP Address |
Individual Cost (approximately in $ AUD) |
R1 |
2811 Router |
S1/0 |
192.168.10.1/30 |
20.85 |
R1 |
WRT300N Wi-Fi Router |
F0/0 |
192.168.20.1/24 |
17.73 |
R2 |
2811 Router |
S1/0 |
192.168.10.2/30 |
20.85 |
R2 |
– |
S1/1 |
10.10.10.130/30 |
20.85 |
R2 |
– |
F0/0 |
192.168.30.1/24 |
20.85 |
ISP |
– |
S1/0 |
10.10.10.129/30 |
20.85 |
SW1 |
2950T-24 Switch |
VLAN1 |
192.168.20.2/24 |
15.64 |
SW2 |
2950T-24 Switch |
VLAN1 |
192.168.30.2/24 |
15.64 |
Total Cost |
153.26 |
Table 6: Final Addressing table with device cost
(Source: Created by author)
Session layer of OSI model manages session administration and dealing with frameworks, the layer encourages correspondence with devices by looking after, synchronizing, controlling, and building up, and ending associations. Specified as Transport Layer Security, Secure Socket Layers (SSL) is an innovation that is produced for affirmation of host and administrations character (Mahgoub and Ilyas 2016). As distinguished Transport layer security, work lies in above transport layer; however the security is session layer subordinate. In addition, the SSL protocol is utilized for securing installment exchanges in on the web. Server validation, for example, server’s personality can be checked with Certificate Authority (CA) alongside open key cryptography (Hoque et al. 2013). This confirmation approach could be connected for customer side servers. SSL used diverse figures for cryptography calculations giving encoded session administrations. Figure could give more extensive scope of encryption settings. Additionally, SSL handshake protocol can empower the confirmed customers and servers for transaction of the figure utilized (Zin et al. 2014). The session can be caught and all things considered, the encryption can ensure the information. Once, the security part as telnet can be actualized; the testing would be performed in later area.
Technical Goals and Objectives
In network plan, validation is considered as real part of security. Most basic organization of confirmation includes putting username and password. Mix of username and secret word gifts client get to and this verification procedure requires successful record approach (Youssef et al. 2014). According to the strategy, secret key ought to contain numeric, letters in order, unique characters, and it ought to be at any rate of length 8. Besides, after certain interim, the secret word ought to be changed and new watchword ought to be utilized for validation.
In this star topology, all the interfacing links are kept running from PCs to hub point or area where every PC/device is associated. This network is for the most part a brought together matrix with terminals coming to specifically from hub (Conti and Giordano 2014). Ethernet 10 base T is mainstream network structure that depends on star topology. For star topology use in the venture, the examiner had utilized one server, one hub, and three individual PCs (PC1, PC2, and PC3).
In this chapter, entire project testing activities are conducted with verification whether the project had met its requirements and objectives. Moreover, the analyst had followed some systematic steps so that all testing and verification processes can be conducted for session, presentation, and application layer of OSI model.
The test script is followed with systematic steps such as following:
- Display Device Configuration:The router configuration code is shown with initialization based on configuration.
- End-to-end connectivity testing with ping:Ping test is considered for first part of the design here. From command prompt of PC0, the router is pinged, using following command; “Ping <IP Address>”.
I have distinguished that real discoveries in the project are pertinent for the session, introduction, and application layers ought to be secured for OSI display with including segments in Cisco interface. To accomplish whole networking action, transport and star topology is used. In this network, one switch is associated with single switch and switch is associated with one PC (PC0). As recognized Transport layer security, work lies in above transport layer; however the security is session layer subordinate. For usage in session layer and application layer; telnet and SSH is to be performed for switch. Telnet for Session and Application layer
Session Layer and Application Layer: For session and application layer, Telnet protocol is utilized. In addition, the telnet gives access to order line interface for remote host through virtual terminal that considers 8-bit situated information for Transmission Control Protocol (TCP). Telnet enabled the client for login to another device or PC. Telnet program keeps running in PC and associates with PC from server on network matrix. The telnet program empowers the control of server and correspondence with server on network. Term telnet can allude to programming that executes customer some portion of the protocol and telnet customers are accessible on UNIX frameworks. Network types of gear with working frameworks with TCP/IP supporting telnet benefit for remote arrangement. Telnet is customer server based protocol for dependable association based transport. This protocol sets up association for TCP port 23. Telnet can interface towards remote frameworks on network and the port can tune in.
Tradeoffs Considered
The administration can be accomplished with straightforward telnet charges. Client can undoubtedly associate with remote framework by means of various get to modes, for example, crude get to, SSH client get to, and others. SSH mode empowers and offers encryption for security and upgraded trustworthiness of key to the information. SSH is most secure path for getting to information and remote association. Windows framework can offer telnet customer for straightforward yet dealing with telnet summons inside windows order shell. This summon will get the client associated with specific IP address on port 80 and daemon is running on port 80 over HTTP server. SSH for session and application layer.
Secure Socket Shell; shortened as SSH is network protocol for furnishing authoritative activities with secured access for remote PC. The network can be shaky; while, SSH gives encoded information going between the associated frameworks. A SSH server tune in to standard TCP port 22. SSH gives open key based cryptographic answer for remote and general PC framework for enabling remote machine to validate client when required.
The interface demonstrates that one interface “FastEthernet0/0” is doled out for telnet design. “Transport input ssh” is utilized for making framework to acknowledge remote access of course setting through telnet and ssh is empowered as it will acknowledge SSH association. From order provoke of PC0, the switch is pinged, utilizing taking after charge: “Ping 10.1.1.1”. For session layer security, telnet is arranged. As the network configuration was set up with single switch, switch and PC; in this manner, from customer side SSH and telnet can be tried. The telnet and SSH is tried from PC0. For testing reason, “telnet 10.1.1.1” order is keep running in charge incite of PC0. Once, the telnet is tried in charge incite of PC0 interface, the SSH is tried also.
7.0 References
Alrajeh, N.A., Alabed, M.S. and Elwahiby, M.S., 2013. Secure ant-based routing protocol for wireless sensor network. International Journal of Distributed Sensor Networks, 9(6), p.326295.
Alrajeh, N.A., Khan, S., Lloret, J. and Loo, J., 2013. Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks. International Journal of Distributed Sensor Networks.
Chen, L., Tang, H. and Wang, J., 2013, June. Analysis of VANET security based on routing protocol information. In Intelligent Control and Information Processing (ICICIP), 2013 Fourth International Conference on (pp. 134-138). IEEE.
Chen, R., Bao, F., Chang, M. and Cho, J.H., 2014. Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25(5), pp.1200-1210.
Conti, M. and Giordano, S., 2014. Mobile ad hoc networking: milestones, challenges, and new research directions. IEEE Communications Magazine, 52(1), pp.85-96.
Eissa, T., Razak, S.A., Khokhar, R.H. and Samian, N., 2013. Trust-based routing mechanism in MANET: design and implementation. Mobile Networks and Applications, 18(5), pp.666-677.
Hoque, A.K.M., Amin, S.O., Alyyan, A., Zhang, B., Zhang, L. and Wang, L., 2013, August. NLSR: named-data link state routing protocol. In Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking (pp. 15-20). ACM.
Khan, F., 2014, October. Secure communication and routing architecture in wireless sensor networks. In Consumer Electronics (GCCE), 2014 IEEE 3rd Global Conference on (pp. 647-650). IEEE.
Mahgoub, I. and Ilyas, M., 2016. Sensor network protocols. CRC press.
Misra, S., Tourani, R. and Majd, N.E., 2013, August. Secure content delivery in information-centric networks: Design, implementation, and analyses. In Proceedings of the 3rd ACM SIGCOMM Workshop on Information-centric Networking (pp. 73-78). ACM.
Nunes, B.A.A., Mendonca, M., Nguyen, X.N., Obraczka, K. and Turletti, T., 2014. A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys & Tutorials, 16(3), pp.1617-1634.
Pantazis, N.A., Nikolidakis, S.A. and Vergados, D.D., 2013. Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications surveys & tutorials, 15(2), pp.551-591.
Sabbah, A.I., El-Mougy, A. and Ibnkahla, M., 2014. A survey of networking challenges and routing protocols in smart grids. IEEE Transactions on Industrial Informatics, 10(1), pp.210-221.
Sezer, S., Scott-Hayward, S., Chouhan, P.K., Fraser, B., Lake, D., Finnegan, J., Viljoen, N., Miller, M. and Rao, N., 2013. Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Communications Magazine, 51(7), pp.36-43.
Sha, K., Gehlot, J. and Greve, R., 2013. Multipath routing techniques in wireless sensor networks: A survey. Wireless personal communications, pp.1-23.
Wang, A., Iyer, M., Dutta, R., Rouskas, G.N. and Baldine, I., 2013. Network virtualization: Technologies, perspectives, and frontiers. Journal of Lightwave Technology, 31(4), pp.523-537.
Wei, K., Liang, X. and Xu, K., 2014. A survey of social-aware routing protocols in delay tolerant networks: applications, taxonomy and design-related issues. IEEE Communications Surveys & Tutorials, 16(1), pp.556-578.
Xylomenos, G., Ververidis, C.N., Siris, V.A., Fotiou, N., Tsilopoulos, C., Vasilakos, X., Katsaros, K.V. and Polyzos, G.C., 2014. A survey of information-centric networking research. IEEE Communications Surveys & Tutorials, 16(2), pp.1024-1049.
Youssef, M., Ibrahim, M., Latif, M.A., Chen, L. and Vasilakos, A.V., 2014. Routing Metrics of Cognitive Radio Networks: A Survey. IEEE Communications Surveys and Tutorials, 16(1), pp.92-109.
Zin, S.M., Anuar, N.B., Kiah, M.L.M. and Pathan, A.S.K., 2014. Routing protocol design for secure WSN: Review and open research issues. Journal of Network and Computer Applications, 41, pp.517-530.