Project Scope
The aim of this project is to design the network for an IT college that is located in Melbourne city. The college has two buildings and planning to build four more classes. The network is aimed at serving almost four hundred users. Building one will contain three hundred users. This building is divided into four computer lab rooms. Each computer lab room will contain 35 computers to be used by students. Building 2 of the college is divided into three rooms. Each room will contain 35 workstations. The two buildings which are 500 meters apart have lobby at the front end. The lobby which is expected to be about two hundred meters has wireless access points for wireless network connection. The Wi-Fi speed is expected to be very high so that it can support a large number of students. Each computer lab is equipped with an IP phone that is used for communication with the service desk. The classes will also be equipped with a computer and IP phones, all of them connected to the internet [1]. The network is expected to be more secure so that unauthorized users won’t be able to connect to the college network. More so each computer room has its own server this will make the computer speed even to be faster than usual since there will be no data collision. The network topology used will be extended star topology. This report describes how different devices will be installed in the network, their IP configurations and demonstration. The design is aimed at producing high speed network that will meet the requirements of the institution.
The project is all about designing a network for an IT college. The network is expected to have high speed. The process will involve planning on how different network devices will appear in the network. Devices will be configured using different IP commands in order for them to be able to communicate [2]. Since the institution wants the network more scalable and efficient, the choice of network devices will be very strict in order to fulfil the institution requirements. Equipment such as routers, servers and switches will be used in network implementation.
The following shows the proposed design of network in college.
The proposed network design of the IT College. The design is aimed at providing a scalable and efficient network that will run smoothly. The network will be divided into several subnets so that it will be easily managed [3] .The design encompasses building 1, building 2 and the four class room. Building 1 will be divided into four room’s .
Network Design
Since the building has four rooms it will have four switches for connection to the workstation. Each room will have its 48 port switch that are linked to one switch. These switches will be connected to 35 computers and IP phone. Cat 5 Ethernet cables will be used for connection .The network topology used for this room connection is called star topology. Servers in each room are also connected to the switch [3. Firewalls are used to provide security, they prevent malicious software from interfering with the flow of the network. Wireless access router will be installed at the lobby, this is the front end of the building. Students within this area of the network will be able to connect to the internet through the wireless network. Since the network will be secure users will have to provide correct credentials to connect to the network .Unauthorized users will not be able use the network.
Building 2
Building two which is divided to threes rooms has the network design as shown above. Each room will have its switches that are connected to server through fiber cable. 35 workstations in each room will also be connected to the 48 port switch. IP phones that are used in the calling service desk will be connected to one of the desktop. The Access point will be mounted at the lobby found in the front end of the of the building. This access point will be secured to protect intruders from getting access to the network. Students will have to provide the network credentials for them to be able to connect to the Wi-Fi.
All the computers and IP phones in the classrooms will be connected to the network through one, 48 port switch as shown above. The switch will then be connected to the ISP router.
All the network will be linked together through ISP router to be easily managed and configured by the administrator.
Hardware requirements used
Device |
Explanation |
Seller |
Items No |
Quantity Price |
Router |
24 gigabit |
Hp corporation |
1 |
$1000 |
Switches |
48 port switches |
Avaya sellers |
7 |
$700 |
RJ-connectors |
Rj-45 |
1 |
100pkts |
1000 |
Computers |
· Intel core I3 · 8GB RAM · 500GB hard disk · 32 inch screen |
HP-computers |
245 |
$10000 |
Cat 5 |
Ethernet cables |
Hp corporation |
2 rolls |
$200 |
Wireless access points |
Netgear 5GHZ LR |
Hp corporation |
2 |
$200 |
Labor |
$1000 |
|||
Total |
$ 13000 |
The cost estimated of network design will be &130000
IP configuration Different pc in the network were configured using different IP addresses as shown below.
Router 0
The router is configured as show below [4]
It has generic,
Ethernet is lo,
0,
Remote host is 10.1.1.2,
Remote clock is 20000,
Network sub mask.
It is shown below [2].
outer#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface Serial0/0/1
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/2
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/2
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/1
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/2
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/1
Router(config-if)#
Router(config-if)#exit
Router(config)#interface Serial0/0/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface Serial0/0/1
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/2
Router(config-if)#
Router(config-if)#exit
Router(config)#interface Serial0/0/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/1
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/2
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/1
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/2
Router(config-if)#
Router(config-if)#exit
Router(config)#interface Serial0/0/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface Serial0/0/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface Serial0/0/1
Router(config-if)#
Router#
Computer in Room one configuration
Computers in building one will be configured using the IP address
192.168.1.5
The calculation so that it can fit to the all computers in the building will include [4]
IP Address: |
192.168.1.5 |
Network Address: |
192.168.3.1 |
Usable Host IP Range: |
192.168.1.5_192.168.1.35 |
Broadcast Address: |
192.168.3.1 |
Total Number of Hosts: |
4 |
Number of Usable Hosts: |
35 |
Subnet Mask: |
255.255.255.252 |
Wildcard Mask: |
0.0.0.3 |
Binary Subnet Mask: |
11111111.11111111.11111111.11111100 |
IP Class: |
C |
Device configuration
The following shows an example of a PC configuration in a network
Computers in building one will be configured using the IP address
192.168.3.6
The calculation so that it can fit to the all computers in the building will include ([5])
IP Address: |
192.168.3.6 |
Network Address: |
192.168.3.2 |
Usable Host IP Range: |
192.168.3.6_192.168.1.36 |
Broadcast Address: |
192.168.3.1 |
Total Number of Hosts: |
4 |
Number of Usable Hosts: |
35 |
Subnet Mask: |
255.255.255.252 |
Wildcard Mask: |
0.0.0.3 |
Binary Subnet Mask: |
11111111.11111111.11111111.11111100 |
IP Class: |
C |
Network configuration 10.1.1.1
IP Address: |
10.1.1.1 |
Network Address: |
10.1.1.1 |
Usable Host IP Range: |
10.1.1.1-10.1.1.10 |
Broadcast Address: |
10.1.1.1 |
Total Number of Hosts: |
4 |
Number of Usable Hosts: |
2 |
Subnet Mask: |
255.255.255.252 |
Wildcard Mask: |
0.0.0.3 |
Binary Subnet Mask: |
11111111.11111111.11111111.11111100 |
IP Class: |
C |
IP Address: |
10.1.1.2 |
Network Address: |
10.1.1.2 |
Usable Host IP Range: |
10.1.1.2-10.1.1.6 |
Broadcast Address: |
10.1.1.2 |
Total Number of Hosts: |
4 |
Number of Usable Hosts: |
2 |
Subnet Mask: |
255.255.255.252 |
Wildcard Mask: |
0.0.0.3 |
Binary Subnet Mask: |
11111111.11111111.11111111.11111100 |
IP Class: |
C |
Network configuration 10.1.1.2
Configuration of the devices
Router configuration
Se/0/0
Router configuration
Ga/0/0
Configuration of the router
Demonstration of the design
Conclusion
This network plan was effectively planned for the system of an IT school. Fundamentally, the IT school contains 400 clients, 300 clients are found in building 1 and 100 clients are exhibited in building 2. These two buildings have the entryway for clients which is a 200 meters open space and it needs the Wireless access point. The wireless network can only connect to authorize users.
References
[1] Jiang, X., Dawson-Haggerty, S., Dutta, P. and Culler, D. Design and implementation of a high-fidelity ac metering network. In Information Processing in Sensor Networks, 2009. IPSN 2009. International Conference on (pp. 253-264). IEEE, 2009.
[2] Pakzad, S.N., Fenves, G.L., Kim, S. and Culler, D.E.,. Design and implementation of scalable wireless sensor network for structural monitoring. Journal of infrastructure systems, 14(1), pp.89-101, 2008.
[3] Talbi, E.G. Metaheuristics: from design to implementation (Vol. 74) John Wiley & Sons, 2009.
[4] Li, M. and Lin, H.J.. Design and implementation of smart home control systems based on wireless sensor networks and power line communications. IEEE Transactions on Industrial Electronics, 62(7), pp.4430-4442, 2015.
[5] Sekar, V., Egi, N., Ratnasamy, S., Reiter, M.K. and Shi, G.. Design and implementation of a consolidated middlebox architecture. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation (pp. 24-24). USENIX Association, 2012