18
Assignment 1 CSNB423 Network Analysis and Design Fahmy Khawarizmy Bin Zainan SN097085 Muhammad Irfan Bin Hashim SN097050 Muhammad Mu'izuddin Bin Muhsinon SN097083

Design Scenario Network Analysis & Design

Embed Size (px)

Citation preview

Page 1: Design Scenario Network Analysis & Design

Assignment 1

CSNB423 Network Analysis and Design

Fahmy Khawarizmy Bin Zainan SN097085

Muhammad Irfan Bin Hashim SN097050

Muhammad Mu'izuddin Bin Muhsinon SN097083

Page 2: Design Scenario Network Analysis & Design

Assignment 1

CSNB423 Network Analysis and Design

Instructions:

1. Work in group, maximum 4 persons. Study the scenario below and answer the questions given.

2. You need to do some research in order to get the suitable solutions. Please provide references at the end of your report.

3. Full report submission in hardcopy is required with maximum 10 pages, not including the front page and the reference page.

4. Use your creativity in arranging your solution, you may have appropriate diagrams to support your solution.

5. Use Times New Roman with font size of 12 in your report.6. Submit your report on 19/8/2016 before 5 pm.

Design Scenario 1 - “Analyzing Business Goals and Constraints”You are a network consultant who has been asked to attend an initial meeting with the executive management team of ElectroMyCycle. ElectroMyCycle manufactures motorcycles. Its new electric motorcycle was just picked up by a large retail chain.

ElectroMyCycle is upgrading its manufacturing capacity and hiring new employees. recently, ElectroMyCycle employees have started saying, “The Internet is slow.” They are also experiencing problems sending email, accessing web-based applications, and printing.

In the past, when the company was small, it didn’t have these problems. The operations manager outsourced computer services to a local business called Network Rogues, which installed new workstations and servers as needed, provided desktop support, and managed the switches, router, and firewall. ElectroMyCycle is now considering bringing computer services in-house and is wondering how its network should evolve as it increases production of its electric motorcycle.

Page 3: Design Scenario Network Analysis & Design

1. What research will you do before your initial meeting with the executive management team?

Before our initial meeting with the executive management team of ElectroMyCycle we would research their external relations such as the market that they are in, their customers, suppliers, competitors, products produced, services supplied, financial viability, and competitive advantages.

By identify the business requirements, it can help to modify the network design according to their specific requirement. This will allow us to position technologies and products to help strengthen the customer’s status in their industry. By understanding the customer’s business goals and constraints we will be able to propose a network design that would meet the customer needs.

2. What general problems does ElectroMyCycle seem to be experiencing? What network design principles may have been ignored when Network Rogues designed and operated the existing network?

The problem that ElectroMyCycle encounter:i. Slow Internetii. Sending emailiii. Network printing problemiv. Slow Surfing website

Design principles that may have been ignored by Network Rogues could include analyzingElectroMyCycle’s initial requirements, scalability (the ability of a network to handle a growingamount of work or its ability to be enlarged to accommodate that growth), bandwidth (the average rate of successful data transfer through a communication path), and latency (the measure of the time delay experienced by a system).

We don’t believe that Network Rogues were expecting the major jump in growth of the company which was caused by the increase in the production of the electric motorcycle and unfortunately did not design the network to handle this growth and the complexity of ElectroMyCycle’s network.

Page 4: Design Scenario Network Analysis & Design

3. List four major stakeholders for a new network design for ElectroMyCycle. For each stakeholder, list some design goals, constraints, and biases.

i. End UsersDesign goals – ease of use, good performance, response timeConstraints – number of stations, size of the networkBiases – may only want to use certain applications or certain e-mail programs, equipment preferences

ii. ExecutivesDesign goals – increased employee productivity, increased profits, less overheadConstraints – budget, staffingBiases – biases toward certain technologies, acquisition

iii. ManagersDesign goals – network performance, security, availabilityConstraints –scheduling, politics and policiesBiases – familiarity of the system and how rapidly the system is available for use

iv. CustomersDesign goals – better customer support, offer new customer service, ease of accessConstraints – data security, ease of useBiases – has to be easy to access, simple, appearance of ease of use or they won’t use it, has to look like what the customers are used to using

Page 5: Design Scenario Network Analysis & Design

4. List five questions you will pose to the executive management team. Why will you pose those questions?

1. What is your organizational structure?Posing this question will allow us to gain an understanding of how the company is structured indepartments, lines of business, vendors, partners, and field or remote offices. This will eventuallyhelp us locate major user communities and will suggest users to account for as well as suggestgeographical locations to account for. By Understanding their organizational structure can also help us recognize their management hierarchy which will allow us to determine who the decision makers are.

2. What is your overall goal of the network design project?Asking the customer for a concise statement of their goals will allow us to determine the problems they are trying to solve and how the new technology will help them be more successful in their business. It will enable for us to understand what the business is trying to achieve so that we can create a compelling proposal for their new network.

3. What will the new network be used for?As a network designer we need to have a good understanding of what the network will be used for and also what network assets should be protected. We need to know who will be using this network and also what type of activities it will be used for. With a better understanding of our client’s expectations and needs for the new network, thus we will be able to concentrate on exactly what they are looking for and design the network per their request.

4. What is the expected budget for this project?We need to know how much customer’s budget to meet with their network requirement. Their budget should include allocations for equipment purchases, software licenses, maintenance and support agreements, testing, training, and staffing. It should also include consulting fees and fees for outsourcing. In order for this project to be successful we have to try to stay in the company’s budget and chose the most affordable solution determined by their budget.

5. May we obtain your security policy?

Page 6: Design Scenario Network Analysis & Design

We would ask the executive management team for a copy of their security policy so that we would able to get a better understanding of how the policy will affect the new design, how the new design would affect the policy, and whether or not the policy is too strict to where we won’t be able to do our job.

Design Scenario 2ElectroMyCycle has chosen you to design a new network that will let the company scale to a larger size. In Scenario 2, you learned that ElectroMyCycle’s network will support about 200 employees. The network will include a data center and a new state-of-the-art manufacturing facility. Users in the campus network will access the servers in the data center from their PCs. For online sales, ElectroMyCycle plans to have a DMZ that connects a web server, a DNS server, and an email server. ElectroMyCycle also plans to open a branch sales office in a city that is about 500 miles from ElectroMyCycle’s headquarters.

Design and document an IP addressing scheme to meet ElectroMyCycle’s needs. Specifywhich IP address blocks will be assigned to different modules of your network design. Document whether you will use public or private addressing for each module. Documentwhether you will use manual or dynamic addressing for each module. Specify where (if anywhere) route summarization will occur.

Review Questions1. Many basic networking books state that there are three network

topologies, a bus, a ring, and a star. Based on the knowledge you gained in this course, explain why these simple topologies may not meet the needs of modern networks.

Modern network is more focusing onto using the established technologies to solve client business problems rather than just make a good component selection and configuration towards the network architecture. Same goes to the network topologies likes bus, ring and star topologies. These simple topologies may not meet the needs of modern network that will be built in ElectroMyCycle. Their new network must support about 200 employees. At this point, bus topology can’t be chosen due it is suitable for low traffic networks. The high traffic networks at their environment will dropdowns the network efficiency.

Furthermore, ElectroMyCycle will include data center in their modern network to allow the user get data faster from the server in the data center. However, ring topology can’t be selected because the data sent must go through all intermediate nodes that will make the transmission speed becoming slower. Lastly, the star

Page 7: Design Scenario Network Analysis & Design

topology also not seems suitable with the modern network because the network operation depends on the functioning of the central hub.

For instance, the ElectroMyCycle plans to have a web server, a DNS server and an email server. Even they want to have a DMZ for their servers, this topology is still not relevant hence central hub failure, and it leads to failure of the entire network. That’s why another network topology is looks more suited with the modern network like hybrid topology

2. Compare and contrast full- and partial-mesh topologies. What advantages does a partial mesh have compared to a full mesh? What advantages does a full mesh have compared to a partial mesh?

A mesh topology does not have a pattern when it comes to relaying the data. The flow of the information comes in randomly since all of the nodes are interconnected with each other. One of the most used network connection in the world that uses mesh topology is the internet. The internet users consist of millions of people all over the world. Data transmission is done through sending signals to different paths connected in the internet connection.

Full Mesh TopologyThe Mesh diagram is related with the Reed’s Law wherein communication of groups is proportional with the exponent of the subscribers. It can be specified into two categories; the full mesh topology and the partial mesh topology. Full mesh topology requires each node to be interconnected with each other. This is used to connect devices without the need to broadcast or switch.

Partial Mesh TopologyIn Partial mesh topology, nodes are allowed to connect with more than one node present in the network through the uses of a point-to-point link. The point-to-point link advantage is that the redundancy provided by full mesh topology can be taken to its maximum capability without the complexity required for the node in the network.

AdvantagesA broken node won’t distract the transmission of data in a mesh network. Each node is connected to several other nodes which make it easier to relay data. A broken device will be ignored by the signals and will then find a new one that is connected with the node. Additional devices in a mesh topology will not affect its network connection. Hence it will improve the traffic in the network. Mesh topology makes a large data center that simulates useful information to its nodes.

Page 8: Design Scenario Network Analysis & Design

A mesh topology can handle high amount of network traffic since every additional device into the network is considered a node. Interconnected devices can simultaneously transfer data smoothly and will not complicate the network connection.

DisadvantagesMaintaining mesh networks can be very hard to manage. It requires continuous supervision because of the redundancy present in the network. Skilled network administrators will find it easy to manage this kind of topology.

Due to the fact that building this topology requires a lot of devices it will need a lot of capital to invest in. It may be expensive but the service it provides you will definitely give back the invested capital.

Every network topology has its own ups and downs. It will only matter on how you structure it very well and if the nature of your business requires a bigger network system. It is important to keep learning about what you need in your business or place to be able to come up with an effective system where in your investment won’t go to waste and your revenue will give you excellent output.

3. The following network numbers are defined at a branch office. Can they be summarized, and if so, what is the network number and prefix length?

10.108.48.010.108.49.010.108.50.010.108.51.010.108.52.010.108.53.010.108.54.010.108.55.0

10.108.48.0 = 00001010.01101100.00110000 .00000000

10.108.49.0 = 00001010.01101100.00110001 .00000000

10.108.50.0 = 00001010.01101100.00110010 .00000000

10.108.51.0 = 00001010.01101100.00110011 .00000000

10.108.52.0 = 00001010.01101100.00110100 .00000000

10.108.53.0 = 00001010.01101100.00110101 .00000000

10.108.54.0 = 00001010.01101100.00110110 .00000000

10.108.55.0 = 00001010.01101100.00110111 .00000000

Page 9: Design Scenario Network Analysis & Design

21 Bits

Network number: 10.108.48.0/21

Subnet Mask: 255.255.248.0

4. What is a discontiguous subnet? Why do some enterprise networks have discontiguous subnets? Why don’t classful routing protocols support discontiguous subnets?

A discontiguous subnet is two or more portions of a major network that are divided by another major network. A discontiguous network in a network is that there are one or few route in the network for which they only route to a subnet passes through subnets of other networks.

Discontiguous subnets are a mean to travel from one subnet to another on the same network you would need to go through of a subnet on the different network. Classful routing protocols don’t support discontiguous subnets because they summarize routes to only one network they are on. Discontiguous subnets can’t access other networks

5. Compare and contrast distance-vector and link-state routing. If you were designing a new routing protocol, which would you use and why?’

Distance Vector

Distance vector involved with two factors which are the distance, metric of a

destination and the vector or direction to take to get there. The routing information

only exchange between directly connected neighbors. This means a router will know

from which neighbor a route learned but it does not know where the neighbor learned

the route. This means that the router cannot see beyond it own neighbor. This aspect

of distance vector routing sometimes referred to as routing by rumor measures like

split horizon and poison reverse are employed to avoid routing loops.

Link-state

Page 10: Design Scenario Network Analysis & Design

Link-state routing will require all routers that all router know about the path

reachable by all other router in the network. Link-state protocols track the status and

connection type of each link and produce a calculated metric based on these and

other factors, including some set by the network administrator. Link-state information

is flooded throughout the link state domain to ensure all routers possess a

synchronized copy of the area link-state database. From this database, each router

constructs it own relative shortest path tree with itself as the root for all known

routes.

Page 11: Design Scenario Network Analysis & Design

Comparison Link-State and Distance Vector

If all routers were running a Distance Vector protocol, the path or 'route'

chosen would be from A B directly over the ISDN serial link, even though that link is

about 10 times slower than the indirect route from A C D B.

A Link State protocol would choose the A C D B path because it's using a faster

medium (100 Mb Ethernet). In this example, it would be better to run a Link State

routing protocol, but if all the links in the network are the same speed, then a

Distance Vector protocol is better.

Design New protocol

From this routing protocol, I will choose link state because link state is design

to operate in large and enterprise level network. Even though the routing protocol are

very complex and are much more difficult to configure, maintain, and troubleshoot

than distance vector routing protocols. However, link state routing protocol

overcomes many of shortcomings of distance vector protocols. Link state protocols

use a different algorithm than distance vector protocols for calculating the best path

to a destination. This algorithm takes into account bandwidth as well as other factors

when calculating the best path for a packet to traverse the network. Additionally, link

state convergence occurs faster than distance vector convergence. This is because link

state establishes a neighbour relationship with directly connected peers and shares

routing information with its neighbours only when there are changes in the network

topology.

Page 12: Design Scenario Network Analysis & Design

6. Analyze the routing table on your computer. In Windows you can view it with a route print command. On a Mac, you can view it with a netstat -rn command. What entries are in your routing table and why are they there? Is your default route in the table and, if yes, what is it?

A routing table contains the information necessary to forward packet along the best path forward its destination. Each packet contains information about its origin and destination. When a packet is received, a network device examines the packet and matches it to the routing table entry providing the best match for its destination. The table provides the device with instruction for sending the packet to the next hop on its route across the network

Page 13: Design Scenario Network Analysis & Design

Basic Routing Table

Destination The IP address of the packet's final destination

Next hop The IP address to which the packet is forwarded

Interface The outgoing network interface the device should use when forwarding the

packet to the next hop or final destination

Metric Assigns a cost to each available route so that the most cost-effective path

can be chosen

Routes Includes directly-attached subnets, indirect subnets that are not attached to

the device but can be accessed through one or more hops, and default

routes to use for certain types of traffic or when information is lacking.

Default Route

Routes that is used when no other routes for the destination are found in the routing table. If a router or end system (such as a PC running Microsoft Windows or Linux), cannot find a route for a destination, the default route is used. The default route is used if no other host or network route matches the destination address.

The default route generally points to another router, which treats the packet the same way. If a route matches, the packet is forwarded. Otherwise the packet is forwarded to the default route of that router. The route evaluation process in each router uses the longest prefix match method to obtain the most specific route. The network with the longest subnet mask that matches the destination IP address is the next-hop network gateway. The process repeats until a packet is delivered to the destination. Each router traversal counts as one hop in the distance calculation for the transmission path.