Project on Network Design for a College

Posted on 26th Nov 2024 08:59:19 PM CSE


ACKNOWLEDGEMENT

First of all, thanks go to Almighty Allah to give me a chance to complete the project work. It is a depth of gratitude and obvious duty to express my obligation to my honourable supervisor Sarhan Wasif, North Bengal International University, Bangladesh for his continuous, cordial and constructive guidance, advice, encouragement and every possible help throughout the project work.

Also my deepest gratitude goes with the all teachers of CSE department, who have contribution to my study in any way. I am too much grateful to my family members for their mental, economical support and inspiration throughout my life. I am also much thankful to all of my classmates and friends especially for their encouragement.

I would also like to thank the various creators of the websites and books I poured over while searching for more information on both the field and to make  projects. Although unnamed, your contributions cannot be denied. 

Last, but not the least, I would like to thank the folks out there at Cisco Inc., for developing the piece of art that is the Cisco Packet Tracer . The things you can do with this software never cease to astound me.

Finally, I am too much grateful to my Dept. of CSE for giving me a creative environment to develop this successful project.

Author-

Md. Sahanul Haque
ID: 16104433010
Department of Computer Science and Engineering
North Bengal International University
Rajshahi

CERTIFICATE

This is to certify that the project paper entitled “Project on Network Design for a College” submitted by Md. Sahanul Haque ID. 16104433010 has been carried out under my supervision. This project has been prepared in partial fulfillment of the requirement for degree of Bachelor of Science in Computer Science and Engineering

Supervisor-

Sarhan Wasif
Lecturer
Department of Computer Science and Engineering
North Bengal International University
Rajshahi

External Examiner-

Md. Iftekhar Hossain
Lecturer & Coordinator
Department of Computer Science and Engineering
North Bengal International University
Rajshahi

 

ABSTRACT

This project is aimed to measure the ease use of a network diagram software particularly to help users to create a network diagram for multiple reasons.

The aim of this project is also to find out if this software can help them learn more about the general aspects of computer networking. For example, the devices, the physical or logical aspects of a computer network, as well as network topologies.

A set of questionnaire will be made and then distributed to students of University Industry Selangor. Questions covered will be how fast they can easily learn the use of this software, can they understand most of its functions and whether from their experience, they can gain more knowledge of basic networking. Number of students will be from 10 to 30 and will be comprising of any students in Unseal. Results of the questionnaire will be used as data to form a statistical analysis of how.

Findings Results can show whether this software is useful to help university students learn and gain more knowledge of computer networking. Thus whether the software Research Implication From this project, we may have a better understanding on how software introduced will easy for them to use and how technology can help students learn faster. Maybe from this research, future education may include more of By using this software, users can create a better looking diagram easily and even help them plan a good layout before implementing a real physical network.

Chapter 1: Introduction

1.1 Introduction to Networking

Networking is referred as connecting computers electronically for the purpose of sharing information. Resources such as files, applications, printers and software are common information shared in a networking. The advantage of networking can be seen clearly in terms of security, efficiency, manageability and cost effectiveness as it allows collaboration between users in a wide range.  Basically, network consists of hardware component such as computer, hubs, switches, routers and other devices which form the network infrastructure. These are the devices that play an important role in data transfer from one place to another using different technology such as radio waves and wires. 

There are many types of network available in the networking industries and the most common network is Local Area Network (LAN) and Wide Area Network (WAN). LAN network is made up of two or more computers connected together in a short distance usually at home, office buildings or school. WAN is a network that covers widerarea than LAN and usually covers cities, countries and the whole world. Several major LAN can be connecting together to form a WAN. As several devices are connected to network, it is important to ensure data collision does not happen when this devices attempt to use data channel simultaneously. A set of rules called Carrier Sense Multiple Access / Collision detection are used to detect and prevent collision in networks.

The TCP/IP Model is a specification for computer network protocols. TCP/IP defines a set of rules to enable computers to communicate over a network. It specifies how data should be formatted, addressed, shipped, routed and delivered to the right destination. TCP/IP describes the top 4 layers of a 5-layer stack. The first layer is called the Physical layer. This layer is responsible for encoding and transmitting data over network communications media. It operates with data in the form of bits which are sent from the Physical layer of the sending source and received at the Physical layer of a destination source. When you hook up a computer using an Ethernet cable you are connecting that computer on the Physical layer. This Physical layer is the lowest level of the TCP/IP Model. The next layer is the Data link layer. This layer is used to move packets from the network layer on two different hosts. The process of transmitting packets on a link layer can be controlled in the software device driver for the network card and on firmware. Different protocols are used for different types of networks. For a local wired network, Ethernet is used. For local wireless network, IEEE 802.11 is used.

An IP address is a number given to a computer (a server or a personal computer) by the ISP. The most commonly used IP address is a 32-bit (4 byte) address. It looks like this in the decimal system: 172.16.0.1. This number is converted from binary because it tends to be easier for humans to process decimal numbers. In binary the IP address looks something like this: 10101100.00010000.00000000.00000001 - the reason this is a 32-bit address is because in binary there are 32 characters, and it’s 4 bytes because there are 4 groups of 8. These bytes are also called octets.

If your computer has an address of 158.59.224.135, the address is interpreted as follows: The computer belongs to a class B network, so the first two octets define the network. The last two octets define the specific host on the network, as well as any subletting.The first two octets are the IP address assigned by the ISP for all of the computers in that network. The administrator or the user assigns the last two octets to the computer. This means you. If you have a network of, let’s say, three computers and your network IP address is 172.16.0.0 you can assign the first computers IP address to be 172.16.0.1 then the second computer’s IP address can be 172.16.0.2, and the third can be 172.16.0.3. This allows you to keep your network a little more organized.

1.2 Introduction to project

If the reader has read the introduction provided for a basic and brief understanding of networking, he may wonder about the devisees, and the way the devices are arranged to from a network. Is the Hospital Management System being most important in network provided security and data store and data transfer? Hospital Management Systemare large system in network and divided in many section like, administration, Reception account, and many other section in our project.Project are design in “Packet tracer 6.3 v.

1.3 Project details

A hypothetical list of requirement for any basic network would be like the one below-
1. Network access to provided private and publically 
2. Network access for College staff defined many purpose.
3. Network access for all the section on Bank.
4. Special connection for the Reception, and the Bank MD room in office. (like Wi-Fi connection)
5. And whole network is control in sever room in office. 
6. Temporary Network access for the client and users.

1.4 Aim and Objective

The aim ofthis project is a design and simulation of an enterprise network using packet tracer. The design is based on the hierarchical architecture with a model secondary as a case study. The objectives of the study are follow:

a) Design and simulation of an enterprise network, with a model as a case study using packet tracer.

b) Configuration of network devices and evaluation of point-to-point connection.

1.5 Problem Statement

When network devices communication with many other devices, the workload required of the CPUs on the devices can be burdensome. For example, in a large switched network, broadcast packet are burdensome and capacity planning within the network and reducing wasted bandwidth. Network management responsibility and network management system should be distributed to the different layers of a modular network architecture to control management costs.   

1.6 Methodology

In order to design and implement a Hierarchical Model of an Enterprise Network the following methodology was used:

a) Conceptualizing the ideas.
b) Designing the Network Architecture.
c) Configuration of Device in accordance to topology. 
d) Use of dynamic host configuration protocol.
e) Network troubleshooting.

1.8 Project Outline 

Here describes the entire project’s content shortly- 
• Chapter 1 
Describe introduction about network, project, scope and mythologies used.

• Chapter 2 
Mostly dealt with the literature review where the fundamental concepts were carried out.

• Chapter 3 
Designing and implementation in this project.

• Chapter 4
Extensive simulation and network troubleshooting including their various results are presented.

• Chapter 5 
Conclusion and recommendation for future.

Conclusion

In conclusion, a network is two or more computers connected together using a telecommunication system for the purpose of communicating and sharing resources. As you can see, Networks have many benefits to the end user. Weather your Network is Wired or Wireless, Networks are an important part of technology. Now that we've discussed some of the major components of networks and TCP/IP, you have the necessary background to examine the more critical issues of security in a converged environment. Knowing how networks are built gives you a better understanding of what physical or logical vulnerabilities are introduced by choosing one particular network design over another. Knowing how packets are formed gives you a better understanding of how they can be crafted or modified to achieve a specific purpose. Knowing how packets are transmitted and delivered gives you a better understanding of what can happen to packets as they travel from source to destination. A good understanding of the basics of networking and TCP/IP is critical to identifying, understanding, and correcting vulnerabilities in your converged environment.

Chapter 2: Literature Review

2.1 Network Design

This is a network design of a college. In this system was not totally fulfilled. The security of the design is very poor. The network design is to follow the flowchart poor structured engineering principles as listed below:
 
Figure 2.1 Network Architecture

2.1.1 Hierarchy

The theoretical research shows that project on network design for a college work structure cannot effectively reveal the internal relationship between the network structure of a College Management System and its stability, and the empirical research has confirmed that most of a College Management System networks in reality are represented by scale-free or small-world network. The existing empirical studies on the characteristics of a College Management System network of various countries have provided rich results, however, the comparative studies on the stability of a College Management System under different network structures have been relatively few, which also needs other scholars to continue to explore.

2.1.2 Modularity

The model Modularity allows some degree of segregation between different parts of the network and has been suggested to be a prerequisite for the evaluability of biological systems. In technology, modularity defines a clear division of tasks and it is an explicit design target in a College Management System.

2.1.3 Flexibility 

The ability to modify portions of the network, add new services, orincrease capacity without going through a major fork-lift upgrade are key considerations to the effectiveness designs. The structured hierarchical design inherently provides for high degree of flexibility because it allows staged or gradual changes to each module in the network fairly independently of the others.

2.1.4 Resilience 

We examine the role of macroeconomic fluctuations, asset market liquidity, and network structure in determining contagion and aggregate losses in anadmiration, reception,financial system. Systemic instability is explored in a financial and account network comprising three distinct, but interconnected, sets of agents – a college, international financial institutions, and firms. Calibrating the model to publicly available advanced country sector data, we obtain sensible aggregate loss distributions which are bimodal in nature. We demonstrate how systemic crises may occur and analyze how our results are influenced by fireside externalities and the feedback effects from curtailed lending in the macroeconomic. We also show how the model can be used to inform stress-testing exercises of the kind recently conducted by regulators. Interbank Network, Test, Systemic Risk, Firewalls.

2.2 Enterprise Network

An enterprise network is an enterprise's communications backbone that helps connect computers and related devices across departments and workgroup networks, facilitating insight and data accessibility. An enterprise network reduces communication protocols, facilitating system and device interoperability, as well as improved internal and external enterprise data management.

He key purpose of an enterprise network is to eliminate isolated users and workgroups. All systems should be able to communicate and provide and retrieve information. Additionally, physical systems and devices should be able to maintain and provide satisfactory performance, reliability and security. Enterprise computing models are developed for this purpose, facilitating the exploration and improvement of established enterprise communication protocols and strategies.

In scope, an enterprise network may include local and wide area networks (LAN/WAN), depending on operational and departmental requirements. An enterprise network can integrate all systems, including Windows and Apple computers and operating systems (OS), Unix systems, mainframes and related devices like smartphones and tablets. A tightly integrated enterprise network effectively combines and uses different device and system communication protocols. Requirement of an Enterprise Network

2.3 Network Protocol

A network protocol is a set of established rules that dictates how to format, transmit and receive data so computer network devices -- from servers and routers to endpoints -- can communicate regardless of the differences in their underlying infrastructures, designs or standards. To successfully send and receive information, devices on both sides of a communication exchange must accept and follow protocol conventions. Support for network protocols can be built into software, hardware or both. Standardized network protocols provide a common language for network devices. Without them, computers wouldn't know how to engage with each other. As a result, except for specialty networks built around a specific architecture, few networks would be able to function, and the internet as we know it wouldn't exist. Virtually all network end users rely on network protocols for connectivity.

2.3.1 How protocols work

Network protocols break larger processes into discrete, narrowly defined functions and tasks across every level of the network. In the standard model known as Open Systems Interconnection (OSI), one or more network protocols govern activities at each layer in the telecommunication exchange. A set of cooperating network protocols is called a protocol suite. The TCP/IP suite includes numerous protocols across the data, network, transport and application layers, for example, working together to enable internet connectivity. These include: Transmission, which uses a set of rules to exchange messages with other internet points at the information packet level; Internet Protocol (IP), which uses a set of rules to send and receive messages at the internet address level; and additional network protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each of which has defined sets of rules to exchange and display information. Network protocols are often set forth in an industry standard -- developed, defined and published by groups such as the International Telecommunication Union, the Institute of Electrical and Electronics Engineers, the Internet Engineering Task Force, the International Organization for Standardization and the World Wide Web Consortium.

2.3.2 Types of protocols

Generally speaking, networks have three types of protocols -- communication, such as Ethernet; management, such as the Simple Network Management Protocol; and security, such as Secure Shell (SSH).

Falling into these three broad categories are thousands of network protocols that uniformly handle an extensive variety of defined tasks, including authentication, automation, correction, compression, error detection, file retrieval, file transfer, link aggregation, routing, semantics, synchronization and syntax.

2.3.3 Some network protocol examples include

Address Resolution Protocol, Blocks Extensible Exchange Protocol, Border Gateway Protocol, Binary Synchronous Communications, Canonical Text Services, Domain name system, Dynamic, Enhanced Interior Gateway Routing Protocol, HTTP over SSL, device, Protocol, Internet Message Access Protocol, Gopher ,Media access control, Network News Transfer Protocol, Open, Post Office Protocol, Secure, Simple Mail Transfer Protocol, Telnet, Terminal Network, Thread, Transmission, Control Protocol, Transport

2.4 Network Devices

Typical network devices are described in this section.

2.4.1 Routers

A router is a physical or virtual appliance that passes information between two or more packet-switched computer networks analysing a given data packet's destination IP address, calculating the best way for it to reach that destination and then forwarding it accordingly.

A router is a common type of gateway  positioned where two or more networks meet, including at each point of presence on the internet. Hundreds of routers might forward a single packet as it moves from one network to the next on the way to its final destination.

Traditional routers are stand-alone computing devices made up of proprietary software loaded onto dedicated hardware. A virtual router is a software instance that performs the same functions as a physical router, while running on white-box gear -- either alone or packaged with other virtual network functions, like firewall packet filtering, load balancing and wide area network (WAN) optimization capabilities. Other devices, such as wireless access points and network switches, can also include built-in router functionality.

In the Open Systems Interconnection (OSI) model, routers are associated with the network layer (Layer 3), as they connect separate networks via the Internet Protocol (IP).

A router examines a packet header's destination IP address and compares it against a routing table to determine the packet's best next hop. Routing tables list directions for forwarding data to particular network destinations, sometimes in the context of other variables, like cost. They amount to an algorithmic set of rules that calculate the best way to transmit traffic toward any given IP address.

Routing tables can be static i.e., manually configured or dynamic. Dynamic routers automatically update their routing tables based on network activity, exchanging information with other devices via routing protocols. These include: Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol(EIGRP), Exterior Gateway Protocol (EGP), Interior Gateway Routing Protocol (IGRP), Open Shortest Path First (OSPF) and Routing Information Protocol (RIP).

Many routers also perform network address translation (NAT), shielding the private IP addresses of a local area network (LAN) by readdressing all outgoing traffic with a single shared public IP address. NAT helps both conserve globally valid IP addresses and improve network security.

There are several different types of routers. Core routers -- primarily the purview of ISPs -- are the fastest and most powerful, sitting at the centre of the internet and forwarding information along the main fibre optic backbone. Enterprise routers connect large organizations' networks to these core routers.

An edge router, also known as an access router, is a lower-capacity device located at the boundary of a LAN  connecting it to a WAN, the internet and/or external LANs. Home and small office routers are considered subscriber edge routers.

Branch routers link an organization's remote office locations to its WAN, connecting to the primary campus network's edge routers. Branch routers often provide additional features, like time-division multiplexing, wireless LAN management capabilities and WAN application acceleration.
 
Figure: 2.1.1 cisco 7201 router

2.4.2 Switch 

A network switch is a small hardware device that centralizes communications among multiple connected devices in one local area network (LAN).Stand-alone Ethernet switch devices were commonly used on home networks many years before home broadband routers became popular. Modern home routers integrate Ethernet switches directly into the unit as one of their core functions. High-performance network switches are still widely used in corporate networks and data centres. Network switches are sometimes referred to as switching hubs, bridging hubs or MAC bridges. About Network Switches While switching capabilities exist for several kinds of networks including ATM, Fibre Channel, and Token Ring, Ethernet switches are the most common type. Mainstream Ethernet switches like those inside broadband routers support Gigabit Ethernet speeds per individual link, but high-performance switches like those in data centres usually support 10 GBPS per link. Switches can additionally be connected to each other, a daisy-chaining method to add a progressively larger number of devices to a LAN.Switches connect various network devices together, like computers, to allow communication between those devices. Switches feature several network ports, sometimes dozens, to connect numerous devices together. Typically, a switch connects physically, via a network cable, to a router and then physically, again via a network cable, to the network interface cards in whatever network devices you may have. Some popular Switch are use :Cisco, NETGEAR, HP, D-Link.

Figure: 2.1.2 NETGEAR , 24 port switch

2.4.3 Virtual LANs in Switch

A virtual LAN (Local Area Network) is a logical subnetwork that can group together a collection of devices from different physical LANs. Larger business computer networks often set up VLANs to re-partition their network for improved traffic management. Benefits of a VLAN When set up correctly, virtual LANs can improve the overall performance of busy networks. VLANs are intended to group together client devices that communicate with each other most frequently. The traffic between devices split across two or more physical networks ordinarily needs to be handled bya network's core routers, but with a VLAN that traffic can be handled more efficiently by switches instead. Static and Dynamic VLANsNetwork administrators often refer to static VLANs as “port-based VLANs.” A static VLAN requires an administrator to assign individual ports on the network switch to a virtual network. No matter what device plugs into that port, it becomes a member of that same pre-assigned virtual network.

2.5 Wireless Access Point(WAP)

A wireless access point (WAP) is a hardware device or configured node on a local area network (LAN) that allows wireless capable devices and wired networks to connect through a wireless standard, including Wi-Fi or Bluetooth. WAPs feature radio transmitters and antennae, which facilitate connectivity between devices and the Internet or a network.

Wireless access points (WAP) may be used to provide network connectivity in office environments, allowing employees to work anywhere in the office and remain connected to a network. In addition, WAPs provide wireless Internet in public places, like coffee shops, airports and train stations.

Wireless access points are most commonly thought of in the context of the 802 series of wireless standards, commonly known as Wi-Fi. While there are other wireless standards, the vast majority of the time the terms Wi-Fi hotspot and WAP are synonymous.

2.6 Access Control List 

Access control list (ACL) refers to the permissions attached to an object that specify which users are granted access to that object and the operations it is allowed to perform. Each entry in an access control list specifies the subject and an associated operation that is permitted. File system ACL is a data structure that holds entries that specify individual user or group rights to system objects such as processes, files and programs. These entries are referred to as access control entities. Each system object is associated with a security attribute that identifies its access control list. The ACL has an entry for each system user that defines the user's privileges, such as reading a file, writing to a file or executing a file. The operating systems that use ACL include Novell’s Netware, Microsoft Windows NT/2000, Digital's OpenVMS and UNIX-based systems. When a subject requests an object in an ACL-based security model, the OS initially checks the ACL for an applicable entry to decide whether the requested operation is authorized. The ACL model is applicable to both individual entities and the collection of objects within the system hierarchy.

2.6.1 Why use ACL

The following are some of the reasons for configuration ACL in a network-

(a)Limits network traffic to increase network performance.
(b)ACLs provides traffic flow control by restricting the delivery of routing updates.
(c)It can be used as additional security.
(d)Ability to control which areas a client access.

2.6.2 Types of Access Control Lists

The type of ACLs used in networks are described in the following sub-sections:

2.6.2.1 Standard Access List

Standard Access Control Lists (ACLs) are the oldest type of Access Control Lists (ACL). Standard IP access lists are used to permit/deny traffic only based on source IP address of the packets. Standard Access Control Lists (ACLs) can be created by using the "access-lists" IOS command. The syntax of "access-list" IOS command to create a Standard Access Control List is shown below. Access-list [Access _list_ number] [permit | deny] [IP_ address] [wildcard mask (optional)] The arguments are explained in detail below. Access _list_ number: For Standard Access Control List, Access list number must be between 1–99 permits | deny: Whether to permit or deny traffic. IP_ address: An IP address to filter the traffic. Wildcard mask: Instead of specifying a single IP address, you can also permit or deny networks/subnets entirely or partly by using wildcard masks, also known as inverse masks. Wildcard mask is optional in above IOS command.

2.6.2.2 Extended Access List

An extended access list is an ordered list of statements that can deny or permit packets based on source and destination IP address, port numbers and upper-layer protocols. Standard access list can deny or permit packets by source address only and permit or deny entire TCP/IP protocol suite.

2.7 IP Addressing

IP address is an address having information about how to reach a specific host, especially outside the LAN. An IP address is a 32-bit unique address having an address space of 232. Generally, there are two notations in which IP address is written, dotted decimal notation and hexadecimal notation.

Some points to be noted about dotted decimal notation-

1. The value of any segment (byte) is between 0 and 255 (both included).
2. There are no zeroes preceding the value in any segment (054 is wrong, 54 is correct).

Class full Addressing-

The 32 bit IP address is divided into five sub-classes. These are:
• Class A
• Class B
• Class C
• Class D
• Class E

Each of these classes has a valid range of IP addresses. Classes D and E are reserved for multicast and experimental purposes respectively. The order of bits in the first octet determine the classes of IP address.

IPv4 address is divided into two parts:

• Network ID
• Host ID

The class of IP address is used to determine the bits used for network ID and host ID and the number of total networks and hosts possible in that particular class. Each ISP or network administrator assigns IP address to each device that is connected to its network.

2.7.1 Subnet Masking

A subnet mask is a number that defines a range of IP addresses available within a network. A single subnet mask limits the number of valid IPs for a specific network. Multiple subnet masks can organize a single network into smaller networks (called subnetworks or subnets). Systems within the same subnet can communicate directly with each other, while systems on different subnets must communicate through a router. 

A subnet mask hides (or masks) the network part of a system's IP address and leaves only the host part as the machine identifier. It uses the same format as an IPv4 address — four sections of one to three numbers, separated by dots. Each section of the subnet mask can contain a number from 0 to 255, just like an IP address. For example, a typical subnet mask for a Class C IP address is: 255.255.255.0In the example above, the first three sections are full (255 out of 255), meaning the IP addresses of devices within the subnet mask must be identical in the first three sections. The last section of each computer's IP address can be anything from 0 to 255. If the subnet mask is defined as 255.255.255.0, the IP addresses 10.0.1.99 and 10.0.1.100 are in the same subnet, but 10.0.2.100 is not. A subnet mask of 255.255.255.0 allows for close to 256 unique hosts within the network (since not all 256 IP addresses can be used).If your computer is connected to a network, you can view the network's subnet mask number in the Network control panel (Windows) or System Preference (macOS). Most home networks use the default subnet mask of 255.255.255.0. However, an office network may be configured with a different subnet mask such as 255.255.255.192, which limits the number of IP addresses to 64. Large networks with several thousand machines may use a subnet mask of 255.255.0.0. 

This is the default subnet mask used by Class B networks and provides up to 65,536 IP addresses (256 x 256). The largest Class A networks use a subnet mask of 255.0.0.0, allowing for up to 16,777,216 IP addresses (256 x 256 x 256).

2.7.2 Modify Network Design 

The size of network requirements is critical factor for successful implementation of any network design is to follow the flowchart good structured engineering principles as listed below:
 
Figure: 2.1.3. Modify Network Architecture

This is updated design of the previous design. Previous design there is no Wi-Fi system for guest. Here add Wi-Fi for guest in reception area. Here use ACL for security. This didn’t previous design. In this design add Email server in ISP and add FTP server in authorize area. There is no sub area in previous design but in this design divided into sub area like help desk, account department are the sub area of reception area and test area,  report area are the sub area of laboratory department.

2.8 Network Address Translation

Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. One Internet-routable IP address of a NAT gateway can be used for an entire private network.

2.9 Cisco Packet Tracer 

Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks. The software allows users to simulate the configuration of Cisco routers and switches using a simulated command line interface.

Figure: 2.1.4. A packet tracer interface 6.3 version

2.10 Network Models

• For data communication to take place and two or more users can transmit data from one to other, a systematic approach is required. This approach enables users to communicate and transmit data through efficient and ordered path. It is implemented using models in computer networks and are known as computer network models.

• Computer network models are responsible for establishing a connection among the sender and receiver and transmitting the data in a smooth manner respectively.

• There are two computer network models i.e. OSI Model and TCP/IP Model on which the whole data communication process relies.
 
Figure: 2.1.5.Computer Network Models

Computer Network Models: The OSI Reference Model-

• The OSI Model is one of the general purpose networking or communication model among computer network models, which is responsible for establishing connection in an open manner between all the communicable devices present across the globe.

• OSI stands for “Open System Interconnection” and the name of this reference model was given by an organization known as “International Organization for Standardization”. The ISO is responsible for generating and promoting industrial and commercial standards applicable for all the users or universally.

• OSI model is called as “Open Source” because of its “fit anywhere” ability. Any connection can be established using the OSI model unless and until any protocols are not used as OSI model does not support protocol establishment. It runs without the use of protocols. All the networking devices which are open for communication can be connected together for data communication through the OSI model.

• Apart from OSI Model, another computer network models which is widely used is TCP/IP Model.

• OSI model having a layered architecture, allows easy data communication as each layer has predefined structured and functionalities.

• The functionalities are different for each layer and thus when combined together forms the OSI Model. There are in total seven layers in general purpose OSI model.

Figure: 2.1.6. The OSI Reference Model

• The seven layers of OSI model are further categorized into Upper Layers, Network Independent Layer and Lower Layers. Physical Layer, Data link Layer and Network Layer are categorized as Lower Layers. Transport Layer as Network Independent Layer and Session Layer, Presentation Layer, Application Layer as Upper Layers.

Figure: 2.1.7. The OSI Reference Model (Layer Categorization)

• Also, these layers are sequenced in fixed manner and this sequence cannot be changed. It means, any alterations in the positions of the layers are not accepted.

2.11 Internet 

The internet is a globally connected network system that uses TCP/IP to transmit data via various types of media. The internet is a network of global exchanges – including private, public, business, academic and government networks – connected by guided, wireless and fiber-optic technologies.

The terms internet and World Wide Web are often used interchangeably, but they are not exactly the same thing; the internet refers to the global communication system, including hardware and infrastructure, while the web is one of the services communicated over the internet.

2.12 Intranet

An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences. An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks like a private version of the Internet. With tunnelling, companies can send private messages through the public network, using the public network with special encryption/decryption and other security safeguards to connect one part of their intranet to another.

2.13 Peer-To-Peer Networks

A peer-to-peer (P2P) network is group of computers, each of which acts as a node for sharing files within the group. Instead of having a central server to act as a shared drive, each computer acts as the server for the files stored upon it. When a P2P network is established over the Internet, a central server can be used to index files, or a distributed network can be established where the sharing of files is split between all the users in the network that are storing a given file.
 
Figure: 2.1.8. P2P network

2.14 Client/Server Networks

Client/server network is a computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server. Compare peer-to-peer network.
 
Conclusion

The literature on writing literature reviews is generally useful in three areas: describing the aims of the review; suggesting how the literature might be evaluated; and identifying common faults in reviews. The development of computer assisted instruction applications coincided with the historical development of information-communication technologies. Social changes and technological developments in health information systems necessitate that nurses possess certain competencies. Nursing learners have to acquire the required competencies to work in technologically advanced healthcare settings, and to utilise and manage electronic health information systems. The researcher maintained that the required competencies could be developed through exposure to information-communication technologies in the class-room setting. This can be achieved through computer assisted instruction, which can be applied in various formats. Computer assisted instruction has many benefits, but also poses certain problems, which need to be overcome. The researcher envisioned that this research study would contribute towards optimising computer assisted instruction in nursing education. 

Chapter 3: Design Methodology

3.1 Network Design 

The network was designed using different technologies which were very important and crucial for the completion of the task at hand. These technologies deployed were-

a) The Network Architecture
b) Network connectivity 
c) RIP Routing Protocol
d) VLAN
e) DHCP Configuration 
f) Wireless Routing Configuration 
g) Access Control List Configuration (ACL)
h) Network Address Translation (NAT)

The techniques applied in order for it to work as an Enterprise network. They were selected for this purpose so as to meet the fibre optic as well as enterprise network requirement of the topology. 

3.2 Network Architecture 

Every sector is individually connected to the mail line which is connect to all protocol. In the administration section we set a DNS server, RIP Routing Protocol, VLAN DHCP, Wi-Fi configure, ACL and NAT (network address translation) and defined all section (Admiration, reception,) 

Figure 3.1.1 Architectural view of the Network Design

3.3 Network Protocol

The routing information protocol was used as it is a hybrid routing protocol specially meant for routing numerous routers across an enterprise network. A total number of 15 routers were configured with the routing protocols and using DHCP, DNS, ACL and use also NAT protocol. 

3.4 VLAN Configuration 

• Enable routing on the switch with the IP routing command. 
• Make note of the VLANs that you want to route between. 
• Use the show VLAN command in order to verify that the VLANs exist in the VLAN database. 
• Determine the IP addresses you want to assign to the VLAN interface on the switch

3.5 Dynamic Host Configuration Protocol (DHCP)

DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP. DHCP automates and centrally manages these configurations rather than requiring network administrators to manually assign IP addresses to all network devices. DHCP can be implemented on small local networks as well as large enterprise networks. DHCP will assign new IP addresses in each location when devices are moved from place to place, which means network administrators do not have to manually initially configure each device with a valid IP address or reconfigure the device with a new IP address if it moves to a new location on the network. Versions of DHCP are available for use in Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6).
 
Figure 3.1.2 DHCP configuration

3.6 Domain Name System (DNS)

The domain name system (DNS) is the way that internet domain names are located and translated into internet protocol (IP) addresses. The domain name system maps the name people use to locate a website to the IP address that a computer uses to locate a website. For example, if someone types TechTarget.com into a web browser, a server behind the scenes will map that name to the IP address 206.19.49.149. DNS servers answer questions from both inside and outside their own domains. When a server receives a request from outside the domain for information about a name or address inside the domain, it provides the authoritative answer. When a server receives a request from inside its own domain for information about a name or address outside that domain, it passes the request out to another server -- usually one managed by its internet service provider.
 
Figure 3.1.3 DNS configuration

3.7 Wireless Connectivity 

The word wireless is dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.

The GUI of a cisco Wrt300n Wi-Fi. 
 
Figure 3.1.4 the GUI of Cisco WRT300N Wi-Fi

3.8 Access Control List Configuration 

The article also teaches you how to configure them on a Cisco router. Access control list (in further text: ACL) is a set of rules that controls network traffic and mitigates network attacks. More precisely, the aim of ACLs is to filter traffic based on a given filtering criteria on a router or switch interface.so that deny in f0/0 interface and serial port se0/0/0, se0/0.

3.9 Configure Network Address Translation 

This document explains configuring Network Address Translation (NAT) on a Cisco router for use in common network scenarios. The target audience of this document is first time NAT users. Note: In this document, when the internet, or an internet device is referred to, it means a device on any external network. Prerequisites Requirements.

This document requires a basic knowledge of the terms used in connection with NAT. Some of the definitions can be found in NAT: Local and Global Definitions. Components Used The information in this document is based on these software and hardware versions: Cisco 2500 Series Routers.

The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command. Conventions Refer to Cisco Technical Tips Conventions for more information on document conventions.

Conclusion

This chapter presented a recently developed design methodology for transportation networks. The method can be used for the design of road networks and public transport networks. Interaction between both types of networks is implicit in the method. The approach used in the methodology is conceptually very simple. It begins with the formulation of a settlement hierarchy. This is followed by the design of an ideal network that links the settlements with one another. Finally the draft network is compared with the existing network. All this is, in principle, carried out according to a top-down sequence from high to low scale level, with feedback where needed. In order to apply the design methodology, design parameters are used in the various design stages, such as the criteria for the settlement hierarchy, the distances between access points, design speeds and so on. This systematic approach clearly identifies the introduced parameters. Further research is needed to define the optimal value of these parameters since their influence on the eventual design is of crucial importance.

Chapter 4: Results and Discussion

4.1 Show IP Route Command on Core/ISP Router

The result of “show ip route” is as shown in figure 4.1
 
Figure: 4.1 the IP Route of the core

4.2 Verifying Interface Configurations 
 
Figure: 4.1.2 configure interface

4.3 Ping Command

The ping command, as in figure 4.3 is the basic command used to check connectivity successfully 
 
Figure: 4.1.3 ping statistic from PC0 to DNS server

4.4 Wireless Network

After all the necessary configurations, the wireless laptop used automatically connected to the Cisco WRT300N router as seen in figure.
 
Figure: 4.1.4 connection to Wi-Fi router

4.5 Access to Website 

The website server or DNS server was configuring in DMZ and devices in the entire network could link up to it with the IP/DNS address
 
Figure: 4.1.5 a programmed website

Conclusion

This chapter discusses the major conclusions drawn from the results reported in this thesis. A few contributions of significance that have resulted from the investigations conducted and a few limitations of studies carried out are also reported. Possible future extensions of the reported work are also discussed. To bring out the benefits of network coding, the developed framework was applied to WLAN systems to determine their throughput. The throughput was calculated for WLAN which employ SF strategy as well as network coding at the relay node. It is noteworthy that as of today, wireless networks are almost entirely based on SF while network coding represents a possible paradigm shift in SF strategy. Network coding is likely to emerge as an essential technique for future wireless networks.

Chapter 5: Conclusion and Future Work

5.1 Service & Features

Hospital Management System Features are most important think of HMS. A hospital management system is a software designed to manage all the areas of a hospital such as medical, financial, administrative and the corresponding processing of services. interfaces across all modules that facilitate standards conformance interfaces across all modules that facilitate standards conformance. Flow of the financial data with centralized information to the payer modules. Data for the management reviews displays graphically by executive information system (EIS). The billing, insurance processing modules effectively process clinical data for efficient payout for health encounters. Flow of the financial data with centralized information to the payer modules. Data for the management reviews displays graphically by executive information system (EIS). The billing, insurance processing modules effectively process clinical data for efficient payout for health encounter. Design a system for better patient care. Reduce hospital operating costs. Provide MIS (Management Information System) report on demand to management for better decision making. Better co-ordination among the different departments. Provide top management a single point of control.

5.2 Conclusion 

Hospital management and business processes in hospitals have changed considerably over the previous years, as did the use of Information Technology (IT) in their daily works. It was found in our analysis that the use of IS in the hospitals did not develop according to the needs and developments in the hospital organizations over the past decade. Health care in Bangladesh, as in many other countries, is confronted with a growing demand for medical treatments and services, due to factors such as, a ‘growing’ population, and higher individual standards for quality of life. This work is focused on the development of a computer aided Hospital Management System and specifically on hospital information systems (IS). An interesting question is how organisational, managerial and IT developments take place in hospitals, and how these developments influence each other, in terms of impact, alignment, and reinforcement. Modern hospitals nowadays supply professional services, in stead of products. Hospitals had a high cost technological infrastructure in order to sell medical services. This organisational type is now under pressure, due to the changes in society, politics and population. Hospitals can respond to these pressures by transforming into ‘functional specialization’. In this way the organisation tries to reduce costs and to improve the quality of specialized medical services. The application of e-health solutions has brought a number of advancements in the health care industry. E-health solutions across the globe have helped in improving the healthcare facilities across the globe in the both developed and developing nations where e-healthcare system has been implemented. In an effort to provide healthcare conditions developing countries are striving to revolutionize their healthcare system using ICTs in many different ways. The present study focused on finding the pros and cons of rural healthcare sector in three districts; Hisar, Rewari and Kurukshetra. A number of issues examined include; poor ICT infrastructure and e-health technologies, lack of knowledge of patients, hospital management and staff in terms of e-healthcare technologies, lack of resources and infrastructure in hospitals and clinics. Unless these challenges are addressed, the rural hospitals will continue to provide services that are inefficient, costly, inaccessible and substandard as is the case currently. This calls for a way to deal with these challenges, which have crippled the implementation of e-health solutions. The present study also proposed a sustainable e-healthcare model for it implementation in rural communities in future.

5.3 Recommendation for Future Work

a) Additional access control Lists (ACLs) should be implemented throughout the network to provide robust end-to-end security.

b) IPv6 addressing can be implemented to overcome any limitations in the number of hosts that can be used due to the available address space.

c) Additional configuration can be implemented on the network so as to make video conferencing possible in addition to currently-available VoIP (VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks) capabilities.

REFERENCES

[1] Behrouz A. Forouzan, “Data Communications and Network”, 5th Edition in McGraw- Hill Encyclopedia of Science & Technology, New York: McGraw- Hill, February 2010. 
[2] Behrouz A. Forouzan, “TCP/IP Protocol Suite”, 4th Edition in McGraw- Hill Encyclopedia of Science & Technology, New York: McGraw- Hill, April 2009.
[3] William Stallings, “Cryptography and Network Security Principles and Practices”, 4th Edition, San Francisco: Prentice Hall, November 16, 2005.
[4] Bradley M. "INTERNET & NETWORK," www.Lifewire.com, Networking devices information, last update in November 2019.[HTML].
[5] Unknown "Wireless Networking," www.techopedia.com, wireless access point& Access control List, last update inJanuary,2020. HTML].
[6] Mayank K.&Gaurav M." Thisarticle (IP Addressing), “www.geeksforgeeks.org, Network protocol information, last update in January,2019. [HTML].
[7] Margaret R. "Introduction of Network," www.searchnetworking.techtarget.com, Network protocol, last updated in January,2020.[HTML].

Post related things: Project Paper, Introduction to Networking, Introduction to Project, Project Details, Aim and Objectives, Problem Statement, Methodology, Project Outline, Literature Review, Network Design, Hierarchy, Modularity, Flexibility, Resilience, Enterprise Network, Network Protocol, How protocols work, Types of protocols, Some network protocol examples include, Network Devices, Routers, Switches, Virtual LANS in Switch, Wireless Access Point(WAP), Access Control List, Why use ACL, Type of Access Control List, Standard Access List, Extended Access List, IP Addressing, Subnet Masking, Modify Network Design, Network Address Translation, Cisco Packet Tracer, Network Models, Internet, Intranet, Peer-To-Peer Networks, Client/server Networks, Design Methodology, Network Design, Network Architecture, Network protocol, VLAN Configuration, Dynamic Host Configuration Protocol, Domain Name System, Wireless Connectivity, Access Control List Configuration, Configure Network Address Translation, Result And Discussions, Show IP Route Command on Core/ISP Router, Verifying interface configuration, Ping Command, Wireless Network, Access to web, Service & future, Conclusion, Recommendations for future work, References



Recent Post

Categories