Sunday, 25 June 2023

Description of the Network Diagram Software Used :- Draw.io

The software that has been used in developing the network diagram is Draw.io. Draw.io is a web-based diagramming tool that can be used to create network diagrams. Network diagrams are visual representations of a computer network, illustrating the components and connections between devices such as routers, switches, servers, and clients. This Draw.io allows the users to create diagrams that represent the layout and structure of a network. It provides a wide range of network-specific icons and shapes to depict routers, switches, servers, firewalls, PCs, printers, and other network devices. By the provided icons, users can facilitate the documentation of network design by creating a detailed diagram that captures the planned or existing network architecture including the placement of the devices, connectivity between the components, and the flow of data. To distribute the task among our group's members equally, these software tools provide collaboration features which allow us to do a networking diagram together. This feature helps to increase our performance to finish the diagramming of a network.

The steps in using Draw.io:

1. Search Draw.io in the Google search engine.
2. Create a new blank project.
3. Rename the project with a suitable name based on your preferences.
4. Add the networking icon by clicking "Add More Shapes" button.
5. Scroll down and tick for the network and applied it.
6. Begin diagramming your network by dragging and dropping the desired icons onto the canvas.
7. Arrange and connect the network components to reflect the desired network topology.
8. Add labels, text, and annotations to provide additional information about the network components and connections.
9. Customize the appearance of the diagram by adjusting colors, line styles, and other visual elements.
10. Save the diagram and export it in your preferred format for sharing or further editing.

Screenshoot of software tool:

Network Architecture at Computer Centre

The purpose of UTeM Computer Centre is to provide comprehensive computing and information technology services to support the academic, research, and administrative activities of the university. The Computer Centre serves as a centralized hub for IT-related services, resources, and support for the UTeM community, including students, faculty, and staff. This computer centre consist of 3 layer of floor (1st floor, 2nd floor, and 3rd floor) with the main entrance at the 2nd floor. Here is the network architecture for this building:

Network Topology: Star Topology

The network topology used is star topology. In this star topology, all subnetworks are connected to the computer center router. All the subnetworks can be managed individually from the computer center which makes any troubleshooting easier. Star topology is also scalable, so any devices can be added to the network by connecting them to the central hub.

Other than that, only specific connections will be affected if any devices or cable fails in a star topology. The rest of the network will not be affected and continues to function normally. So this fault isolation will facilitate the troubleshooting process because the devices that cause the problem can be identified and replaced without affecting the entire network.

Besides, star topology can improve network performance and increases data transfer speed because it eliminates the need for the devices to share bandwidth. The security level can also be enhanced using this topology because it is easier to implement security measures like firewalls and access control lists at the central point when all devices are connected to a central hub. This centralization makes it easier to manage and update security policies and ensure consistent security across the network.

Communication Media: Wi-Fi and UTP cable.

UTP Cable:
In general, UTP cables cost less than other network cable types like fibre optic cables. As a result, they are an affordable option for creating networks, particularly over shorter distances. Besides, installation and termination of UTP cables are simple. They make use of industry-standard connectors like RJ-45, which are generally accepted by networking hardware. They are a practical option for creating networks because of how simple they are to install.

Wi-Fi:
Due to its adaptability and ease, Wi-Fi is used to create networks for the computer center. It eliminates the need for physical connections within a building by enabling wireless connectivity between devices.Furthermore, Wi-Fi is suited for short- to medium-range distances and can deliver respectable bandwidth. It is especially helpful for portable electronics and places where installing cables is difficult.

Networking Devices: Router, Switch, and Wireless Access Point (WAP)

Router:
A router joins various networks, including LANs and wide area networks (WANs), together. Devices can connect across networks because it routes network traffic based on IP addresses between them.

Switch:
A switch is a piece of equipment that joins various LAN-connected devices together. It increases network efficiency by receiving data packets and only forwarding them to the intended recipient device.

Wireless Access Point:
By transmitting a wireless signal, a wireless access point enables wireless devices to join a wired network. It serves as a focal point for wireless communication and makes Wi-Fi connectivity possible up to a certain distance.

Addressing Technique: VLSM Addressing

VLSM Addressing has been selected for use in our project. For UTeM, VLSM offers a number of advantages, including:

Scalability: Due to the ability to assign subnets of various sizes, VLSM offers scalability. UTeM may expand and enhance its network infrastructure thanks to this flexibility without having to renumber or modify the current IP addresses.

Efficient IP Address Allocation: By assigning subnet masks based on the actual number of host needed in each subnet,VLSM optimizes the usage of Ip address.

Network Segmentation: UTeM can divide its network into more manageable subnets by using VLSM. Network control, security, and performance are all improved by segmentation. Separate subnets can be provided to various offices, structures, or campus locations to facilitate effective management and troubleshooting.

Thursday, 25 May 2023


BIL

NAME

MATRIC NUMBER

1.

WAFIR DZHINI BIN ROZUKI

B032110304

2. 

MUHAMMAD IKMAL BIN BADROL HISHAM

B032110326

3. 

MUHAMMAD AKMAL BIN MOHD ADIB

B032110204

4. 

IMRAN IHTISYAM BIN ZAKAYE

B032110407

5. 

IDRIS MAHMOR ALIIMRAN BIN MUSTAPA

B032110169



Proposed Solution For UTeM Network Infrastructure


Figure 1.0



Network Topology: Star Topology

        The network topology used in Figure 1.0 is star topology. In this star topology, all subnetworks are connected to the computer center router. All the subnetworks can be managed individually from the computer center which makes any troubleshooting easier. Star topology is also scalable, so any devices can be added to the network by connecting them to the central hub.

        Other than that, only specific connections will be affected if any devices or cable fails in a star topology. The rest of the network will not be affected and continues to function normally. So this fault isolation will facilitate the troubleshooting process because the devices that cause the problem can be identified and replaced without affecting the entire network.

        Besides, star topology can improve network performance and increases data transfer speed because it eliminates the need for the devices to share bandwidth. The security level can also be enhanced using this topology because it is easier to implement security measures like firewalls and access control lists at the central point when all devices are connected to a central hub. This centralization makes it easier to manage and update security policies and ensure consistent security across the network.

Communication Media: Fiber Optic

        In this network infrastructure, we use fiber optic cable as communication media to connect from the computer center's router to all 10 subnetwork's routers because it can transmit large amounts of data at high speed over long distances without significant signal degradation. It also provides higher bandwidth compared to other copper cables.

        Besides, fiber optic cables provide a high level of security in data transfer. They don't emit signals, therefore it's hard for would-be eavesdroppers to connect to the network and steal data. Furthermore, fiber optics give an extra layer of physical protection because it is challenging to tap them without significantly disrupting the network. 

        Furthermore, fiber optic cables are lighter and thinner compared to copper cables. These make them simpler to install, handle, and manage. Higher-density installations are possible since they may be packed together and take up less room in cable ducts. 

        Last but not least, fiber optic has a high potential for future growth. Fiber optics can sustain larger data speeds thanks to advancements in transmission technology as network demands rise. It is frequently simpler and more affordable to upgrade fiber optic infrastructure than to completely replace a copper-based network. The features and advantages that fiber optic provides make it suitable to be used in UTeM network infrastructure

Networking Devices: Router

        For networking devices, we use the router. This is because routers can enable network segmentation by dividing a large network into smaller subnetworks. This will enhance the network performance. By enabling the creation of new subnets or networks without interfering with the existing infrastructure, routers also aid in network scalability.

       Conversely, routers often include built-in security features, such as firewalls and access control lists (ACLs).  With the help of these features, routers can examine and filter network traffic, guarding against malware, unauthorized access, and other security risks. Routers contribute to overall network security by implementing security policies at the network edge.

         In addition, routers can be configured for redundancy and failover purposes. In the event of a router failure, backup pathways and automated failover can be provided by routers by implementing protocols like the Virtual Router Redundancy Protocol (VRRP). This increases network dependability and minimizes downtime. Another reason we use routers is that its straightforward to set up and manage because of their user-friendly interfaces that facilitate technicians to configure and manage the devices.
















Wednesday, 24 May 2023

Introduction

Group 10 Data Communication and Network Project


 Background

Universiti Teknikal Malaysia Melaka (UTeM) is a technical university in Malaysia. It offers many courses and programs that related to technical program such as engineering, iformation technology and many more. This university located in Melaka and offers many levels of education starting from diploma, degree, master and Ph.D. UTeM's has their main campus complete with a Computer Centre and the other 10 subnetworks which are FTMK,FKE,FKEKK,FKM,FKP, Post Graduate Centre, Canselory Office, Register Office, Library, and Sport Centre.

Business Operations

The university provides good education system for the community. The university want to make a highly qualify graduates for the future in the industry so, they offers many courses and programs to be enrolled by the students. These programs will lead them to their success in the field that they wanted. In addition, UTeM also provides complete equipment for the students to make them more understand in hands-on works.

The Network Needs of The Organisations

 Data transmission and exchange across various systems and devices is a component of data communication and networking. It includes the methods, rules, and ideas that make effective network communication and data transfer possible. Some key concepts that are related to data communication and networking are data transmission, data transmission modes, data channels, bandwidth, network topologies, network protocols, packet switching, routing, network security, and network addressing.

    For this project, we used many concepts of data communication and networking to develop a good and quality networking infrastructure for UTeM's Main Campus. Using a proper network concept will lead to a stable network in the community. This will give many benefits to the user to use the infrastructure easily. As we know, network access is important in education right now as technologies have grown a lot. As the network engineer, it is our responsibility to provide a good network to access and ease all sides of the education community

Subnet Mask Addressing

VLSM Calculation

Link For Presentation Video

Here is our group presentation video: