ReportAssignment2.Vi.en
ReportAssignment2.Vi.en
com
Assignment 2
Index
1 Task assignment 3
7 System Review 27
7.1 Technologies realized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
7.2 Evaluation criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
7.3 Future development orientation . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1 Task assignment
• Medium size: 600 workstations, 10 servers, 12 network devices (or more with security-
specific devices).
• There is a data center and central cable room 50m from the two buildings.
• Use new technology for network infrastructure including wired and wireless connections, fiber
optics (GPON), and GigaEthernet 1GbE/10GbE. Organize the network according to VLAN structure
for different departments.
• The headquarters subnet connects to the two branch subnets using two dedicated
channels (Leased lines) for WAN connection and two digital subscriber lines (DSL) for
Internet access with load balancing. All traffic to the Internet goes through the
headquarters subnet.
• Use a combination of licensed and open source software, office applications, client-
server applications, multimedia applications and databases.
• Propose VPN configuration for connection between branches and for remote workers to
connect to the hospital LAN.
• The branch building has 2 floors, the first floor has an IT room and a local central
cabling system.
Deploy the connection between headquarters and branches through WAN links (can
choose one of the technologies such as SD-WAN, MPLS,...)
• Each workstation is used for browsing the Web, downloading documents and transacting with customers,... The
estimated total download is about 500 MB/day and the estimated upload is 100 MB/day.
• The WiFi connected devices of the guests accessing to download is about 500MB/day.
Hospital's network system is estimated to have a growth rate of 20% in 5 years (in terms of number
of users, network load, branch expansion, etc.).
• Each floor is sized to accommodate about 60 people working at the same time.
• Found the best carrier for the building location.
• The building has its own wiring, no need to install wiring yourself.
• Each floor needs to provide a wireless network system, with a maximum of 60 devices connected at the same time for
each floor. Each room must have no more than 6 workstations. A separate wireless network for the Reception Room
with a maximum of 70 devices connected at the same time.
1.Floor 1:
2.Floor 2:
• Server farm and DMZ:There are 5 servers serving internal hospital work and 1 Web
server in DMZ.
3.Floor 3:
4.Floor 4:
• Marketing and Sale Department:There are 6 workstations and some other wireless
network devices (maximum of 60).
• Administration:There are 6 workstations and some other wireless network devices
(maximum of 60).
5.Floor 5:
– 1st floordivided into 3 areas, including 2 small rooms and 1 large room. The small room will
be used as the Reception room and Server room, the large room will be the working space
for the staff.
– 2nd floordesigned as a studio, meaning there are no separate rooms for each floor.
Each floor is sized to accommodate 40 people working at the same time.
• Each floor needs to provide a wireless network system, with a maximum of 130 devices connected at the same
time for each floor. A separate wireless network for the Reception Room with a maximum of 260 devices
connected at the same time.
Branch in DBP
1.Floor 1
Branch in BHTQ
1.Floor 1
The 2nd floor of the headquarters and branches is the area where many PCs and servers are located along with
the central cable system, so this is also the area with the highest load.
After conducting a survey and reviewing the network system requirements, we can easily
identify areas with high loads in the Hospital, including:
• Web Server System:Allows all Internet users to search for information and exchange
information with the website. Therefore, it is necessary to ensure access speed and stability.
• Data Center and Network (Headquarters:)Central to all traffic, high server utilization.
• Floor 1 (Sub-branch):There is an IT room where local traffic is aggregated and server load is
handled.
• For the above heavy load locations, the system will apply appropriate load balancing mechanisms.
Load balancing can be applied by letting heavy jobs and services such as mail, file
exchange, branch connection, etc. go through leased lines to ensure strong transmission, fast
and stable data transmission/reception speed; for lighter jobs such as web access, it goes
through xDSL lines to minimize system costs. The system applies load balancing method
when connecting the head office with branches through 2 leased lines and 2 xDSL to access
the Internet with load balancing mechanism. Servers are also divided into separate jobs to
avoid overload when concentrating jobs on one server.
In the hierarchical network design model, the network system is divided into several levels (layers). These
levels are connected to each other in a hierarchical form, allowing the network system to be divided into
Small blocks are easier to manage and these blocks limit local traffic. This model can be
applied to both LANs and WANs.
A common layered network model has 3 layers: Access Layer, Distribution Layer, Core
Layer.
• VLAN and security support:This design enables efficient VLAN deployment to segregate
traffic between departments, enhance security, and improve performance.
• High initial cost:Deploying a hierarchical network requires purchasing additional equipment, such as
core and distribution layer switches, which increases the initial cost.
• Complex configuration:This design requires careful planning and configuration, especially for
cross-layer communication, protocol redundancy, and VLAN management.
• Challenges in maintenance:Ensuring the system is functioning properly and updated regularly for
all classes requires skilled personnel and constant monitoring.
After considering the pros and cons, the team concluded that a hierarchical network design is the optimal
choice for hospital networks due to its scalability, security, and efficient management. Although it may increase
complexity and initial costs, the long-term benefits outweigh the drawbacks, ensuring stable and efficient
network operations for critical healthcare services.
– Subnet mask: Used to divide IP addresses. Here we use IP addresses starting from
192.168.1.1. Each VLAN will have a different IP range to help optimize IP address
allocation.
– DMZ network subsystem: Includes web server system, dns for customers and internal
access. On the web server there are online transaction systems of the hospital, Internet
Hospital, lookup of hospital products and services, advertising information,...
– Using DHCP: This is a protocol that allows automatic allocation of IP addresses along
with other related configurations such as subnet mask and default gateway. Computers
are automatically configured, thus reducing the need for intervention in the
appropriate network system in large-scale models. It provides a central database to
track all computers in the network system. The most important purpose is to avoid the
case of two different computers having the same IP address.
∗Without DHCP, machines can configure IP manually (static IP configuration).
Configuring a static IP address for a few machines is possible, but for many machines it is
time-consuming and error-prone. DHCP is responsible for quickly, automatically and centrally
managing the distribution of IP addresses within a network.
– Low cost.
– It allows easier network management and troubleshooting, expanding the network by
adding additional devices will be much faster and easier.
– If one machine has a problem, it does not affect the others.
• Allows multiple users to connect over the same network in a very short time without any
configuration, connections can be made through routers or hotspot technology. This
ease of use and convenience is not available in wired networks.
• Installing a WiFi access point is relatively easy compared to a wired network connection. Compared to a wired
network connection, wireless networks offer significant advantages in terms of cost and labor.
• Although wireless networks have used many encryption techniques, Wifi is still
vulnerable to hacking. Due to its wireless nature, it is highly vulnerable to attacks,
especially public wifi networks. Since public wifi networks are open to anyone, hackers
can impose their fake network ID. Users can unknowingly connect to this fake ID and
become victims of cyber attacks.
• Wifi speed will decrease as we move away from the access point. In multi-story
buildings, Wifi strength can vary on different floors.
Figure 2: Router2811
– Total ports: 2.
– Number of expansion slots: 9.
– Ethernet technology: FastEthernet.
– Standard memory: 256 MB.
– Maximum memory: 760 MB.
3.1.2 Switch
• Layer 2 Switch:Used to create connection devices on the same floor, using switch 2960-24TT.
Figure 3: Switch2960-24TT
3.1.4 Firewall
• Firewall:Ensure secure access. Limit risks from malicious data when accessing the
Internet. Use Cisco 5506 firewall.
3.1.5 Modems
• Modem:is a hardware device that converts data from a digital format, used for direct
communication between devices with dedicated wiring systems, into a device suitable for
transmission media such as telephone lines or radio. There are 2 popular modems: DSL and
cable. Use DSL-AX82U Modem, DSL because they have more stable speeds than cable
modems.
Figure 7: DSL-AX82U
In addition to the above devices, there are other devices: servers, computers participating in the
LAN, wireless connection devices,...
Building B:
All internal IP addresses of the above workstations are dynamically assigned by DHCP protocol.
Internal network IP addresses of servers in the Server farm are all statically assigned.
• In addition, on the first floor there is also an Access Point to provide wifi for customers when
coming to the bank. For connection between branches:
– The headquarters connects to the branches by WAN connection using OSPF protocol.
– The headquarters uses two leased-lines directly to the routers at the branch side. The
branches only need to connect to the headquarters without having to connect to each other.
– 2 DSL modems are designed to balance load when transmitting data to the internet.
• System data flows and workloads (about 80% of daily load is concentrated in peak hours
9am - 11am and 3pm - 4pm)
• Servers for software updates, web access and database access,... Estimated total
download is about 1000 MB/day and estimated upload is 2000 MB/day.
• Each workstation is used for Web browsing, document downloading and customer transactions, etc. The
estimated total download is approximately 500 MB/day and the estimated upload is 100 MB/day.
• The WiFi connected devices of the guests accessing to download is about 500MB/day.
Hospital's network system is estimated to have a growth rate of 20% in 5 years (in terms of number of
users, network load, branch expansion, etc.).
440000
= 15.28MB/s =122.22(Mbps) (2)
8×3600
Since 80% of network traffic is concentrated in 3 peak hours, the system bandwidth is:
440000∗0,8
= 32.592MB/s =260.742(Mbps) (3)
3×3600
To meet the demand in the next 5 years, the system bandwidth will increase by 20%. Therefore, the
required bandwidth is:
4.2 Branches
The branch consists of 260 workstations, 2 servers and assumes 50 wireless network
accesses. Total download and upload traffic in 1 day:
187000
= 6.493MB/s =51.943(Mbps) (6)
8×3600
Since 80% of network traffic is concentrated in 3 peak hours, the system bandwidth is:
187000∗0,8
= 13.851MB/s =114.4095(Mbps) (7)
3×3600
To meet the demand in the next 5 years, the system bandwidth will increase by 20%. Therefore, the
required bandwidth is:
6.4 Check the connection between PCs at the headquarters and branches
Perform a ping to test the connection between the headquarters and the sub-headquarters.
PC2 logs in to the account test1@gmail.com (account and password: test1), then sends an
email to test2@gmail.com .
PC3 logs into the account test2@gmail.com (account and password: test2), then proceeds to receive
and view the email content.
7 System Evaluation
7.1 Technologies that have been realized
1.VLAN Configuration and Inter-VLAN Routing
• Divide the network into independent VLANs, creating traffic isolation between departments,
enhancing security and supporting management.
• Use Inter-VLAN Routing so that VLANs can communicate efficiently over Layer 3.
2.OSPF routing protocol:Provides dynamic routing capabilities, optimizing traffic between sites
and automatically recovering in the event of a failure.
4.Wireless system:Using Access Point supporting dual-band and WPA3 security standard,
ensuring stable connection, high security.
• Advantages: The system uses a hierarchical network model with redundancy mechanisms at the
core and distribution layers to ensure high reliability and minimize downtime. Furthermore, the
application of technologies such as GPON and high-speed Ethernet (1GbE/10GbE/40GbE) provides
stable performance.
• Disadvantages: The system can be affected if core devices or WAN lines have
serious failures without adequate redundancy.
2.Ease of Upgrade:
• Advantages: The hierarchical model allows for the addition of devices at each layer without
changing the entire system. Modern devices with scalable ports and bandwidth make it easy
to upgrade as the network grows at an expected rate of 20% over the next 5 years.
• Advantages: The system supports many open source and copyrighted software
such as HIS, RIS-PACS, LIS, CRM, along with office, multimedia and database
applications, ensuring full satisfaction of hospital usage needs.
• Disadvantages: Managing and maintaining multiple types of software requires highly skilled
IT staff and centralized management resources such as powerful servers and databases.
4.Network Safety
• Advantages: Using VLANs for each department helps reduce the risk of
unauthorized access. VPN and SD-WAN protocols enhance security for inter-facility
connectivity.
• Disadvantages: Disadvantages: The system has not fully implemented anti-attack
measures such as firewalls, phishing detection or data protection from serious
security vulnerabilities.
• Deploy site-to-site VPN and VPN for remote workers with high security protocols
like IPsec or SSL.
• Incorporate two-factor authentication (2FA) to enhance remote access security
3.Add load balancer:Add a load balancing mechanism to serve the system during peak
times, limiting congestion or server crashes.