Final Project
Final Project
Final Project
Borlongan, Monica
Panganiban, Janne Mariu
Casama, Jan Karl
BSCS3A
1. Network Topology. Define the overall structure, such as whether it's a star,
bus, ring, or a hybrid topology.
- We have selected the star topology for our network topology. This is
the most frequently employed topology in workplace or home
environments due to its simplicity of installation and ability to easily
add more computers to the central node. Therefore, it is widely
considered the simplest type of network topology to design and set
up. The primary benefit of the star topology is its ability to seamlessly
add or remove new peripherals without causing any disruption or
failure to other peripherals connected to the central hub.
- Another benefit of the star topology network is its centralized
management, which facilitates network monitoring and prevents the
failure of one node from affecting the entire network. A significant
drawback of a star topology is the reliance of all peripheral devices
on a central device, resulting in a complete network failure if the
core device malfunctions.
- Benefits of star topology The advantage of a star network is that if a
cable fails, only the node connected to that cable will be affected.
Additionally, it is easy to connect two star networks together by
linking their central devices. The network is also easily managed due
to its centralized management.
- The disadvantages of star topology include the potential for
complete system failure if the central device malfunctions, leading to
the loss of connectivity for all computers.
IP Addressing:
An IP address, short for Internet Protocol address, is an exclusive numeric
identifier given to any device that is linked to a computer network.
IP addresses come in two versions: IPv4, which is 32 bits long, and IPv6,
which is 128 bits long. IPv4 addresses are more prevalent.
DirectAccess.
By using multi-factor authentication, keeping your VPN software
up-to-date, and using strong encryption techniques (like AES),. Make sure
your users know how to recognize phishing efforts, create secure
passwords, and report any strange activity.
Protective measures:
Firewalls, intrusion detection, and VPNs should be enforced. Update
security protocols regularly to avoid vulnerabilities. Monitor and manage
each topology with network monitoring tools.
Improve network administration with centralized management.
This approach simplifies small networks, provides stability for analyst and MIS
tasks, and makes wireless technology accessible for company-wide use.
Specific requirements and future scalability may demand adjustments.
Network performance depends on regular maintenance and monitoring.
7. Software-Defined Networking (SDN). Explore how SDN can be integrated
to centrally manage network resources and enhance flexibility.
Integrated Network with IoT Devices: Short Disaster Recovery Plan (DRP)
- Network Overview:
The network is designed for small networks using a mix of bus and mesh
topologies. IoT device integration is secured by network segmentation,
encryption, and access controls.
- Diagram of network: This diagram shows the bus topology for small
networks, mesh topology for Analyst and MIS, and wireless router for
company-wide access.
- Small Network Bus Topology Configuration: Connect devices via a single
coaxial or RJ45 connection.
- Isolating IoT devices with VLANs.
Reason: Simple and cost-effective for small networks.
VLANs protect and isolate IoT devices.
- Configure Mesh Topology for Analyst and MIS with SDN Integration.
The mesh centralizes IoT device management.
The rationale is to ensure scalability and redundancy for essential functions.
SDN enables dynamic IoT data flow traffic engineering.
- Configure Wireless Router: - Secure configuration with WPA3, separate
SSID for IoT devices, and access controls.
Justification: Offers company-wide wireless connectivity.
Helps IoT devices communicate securely.
- IoT Device Security: Configuration: Strong authentication and access
controls. Communication encryption between IoT devices and the
backend.
- Justification: Reduces danger of data breaches and illegal access.
Protects IoT data transmission.
Summary:
The network architecture and documentation aim to integrate IoT devices
securely, scalable, and resiliently to provide business continuity in the face
of unexpected events.This extensive documentation helps network
administrators manage, diagnose, and improve. As the network changes,
documentation should be updated and reviewed.