N5 Wireless Robot Competition at Science and Technology ...
-
Upload
khangminh22 -
Category
Documents
-
view
5 -
download
0
Transcript of N5 Wireless Robot Competition at Science and Technology ...
N5
2…..
Content:
1. Objectives
1.1 Background context, needs……………………………………………P.4
1.2 Current difficulties without the use of IT……………………………..P.6
1.3 Purposes and benefits of the project…………………………………..P.7
1.4 Target user, situation of use…………………………………………....P.7
1.5 Users requirements and scope of project……………………………...P.8
2. Analysis
2.1 Understanding of the problem: identify key sub-problems…………...P.10
2.2 Possible alternative methods…………………………………………..P.12
2.3 The criteria of the selection……………………………………………P.19
3. Design and Implementation
3.1 The information collection process for creating the solution………….P.21
3.2 The overall plan or structure of the solution…………….…………….P.23
3.3 The major parts involved in the solution relations of others………….P.24
3.4 The problems arising in implementation and dealt with……………...P.26
3.5 Complete the design of the network environment which is able to provide the
following services……………………………………………….…….P.28
3.6 IP address management………………………………………………..P.30
3.7 Network Security………………………………………………………P.31
3.8 Types of network connection…………………………………………..P.33
3.9 Cost of setting up the network…………………………………………P.34
4. Testing and Evaluation
4.1 Checklist and testing plane…………………………………………….P.35
4.2 Limitation of network design…………………………………………..P.44
N5
3…..
5. Conclusion & Discussion
5.1 The achieved requirement and improvement..................................…...P.45
5.2 Improvements…………………………………………….……………P.45
5.3 Insights gained on learning about how to learn / solve the problems….P.47
5.4 Knowledge discovered which is relevant for other people similar projects in
the future………………………………………………………………..P.48
6. Documentation
6.1 User instruction………………………………………………………….P.49
6.2 Method for creating the solution…………………………………………P.51
7. Acknowledge………………………………………………………………. P.52
N5
4…..
1. Objective
1.1 Background context, needs
ABC school is going to organize a wireless robot competition at its Science and
Technology Learning Centre (STLC). I will define the scenario of the wireless robot
competition at STLC. In addition, I will design its network environment by using the
desktop computer and some mobile devices to from a W-LAN for ‘even results
recording’, ‘instant communication’, ‘high confidentiality and availability of the network’,
‘attendance taking’, and ‘integrity of the network’. The network is also need to have the
following services. For example, the network can sharing of programming data stored in a
disk drive, transmission of computer programs to the robot through Wi-Fi. Beside we
need to think over the settings of the computer, which need to allow the programming of
individual robots through student network accounts. These are all we need to have in
mind during network design.
Scenario of the robot competition day involves the type and functionality of different
mobile devices, location, floor plane and distribution of access points, data security and
access control types of network connection, cost of setting up the network, limitations of
the network design and other special network requirements.
N5
5…..
The floor plan of the Science and Technology Learning Centre
More details about the robot competition day. The competition will start from 21st
December to 25th December. There are about 50 teams of student will enter the
competition. There will be totally 80 crews in the robot competition day. In addition,
there will be four kinds of events will be complete during those 5 days. Moreover, there
are total three awards will be produced after 5 days competition.
The schedule of the competition:
Date (Time) Events
21/12 (1:30p.m. – 5:00p.m.) Opening ceremony and robot design competition
22/12 (1:30p.m. – 5:00p.m.) robot running races
23/12 (1:30p.m. – 5:00p.m.) Robot beat a drum
24/12 (1:30p.m. – 5:00p.m.) Robot quizzes
25/12 (1:30p.m. – 5:00p.m.) Awarding and closing ceremony
N5
6…..
1.2 Current difficulties without the use of IT
1.2.1 Decrease in working abilities and efficiency
Without using the internet technology environment, there is difficult for the students
or staffs of the participant to contact the host institution. And it takes longer time for the
host institution to responds the request of the participant. Beside there is not enough space
for the staff to watch the competition, therefore if there have not any camera the staff of
the participant can not know what is going on during the competition.
1.2.2 Slow speed of data communication
For instants, the speed and rate of data communication on competition day will be
very slow. Since the transmission of messages can only be done by running from one side
to another side by crew. Sometime time there are large amount of message will be get loss
during transmission and it also causes wasting of time and inconvenient of user, which
will totally decrease the rate and speed of data communication and make the competition
more inefficiency.
1.2.3 Inconvenient of result marking
Moreover the result of the event are only can be marked on the marking sheet. It
takes a great trouble for the staff of the participant to check the result of their team. And it
also make very inconvenient for the host to make correction of the marking. Sometime
there will be time taking during the competition, the time between the fist and second
runner-up may be just 0.1 second. If we are not using the internet technology, the result of
the event can not be taking accuracy.
1.2.4 Inefficiently using of resources
Without using IT technology, crew and staff need to use more other
resources to hold the robot competition. For example, staff may need
to mark the result of the team by using a pen and a notebook. The
N5
7…..
accuracy of the results will be reduced and may affect the results of the
competition.
1.3 Purposes and benefits of the project
1.3.1 Purposes
The purpose of the project is to using IT during the Robot competition days for the
transmission of computer programs to the robot through Wi-Fi, sharing of programming
data stored in a disk drive and allows student network account to control the individual
robots by using programming. During the event, the purposes of the project should also
include automatic calculation of results, user-friendly environment and automatic
calculation of results
1.3.2 Benefits
The benefits of the project are as follows:
a) It can increase the crew and teams’ productivity and efficiency.
b) It can sharing programs data stored in disk
c) It can increase automation and local communications capabilities.
d) It can provide the means of exchange data between computers.
e) It allows data transmit between computer and robot.
f) It transmission of computer programs.
g) The results can be backed up and managed easily.
1.4 Target user, situation of use
1.4.1. Crew
The crews are important in the robot competition, they have a great amount of data
need to be marked and shipping. Therefore PDAs, mobile phone and walkie-talkie are the
best instant communication for them. Each group of crew can use the PDA for result
record marking or using the mobile phone for data saving. Also they can use walkie-talkie
N5
8…..
for communication and division of labor.
1.4.2. Participant
The participants need to use the internet to send the control command to the robot,
so that they can control the robot efficiently. Also they need to use the desktop computer
to upgrade the robot control program and to search the information they need through the
internet.
1.4.3. Audience
The competition range is not large enough to stay too much people. So we need to
place a huge of LCD monitor for the Audience to watch the competition. Also we need to
have On-line retransmission for those who can not go to the competition range. And
competition situation will have video recording and uploaded to the internet for people to
download.
1.4.4. Host institution
The host institution needs to monitor the whole competition to prevent any cheating
during the competition. They also need to check the result of each team so that they can
prepare for the award.
1.4.5 Judges
The judges need to have a most accuracy results of each event which help to provide
a fairy result to the participant.
1.5 Users requirements and scope of project
User requirements
1.5.1 Crew
Crews need to have a stable and fast network. Also they need to have the latest
information so that they can help to contact the teams with some small changes. They are
also need to have a platform for them to get help.
N5
9…..
1.5.2 Participant
Participant need to have a fastest response time of the network, clear instructions of
the competition range and the fastest, stable network environment. They also need to have
authority to installing the external software for specific use.
1.5.3 Audience
The audiences need to have a stable network a clearly watching view of the events,
knowing the sequence of each team.
1.5.4 Host institution
The host institution needs to have a stabled network. And have a easy control
software to control the competition and to calculated the marks of each team. Beside they
are also need to monitor a whole competition network security.
1.5.5 Judges
The need to have an accuracy result to determine the winner of the competition
The scope of the project
In this network, there are 50 desktop computers and 10 laptop computers. Most of
the desktop computers are placed in different classroom. Each classroom will have 4 to 5
desktops computer for team to use and have 1 to 2 laptop computers for the crew to use.
The computers are required to install with Microsoft window XP professional Edition with
SP3. Also, if the participants need to install some specific software such as word
processing, spreadsheet, drawing, and database programs to finish their job, they could
have the authority to do it. But it must apply in anticipation. For the security parts other
network devices also needed. Such as Firewall.
N5
10…..
2. Analysis
2.1 Understanding of the problem: identify key sub-problems
There are major of problems establishing competition day network.
2.1.1 Network topology
The word topology means "the study of maps". Network topology defines the
structure of the network. The topology definition contains two parts. The first part is the
physical topology which means the actual layout of the wire or media and the second part
is the logical topology which means how the media is accessed by the hosts for sending
data. It is difficult to find a most suitable topology for the network design.
2.1.2 Cable
A cable is the media between two or more workstation and devices to transfer data.
It used for the transportation of network signals to destinations. It content two different
parts. The first one is the wired transmission. It uses the coaxial cable, twisted pair or
optical fiber for data transmission. The second part is the wireless transmission. It uses
the light, radio frequency and microwave for data transmission. Different cable has its
specific property; it is not easy match the suitable cable with the chosen topology.
2.1.3 Network model
The network model is a database model conceived as a flexible way of representing
objects and their relationships. Its distinguishing feature is that the schema, viewed as a
graph in which object types are nodes and relationship types are arcs, is not restricted to
being a hierarchy or lattice. Examples of network models are Peer-to-Peer and
Client/Server. Two network models have different pros and cons, which is difficult to
make a selection.
2.1.4 Connecting devices
The functions of connecting devices are used to sending data to the network and
N5
11…..
receiving data from the network. The common connecting devices used are hub,
switching hub, repeater, bridge and router. Most of the connecting devices would be use
according to this network diagram. But it is difficult to find where I should use the
devices in the STLC.
2.1.5 Type of LANs
LAN has relative small local area coverage Confined to small building or serial of
buildings. LAN connects router, workstation, network printers and other devices so that
network users can share the resource within the network. There are only two types of
LANs will be used. The first one is the wired LAN and the second one is the wireless
LAN. Two of the LANs are need to be used according to the network design. But it is
difficult to know how we can install that kind of LAN.
2.1.6 Bandwidth
We need to consider the bandwidth of the network is enough or not. If the
bandwidth is not enough we need to replace some of the network devices of reduce some
of the event happen at the same time.
2.1.7 Security method
This the open competitions which allow different kind of people enter. And it may
increase the chance being hack by the hacker. We need to find a suitable network security
method to ensure the network is stable enough.
2.1.8 Cost
Since the cost of holding up the network is very high, and it is impossible to holding
up the network with such a high cost. And it is difficult to build the network with a very
law money.
N5
12…...
2.2 Possible alternative methods
2.2.1 Physical Topology
Topology
Ring topology Hybrid topology
Dual ring topology Description A Star topology has a central
node with its entire links to other nodes radiating from it.
A combination of any two or more network topologies
A network topology in which two concentric rings connect each node on a network instead of one network ring that is used in a ring topology.
Advantage 1. Networks are relatively easy to install
2. Easy to manage.
1. Network are relatively easy to install 2. A lot of different choice.
1. If one of the ring broken down, data still can move
Disadvantage 1. Requires more cable length
2. If the hub or concentrator fails, nodes attached are disabled.
1. More difficult to configure. 1. More difficult to configure. 2. Difficult to install
Example 10Base- T Ethernet networks Star-ring topology y, Bus-ring topology
N5
13…..
Topology
Extended star topology
Tree topology
Mesh topology
Description Each of the end nodes of the core topology are acting as the center of its own star topology
It consists of groups of star-configured workstations connected to a linear bus backbone cable
Every node is linked directly to every other node
Advantage Networks are relatively easy to install and manage.
Point-to-Point wiring for individual segments. Supported by several hard ware and software venders
Any link fail to function, information can flow through any number of other links to reach its destination
Disadvantage 1. Requires more cable length 2. If the hub or concentrator fails. 3. Nodes attached are disabled.
1. If the backbone line is breaks, the entire segment goes down 2. More difficult to configure.
1. It is difficult to install 2. It is expensive to have redundant connection to every computer
Example 10Base- T Ethernet networks School network and company network.
wireless networks
N5
14…...
Logical Topology
Two most common types:
• Broadcast topology - each host sends its data to all other hosts on the network
medium. There is no order the stations follow to use the network, it is first come, first
serve. Example: Ethernet
• Token-passing controls network access by passing an electronic token sequentially to
each host. When a host receives the token, that host can send data on the network. If
the host has no data to send, it passes the token to the next host and the process
repeats itself. Examples: Token Ring and Fiber Distributed Data Interface (FDDI)
2.2.2 Cable (WIED)
Coaxial cable
Unshielded Twisted-Pair (UTP) cable
Fiber-optic cable Shielded twisted-pair cable
N5
15…...
Compare different type of cable
Cable Coaxial cable UTP Fiber-optic cable
Description An electrical cable with an inner conductor surrounded by a tubular insulating layer
Pair of wires is insulated from the others through cancellation
A glass or plastic fiber that carries light along its length
Advantage 1. Less expensive than optical fiber2. long distance 3. It can be run without boosts
from repeater. 4. Higher capacity communication
1. relatively lower costs 2. Easy to install 3. Smaller
1. Not susceptible to electromagnetic interference. 2. capable of higher data rates
Disadvantage More expensive than UTP More prone to electrical noise and interference
More expensive labour-intensive in installation
Limitation 1. Maximum distance 500M
2. Properly grounded
1. 100 meter maximum without being boosted
1. After disseminating one kilometer will loses 4.5% of signal.
Uses connect home video equipment telephone systems Fiber optic sensors
Topology Use Bus topology Star topology Tree topology
N5
16…...
Cable (Wireless)
2.2.3 Network Model
Peer-to-Peer Client/Server
Diagram
Feature Each work station communicate
to another workstation without
pass though server.
All the devices in the network are
connecting to the server.
Host N/A Server (file server)
Resources Sharing Disperses Centralized
Installation Cost Cheaper Expensive
Security N/A User authentication
Advantage a) Simple to setup a) Easy to manage
802.11b 802.11a 802.11g
2.4 GHz 5 GHz 2.4 GHz
Worldwide US/AP Worldwide
11 Mbps 54 Mbps 54 Mbps
Frequency Band
Availability
Maximum Data rate
Other Services (Interference)
Cordless Phones Microwave Ovens Wireless Video Bluetooth Devices
Cordless Phones Microwave Ovens Wireless Video Bluetooth Devices
HyperLAN Devices
N5
17…..
b) Cheaper b) Higher network security
Disadvantage a) Difficult to manage
b) Not safety
a) Expensive
b) When the server is down, all
the services are stopped
2.2.4 Connecting Devices
Hub
Switch
repeater
Bridge
N5
18…..
Router
The function of connecting devices
Hub Hubs concentrate connections. They take a group of hosts and
allow the network to see them as a single unit. Active hubs also
regenerate signals
switch Workgroup switches can determine whether data should remain on
a LAN or not as bridges do, they can also transfer the data only to
the connection that needs that data. This feature makes a switch
transmits data faster than a bridge
Repeater Repeaters regenerate signals distorted by transmission loss due to
attenuation
Bridge Bridges provide connections between LANs. They also determine
whether data should cross the bridge or not. This makes each part
of the network more efficient
Router Routers can regenerate signals, concentrate multiple connections,
convert data transmission formats, and manage data transfers. They
can also connect to a WAN, which allows them to connect LANs
that are separated by great distances.
N5
19…..
2.3 The criteria of the selection
The criteria:
a) Higher data transmission speed.
b) Higher mobility.
c) Lower cost
d) Higher security
2.3.1 Chosen of topology:
I have chosen the extended star topology because of the competition area is quite large
enough to cover competition range. Therefore, I need to choose a network topology can have
enough shape to cover all the competition area. Therefore, Extended Star topology is the most
suitable one for the competition. In addition, this topology is providing the fairness of the
competition. If one of the devices is out of order, the room of the competition range cannot
access to the Internet.
2.3.2 Chosen of cable
Two different of network would be used for this network. They are wired and wireless
network. For the wired network, UTP cable would be used. Because UTP cable has a lower
installation cost, and it is easy to install. Moreover it is the most common cable used for the
extended star topology. For the wireless network, 802.11g would be used. Because of it can
provide a highest maximum data transfer rate of 54Mbps. And it also gets an enough
frequency band of 2.4GHz.
2.3.3 Chosen of network model
I would choose a Client/Server model. Because of Client/Server model can centralize
the sharing resources while taking participant attendance and recording event results. In
addition, it has a high network security with using user authentication than Peer-to-peer
network (P2P). Although the Client/Server Model requires an administrator to maintain the
N5
20…..
network, the host institution can establish a department to maintain the whole network.
Therefore, the network can have specialized capable person to upgrade and manage the
network.
2.3.4 Chosen of connecting devices
Because of the competition range are vary large and need two different type of network.
Therefore, the connecting devices need to be possible to send a wireless signal and a wire
signal. Therefore, router, switch and bridge need to be use. They can transmit wire signal, and
connect two different type of LAN.
2.3.5 The type of LAN
The type of LAN would be used is wired LAN and wireless LAN. Because participant
needs to send data to the robot though wireless network, and receiving request from the host
institution server though the wired LAN. Therefore, that is can have a higher mobility for the
participant.
Conclusion
In conclusion, the decisions of the network are as follow:
Network Topology Extended star topology
Cable STP, 802.11g
Network model Client/Server
Connecting devices Router, switch and bridge
Type of LAN Wired LAN and wireless LAN
N5
21…..
3. Design and Implementation
3.1 The information collection process for creating the solution
To collect the information needed for the design, I have considered the floor plan of the
STLC. Also, to get the information about the users, I have sent a set of question paper to the
participant to ask what they needed in the competition. Moreover, I have referred to the
network design of the center to get some information about the condition of the center
network. Here is some information that I get form different way.
3.1.1 Comment from the teacher
I have invited our school networking teacher – Mr. X to give some comment for our
networking design. He is a teacher who teaches for our communication and information
technology. He must has a lot of experience and knowledge about how to design a network
and how to solve the computer problems. So I ask him for help. And he answer me that I can
design the network up to what I thinks of. He adds more all I want to add to the design must
be related to the goal of this project. Moreover he had also teach me how to use the packet
tracer to solve a lot of network connection problems.
3.1.2 Knowledge from books and Internet
I have read a lot of book and searching a lot of information from the Internet. I have
learnt a lot of skill about network design and implementation. For example set up a firewall
and application proxies.
Books: 1. Computer an Information Technology for HKCEE Module C (Lawrence Y.L. Wong and Kit Chan, Digital Vision Education Publishing) 2. Information assurance: dependability and security in networked systems (Yi Qian
James Joshi David Tipper Prashant Krishnamurthy)
3. Cisco networking simplified (Anderson, Neil, Della Maggiora, Paul L.) 4. Optical Networking Design and Planning (Simmons, Jane M.) 5. Network management: concepts and practice (Burke, J. Richard) 6. Cisco frame reply solutions guide (By Jonathan Chin.Published by Cisco Press.)
7. Data network design (Darren Spohn, Tina Brown, and Scott Grau)
N5
22…..
Internet: 1. http://ansnetworksolutions.biz/
2. http://compnetworking.about.com/od/networkdesign/Network_Design.htm
3. http://en.wikipedia.org/wiki/Network_planning_and_design
4. http://www.hkgolden.com/
5. http://www.nec.com.au/professionalservices/networkimplementation.htm
6. http://networking.ittoolbox.com/topics/implmnt/
7. http://www.itp.net/494609
3.1.3 Experience from joining the competition
Since I have joined the “Hong Kong – Macau Youth Networking Skills
Competition” before. And I had learned a lot of network information from this
competition. For example I have learnt which type of cable should be use when we
connect different connecting devices. And it also teaches me more specific information of
how to use the packet tracer. For example how to know what is the gateway of the devices
and how can we setting the password and WEP to the router of packet tracer.
Competition: Cisco (Hong Kong-Macau Youth Networking Skills Competition)
N5
23…..
3.2 The overall plan or structure of the solution
The design shows the whole network environment of wireless robot competition. The figure show how the competition rooms work
N5
24…..
Briefly description of the network
This network includes three different interfaces. They are trusted area, semi-trusted area
and untrusted area. Each kinds of area contain different kind of network components. Fist let
talk about the untrusted interface, this interface only have a router to connect to the Internet.
The router is used for connect the LAN to the WAN. Second is the semi-trusted interface.
This includes two servers, which are mail server and web, which used for communicated with
outside people. The third interface is the main parts of the network. It connected with three
different servers, 5 rooms that used for the competition, and a control rooms. Then may we
talk about the competition room network. Inside the competition room, there will be having 5
workstations which connect to the router to allow sending data to the robot. Also these
workstations are allowed for the participant to make some small changes of the robot database.
Moreover the router inside the competition room is also allowing for the crew used to receive
or sending message.
3.3 The major parts involved in the solution relations of others
3.3.1 Router
Router is using to connect the STLC network to the Internet. The function of
router is it connects to a WAN, which allows them to connect LANs that are separated by
great distances. The STLC is a local area network, it need a machine to regenerate signals
from the WAN. Therefore, router is need.
3.3.2 Firewall
Firewall is a collection of components placed between two networks. It’s used to
limit network access to authorized users. It also can determine whether a packet or a
connection request should be allowed to pass through the network. So that it can
prevent any attack from outside user. There are two common types of techniques of
firewall. They are packet filtering and application proxies. And these two types of
N5
25…..
techniques of firewall would be also used in the network.
3.3.2.1 Packet filtering
It used to filter the data packet which is not authorized to pass through the network.
When packets pass through, the packet filter compares the packets to a set of filter rules
by examine the TCP or UDP information. The advantage is that it can apply without risk
of compromising the network.
3.3.2.2 Application proxies
Proxies break up the connection between the client and the server. It would act as
server or client when in different situation. For example to the server, the proxy pretends
to be the client. When it to the client, the proxy pretends to be the server. The advantage
is that there is no direct communication takes place between the client and the server. A
proxy can therefore check the legality of traffic between the client and server.
3.3.3 Switch
Switch is used to separate LAN areas to improve network performance. It enables
ports to build independent channels. Also it controls multi-nodes data transmission and
prevent network congestion.
Switch is a dedicated communication path which is established between the sender and
receiver along which all packets travel. Therefore switch is needed.
3.3.4 Wireless Router
It used for the communication between the workstation and the robot. It also allowed
for the crew to sending information to the control room and uploads the result of the
competition to the web server. Therefore wireless routers are needed for the competition.
3.3.5 Server
3.3.5.1 Application Server
Application server which installs all the software needed for the competition. That
means all the resources and programs will be install there. Therefore it can reduce the cost
N5
26…..
on buying the software. For instance the entire PC can connect to the application server,
and download all the resource they need inside the application server. So application
server is needed.
3.3.5.2 FTP Server
FTP server is used for the participant to share data to their teammate. It also one of
the important way that the host institution to upload the data, which need for the
competition, after the competition was start. So the FTP server is needed.
3.3.5.3 Proxy Server
Proxy server is used to keep machines behind it anonymous. It also can speed up
access to resources. Also it can help to protect the data access to the intranet. So that the
participant will not be afraid other people to attack their workstation. Therefore the proxy
server is needed.
3.4 The problems arising in implementation and dealt with
3.4.1 Too much workstation
There are a lot workstation and connection devices of the network design. It is
difficult to install the entire network device on the network diagram. Since the plots of
each network devices are fixed, so it is difficult to connect all the work station with the
connection device. Second the network connecting speed are fixed. If there are too much
workstation connect to the internet, the bandwidth of the STLC centre will be affected.
And the number of work station can not be reducing, so it is difficult to install the
network which can have a higher bandwidth and faster transfer speed.
3.4.2 The STLC center
Since the area of the STLC center are very large. When the data transmit though
long distance, the signal will turns weak due to the effect of electromagnetic interference.
So it is difficult to transmit data from different competition room. And it is not easy to
N5
27…..
arrange the place for the server location. Because we need to ensure the distance between
competition room and the server room should be very less. So it is difficult to place the
server room and the competition room.
3.4.3 The use of network operation system
There are many kind of network operating system nowadays such as Macintosh
OSX, Microsoft Windows Server, Novell and UNIX. These are some of the more
popular peer-to-peer and client/server network operating systems. But how to choose a
operating system which allow people to install the program is very difficult. Because
different software is require to install in different operating system. That means not all
the software can install in one operating system. So we need to make a choice for
choose which OS we need to use. Therefore I decide to use Microsoft Windows Server.
Because this operating system is the most comment one that most of the programs are
use with this OS. That means all the server would install with Microsoft Windows
Server and all the workstation would install with Microsoft Windows XP Professional.
And the entire participant can use more program to edit their robot data base.
N5
28…..
3.5 Complete the design of the network environment which is able to provide the following services
The complete network of the competition. The complete network of the Competition room.
N5
30…..
3.5.1 Computer setting which allows for the programming of individual
robots through student network accounts Each robot would contain its private IP address and password. Participant would
receive its own password after the competition was begun. Each computer would install a
program which allow student to edit the database of the robot. Also the authority of the
participant account will be limited. That means participant will be not allowed installing
any kind of software during the competition. And there will be enough authority for
student to transmit the data to the robot.
3.5.2 Sharing of programming data stored in a disk drive In this network design, there will be a FTP server for the participant to share data
stored in a disk drive. They are also allowed for the participant to download the data form
the FTP server. Each of the file uploaded will contain a few bits of data that used to
identify the participant. This method is used to prevent the virus upload to the FTP server.
3.5.3 Transmission of computer programs to the robots through Wi-Fi Each of the workstation would connect to the wireless router which provides Wi-Fi
coverage to the competition area. So that participant can send data to their own robot
though the router. To increase the rate of data transmit rate, the entire participant group
would arrange into different competition rooms so that it can reduce to much work station
access to the internet at the same time.
3.5.4 Result taking All the result would be marked by the crew during the competition. Then the crew
would send the result to the control room, and arrange all the result at the control room.
After the arrangement the result would upload to the STLC website. After people can
check for their result after the event was finished.
3.6 IP address management 3.6.1 Dynamic Host Configuration Protocol (DHCP) Dynamic Host Configuration Protocol is a computer networking protocol used by
devices to obtain configuration information for operation in an Internet Protocol network.
This protocol reduces system administration workload, allowing networks to add devices
with little or no manual intervention. For this network design, the main server will also
act as the DHCP server which used to give the IP address to the all the workstation.
N5
31…..
3.7 Network Security
3.7.1 Security Control
The network security control of the network will be consists of three parts. The first
part is about the firewall and proxy. This part of network is used to limit the network
access to authorized users. The second part is that we will arrange the network
administrator to stay inside the control room for monitoring the network traffic and CPU
utilization. Therefore the network administrator can detect the problems and solve it
immediately. The third part is about the login name and password. The login name and
password for access to the Internet would be change every day. This is the way that
prevents other people to get into the network.
3.7.2 Access control
By referring to the figure shown above (The figure show how the competition rooms
work), It shows that the wireless router only provide a limiting coverage where allow the
robot to receive the signal from the wireless router. It can prevent other people who are
not entering the competition to use the network. Also the login name and password would
be change every day, it can prevent the people, who are not allowed to use the network, to
access the network.
3.7.3 Redundant Array of Independent Disk (RAID)
Redundant Array of Independent Disk (RAID) is used to improve the availability of
the network. It is a technology that allowed computer users to achieve high levels of
storage reliability from low-cost and less reliable PC-class disk-drive components, via the
technique of arranging the devices into arrays for redundancy. It provides fault tolerance
and protection to the HDD of file servers.
3.7.4 Uninterruptible Power Supply (UPS)
Uninterruptible Power Supply is a battery backup, which provides emergency power
and, depending on the topology, line regulation as well to connected equipment by
N5
32…..
supplying power from a separate source when utility power is not available. There are two
common systems in use today: standby UPS and continuous UPS. A standby UPS runs
the computer off of the normal utility power until it detects a problem. At that point, it
very quickly (in five milliseconds or less) turns on a power inverter and runs the computer
off of the UPS's battery (see How Batteries Work for more information). A power
inverter simply turns the DC power delivered by the battery into 120-volt, 60-Hertz AC
power.
3.7.5 Virtual Private Network (VPN)
A virtual private network (VPN) is a computer network that is implemented in an
additional logical layer on top of an existing larger network. It has the purpose of creating
a private scope of computer communications or providing a secure extension of a private
network into an insecure network such as the Internet.
3.7.6 Wired Equivalent Privacy (WEP)
Wired Equivalent Privacy (WEP) is a deprecated algorithm to secure IEEE
802.11 wireless networks. Wireless networks broadcast messages using radio and are thus
more susceptible to eavesdropping than wired networks. When introduced in 1997 WEP
was intended to provide confidentiality comparable to that of a traditional wired network.
3.7.7 Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access a certification program created by the Wi-Fi Alliance to
indicate compliance with the security protocol created by the Wi-Fi Alliance to secure
wireless computer networks.
The WPA protocol implements the majority of the IEEE 802.11i standard, and was
intended as an intermediate measure to take the place of WEP while 802.11i was
prepared. Specifically, the Temporal Key Integrity Protocol (TKIP), was brought into
WPA. TKIP could be implemented on pre-WPA wireless network interface cards that
N5
33…..
began shipping as far back as 1999 through firmware upgrades. Because the changes
required fewer modifications on the client than on the wireless access point, most
pre-2003 APs could not be upgraded to support WPA with TKIP. Researchers have
since discovered a flaw in TKIP that relied on older weaknesses to retrieve the
keystream from short packets to use for re-injection and spoofing.
3.8 Types of network connection
3.8.1 Network Topology
I will use the extent star topology to set up the network of the wireless network
competition. The star topology is easy to install and maintain. Also this topology is
flexible and scalable to resize the network. This network topology will not affect the
network except the central point was change or damaged. However it will give a higher
installing cost, which affects the network. But the main use of connection medium is
using the Wi-Fi, therefore it can reduce the cost of setting up the extant stat
3.8.2 Network Model
I will use Client/Server Network as the model of the network in wireless robot
competition. All the workstation (Client) would connect to the switch (Server). In this
model, it can centralize resources and data transmit in the network.
The network is easy to be managed in Client/Server Network model as resources
sharing is centralized and controlled by a server. The network administrator can easy to
monitor the data transmit inside the network.
However the cost of setting up the network is every high, because of the cost of
server and the connecting devices.
N5
34…..
3.9 Cost of setting up the network (The lowest cost plan)
Items Model Introduction Quantity Cost@ 1 Cost
PC Lenovo H210PC CPU: Celeon 430
Ram: 1GB
HDD: 160GB
DVD: DVD-RW
OS: Vista Home Basic
10 $1999 $19990
Robot Robot 88311 SKU: SILVERLIT-BUILD-A-BOBOT
Shipping Weight:1500g
Manufacturer: Silverlit
40 $373.08 $14923.2
Router DLink DIR-100 Router / RJ45 / 4 Equipment Type: Router
Interface: RJ45 No. of Ports: 4 1 $199 $199
Switch for semi EDiMAX ES-3105P 5 ports 10/100 Switch 1 $98 $98
Switch for trusted Level One FSW-2421 Switch / RJ45 / 10/100M Equipment Type:
Switch
Interface: RJ45
Speed: 10/100M
No. of Ports: 24
1 $460 $460
Wireless router DLink DI-808HV Router/VPN / RJ45 / 8
Equipment Type: Router/VPN
Interface: RJ45
No. of Ports: 8
5 $958 $4790
UPS APC BACK-UPS CS
350VA (BK350EI)
Output Power: 350VA / 210W 3 $560 $1680
server PowerEdge R200 Slim form factor (1U) servers ideal for network
infrastructure or web applications 5 $6,900 $34500
Firewall ASUSTek RT-G32 2.4GHz / MAC address Frequency: 2.4-2.5GHz
Authentication: MAC address Firewall: NAT
Firewall,IP filter Firewall: URL based
filter,MAC Address filter
1 $169 $169
Total cost $58809.2
N5
35…..
4. Testing and Evaluation
4.1 Checklist and testing plane
4.1.1 Workstation & robot Testing Area Purpose Steps Expected result All the workstation and robot 1. To prevent some of the computer
are out of order 2. Make sure all the computer can be
use
1. Switch on all the computer 1. All the computer can be switched on
Remark: Finish or not?
4.1.2 Cable Testing Area Purpose Steps Expected result Cable connection 1. To make sure the cable have not
damage 2. Can send data efficiently 3. Did not make wrong connection
1. By using a cable tester 2. Connect two head of the cable
to the cable tester 3. Switch on the cable tester
1. A pair of corresponding green light will be light up at the same time. There will be totally 8 pairs of green light will be light up step by step.
Remark: Finish or not?
N5
36…..
4.1.3 Hardware Testing Area Purpose Steps Expected result Switch Switch 1. To ensure the switch can work 1. Connect two or more than two
workstation to a switch 2. Sending a data from one PC to
another one 3. Check for the receiving data
1. Data send = data receive
Wireless Router Wireless connection 1.To make sure the router can share
the network 2. It can provide a wireless coverage
1. Switch on the router 2. Connect one wired PC and one
wireless PC with a router 3. Send a data form wired PC to
wireless PC 4. Check for the data 5. Send back the data from a
wireless PC to a wired PC
1. Data send(wired PC) = data receive(wireless PC)
2. Data send(wireless PC) = data receive(wired PC)
UPS Power supply 1. To ensure the power can continue
supply when the power is short circuit
1. Connect the UPS to the server 2. Cut the power supply which
connect to the server 3. Cut the power supply which
1. The server still work for few minutes
N5
37…..
connect to the server
Remark: Finish or not? 4.1.4 Server
Testing Area Purpose Steps Expected result FTP server FTP server 1. Participant can upload and
download data at FTP server 1. Connect a wired PC to a FTP
server 2. upload data 3. download data
1. The PC can upload and download the data
Domain Controller Domain Controller 1. To ensure all the user can login
into the network 1. Set up the group of the users 2. Set up the users accounts 3. Access different group of the
user accounts
1. All the account can be log into the network
Application Server Application Server 1. The application server can be
install software 2. The PC use the software installed
in application server
1. Install a software inside an application server
2. Connect a PC to the server 3. Use the software
1. The PC can use the software
Mail Server
N5
38…..
Sending and receiving e-mail 1. The mail server can send and receive e-mail
1. Set up the group of the users 2. Set up the users accounts 3. Access different group of the
user accounts
1. Can receive e-mail 2. The other mail server account
can read the e-mail
Web Server Webpage 1. The webpage can update the
information 2. People can browse the webpage
from the search engine 3. People can read the website
1. Create a webpage and upload to the web server
2. Using a PC to search for the webpage
3. PC can read the website 4. Make some change of the
webpage 5. PC refresh the web browser 6. Read the website again
1. The PC can find the website from the search engine
2. The PC can read the website 3. The PC can find the changes
Remark: Finish or not? 4.1.5 Network Connection
Testing Area Purpose Steps Expected result TCP/IP IP address 1. All the PC can get the IP address
2. Different PC and robot have 1. Use more than one computer 2. Use command program
1. It will show the IP address of the computer
N5
39…..
different IP (cmd.exe) of the computer 3. Input the command
“ipconfig/all”
2. Different computer will have different IP
Connect to Internet Web browsing 1. To ensure the computer can use
the Internet Method 1 1. Use command program
(cmd.exe) of the computer 2. Input the command “ping
xxxxxx”(xxxxxx= IP address)Method 2 1. Use web browser 2. search a webpage
1. Method 1 It will reply 4 set of data
2. Method 2 It can show the webpage
Connection to Intranet The Intranet 1. The data can in the Intranet
without posting it to the Internet 1. Use command program
(cmd.exe) of the computer 2. Input the command “ping
xxxxxx”(xxxxxx=IP address of the Intranet devices)
It will reply 4 set of data.
Remark: Finish or not?
N5
40…..
4.1.6 Network Security Testing Area Purpose Steps Expected result WEP Wireless Router 1. Ensure it has WEP function
2. Prevent other user get into the network
1. Using a wireless computer 2. Access to the network
though wireless router 3. Without enter WEP
1. The wireless computer cannot access to the network
Network access password Wireless network 1. Prevent other user get into the
network 1. Use a wireless computer 2. Access to the wireless
network 3. Without enter password
1. The wireless computer can not access to the network
The access point Wireless access coverage 1. Prevent other user get into the
network 1. Use a wireless computer to
check the wireless coverage2. To change the coverage
inside the wireless router if the coverage is too large
1. Out of the expected coverage no access point can be founded
Firewall Firewall – Divide the network into three area
1. Easy to monitoring 2. Higher network security
1. Setting up the firewall 2. Making connection with two
switches ( one for a web
1. The computer only can access to one switch which connect to a web server and mail
N5
41…..
server and mail server, the other one for main server and FTP server)
3. Use a outside computer to enter the network
server.
Firewall Firewall – Limit the data inside 1. Prevent virus
2. Prevent other user get into the network
1. Setting up the firewall 2. Sending the data which some
contains the filtering words to the network
1. Only some of the data which not contain any filtering work can access to the network
Remark: Finish or not?
N5
44
4.2 Limitation of network design
4.2.1 Lower bandwidth
In this network design, it expects there will have at least 40 workstations work at the
same time. Since the bandwidth of the network is fixed. If all the workstations share the
network resource or using the network resource at the same time, the bandwidth will be
decrease and the data transfer rate between the workstation and server would also
decrease. So it would affect the time taken during the competition. Therefore I suggested
that we should not use too much wireless devices at the same time. Different event would
start at different time. Thus we can reduce the too much workstation access to the Internet
at the same time.
4.2.2 Lower Scalability
According to the network design, each wireless router should connect with 8 wired
computers. And the wireless router used is only with 9 connecting plots, so it is difficult
to connect one more wired device with the wireless robot. Therefore the scalability of this
design is very low. Therefore I suggest that we can divided some event to the smaller one,
thus we can have more nodes for other use of network access.
4.2.3 Higher Installation Cost
There is too much network devices used for this network design. It will then increase
the cost of building this network. Therefore I suggested some network devices can be
canceled. For example mail server, we can use some free network mail service instead of
building the mail server. We can go this kind of service provider website to build up an
e-mail account. Thus we can reduce the cost of building up a powerful server.
N5
45
5. Conclusion & Discussion
5.1 The achieved requirement
In this network environment, all the requirements have been achieved:
5.1.1 computer setting which allows for the programming of individual
robots through student network accounts There is an application server setting inside the network diagram. Host institution
can upload some information or data, which help the participant to design the robot, and
install the entire program needed inside the application server. After that the participant,
crew and host institution can access to the application server, and download all the data,
information, and program them need. Then, they may use that information to design their
own robot. After the design, they can send the data to the robot though the wireless router
which is setting inside the competition area.
5.1.2 sharing of programming data stored in a disk drive There is a FTP server inside the network environment which allow participant to
share some data or design to their teammate or other competitor. The participants are only
need to upload the data to the FTP server. When other participant access to the FTP
server they can find the uploaded data. Participant can have authority to setting up a
password to all there uploaded data. So it can prevent any data may loss to some
unwanted users.
5.1.3 transmission of computer programs to the robots through Wi-Fi
There are some wireless router install in each competition area. Students are
allowed to send the data or programs to their robot through Wi-Fi. Each student would
receive the unique MAC address and WEP of their specific robots. This can prevent other
user destroy the programming setting of robot or help the participant to cheat for the
event.
5.2 improvements
Other improvement still can be made:
5.2.1 Connection speed of the network
N5
46
Because this is the time competition, even if will be the very few time will also
affect competition's accuracy. Thus we need to increase connection speed of the network.
Therefore I suggest that we can use optical fiber to replace some of the UTP cable.
Optical fiber has a higher data transfer rate. It can reduce the time for data transmission.
5.2.2 Sharing of network resources
Some network resources may be needed during the event, such as network printer.
The result may need to print out after the event, the participant can know for their result
immediately. Therefore I suggest installing a network printer inside the competition area.
5.2.3 Network backup
Some computer problems may occur during the competition. And it will take so
much time on back up the file into the CD rom and other secondary device. So I suggest
connecting shortcut of FTP server in each of the workstation. The participant no need to
searching the FTP server during the competition and they can save all their inside the FTP
server. If the computer suddenly gets out of order, the participant can use another
workstation to continue the competition.
5.2.4 Integrity of the competition network and the STLC network
The competition network is actually one of the subnets in the STLC network. The
Internet gateway of the competition network is located in the STLC network. In other
words, the network gains its Internet signals from the STLC network. The resources of
the two networks can be exchanged and read. There we should encrypt all the data inside
the STLC network. It helps to protect the secrets of the STLC network.
5.2.5 Result taking
The design has achieved the requirement of result taking. By using the
web-based result recording system, the procedure of taking results will be reached
automatically. It can also improve the accuracy of the data so judges can use the data
to give a fair result.
N5
47
5.3 Insights gained on learning about how to learn / Solve
the problems
After doing this project I can learn more side of solving the problem when I am
facing some problems. When the problem occurs, I would fist try to identify the problem
and try to mark down a lot of observable symptom of the problem. Then I will try to find
more case with the similar symptom on the Internet. And try to solve the problem by
using the Internet given method.
Second, it provides a chance for me to have an experience to organize to competition.
It gives a reason for me to learn more about networking information and the robot
competition. And I can find more updated information about IT Development.
Third, the greatest benefit is provided an available chance for me to practice for my
English. By doing this project, I need to know more specialized term of the computer
vocabulary. So I have tried to read a lot of website, which are written in English, to lean
the specialized term. After that I need to write a project of the wireless robot competition.
Sometimes I also need to share my point of view of this project to my classmate. Thus it
gives a lot of chance for me to practice my poor English such as reading, writing and
speaking.
Lastly, after finishing this project, I found that I have learnt a lot of extra computer
technology which is difficult to learn from the lesson. These technologies are WPA, WEP,
and VPN. These are not common technologies teach in the lesson. When I search this
information, I also learn the history of the IT development. All this are my get after doing
this project.
N5
48
5.4 Knowledge discovered which is relevant for other people
similar projects in the future
The networking technology that the project induced can be provided for other people
who doing for the similar project in the future. For example, the Network Design, the
function of networking device, the property of different transmission cable, the network
models and the network topology. These are the information always remains unchanged
and did not always update. So it can be some useful information or knowledge for the
future people doing the similar project.
Solving problem is another important technology for the project. It helps me to
identify the problem and help me to find some suggest solution to solve the problem. And
it is the easiest way to help the network administrator to solve the problem.
To sum up, the computer technology always updated every day. Although it always
make changes but the rule of the computer are always the same. So the technology l have
suggested above are always never be change. These are the rule of the Computer
information technology.
N5
49
6 Documentation
6.1 User instruction How to login to the network (computer/wireless devices)?
1) Switch on the computer
2) Wait until a login requested is shown on the page
3) Click “Ctrl”, “Alt” and “Del” button
4) Input your user name/ user ID
5) Input your default password
6) Click “Enter”
How to submit file?
1) Launch the web browser
2) Click “my favorites”
3) Click a website “submit my works”
4) Click “browser” and choose your file
5) Click “upload”
How to use FTP?
1) Launch my computer
2) Go to the FTP server drive
3) Input your user ID and password
4) Upload - Copy the data that you want to upload and paste into the FTP page of the web
browser
5) Download - Select and copy the data that you want to download and paste into the
folder that you want to download there
How to use application server?
N5
50
1) Launch my computer
2) Go to the Application server drive
3) Input your User ID
4) Input your password
5) Choose software
6) Make a shortcut of the software to the desktop
How to sending packet to robot?
1) Using the given software of the robot
2) Search the robot by using the software
3) Click a button “send packet”
4) Chose the packet you want to send
5) Search the corresponding robot
6) Input the password of the robot
7) Click send
N5
51
6.2 Method for creating the solution
I will first identify the problem. And then I will try to find other people who are suffer
from the same problem before. After that I will get the solution of solving the problem. If
there is no people suffer from the same problem, I will try to search more information
from the internet. Then I will try to design all the possible way to solve the problem.
After that I will evaluate all possible way and select the way that meets the goal.
Moreover I will test the recommended way. Finally I will give a detailed description of
the solution with an explanation of how the choice was made. If the problem still cannot
be solved I will find help some IT expert.
Algorithm design
Problem analysis
Problem identification
Developing a solution
Debugging and testing
Documentation
Problem solving procedure
N5
52
7. Acknowledge
Teacher
Mr. X (A computer teacher from Y collage)
Books Computer an Information Technology for HKCEE Module C (Lawrence Y.L. Wong and Kit Chan, Digital Vision Education Publishing) Information assurance: dependability and security in networked systems (Yi Qian James Joshi
David Tipper Prashant Krishnamurthy)
Cisco networking simplified (Anderson, Neil, Della Maggiora, Paul L.) Optical Networking Design and Planning (Simmons, Jane M.) Network management: concepts and practice (Burke, J. Richard) Cisco frame reply solutions guide (By Jonathan Chin.Published by Cisco Press.)
Data network design (Darren Spohn, Tina Brown, and Scott Grau)
Website http://ansnetworksolutions.biz/ http://compnetworking.about.com/ http://en.wikipedia.org/wiki/Network_planning_and_design http://www.hkgolden.com/ http://www.nec.com.au/professionalservices/networkimplementation.htm http://networking.ittoolbox.com/topics/implmnt/ http://www.itp.net/494609 http://www.webopedia.com/ http://www.microsoft.com/en/us/default.aspx http://hk.knowledge.yahoo.com/ http://www.superdroidrobots.com/product_info/WiFi.htm