N5 Wireless Robot Competition at Science and Technology ...

52
N5 1…... Wireless Robot Competition at Science and Technology Learning Centre

Transcript of N5 Wireless Robot Competition at Science and Technology ...

N5

1…...

Wireless Robot Competition at Science and Technology Learning Centre

N5

2…..

Content:

1. Objectives

1.1 Background context, needs……………………………………………P.4

1.2 Current difficulties without the use of IT……………………………..P.6

1.3 Purposes and benefits of the project…………………………………..P.7

1.4 Target user, situation of use…………………………………………....P.7

1.5 Users requirements and scope of project……………………………...P.8

2. Analysis

2.1 Understanding of the problem: identify key sub-problems…………...P.10

2.2 Possible alternative methods…………………………………………..P.12

2.3 The criteria of the selection……………………………………………P.19

3. Design and Implementation

3.1 The information collection process for creating the solution………….P.21

3.2 The overall plan or structure of the solution…………….…………….P.23

3.3 The major parts involved in the solution relations of others………….P.24

3.4 The problems arising in implementation and dealt with……………...P.26

3.5 Complete the design of the network environment which is able to provide the

following services……………………………………………….…….P.28

3.6 IP address management………………………………………………..P.30

3.7 Network Security………………………………………………………P.31

3.8 Types of network connection…………………………………………..P.33

3.9 Cost of setting up the network…………………………………………P.34

4. Testing and Evaluation

4.1 Checklist and testing plane…………………………………………….P.35

4.2 Limitation of network design…………………………………………..P.44

N5

3…..

5. Conclusion & Discussion

5.1 The achieved requirement and improvement..................................…...P.45

5.2 Improvements…………………………………………….……………P.45

5.3 Insights gained on learning about how to learn / solve the problems….P.47

5.4 Knowledge discovered which is relevant for other people similar projects in

the future………………………………………………………………..P.48

6. Documentation

6.1 User instruction………………………………………………………….P.49

6.2 Method for creating the solution…………………………………………P.51

7. Acknowledge………………………………………………………………. P.52

N5

4…..

1. Objective

1.1 Background context, needs

ABC school is going to organize a wireless robot competition at its Science and

Technology Learning Centre (STLC). I will define the scenario of the wireless robot

competition at STLC. In addition, I will design its network environment by using the

desktop computer and some mobile devices to from a W-LAN for ‘even results

recording’, ‘instant communication’, ‘high confidentiality and availability of the network’,

‘attendance taking’, and ‘integrity of the network’. The network is also need to have the

following services. For example, the network can sharing of programming data stored in a

disk drive, transmission of computer programs to the robot through Wi-Fi. Beside we

need to think over the settings of the computer, which need to allow the programming of

individual robots through student network accounts. These are all we need to have in

mind during network design.

Scenario of the robot competition day involves the type and functionality of different

mobile devices, location, floor plane and distribution of access points, data security and

access control types of network connection, cost of setting up the network, limitations of

the network design and other special network requirements.

N5

5…..

The floor plan of the Science and Technology Learning Centre

More details about the robot competition day. The competition will start from 21st

December to 25th December. There are about 50 teams of student will enter the

competition. There will be totally 80 crews in the robot competition day. In addition,

there will be four kinds of events will be complete during those 5 days. Moreover, there

are total three awards will be produced after 5 days competition.

The schedule of the competition:

Date (Time) Events

21/12 (1:30p.m. – 5:00p.m.) Opening ceremony and robot design competition

22/12 (1:30p.m. – 5:00p.m.) robot running races

23/12 (1:30p.m. – 5:00p.m.) Robot beat a drum

24/12 (1:30p.m. – 5:00p.m.) Robot quizzes

25/12 (1:30p.m. – 5:00p.m.) Awarding and closing ceremony

N5

6…..

1.2 Current difficulties without the use of IT

1.2.1 Decrease in working abilities and efficiency

Without using the internet technology environment, there is difficult for the students

or staffs of the participant to contact the host institution. And it takes longer time for the

host institution to responds the request of the participant. Beside there is not enough space

for the staff to watch the competition, therefore if there have not any camera the staff of

the participant can not know what is going on during the competition.

1.2.2 Slow speed of data communication

For instants, the speed and rate of data communication on competition day will be

very slow. Since the transmission of messages can only be done by running from one side

to another side by crew. Sometime time there are large amount of message will be get loss

during transmission and it also causes wasting of time and inconvenient of user, which

will totally decrease the rate and speed of data communication and make the competition

more inefficiency.

1.2.3 Inconvenient of result marking

Moreover the result of the event are only can be marked on the marking sheet. It

takes a great trouble for the staff of the participant to check the result of their team. And it

also make very inconvenient for the host to make correction of the marking. Sometime

there will be time taking during the competition, the time between the fist and second

runner-up may be just 0.1 second. If we are not using the internet technology, the result of

the event can not be taking accuracy.

1.2.4 Inefficiently using of resources

Without using IT technology, crew and staff need to use more other

resources to hold the robot competition. For example, staff may need

to mark the result of the team by using a pen and a notebook. The

N5

7…..

accuracy of the results will be reduced and may affect the results of the

competition.

1.3 Purposes and benefits of the project

1.3.1 Purposes

The purpose of the project is to using IT during the Robot competition days for the

transmission of computer programs to the robot through Wi-Fi, sharing of programming

data stored in a disk drive and allows student network account to control the individual

robots by using programming. During the event, the purposes of the project should also

include automatic calculation of results, user-friendly environment and automatic

calculation of results

1.3.2 Benefits

The benefits of the project are as follows:

a) It can increase the crew and teams’ productivity and efficiency.

b) It can sharing programs data stored in disk

c) It can increase automation and local communications capabilities.

d) It can provide the means of exchange data between computers.

e) It allows data transmit between computer and robot.

f) It transmission of computer programs.

g) The results can be backed up and managed easily.

1.4 Target user, situation of use

1.4.1. Crew

The crews are important in the robot competition, they have a great amount of data

need to be marked and shipping. Therefore PDAs, mobile phone and walkie-talkie are the

best instant communication for them. Each group of crew can use the PDA for result

record marking or using the mobile phone for data saving. Also they can use walkie-talkie

N5

8…..

for communication and division of labor.

1.4.2. Participant

The participants need to use the internet to send the control command to the robot,

so that they can control the robot efficiently. Also they need to use the desktop computer

to upgrade the robot control program and to search the information they need through the

internet.

1.4.3. Audience

The competition range is not large enough to stay too much people. So we need to

place a huge of LCD monitor for the Audience to watch the competition. Also we need to

have On-line retransmission for those who can not go to the competition range. And

competition situation will have video recording and uploaded to the internet for people to

download.

1.4.4. Host institution

The host institution needs to monitor the whole competition to prevent any cheating

during the competition. They also need to check the result of each team so that they can

prepare for the award.

1.4.5 Judges

The judges need to have a most accuracy results of each event which help to provide

a fairy result to the participant.

1.5 Users requirements and scope of project

User requirements

1.5.1 Crew

Crews need to have a stable and fast network. Also they need to have the latest

information so that they can help to contact the teams with some small changes. They are

also need to have a platform for them to get help.

N5

9…..

1.5.2 Participant

Participant need to have a fastest response time of the network, clear instructions of

the competition range and the fastest, stable network environment. They also need to have

authority to installing the external software for specific use.

1.5.3 Audience

The audiences need to have a stable network a clearly watching view of the events,

knowing the sequence of each team.

1.5.4 Host institution

The host institution needs to have a stabled network. And have a easy control

software to control the competition and to calculated the marks of each team. Beside they

are also need to monitor a whole competition network security.

1.5.5 Judges

The need to have an accuracy result to determine the winner of the competition

The scope of the project

In this network, there are 50 desktop computers and 10 laptop computers. Most of

the desktop computers are placed in different classroom. Each classroom will have 4 to 5

desktops computer for team to use and have 1 to 2 laptop computers for the crew to use.

The computers are required to install with Microsoft window XP professional Edition with

SP3. Also, if the participants need to install some specific software such as word

processing, spreadsheet, drawing, and database programs to finish their job, they could

have the authority to do it. But it must apply in anticipation. For the security parts other

network devices also needed. Such as Firewall.

N5

10…..

2. Analysis

2.1 Understanding of the problem: identify key sub-problems

There are major of problems establishing competition day network.

2.1.1 Network topology

The word topology means "the study of maps". Network topology defines the

structure of the network. The topology definition contains two parts. The first part is the

physical topology which means the actual layout of the wire or media and the second part

is the logical topology which means how the media is accessed by the hosts for sending

data. It is difficult to find a most suitable topology for the network design.

2.1.2 Cable

A cable is the media between two or more workstation and devices to transfer data.

It used for the transportation of network signals to destinations. It content two different

parts. The first one is the wired transmission. It uses the coaxial cable, twisted pair or

optical fiber for data transmission. The second part is the wireless transmission. It uses

the light, radio frequency and microwave for data transmission. Different cable has its

specific property; it is not easy match the suitable cable with the chosen topology.

2.1.3 Network model

The network model is a database model conceived as a flexible way of representing

objects and their relationships. Its distinguishing feature is that the schema, viewed as a

graph in which object types are nodes and relationship types are arcs, is not restricted to

being a hierarchy or lattice. Examples of network models are Peer-to-Peer and

Client/Server. Two network models have different pros and cons, which is difficult to

make a selection.

2.1.4 Connecting devices

The functions of connecting devices are used to sending data to the network and

N5

11…..

receiving data from the network. The common connecting devices used are hub,

switching hub, repeater, bridge and router. Most of the connecting devices would be use

according to this network diagram. But it is difficult to find where I should use the

devices in the STLC.

2.1.5 Type of LANs

LAN has relative small local area coverage Confined to small building or serial of

buildings. LAN connects router, workstation, network printers and other devices so that

network users can share the resource within the network. There are only two types of

LANs will be used. The first one is the wired LAN and the second one is the wireless

LAN. Two of the LANs are need to be used according to the network design. But it is

difficult to know how we can install that kind of LAN.

2.1.6 Bandwidth

We need to consider the bandwidth of the network is enough or not. If the

bandwidth is not enough we need to replace some of the network devices of reduce some

of the event happen at the same time.

2.1.7 Security method

This the open competitions which allow different kind of people enter. And it may

increase the chance being hack by the hacker. We need to find a suitable network security

method to ensure the network is stable enough.

2.1.8 Cost

Since the cost of holding up the network is very high, and it is impossible to holding

up the network with such a high cost. And it is difficult to build the network with a very

law money.

N5

12…...

2.2 Possible alternative methods

2.2.1 Physical Topology

Topology

Ring topology Hybrid topology

Dual ring topology Description A Star topology has a central

node with its entire links to other nodes radiating from it.

A combination of any two or more network topologies

A network topology in which two concentric rings connect each node on a network instead of one network ring that is used in a ring topology.

Advantage 1. Networks are relatively easy to install

2. Easy to manage.

1. Network are relatively easy to install 2. A lot of different choice.

1. If one of the ring broken down, data still can move

Disadvantage 1. Requires more cable length

2. If the hub or concentrator fails, nodes attached are disabled.

1. More difficult to configure. 1. More difficult to configure. 2. Difficult to install

Example 10Base- T Ethernet networks Star-ring topology y, Bus-ring topology

N5

13…..

Topology

Extended star topology

Tree topology

Mesh topology

Description Each of the end nodes of the core topology are acting as the center of its own star topology

It consists of groups of star-configured workstations connected to a linear bus backbone cable

Every node is linked directly to every other node

Advantage Networks are relatively easy to install and manage.

Point-to-Point wiring for individual segments. Supported by several hard ware and software venders

Any link fail to function, information can flow through any number of other links to reach its destination

Disadvantage 1. Requires more cable length 2. If the hub or concentrator fails. 3. Nodes attached are disabled.

1. If the backbone line is breaks, the entire segment goes down 2. More difficult to configure.

1. It is difficult to install 2. It is expensive to have redundant connection to every computer

Example 10Base- T Ethernet networks School network and company network.

wireless networks

N5

14…...

Logical Topology

Two most common types:

• Broadcast topology - each host sends its data to all other hosts on the network

medium. There is no order the stations follow to use the network, it is first come, first

serve. Example: Ethernet

• Token-passing controls network access by passing an electronic token sequentially to

each host. When a host receives the token, that host can send data on the network. If

the host has no data to send, it passes the token to the next host and the process

repeats itself. Examples: Token Ring and Fiber Distributed Data Interface (FDDI)

2.2.2 Cable (WIED)

Coaxial cable

Unshielded Twisted-Pair (UTP) cable

Fiber-optic cable Shielded twisted-pair cable

N5

15…...

Compare different type of cable

Cable Coaxial cable UTP Fiber-optic cable

Description An electrical cable with an inner conductor surrounded by a tubular insulating layer

Pair of wires is insulated from the others through cancellation

A glass or plastic fiber that carries light along its length

Advantage 1. Less expensive than optical fiber2. long distance 3. It can be run without boosts

from repeater. 4. Higher capacity communication

1. relatively lower costs 2. Easy to install 3. Smaller

1. Not susceptible to electromagnetic interference. 2. capable of higher data rates

Disadvantage More expensive than UTP More prone to electrical noise and interference

More expensive labour-intensive in installation

Limitation 1. Maximum distance 500M

2. Properly grounded

1. 100 meter maximum without being boosted

1. After disseminating one kilometer will loses 4.5% of signal.

Uses connect home video equipment telephone systems Fiber optic sensors

Topology Use Bus topology Star topology Tree topology

N5

16…...

Cable (Wireless)

2.2.3 Network Model

Peer-to-Peer Client/Server

Diagram

Feature Each work station communicate

to another workstation without

pass though server.

All the devices in the network are

connecting to the server.

Host N/A Server (file server)

Resources Sharing Disperses Centralized

Installation Cost Cheaper Expensive

Security N/A User authentication

Advantage a) Simple to setup a) Easy to manage

802.11b 802.11a 802.11g

2.4 GHz 5 GHz 2.4 GHz

Worldwide US/AP Worldwide

11 Mbps 54 Mbps 54 Mbps

Frequency Band

Availability

Maximum Data rate

Other Services (Interference)

Cordless Phones Microwave Ovens Wireless Video Bluetooth Devices

Cordless Phones Microwave Ovens Wireless Video Bluetooth Devices

HyperLAN Devices

N5

17…..

b) Cheaper b) Higher network security

Disadvantage a) Difficult to manage

b) Not safety

a) Expensive

b) When the server is down, all

the services are stopped

2.2.4 Connecting Devices

Hub

Switch

repeater

Bridge

N5

18…..

Router

The function of connecting devices

Hub Hubs concentrate connections. They take a group of hosts and

allow the network to see them as a single unit. Active hubs also

regenerate signals

switch Workgroup switches can determine whether data should remain on

a LAN or not as bridges do, they can also transfer the data only to

the connection that needs that data. This feature makes a switch

transmits data faster than a bridge

Repeater Repeaters regenerate signals distorted by transmission loss due to

attenuation

Bridge Bridges provide connections between LANs. They also determine

whether data should cross the bridge or not. This makes each part

of the network more efficient

Router Routers can regenerate signals, concentrate multiple connections,

convert data transmission formats, and manage data transfers. They

can also connect to a WAN, which allows them to connect LANs

that are separated by great distances.

N5

19…..

2.3 The criteria of the selection

The criteria:

a) Higher data transmission speed.

b) Higher mobility.

c) Lower cost

d) Higher security

2.3.1 Chosen of topology:

I have chosen the extended star topology because of the competition area is quite large

enough to cover competition range. Therefore, I need to choose a network topology can have

enough shape to cover all the competition area. Therefore, Extended Star topology is the most

suitable one for the competition. In addition, this topology is providing the fairness of the

competition. If one of the devices is out of order, the room of the competition range cannot

access to the Internet.

2.3.2 Chosen of cable

Two different of network would be used for this network. They are wired and wireless

network. For the wired network, UTP cable would be used. Because UTP cable has a lower

installation cost, and it is easy to install. Moreover it is the most common cable used for the

extended star topology. For the wireless network, 802.11g would be used. Because of it can

provide a highest maximum data transfer rate of 54Mbps. And it also gets an enough

frequency band of 2.4GHz.

2.3.3 Chosen of network model

I would choose a Client/Server model. Because of Client/Server model can centralize

the sharing resources while taking participant attendance and recording event results. In

addition, it has a high network security with using user authentication than Peer-to-peer

network (P2P). Although the Client/Server Model requires an administrator to maintain the

N5

20…..

network, the host institution can establish a department to maintain the whole network.

Therefore, the network can have specialized capable person to upgrade and manage the

network.

2.3.4 Chosen of connecting devices

Because of the competition range are vary large and need two different type of network.

Therefore, the connecting devices need to be possible to send a wireless signal and a wire

signal. Therefore, router, switch and bridge need to be use. They can transmit wire signal, and

connect two different type of LAN.

2.3.5 The type of LAN

The type of LAN would be used is wired LAN and wireless LAN. Because participant

needs to send data to the robot though wireless network, and receiving request from the host

institution server though the wired LAN. Therefore, that is can have a higher mobility for the

participant.

Conclusion

In conclusion, the decisions of the network are as follow:

Network Topology Extended star topology

Cable STP, 802.11g

Network model Client/Server

Connecting devices Router, switch and bridge

Type of LAN Wired LAN and wireless LAN

N5

21…..

3. Design and Implementation

3.1 The information collection process for creating the solution

To collect the information needed for the design, I have considered the floor plan of the

STLC. Also, to get the information about the users, I have sent a set of question paper to the

participant to ask what they needed in the competition. Moreover, I have referred to the

network design of the center to get some information about the condition of the center

network. Here is some information that I get form different way.

3.1.1 Comment from the teacher

I have invited our school networking teacher – Mr. X to give some comment for our

networking design. He is a teacher who teaches for our communication and information

technology. He must has a lot of experience and knowledge about how to design a network

and how to solve the computer problems. So I ask him for help. And he answer me that I can

design the network up to what I thinks of. He adds more all I want to add to the design must

be related to the goal of this project. Moreover he had also teach me how to use the packet

tracer to solve a lot of network connection problems.

3.1.2 Knowledge from books and Internet

I have read a lot of book and searching a lot of information from the Internet. I have

learnt a lot of skill about network design and implementation. For example set up a firewall

and application proxies.

Books: 1. Computer an Information Technology for HKCEE Module C (Lawrence Y.L. Wong and Kit Chan, Digital Vision Education Publishing) 2. Information assurance: dependability and security in networked systems (Yi Qian

James Joshi David Tipper Prashant Krishnamurthy)

3. Cisco networking simplified (Anderson, Neil, Della Maggiora, Paul L.) 4. Optical Networking Design and Planning (Simmons, Jane M.) 5. Network management: concepts and practice (Burke, J. Richard) 6. Cisco frame reply solutions guide (By Jonathan Chin.Published by Cisco Press.)

7. Data network design (Darren Spohn, Tina Brown, and Scott Grau)

N5

22…..

Internet: 1. http://ansnetworksolutions.biz/

2. http://compnetworking.about.com/od/networkdesign/Network_Design.htm

3. http://en.wikipedia.org/wiki/Network_planning_and_design

4. http://www.hkgolden.com/

5. http://www.nec.com.au/professionalservices/networkimplementation.htm

6. http://networking.ittoolbox.com/topics/implmnt/

7. http://www.itp.net/494609

3.1.3 Experience from joining the competition

Since I have joined the “Hong Kong – Macau Youth Networking Skills

Competition” before. And I had learned a lot of network information from this

competition. For example I have learnt which type of cable should be use when we

connect different connecting devices. And it also teaches me more specific information of

how to use the packet tracer. For example how to know what is the gateway of the devices

and how can we setting the password and WEP to the router of packet tracer.

Competition: Cisco (Hong Kong-Macau Youth Networking Skills Competition)

N5

23…..

3.2 The overall plan or structure of the solution

The design shows the whole network environment of wireless robot competition. The figure show how the competition rooms work

N5

24…..

Briefly description of the network

This network includes three different interfaces. They are trusted area, semi-trusted area

and untrusted area. Each kinds of area contain different kind of network components. Fist let

talk about the untrusted interface, this interface only have a router to connect to the Internet.

The router is used for connect the LAN to the WAN. Second is the semi-trusted interface.

This includes two servers, which are mail server and web, which used for communicated with

outside people. The third interface is the main parts of the network. It connected with three

different servers, 5 rooms that used for the competition, and a control rooms. Then may we

talk about the competition room network. Inside the competition room, there will be having 5

workstations which connect to the router to allow sending data to the robot. Also these

workstations are allowed for the participant to make some small changes of the robot database.

Moreover the router inside the competition room is also allowing for the crew used to receive

or sending message.

3.3 The major parts involved in the solution relations of others

3.3.1 Router

Router is using to connect the STLC network to the Internet. The function of

router is it connects to a WAN, which allows them to connect LANs that are separated by

great distances. The STLC is a local area network, it need a machine to regenerate signals

from the WAN. Therefore, router is need.

3.3.2 Firewall

Firewall is a collection of components placed between two networks. It’s used to

limit network access to authorized users. It also can determine whether a packet or a

connection request should be allowed to pass through the network. So that it can

prevent any attack from outside user. There are two common types of techniques of

firewall. They are packet filtering and application proxies. And these two types of

N5

25…..

techniques of firewall would be also used in the network.

3.3.2.1 Packet filtering

It used to filter the data packet which is not authorized to pass through the network.

When packets pass through, the packet filter compares the packets to a set of filter rules

by examine the TCP or UDP information. The advantage is that it can apply without risk

of compromising the network.

3.3.2.2 Application proxies

Proxies break up the connection between the client and the server. It would act as

server or client when in different situation. For example to the server, the proxy pretends

to be the client. When it to the client, the proxy pretends to be the server. The advantage

is that there is no direct communication takes place between the client and the server. A

proxy can therefore check the legality of traffic between the client and server.

3.3.3 Switch

Switch is used to separate LAN areas to improve network performance. It enables

ports to build independent channels. Also it controls multi-nodes data transmission and

prevent network congestion.

Switch is a dedicated communication path which is established between the sender and

receiver along which all packets travel. Therefore switch is needed.

3.3.4 Wireless Router

It used for the communication between the workstation and the robot. It also allowed

for the crew to sending information to the control room and uploads the result of the

competition to the web server. Therefore wireless routers are needed for the competition.

3.3.5 Server

3.3.5.1 Application Server

Application server which installs all the software needed for the competition. That

means all the resources and programs will be install there. Therefore it can reduce the cost

N5

26…..

on buying the software. For instance the entire PC can connect to the application server,

and download all the resource they need inside the application server. So application

server is needed.

3.3.5.2 FTP Server

FTP server is used for the participant to share data to their teammate. It also one of

the important way that the host institution to upload the data, which need for the

competition, after the competition was start. So the FTP server is needed.

3.3.5.3 Proxy Server

Proxy server is used to keep machines behind it anonymous. It also can speed up

access to resources. Also it can help to protect the data access to the intranet. So that the

participant will not be afraid other people to attack their workstation. Therefore the proxy

server is needed.

3.4 The problems arising in implementation and dealt with

3.4.1 Too much workstation

There are a lot workstation and connection devices of the network design. It is

difficult to install the entire network device on the network diagram. Since the plots of

each network devices are fixed, so it is difficult to connect all the work station with the

connection device. Second the network connecting speed are fixed. If there are too much

workstation connect to the internet, the bandwidth of the STLC centre will be affected.

And the number of work station can not be reducing, so it is difficult to install the

network which can have a higher bandwidth and faster transfer speed.

3.4.2 The STLC center

Since the area of the STLC center are very large. When the data transmit though

long distance, the signal will turns weak due to the effect of electromagnetic interference.

So it is difficult to transmit data from different competition room. And it is not easy to

N5

27…..

arrange the place for the server location. Because we need to ensure the distance between

competition room and the server room should be very less. So it is difficult to place the

server room and the competition room.

3.4.3 The use of network operation system

There are many kind of network operating system nowadays such as Macintosh

OSX, Microsoft Windows Server, Novell and UNIX. These are some of the more

popular peer-to-peer and client/server network operating systems. But how to choose a

operating system which allow people to install the program is very difficult. Because

different software is require to install in different operating system. That means not all

the software can install in one operating system. So we need to make a choice for

choose which OS we need to use. Therefore I decide to use Microsoft Windows Server.

Because this operating system is the most comment one that most of the programs are

use with this OS. That means all the server would install with Microsoft Windows

Server and all the workstation would install with Microsoft Windows XP Professional.

And the entire participant can use more program to edit their robot data base.

N5

28…..

3.5 Complete the design of the network environment which is able to provide the following services

The complete network of the competition. The complete network of the Competition room.

N5

29…..

A Full set up of network diagram

N5

30…..

3.5.1 Computer setting which allows for the programming of individual

robots through student network accounts Each robot would contain its private IP address and password. Participant would

receive its own password after the competition was begun. Each computer would install a

program which allow student to edit the database of the robot. Also the authority of the

participant account will be limited. That means participant will be not allowed installing

any kind of software during the competition. And there will be enough authority for

student to transmit the data to the robot.

3.5.2 Sharing of programming data stored in a disk drive In this network design, there will be a FTP server for the participant to share data

stored in a disk drive. They are also allowed for the participant to download the data form

the FTP server. Each of the file uploaded will contain a few bits of data that used to

identify the participant. This method is used to prevent the virus upload to the FTP server.

3.5.3 Transmission of computer programs to the robots through Wi-Fi Each of the workstation would connect to the wireless router which provides Wi-Fi

coverage to the competition area. So that participant can send data to their own robot

though the router. To increase the rate of data transmit rate, the entire participant group

would arrange into different competition rooms so that it can reduce to much work station

access to the internet at the same time.

3.5.4 Result taking All the result would be marked by the crew during the competition. Then the crew

would send the result to the control room, and arrange all the result at the control room.

After the arrangement the result would upload to the STLC website. After people can

check for their result after the event was finished.

3.6 IP address management 3.6.1 Dynamic Host Configuration Protocol (DHCP) Dynamic Host Configuration Protocol is a computer networking protocol used by

devices to obtain configuration information for operation in an Internet Protocol network.

This protocol reduces system administration workload, allowing networks to add devices

with little or no manual intervention. For this network design, the main server will also

act as the DHCP server which used to give the IP address to the all the workstation.

N5

31…..

3.7 Network Security

3.7.1 Security Control

The network security control of the network will be consists of three parts. The first

part is about the firewall and proxy. This part of network is used to limit the network

access to authorized users. The second part is that we will arrange the network

administrator to stay inside the control room for monitoring the network traffic and CPU

utilization. Therefore the network administrator can detect the problems and solve it

immediately. The third part is about the login name and password. The login name and

password for access to the Internet would be change every day. This is the way that

prevents other people to get into the network.

3.7.2 Access control

By referring to the figure shown above (The figure show how the competition rooms

work), It shows that the wireless router only provide a limiting coverage where allow the

robot to receive the signal from the wireless router. It can prevent other people who are

not entering the competition to use the network. Also the login name and password would

be change every day, it can prevent the people, who are not allowed to use the network, to

access the network.

3.7.3 Redundant Array of Independent Disk (RAID)

Redundant Array of Independent Disk (RAID) is used to improve the availability of

the network. It is a technology that allowed computer users to achieve high levels of

storage reliability from low-cost and less reliable PC-class disk-drive components, via the

technique of arranging the devices into arrays for redundancy. It provides fault tolerance

and protection to the HDD of file servers.

3.7.4 Uninterruptible Power Supply (UPS)

Uninterruptible Power Supply is a battery backup, which provides emergency power

and, depending on the topology, line regulation as well to connected equipment by

N5

32…..

supplying power from a separate source when utility power is not available. There are two

common systems in use today: standby UPS and continuous UPS. A standby UPS runs

the computer off of the normal utility power until it detects a problem. At that point, it

very quickly (in five milliseconds or less) turns on a power inverter and runs the computer

off of the UPS's battery (see How Batteries Work for more information). A power

inverter simply turns the DC power delivered by the battery into 120-volt, 60-Hertz AC

power.

3.7.5 Virtual Private Network (VPN)

A virtual private network (VPN) is a computer network that is implemented in an

additional logical layer on top of an existing larger network. It has the purpose of creating

a private scope of computer communications or providing a secure extension of a private

network into an insecure network such as the Internet.

3.7.6 Wired Equivalent Privacy (WEP)

Wired Equivalent Privacy (WEP) is a deprecated algorithm to secure IEEE

802.11 wireless networks. Wireless networks broadcast messages using radio and are thus

more susceptible to eavesdropping than wired networks. When introduced in 1997 WEP

was intended to provide confidentiality comparable to that of a traditional wired network.

3.7.7 Wi-Fi Protected Access (WPA)

Wi-Fi Protected Access a certification program created by the Wi-Fi Alliance to

indicate compliance with the security protocol created by the Wi-Fi Alliance to secure

wireless computer networks.

The WPA protocol implements the majority of the IEEE 802.11i standard, and was

intended as an intermediate measure to take the place of WEP while 802.11i was

prepared. Specifically, the Temporal Key Integrity Protocol (TKIP), was brought into

WPA. TKIP could be implemented on pre-WPA wireless network interface cards that

N5

33…..

began shipping as far back as 1999 through firmware upgrades. Because the changes

required fewer modifications on the client than on the wireless access point, most

pre-2003 APs could not be upgraded to support WPA with TKIP. Researchers have

since discovered a flaw in TKIP that relied on older weaknesses to retrieve the

keystream from short packets to use for re-injection and spoofing.

3.8 Types of network connection

3.8.1 Network Topology

I will use the extent star topology to set up the network of the wireless network

competition. The star topology is easy to install and maintain. Also this topology is

flexible and scalable to resize the network. This network topology will not affect the

network except the central point was change or damaged. However it will give a higher

installing cost, which affects the network. But the main use of connection medium is

using the Wi-Fi, therefore it can reduce the cost of setting up the extant stat

3.8.2 Network Model

I will use Client/Server Network as the model of the network in wireless robot

competition. All the workstation (Client) would connect to the switch (Server). In this

model, it can centralize resources and data transmit in the network.

The network is easy to be managed in Client/Server Network model as resources

sharing is centralized and controlled by a server. The network administrator can easy to

monitor the data transmit inside the network.

However the cost of setting up the network is every high, because of the cost of

server and the connecting devices.

N5

34…..

3.9 Cost of setting up the network (The lowest cost plan)

Items Model Introduction Quantity Cost@ 1 Cost

PC Lenovo H210PC CPU: Celeon 430

Ram: 1GB

HDD: 160GB

DVD: DVD-RW

OS: Vista Home Basic

10 $1999 $19990

Robot Robot 88311 SKU: SILVERLIT-BUILD-A-BOBOT

Shipping Weight:1500g

Manufacturer: Silverlit

40 $373.08 $14923.2

Router DLink DIR-100 Router / RJ45 / 4 Equipment Type: Router

Interface: RJ45 No. of Ports: 4 1 $199 $199

Switch for semi EDiMAX ES-3105P 5 ports 10/100 Switch 1 $98 $98

Switch for trusted Level One FSW-2421 Switch / RJ45 / 10/100M Equipment Type:

Switch

Interface: RJ45

Speed: 10/100M

No. of Ports: 24

1 $460 $460

Wireless router DLink DI-808HV Router/VPN / RJ45 / 8

Equipment Type: Router/VPN

Interface: RJ45

No. of Ports: 8

5 $958 $4790

UPS APC BACK-UPS CS

350VA (BK350EI)

Output Power: 350VA / 210W 3 $560 $1680

server PowerEdge R200 Slim form factor (1U) servers ideal for network

infrastructure or web applications 5 $6,900 $34500

Firewall ASUSTek RT-G32 2.4GHz / MAC address Frequency: 2.4-2.5GHz

Authentication: MAC address Firewall: NAT

Firewall,IP filter Firewall: URL based

filter,MAC Address filter

1 $169 $169

Total cost $58809.2

N5

35…..

4. Testing and Evaluation

4.1 Checklist and testing plane

4.1.1 Workstation & robot Testing Area Purpose Steps Expected result All the workstation and robot 1. To prevent some of the computer

are out of order 2. Make sure all the computer can be

use

1. Switch on all the computer 1. All the computer can be switched on

Remark: Finish or not?

4.1.2 Cable Testing Area Purpose Steps Expected result Cable connection 1. To make sure the cable have not

damage 2. Can send data efficiently 3. Did not make wrong connection

1. By using a cable tester 2. Connect two head of the cable

to the cable tester 3. Switch on the cable tester

1. A pair of corresponding green light will be light up at the same time. There will be totally 8 pairs of green light will be light up step by step.

Remark: Finish or not?

N5

36…..

4.1.3 Hardware Testing Area Purpose Steps Expected result Switch Switch 1. To ensure the switch can work 1. Connect two or more than two

workstation to a switch 2. Sending a data from one PC to

another one 3. Check for the receiving data

1. Data send = data receive

Wireless Router Wireless connection 1.To make sure the router can share

the network 2. It can provide a wireless coverage

1. Switch on the router 2. Connect one wired PC and one

wireless PC with a router 3. Send a data form wired PC to

wireless PC 4. Check for the data 5. Send back the data from a

wireless PC to a wired PC

1. Data send(wired PC) = data receive(wireless PC)

2. Data send(wireless PC) = data receive(wired PC)

UPS Power supply 1. To ensure the power can continue

supply when the power is short circuit

1. Connect the UPS to the server 2. Cut the power supply which

connect to the server 3. Cut the power supply which

1. The server still work for few minutes

N5

37…..

connect to the server

Remark: Finish or not? 4.1.4 Server

Testing Area Purpose Steps Expected result FTP server FTP server 1. Participant can upload and

download data at FTP server 1. Connect a wired PC to a FTP

server 2. upload data 3. download data

1. The PC can upload and download the data

Domain Controller Domain Controller 1. To ensure all the user can login

into the network 1. Set up the group of the users 2. Set up the users accounts 3. Access different group of the

user accounts

1. All the account can be log into the network

Application Server Application Server 1. The application server can be

install software 2. The PC use the software installed

in application server

1. Install a software inside an application server

2. Connect a PC to the server 3. Use the software

1. The PC can use the software

Mail Server

N5

38…..

Sending and receiving e-mail 1. The mail server can send and receive e-mail

1. Set up the group of the users 2. Set up the users accounts 3. Access different group of the

user accounts

1. Can receive e-mail 2. The other mail server account

can read the e-mail

Web Server Webpage 1. The webpage can update the

information 2. People can browse the webpage

from the search engine 3. People can read the website

1. Create a webpage and upload to the web server

2. Using a PC to search for the webpage

3. PC can read the website 4. Make some change of the

webpage 5. PC refresh the web browser 6. Read the website again

1. The PC can find the website from the search engine

2. The PC can read the website 3. The PC can find the changes

Remark: Finish or not? 4.1.5 Network Connection

Testing Area Purpose Steps Expected result TCP/IP IP address 1. All the PC can get the IP address

2. Different PC and robot have 1. Use more than one computer 2. Use command program

1. It will show the IP address of the computer

N5

39…..

different IP (cmd.exe) of the computer 3. Input the command

“ipconfig/all”

2. Different computer will have different IP

Connect to Internet Web browsing 1. To ensure the computer can use

the Internet Method 1 1. Use command program

(cmd.exe) of the computer 2. Input the command “ping

xxxxxx”(xxxxxx= IP address)Method 2 1. Use web browser 2. search a webpage

1. Method 1 It will reply 4 set of data

2. Method 2 It can show the webpage

Connection to Intranet The Intranet 1. The data can in the Intranet

without posting it to the Internet 1. Use command program

(cmd.exe) of the computer 2. Input the command “ping

xxxxxx”(xxxxxx=IP address of the Intranet devices)

It will reply 4 set of data.

Remark: Finish or not?

N5

40…..

4.1.6 Network Security Testing Area Purpose Steps Expected result WEP Wireless Router 1. Ensure it has WEP function

2. Prevent other user get into the network

1. Using a wireless computer 2. Access to the network

though wireless router 3. Without enter WEP

1. The wireless computer cannot access to the network

Network access password Wireless network 1. Prevent other user get into the

network 1. Use a wireless computer 2. Access to the wireless

network 3. Without enter password

1. The wireless computer can not access to the network

The access point Wireless access coverage 1. Prevent other user get into the

network 1. Use a wireless computer to

check the wireless coverage2. To change the coverage

inside the wireless router if the coverage is too large

1. Out of the expected coverage no access point can be founded

Firewall Firewall – Divide the network into three area

1. Easy to monitoring 2. Higher network security

1. Setting up the firewall 2. Making connection with two

switches ( one for a web

1. The computer only can access to one switch which connect to a web server and mail

N5

41…..

server and mail server, the other one for main server and FTP server)

3. Use a outside computer to enter the network

server.

Firewall Firewall – Limit the data inside 1. Prevent virus

2. Prevent other user get into the network

1. Setting up the firewall 2. Sending the data which some

contains the filtering words to the network

1. Only some of the data which not contain any filtering work can access to the network

Remark: Finish or not?

N5

42…..

4.1.7 The tool used for the testing plan

cable tester cmd.exe

N5

43…..

4.1.8 IPconfig/all (Command)

4.2.8.3 Ping (Command)

N5

44

4.2 Limitation of network design

4.2.1 Lower bandwidth

In this network design, it expects there will have at least 40 workstations work at the

same time. Since the bandwidth of the network is fixed. If all the workstations share the

network resource or using the network resource at the same time, the bandwidth will be

decrease and the data transfer rate between the workstation and server would also

decrease. So it would affect the time taken during the competition. Therefore I suggested

that we should not use too much wireless devices at the same time. Different event would

start at different time. Thus we can reduce the too much workstation access to the Internet

at the same time.

4.2.2 Lower Scalability

According to the network design, each wireless router should connect with 8 wired

computers. And the wireless router used is only with 9 connecting plots, so it is difficult

to connect one more wired device with the wireless robot. Therefore the scalability of this

design is very low. Therefore I suggest that we can divided some event to the smaller one,

thus we can have more nodes for other use of network access.

4.2.3 Higher Installation Cost

There is too much network devices used for this network design. It will then increase

the cost of building this network. Therefore I suggested some network devices can be

canceled. For example mail server, we can use some free network mail service instead of

building the mail server. We can go this kind of service provider website to build up an

e-mail account. Thus we can reduce the cost of building up a powerful server.

N5

45

5. Conclusion & Discussion

5.1 The achieved requirement

In this network environment, all the requirements have been achieved:

5.1.1 computer setting which allows for the programming of individual

robots through student network accounts There is an application server setting inside the network diagram. Host institution

can upload some information or data, which help the participant to design the robot, and

install the entire program needed inside the application server. After that the participant,

crew and host institution can access to the application server, and download all the data,

information, and program them need. Then, they may use that information to design their

own robot. After the design, they can send the data to the robot though the wireless router

which is setting inside the competition area.

5.1.2 sharing of programming data stored in a disk drive There is a FTP server inside the network environment which allow participant to

share some data or design to their teammate or other competitor. The participants are only

need to upload the data to the FTP server. When other participant access to the FTP

server they can find the uploaded data. Participant can have authority to setting up a

password to all there uploaded data. So it can prevent any data may loss to some

unwanted users.

5.1.3 transmission of computer programs to the robots through Wi-Fi

There are some wireless router install in each competition area. Students are

allowed to send the data or programs to their robot through Wi-Fi. Each student would

receive the unique MAC address and WEP of their specific robots. This can prevent other

user destroy the programming setting of robot or help the participant to cheat for the

event.

5.2 improvements

Other improvement still can be made:

5.2.1 Connection speed of the network

N5

46

Because this is the time competition, even if will be the very few time will also

affect competition's accuracy. Thus we need to increase connection speed of the network.

Therefore I suggest that we can use optical fiber to replace some of the UTP cable.

Optical fiber has a higher data transfer rate. It can reduce the time for data transmission.

5.2.2 Sharing of network resources

Some network resources may be needed during the event, such as network printer.

The result may need to print out after the event, the participant can know for their result

immediately. Therefore I suggest installing a network printer inside the competition area.

5.2.3 Network backup

Some computer problems may occur during the competition. And it will take so

much time on back up the file into the CD rom and other secondary device. So I suggest

connecting shortcut of FTP server in each of the workstation. The participant no need to

searching the FTP server during the competition and they can save all their inside the FTP

server. If the computer suddenly gets out of order, the participant can use another

workstation to continue the competition.

5.2.4 Integrity of the competition network and the STLC network

The competition network is actually one of the subnets in the STLC network. The

Internet gateway of the competition network is located in the STLC network. In other

words, the network gains its Internet signals from the STLC network. The resources of

the two networks can be exchanged and read. There we should encrypt all the data inside

the STLC network. It helps to protect the secrets of the STLC network.

5.2.5 Result taking

The design has achieved the requirement of result taking. By using the

web-based result recording system, the procedure of taking results will be reached

automatically. It can also improve the accuracy of the data so judges can use the data

to give a fair result.

N5

47

5.3 Insights gained on learning about how to learn / Solve

the problems

After doing this project I can learn more side of solving the problem when I am

facing some problems. When the problem occurs, I would fist try to identify the problem

and try to mark down a lot of observable symptom of the problem. Then I will try to find

more case with the similar symptom on the Internet. And try to solve the problem by

using the Internet given method.

Second, it provides a chance for me to have an experience to organize to competition.

It gives a reason for me to learn more about networking information and the robot

competition. And I can find more updated information about IT Development.

Third, the greatest benefit is provided an available chance for me to practice for my

English. By doing this project, I need to know more specialized term of the computer

vocabulary. So I have tried to read a lot of website, which are written in English, to lean

the specialized term. After that I need to write a project of the wireless robot competition.

Sometimes I also need to share my point of view of this project to my classmate. Thus it

gives a lot of chance for me to practice my poor English such as reading, writing and

speaking.

Lastly, after finishing this project, I found that I have learnt a lot of extra computer

technology which is difficult to learn from the lesson. These technologies are WPA, WEP,

and VPN. These are not common technologies teach in the lesson. When I search this

information, I also learn the history of the IT development. All this are my get after doing

this project.

N5

48

5.4 Knowledge discovered which is relevant for other people

similar projects in the future

The networking technology that the project induced can be provided for other people

who doing for the similar project in the future. For example, the Network Design, the

function of networking device, the property of different transmission cable, the network

models and the network topology. These are the information always remains unchanged

and did not always update. So it can be some useful information or knowledge for the

future people doing the similar project.

Solving problem is another important technology for the project. It helps me to

identify the problem and help me to find some suggest solution to solve the problem. And

it is the easiest way to help the network administrator to solve the problem.

To sum up, the computer technology always updated every day. Although it always

make changes but the rule of the computer are always the same. So the technology l have

suggested above are always never be change. These are the rule of the Computer

information technology.

N5

49

6 Documentation

6.1 User instruction How to login to the network (computer/wireless devices)?

1) Switch on the computer

2) Wait until a login requested is shown on the page

3) Click “Ctrl”, “Alt” and “Del” button

4) Input your user name/ user ID

5) Input your default password

6) Click “Enter”

How to submit file?

1) Launch the web browser

2) Click “my favorites”

3) Click a website “submit my works”

4) Click “browser” and choose your file

5) Click “upload”

How to use FTP?

1) Launch my computer

2) Go to the FTP server drive

3) Input your user ID and password

4) Upload - Copy the data that you want to upload and paste into the FTP page of the web

browser

5) Download - Select and copy the data that you want to download and paste into the

folder that you want to download there

How to use application server?

N5

50

1) Launch my computer

2) Go to the Application server drive

3) Input your User ID

4) Input your password

5) Choose software

6) Make a shortcut of the software to the desktop

How to sending packet to robot?

1) Using the given software of the robot

2) Search the robot by using the software

3) Click a button “send packet”

4) Chose the packet you want to send

5) Search the corresponding robot

6) Input the password of the robot

7) Click send

N5

51

6.2 Method for creating the solution

I will first identify the problem. And then I will try to find other people who are suffer

from the same problem before. After that I will get the solution of solving the problem. If

there is no people suffer from the same problem, I will try to search more information

from the internet. Then I will try to design all the possible way to solve the problem.

After that I will evaluate all possible way and select the way that meets the goal.

Moreover I will test the recommended way. Finally I will give a detailed description of

the solution with an explanation of how the choice was made. If the problem still cannot

be solved I will find help some IT expert.

Algorithm design

Problem analysis

Problem identification

Developing a solution

Debugging and testing

Documentation

Problem solving procedure

N5

52

7. Acknowledge

Teacher

Mr. X (A computer teacher from Y collage)

Books Computer an Information Technology for HKCEE Module C (Lawrence Y.L. Wong and Kit Chan, Digital Vision Education Publishing) Information assurance: dependability and security in networked systems (Yi Qian James Joshi

David Tipper Prashant Krishnamurthy)

Cisco networking simplified (Anderson, Neil, Della Maggiora, Paul L.) Optical Networking Design and Planning (Simmons, Jane M.) Network management: concepts and practice (Burke, J. Richard) Cisco frame reply solutions guide (By Jonathan Chin.Published by Cisco Press.)

Data network design (Darren Spohn, Tina Brown, and Scott Grau)

Website http://ansnetworksolutions.biz/ http://compnetworking.about.com/ http://en.wikipedia.org/wiki/Network_planning_and_design http://www.hkgolden.com/ http://www.nec.com.au/professionalservices/networkimplementation.htm http://networking.ittoolbox.com/topics/implmnt/ http://www.itp.net/494609 http://www.webopedia.com/ http://www.microsoft.com/en/us/default.aspx http://hk.knowledge.yahoo.com/ http://www.superdroidrobots.com/product_info/WiFi.htm