SlideShare uma empresa Scribd logo
1 de 25
Statement and Confirmation of Own Work
Programme/Qualification name:
Each NCC Education assessed assignment submitted by you must have this statement attached to
the assignment as the cover page or it will not be accepted for marking. Please ensure that this
statement is either firmly attached to the cover of the assignment or electronically inserted into the
front of the assignment.
Student declaration
I have read and understood NCC Education’s Policy on Academic Dishonesty and
Plagiarism.
I can confirm the following details:
Student ID/Registration number:
Name:
Centre Name:
Module Name:
Module Leader:
Number of words:
I confirm that this is my own work and that I have not plagiarized any part of it. I
have also noted the assessment criteria and pass mark for assignments.
Due Date:
Student Signature:
Submitted Date:
Enterprise Networking June 2011 Final @NCC Education 2011
Acknowledgment:
I am Md. Mahbub Alam is grateful to Daffodil Institute of IT (DIIT) for giving the chance to doing the
assignment in the field of Enterprise networking and it’s such a pleasure to me. I am also grateful &
like to express thanks to Mr. Sarwar Hossain Mollah Lecturer of Enterprise Networking of DIIT. His
continues support, concentration & encouragement help me to complete this assignment. Huge
unknown things are now know to me by doing this assignment. In class room we collect theoretical
knowledge about Enterprise Networking but practically I gather knowledge by doing this assignment.
It was a glorious memory by doing this assignment in my Life.
Enterprise Networking June 2011 Final @NCC Education 2011
Introduction
This is an assignment of “FURTHER EDUCATION COLLEGE” Wireless Network Design and
development. The development procedure referenced by the institute named Daffodil institute
of IT. For this assignment, I need to the entire network that will help the authority to storing
and showing the information of organization and the access of internet. Thus I will create an
appropriate documentation that will help me to develop the network completely. The
documentation should include network equipment, cost of equipment and installation, Cost of
operating the system, Building layout, Maintain security for all users, user access level on the
entire network, implementation; the documentation also contains the limitation and future
planning and user manual of the proposed network system.
Enterprise Networking June 2011 Final @NCC Education 2011
Task 1:
In this task I have to investigate which kind of wireless equipments are available in our country for
large organizations based in a single building such as the college in the scenario. I also have to
describe about:
 The main equipment that will be install.
 The how much features availability.
 The cost of equipment and installation for the network.
 The cost of operating the system.
a) The main equipment that will be install:
I investigated thoroughly number of vender devices which will be required to design to establish our
collage wireless network. I have needed some devices which will be used to establish the collage
wireless network, those are describing under the below:
Wireless Network Adapter: Connect to wireless network by adding a D-Link Wireless N 150 Desktop
Adapter to desktop computer. Once connected, It can share a high-speed Internet connection while
also getting access to shared educational students transcripts, Documents, and Students documents
with other computers on your network.ref-(i)
Figure: DWA-525 Wireless N 150 PCI Adapter
Enterprise Networking June 2011 Final @NCC Education 2011
Wireless Access Point: A wireless access point is more like a hub for wireless networks. It does not
implement a different IP address range or provide the other features of a wireless router. It simply
relays network traffic to the wireless devices within its broadcast range.
Figure: The Wireless N Range Extender (DAP-1360)
Wireless Switch: The DGS-1224TP is housed in a new style 19” rack mount case with an easy-to-
view front panel and diagnostic LEDs. User-friendly, web-based management is supported for easy
configuration and flexibility for different network requirements.ref-(ii)
Figure: DGS-1224TP Web Smart 24-Port Gigabit PoE Switch with 4 Combo SFP Slots
Server as a Router: Here I choose four servers. There is a Print server, one mail server, Web server
with proxy server and last one is working as a router with firewall.
Figure: HP server
Enterprise Networking June 2011 Final @NCC Education 2011
b) The Available features and specifications:
Wireless Network Adapter
Features availability: ref-(i)
 Compatible with Windows 7 32bit and 64bit
 Enhanced Wireless Reception and Performance Based on 802.11n Technology
 Better Wireless Technology - up to 4X Faster than Standard 802.11g*
 Connect a Desktop PC to a Wireless Network
Specifications ref-(i)
 HIGH-SPEED WIRELESS NETWORKING
 CONNECT SECURELY TO YOUR WIRELESS NETWORK
 COMPATIBILITY ASSURANCE
 EASY TO INSTALL & CONNECT
Access Point
Features availability: ref-(iii)
 Create or Extend a Wireless Network in Your Home or Office
 Easy to Install and Connect with Wi-Fi Protected Setup™
 Secure Wireless Encryption Using WPA/WPA2 Security
 Multiple modes: Access Point, Bridge with Access Point, Repeater, or Wireless Client
Specifications ref-(iv)
 2 External Detachable Antennas
 Internet Explorer® v7 or Later; Mozilla® Firefox® v3.0 or Later; or other Java-enabled
Browsers
 Item (HxWxD): 5.9” x 4.5” x 1.4” (149.9mm x 114.3mm x 35.6mm)
 Packaging (HxWxD): 10.9” x 2.7” x 8.3” (276.9mm x 68.6mm x 210.8mm)
 1 Year Limited
Switch
Features availability: ref-(iii)
 D-Link Green Technology
 48Gbps Switching Capacity
 8K MAC Address Table
 True Plug & Play
Enterprise Networking June 2011 Final @NCC Education 2011
 Fiber Media Support Via SFPs
 24 IEEE 802.3af Power over Ethernet Ports
Specifications ref-(iii)
 24 10/100/1000BASE-T PoE Auto-negotiating, Auto MDI-MDI/X ports with 802.3
Flow Control
 Up to 256 static MAC entries
 Enable/disable auto-learning of MAC addresses
 10,240 Bytes jumbo frame
 Per device: Power/PWR Max/CPU/Fan Error Port LED, Mode Indicator: Link/Act Mode/PoE
Mode
 Per 10/100/1000BASE-T port: Link/Act, 100/1000Mbps
 Per SFP slot: Link/Act, 1000Mbps
Server
Features availability:
 The DPR-1061 provides the necessary security by allowing the administrator to configure user
access right to the network printers and equipment.
 It supports a wide range of network OS including:
 Windows 95/98/ME/NT 4.0/2000/XP, Apple MacOS with AppleTalk, Linux, Solaris, SCO Unix,
IBM AIX and NetWare 5.x native NDS.
 Enjoy the flexibility and compatibility in major network OS that this print server has to offer. ref-
Specifications
Equipped with a powerful CPU, large memory, high speed USB ports and network data transfer, this
server makes your operations fast. at the same time, giving this multi-port print server a similar
performance to 3 separate single-port print servers at a fraction of the cost.
c) Installation and equipment cost:
Table of information:
Equipment Name Quantity Unit Price Total Cost Installation Cost
Access point 9 600.00 5,400.00 (2000 * 9) =18000
Switch 1 45,000.00 45,000.00 10,000.00
Adapter 450 600.00 270,000.00 (100 * 450) = 45000
Server 4 150,000.00 600,000.00 20,000.00
920,400.00 93,000.00Sub Total
Grand Total 1,013,400.00
Side Note:
Total Cost= Quantity + Unit Price
Enterprise Networking June 2011 Final @NCC Education 2011
Grand Total= Sub Total (Total Cost) + Sub Total (Installation Cost)
Enterprise Networking June 2011 Final @NCC Education 2011
d) The cost of operating the system:
Maintenance Table:
Equipment Name Maintanence Cost
Chare/ Bill
(Bandwith)
Employee/
Oparetor
Depriciation
Cisco Access Points (100 * 9) = 900 (3000 * 9) = 27000 (5000 *4) = 20000 (100 *9) = 900
wireless adapter (450 * 10) = 4500 (20* 450) = 9000
Server (4 * 2000) = 8000 1,000.00 (5000 * 4) =20000 (4*1200 ) =4800
Switch 2000 750.00
Sub Total 19,890.00 28,000.00 40,000.00 24,450.00
Grand Total 112,340.00
If any equipment is further needed we will buy and add on those tables for our maintenance.
e) Recommendations:
• This device is well known in our country.
• Some renowned university uses those devices.
• Those vendors are very friendly to their customers.
• Their customer support is very nice.
• Their very professional on their fields
• They always fulfill user requirement.
• 24 hours professional expert are available on those vendor.
• Hardware has warranty.
• That hardwires are so much renewed on their fields.
• Most of the multinational company now a day’s use those hardware equipments.
Enterprise Networking June 2011 Final @NCC Education 2011
Task 2:
In this task, I have to describe about factor to reduce signal strength, Building layout and
Implementation of wireless network of the collage.
a) Factor to reduce signal strength: Ref-(4)
I have concentrated our wireless deployment efforts on instructional spaces, such as classrooms and
lecture halls, and on public spaces, such as the Campus Center and the Library. Because denser
materials and construction limit the range of wireless network signals, I probably find wireless in some
residence hall rooms and campus offices is too weak for consistent connection. In these locations,
strongly have to use wired Ethernet connections.
Reflection:
Reflective device used to collect or project energy such as light, sound, or radio waves. Its shape is
that of a circular parabolic, that is, the surface generated by a parabola revolving around its axis. The
parabolic reflector transforms an incoming plane wave traveling along the axis into a spherical wave
converging toward the focus. Conversely, a spherical wave generated by a point source placed in the
focus is transformed into a plane wave propagating as a collimated beam along the axis.
Diffraction:
Some construction materials very rapidly attenuate wireless signal strength. Buildings, such as
churches, which use lead in their roofing material, will very effectively block any signal. Any building
which has a significant thickness of concrete or amount of metal used in its production will attenuate
the signal. Concrete floors are often poured onto a metal pan which completely blocks most radio
signals. Some solid foam insulation and some fiberglass insulation used in roofs or exterior walls have
foil backing, which can reduce transmittance. Energy efficient windows and metal window screens are
also very effective at blocking radio signals. Some materials have peaks in their absorption spectra
which massively decrease signal strength.
Scattering:
Many electrical properties of networks of components (inductors, capacitors, resistors) may be
expressed using S-parameters, such as gain, return loss, voltage standing wave ratio (VSWR), and
reflection coefficient and amplifier stability. The term 'scattering' is more common to optical
engineering than RF engineering, referring to the effect observed when a plane electromagnetic wave
is incident on an obstruction or passes across dissimilar dielectric media. In the context of S-
parameters, scattering refers to the way in which the traveling currents and voltages in a transmission
line are affected when they meet a discontinuity caused by the insertion of a network into the
transmission line. This is equivalent to the wave meeting impedance differing from the line's
characteristic impedance.
Enterprise Networking June 2011 Final @NCC Education 2011
b) Building Layout: Building layout is under the below:
Size
Principal room : (15 * 15) feet= 225 square feet
Personal secretary
room
: (10 * 15) feet= 150 square feet
Garden : (200*200) feet = 40,000 square feet
Examination hall : (100* 120) feet= 12,000 Square feet
Teachers room : (50* 40) feet = 2000 square feet
Enterprise Networking June 2011 Final @NCC Education 2011
: (AP) Access Point
Building
Contains
:
Each building has a 6
class room, one
computer lab, seminar
room, Teachers room,
Student common room
etc; building number
one has a conference
room and debating
club room. Building
two has Auditorium
and Principal room
with his/ her personal
secretary room.
Building three has a
canteen, and building
four has an
examination hall room.
Size
Class room :
(45* 45)feet= 2025
Square feet
Auditorium :
(90* 90) feet= 8100
Square feet
Seminar :
(50 * 50) feet = 2500
square feet
Conference :
(50 * 50) feet = 2500
square feet
Canteen :
(70 * 70) feet = 4900
square feet
Debating
Club
:
(60 * 60) feet = 3600
square feet
Enterprise Networking June 2011 Final @NCC Education 2011
C) Implementation:
Step- 1 Access point setup:
I with some of my helper are move with laptop which space is perfect to setup access point. We are
checking ached of each building that what the situation for network access. We move in every side of
the campus for searching which space is not cobber on in the wireless network. Those
implementation is helpful for the wireless networks on campus.
Step- 2 Access control:
all private wireless transmitters MUST be configured to allow only known client hardware to use the
network. This is best done by setting the list of client Media Access Control (MAC) addresses that are
allowed to use the private wireless network. Implementers of private wireless transmitters will be held
responsible for the actions of those who access the campus network from those devices.
Step-3 SSID (Service Set Identification):
The SSID must not be set to "wns12345." SSID selection should be coordinated with administrators of
neighboring private wireless networks.
Step-4 Configuration password:
all transmitter configuration interfaces must be password protected with a non-default and hard-to-
guess password.
Step-5 SNMP (Simple Network Management Protocol):
SNMP strings should not be the default and should have access lists assigned where possible.
Step-6 Power settings:
Private wireless transmitters should use the lowest possible power output that provides the needed
coverage area.
Step-7 FCC regulations
all private wireless transmitter configurations must be within FCC regulations for dissipated power,
etc.
Enterprise Networking June 2011 Final @NCC Education 2011
Task 3:
In this task, I have to make user permission or access level for all users. User can access resources
which I make accessible for users. In this collage have four group of student and teachers, Students
are have some permission and teachers have some permission which is not mach with student
access permission.
a) The problem of having open access for all users:
 Official document like Staff information, Mark sheet, Question papers, Journals and Thesis
papers can be hack or crack by hacker or cracker.
 Student document like Individual Exam mark, Attendance & Class Performance can
damage by hacker or cracker.
 Some expert people can change the configuration of the network. As a result network can
be down or network cans crash.
 Network device can damage.
 Virus can affect on this network. As a result whole network can damage in second.
b) The Needs of staff to have a secure area that is not available for student:
Although this network contains valuable recourses of information, so that teachers and all stuff
information have to protect and I have to provide security on the network.
 I have to configure firewall to protect secure Information of the network.
 Manage the network for System Admin, Principal and Register who can access as an
administrator.
 Student and stuff user name and password different.
 Make restricted user by make binding.
 Every username have to be unique on the network.
c) The Recommendation for how access to the network should be setup and run, including
reasons for this recommendation:
In this task, have to describe about recommendation for how access to the network should be setup
and run, including reason for this recommendation.
 User name have to be unique can’t match with others users.
 Passwords have to provide to maintain user authentication.
 If student pass the annual exams and stop education on the collage, user accounts have to be
deleted.
 If any staffs resign from this institute, user account has to be deleting.
 If any user or staff pause using network more than 3 month those account disable
automatically.
Enterprise Networking June 2011 Final @NCC Education 2011
d) Brief user guide explaining how a user may log on he network and what they can and can’t
do while connect to the network:
In this task, have to create a brief user guide explaining how a user may log on to the network and
what they can and can’t do while connect to the network.
User Guide:
 If user name or password are wrong in 3 times when login to the system, System lock this
account.
 User can change username and password when logged in to the system.
 User can manage user own file.
 User can gain Internet access by login to the system.
 User can view information which is provided by collage like class schedule, Exam schedule
etc.
System Screenshot:
Figure: Network System logon screen.
Enterprise Networking June 2011 Final @NCC Education 2011
Figure: Network System logon screen with Error.
Figure: Network System logon screen with account block.
Enterprise Networking June 2011 Final @NCC Education 2011
Figure: Network System logged in screen with successful message.
Task 4:
In this task, I have to make decision on the possible network topologies and media that could be used
to create the computer network (LAN) within the collage.
a) Explanation how each topology operates:
 Bus topology: A bus consists of a series of computer connected along a single cable
segment and this network is not suitable for this network. Ref-2
 Ring topology: when each computer connects directly to the next computer in line, a circle of
cable forms to create a ring topology network. As a computer receives a signal, it either acts
on it or regenerates it and passes it along. Signals travel in only one direction around the
ring.Ref-2
 Mesh topology: a mesh network topology is the most faults tolerant but also the most
expensive. Connecting each device in a network to every other device in the network creates
a mesh network topology. This configuration is very intricate. Ref-2
 Star topology: a star topology, describe computers connected by cable segments to a central
hub. When a computer sends a signal, the hub receives transmits it down every others cable
segment to all others computers or others devices attach to the hub. Again, only the computer
that such signal addresses directly pay attention to or act upon that data. This topology got it’s
Enterprise Networking June 2011 Final @NCC Education 2011
start in the early days of mainframe compeering when all nodes attached to a central point: a
font end processor, itself attached to the mainframe. Ref-2
b) Description the advantage and disadvantages of Extended Star topology for the collage:
Many factors deserve consideration when selecting a network topology. Some advantage and
disadvantage are described under the below:
Advantage Disadvantage
A bus network is simple and reliable. Heavy traffic slows the network down.
Its cabling is inexpensive, easy to work with,
and easy to extend
Any (broken or un-terminated) cable can bring the
network down.
Because all computer are arranged in a line, it
users cable very economically.
Problem can be difficult to isolate.
Table of advantage and disadvantage of the bus topology.
Advantage Disadvantage
All computers have equal access to the rest of
the network
A single computer failure can impact the network.
Even with many users, network performance is
even
Isolating problems is sometimes difficult.
Adding or removing computers disrupts network
operations.
Table of advantage and disadvantage of the ring topology.
Enterprise Networking June 2011 Final @NCC Education 2011
Advantage Disadvantage
It is easy to add new computers or modify the
network.
If the central hub fails, the network fails.
Centralization enhances network monitoring
and management.
Requires more cable and results in a more intricate
installation.
A single computer failure does not affect the
rest of the network.
Table: Advantage and disadvantage of the extended star topology.
c) Advantage and disadvantage of each medium that could be used for the LAN:
Here I have to describe about advantage and disadvantage of each medium that could be used for
the LAN. I used unshielded twisted-pair (UTP) CAT 6 cable on the collage network. CAT6 is to set a
standard for the Gigabit Ethernet. The Category 6 cable, also known as Cat-6, is backward
compatible with the Category 5/5 e and Category 3 cable standards. It can create a high speed
computer network and operate at an optimal performance if other components in the network are
compatible with gigabit speeds. Ref-3
Advantages
 Speed performance of up to 250 MHZ.
 It can produce double the bandwidth of the Cat 5 and Cat 5e.
 Cat 6 cable has a similar structure to the Cat 5 and Cat 5e.
 Port of the Cat 6 cable is the same as the Cat 5 and Cat 5e.
 Peripheral devices like magnetic disk and printer can be shared by other computers.
 It possible to use with a fast Ethernet network including Gigabit Ethernet and 10-Gigabit
Ethernet. Ref-3
Disadvantages
 Cat 6 cable is much more expensive than the Cat 5e cable.
 If one of the components is not gigabit rated, your network will operate at the slowest device’s
speed. Ref-3
Enterprise Networking June 2011 Final @NCC Education 2011
d) Recommendation for the topology and media to use including costs and reasons:
Here I have to describe about recommendation about technical feasibility and cost effective feasibility.
Feasibility reports describe one or more design solutions to a specific problem and agree on if the
proposed solution is realistic and feasible. If possible, more than one solution is offered, in which case
the report compares the various designs and determines which option is best. Feasibility reports
emphasis placed on practical and economic viability of the design in comparison with other possible
solutions. Feasibility reports are vital for decision making. In our project development, feasibility
reports are based on few matters that are social, economical, technical and operational. The detail
discussions are as follows:
Economical: This involves the feasibility of the proposed project to generate economic benefits. A
benefit-cost analysis and a breakeven analysis are important aspects of evaluating the economic
feasibility of new organizational projects. The tangible and intangible aspects of a project should be
translated into economic terms to facilitate a dependable basis for valuation. Cost benefit analysis is
an important feature of economical feasibility. Here we try to illustrate their cost analysis for build up
their entire system.
Technical: This involves questions such as whether the technology needed for the system exists,
how difficult it is to build, and whether the organization has enough experience using that technology.
The assessment is based on an outline design of system requirements in terms of Input, Output,
Fields; this can be qualified in terms of volumes of data, frequency of updating, etc. In order to give an
introduction to the technical system, they are currently posses the necessary technology. Our system
fully supports their technical infrastructures.
Operational: Our systems modes of operation will afford adequate throughput and response time.
Our system will provide accurate and usefully formatted information. Our systems operation offer
effective controls to protect against fraud and to guarantee accuracy and security of data and
information. This systems mode of operation provides reliable service and it flexible and expandable.
Social: Social feasibility concentrates on the control that a proposed project may have on the social
system in the project environment. The ambient social structure may be such that certain categories
of workers may be in short supply or absent. The effect of the project on the social status of the
project participants must be assessed to ensure compatibility. It recognized that workers in certain
company may have certain status symbols within the society.
Enterprise Networking June 2011 Final @NCC Education 2011
Task 5:
In this task, I have to make the security issues specifically relating to staff use of the wireless network
including below:
a) Access E-Mail:
 Access security is providing using username and password.
 Without collage network system software no one can access e-mail.
b) Using the wireless network for transmission of student work, examination papers, etc.
between a user and the college intranet:
 User can encryption file.
 Personal data can be encrypt by PGP
 Active directory is use full to maintain security on the server.
 Active directory manage validation of user.
 Manage user and group.
c) The use of the network with personal data:
 Personal data can be encrypt by PGP
 Folder can be protect by third-party or plug-in software.
 Folder permission can be use on personal data or file.
 User access level configuration
 User and group procedure
a) Recommendation:
 Change Default Administrator Passwords (and Usernames)
 Turn on (Compatible) WPA / WEP Encryption
 Change the Default SSID
 Enable MAC Address Filtering
 Disable SSID Broadcast
 Do Not Auto-Connect to Open Wi-Fi Networks
 Assign Static IP Addresses to Devices
 Enable Firewalls On Each Computer and the Router
 Position the Router or Access Point Safely
 Turn Off the Network during Extended Periods of Non-Use ref-v
Enterprise Networking June 2011 Final @NCC Education 2011
Task 6:
In this task, I have to make a comprehensive, professional report describing the network
recommendations. This report includes the details of Tasks 1 – 5, have estimates of cost throughout
and have an executive summary at the start giving the key points.
Executive summary:
This stage tests most of the functions of the network system by the access of all the tested function is
primarily working correctly. So we can come to the decision that the system is now ready for live
implementation. The further testing process will be carried out at the user’s environment.
Report:
Task- 1: I have described about equipments that which is used for configure the wireless network
system. And I also have described the cost and operation cost of every equipment.
Task -2: this task I have describe the obstacle of wireless signal. Then I have designed the network
architecture of developed network.
Task 3: this task I have discussed about the access privilege method for user of the network and
neediness of secure network area for stuff of the collage.
Task 4: in this task I have describe about different possible network topology with advantage and
disadvantage of the computer networks I also have discuss about the media which could be applied
in that network.
Task 5: I have described about security issue which applied for stuff and student of the proposed
network. That description should be including access email, transferable file encryption and protect
personal data.
Assumptions:
On this assignment I assume something which is requiring for the assignment. Like college student
are 400 and total staff 50 people. Building size and shape are also assumed and I want to flow the
role of spoke of a while. Total users are dividing in three groups like student, staff and guest.
Suggestion and further improvement:
 Network can work as more faster to use of Wi-Max.
 In LAN CAT7 can be use.
 Collage can use antenna to remove weakness
 FTP server is more secure for file maintain for user
Enterprise Networking June 2011 Final @NCC Education 2011
References:
Enterprise Networking June 2011 Final @NCC Education 2011
i
http://www.dlink.com.au/products/?pid=821
ii
http://www.dlink.com/products/?pid=717
http://compnetworking.about.com/od/wirelesssecurity/tp/wifisecurity.htm
iii
http://www.dlink.com.au/products/?pid=848
iv
http://www.dlink.com.au/products/?pid=848
v
References of text book:
1. Enterprise Networking text book of NCC Education
2. Network fundamental text book of NCC Education
3. Cisco Certified Network Associate (CCNA) text book
4. Wireless networking (DIPTI)

Mais conteúdo relacionado

Mais procurados

Manish_Goyal_July14_Internal
Manish_Goyal_July14_InternalManish_Goyal_July14_Internal
Manish_Goyal_July14_Internal
manish goyal
 
resume_Prashant2014- Technical
resume_Prashant2014- Technicalresume_Prashant2014- Technical
resume_Prashant2014- Technical
Prashant jadhav
 
Training and placement
Training and placementTraining and placement
Training and placement
Bhavesh Parmar
 
Mi0041 java and web design
Mi0041  java and web designMi0041  java and web design
Mi0041 java and web design
smumbahelp
 
Mi0041 java and web design
Mi0041  java and web designMi0041  java and web design
Mi0041 java and web design
smumbahelp
 
Resume, CV and Portfolio Fedry Andrian
Resume, CV and Portfolio Fedry AndrianResume, CV and Portfolio Fedry Andrian
Resume, CV and Portfolio Fedry Andrian
Fedry Andrian
 
Project report-on-student-information-management-system-php-mysql
Project report-on-student-information-management-system-php-mysqlProject report-on-student-information-management-system-php-mysql
Project report-on-student-information-management-system-php-mysql
Raj Sharma
 

Mais procurados (20)

Campus news information system - Android
Campus news information system - AndroidCampus news information system - Android
Campus news information system - Android
 
Manish_Goyal_July14_Internal
Manish_Goyal_July14_InternalManish_Goyal_July14_Internal
Manish_Goyal_July14_Internal
 
resume_Prashant2014- Technical
resume_Prashant2014- Technicalresume_Prashant2014- Technical
resume_Prashant2014- Technical
 
Training and placement
Training and placementTraining and placement
Training and placement
 
Mi0041 java and web design
Mi0041  java and web designMi0041  java and web design
Mi0041 java and web design
 
Mi0041 java and web design
Mi0041  java and web designMi0041  java and web design
Mi0041 java and web design
 
Resume, CV and Portfolio Fedry Andrian
Resume, CV and Portfolio Fedry AndrianResume, CV and Portfolio Fedry Andrian
Resume, CV and Portfolio Fedry Andrian
 
Anushree Resume
Anushree ResumeAnushree Resume
Anushree Resume
 
Project black book TYIT
Project black book TYITProject black book TYIT
Project black book TYIT
 
Complete-Mini-Project-Report
Complete-Mini-Project-ReportComplete-Mini-Project-Report
Complete-Mini-Project-Report
 
School billing system software
School billing system softwareSchool billing system software
School billing system software
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
RESUME
RESUMERESUME
RESUME
 
2016 Jabulani H Vilakazi CV
2016 Jabulani H Vilakazi CV2016 Jabulani H Vilakazi CV
2016 Jabulani H Vilakazi CV
 
VIJAYAKUMAR
VIJAYAKUMARVIJAYAKUMAR
VIJAYAKUMAR
 
TY BSc.IT Blackbook Cover page
TY BSc.IT  Blackbook   Cover pageTY BSc.IT  Blackbook   Cover page
TY BSc.IT Blackbook Cover page
 
IT Training Courses
IT Training CoursesIT Training Courses
IT Training Courses
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
 
Project report-on-student-information-management-system-php-mysql
Project report-on-student-information-management-system-php-mysqlProject report-on-student-information-management-system-php-mysql
Project report-on-student-information-management-system-php-mysql
 
TY BSc.IT Blackbook Main Report
TY BSc.IT  Blackbook  Main ReportTY BSc.IT  Blackbook  Main Report
TY BSc.IT Blackbook Main Report
 

Destaque

Development, Frameworks and Methods
Development, Frameworks and MethodsDevelopment, Frameworks and Methods
Development, Frameworks and Methods
Md. Mahbub Alam
 
Information Requirement Analysis
Information Requirement AnalysisInformation Requirement Analysis
Information Requirement Analysis
Md. Mahbub Alam
 
Database Design & Implementation
Database Design & ImplementationDatabase Design & Implementation
Database Design & Implementation
Md. Mahbub Alam
 

Destaque (20)

System Analysis & Design (NCC Education)
System Analysis & Design (NCC Education)System Analysis & Design (NCC Education)
System Analysis & Design (NCC Education)
 
Advance web Design
Advance web DesignAdvance web Design
Advance web Design
 
Cw comp1108 1013_mo233_000793120_20151208_172508_1516
Cw comp1108 1013_mo233_000793120_20151208_172508_1516Cw comp1108 1013_mo233_000793120_20151208_172508_1516
Cw comp1108 1013_mo233_000793120_20151208_172508_1516
 
Cw comp1108 78_mo233_20141120_200330_1415
Cw comp1108 78_mo233_20141120_200330_1415Cw comp1108 78_mo233_20141120_200330_1415
Cw comp1108 78_mo233_20141120_200330_1415
 
eCommerce
eCommerceeCommerce
eCommerce
 
Cw comp1645 171_mo233_20141113_194808_1415 (1)
Cw comp1645 171_mo233_20141113_194808_1415 (1)Cw comp1645 171_mo233_20141113_194808_1415 (1)
Cw comp1645 171_mo233_20141113_194808_1415 (1)
 
Cw comp1108 531_mo233_20150420_151328_1415
Cw comp1108 531_mo233_20150420_151328_1415Cw comp1108 531_mo233_20150420_151328_1415
Cw comp1108 531_mo233_20150420_151328_1415
 
Database design and Development
Database design and DevelopmentDatabase design and Development
Database design and Development
 
Development, Frameworks and Methods
Development, Frameworks and MethodsDevelopment, Frameworks and Methods
Development, Frameworks and Methods
 
Information Technology Planning (University of Greenwich BIT Coursework) by N...
Information Technology Planning (University of Greenwich BIT Coursework) by N...Information Technology Planning (University of Greenwich BIT Coursework) by N...
Information Technology Planning (University of Greenwich BIT Coursework) by N...
 
Information Requirement Analysis
Information Requirement AnalysisInformation Requirement Analysis
Information Requirement Analysis
 
Development Frameworks and Methods (University of Greenwich BIT Coursework) b...
Development Frameworks and Methods (University of Greenwich BIT Coursework) b...Development Frameworks and Methods (University of Greenwich BIT Coursework) b...
Development Frameworks and Methods (University of Greenwich BIT Coursework) b...
 
User Interface Design (University of Greenwich BIT Coursework) by Nay Linn Ko
User Interface Design (University of Greenwich BIT Coursework) by Nay Linn KoUser Interface Design (University of Greenwich BIT Coursework) by Nay Linn Ko
User Interface Design (University of Greenwich BIT Coursework) by Nay Linn Ko
 
Advance Java course work under NCC Education June 2011
Advance Java course work  under NCC Education June 2011Advance Java course work  under NCC Education June 2011
Advance Java course work under NCC Education June 2011
 
Cw comp1645 171_mo233_20141113_194808_1415
Cw comp1645 171_mo233_20141113_194808_1415Cw comp1645 171_mo233_20141113_194808_1415
Cw comp1645 171_mo233_20141113_194808_1415
 
NayLinnKo_BIT_InteractionDesign
NayLinnKo_BIT_InteractionDesignNayLinnKo_BIT_InteractionDesign
NayLinnKo_BIT_InteractionDesign
 
Database Design & Implementation
Database Design & ImplementationDatabase Design & Implementation
Database Design & Implementation
 
NayLinnKo Information Requirements Analysis BIT
NayLinnKo Information Requirements Analysis BITNayLinnKo Information Requirements Analysis BIT
NayLinnKo Information Requirements Analysis BIT
 
MYINT OO ID BIT COURSEWORK
MYINT OO ID BIT COURSEWORKMYINT OO ID BIT COURSEWORK
MYINT OO ID BIT COURSEWORK
 
Interaction Design
Interaction DesignInteraction Design
Interaction Design
 

Semelhante a Enterprise networking course work under NCC Education

01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
honey725342
 
FahadZuberi
FahadZuberiFahadZuberi
FahadZuberi
fizuberi
 

Semelhante a Enterprise networking course work under NCC Education (20)

Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
 
Robbie Greig CV
Robbie Greig CVRobbie Greig CV
Robbie Greig CV
 
Week2
Week2Week2
Week2
 
Lalit Sharma
Lalit SharmaLalit Sharma
Lalit Sharma
 
It 241 it241
It 241 it241It 241 it241
It 241 it241
 
Sharath_Resume.DOCX
Sharath_Resume.DOCXSharath_Resume.DOCX
Sharath_Resume.DOCX
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
CV_Sandeeps_Sinha
CV_Sandeeps_SinhaCV_Sandeeps_Sinha
CV_Sandeeps_Sinha
 
Enterprise network
Enterprise networkEnterprise network
Enterprise network
 
LAN Proposal
LAN Proposal LAN Proposal
LAN Proposal
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Networking essentials
Networking essentialsNetworking essentials
Networking essentials
 
FahadZuberi
FahadZuberiFahadZuberi
FahadZuberi
 
2 set-up-computer-networks
2 set-up-computer-networks2 set-up-computer-networks
2 set-up-computer-networks
 
Final project report
Final project reportFinal project report
Final project report
 
En35793797
En35793797En35793797
En35793797
 
Res
ResRes
Res
 
NTT i3 at OpenStack Summit - May 20th, 2015
NTT i3 at OpenStack Summit - May 20th, 2015NTT i3 at OpenStack Summit - May 20th, 2015
NTT i3 at OpenStack Summit - May 20th, 2015
 
Updated CV
Updated CVUpdated CV
Updated CV
 

Último

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

Enterprise networking course work under NCC Education

  • 1.
  • 2. Statement and Confirmation of Own Work Programme/Qualification name: Each NCC Education assessed assignment submitted by you must have this statement attached to the assignment as the cover page or it will not be accepted for marking. Please ensure that this statement is either firmly attached to the cover of the assignment or electronically inserted into the front of the assignment. Student declaration I have read and understood NCC Education’s Policy on Academic Dishonesty and Plagiarism. I can confirm the following details: Student ID/Registration number: Name: Centre Name: Module Name: Module Leader: Number of words: I confirm that this is my own work and that I have not plagiarized any part of it. I have also noted the assessment criteria and pass mark for assignments. Due Date: Student Signature: Submitted Date: Enterprise Networking June 2011 Final @NCC Education 2011
  • 3. Acknowledgment: I am Md. Mahbub Alam is grateful to Daffodil Institute of IT (DIIT) for giving the chance to doing the assignment in the field of Enterprise networking and it’s such a pleasure to me. I am also grateful & like to express thanks to Mr. Sarwar Hossain Mollah Lecturer of Enterprise Networking of DIIT. His continues support, concentration & encouragement help me to complete this assignment. Huge unknown things are now know to me by doing this assignment. In class room we collect theoretical knowledge about Enterprise Networking but practically I gather knowledge by doing this assignment. It was a glorious memory by doing this assignment in my Life. Enterprise Networking June 2011 Final @NCC Education 2011
  • 4. Introduction This is an assignment of “FURTHER EDUCATION COLLEGE” Wireless Network Design and development. The development procedure referenced by the institute named Daffodil institute of IT. For this assignment, I need to the entire network that will help the authority to storing and showing the information of organization and the access of internet. Thus I will create an appropriate documentation that will help me to develop the network completely. The documentation should include network equipment, cost of equipment and installation, Cost of operating the system, Building layout, Maintain security for all users, user access level on the entire network, implementation; the documentation also contains the limitation and future planning and user manual of the proposed network system. Enterprise Networking June 2011 Final @NCC Education 2011
  • 5. Task 1: In this task I have to investigate which kind of wireless equipments are available in our country for large organizations based in a single building such as the college in the scenario. I also have to describe about:  The main equipment that will be install.  The how much features availability.  The cost of equipment and installation for the network.  The cost of operating the system. a) The main equipment that will be install: I investigated thoroughly number of vender devices which will be required to design to establish our collage wireless network. I have needed some devices which will be used to establish the collage wireless network, those are describing under the below: Wireless Network Adapter: Connect to wireless network by adding a D-Link Wireless N 150 Desktop Adapter to desktop computer. Once connected, It can share a high-speed Internet connection while also getting access to shared educational students transcripts, Documents, and Students documents with other computers on your network.ref-(i) Figure: DWA-525 Wireless N 150 PCI Adapter Enterprise Networking June 2011 Final @NCC Education 2011
  • 6. Wireless Access Point: A wireless access point is more like a hub for wireless networks. It does not implement a different IP address range or provide the other features of a wireless router. It simply relays network traffic to the wireless devices within its broadcast range. Figure: The Wireless N Range Extender (DAP-1360) Wireless Switch: The DGS-1224TP is housed in a new style 19” rack mount case with an easy-to- view front panel and diagnostic LEDs. User-friendly, web-based management is supported for easy configuration and flexibility for different network requirements.ref-(ii) Figure: DGS-1224TP Web Smart 24-Port Gigabit PoE Switch with 4 Combo SFP Slots Server as a Router: Here I choose four servers. There is a Print server, one mail server, Web server with proxy server and last one is working as a router with firewall. Figure: HP server Enterprise Networking June 2011 Final @NCC Education 2011
  • 7. b) The Available features and specifications: Wireless Network Adapter Features availability: ref-(i)  Compatible with Windows 7 32bit and 64bit  Enhanced Wireless Reception and Performance Based on 802.11n Technology  Better Wireless Technology - up to 4X Faster than Standard 802.11g*  Connect a Desktop PC to a Wireless Network Specifications ref-(i)  HIGH-SPEED WIRELESS NETWORKING  CONNECT SECURELY TO YOUR WIRELESS NETWORK  COMPATIBILITY ASSURANCE  EASY TO INSTALL & CONNECT Access Point Features availability: ref-(iii)  Create or Extend a Wireless Network in Your Home or Office  Easy to Install and Connect with Wi-Fi Protected Setup™  Secure Wireless Encryption Using WPA/WPA2 Security  Multiple modes: Access Point, Bridge with Access Point, Repeater, or Wireless Client Specifications ref-(iv)  2 External Detachable Antennas  Internet Explorer® v7 or Later; Mozilla® Firefox® v3.0 or Later; or other Java-enabled Browsers  Item (HxWxD): 5.9” x 4.5” x 1.4” (149.9mm x 114.3mm x 35.6mm)  Packaging (HxWxD): 10.9” x 2.7” x 8.3” (276.9mm x 68.6mm x 210.8mm)  1 Year Limited Switch Features availability: ref-(iii)  D-Link Green Technology  48Gbps Switching Capacity  8K MAC Address Table  True Plug & Play Enterprise Networking June 2011 Final @NCC Education 2011
  • 8.  Fiber Media Support Via SFPs  24 IEEE 802.3af Power over Ethernet Ports Specifications ref-(iii)  24 10/100/1000BASE-T PoE Auto-negotiating, Auto MDI-MDI/X ports with 802.3 Flow Control  Up to 256 static MAC entries  Enable/disable auto-learning of MAC addresses  10,240 Bytes jumbo frame  Per device: Power/PWR Max/CPU/Fan Error Port LED, Mode Indicator: Link/Act Mode/PoE Mode  Per 10/100/1000BASE-T port: Link/Act, 100/1000Mbps  Per SFP slot: Link/Act, 1000Mbps Server Features availability:  The DPR-1061 provides the necessary security by allowing the administrator to configure user access right to the network printers and equipment.  It supports a wide range of network OS including:  Windows 95/98/ME/NT 4.0/2000/XP, Apple MacOS with AppleTalk, Linux, Solaris, SCO Unix, IBM AIX and NetWare 5.x native NDS.  Enjoy the flexibility and compatibility in major network OS that this print server has to offer. ref- Specifications Equipped with a powerful CPU, large memory, high speed USB ports and network data transfer, this server makes your operations fast. at the same time, giving this multi-port print server a similar performance to 3 separate single-port print servers at a fraction of the cost. c) Installation and equipment cost: Table of information: Equipment Name Quantity Unit Price Total Cost Installation Cost Access point 9 600.00 5,400.00 (2000 * 9) =18000 Switch 1 45,000.00 45,000.00 10,000.00 Adapter 450 600.00 270,000.00 (100 * 450) = 45000 Server 4 150,000.00 600,000.00 20,000.00 920,400.00 93,000.00Sub Total Grand Total 1,013,400.00 Side Note: Total Cost= Quantity + Unit Price Enterprise Networking June 2011 Final @NCC Education 2011
  • 9. Grand Total= Sub Total (Total Cost) + Sub Total (Installation Cost) Enterprise Networking June 2011 Final @NCC Education 2011
  • 10. d) The cost of operating the system: Maintenance Table: Equipment Name Maintanence Cost Chare/ Bill (Bandwith) Employee/ Oparetor Depriciation Cisco Access Points (100 * 9) = 900 (3000 * 9) = 27000 (5000 *4) = 20000 (100 *9) = 900 wireless adapter (450 * 10) = 4500 (20* 450) = 9000 Server (4 * 2000) = 8000 1,000.00 (5000 * 4) =20000 (4*1200 ) =4800 Switch 2000 750.00 Sub Total 19,890.00 28,000.00 40,000.00 24,450.00 Grand Total 112,340.00 If any equipment is further needed we will buy and add on those tables for our maintenance. e) Recommendations: • This device is well known in our country. • Some renowned university uses those devices. • Those vendors are very friendly to their customers. • Their customer support is very nice. • Their very professional on their fields • They always fulfill user requirement. • 24 hours professional expert are available on those vendor. • Hardware has warranty. • That hardwires are so much renewed on their fields. • Most of the multinational company now a day’s use those hardware equipments. Enterprise Networking June 2011 Final @NCC Education 2011
  • 11. Task 2: In this task, I have to describe about factor to reduce signal strength, Building layout and Implementation of wireless network of the collage. a) Factor to reduce signal strength: Ref-(4) I have concentrated our wireless deployment efforts on instructional spaces, such as classrooms and lecture halls, and on public spaces, such as the Campus Center and the Library. Because denser materials and construction limit the range of wireless network signals, I probably find wireless in some residence hall rooms and campus offices is too weak for consistent connection. In these locations, strongly have to use wired Ethernet connections. Reflection: Reflective device used to collect or project energy such as light, sound, or radio waves. Its shape is that of a circular parabolic, that is, the surface generated by a parabola revolving around its axis. The parabolic reflector transforms an incoming plane wave traveling along the axis into a spherical wave converging toward the focus. Conversely, a spherical wave generated by a point source placed in the focus is transformed into a plane wave propagating as a collimated beam along the axis. Diffraction: Some construction materials very rapidly attenuate wireless signal strength. Buildings, such as churches, which use lead in their roofing material, will very effectively block any signal. Any building which has a significant thickness of concrete or amount of metal used in its production will attenuate the signal. Concrete floors are often poured onto a metal pan which completely blocks most radio signals. Some solid foam insulation and some fiberglass insulation used in roofs or exterior walls have foil backing, which can reduce transmittance. Energy efficient windows and metal window screens are also very effective at blocking radio signals. Some materials have peaks in their absorption spectra which massively decrease signal strength. Scattering: Many electrical properties of networks of components (inductors, capacitors, resistors) may be expressed using S-parameters, such as gain, return loss, voltage standing wave ratio (VSWR), and reflection coefficient and amplifier stability. The term 'scattering' is more common to optical engineering than RF engineering, referring to the effect observed when a plane electromagnetic wave is incident on an obstruction or passes across dissimilar dielectric media. In the context of S- parameters, scattering refers to the way in which the traveling currents and voltages in a transmission line are affected when they meet a discontinuity caused by the insertion of a network into the transmission line. This is equivalent to the wave meeting impedance differing from the line's characteristic impedance. Enterprise Networking June 2011 Final @NCC Education 2011
  • 12. b) Building Layout: Building layout is under the below: Size Principal room : (15 * 15) feet= 225 square feet Personal secretary room : (10 * 15) feet= 150 square feet Garden : (200*200) feet = 40,000 square feet Examination hall : (100* 120) feet= 12,000 Square feet Teachers room : (50* 40) feet = 2000 square feet Enterprise Networking June 2011 Final @NCC Education 2011 : (AP) Access Point Building Contains : Each building has a 6 class room, one computer lab, seminar room, Teachers room, Student common room etc; building number one has a conference room and debating club room. Building two has Auditorium and Principal room with his/ her personal secretary room. Building three has a canteen, and building four has an examination hall room. Size Class room : (45* 45)feet= 2025 Square feet Auditorium : (90* 90) feet= 8100 Square feet Seminar : (50 * 50) feet = 2500 square feet Conference : (50 * 50) feet = 2500 square feet Canteen : (70 * 70) feet = 4900 square feet Debating Club : (60 * 60) feet = 3600 square feet
  • 13. Enterprise Networking June 2011 Final @NCC Education 2011
  • 14. C) Implementation: Step- 1 Access point setup: I with some of my helper are move with laptop which space is perfect to setup access point. We are checking ached of each building that what the situation for network access. We move in every side of the campus for searching which space is not cobber on in the wireless network. Those implementation is helpful for the wireless networks on campus. Step- 2 Access control: all private wireless transmitters MUST be configured to allow only known client hardware to use the network. This is best done by setting the list of client Media Access Control (MAC) addresses that are allowed to use the private wireless network. Implementers of private wireless transmitters will be held responsible for the actions of those who access the campus network from those devices. Step-3 SSID (Service Set Identification): The SSID must not be set to "wns12345." SSID selection should be coordinated with administrators of neighboring private wireless networks. Step-4 Configuration password: all transmitter configuration interfaces must be password protected with a non-default and hard-to- guess password. Step-5 SNMP (Simple Network Management Protocol): SNMP strings should not be the default and should have access lists assigned where possible. Step-6 Power settings: Private wireless transmitters should use the lowest possible power output that provides the needed coverage area. Step-7 FCC regulations all private wireless transmitter configurations must be within FCC regulations for dissipated power, etc. Enterprise Networking June 2011 Final @NCC Education 2011
  • 15. Task 3: In this task, I have to make user permission or access level for all users. User can access resources which I make accessible for users. In this collage have four group of student and teachers, Students are have some permission and teachers have some permission which is not mach with student access permission. a) The problem of having open access for all users:  Official document like Staff information, Mark sheet, Question papers, Journals and Thesis papers can be hack or crack by hacker or cracker.  Student document like Individual Exam mark, Attendance & Class Performance can damage by hacker or cracker.  Some expert people can change the configuration of the network. As a result network can be down or network cans crash.  Network device can damage.  Virus can affect on this network. As a result whole network can damage in second. b) The Needs of staff to have a secure area that is not available for student: Although this network contains valuable recourses of information, so that teachers and all stuff information have to protect and I have to provide security on the network.  I have to configure firewall to protect secure Information of the network.  Manage the network for System Admin, Principal and Register who can access as an administrator.  Student and stuff user name and password different.  Make restricted user by make binding.  Every username have to be unique on the network. c) The Recommendation for how access to the network should be setup and run, including reasons for this recommendation: In this task, have to describe about recommendation for how access to the network should be setup and run, including reason for this recommendation.  User name have to be unique can’t match with others users.  Passwords have to provide to maintain user authentication.  If student pass the annual exams and stop education on the collage, user accounts have to be deleted.  If any staffs resign from this institute, user account has to be deleting.  If any user or staff pause using network more than 3 month those account disable automatically. Enterprise Networking June 2011 Final @NCC Education 2011
  • 16. d) Brief user guide explaining how a user may log on he network and what they can and can’t do while connect to the network: In this task, have to create a brief user guide explaining how a user may log on to the network and what they can and can’t do while connect to the network. User Guide:  If user name or password are wrong in 3 times when login to the system, System lock this account.  User can change username and password when logged in to the system.  User can manage user own file.  User can gain Internet access by login to the system.  User can view information which is provided by collage like class schedule, Exam schedule etc. System Screenshot: Figure: Network System logon screen. Enterprise Networking June 2011 Final @NCC Education 2011
  • 17. Figure: Network System logon screen with Error. Figure: Network System logon screen with account block. Enterprise Networking June 2011 Final @NCC Education 2011
  • 18. Figure: Network System logged in screen with successful message. Task 4: In this task, I have to make decision on the possible network topologies and media that could be used to create the computer network (LAN) within the collage. a) Explanation how each topology operates:  Bus topology: A bus consists of a series of computer connected along a single cable segment and this network is not suitable for this network. Ref-2  Ring topology: when each computer connects directly to the next computer in line, a circle of cable forms to create a ring topology network. As a computer receives a signal, it either acts on it or regenerates it and passes it along. Signals travel in only one direction around the ring.Ref-2  Mesh topology: a mesh network topology is the most faults tolerant but also the most expensive. Connecting each device in a network to every other device in the network creates a mesh network topology. This configuration is very intricate. Ref-2  Star topology: a star topology, describe computers connected by cable segments to a central hub. When a computer sends a signal, the hub receives transmits it down every others cable segment to all others computers or others devices attach to the hub. Again, only the computer that such signal addresses directly pay attention to or act upon that data. This topology got it’s Enterprise Networking June 2011 Final @NCC Education 2011
  • 19. start in the early days of mainframe compeering when all nodes attached to a central point: a font end processor, itself attached to the mainframe. Ref-2 b) Description the advantage and disadvantages of Extended Star topology for the collage: Many factors deserve consideration when selecting a network topology. Some advantage and disadvantage are described under the below: Advantage Disadvantage A bus network is simple and reliable. Heavy traffic slows the network down. Its cabling is inexpensive, easy to work with, and easy to extend Any (broken or un-terminated) cable can bring the network down. Because all computer are arranged in a line, it users cable very economically. Problem can be difficult to isolate. Table of advantage and disadvantage of the bus topology. Advantage Disadvantage All computers have equal access to the rest of the network A single computer failure can impact the network. Even with many users, network performance is even Isolating problems is sometimes difficult. Adding or removing computers disrupts network operations. Table of advantage and disadvantage of the ring topology. Enterprise Networking June 2011 Final @NCC Education 2011
  • 20. Advantage Disadvantage It is easy to add new computers or modify the network. If the central hub fails, the network fails. Centralization enhances network monitoring and management. Requires more cable and results in a more intricate installation. A single computer failure does not affect the rest of the network. Table: Advantage and disadvantage of the extended star topology. c) Advantage and disadvantage of each medium that could be used for the LAN: Here I have to describe about advantage and disadvantage of each medium that could be used for the LAN. I used unshielded twisted-pair (UTP) CAT 6 cable on the collage network. CAT6 is to set a standard for the Gigabit Ethernet. The Category 6 cable, also known as Cat-6, is backward compatible with the Category 5/5 e and Category 3 cable standards. It can create a high speed computer network and operate at an optimal performance if other components in the network are compatible with gigabit speeds. Ref-3 Advantages  Speed performance of up to 250 MHZ.  It can produce double the bandwidth of the Cat 5 and Cat 5e.  Cat 6 cable has a similar structure to the Cat 5 and Cat 5e.  Port of the Cat 6 cable is the same as the Cat 5 and Cat 5e.  Peripheral devices like magnetic disk and printer can be shared by other computers.  It possible to use with a fast Ethernet network including Gigabit Ethernet and 10-Gigabit Ethernet. Ref-3 Disadvantages  Cat 6 cable is much more expensive than the Cat 5e cable.  If one of the components is not gigabit rated, your network will operate at the slowest device’s speed. Ref-3 Enterprise Networking June 2011 Final @NCC Education 2011
  • 21. d) Recommendation for the topology and media to use including costs and reasons: Here I have to describe about recommendation about technical feasibility and cost effective feasibility. Feasibility reports describe one or more design solutions to a specific problem and agree on if the proposed solution is realistic and feasible. If possible, more than one solution is offered, in which case the report compares the various designs and determines which option is best. Feasibility reports emphasis placed on practical and economic viability of the design in comparison with other possible solutions. Feasibility reports are vital for decision making. In our project development, feasibility reports are based on few matters that are social, economical, technical and operational. The detail discussions are as follows: Economical: This involves the feasibility of the proposed project to generate economic benefits. A benefit-cost analysis and a breakeven analysis are important aspects of evaluating the economic feasibility of new organizational projects. The tangible and intangible aspects of a project should be translated into economic terms to facilitate a dependable basis for valuation. Cost benefit analysis is an important feature of economical feasibility. Here we try to illustrate their cost analysis for build up their entire system. Technical: This involves questions such as whether the technology needed for the system exists, how difficult it is to build, and whether the organization has enough experience using that technology. The assessment is based on an outline design of system requirements in terms of Input, Output, Fields; this can be qualified in terms of volumes of data, frequency of updating, etc. In order to give an introduction to the technical system, they are currently posses the necessary technology. Our system fully supports their technical infrastructures. Operational: Our systems modes of operation will afford adequate throughput and response time. Our system will provide accurate and usefully formatted information. Our systems operation offer effective controls to protect against fraud and to guarantee accuracy and security of data and information. This systems mode of operation provides reliable service and it flexible and expandable. Social: Social feasibility concentrates on the control that a proposed project may have on the social system in the project environment. The ambient social structure may be such that certain categories of workers may be in short supply or absent. The effect of the project on the social status of the project participants must be assessed to ensure compatibility. It recognized that workers in certain company may have certain status symbols within the society. Enterprise Networking June 2011 Final @NCC Education 2011
  • 22. Task 5: In this task, I have to make the security issues specifically relating to staff use of the wireless network including below: a) Access E-Mail:  Access security is providing using username and password.  Without collage network system software no one can access e-mail. b) Using the wireless network for transmission of student work, examination papers, etc. between a user and the college intranet:  User can encryption file.  Personal data can be encrypt by PGP  Active directory is use full to maintain security on the server.  Active directory manage validation of user.  Manage user and group. c) The use of the network with personal data:  Personal data can be encrypt by PGP  Folder can be protect by third-party or plug-in software.  Folder permission can be use on personal data or file.  User access level configuration  User and group procedure a) Recommendation:  Change Default Administrator Passwords (and Usernames)  Turn on (Compatible) WPA / WEP Encryption  Change the Default SSID  Enable MAC Address Filtering  Disable SSID Broadcast  Do Not Auto-Connect to Open Wi-Fi Networks  Assign Static IP Addresses to Devices  Enable Firewalls On Each Computer and the Router  Position the Router or Access Point Safely  Turn Off the Network during Extended Periods of Non-Use ref-v Enterprise Networking June 2011 Final @NCC Education 2011
  • 23. Task 6: In this task, I have to make a comprehensive, professional report describing the network recommendations. This report includes the details of Tasks 1 – 5, have estimates of cost throughout and have an executive summary at the start giving the key points. Executive summary: This stage tests most of the functions of the network system by the access of all the tested function is primarily working correctly. So we can come to the decision that the system is now ready for live implementation. The further testing process will be carried out at the user’s environment. Report: Task- 1: I have described about equipments that which is used for configure the wireless network system. And I also have described the cost and operation cost of every equipment. Task -2: this task I have describe the obstacle of wireless signal. Then I have designed the network architecture of developed network. Task 3: this task I have discussed about the access privilege method for user of the network and neediness of secure network area for stuff of the collage. Task 4: in this task I have describe about different possible network topology with advantage and disadvantage of the computer networks I also have discuss about the media which could be applied in that network. Task 5: I have described about security issue which applied for stuff and student of the proposed network. That description should be including access email, transferable file encryption and protect personal data. Assumptions: On this assignment I assume something which is requiring for the assignment. Like college student are 400 and total staff 50 people. Building size and shape are also assumed and I want to flow the role of spoke of a while. Total users are dividing in three groups like student, staff and guest. Suggestion and further improvement:  Network can work as more faster to use of Wi-Max.  In LAN CAT7 can be use.  Collage can use antenna to remove weakness  FTP server is more secure for file maintain for user Enterprise Networking June 2011 Final @NCC Education 2011
  • 24. References: Enterprise Networking June 2011 Final @NCC Education 2011
  • 25. i http://www.dlink.com.au/products/?pid=821 ii http://www.dlink.com/products/?pid=717 http://compnetworking.about.com/od/wirelesssecurity/tp/wifisecurity.htm iii http://www.dlink.com.au/products/?pid=848 iv http://www.dlink.com.au/products/?pid=848 v References of text book: 1. Enterprise Networking text book of NCC Education 2. Network fundamental text book of NCC Education 3. Cisco Certified Network Associate (CCNA) text book 4. Wireless networking (DIPTI)