64
INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327 Individual assignment Individual assignment CE00382-2 HSSN2 CE00382-2 HSSN2 HARDWARE AND SOFTWARE SYSTEM NETWORK2 HARDWARE AND SOFTWARE SYSTEM NETWORK2 HAND IN DATE: 15-02-2010 HAND IN DATE: 15-02-2010 HAND OUT DATE: 27-04-2010 HAND OUT DATE: 27-04-2010 1 | Page

Rohit Singh

Embed Size (px)

DESCRIPTION

this assignment will guide u how to connect the 4 strategic location to your main office...

Citation preview

Page 1: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Individual assignmentIndividual assignment

CE00382-2 HSSN2CE00382-2 HSSN2

HARDWARE AND SOFTWARE SYSTEMHARDWARE AND SOFTWARE SYSTEM NETWORK2NETWORK2

HAND IN DATE: 15-02-HAND IN DATE: 15-02-20102010

HAND OUT DATE: 27-04-HAND OUT DATE: 27-04-20102010

1 | P a g e

Page 2: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Arun Choudhary RohitArun Choudhary Rohit SinghSingh

(Module Lecturer) (Module Lecturer) (PTL00783327)(PTL00783327)

CERTIFICATE

This is to certify that Rohit Singh, Intake Number-PTL00783327 of computing Branch of 6th

Semester has successfully completed the project in module Hardware and Software Systems and

Networks 2 under the guidance of Mr. Arun Choudhary.

Signature

_____________________

Mr. Arun Choudhary

2 | P a g e

Page 3: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

3 | P a g e

Page 4: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

ABSTRACT

The major purpose of assignment was to develop a computer network for ICT Resources Malaysia where the company building consisting of four floors.

The company for which I have designed network Known as ICT Resources Malaysia Public Limited is supplier of business equipment and office. The major expectation of the company was to have an accurate data exchange system and proper server system where all the employees can work together in an automated environment.

I had to choose the best network design because the system has to be accurate and the management expects to see a great difference after the implementation.

In network design I have used resource sharing such as shared printers, scanners, etc. UTP-5 cables were used for the cabling and only for the backbone, optical fiber was used. Also I have assigned a fileserver where all the employees can save their work in it, a web server to manage the company’s web site, an email server for managing email accounts of the employees and a database server to manage the DBMS of the company.

According to my concern this system will have no defects in it and will be a huge support for the development of the company in the future.

4 | P a g e

Page 5: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

ACKNOWLEDGEMENT

First of all I would like to present my sincere gratitude to APIIT granting me such valuable

opportunity to making this assignment.

Second of all I would like to thanks my Module Lecturer Mr. Arun Choudhary for giving me this

opportunity to work on this assignment and without whose valuable support this assignment

would not have been a success.

I would also like to thanks lab supervisors who gave me a helping hand wherever necessary.

Last but not the least I am obliged to thanks my friend and colleagues who provided me support

and help wherever required. Thank you

Rohit Singh

PTL00783327

5 | P a g e

Page 6: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

SL. NO TOPIC Page No.

1. INTRODUCTION 7

2. Recuirement of company 8

3. Proposed system & diagram 9-14

4. Network design 15-16

5. Advantages &disadvantages of network 17-18

6. Topology 19-20

7. Reason to choose topology 21

8. Networking architecture 22-24

9. Transmission media and cabling 25-28

10. Ip addressing 29-30

11. Software and hardware requirement 31-33

12. Networking devices 34-35

13. Server specification 36

14. Cost estimation 37

15. Security threats and solutions 38-39

16. Future enhancement 40

17. conclusion 41

18. References 42-43

19. Appendix 44

6 | P a g e

Page 7: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Introduction

ICT Resources Malaysia Public Limited Company has hired me as a network consultant. The company is only supplier of business equipment and office supplies of in South East Asia.

The major purpose was to develop a computer LAN and WAN network for ICT Resources Malaysia where the company consisting of three story building and four other strategic locations.

The process was a bit harder than I expected because the company didn’t have a computer network at present. So whatever I do, I had to start it from the beginning. The major expectation of the company was to have an accurate data exchange system and proper server system where all the employees can work together in an automated environment.

When came to the network, I assigned 3 switches for all three floors patched out of the backbone and connected the client machines to it and one more switch I used to connect servers. Also I used resource sharing such as shared printers (all in one). UTP cables have used for the cabling and only for the backbone, optical fiber has used.

After completing network design I came upon a fully functional computer network for ICT Resources. As far as I concerns, this system will be error free and will be a big support for the development of the ICT Resources Malaysia.

I have properly planned an efficient network that will bring a wide range of Advantages to your company.

7 | P a g e

Page 8: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Recruitments of company

As the current system comes up with several requirement,. Following is a list of those requirements technically in my point of view.

A faster transmission media

Topology that can overcome the problem faced by the company now.

A better network connection that can connect the whole building.

A way to get the field workers connected to the system.

High security against hackers

Storage for files to a centralized server enabling multiple accesses.

Print server

Database Server

File and email server

8 | P a g e

Page 9: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Proposed system

This is the proposed network diagram for the ICT Resources Malaysia. It is a 3 story building with three main departments divided among the floors as they are described in figure (1,2and 3).

This diagram shows how all these departments are connected to the LAN Through backbone. And for connecting to 4 other location I have used VPN network which will act as WAN.

As in the above diagram local area networks established in 4 different geographical areas, are connected together through a private network path and is considered to be as a single Local Area Network because of the VPN. This virtual path is not accessible by any other unauthorized clients and users and will only be valid for the users that belong to a particular domain. Here, two fixed IP’s will be assigned for the two ends of the VPN tunnel and all the data transfers will be done through those IP’s. Also routers at both ends will perform IP filtering mechanisms to prevent unauthorized access to the network.

9 | P a g e

Page 10: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

(Figure-1)

10 | P a g e

Page 11: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

11 | P a g e

Page 12: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

3 rd Floor Server Room & Director Room

(Figure-2)

The server room is located in the top floor and this is the place where the backbone initiates. Fiber optic cables are used for connecting switches to router the server room and an administrator computer is reserved for IP configurations. Optical fiber has been used transmission medium because of the higher data transmission rate.

12 | P a g e

Page 13: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

First floor (Advertisement department)

(Figure-3)

Except the server room there are other sections located in the first floor. Here they are Finance Admin, Cashier, Attendance count and Reception. Following network diagram shows how the first floor is architected in the network.

13 | P a g e

Page 14: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Second floor

(Figure-4)

Above is the network diagram designed for the second floor for the company? As assumed 2nd floor is consist of the sales and development department. I have assigned 15 computers for the second floor and all are connected to a switch via star topology which connects to the main router. Also there is a printer (All in one) connected to switch to enable all the computers to use them.

14 | P a g e

Page 15: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Side evaluation of building

(Figure-5)

It will be a side elevation of the company where it shows how the fiber optic Backbone is connected to the other floors of the building. This is not an accurate diagram where it shows the exact number of computers and other devices. This is just to show how the main switches of the floors are connected to the network through the backbone. The cable drawn in red is the backbone and you can see how it is connected to the switches of each floor.

15 | P a g e

Page 16: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Basic of network design

A network is simply a collection of computers or other hardware devices that are connected together physically or logically, using special hardware and software application, to allow them to exchange information and files.

Types of network

There are different types of network in which is widely used today. They are-

LAN (Local Area Network): A Local Area Network (LAN) is a network that is confined to a

relatively small area. It is limited to a geographic area such as a school, or building.

In my project I have designed a LAN network to connect the entire building by using star

topology for ICT Resources Malaysia private limited.

Wide Area Networks (WANs): connect larger geographic areas, such as connecting one cites to

another,

In this project I have designed a WAN connection by adding LAN of this company and 4 other

location.

16 | P a g e

Page 17: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

(WAN)

Virtual Private Network

Basically, a VPN is a private network that uses a public network (internet) to connect remote office or

users together. Instead of using a dedicated, connection such as leased line, a VPN uses "virtual"

connections routed through the Internet from the company's private network to the remote site or

employees.

.

17 | P a g e

Page 18: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Advantages of Network

Speed:

Networks provide a very high speed method for sharing and transferring resources and files.

Centralized Software Management:

One of the greatest benefits of installing a network at organization is the fact that all of the software can be loaded on one computer (the file server) so all users can access it from there.

Security:

Files and programs on a network can be assigned to user in many modes so they cannot access it until Network administrator wants.

Communication:

You can improve communication by connecting your computers and working on standardized systems, so that:

Suppliers, staff and customers will be able to share information and get in touch very easily.

Reduce cost and improve efficiency:

By storing information in one centralized database, your staff can deal with more customers at the same time by accessing centralized database. Costs can be reducing by sharing of peripherals such as printers.

Backup and security:

Files can be backed up more easily when they are all on a central fileserver.

18 | P a g e

Page 19: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Disadvantages of having a Networks

If some fault goes with the file server the whole network is unable to operate. The technical skills needed to manage a network are much higher than working on a

computer It takes a long time to install software and applications on every computer. Users may use too much of the storage space and it may cause problems on the network. Normally user uses lots of bandwidth - for example when listening to music files or

watching video clips – so you have to prevent them from using the network facilities badly.

19 | P a g e

Page 20: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Network Topology

Topologies play an important role in the network design. A best network can be design if you have the good knowledge of these topologies. A miss configured network can result in a waste of time and energy. So the basic understanding of the network topologies and network devices is a must to build a good network.

Different types of Network Topologies available are but here I have mainly described only star

topology and fiber optic that is going to use in our network to more detail other topology plz

refer to appendix -

Topology used and reasons for the choice

Mainly I have used Star topology in designing the network for the ICT Resources Malaysia. Also this is the most popular topology for the cabling.

Star Topology: In a Star topology every node is connected to a central controller which may be a

hub or a switch and there is communication between the nodes through the controller. This is

widest used technology in its simplest form; a star network consists of one central switch, hub or

computer.

http://www.ciscorouting.com/1_21_StarTopology.jpg

Here I have considered all the advantages.

Performance of this particular topology, some of them are as follows. Easy to install and wire. No disruptions to the network when connecting or removing Devices, Easy to detect faults and to remove parts. The cost is comparatively less. Most reliable because a cable failure does not

affect other users.

20 | P a g e

Page 21: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Controller to each terminal. And the performance is not as greatly affected. The star topology minimizes the chance of network failure by connecting the

entire computer to a central hub or switch.

21 | P a g e

Page 22: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

JUSTIFICATION FOR THE STAR TOPOLOGY

Compared to Star Topology, Ring topology the ring topology has the following disadvantages.

The ring topology’s dependent on one cable so the reliability is very low compared to the star topology. (If that one cable fails all the other workstationsWill also goes fail.

Compared to the star topology if any case of cable failure the ring topology will work in other workstation..

Unlike in star topology, with the ring we have to switch on all the computers inOrder to work on computer. So it’s very inefficient.

Compared to the star topology, the Bus topology has the following disadvantages

Like the ring, bus topology is also not reliable because if the main cable (Backbone) fails; a number of computers beyond the failure will be affected.

Because of the heavy network traffic in the Bus due to more users, the Performance will slow down.

The number of cable length and the number of stations has to be limited. In the Bus it’s needed to have termination at the end of the cable to stop Reflected

signals. So it will result an extra cost.

Therefore we have to say that the bus topology is also inefficient in this network.

Compared to the star topology, The Mesh topology has following disadvantages.

In order to implement the mesh topology, we have to spend a lot of money. Than what is spent for the Star topology.

Each and every computer should be connected with each other that require a lot of cables.That makes results of lots of money.

I have to say that star topology is better than the mesh topology for this network.

Compared to star topology, the Tree Topology has the following disadvantages.

Overall length of every segment is limited by the type of cabling we do. If the backbone line breaks, the entire segment goes down. More difficult to configure and implement wire than other topologies.

22 | P a g e

Page 23: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Type of Architecture used

Network Architecture is versatile and flexible in today’s fast-changing IT landscape .Types of

architecture that is available for use.

Client-Server Architecture.

Peer-to-Peer Architecture.

The network architecture after finding fact and figures that I have selected for the ICT Resources

Malaysia and the result is Client-Server Architecture.

Client-Server Architecture:

Client/server architecture describes the relationship b/w two computer programs in which, the

client means one program, makes a service request from another program server, the server,

which fulfills the request.

Concerning this organization network will be a server computer, which will functions as the

"heart" of the organization. In a client-server environment files are stored on a centralized, high

speed file server PC that is made available to client PCs.

It includes two types of model that is given below has been used in this project-

2-tier of architecture: 3-tier of architecture:

More detail about this model take a look to appendix.

Advantages of Client-Server Architecture:

Centralization - access, resources, and data security are controlled through the server.

Scalability - any element can be upgraded when needed. Without affecting network.

Flexibility - new technology can be easily integrated into the system.

23 | P a g e

Page 24: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Interoperability - all components (clients, network, and servers) work together.

Accessibility - server can be accessed remotely and across multiple platforms

Ease of application development

Lower total costs than “mainframe legacy systems”.

User friendly - familiar point and click interface

Why not Peer-to-Peer Architecture:

http://www.wifinotes.com/index_files/peer2peer.jpg

It is limited in extensibility, tends to overburden user workstations by having them play

the role of server to other users, and is largely unsecured.

A peer-to-peer architecture is used there where are a limited number of users which can

be a maximum of 10 while in this network there are more than 40 employees. So it is not

suitable to use this architecture.

24 | P a g e

Page 25: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Typically unable to provide system-wide services since the typical workstation will run a

standard desktop operating system incapable of hosting any major service

Peer-2-peer architecture is concerned when security is not of a major issue. But in this

case security has to be taken care off.

In peer-to-peer architecture there is absence of central administration which can

sometimes prove to be fatal.

Non-existence of centralized data forces users to take backup of the data themselves.

25 | P a g e

Page 26: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

TRANSMISSION MEDIA

There are two main mediums for transmission. They are guided (LAN Ethernet) and unguided

mediums. Unguided media is mostly used for distance transmission over the air (ex. Wireless,

satellite).

Network Cabling

Cable is the medium through which data usually moves from one network to another. Understanding the characteristics of different types of cable is necessary for the development of a successful network. In cabling of network I have used UTP-5 to connect client to each other to switches and other cabling and fiber optic has been also used to connect as backbone.

The following sections discuss the types of cables used in networks and other related topics.

Twisted Pair Cable:Twisted Pair Cable:

A twisted pair cable consists of two insulated wires which are twisted around each other to form

the twisted pair. Each pair of cable would consist of a wire used for the +ve data signal and a

wire for the –ve data signal.

Types of Twisted Pair Cable are given below.

Unshielded Twisted Pair (UTP): Unshielded Twisted Pair (UTP):

The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number

of twists per inch to help eliminate interference from adjacent pairs and other electrical devices.

26 | P a g e

Page 27: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

(Unshielded twisted pair)

Categories of Unshielded Twisted Pair Cable:

Category Use

Category 1 Less than I Mbps.

Category 2 4 Mbps.

Category 3 10 Mbps.

Category 4 10 Mbps.

Category 5 100 Mbps. Ethernet

Category 5e 1000 Mbps. Gigabit Ethernet

Category 6 1000 Mbps. Gigabit Ethernet

I have used UTP Category 5 cables as the main connecting media between switches and client computers. CAT 5 cables support a bandwidth of 100Mbps. According to the needs of the company, the data transmission rate of UTP cables is more than enough. Because of the above mentioned factors.

Advantages of UTP Cables:

Unshielded Twisted-Pair (UTP) Structured Premise Cabling permits many communication protocols to reside in the same wire bundle. Examples include voice, data, and CCTV video and control.

A good UTP system gives better interference rejection than coaxial. UTP is less expensive than dedicated coaxial or fiber optic. UTP is physically smaller than coaxial and many other cable types. UTP is a very easy media to install and reconfigure. UTP is extremely easy to terminate.

27 | P a g e

Page 28: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Unshielded Twisted Pair Connector: The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a plastic connector that looks like a large telephone-style connector. A slot allows the RJ-45 to be inserted only one way. I have used RJ-45 connecter to connect the both end of UTP-5 cable.

(UTP Connector)

Shielded Twisted Pair (STP):Shielded Twisted Pair (STP): A disadvantage of STP is that it is susceptible to radio and electrical frequency interference. The extra shielding can make the cables quite bulky. The shielding is quite bulky and can make installation difficult. The term is often abbreviated to STP.

(Shielded Twisted Pair)(Shielded Twisted Pair)

Coaxial cable: Coaxial cable has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield. The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers.

(Coaxial cable)

28 | P a g e

Page 29: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Disadvantages:

coaxial cabling is difficult to install, Does not bend easily and is difficult to install. Cost is much more than UTP cable.

Fiber Optic Cable

Fiber optic cabling consists of a center glass core surrounded by many layers of protective materials. It transmits light rather than electronic signals eliminating the problem of electrical interference.

(Fiber optic cable)

Advantages:

Ability to transmit signals over much longer distances. Capability to carry information at vastly greater speeds. This capacity brings communication possibilities to include services such as video

conferencing.

Disadvantages:

The cost of fiber optic cabling is very high.

It is more difficult to install and modify.

Despite of this figures, I have used Optical fiber to construct the backbone of network. This choice was made because the data transmission rate of optical fiber is very large and also by considering with the other network cables, optical fiber has a very less percentage of data loss. But because of the high prize of optical fiber, I had to limit it only to the backbone of the network.

29 | P a g e

Page 30: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

IP addressing

IP (Internet protocol) address is used in the network layer of the OSI model. IP Addresses are unique, thus each address can be used only for one connection. IP addresses are displayed as 32 bits. Since it is hard to remember binary notation, it is expressed in 4-octet addresses or 4-byte addresses. IP Addresses are written in decimal form where decimal point separates the bytes. This is called as “dotted decimal number”.

IP address is divided into two sections, Network ID and Host ID. Network ID is used to locate the network of that particular node belongs to. Host ID used to identify the actual computer on that particular network. IP addresses belong to certain classes according to their first octet; there are five IP classes and some special addresses.

IP Address Class Possible First Octet Used For

Class A 1–126 Very large networks

Class B 128–191 Medium to large networks

Class C 192–223 Small networks

Class D 224–239 Multicasting

Class E 240–255 Reserved (experimental)

After analyzing this figure I have used class C addressing for organization.

There are few limitations when assigning IP addresses. The network ID cannot be 127. This is used for loop back address and network testing, The network ID and host ID both cannot be 255. Messages that are intended for all

computers on a network are sent as broadcasts. These messages always use the IP address 255.255.255.255.

The network ID and host ID cannot both be 0. (0.0.0.0).It is used for default network. The host ID must be unique for a given network ID. Based on the limitations and methods of assigning IP addresses as described above, I

have assigned IP addresses to computers ICT Resources Malaysia. The following table shows the IP Addresses that are assigned to devices

30 | P a g e

Page 31: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

DEVICE IP ADDRESS

Mail Server 220.247. 198.210

Web Server 220.247.206.171

Proxy Server 220.247.206.170

Database Server 192.168.0.1

File Server 192.168.0.2

Work stations 192.168.0.4 to 192.168.0.254

Software Specification

31 | P a g e

Page 32: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Following is a specification of software that will be installed for all the machines in the

company.

Software/Details Software

Client O/S Xp Corporate addition

Anti-Virus Kaspersky security (50 Pcs)

Firewall WatchGuard XTM 2 Series

Web Server Apache Server

Proxy Server Squid Proxy

Fileserver Samba

Email server Microsoft Exchange

32 | P a g e

Page 33: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

DBMS Microsoft SQL Server

33 | P a g e

Page 34: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Hardware specification

Following table shows all the latest equipments are listed there in order to give the maximum performances for user.

Monitor: Acer X163W 16 Inches LCD Monitor Printer: LaserJet 3050 DVD-Rom: Black Sony DDU1681S SATA 18X DVD-ROM Drive Keyboard: White Bytecc Slim Multimedia Pro Keyboard, Model: SKB-2200H-

WH Mouse: Black Logitech M-SBF96 Optical Wheel Mouse Cpu: Core 2 Duo 2.93GHz Processor Core 2 Duo 2.93 GHz Routers: Cisco Linksys BEFSR41 Switches: Cisco Catalyst 2960 24 Cable: Belkin Cat. 5 UTP Network Cable (A3L791-100) Cable: ST-ST - Multimode Duplex Fiber Cable (62.5/125)

34 | P a g e

Page 35: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Networking devices Used

Switches: Switch is an intelligent network layer device. It provides dedicated connection and bandwidth between clients on a LAN. It gives any device on the network the full bandwidth instead of sharing the available bandwidth. Each port of a switch will not forward a broadcast packet to some device on the other port. Switch operates in both half duplex and full duplex modes. The full duplex mode is preferred in your network.

Cisco Catalyst 2960 Switch WS-C2960-24-S

http://www.entercomputers.com/cisco-catalyst-2960-switch-ws-c2960-24-s.html

Router-

Router:

A router translates information from one network to another; when the packets are received by the router, it routes it to the appropriate node in a network. Routers select the shortest path to route a message, based on the destination addressing.

http://homestore.cisco.com/viewproduct.htm?productId=53934561&src1=adv&src2=ci_shopping&extid=adv_ci_shopping&srccode=cii_13736960&cpncode=18-56558231-2

35 | P a g e

Page 36: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

NETWORK INTERFACE CARDS (NIC)

The (NIC) provides the physical connection between the network and the computer workstation. Most NICs are internal, with the card fitting into an expansion slot inside the computer.

Network interface cards are a main factor in concerning the speed and performance of a network.

36 | P a g e

Page 37: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Server Used in CompanySeveral servers were used in the server rooms of the company. They are Database server, Fileserver, Email server, proxy server and web server. For detail see appendix.

FILE SERVER:

DATABASE SERVER:

MAIL SERVER:

WEB SERVER:

PROXY SERVER:

37 | P a g e

Page 38: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Cost Estimationdevices Cost INR Total

Monitor(50) 4876 243800Printer(3) 17385 52155CPU(50) 5650 282500Keyboard(50) 200 10000Optical Mouse(50) 300 15000Router(1) 3000Switches(4) 21600 86400Firewall(1) 14500 14500Fiber optic cable(50 Meters) 400(1 meter) 20000UTP-5 cable(1500 ft) 768(100 ft) 11520Antivirus(1) 8000 8000DVD –Rom(50) 900 45000O/s(50) 8000(10 copy) 40000Installation charges 25000Other charges 100000

1010175 INR So from the table cost is little bit high but you have already big organization spreading over four locations so I think cost is not big issue for your company to develop network.

38 | P a g e

Page 39: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Security threatsNetwork threats includes:Viruses : Computer programs written by programmers and designed to replicate themselves and infect computers when triggered by a specific event.

Trojan horse programs: Destructive code, which appear to be harmless.

Attacks: Including Man in the Middle Attack -interruption in network and making a new network which appear as an network to client and as client to network

Denial-of-service attacks:

Which prevent access to part or all of a computer system?Data interception: 

Involves, eavesdropping on communications or altering data packets being transmitted.

Security SolutionsThere is a certain level of security that is applied for this network. This includes Firewalls, Anti-

Virus software’s, password protections and so on.

Firewall

Considering about the firewalls, I have installed a hardware firewall called the. This device is

connected from the router to the main switch and used as a security confirmation.

WatchGuard XTM 2 Series

XTM 21XTM 21

 Sale Price $288.00

39 | P a g e

Page 40: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

http://www.guardsite.com/

The specialty of the Watch Guard is, unlike the normal application firewalls, Watch Guard has

special Hardware embedded for this particular task. Here, if anyone try to hack inside the

network this device will detect the access and prevent it from getting inside the network by

blocking the IP’s and so on. So that, the network administrator can assure of the security of this

network.

Anti-Virus

In the client side, I have installed Kaspersky enterprise space security, which prevents the

network form being unstable because of Viruses, Trojans, worms, etc. I can assure of a virus free

environment in the network.

.

40 | P a g e

Page 41: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Future enhancement

As the network is established in the company, the main task is to maintain it as necessary. So the more attention will be drawn at the maintenance part.

Anyway following are the instances we have kept room for future enhancements

In the software maintenance, all the software installed to the computers will be constantly updated and all the necessary new installations will be done to make the system more accurate.

Almost all the switches we have used are 24Port switches. So that there won’t be any need of

changing the switch if more connections are to be taken.

41 | P a g e

Page 42: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

ConclusionConclusion

After a process of development of my project I was able to come up with a fully computerized

network system for the ICT Resources Malaysia. It was a huge challenge for me to construct the

structure for developing this network.

It was a hard issue for me to select the relevant resources and other necessaries such as cable

lengths for wiring purposes, selection of topology. But the tasks were made a little bit easier with

the help Internet and by the lecturer who has guided me HSSN Module in the class. This

documentation contains all the methodologies used for the development process and about all the

components used.

Finalizing everything I have submitted with much pleasure, having learnt many lessons and

many problems. Thank you.

42 | P a g e

Page 43: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

ReferencesNetwork:

http://www.buzzle.com/articles/advantages-and-disadvantages-of-computer-networks.html http://www.wifinotes.com/types-of-networks.html http://www.networktutorials.info/topology.html http://www.directron.com/skb2200hwh.html#caption

Topologies: http://www.helpwithpcs.com/courses/network-topologies.htm http://www.ciscorouting.com/1_21_StarTopology.jpg

Images: http://images.google.co.in/imgres?imgurl=http://www.erealmedia.com/cms102/uploads/

NetworkingPrinciples/Chapter1/1_23_MeshTopology.jpg&imgrefurl=http://www.erealmedia.com/cms125/index.php%3Fpage%3Dmesh-topology&usg=__8Ux9nTR0m3NqM-jtezR3CFhnq28=&h=554&w=500&sz=76&hl=en&start=3&sig2=Ii3awLdMXp4Zjbxznl5Pnw&um=1&itbs=1&tbnid=MKaJ7Z8cc3BUJM:&tbnh=133&tbnw=120&prev=/images%3Fq%3Dmesh%2Btopology%26um%3D1%26hl%3Den%26sa%3DN%26ndsp%3D18%26tbs%3Disch:1&ei=JRHUS_O4B9G3rAeuleDwDQ

http://www.edrawsoft.com/images/network/Tree-Network-Topology.png http://3.bp.blogspot.com/_-nQfPsfB_KE/SqXhCECbX3I/AAAAAAAACcQ/nwKBYECF9Ys/s320/

kabel-utp2.jpg http://www.lsumter.info/ComputerNetwork/images/vpn-network2.gif

Network Architecture; http://freepctech.com/pc/002/networks007.shtml http://www.wisegeek.com/what-is-client-server-architecture.htm http://www.networkcomputing.com/netdesign/1005part1a.html

Cost estimation: http://www.gore.com/MungoBlobs/controlled-impedance_shielded_twisted_pair_illus.jpg http://www.shopping.com/xPO-Belkin-100-ft-UTP-Network-Cable-A3L791-100 http://www.directron.com/ddu1681s.html#caption http://in.tolmol.com/Acer%20X163W%2016%20Inches%20LCD%20Monitor/prices/16967022 http://www.directron.com/msbf96.html#caption http://in.tolmol.com/HP%20Printer%20%252B%20Scanner%20%252B%20Copier%20%252B

%20Fax%20%20LaserJet%203050%20%252B%20Free%20Gift%20Certificate%20Rs.%20217/prices/4277502

http://www.cypressindustries.com/shoponline/proddetail.asp?prod=FM2STST01M http://www.npithub.com/index.php?fname=/product/detail.php?pcatid=3&prod_id=68721

43 | P a g e

Page 44: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

University of South Florida, (1997-2005.), “Chapter 5, Topology” [online]

http://fcit.usf.edu/network/chap5/chap5.htm#StarNetwork

EDrawSoft, Inc., (2004-2007), “Computer network topology- perfect network topology

diagramming with rich examples” [online]

http://www.edrawsoft.com/Network-Topologies.php

Computer Networks (Fourth Edition)By Andrew S. Tanenbaum

Data & Computer CommunicationBy William Stalling

Network + Guide to NetworkBy Tamara Dean

Some Stuff about Computer Networkshttp://www.houstuffworks.com

44 | P a g e

Page 45: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Appendix

Topology

1. Bus Topology- Devices are connected to a central cable, called the bus or backbone Bus

topology uses a common line (backbone) to connect all devices.

2. Ring Topology- Ring topology is rarely used these days, a Ring topology networks

the devices by connecting each device to its two neighboring for communication. Data is

passed one way from device to device, and if one device/cable fails then the whole

network goes down.

3. Mesh Topology- Mesh topology is a network where all the nodes are connected to each

other and is a complete network. The purpose of the mesh design is to provide a high

level of redundancy.

45 | P a g e

Page 46: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

4. Tree Topology:

It is the combination of Bus and Star topologies. It is also known as a Hierarchical Topology and

has a central root node that is connected to one or more nodes of a lower hierarchy. The nodes

are not required to work as repeaters or regenerators.

http://www.edrawsoft.com/images/network/Tree-Network-Topology.png

46 | P a g e

Page 47: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

SERVER SYSTEM OF THE COMPANY

SERVER ROOM

The server room is fulfilled with five server machines. Each server will cater for a specific purpose. The servers used are listed below;

FILE SERVER

This will provide employees a public place to save files. The administrator is able to provide space for personal use with password protection.

DATABASE SERVER

The database server will be used to run a DBMS. As an example, Apache or Oracle can be run through the database server. This will cater the employee information database, payroll, accounts, etc.

MAIL SERVER

Each employee of the company is provided with an email address with the company’s domain (like [email protected]). And each email ID is provided with a 10MB mail box. These domain configurations are performed by the mail server.

WEB SERVER

ICT resources Malaysia has its own web site maintained by the advertising department. This site mainly gives information to the customers and was lately updated with some more options where the customers can register and do certain transactions online. This web site’s maintenance in the internet is done by the web server.

47 | P a g e

Page 48: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

PROXY SERVER

The proxy server is implemented to administer and control how the users get connected to the internet. The proxy server is connected to the ADSL line. The whole network will access the internet through the ADSL line. Therefore the proxy is connected to this line. This will enable the administrator to get full control of the internet flow.

48 | P a g e

Page 49: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

Two different type of client server model

Basic of 2-tier of architecture: this architecture is used to describe client/server systems where

the client directly communicates to requests resources and the server responds direct

communication to the request, using its own resources. This concludes that the server does not

call any other application in order to provide part of the service.

Basic of 3-tier architecture:

In 3-tier architecture, there is an intermediary level, meaning the architecture is generally split up between:

A client, which is a computer, requests the resources, equipped with a user interface (usually a browser) for presentation purposes.

The application server, whose task it is to fulfill the requested resources, but by calling on another server. The data server, which provides the application server with the data it requires.

49 | P a g e

Page 50: Rohit Singh

INDIVIDUAL ASSIGNENT-HSSN Roll No.-PTL00783327

50 | P a g e