Networking Documentation
Networking Documentation
Networking Documentation
Group-10
Topic
Acknowledgement
Certificate
Abstract
Introduction
Network
Transmission media
Topology
Client-server Architecture
Proposed Network Solution
Feasibility Study
Proposed Network Diagram
Distribution of computer and IP
table
Cost Analysis
Network Devices used
Network Security
Conclusion
Reference
Page no.
3
4
5
6
7
9
12
13
15
16
18
21
22
23
26
28
29
Introduction
The CEO of an organization that has just been upgraded to a medium-sized establishment
designed to increase the productivity of their employees, which amounts to 80, personal
computers in 75 of 'its employees in a network. It is help file sharing and quick
Page 1 of 26
correspondence both inside the organization and even outside. Being in the supply of engine
parts for several cars, the CEO has also identified the need to monitor and protect the orders
made by the manufacturers and the information given so sensitive in their correspondence
through e-mail in particular by the sales staff. In addition, the security and confidentiality of
information relating to the organization's products, accounting and even human resources are
essential because there are plans to increase the number of products sold and employees.
This is a report for the installment of the network, where the division of 75 computers in the
network is occupying the 6th and the 9th floor of the ten storey building.
Departments allocated:
6th floor:
Sales, Accounts and Human resources
9th floor:
CEOs room, research and Development and product design
Here in this report detailed analysis of the feasibility, devices specifications, cost estimation
and the topology used in the network are reported. Also the security issues are also been
discuss with all recommendations for the security and the maintenance of the network,
without being failures are attacks of the intruders.
Page 2 of 26
Network
Network refers to the collection of two or more nodes i.e. computer systems, printers,
scanner, hardware, software etc connected together communication channel. Networking
refers to connection of nodes through common communication channel for sharing and
transfer of data, resources and information among interconnected devices.
http://www.home-network-help.com/images/xp-router-network.jpg
Types of Network:1) LAN LAN stands for Local area network. It is a network that connects computers
and devices in a limited geographical area such as home, school, computer laboratory.
Mainly LAN network uses wired network based on Ethernet technology.
2) WAN WAN stands for Wide area network. It is a computer network that covers a
large geographic area such as a city, country. Mainly WAN uses a communications
Page 3 of 26
channel that combines many types of media such as telephone lines, cables, and air
waves.
3) MAN MAN stands for Metropolitan area network. It is a large computer network
that usually spans a city or a large campus.
Advantages of Network:1) Speed Sharing and transferring files within Networks are very rapid.
2)
3)
4)
5)
6)
7)
Flexible Access Access their files from computers throughout the firm.
Page 4 of 26
Transmission medium
Transmission medium describes the type of physical system used to carry a communication
signal from one system to another. It is most important part in establishing the network. There
are mainly two types of medium used in transferring data from system to another which are:1) Wired Technology Wired Network is usually accomplished by using cables and
other hardware to physically connect one computer to another. Different cables used
to establish Wired network are:a)
Twisted pair cable: - A type of cable that consists of two independently insulated
wires twisted around one another. The use of two wires twisted together helps to
reduce crosstalk and electromagnetic induction. It is the least expensive and most
widely used medium for telecommunication. The transmission speed ranges from
2 million bits per second to 100 million bits per second. Two types of Twisted pair
wire used are:
https://users.cs.jmu.edu/bernstdh/web/common/lectures/images/twisted-pair-cable.gif
b)
Coaxial cable: - A type of wire that consists of a center copper or aluminum wire
surrounded by insulation of a flexible material with a high dielectric constant and
then a grounded shield of braided wire which is a conductive layer. The shield
Page 5 of 26
minimizes electrical and radio frequency interference. It is widely used for cable
television systems, office buildings, and other worksites for local area networks.
Transmission speed range from 200 million to more than 500 million bits per
second.
http://www.intelligenceunited.com/wp-content/uploads/2010/04/coaxial-cable.png
c)
Optical fiber cable: - A fiber optic cable consists of a bundle of glass (or plastic)
threads (fibers), each of which is capable of transmitting messages modulated onto
light waves, which are wrapped in protective layers. It is not affected by
electromagnetic radiation. Transmission speed may reach trillions of bits per
second. The transmission speed of fiber optics is hundreds of times faster than for
coaxial cables and thousands of times faster than a twisted-pair wire.
http://www.yourdictionary.com/images/computer/FIBER288.GIF
2) Wireless Technology Wireless network is used to describe interconnection of
nodes without using any physical connection or wired, but rather the network is
connected by radio waves and/or microwaves to maintain communications. This type
Page 6 of 26
http://www.mobilecommstechnology.com/projects/irda/images/img1.jpg
Page 7 of 26
Topology
Network topology is the design model of interconnections of the different elements (i.e.
links, nodes, etc.) of a computer network. Network topologies may be physical or logical.
There are five main type of topology which is as follows:a)
b)
c)
d)
e)
Page 8 of 26
Client-Server Architecture
Server: A server is software or a series of computers that links other computers or electronic
device. They store the web pages or databases etc. in it so that user can gain access to them in
the form of user requests from the Client end.
There are almost the entire structures of internet based upon Client- Server model for
example:
1.
2.
3.
4.
5.
6.
7.
Client: A Client is an application or system that access to remote computers or the servers. A
client sends requests to the server to get results.
Three types of clients:
1. FAT CLIENT.
It is a type of client that performs the data processing operation itself and does
not rely on the server.
2. THIN CLIENT.
It is a type of client that uses the resources of the host (server). A thin clients
job is to just display graphically anything provided by the application server,
which performs all the data processing in the servers end.
3. HYBRID CLIENT.
It is a mixture of FAT and THIN client. Just like FAT client it does the local
processing where as relies on server for storage.
distributed
or
service
Clients.
a request or store
Page 9 of 26
workloads
called
data in the database of the server. On request the server retrieves the data from the database
and displays it on the screen of the clients.
Further many business applications use the protocols such as HTTP, SMTP, Telnet and DNS.
Advantages of Client server architecture
1. Centralization access, resources, and data security are controlled through the server.
2. It gives greater ease of maintenance. It can be replace, repair, upgrade or even relocate
a server while its clients remain unaware and unaffected by the change
3. Scalability any element can be upgraded when needed
4. The data are stored in the database of the server, which gives greater security controls
even if the clients are not maintained. Also servers can control access and resources of
the clients with appropriate permissions may access and change data.
5. Flexibility new technology can be easily integrated into the system
6. Accessibility Server can be accessed remotely and across multiple platforms.
7. New technologies are available to enhance the security, friendliness of the user
interface and ease of use.
Disadvantages of Client server architecture:
1. Dependability The whole system depends upon the server if the server goes down
then all the network based operation will come to a halt.
2. It causes network congestion. It may occur when the link is carrying much data that
its quality of the service decreases. Its effects may be queuing delay, packet loss or
blocking of new connections
3. Typically, the central server computer must be powerful enough to maintain and share
resources with the other computers on the network. This entails a substantial cost.
Page 10 of 26
http://www.ccnastudyguide.net/wpcontent/uploads/2009/07/Extendedstar-topology-300x300.jpg
Page 11 of 26
Feasibility Study
We have done Feasibility Study to judge the feasibility of a new project
. It is actually a preliminary analysis of a project that lets the people whether proceeding with
a project is worthful or not. Feasibility study is very important for a project which makes an
analysis of all the aspects of a project, external and internal factors influencing it, all the costs
associated with it. It also makes an estimate of how much sales are to be expected and what
profits would the project make. The result of the feasibility study tells weather it is logical to
proceed with it or not.
We have done Feasibility study on four basis:1. Technical Feasibility: - This analysis tells us about the technology we are using to
configure the network of the organization is practically possible, suited to the
organization and weather the technology is up to date or not. As we have use nested star
(tree) topology, wired media for network and Twisted pair cable for wiring which is
practically a good configuration as we have to configure the whole network in a building,
topology suits the design of departments as given and transfer rate and security within a
department. Wired media helps in maintaining a good strength of signal and transfer rate.
By using two servers we ensure back up of data in second server in case of failure of first
server.
2. Schedule feasibility: - This analysis tells us about the time period given to complete to
complete the project is sufficient or not. Typically this means estimating how long the
system will take to develop, and if it can be completed in a given time period. Schedule
feasibility is a measure of how reasonable the project timetable is. As we have been
given six week to design the network of the organization which is sufficient for our
group.
3. Operational Feasibility: - This analysis tells us about the degree to which a proposed
network diagram solves organization problems or takes advantage of organization
opportunities. It also refers to a system that users will accept and use effectively to
support organization objectives. As we have use nested star (tree) topology and using
different switch for every department, we ensure security and high transfer rate of data
within a department.
4. Economic feasibility: - This analysis tells us about the weather estimated cost of the
project is suitable to organization and under its budget and also anticipated value of the
Page 12 of 26
Page 13 of 26
Page 14 of 26
Page 15 of 26
Overall Diagram
Page 16 of 26
Department
Sales department
Accounts Department
Human Resource Department
CEOs Room
Research and Development
Product design Department
Network client/server Room
Page 17 of 26
No. of computer
10
5
6
3
23
23
5
IP
192.172.20.4 to 192.172.20.13
192.172.20.14 to 192.172.20.18
192.172.20.19 to 192.172.20.24
192.172.20.25 to 192.172.20.27
192.172.20.28 to 192.172.20.50
192.172.20.51 to 192.172.20.73
192.172.20.74 to 192.172.20.78
REQUIREMENTS
Servers
Switches
Router
Twisted pair unshielded cable
Copper cross over wire
RJ connecter
Kaspersky Antivirus 2011
Total
Page 18 of 26
AMOUNT
2
10
1
500 meters
500metres
180 pieces
PRICE
Rs 25,000
Rs 4,500
Rs 75,000
Rs 20/meter
Rs75/meter
Rs 10/piece
NET AMOUNT
Rs 50,000
Rs 45,000
Rs 75,000
Rs 10,000
Rs 37,500
Rs 1,800
Rs 20,000
Rs 2,39,300
Processor
E5506,
2.13GHz,
0.205 mm2
Temperature operating
-55 to +60
Pair colors
Interfaces:
a. RJ- 45 ports 10/100BASET(X)
b. Full/half duplex mode.
Connection10-pin terminal block
5) RJ connecter: - A registered jack (RJ) is a standardized physical network interface
both jack construction and wiring pattern for connecting telecommunications or
data equipment to a service provided by a local exchange carrier or long distance
carrier. The standard designs for these connectors and their wiring are named RJ11,
RJ14, RJ21, RJ48, etc.
6) Crossover cable: - A crossover cable connects two devices of the same type, for
example - switches DTEDTE or DCE-DCE, usually connected asymmetrically.
7) Gateway: It is a device in the network node which works as an interface with the
other network that uses different protocols. It works on the OSI layer Transport layer,
Session layer, Presentation layer, Application layer.
8) Network Interface Card: It is a hardware device that works as an interface between
the network and the computer i.e. allows network capable device to access the
network. The NIC exists in the data link layer (OSI layer 2).
Page 20 of 26
9) Repeater: It is a device that receives the signal and regenerates an amplified signal to
retransmit the signal.
Page 21 of 26
Network Security
This section focuses the on the security of the network. The first security step starts from the
authenticating the user (i.e. username and password). After being authenticated the second
step is to install a firewall in the server that enforces access policies like the services are only
allowed to the people of the organization or the company. This prevents unauthorized access
to the network. Although it may fail computer worms or Trojans being transmitted over the
network, for that an antivirus software or an IS (internet security software) can be used.
Controlling end user access:
By Creating an account and assigning a password are only small parts of giving someone
access to the network. A network administrator also has to determine other account
parameters such as when an end user can access the network, what groups the user is
associated with, what files he or she can access, and limitations on network and server
resources. User should not be given concurrent login privileges (i.e. single sign-on).
Firewall:
A firewall is program or software or network that is designed to block unauthorized access
while permitting authorized communication. It is set of device that is configured to permit or
deny network access based upon a set of rules (protocol) and other criteria.
Types of firewall to be installed are
Antivirus:
Page 22 of 26
Antivirus is a software used to prevent, detect and remove malware, viruses, worms and
Trojan horses. It also prevents and removes adware and spyware. For a network it is
recommended to install an antivirus program in every system including server to prevent
spreading and entering of impostors.
http://www.kaspersky.com/au/images/boxes/r2_workspace_uk.jpg
Back-ups:
To secure the information and databases of the company or the organization keeping backups
is also an important. Calamities, natural disaster, server breakdown or the building can get
fire or explosions. So, there is need of recent backup at the alternate locate for the survival of
the company.
Encryption technology:
Further specified to cryptography, it can be used as a tool to provide privacy, to authenticate
the identities of communication parties and to ensure message integrity. Encryption is the
process of scrambling the contents of a file or message to make it unintelligible to anyone not
in possession of the key required to unscramble it.
Page 23 of 26
Conclusion
The report on the installation of a network in the company has given us an opportunity to
learn a great deal of new concepts of networking. The network is to be installed keeping in
concern of all the feasibilities and estimation of the cost and variable reliability, so the
network designed proposed is a very suitable network for the company. After much analysis
of the network installation specification the use of wired LAN connection, extended star
topology and the specified device will give much enhancement to the network.
We have implemented the various technologies in the installment of the network. Like the
client-server architecture of the network. The type of connection for the network which we
are using wired LAN as it is easy to install and reliable by cost too. As there are different
departments in different storey of the building we have use a feasible topology for the
network and that in the extended star topology. And each computer will be connected with a
specific IP address for the transmission of the data or information.
Also with concern of the security, we are installing an antivirus program in the server side as
well as the client side so that the impostors may not get spread over the network
Lastly the network installation cost estimation is being tried to keep minimal.
Page 24 of 26
Reference
Website reference:1. Network and Communication Protocol
available: http://eta305.wordpress.com/2007/08/
last access: 25th September 2010 at 10:30 p.m.
2. NETWORKS, Types of Networks,Advantages of Network,Disadvantages of Networks,
OSI model, Internetworking, Bits, frames, packets and segments, Broadcasts, Protocol,
Wireless LANs.
available: http://homepages.uel.ac.uk/u0306091/Network.htm
last access: 27th September 2010 at 4:43 p.m.
3. Cat5e Cables - Imported & Locally Assembled Category 5e Patch leads, StraightThrough, Crossover, UTP, STP
available:http://www.connectworld.net/au_cabling/category_5e-cables.html
last access: 26th September 2010 at 09:15 p.m.
4. Generic 24 Port 10/100 Switch (5 Year Warranty) (WTEH2400M) | Techbuy Australia
available: http://www.techbuy.com.au/product.asp?at=51&prodid=65867
last access: 24th September 2010 at 11:54 p.m.
5. What is coaxial cable? - A Word Definition From the Webopedia Computer Dictionary
available: http://www.webopedia.com/TERM/C/coaxial_cable.html
last access: 27th September 2010 at 10:30 p.m.
6. What is fiber optics? - A Word Definition From the Webopedia Computer Dictionary
available: http://www.webopedia.com/TERM/F/fiber_optics.html
last access: 26th September 2010 at 11:57 p.m.
7. What is network? - A Word Definition From the Webopedia Computer Dictionary
available: http://www.webopedia.com/TERM/N/network.html
last access: 25th September 2010 at 06:30 p.m.
8. What is twisted-pair cable? - A Word Definition From the Webopedia Computer
Dictionary
available: http://www.webopedia.com/TERM/T/twisted_pair_cable.html
last access: 27th September 2010 at 10:45 p.m.
9. Computer network - Wikipedia, the free encyclopedia
available:
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci546288,00.html
last access: 27th September 2010 at 07:13 p.m.
10. Network topology - Wikipedia, the free encyclopedia
available: http://www.atis.org/atismembers.shtml
last access: 24th September 2010 at 08:30 p.m.
11. Moxa Rackmount Ethernet Swtich - IKS-6324 Series 22+2G-port Gigabit unmanaged
Ethernet switches
available: http://www.moxa.com/product/IKS-6324.htm
last access: 25th September 2010 at 10:30 p.m.
Page 25 of 26
BOOK REFERENCE:1) Stalling ,William (1998). Data and Computer Communication . 7th ed. New Delhi:
Prentice-Hall of India Private Limited. 169-174.
2) Breyer, R., Riley, S (2000). Switched, Fast, and Gigabit Ethernet. 3rd ed. NEW DELHI:
Macmillan Technical Publishing. 289-291.
Page 26 of 26