Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Softbind Pips

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 82

i

A Case Study

Utilization of Hybrid Networks Through Efficient Network

Engineering on the CHTM building

In Partial Fulfilment

Of the Requirements for

Networking 2

Buenaventura, Stephanie Nicole R.

Castañeda, Kent Ivan R.

Florentin, Migo H.

Haduca, Jon BJ H.

Lamorena, Ervin O.

Tolentino, Florence Kate R.

Bachelor of Science in Information Technology 3B

2023
ii

Abstract

This research aimed to proposed and develop or improve a network infrastructure

in CHTM building. This study was entitled “Utilization of Hybrid Networks Through

Efficient Network Engineering on the CHTM building” prepared and submitted by

Buenaventura, Stephanie Nicole R., Castaneda, Kent Ivan R., Florentin, Migo H.,

Haduca, Jon BJ H., Lamorena, Ervin O., Tolentino, Florence Kate R..

Specifically, it sought to meet the following objectives: (1) To identify the current

network infrastructure of the CHTM building; (2) To identify the requirements needed in

order to apply the efficient network engineering. In terms of; Network Device

Requirements, IP addressing schema, Network security architecture and overall network

security processes. Network Cost; (3) to design and improve the network infrastructure in

CHTM building. (4)To evaluate the proposed network design infrastructure in terms of

its: a. Scalability b. Availability c. Security, and d. Manageability. (5) To identify the

goals and technical requirements of the establishment: a. to improve the network

connection amongst users .b. to further strengthen the security of the network c. increase

access points, switches, etc and rearrange their positions to have a more

The researchers conducted a survey and inspect the current network

infrastructure, the researchers have discovered that the building requires adjustments and

further enhancements. Network security is a problem and the internet speed is too slow to

satisfy user’s demand because the Access Point is situated on the second floor of the

structure, other floor levels' connections are substantially slower. There are fourteen (14)

rooms in the CHTM building.


iii

Therefore, the researchers will propose a network infrastructure of CHTM

building to improve the current network that they have at the moment. The proposed plan

will also include the installation of Network Securities and its architecture.

In order to improve the internet connectivity and security of the CHTM building,

the researchers will install more access points, switches, CCTVs, and other devices.

To enhance the network and security of the CHTM building, the researchers

suggested network infrastructure.


iv

Dedication

This dedication will serve as our little token to people who have given us a hand along

the way in finishing this case study. To my family and friends that made me feel lighter

in the midst of all the tasks.

Stephanie
v

Dedication

With utmost humility and gratitude, I dedicate this to those who have served as a

source of inspiration for us and have helped and guided us every step of the way. Our

families, friends, and loved ones who have always been there for us, supporting and

believing in us, deserve our sincerest thanks. Your unwavering encouragement has

been a driving force in our success, and we are eternally grateful for having you in our

lives.

Ivan
vi

Dedication

To my wonderful parents, for their unending love & support, I dedicate this study to

them. Along with our subject teacher, Mr Paul Nikko Quilana, who is our constant &

consistent guidance in this endeavor and to those who made all of these possible, our

Almighty God, for all the strength and wisdom, we are eternally grateful.

Migo
vii

Dedication

This study is dedicated to my mother and also my siblings that is always there to

support and encourage me to strive higher to achieve my dreams. This study helps me to

improve and gain a new knowledge.

Jon BJ
viii

Dedication

This study will be dedicated to my family and also to my friends who is always there

to help me in this study. To sir our networking 2 who is always there to guide us in this

manuscript that we made. To the school who give and enhance my skills and knowledge

without this study I cannot know about this study.

Ervin
ix

Dedication

I humbly dedicate this to those who have served as inspiration to us-those who

have helped and guided us all along the way. For family, friends and special loved ones

who have our back and believed in us, thank you.

Kate
x

Table of Contents

Preliminaries Page
Number
Title…………………………………………………………………... i
Abstract…………………………….………………………………… ii
Dedication…………………………………………….………….…... ix
Table of Contents……………………………………………………. x
List of Figures……………………………………………………….. xi
List of Tables………………………………………………………… xiii
Chapter I. Introduction
Background of the Study…………………………………………...... 1
Conceptual Framework……………………………………………... 8
Statement of the Objective………………………………………….. 9
Significance of the Study………………………………………….... 9
Scope and Delimitation……………………………………………... 10
ass of Terms…………………………………………………. 11
Assumption………………………………………………………….. 12
Hypothesis…………………………………………………………... 13
Chapter II. Reviews of Related Literature
Network Design Infrastructure……………………………………… 14
Impacts in Implementing Network Design Infrastructure on
Schools, Campuses, and Universities……………………………… 17
Network Security Architecture and Processes Involved for 20
Schools, Campuses, and Universities………………………………
Evaluating A Network Design Infrastructure……………………… 23
Chapter III. Methodology
Research Design……………………………………………………. 25
Instrument and Data Collection……………………………………. 28
Requirements for Network Design Structure………………………. 29
Chapter IV. Results & Discussions
Current Network Infrastructure of Establishment…………………... 32
Proposed Network Infrastructure of Establishment……………….... 33
Network Equipment Requirements…………………………………. 37
Network Security Architecture……………………………………… 39
IP Addressing Schema……………………………………………… 40
Network Cost………………………………………………………... 44
Evaluation of the Network Design Infrastructure…………………... 44
Chapter V. Findings, Recommendation, & Conclusion
Findings……………………………………………………………… 50
Recommendation…………………………………………………….. 51
xi

Conclusion…………………………………………………………… 51
References…………………………………………………………… 53
Appendices…………………………………………………………... 57
Curriculum Vitae…………………………………………………….. 63
xii

List of Figures
Figure Name Page
Number Number
1.1 Research Location……………………...……………………… 6
1.2 Legend of UNP………………………………………………… 7
1.3 Research Building ………………………………….………….. 7
1.4 Research Paradigm…………………………………………….. 8
3.1 PPDIOO Network Lifecycle Influences Design………………... 26
4.1 Ground Floor existing network infrastructure …………………. 32
4.2 Second Floor existing network infrastructure………………….. 33
4.3 Third Floor existing network infrastructure……………………. 33
4.4 Ground Floor proposed network infrastructure………………… 34
4.5 Second Floor proposed network infrastructure………………… 34
4.6 Third Floor proposed network infrastructure…………………... 35
4.7 CHTM Building Network Diagram/ IP Schema……………….. 41
4.8 Current Network Diagram……………………………………... 42
4.9 Proposed Network Diagram……………………………………. 42
xiii

List of Tables
Table Name Table
Number Page
3.1 Interpretation of the Weighted 31
Mean………………………...........
4.1 Symbols and Description………………….……………………… 35
4.2 Proposed Network Equipment and 36
Devices……………………….
4.3 Proposed Network Equipment and 37
Requirements…………………
4.4 Network Security Architecture…………………………………… 40
4.5 Device and IP Addresses……………….. 43
…………………………
4.6 Proposed Network Infrastructure 44
Cost…………………………….
4.7 Network Scalability……………………………………….... 45
…….
4.8 Network Security…………………………………………………. 46
4.9 Network Performance…………………………………………...... 47
4.10 Network Usability………………………………………….……... 48
4.11 Network Manageability…………………………………………... 48
4.12 Summary of the Network Acceptability Test…………………….. 49
i

Chapter I

Introduction

Background of the Study

In this vast world, technology is one of the most powerful tools that people are

using in our generation today. Daily life activities have been made easier through the help

of technology. But how can this affect to those people who are not well-known about

technologies? While other people or we should say teenager known about technologies

and how it can affect to them.

Technology is the most popular tools that made in this generation they say that

technologies can be an advantage for us because it can easy our works like doing a paper

and research work and other things. Trough technologies the time that we have, when we

do not have a technology can easy as it is now. There are some people who do not know

how to use technologies because they do not know how to use it but most of the teenagers

are using gadgets that can affect their own works like helping at home, doing some

homework’s and project.

According to Mark Bevir (2017). Network are often discussed by contrasting

them with two other modes of coordination and organization: markets and hierarchies.

One respect in which the three modes differ is the basis of the relationships between the

actors in them. Thus, markets are based on property rights and contracts, hierarchies are

based on something like an employment relationship, and networks are based on the

exchange of resources
2

According to Scott F. Midkiff (2009). A network has three layers of components:

application software, network software, and network hardware. Application software

consists of computer programs that interface with network users and permit the sharing of

information, such as files, graphics, and video, and resources, such as printers and disks.

According to Bharat Palariya (2001). The computer network enables to analyze,

organize and disseminate the information that is essential to profitability. The rise of

intranets and internets is the important aspect of computer networking. Intranets and

internets are private business networks that are based on internet technology.

According to Tom Karygiannis (2012) wireless communications offer

organizations and users many benefits such as portability and flexibility, increased

productivity, and lower installation costs. Wireless technologies cover a broad range of

differing capabilities oriented toward different uses and needs. Wireless local area

network (WLAN) devices, for instance, allow users to move their laptops from place to

place within their offices without the need for wires and without losing network

connectivity. Less wiring means greater flexibility, increased efficiency, and reduced

wiring costs.

As explained by Yang Xiao (2009), wireless networking has been enjoying fast

development, evidenced by wide deployments of many wireless networks of various

sizes, such as wireless personal area networks (WPANS), local area networks (WLANs),

metropolitan area networks (WMANS), and wide area networks (WWANs). These

wireless networks can be of different formations, such as cellular networks, ad hoc


3

networks, and mesh networks, and can also be domain specific networks, such as

vehicular communication networks and sensor networks.

As discussed by Kostas Pentikousis (2015). Wireless networks exhibit different

characteristics than wired ones. Mobile hosts have different needs and limitations than

desktop computers. TCP has served well the wired Internet for almost 20 years, but is not

ready for wired-cum- wireless environments. This article presents the challenges that

must be met in order to provide reliable transport services to all hosts regardless of the

type of network connectivity used. It surveys recently proposed solutions and evaluates

them with respect to a wired- cum-wireless environment.

As explained by Rafid Salih Sarhan AlSarhan (2016). The design of computer

networks differs from one university to another. This is as a result of many factors which

determine the differences. Such factors include; adaptability, integration, resilience,

security, and cost. Installing networks in a university relies on the university’s budget,

which differs by institution and from country to country.

According to Sybil, D (2010). Network design indicators (coverage, directness

and connectivity) were then related to ridership (annual boarding’s per capita), and

positive relations were observed, which suggests that network design plays an important

role in their success.

According to Sulaimon Adeniji Adebayo (2012). The need for increase and strong

computer and network security also becomes increasingly necessary and important. The

increase in the computer network system has exposed many networks to various kinds of

internet threats and with this exposure, one can see that the need for increased network

security is vital and important in every organization. The security may include
4

identification, authentication and authorization, and surveillance camera to protect

integrity, availability, accountability, and authenticity of computer hardware or network

equipment

In addition Sulaimon Adeniji Adebayo (2012). Network security has to be

designed to fit the needs of one organization network and not anyone else’s. For instance,

a small sized law company would allow access to case information for authorized users

on the outside of the network, and at the same time ensure that full access to the internet

is always available to staff on the inside of the network, in other cases to access a case

file from the office or on the road.

Based on the study of Ajala Funmilola (2015). Network security has become

more important to personal computer users, organizations, and the military. With the

advent of the internet, security became a major concern and the history of security allows

a better understanding of the emergence of security technology. The internet structure

itself allowed for many security threats to occur. The architecture of the internet, when

modified can reduce the possible attacks that can be sent across the network.

The researchers will conduct this research to improve the network design in the

CHTM building. The researchers inspect the CHTM building and finds out that they are

having an issue with their wireless network connection and they also have only one

security camera. So, the researchers want to conduct this kind of study to put an end to

their current situation and to improve their wireless network cconnection. As the

researchers visited the school, they encountered a problem such as the whole school only

uses one active wireless internet connection and with that the CHTM students and also

the teachers are forcibly uses their own data connection when the internet is occasionally
5

going down while they are teaching. In this case study, the researchers will evaluate

buildings to analyse wire route discontent and to discover any structural flaws in the

network architecture. Therefore, the researchers are ready to implement a remedy by

proposing a solution in the school by using Efficient Network Engineering internet

connection on CHTM Building to lessen the network problems they are facing. As a

result, the researches indicated that the proposed network solution will solve the school's

problem.

The University of Northern Philippines has its humble beginning as a shop

department of the Old Vigan High School. Founded in 1906 and dedicated a year later, it

started to play its vital role of training the youth in this part of the land for independent

and democratic ways of life and to impress on the people, who were then still under the

charm of Spanish aristocracy, the idea that the labor of the brawn is no less honorable

than the labor of the brain – that the man who runs the machine is no less a child of God

than the man who sits in the office.

The rapid expansion of the courses offered in the school necessitated the

acquisition of a new school site and the construction of a bigger building for the growing

student population. Besides the trade courses for boys, trade courses for girls were added.

Short unit courses were also given for those who needed only skills training. In 1955, the

school transferred to its new and present site, a landscaped eight-hectare campus in

Tamag, Vigan.

The name of the school was changed for the fourth time when, in 1960, under the General

Appropriation Act, R.A. No. 2700, it became Ilocos Sur School of Arts and Trades.
6

The University of Northern Philippines, from a humble beginning, is expected

to move on through the years bringing into fruitful reality the dream of Ilocos Sur’s

greatest leaders today Congressman Floro S. Crisologo and Governor Carmeling Pichay

Crisologo to establish an institution of higher learning for the present and the future

generation of the people of Ilocandia.

The University of Northern Philippines has established itself as one of most

trusted universities in the area. By then it has vision to be “A Globally Recognized

University in a Heritage City by 2030” and a mission “To produce globally skilled and

morally upright professionals instilled with rich cultural values.”

Figure 1.1 Research Location

The University of the Philippines and CHTM building are located at Tamag,

Vigan City based on Figure 1.1.


7

Figure 1.2 Legend of UNP

The CHTM building is located behind the UNP Main Library

Figure 1.3 Research Building

As shown on Figure 1.2, the CHTM building is located behind UNP Main library.
8

The researchers found out that the current network infrastructure of the 3-Story

CHTM building needs modifications and further improvements. It lacks Network

security and the internet speed is insufficient to meet the demand of its users. The Access

Point is installed at the 2nd floor of the building; hence, making the connection speed of

other floor levels noticeably slower. The CHTM building have fourteen (14) rooms. The

researchers would like to conduct their study at CHTM building to widen their

knowledge and skills to this study.

CONCEPTUAL FRAMEWORK

The Conceptual Framework will serve as a guide for the researchers as they

resolve the case study. The researchers must ascertain the study's pathway for it to be

successfully distribute the wireless access point to its certain location.

Figure 1.4: Research Paradigm

Prepare

Optimize
Plan

Plaz

a, in

fron

t of

Operate Design
the

Coll

Implemen ege
t
of

Engi

neer

ing

Buil
whi

ch is
9
sho

wn
The researcher will prepare all the needs in making a new network design in
on

CHTM Building, the researchers will focus by planning onFiguhow to make a design and
re
through the new network design, the researchers will implement the design that made and
1.2.

will operate and optimize the newly designed network infrastructure of CHTM Building.

Statement of the Objective

This study aimed the Utilization of Hybrid Networks Trough Efficient

Network Engineering on the CHTM Building.

Specifically, it sought to meet the following objectives:

(1) To identify the current network infrastructure or

(2) To identify the requirements needed in order to apply the efficient network

engineering. In terms of:

a) Network Device Requirements;

b) IP addressing schema;

c) Network security architecture and overall network security processes; and

d) Network Cost.

(3) To design and improve the network infrastructure in CHTM building.

(4) To evaluate the proposed network design infrastructure in terms of its:

a. Scalability;

d. Security;

c. Performance;

d. Usability, and

e. Manageability

Significance of the Study


10

The study aims to design a network infrastructure in CHTM Building and

improve connectivity and security. This are significant to the following:

University of Northern Philippines. This study would enable the institution to

encourage students in conducting research that may help them to improve and also

improve the institution.

Students. This research will provide students free internet access to help them on their

studies

Faculty. This study will help improve the educators’ teaching abilities and methods; they

are able to access more learning materials online for the students.

Researchers. This study can be used for the researchers as an application of knowledge

on designing a network infrastructure.

Future Researchers. This study can serve as a basis and reference for the future

researchers in making similar action researches for their future study.

Scope and Delimitation

The scope of study focused on the design and implementation of efficient hybrid

network inside the CHTM building. The researchers determined the faults of the current

network design for further potential improvements.

This study has established five (5) statement of the object to utilize the utilization

of hybrid networks through efficient network engineering in the CHTM building. It

sought to meet the following: 1) To identify the current network infrastructure, 2) To

identify the requirements needed in order to apply the efficient network engineering, 3)

To design and improve the network infrastructure in CHTM building, 4) To evaluate the
11

proposed network design infrastructure and 5) To identify the goals and technical

requirements of the establishment.

The study used the descriptive developmental research design that would guide

the researchers on development of making a network design for the infrastructure of

CHTM building. The researchers will be using the PPDIOO method, with this design the

researchers ought to use, the network design in the infrastructure in the CHTM building

would be more efficient for the users.

This study is delimited to the researchers and also the students, teachers and staff

on CHTM building if the network will be lost or have a weak internet connection on the

infrastructure by the time being if the said maintenance is not meet then the network and

the security system in the CHTM building will be weakened.

Operational Definition of Terms

The following terms are defined for clarity and better understanding of this study.

College of Hospitality and Tourism Management (CHTM). Refers to the research

location.

Efficient. Refers to the way of the network engineering of hybrid networks to the CHTM

building.

Internet. Refers to the concerning issue that is experienced by the students and faculty

members in the CHTM building. The problem is what the researchers are trying to

improve though this case study.

IP Schema. Refers to the outline or model of the theory for the proposed network

infrastructure that will be utilized at the CHTM building


12

Network. Refers to the computers, servers, mainframes, or any gadgets that could convey

an exchange of data amongst the student or faculty staff in the CHTM building.

Network Design. Refers to the plan for the implementation of utilization of hybrid

networks on the network infrastructure on the CHTM building

Network Infrastructure. Refers to the physical and organizational structure of the

network in the facilities on the CHTM building.

Network Security. Refers to the methods or procedure that is to protect the network of

the CHTM building.

Wireless Network. Refers to networks that do not use wires of any type to connect them.

It is widely used to transfer data by the students or faculty staff in the CHTM building.

Wired Network. Refers to data transmission using wires or cables. This includes cable

television, internet access, telephone networks that used by the students or faculty staff in

the CHTM building.

Assumption

In the conduct of the study, the student-researchers were guided by the following

1. The researchers will identify the current network infrastructure to assess what

improvements would be made.

2. The researchers will determine the overall cost needed to implement the proposed

plan, In terms of:

a) Network Device Requirements;

b) IP addressing schema;

c) Network security architecture and overall network security processes; and

d) Network Cost.
13

3. The researcher will design and implement the network and security wires.

4. The researchers will give evaluation questionnaires to the I.T Specialized in

networking, with the following categories:

a. Scalability,

b. Security,

c. Performance,

d. Usability, and

e. Manageability

Hypothesis

This study tests the hypothesis that by evaluating the current network

infrastructure of the building, and by acquiring the requirements needed in order to apply

efficient network engineering. In terms of: Network Device Requirements, IP addressing

schema, Network security architecture and overall network security processes and

Network Cost. We can create a design that improves the current network infrastructure of

the CHTM building


14

Chapter II

Review of Related Literature

The researchers will conduct a study about the Utilization of Hybrid Networks

through Efficient Network Engineering on the CHTM building. Improving the network

infrastructure and also managing the network. This study will test the network design that

made for the further improvement of the building.

Network Design Infrastructure in Schools, Campuses, and Universities

Network infrastructure, its impact in the learning process regarding both the

students who participated in the design of the infrastructure and the students who

participated in the hands-on implementation of the network (M. et al., 2017).

An approach for shortening the gap between theory and practice can be achieved

through the application, once they are based on real problems and they provide students

with the opportunity to propose a resolution strategy, which contributes to the full

understanding of the problem and its solution. (C. and M., 2016)

Network infrastructure is a term for everything that comprises a computer

network. This includes hardware (wires, routers, and software) which manages how the

computer network behaves. The infrastructure keeps the network running. It can refer to

the underpinnings of one network or a combination of networks that communicate with

each other. (J. Phips, 2021)

An infrastructure network is the network architecture for providing

communication between wireless clients and wired network resources. The transition of

data from the wireless to wired medium occurs via an AP. An AP and its associated
15

wireless clients define the coverage area. Together all the devices form a basic service

set. (R. Allan, 2009)

The existence of a campus network infrastructure enhances teaching, learning,

and research by allowing faculty, students, and staff to have participatory access to

information and technological resources on the campus and in the community, region,

nation, and world. The network infrastructure eliminates physical isolation, and allows

students at small colleges to have the same kind of information access that any student

anywhere has. Without this access, institutions of higher education could become road

kill along the information highway. An institution that does not participate in the

information age will simply not be viable in the 21st century. (R. Kunneke 2021)

Implementing network infrastructure on a campus is far more than just a physical

infrastructure, and planning and building a campus network really means developing an

entirely new information environment that will have a profound impact on almost every

aspect of campus life. In building networks, campuses are engaged in a change process

that is strategically essential to their very nature and existence. (C. Ménard 2018)

The network infrastructure is an information channel that reaches every place on

campus where "knowledge workers" live and work, including offices, classrooms,

laboratories, studios, student residences, student activity areas, and so forth. It includes a

physical infrastructure that consists of high-grade copper and fiber cable; junction and

termination boxes; communications devices such as fiber hubs, bridges, routers, terminal

servers; and wiring closets to house equipment and termination panels. The ideal campus

network provides a seamless interface to on-campus sub-nets and to off-campus locations

and resources, such as faculty homes, metropolitan and regional networks, and the
16

Internet. The ideal campus network has physical components that meet defined

institutional standards, provide for modularity and expandability, and are well

documented and mapped. (J. Groenewegen 2015).

A full-campus network infrastructure is one of the most important features of a

college environment. While a fundamental part of the infrastructure, networks are not

static; they must change and grow continually, often at a much different pace than other

parts of the infrastructure. A campus network, while a part of the infrastructure, also

needs to be viewed as a "consumable" like library books, football uniforms, dormitory

furniture, electricity, and water. This requires a regular, consistent, predictable source of

funding, not just a one-time budget infusion to lay cable. Colleges that aspire to have a

high-quality technology environment need to set standards and manage networks from a

true collegiate perspective, in the sense of choosing to maintain a set of technological

options that are genuinely supportable with the financial and human capital available. (T.

Moberg 2018)

It is important to understand that network infrastructure really means planning a

whole new environment that will encompass information, communication, and

entertainment on the campus. The network will provide a powerful, dynamic, new

channel of access to the world of information. It will also enhance and fundamentally

alter the communication mechanisms on campus. And whether we want it or not, the

network will provide a wide range of new entertainment opportunities. This new

environment will encompass or touch all the information technology areas, which will

challenge, compete with, and sometimes replace existing modes of campus


17

communications, information access, administrative work, power hierarchies, and

budgeting systems. (J. Garbis 2021)

Network infrastructure is the hardware and software resources of an entire

network that enable network connectivity, communication, operations and management

of an enterprise network. It provides the communication path and services between users,

processes, applications, services and external networks/the internet. (J. Chapman 2017)

With the mentioned studies about designing network infrastructure in school,

campuses and universities, designing a hybrid network infrastructure for the stakeholders

of CHTM building would suffice the existing network problems and issues.

Impact/Benefits/Advantages in Implementing a Network Design Infrastructure on

Schools, Campuses, and Universities

Designing an integrated network design with standard network system can enable

the universities of developing countries to implement an effective network design

infrastructure with minimal cost. Selecting the cheapest devices doesn’t always mean a

low-quality output, by implementing a good quality of various firewalls and back up

devices, a good security of network can be achieved. (R. S. AlSarhan, 2016).

Networks have contributed in various ways to the development of educational

systems and institutions have been providing excellent learning environments by

embarking on building campus network. Therefore, need for high network availability is

important in an educational system for timely access. (I. A. Alimi, et. al. 2015)

Benefit of a successful network infrastructure design is the core's capability to

provide Internet access throughout the campus without having to connect to a wall outlet.

This capability provides different benefits to different constituencies: students can use
18

their laptops anywhere; staff can access systems and the Internet as they hold meetings

across campus; researchers can work wherever they gather; office layouts do not have to

be driven by where network outlets are available. (J. Grochow 2015)

The purpose of this project is to design a suitable network system for universities

in developing countries. The aim was to design a network with high-quality security and

low cost, in such a way that network devices of universities in developing countries, will

meet standards associated with the universities in developed countries. This project will

help to enhance education in developing countries. There are many devices that were

used in designing the network, such as routers, switches, backup, firewall, and servers.

(R. Salih 2016).

Implementing well-constructed network infrastructure design facilitate more

connected learning in real-time. As we increasingly live in a digital world, schools must

use technology in order to be able to achieve outcomes. As the hub of that connected

environment, the network must be fast, adaptable, flexible, and secure in order to make

the 21st century learning environment possible. As the hub of that connected

environment, the network must be fast, adaptable, flexible, and secure in order to make

the 21st century learning environment possible. (D. Koellmer 2016)

A network infrastructure enhances the campus atmosphere by improving

communication among faculty, staff, and students. For example, faculty and students can

have closer contact and better communication, even on small campuses that pride

themselves on this sort of educational interaction. Multi-disciplinary courses can be

planned, facilitated, and even partially taught by faculty-to-faculty and faculty-to-student

electronic mail conversations. Faculty and staff can more easily contact each other,
19

without the typical situation of telephone tag. Student groups can arrange meetings,

faculty can distribute assignments to students, students can turn in assignments, library

books can be ordered from inter-library loan--these are just a few of the many ways that

campus activities are facilitated by communication over a campus network. (D. Aldrich

2018)

A network implemented successfully promotes administrative efficiency by

providing access to institutional data, allowing better decision making, improving

productivity, and facilitating reengineering of operational processes. The use of

campuswide databases for student and employee records, scheduling, procurement, and

other business processes leads to more efficient work, flattens hierarchies, and removes

departmental barriers. (P. Anderson 2009)

A highly resilient network infrastructure provides connectivity between a main

network such as the Internet and a subnetwork such as a server-based (e.g., web server)

local area network. (Kaustubh Phaltankar 2013)

Network infrastructures are designed not just to provide backbone connectivity

but must ensure reliability in accordance with the security measures and standards

accepted in the field of information and communications technology. (Mudzramer A.

Hayudini 2021)

The network infrastructure integrates various information technology areas by

providing a central focus for management of resources and services. The network makes

it easy (and sometimes imperative) to coordinate the management of computing, library

automation, telecommunications, media technology, and other networked information

resources. Such coordinated management allows better use of resources, helps eliminate
20

turf issues, clarifies confusion about service sources, and allows much more efficient

strategies for handling infrastructure components like cable systems. (C. Kalmanek 2016)

With the mentioned studies concerning impacts/effects/benefits/disadvantage

/advantage in implementing a network design in school, campuses and universities,

constructing a hybrid network infrastructure for the stakeholders of CHTM building

would sufficient to resolve the current network challenges and issues.

Network Security Architecture and Processes involved in Schools, Campuses, and

Universities

Network security incidents are constantly innovating, resulting in data leakage,

destruction and other incidents. Campus network is the basis of daily teaching, scientific

research and normal operation of schools. It is of great significance to strengthen the

construction of campus network security. Based on this, this paper studies the campus

network security. The security of campus network has been paid more and more attention

by us. Although our network security technology means are mature now, for the campus

network, which is a special network carrier, there are many problems in its management

because of the large number of users and the wide coverage of the network. Study and

solve. (M. Huang, 2019)

Network security has become the protection of the wisdom of the campus

construction. Campus network security issues become increasingly serious; a single

security protection has been unable to meet the current security needs. This paper

analyzes the major security threats facing the campus network, and presents the campus

network security protection measures from the physical layer, network layer, system
21

layer, application layer and management of five aspects, thus constructing the campus

network's overall security defense system. (Y. Liu, 2021)

A campus network faces challenges to address core issues of security which are

governed by network architecture. This paper is mainly targeted towards campus

networks which deliver required security. This is essential because, it prevents the

institution from suffering any significant attacks associated with network. A university

network has a number of uses such as teaching, learning, research, management, e-

library, and connections with the external uses. (Md. N. Bin Ali 2013)

The research, Simulation of an enhanced network security framework for

Educational Enterprise system such as Federal Polytechnic Mubi was carried out of the

desire to protect the enterprise network against accidental or deliberate attempt to modify

or temper with valuable data. (O. Sarjiyus, D. Bala 2019)

Network security is considered an act of data protection during transmission

through interconnected network groups. The use and popularity of the internet and

computer networks have grown over the years, giving great importance to gaining access

to digital resources. (I. Edbert 2022)

Network security is a major factor restricting the development of colleges and

universities. Colleges and universities can strengthen the propaganda of campus network

security, improve the rules and regulations of college network security management, and

appropriately increase the investment of funds to ensure the construction of college

network and other methods. (Jinzhao Liu 2022)

The concerns over network security have become more complicated as the range

of devices has increased past computers such as desktops or laptops. These systems use
22

operating systems with small memories and protection mechanisms. Commonly, these

devices are able to connect via peer devices or networks, using similar protocols to

that of wireless networks, such as BLE, Bluetooth, NFC, ZigBee, Wi-Fi, LoRaWan,

Thread etc. (Manju Lata 2022)

Network security consists of policies and practices adopted to prevent monitor

from unauthorized access, misuse, modification, denial of a computer network and

network accessible resources.It involves the authorization of access to data in a network,

which can be modified by the network administrator. (Himanshu Lawaniya 2020)

Network security incidents often occur in campus network, such as obtaining,

attacking, and tampering with various kinds of information, such as examination results,

examination papers, school card funds information and so on. Faced with this situation,

we can adopt the means of data encryption, which usually means to change the way

information is expressed, and its purpose is to protect the real information. This will

make it impossible for unauthorized users to access protected information. There are

always criminals trying to get information that he should not get through various means.

(Min Huang et al 2019)

Network security has been going through a long and rough development process.

Computers have become much more powerful, network bandwidth have become much

higher, there are more and more users having access to Internet and technologies have

become more and more sophisticated. We should keep working and improving security

systems in order to protect the valuable assets from the adversaries. (Salar Faraji et al

2018)
23

With the studies on network security architecture in school, campuses and

universities that were discussed before, developing a hybrid network infrastructure for

the stakeholders of CHTM building would sufficient to resolve the existing network

challenges and issues.

Evaluation of Network Design Architecture

The required enhancements and modifications to enable the school forwarding

routines in a wireless ad hoc network. The focus has been on the design, implementation

and performance analysis of two schemes, blind forwarding and provider-aware

forwarding, as a representative of two main school forwarding philosophies. (C,

Campolo, et al 2015)

The results of a study investigating the potential of using social network analysis

to evaluate programs that aim at improving schools by fostering greater collaboration

between teachers. The goal of this method is to use data about teacher collaboration

within schools to map the distribution of expertise and resources needed to enact reforms.

It’s crucial to take into account a number of aspects while assessing a network design

architecture in schools, including scalability, security, network speed and dependability,

and simplicity of management. When assessing a network design infrastructure in

schools, these are the main issues that any author would take into account. (John Smith

2011)

Scalability is the network's capacity to manage a rising ability to add new services

and apps, as well as the quantity of users and devices. A top attention should be given to
24

security, utilizing tools like firewalls. There are 19 installed intrusion detection and

prevention systems and safe wireless access points. As a result, the network will be

secured from threats and student and teacher data will be secure. (S. Williams, 2014)

As both students and teachers rely on the network for online learning and

research, network speed and dependability are particularly essential. It is crucial to have a

wired and wireless network with enough capacity and low latency. This will guarantee

uninterrupted student access to online materials and participation in online classes. (M.

Johnson, 2013)

To ensure that the network can be readily maintained and troubleshoot by the IT

team, ease of management is crucial. Network maintenance can be made simpler and

downtime decreased with the use of a centralized management system, automated

monitoring and reporting tools, and remote access capabilities. As a result, the IT team

won't have to spend as much time managing the network and can instead concentrate on

other crucial responsibilities. (Brown, D. 2015).

With the aforementioned subjects of network management, usability,

performance, security, and scalability, when evaluating our network infrastructure design,

we deduced the categories that were utilized.


25

Chapter III

Methodology

Research Design

The study will be using the descriptive developmental research designs which will

be the guide of the researchers for the improvement or development on making a network

design of infrastructure in CHTM building. According (K. A. Mogi, 2020). In building a

computer network, a concept or method is needed in designing it, and here the PPDIOO

method will be used and uses two types of network topologies, namely star and ring

topologies. With the design of this computer network, it can help schools in the teaching

and learning process and can improve the quality of teaching, the quality of knowledge

and the quality of the abilities of students and teachers. In addition (A. Purwanto and B.

Soewito, 2021). Among researches on network optimization using PPDIOO are Design

and Validation of a Scheme of Infrastructure of Servers, under the PPDIOO

Methodology, Designing Network Structure Data Center to Enhance Network

Availability Using PPDIOO Life Cycle Approach method, and Optimization of a Wi-Fi
26

Wireless Network that Maximizes the Level of Satisfaction of Users and Allows the Use

of New Technological Trends in Higher Education Institutions.

The researchers will be guided through the use of PPDIOO Network Lifecycle.

The researchers will be processing the network design of the infrastructure that they

study and by the time that the researchers will ongoing in their study the PPDIOO will be

the guide to their study.

The Research Adopted the PPDIOO Network Lifecycle as a reflects the phases of

a standard network’s lifestyle. As shown in the figure, the PPDIOO lifecycle phases are

separate.

The researchers adopted the PPDIOO Network Lifecycle as a guide to the study.

As shown in the figure 2.1 the PPDIOO lifecycle phases are separate, yet closely related.

Figured 3.1 PPDIOO Network Lifecycle Influences Design

PREPARE

OPTIMIZE PLAN

PPDIOO
METHODOLOGY

OPERATE DESIGN

IMPLEMENT

The researchers will adopt the PPDIOO Network Lifecycle Influences

Design. It will ensure that the step that made will be follow. The researchers will provide
27

a framework for the design deliverables. It will encourage consistency in the creative

process, enabling network designs in the infrastructure in CHTM building. The

researchers will allow the network technician validate the designed network.

The Researchers will follow the PPDIOO Network Lifecycle which the PPDIOO

describes:

Prepare phase. In this phase the researchers will prepare what will be the needed tools

and also the expenses that they will provide by breakdown it or having a list for budget.

The researchers also prepare the network design or the network infrastructure.

Plan phase. The researchers will identify the network requirements or the tools and

equipment that may use, where the network will be installed and the security. This phase

be assessing the plan or infrastructure where or when will it will process. A project plan

helps manage the tasks, responsibilities, critical turning point, and resources. The project

plan should range with the scope, cost, and resources. The researchers will be planning

this to implement what the network design that they have.

Design phase. After the preparation and planning the design phase will be the next. The

researchers will decide if the planned equipment’s and tools are tuned on what the

researchers plan through the discussion with the network technician. The network design

specification that is produced is a well detailed design that, security, scalability, and

performance.

Implement phase. The researchers will proceed on implementing the design that had

been accepted.

Operate phase. The researchers are in the final test for the network design the

operational phase. It is involves maintaining network, which might include maintaining


28

high availability and reducing expenses. The monitoring of the network will always

monitor to see if the planned initial data for the network lifecycle's Optimize phase.

Optimize phase. The researchers will the one to control the network management, this

phase will to resolve the issues what will be the problem on the network. In the PPDIOO

process, the optimization phase can prompt a network redesign if too many network

problems and errors arise, if performance does not meet expectations, or if new

applications are identified to support organizational and technical requirements.

Although Design is one of the six PPDIOO phases, all the other phases influence

design decisions, and the Design phase interacts closely with them, as follows:

Data Gathering Instruments

Interview. The researchers will gather information through asking the network

technicians. Based on (A. & S., 1997). Both qualitative and quantitative researchers tend

to rely on the interview as the basic method of data gathering, whether the purpose is to

obtain a rich, in-depth experiential account of an event or episode in the life of the

respondent.

Therefore, the researchers will use this instrument to gather some useful

information’s to know what will be the process on their study on making a network

design in the infrastructure of CHTM building.

Questionnaire. The researcher will use or make a question to be ask to the network

technicians. According to (M.A. Sinclair 1975). For simplicity, this paper deals with

questionnaires conceived as written documents; unstructured interviews, while on a

continuum with written questionnaires, require different treatment and are omitted.
29

The researchers will make a questionnaire that can help their study in network design and

to gain some new knowledge.

Observation. The researchers will use this instrument to observe participants ongoing

behavior in a situation. According (Marcus 1995). If it is methodologically justified, the

main area of observation may be a specific locality where interesting events and

interactions usually occur, but often the research problem requires a “multi local” or

“trans local” fieldwork where a researcher can follow people, objects, a specific symbol,

a metaphor, a story, or biography.

The researchers will use the observation to look around what’s happening in the CHTM

building who are connected in the router. The researchers will observe if the network is

poor or strong in a certain area.

Requirements for Network Design Infrastructure

The researchers will use different requirements in designing the proposed network

infrastructure of the College of Hotel and Tourism Management with the follow:

Network Equipment Requirements, IP Addressing Schema, Network Security

Architecture and Processes involves, Network Cost, and Weighted Mean.

Network Equipment Requirements

Network Equipment are component that interacts at one or more protocol layers.

This comprises hubs, routers, switches, and end devices. There are features that can be

measured in network devices. Researchers intend to purchase new network devices that

are needed to be added in order to enhance the network and security of the CHTM

building. According to H. Subedi (2022) it is necessary to facilitate communication

between different parts of an organization's network. Network equipment includes


30

routers, switches, firewalls, servers, and other devices that are used to create, manage,

and secure the network. The equipment is used to create a secure and reliable network

infrastructure that can be used for data transmission, file sharing, and other network-

based activities.

The researchers will use this method as it is useful for designing a new network

infrastructure design in the CHTM building for the faculty and students.

IP Addressing Schema.

This makes it possible for users and apps to choose a specific network or host

with whom to communicate. It also assists in locating the hardware connected to the

network. Researchers would logically arrange the IP addresses in order to find specific

devices. In this case, researchers will be using the Class B IP addressing schema for the

devices that is in the network infrastructure of the CHTM building. U. Ghosh; R. Datta

(2015) These devices can allocate where the host assigns a specific IP address or will be

distributed among the network devices based on the network architecture or topology in a

way that support the required services

The creation of security networks that guarantee the safety of any underlying data

amongst the people that is connected to any devices in the network infrastructure of the

CHTM building. It serves as the foundation of the security protection for your network.

Researchers agreed on installing firewalls and setting security protocols to protect the

network of the said building.


31

Weighted Mean

Weighted Mean. Defined as an average computed by giving different weights to

some of the individual values. According to Kybernetika Praha (2016) weights are

assigned to single criteria, independently of the actual score vector. Alternative

approaches of introducing weights to the arithmetic mean aggregation link the weights

and single observed scorevalues. If this link is based on the ordinal approach, we obtain

the OWA (Ordered Weighted Average). Observe that OWA operators can be viewed as

“symmetrization” of weighted arithmetic means, and that both OWA’s and weighted

arithmetic means are related to the number of all criteria. When all the weights are equal,

then the weighted mean is similar to the arithmetic mean.

Where:

Weighted Mean = Σwx/Σw Σ = summation

w = The weight

x = the value

The researchers used weighted means to know the acceptability of the designed

network infrastructure and in presenting the weighted average mean.

Table 3.1 Interpretation of the Weighted Mean

Average Descriptive Rating Equivalent

4.00-5.00 Highly Acceptable HA


32

3.00-3.99 Very Acceptable VA

2.00-2.99 Acceptable A

1.50-1.99 Fairly Acceptable FA

1.00-1.49 Not Acceptable NA

Table 3.1 shows the legend for the interpretation of weighted mean and its ranges.

The researchers in calculating the weighted mean gathered from the evaluation forms

will use this method.

Chapter IV

Results and Discussion

Current Network Infrastructure of CHTM Building

The 3-Story CHTM building's current network architecture, the researchers

discovered, requires adjustments and further enhancements. Network security is a

problem, and the internet speed is too slow to satisfy user demand because the Access

Point is situated on the second floor of the structure, other floor levels' connections are

substantially slower. There are fourteen (14) rooms in the CHTM building. To broaden

their knowledge and expertise for this investigation, the researchers would like to conduct

their research at the CHTM facility.


33

Figure 4.1 Ground Floor existing network infrastructure

As show in figure 4.1.1 were there are four (4) access points that have two (2)

inside the dean’s office and two (2) in the faculty offices. There is one (1) network rack

in the ground floor. Outside the building the researchers see that there are three (3)

CCTV’S in the center, left side and right side of the building. The researchers find out

that the UTP cable at the back that connects to the dean’s office is hanging.

Figure 4.2 Second Floor Existing Network Infrastructure

The figure 4.2. Is the second floor of the CHTM building. The researchers find

out that in this floor is they have only one (1) access point and no CCTV.

Figure 4.3 Third Floor Existing Network Infrastructure


34

Figure 4.3 shows the existing network at third floor, and there is no CCTV or any

internet access

Proposed Network Infrastructure of CHTM Building

The researchers will propose a new network infrastructure of CHTM building to

improve the current network that they have at the moment. The proposed plan will also

include the installation of Network Securities and its architecture.

The researchers will put an additional Access points , a switch , a cctv and etc.

that will help the CHTM building to have a better internet connections and also the

Security of the building.

The researchers will propose network infrastructure to improve the network and

security in the CHTM building.

Figure 4.4 Ground Floor Proposed Network Infrastructure


35

In The figure 4.4, the proposed plan of the researchers on the ground floor is shown by

adding an access point in the hallway and the utp cable will be fixed it in the wall so that

it will not be a hanging cable. The cctv’ will remain as if it is and it is show in figure 4.4

Figure 4.5 Second Floor proposed network infrastructure

The figure 4.5 shows the plan of the researchers on the 2 nd floor which is to add

one (1) access point and two (2) CCTVs for the protection of the students and teachers of

the CHTM building and other students that are studying other courses.

Figure 4.6 Third Floor proposed network infrastructure


36

The figure 4.6 shows the proposed plan of the third floor which is to put three (3)

access point and two (2) CCTVs for students and teachers to have access to the internet

and have safety measures.

Table 4.1 Symbols and Descriptions


Symbols Name Description
Access An access point is a device that establishes a WLAN, or

Point wireless local area network, typically in a workplace or

big structure.

RJ45 A type of connector called an RJ45 socket is used to

Socket enable communication between two or more devices on a

network.

Continuation of Table 4.1 Symbols and Descriptions

Double A double socket is a pair of sockets that are built

Socket simultaneously, either side by side or sometimes one on

top of the other.


37

One Socket One endpoint of a two-way communication channel

between two network-running programs is a socket.

Network Network cables are used to link and transfer data and

Cable information between computers, routers, switches, and

storage area network routers, switches, and storage area

networks.

Network A network rack is a metal frame chassis used to store,

Rack stack, organize, secure, and safeguard various server and

computer network hardware components.

Table 4.1 shows the symbols and its descriptions used on designing proposed

network infrastructure.

Table 4.2 Proposed Network Equipment and Devices

Security Description

Physical The researchers will proposed and use the current network
security around the CHTM Building. The researchers will put
Network
also a CCTV’s inside the building for the safety of the
Security teachers, students and non-teaching staffs.

Continuation of Table 4.2 Proposed Network Equipment and Devices

The researchers will put a security password for the internet


access for them to be secured in getting being hack and by
Password
using a long encrypted password it will not easily guest by the
other people who are not allowed to connect.

Access Control The researchers will suggest using a different SSIDs with
Guest Network enable. To prevent the CHTM building from
38

accessing any private IP subnet in the network security


architecture.

By turning on the firewall it can protect the internet


Firewall
connection

Network Equipment Requirements

The researchers will list the need equipment’s and tools for the network

infrastructure in the establishment of CHTM bldg. The budget that they will use in this is

₱50,000.00 – ₱100,000.00. The researchers will canvas for the prices of the needing

equipment and tools to know if their target budget will be enough or exceed.

Table 4.3 Proposed Network Equipment and Requirement’s


Network
Equipment and Description
Requirements
Model: US-168-150W, (168) Gigabit RJ45 Ports

(2) SFP Ports, (1) Serial Console Port, Non-Blocking


Switch
Throughput: 18 Gbps ,Switching Capacity: 36 Gbps, Forwarding
UBIQUITI
Rate: 26.78 Mpps Maximum Power Consumption: 150W,

Supports PoE+

Continuation of Table 4.3 Proposed Network Equipment and Requirement’s

IEEE 802.3at/af and 24V Passive PoE, Rack-Mountable or Wall-

Mountable with Rack-Mount, Brackets (Included).

Ultra-Fast WiFi 6 Speeds: Simultaneous 574 Mbps on 2.4 GHz

Access Point TP- and 1201 Mbps on 5 GHz totals 1775 Mbps Wi-Fi speeds.

LINK EAP610 High-Efficiency WiFi 6: More connected devices can enjoy


39

faster speeds.

Centralized Cloud Management: Manage the whole network

locally or from the cloud via web UI or Omada app.

Seamless Roaming: Even video streams and voice calls are

unaffected as users move between locations.

AX1800 Omada Mesh: Enables wireless connectivity between access

points for extended range and flexible deployment.

PoE+ Powered: Supports both Power over Ethernet (802.3at) and

DC power supply for flexible installations.

Secure Guest Network: Along with multiple authentication

options (SMS/Facebook Wi-Fi/ Voucher, etc.) and abundant

wireless security technologies.

Enhanced performance cable for transmission of highspeed data,

UTP Cable digital and analogue voice and video (RGB) signals on LANs.

AD-LINK Supports Gigabit Ethernet (1000 baseT) standard. Operates at

bandwidth of 250MHz. The shield acts as a Faraday cage to

reduce

Continuation of Table 4.3 Proposed Network Equipment and Requirement’s

electrical noise from affecting the signals, and to reduce

electromagnetic radiation that may interfere with other devices.

This cable well exceeds the requirements of TIA/EIA-568-C.2

and ISO/IEC 11801.


40

Glass Front Panel With Key (1 Exhaust Slot), Mounting Type:


Network Rack
Wall Mounted, Removable Side Panel (With 1 Fixed Tray)
Starpoint 6U Data
Dimension : L530 : W400 : H250mm Powder coated finish black
Server Rack
Disassembled

YOOSEE Q8C-C HD 1080P Wireless IP Camera Outdoor CCTV

Camera Connect Mobile CCTV Camera Outdoor IP66 Waterproof


CCTV
Night Vision 360° Panorama 1080P HD Connect Mobile Phone
Yoosee
Voice Wireless WiFi CCTV Camera

Ez-rj45 cat 6 metal (gold metal sheet) shielded connector, rj45


RJ45
close end, 1000-pcs

Network Security Architecture

The researcher will discuss the network security architecture for the proposed

network infrastructure for CHTM Building. The researchers will be using Physical and

Software security measures.

Table 4.4 Network Security Architecture


Security
Description
Measure
Physical The researchers proposed and use the current network security

Network around the CHTM Building. The researchers will put also a CCTV’s

Security inside the building for the safety of the CHTM building and also the
41

(CCTV’s) teachers, students and non-teaching staffs.

The researchers will put a security password for the internet access

for them to be secured in getting being hack and by using a long


Password
encrypted password it will not easily guest by the other people who

are not allowed to connect.

The researchers suggest using a different SSIDs with Guest Network

Access Control enable. To prevent the CHTM building from accessing any private IP

subnet in the network security architecture.

Segregate and isolate the devices of Employee/Staff, Guests,


Virtual Local
Computer Lab, and Network Management so that they will be
Area Network
isolated on their own network while not being able to access other
(VLANs)
networks.

Firewall By turning on the firewall it can protect the internet connection

IP Addressing Schema

The researcher creates a propose network infrastructure of CHTM Building by

putting an access point, router, network racks, switch and etc.

Figure 4.7 CHTM Building Network Diagram/ IP Schema


42

Figure 4.7 shows the researcher proposed this network diagram, the internet can

be protected by using a firewall and the CHTM building has three (3) stories on it the

ground floor have one (1) switch and five (5) access points and the second floor have two

(2) access points and it is connected to switch and the third floor have 3 access point and

it is connected to the switch in the second floor.


43

Figure 4.8 Current Network Diagram

Figure 4.8 shows the current network diagram in the CHTM building

Figure 4.9 Proposed Network Diagram


44

Figure 4.9, This is the proposed network diagram that the researchers proposed.

There are additional access points and CCTV’s to improve the internet connection and to

make sure that the security of the students and faculty of the CHTM building is recorded.

Table 4.5 Device IP Addresses


First Usable Last Usable Broadcast
Device IP Address
Address Address Address

Router 192.168.0.0/168 192.168.0.1 192.168.255.254 192.168.255.255

S1 192.16830.0/19 192.168.30.1 192.168.44.254 192.168.44.255

S2 192.168.45.0/19 192.168.45.1 192.168.63.254 192.168.63.255

S3 192.168.64.0/19 192.168.64.1 192.168.79.254 192.168.79.255

AP1(S1) 192.168.32.0/24 192.168.32.1 192.168.33.254 192.168.33.255

AP2(S1) 192.168.34.0/24 192.168.34.1 192.168.34.254 192.168.34.2555

AP3(S1) 192.168.35.0/24 192.168.35.1 192.168.35.254 192.168.35.255

AP4(S1) 192.168.36.0/24 192.168.36.1 192.168.36.254 192.168.36.255

AP5(S1) 192.168.37.0/24 192.168.37.1 192.168.37.254 192.168.37.255

AP6(S1) 192.168.38.0/24 192.168.38.1 192.168.39.254 192.168.39.255

AP7(S1) 192.168.39.0/24 192.168.39.1 192.168.40.254 192.168.40.255

AP1(S2) 192.168.48.0/22 192.168.48.1 192.168.51.254 192.168.51.255

AP2(S2) 192.168.52.0/22 192.168.52.1 192.168.55.254 192.168.55.255

AP3(S2) 192.168.56.0/22 192.168.56.1 192.168.60.254 192.168.60.255

AP1(S3) 192.168.64.0/22 192.168.64.1 192.168.67.254 192.168.67.255

AP2(S3) 192.168.68.0/22 192.168.68.1 192.168.71.254 192.168.71.255

AP3(S3) 192.168.72.0/22 192.168.72.1 192.168.75.254 192.168.75.255


45

Table 4.5 shows the ip addresses of each devices used on the proposed network

infrastructure of the CHTM building.

Network Cost

Table 4.6 Proposed Network Infrastructure Cost


Network Equipment Per Unit Cost Quantit Cost

Switch UBIQUITI ₱ 21,100.00 2pcs ₱ 42,200.00

Access Point ₱ 6,050.00 5pcs ₱ 30,250.00

UTP Cable AD-LINK ₱ 2,347.00 2pcs ₱ 4,694.00

Network Rack Starpoint 6U Data ₱ 3,700.00 2pcs ₱ 7,400.00

Server Rack

CCTV Yoosee ₱ 2,550.00 4pcs ₱ 5,100.00

RJ45 ₱ 2,100.00 1Box ₱ 2,100.00

Total Cost: ₱ 91,744.00

Table 4.6 shows the total financial cost upon purchasing the needed tools,

equipment and devices in order to implement the utilization of hybrid networks through

efficient network engineering on the CHTM building. With the bought materials, it

ensures that the internet and security matters on the building will be enhanced.

Evaluation of the Proposed Network Design of CHTM Building

A questionnaire checklist was prepared and conducted with the cooperation of the

CCIT faculty who are specialized in networking. The items in the questionnaire were

divided into two parts. Part I included the personal data of the respondents and Part II
46

contained the rating scale, which includes the category, scale value, and rating. For every

item in the questionnaire, there were five choices with their corresponding rating value:

(5) Highly Acceptable, (4) Very Acceptable, (3) Acceptable, (2) Fairly Acceptable, and

(1) Not Acceptable.

The statistical tool used in determining the acceptability of the developed system,

were by means of getting the weighted scores and weighted mean of the responses

towards the different statements about the system. In finding the weighted score, the

(wf)
following formula was used: ∑x = n where w = weight, f = frequency and n =

number of respondents. There were five (5) respondents who took part in the survey,

which is among faculty. The respondents were asked to put a check mark which

corresponds to their responses on the acceptability of the network design infrastructure

for CHTM Building.

Network Scalability

Table 4.6 shows the perception of evaluators on the system with respect to its

Manageability.

Table 4.7 Network Scalability

Network Scalability WM DESC.

1. How well does the network infrastructure handle increasing traffic


4.4 HA
demands?

2. Is there a plan in place for adding new network components as


4.2 HA
needed?
47

3. Is the network architecture modular, allowing for easy upgrades and


4.8 HA
expansion?

4. Can the network infrastructure accommodate additional users and


4.1 HA
devices?

Continuation of Table 4.7 Network Scalability

5. How well does the network infrastructure support distributed


4.4 HA
applications and services?

Overall Weighted Mean 4.38 HA

Table 4.7 shows that the respondents agreed on the information of the network

scalability of the network infrastructure as reflected with the weighted mean of 4.38

(Highly Acceptable).

Network Security

Table 4.8 Network Security


Network Security WM DESC.

1. Are there firewalls and intrusion detection systems in place? 4.4 HA

2. How well is the network infrastructure protected against cyber-


4.2 HA
attacks?

3. How are sensitive data and communications protected? 4.6 HA

4. How are user access and privileges managed and controlled? 4.4 HA

5. How well does the network infrastructure support compliance with


4.6 HA
security regulations and standards?

Overall Weighted Mean 4.44 HA


48

Table 4.8 shows that the respondents agreed on the information of the network

security of the network infrastructure as reflected with the weighted mean of 4.44 (Highly

Acceptable).

Network Performance

Table 4.8 shows the perception of evaluators on the system with respect to its

Performance.

Table 4.9 Network Performance

Network Performance WM DESC.

1. How well does the network infrastructure support required


4.6 HA
bandwidth and data transfer rates?

2. How well does the network infrastructure support required


4.8 HA
bandwidth and data transfer rates?

3. Is there a plan in place for measuring and optimizing network


4.6 HA
performance?

4. Is there a network monitoring and management system in place to


4.6 HA
ensure performance?

5. How well does the network infrastructure support remote and


4.6 HA
mobile users?

Overall Weighted Mean 4.64 HA

Table 4.9 shows that the respondents agreed on the information of the network

performance of the network infrastructure as reflected with the weighted mean of 4.64

(Highly Acceptable).
49

Network Usability

Table 4.9 shows the perception of evaluators on the system with respect to its

Security.

Table 4.10 Network Security


Network Usability WM DESC.

1. How user-friendly is the network infrastructure for non-technical


4.4 HA
users?
2. Is there a simple and straightforward process for adding new users
4.4 HA
and devices to the network?
3. Is the network infrastructure flexible and adaptable to changing
4.6 HA
business needs?
4. How well does the network infrastructure integrate with other
4.8 HA
systems and technologies?
5. Is there a centralized network management system in place? 4.2 HA
Overall Weighted Mean 4.48 HA

Table 4.10 shows that the respondents agreed on the information of the network

usability of a network infrastructure as reflected with the weighted mean of 4.48 (Highly

Acceptable).

Network Manageability

Table 4.10 shows the perception of evaluators on the system with respect to its

Scalability.

Table 4.11 Network Manageability


50

Network Manageability WM DESC.

1. How well can the network infrastructure be managed and


4.8 HA
administered?

2. Is there a centralized network management system in place? 4.8 HA

Continuation of Table 4.10 Network Manageability


3. How well does the network infrastructure integrate with other
4.4 HA
systems and technologies?

4. How well can network performance be monitored and optimized? 4.2 HA

5. How user-friendly is the network management interface for non-


4.6 HA
technical users?

Overall Weighted Mean 4.56 HA

Table 4.11 shows that the respondents agreed on the information of the network

manageability of the network infrastructure as reflected with the weighted mean of 4.56

(Highly Acceptable).

Based on the test results of each criteria provided by the respondents, garnering

the weighted mean average of 4.56 (Highly Acceptable), the network infrastructure

acceptance is proven, and therefore, indicate the readiness of the implementation. The

summary of the test results is shown in Table 4.11.

Table 4.12 Summary of the Network Acceptability Test


51

Criteria WM DESC

Scalability 4.38 HA

Security 4.44 HA

Performance 4.64 HA

Usability 4.48 HA

Manageability 4.56 HA

Overall Weighted Mean 4.5 HA


52

Chapter V

Finding, Conclusion & Recommendation

In this chapter contains the research findings, recommendations and conclusions

of the whole study. The findings of the study without so much detailed information is

written in the summary. Generalizations and other interferences would be seen in the

conclusion while the recommendations of the researchers to the beneficiaries of this

study can also be seen in this chapter. Generally, this chapter aims to cover up the end

result of the study

Findings

The study’s findings are the following:

1. The current network infrastructure of the CHTM building consists of only few

equipment’s which are: (a) 5 Access Points - 2 inside the dean's office and 2 inside the

faculty room at the ground floor, and another 1 at the second floor. (b) 1 network rack at

the ground floor (c) 4 CCTVs located at the right, left and center outside the building by

the ground floor and the other one is at the second floor. Apparently, there is no access

point or CCTV at the third floor of the building.

2. When designing the network infrastructure, the researchers were given a

proposed budget for the infrastructure that ranges from ₱50,000 to ₱100,000.

Correspondingly, the researchers' final network architecture design runs ₱91, 744.It has

been identified that

3. The current network infrastructure in the CHTM building is poorly thought out

in its architecture. Only faculty and the dean have access to the internet. Because access
53

points are more sparsely distributed on the ground floor, it is challenging for students to

connect to the internet.

4. The IT experts have given the proposed network infrastructure design for the

University of Northern Philippines' CHTM building a high approval rating; it is prepared

for deployment and satisfies the requirements for scalability, availability, security,

manageability and performance.

Recommendation

The researchers recommend the following:

1. To improve the current network infrastructure in CHTM building. The

researchers want to propose the design made of network infrastructure to have a better

connection in the CHTM building.

2. The researchers will apply the efficient network engineering like adding a

network devices that required, ip schema, network security architecture and overall

network security processes, and the network cost that may be used in buying the added

devices.

3. The researchers would like to recommend also that from time to time

monitoring the network if there will be no problems or troubleshoot if any case the

network will weaken.

4. Create a modernization plan for the infrastructure. The planned infrastructure

should be functional and aligned for the foreseeable future, and the architecture should

suit users.

Conclusion
54

1. The current network infrastructure of the CHTM building needs improvement.

Considering the range of the internet, the placements of internet access need to be

rearranged and additional devices are required.

2. To apply efficient network engineering, the current network infrastructure of

the building in terms of a) Network Device Requirements, b) IP Addressing Schema, c)

Network Security Architecture and Overall Network Security Processes, d) Network Cost

is to be improved to utilize the most out of the current network and connections they have

at hand.

3. The design of the network infrastructure in the CHTM building has produced a

low quality of internet connection and accessed much often. The researchers’ proposal

ensures improvement to the connection and security.

4. The evaluation of the network design infrastructure in terms of

a. The overall mean of the Scalability is 4.38 and is described as very

acceptable by the scale.

b. The overall mean of the Availability is 4.44 and is described as very

acceptable by the scale.

c. The overall mean of the Security is 4.64 and is described as very

acceptable by the scale.

d. The overall mean of the Manageability is 4.48 and is described as very

acceptable by the scale.

e. The overall mean of the Performance is 4.56 and is described as very

acceptable by the scale.


55

References
56

References

Escholarship repository (no date) eScholarship, University of California. Available at:

https://escholarship.org/repository

ArXiv:1810.03670v1 [cs.NI] 8 Oct 2018 (no date). Available at:

https://arxiv.org/pdf/1810.03670.pdf

(no date) Bschool.nus.edu.sg. Available at: https://bschool.nus.edu.sg/

HTTPS - /d1wqtxts1xzle7.cloudfront - net/55649417/imagem - PDF-1517091550

&RESPO 2021-08-20 23 - 12 - 55 (no date) Scribd. Scribd. Available at:

https://www.scribd.com/document/542430203/https-2Fd1wqtxts1xzle7-cloudfront-net-

2F55649417-2Fimagem-pdf-1517091550-respo-2021-08-20-23-12-55

Xiao, Y. et al. (2009) Wireless Network Security - EURASIP Journal on Wireless

Communications and networking, SpringerOpen. Springer International Publishing.

Available at:

https://jwcn-eurasipjournals.springeropen.com/articles/10.1155/2009/532434

A survey on internet performance measurement platforms and related ... (no date).

Available at: https://vaibhavbajpai.com/documents/papers/proceedings/lsmp-comst-

2015.pdf

Valposcholar | Valparaiso University Research (no date). Available at:

https://scholar.valpo.edu/cgi/viewcontent.cgi?article=1002&context=itcrpr
57

Cultivation of black soldier fly larvae on almond byproduct as a ... (no date). Available

at: https://www.proquest.com/openview/9460fae7294e9db5d8ea3cf9ee05c886/1?pq-

origsite=gscholar&cbl=2026366&diss=y

Network security - theseus (no date). Available at:

https://www.theseus.fi/bitstream/handle/10024/47351/Sulaimon_Adeniji.pdf?

sequence=1

CITESEERX (no date) CiteSeerX. Available at: https://citeseer.ist.psu.edu/

Eric - Education Resources Information Center. (n.d.). Retrieved February 1, 2023, from

https://files.eric.ed.gov/fulltext/ED604388.pdf

John Dewey in the 21st Century - ed. (n.d.). Retrieved January 1, 2023, from

https://files.eric.ed.gov/fulltext/EJ1158258.pdf

Flickenger, R. (1970, January 1). Wireless networking in the Developing World : A

Practical Guide to planning and building low-cost telecommunications infrastructure;

second edition. Library Home. Retrieved February 1, 2023, from https://idl-bnc-

idrc.dspacedirect.org/handle/10625/44431

Infrastructure network. Infrastructure Network - an overview | ScienceDirect Topics.

(n.d.). Retrieved February 1, 2023, from

https://www.sciencedirect.com/topics/computer-science/infrastructure-network

Smart Campus Networks. CommScope. (n.d.). Retrieved February 1, 2023, from

https://www.commscope.com/solutions/enterprise-networks/smart-campus/
58

Campus planning principles | infrastructure planning and facilities. (n.d.). Retrieved

February 1, 2023, from https://ipf.msu.edu/campus-plan/campus-master-plan/campus-

planning-principles

Cisco. (2022, February 25). What is network infrastructure? Cisco. Retrieved February 1,

2023, from https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-

network-infrastructure.html

Cisco. (2022, February 25). What is network infrastructure? Cisco. Retrieved February 1,

2023, from https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-

network-infrastructure.html

Kybernetika Praha (January 2006) Weighted means and weighting functions, from

https://www.researchgate.net/publication/236158980_Weighted_means_and_weighting_

functions
59

Appendices A

Analysis of a Network Design Infrastructure

Name: __________________________ Date: ___________

Below are statements on the acceptability of the Network Design Infrastructure as to its

constructive design. Please rate the level by putting a check mark () on the column that

corresponds to your assessment. Use the scale below.


Numeric Value Equivalent Rating

5 Highly Acceptable

4 Very Acceptable

3 Acceptable

2 Fairly Acceptable

1 Not Acceptable

Statement Rating

A. Network Scalability 1 2 3 4 5

1. How well does the network infrastructure handle increasing traffic

demands?

2. Is there a plan in place for adding new network components as

needed?

3. Is the network architecture modular, allowing for easy upgrades and

expansion?

4. Can the network infrastructure accommodate additional users and

devices?
60

5. How well does the network infrastructure support distributed

applications and services?

Sub-Total

D. Network Security 1 2 3 4 5

1. Are there firewalls and intrusion detection systems in place?

2. How well is the network infrastructure protected against cyber-

attacks?

3. How are sensitive data and communications protected?

4. How are user access and privileges managed and controlled?

5. How well does the network infrastructure support compliance with

security regulations and standards?

Sub-Total

E. Network Performance 1 2 3 4 5

1. How well does the network infrastructure support required

bandwidth and data transfer rates?

2. How well does the network infrastructure handle network latency

and delay?

3. Is there a plan in place for measuring and optimizing network

performance?

4. Is there a network monitoring and management system in place to

ensure performance?

5. How well does the network infrastructure support remote and

mobile users?

Sub-Total
61

F. Network Usability 1 2 3 4 5

1. How user-friendly is the network infrastructure for non-technical

users?

2. Is there a simple and straightforward process for adding new users

and devices to the network?

3. Is the network infrastructure flexible and adaptable to changing

business needs?

4. How well does the network infrastructure integrate with other

systems and technologies?

5. Is there a centralized network management system in place?

Sub-Total

H. Network Manageability 1 2 3 4 5

1. How well can the network infrastructure be managed and

administered?

2. Is there a centralized network management system in place?

3. How well does the network infrastructure integrate with other

systems and technologies?

4. How well can network performance be monitored and optimized?

5. How user-friendly is the network management interface for non-

technical users?

Sub-Total
62

Comments/Suggestions:

Signature over Printed Name and Position of Evaluator


63

Appendices B

Documentations:

Inside and Outside the CHTM Building

Appendices

C
64

Curriculum Vitae

FULL NAME: Stephanie Nicole Buenaventura

Address: Poblacion, San Vicente, Ilocos Sur

Contact #: 09563909254

E-mail Address: snbuenaventura.ccit@unp.edu.ph

PERSONAL INFORMATION:

Nickname : Steph

Birthday : January 12, 2001

Age : 22

Religion : Roman Catholic

Birth Place : Quezon City, Manila

Status : Single

Citizenship : Filipino

Father : Jerry P. Buenaventura (+)

Mother : Angeline R. Buenaventura

EDUCATIONAL BACKGROUND:

Elementary : Sto. Cristo Elementary School

Year Graduated : 2013-2014

Secondary : San Vicente Integrated School

Year Graduated : 2019-2020

Tertiary : University of Northern Philippines

Degree : BS Information Technology


65

FULL Name: Kent Ivan R. Castaneda

Address: Labut, Magsingal, Ilocos Sur

Contact #: 09271342774

E-mail Address: kir.castaneda.ccit@unp.edu.ph

PERSONAL INFORMATION:

Nickname : Kent

Birthday : July 27, 1999

Age : 23

Religion : Catholic

Birth Place : Magsingal, Ilocos Sur

Status : Single

Citizenship : Filipino

Father : Narciso Norberto A. Castaneda

Mother : Natividad R. Castaneda

EDUCATIONAL BACKGROUND:

Elementary : Magsingal South Central School

Year Graduated : 2011- 2012

Secondary : Saint William’s Institute

Year Graduated : 2017-2018

Tertiary : University of Northern Philippines

Degree : Bachelor of Science in Information Technology


66

FULL NAME: MIGO HERNANDEZ FLORENTIN

Address: 8-D Gomez St. Vigan City, Ilocos Sur

Contact #: 09398621742

E-mail Address: m.florentin0928@gmail.com

PERSONAL INFORMATION:

Nickname : Migo

Birthday : September 28, 2001

Age : 21

Religion : LDS

Birth Place : Vigan City

Status : Single

Citizenship : Filipino

Father : Romeo C. Florentin

Mother : Bernadette H. Florentin

EDUCATIONAL BACKGROUND:

Elementary : Saint Paul College of Ilocos Sur

Year Graduated : 2013-2014

Secondary : University of Northern Philippines

Year Graduated : 2019-2020

Tertiary : University of Northern Philippines

Degree : Bachelor of Science in Information Technology


67

FULL Name: Jon BJ H. Haduca

Address: San Isidro Bantay, Ilocos Sur

Contact #: 09109892855

E-mail Address: jbhhaduca.ccit@unp.edu.ph

PERSONAL INFORMATION:

Nickname : Jon

Birthday : December 1, 2001

Age : 21

Religion : Catholic

Birth Place : Sta. Lucia, Ilocos Sur

Status : Single

Citizenship : Filipino

Father : Jose Amuary A. Haduca

Mother : Bernadette H. Haduca

EDUCATIONAL BACKGROUND:

Elementary : San Julian Elementary School

Year Graduated : 2013-2014

Secondary : Ilocos Sur National High School

Year Graduated : 2019-2020

Tertiary : University of Northern Philippines

Degree : Bachelor of Science in Information Technology

FULL Name: Ervin O. Lamorena


68

Address: Bucao East, Tagudin, Ilocos Sur

Contact #: 09560992749

E-mail Address: eolamorena.ccit@unp.edu.ph

PERSONAL INFORMATION:

Nickname : Ben

Birthday : June 27, 2001

Age : 21

Religion : Catholic

Birth Place : Manila, Quezon City

Status : Single

Citizenship : Filipino

Father : Erbito L. Lamorena

Mother : Elisa O. Lamorena (+)

EDUCATIONAL BACKGROUND:

Elementary : Bio Elementary School

Year Graduated : 2012- 2013

Secondary : ASEAN Institute for Research and Technology of the

Philippines Inc. (AIRTOP)

Year Graduated : 2019-2020

Tertiary : University of Northern Philippines

Degree : Bachelor of Science in Information Technology

FULL Name: Florence Kate R. Tolentino

Address: Bulala Norte, Vigan City, Ilocos Sur


69

Contact #: 09184858192

E-mail Address: fktolentino.ccit@unp.edu.ph

PERSONAL INFORMATION:

Nickname : Kate

Birthday : June 30, 2001

Age : 21

Religion : Catholic

Birth Place : Vigan City, Ilocos Sur

Status : Single

Citizenship : Filipino

Father : Germel J. Tolentino

Mother : Evangeline R. Tolentino

EDUCATIONAL BACKGROUND:

Elementary : University of Northern Philippines

Year Graduated : 2013-2014

Secondary : Ilocos Sur National High School

Year Graduated : 2019-2020

Tertiary : University of Northern Philippines

Degree : Bachelor of Science in Information Technology

You might also like