Softbind Pips
Softbind Pips
Softbind Pips
A Case Study
In Partial Fulfilment
Networking 2
Florentin, Migo H.
Haduca, Jon BJ H.
Lamorena, Ervin O.
2023
ii
Abstract
in CHTM building. This study was entitled “Utilization of Hybrid Networks Through
Buenaventura, Stephanie Nicole R., Castaneda, Kent Ivan R., Florentin, Migo H.,
Haduca, Jon BJ H., Lamorena, Ervin O., Tolentino, Florence Kate R..
Specifically, it sought to meet the following objectives: (1) To identify the current
network infrastructure of the CHTM building; (2) To identify the requirements needed in
order to apply the efficient network engineering. In terms of; Network Device
security processes. Network Cost; (3) to design and improve the network infrastructure in
CHTM building. (4)To evaluate the proposed network design infrastructure in terms of
connection amongst users .b. to further strengthen the security of the network c. increase
access points, switches, etc and rearrange their positions to have a more
infrastructure, the researchers have discovered that the building requires adjustments and
further enhancements. Network security is a problem and the internet speed is too slow to
satisfy user’s demand because the Access Point is situated on the second floor of the
structure, other floor levels' connections are substantially slower. There are fourteen (14)
building to improve the current network that they have at the moment. The proposed plan
will also include the installation of Network Securities and its architecture.
In order to improve the internet connectivity and security of the CHTM building,
the researchers will install more access points, switches, CCTVs, and other devices.
To enhance the network and security of the CHTM building, the researchers
Dedication
This dedication will serve as our little token to people who have given us a hand along
the way in finishing this case study. To my family and friends that made me feel lighter
Stephanie
v
Dedication
With utmost humility and gratitude, I dedicate this to those who have served as a
source of inspiration for us and have helped and guided us every step of the way. Our
families, friends, and loved ones who have always been there for us, supporting and
believing in us, deserve our sincerest thanks. Your unwavering encouragement has
been a driving force in our success, and we are eternally grateful for having you in our
lives.
Ivan
vi
Dedication
To my wonderful parents, for their unending love & support, I dedicate this study to
them. Along with our subject teacher, Mr Paul Nikko Quilana, who is our constant &
consistent guidance in this endeavor and to those who made all of these possible, our
Almighty God, for all the strength and wisdom, we are eternally grateful.
Migo
vii
Dedication
This study is dedicated to my mother and also my siblings that is always there to
support and encourage me to strive higher to achieve my dreams. This study helps me to
Jon BJ
viii
Dedication
This study will be dedicated to my family and also to my friends who is always there
to help me in this study. To sir our networking 2 who is always there to guide us in this
manuscript that we made. To the school who give and enhance my skills and knowledge
Ervin
ix
Dedication
I humbly dedicate this to those who have served as inspiration to us-those who
have helped and guided us all along the way. For family, friends and special loved ones
Kate
x
Table of Contents
Preliminaries Page
Number
Title…………………………………………………………………... i
Abstract…………………………….………………………………… ii
Dedication…………………………………………….………….…... ix
Table of Contents……………………………………………………. x
List of Figures……………………………………………………….. xi
List of Tables………………………………………………………… xiii
Chapter I. Introduction
Background of the Study…………………………………………...... 1
Conceptual Framework……………………………………………... 8
Statement of the Objective………………………………………….. 9
Significance of the Study………………………………………….... 9
Scope and Delimitation……………………………………………... 10
ass of Terms…………………………………………………. 11
Assumption………………………………………………………….. 12
Hypothesis…………………………………………………………... 13
Chapter II. Reviews of Related Literature
Network Design Infrastructure……………………………………… 14
Impacts in Implementing Network Design Infrastructure on
Schools, Campuses, and Universities……………………………… 17
Network Security Architecture and Processes Involved for 20
Schools, Campuses, and Universities………………………………
Evaluating A Network Design Infrastructure……………………… 23
Chapter III. Methodology
Research Design……………………………………………………. 25
Instrument and Data Collection……………………………………. 28
Requirements for Network Design Structure………………………. 29
Chapter IV. Results & Discussions
Current Network Infrastructure of Establishment…………………... 32
Proposed Network Infrastructure of Establishment……………….... 33
Network Equipment Requirements…………………………………. 37
Network Security Architecture……………………………………… 39
IP Addressing Schema……………………………………………… 40
Network Cost………………………………………………………... 44
Evaluation of the Network Design Infrastructure…………………... 44
Chapter V. Findings, Recommendation, & Conclusion
Findings……………………………………………………………… 50
Recommendation…………………………………………………….. 51
xi
Conclusion…………………………………………………………… 51
References…………………………………………………………… 53
Appendices…………………………………………………………... 57
Curriculum Vitae…………………………………………………….. 63
xii
List of Figures
Figure Name Page
Number Number
1.1 Research Location……………………...……………………… 6
1.2 Legend of UNP………………………………………………… 7
1.3 Research Building ………………………………….………….. 7
1.4 Research Paradigm…………………………………………….. 8
3.1 PPDIOO Network Lifecycle Influences Design………………... 26
4.1 Ground Floor existing network infrastructure …………………. 32
4.2 Second Floor existing network infrastructure………………….. 33
4.3 Third Floor existing network infrastructure……………………. 33
4.4 Ground Floor proposed network infrastructure………………… 34
4.5 Second Floor proposed network infrastructure………………… 34
4.6 Third Floor proposed network infrastructure…………………... 35
4.7 CHTM Building Network Diagram/ IP Schema……………….. 41
4.8 Current Network Diagram……………………………………... 42
4.9 Proposed Network Diagram……………………………………. 42
xiii
List of Tables
Table Name Table
Number Page
3.1 Interpretation of the Weighted 31
Mean………………………...........
4.1 Symbols and Description………………….……………………… 35
4.2 Proposed Network Equipment and 36
Devices……………………….
4.3 Proposed Network Equipment and 37
Requirements…………………
4.4 Network Security Architecture…………………………………… 40
4.5 Device and IP Addresses……………….. 43
…………………………
4.6 Proposed Network Infrastructure 44
Cost…………………………….
4.7 Network Scalability……………………………………….... 45
…….
4.8 Network Security…………………………………………………. 46
4.9 Network Performance…………………………………………...... 47
4.10 Network Usability………………………………………….……... 48
4.11 Network Manageability…………………………………………... 48
4.12 Summary of the Network Acceptability Test…………………….. 49
i
Chapter I
Introduction
In this vast world, technology is one of the most powerful tools that people are
using in our generation today. Daily life activities have been made easier through the help
of technology. But how can this affect to those people who are not well-known about
technologies? While other people or we should say teenager known about technologies
Technology is the most popular tools that made in this generation they say that
technologies can be an advantage for us because it can easy our works like doing a paper
and research work and other things. Trough technologies the time that we have, when we
do not have a technology can easy as it is now. There are some people who do not know
how to use technologies because they do not know how to use it but most of the teenagers
are using gadgets that can affect their own works like helping at home, doing some
them with two other modes of coordination and organization: markets and hierarchies.
One respect in which the three modes differ is the basis of the relationships between the
actors in them. Thus, markets are based on property rights and contracts, hierarchies are
based on something like an employment relationship, and networks are based on the
exchange of resources
2
consists of computer programs that interface with network users and permit the sharing of
information, such as files, graphics, and video, and resources, such as printers and disks.
organize and disseminate the information that is essential to profitability. The rise of
intranets and internets is the important aspect of computer networking. Intranets and
internets are private business networks that are based on internet technology.
organizations and users many benefits such as portability and flexibility, increased
productivity, and lower installation costs. Wireless technologies cover a broad range of
differing capabilities oriented toward different uses and needs. Wireless local area
network (WLAN) devices, for instance, allow users to move their laptops from place to
place within their offices without the need for wires and without losing network
connectivity. Less wiring means greater flexibility, increased efficiency, and reduced
wiring costs.
As explained by Yang Xiao (2009), wireless networking has been enjoying fast
sizes, such as wireless personal area networks (WPANS), local area networks (WLANs),
metropolitan area networks (WMANS), and wide area networks (WWANs). These
networks, and mesh networks, and can also be domain specific networks, such as
characteristics than wired ones. Mobile hosts have different needs and limitations than
desktop computers. TCP has served well the wired Internet for almost 20 years, but is not
ready for wired-cum- wireless environments. This article presents the challenges that
must be met in order to provide reliable transport services to all hosts regardless of the
type of network connectivity used. It surveys recently proposed solutions and evaluates
networks differs from one university to another. This is as a result of many factors which
security, and cost. Installing networks in a university relies on the university’s budget,
and connectivity) were then related to ridership (annual boarding’s per capita), and
positive relations were observed, which suggests that network design plays an important
According to Sulaimon Adeniji Adebayo (2012). The need for increase and strong
computer and network security also becomes increasingly necessary and important. The
increase in the computer network system has exposed many networks to various kinds of
internet threats and with this exposure, one can see that the need for increased network
security is vital and important in every organization. The security may include
4
equipment
designed to fit the needs of one organization network and not anyone else’s. For instance,
a small sized law company would allow access to case information for authorized users
on the outside of the network, and at the same time ensure that full access to the internet
is always available to staff on the inside of the network, in other cases to access a case
Based on the study of Ajala Funmilola (2015). Network security has become
more important to personal computer users, organizations, and the military. With the
advent of the internet, security became a major concern and the history of security allows
itself allowed for many security threats to occur. The architecture of the internet, when
modified can reduce the possible attacks that can be sent across the network.
The researchers will conduct this research to improve the network design in the
CHTM building. The researchers inspect the CHTM building and finds out that they are
having an issue with their wireless network connection and they also have only one
security camera. So, the researchers want to conduct this kind of study to put an end to
their current situation and to improve their wireless network cconnection. As the
researchers visited the school, they encountered a problem such as the whole school only
uses one active wireless internet connection and with that the CHTM students and also
the teachers are forcibly uses their own data connection when the internet is occasionally
5
going down while they are teaching. In this case study, the researchers will evaluate
buildings to analyse wire route discontent and to discover any structural flaws in the
connection on CHTM Building to lessen the network problems they are facing. As a
result, the researches indicated that the proposed network solution will solve the school's
problem.
department of the Old Vigan High School. Founded in 1906 and dedicated a year later, it
started to play its vital role of training the youth in this part of the land for independent
and democratic ways of life and to impress on the people, who were then still under the
charm of Spanish aristocracy, the idea that the labor of the brawn is no less honorable
than the labor of the brain – that the man who runs the machine is no less a child of God
The rapid expansion of the courses offered in the school necessitated the
acquisition of a new school site and the construction of a bigger building for the growing
student population. Besides the trade courses for boys, trade courses for girls were added.
Short unit courses were also given for those who needed only skills training. In 1955, the
school transferred to its new and present site, a landscaped eight-hectare campus in
Tamag, Vigan.
The name of the school was changed for the fourth time when, in 1960, under the General
Appropriation Act, R.A. No. 2700, it became Ilocos Sur School of Arts and Trades.
6
to move on through the years bringing into fruitful reality the dream of Ilocos Sur’s
greatest leaders today Congressman Floro S. Crisologo and Governor Carmeling Pichay
Crisologo to establish an institution of higher learning for the present and the future
University in a Heritage City by 2030” and a mission “To produce globally skilled and
The University of the Philippines and CHTM building are located at Tamag,
As shown on Figure 1.2, the CHTM building is located behind UNP Main library.
8
The researchers found out that the current network infrastructure of the 3-Story
security and the internet speed is insufficient to meet the demand of its users. The Access
Point is installed at the 2nd floor of the building; hence, making the connection speed of
other floor levels noticeably slower. The CHTM building have fourteen (14) rooms. The
researchers would like to conduct their study at CHTM building to widen their
CONCEPTUAL FRAMEWORK
The Conceptual Framework will serve as a guide for the researchers as they
resolve the case study. The researchers must ascertain the study's pathway for it to be
Prepare
Optimize
Plan
Plaz
a, in
fron
t of
Operate Design
the
Coll
Implemen ege
t
of
Engi
neer
ing
Buil
whi
ch is
9
sho
wn
The researcher will prepare all the needs in making a new network design in
on
CHTM Building, the researchers will focus by planning onFiguhow to make a design and
re
through the new network design, the researchers will implement the design that made and
1.2.
will operate and optimize the newly designed network infrastructure of CHTM Building.
(2) To identify the requirements needed in order to apply the efficient network
b) IP addressing schema;
d) Network Cost.
a. Scalability;
d. Security;
c. Performance;
d. Usability, and
e. Manageability
encourage students in conducting research that may help them to improve and also
Students. This research will provide students free internet access to help them on their
studies
Faculty. This study will help improve the educators’ teaching abilities and methods; they
are able to access more learning materials online for the students.
Researchers. This study can be used for the researchers as an application of knowledge
Future Researchers. This study can serve as a basis and reference for the future
The scope of study focused on the design and implementation of efficient hybrid
network inside the CHTM building. The researchers determined the faults of the current
This study has established five (5) statement of the object to utilize the utilization
identify the requirements needed in order to apply the efficient network engineering, 3)
To design and improve the network infrastructure in CHTM building, 4) To evaluate the
11
proposed network design infrastructure and 5) To identify the goals and technical
The study used the descriptive developmental research design that would guide
CHTM building. The researchers will be using the PPDIOO method, with this design the
researchers ought to use, the network design in the infrastructure in the CHTM building
This study is delimited to the researchers and also the students, teachers and staff
on CHTM building if the network will be lost or have a weak internet connection on the
infrastructure by the time being if the said maintenance is not meet then the network and
The following terms are defined for clarity and better understanding of this study.
location.
Efficient. Refers to the way of the network engineering of hybrid networks to the CHTM
building.
Internet. Refers to the concerning issue that is experienced by the students and faculty
members in the CHTM building. The problem is what the researchers are trying to
IP Schema. Refers to the outline or model of the theory for the proposed network
Network. Refers to the computers, servers, mainframes, or any gadgets that could convey
an exchange of data amongst the student or faculty staff in the CHTM building.
Network Design. Refers to the plan for the implementation of utilization of hybrid
Network Security. Refers to the methods or procedure that is to protect the network of
Wireless Network. Refers to networks that do not use wires of any type to connect them.
It is widely used to transfer data by the students or faculty staff in the CHTM building.
Wired Network. Refers to data transmission using wires or cables. This includes cable
television, internet access, telephone networks that used by the students or faculty staff in
Assumption
In the conduct of the study, the student-researchers were guided by the following
1. The researchers will identify the current network infrastructure to assess what
2. The researchers will determine the overall cost needed to implement the proposed
b) IP addressing schema;
d) Network Cost.
13
3. The researcher will design and implement the network and security wires.
a. Scalability,
b. Security,
c. Performance,
d. Usability, and
e. Manageability
Hypothesis
This study tests the hypothesis that by evaluating the current network
infrastructure of the building, and by acquiring the requirements needed in order to apply
schema, Network security architecture and overall network security processes and
Network Cost. We can create a design that improves the current network infrastructure of
Chapter II
The researchers will conduct a study about the Utilization of Hybrid Networks
through Efficient Network Engineering on the CHTM building. Improving the network
infrastructure and also managing the network. This study will test the network design that
Network infrastructure, its impact in the learning process regarding both the
students who participated in the design of the infrastructure and the students who
An approach for shortening the gap between theory and practice can be achieved
through the application, once they are based on real problems and they provide students
with the opportunity to propose a resolution strategy, which contributes to the full
understanding of the problem and its solution. (C. and M., 2016)
network. This includes hardware (wires, routers, and software) which manages how the
computer network behaves. The infrastructure keeps the network running. It can refer to
communication between wireless clients and wired network resources. The transition of
data from the wireless to wired medium occurs via an AP. An AP and its associated
15
wireless clients define the coverage area. Together all the devices form a basic service
and research by allowing faculty, students, and staff to have participatory access to
information and technological resources on the campus and in the community, region,
nation, and world. The network infrastructure eliminates physical isolation, and allows
students at small colleges to have the same kind of information access that any student
anywhere has. Without this access, institutions of higher education could become road
kill along the information highway. An institution that does not participate in the
information age will simply not be viable in the 21st century. (R. Kunneke 2021)
infrastructure, and planning and building a campus network really means developing an
entirely new information environment that will have a profound impact on almost every
aspect of campus life. In building networks, campuses are engaged in a change process
that is strategically essential to their very nature and existence. (C. Ménard 2018)
campus where "knowledge workers" live and work, including offices, classrooms,
laboratories, studios, student residences, student activity areas, and so forth. It includes a
physical infrastructure that consists of high-grade copper and fiber cable; junction and
termination boxes; communications devices such as fiber hubs, bridges, routers, terminal
servers; and wiring closets to house equipment and termination panels. The ideal campus
and resources, such as faculty homes, metropolitan and regional networks, and the
16
Internet. The ideal campus network has physical components that meet defined
institutional standards, provide for modularity and expandability, and are well
college environment. While a fundamental part of the infrastructure, networks are not
static; they must change and grow continually, often at a much different pace than other
parts of the infrastructure. A campus network, while a part of the infrastructure, also
furniture, electricity, and water. This requires a regular, consistent, predictable source of
funding, not just a one-time budget infusion to lay cable. Colleges that aspire to have a
high-quality technology environment need to set standards and manage networks from a
options that are genuinely supportable with the financial and human capital available. (T.
Moberg 2018)
entertainment on the campus. The network will provide a powerful, dynamic, new
channel of access to the world of information. It will also enhance and fundamentally
alter the communication mechanisms on campus. And whether we want it or not, the
network will provide a wide range of new entertainment opportunities. This new
environment will encompass or touch all the information technology areas, which will
of an enterprise network. It provides the communication path and services between users,
processes, applications, services and external networks/the internet. (J. Chapman 2017)
campuses and universities, designing a hybrid network infrastructure for the stakeholders
of CHTM building would suffice the existing network problems and issues.
Designing an integrated network design with standard network system can enable
infrastructure with minimal cost. Selecting the cheapest devices doesn’t always mean a
embarking on building campus network. Therefore, need for high network availability is
important in an educational system for timely access. (I. A. Alimi, et. al. 2015)
provide Internet access throughout the campus without having to connect to a wall outlet.
This capability provides different benefits to different constituencies: students can use
18
their laptops anywhere; staff can access systems and the Internet as they hold meetings
across campus; researchers can work wherever they gather; office layouts do not have to
The purpose of this project is to design a suitable network system for universities
in developing countries. The aim was to design a network with high-quality security and
low cost, in such a way that network devices of universities in developing countries, will
meet standards associated with the universities in developed countries. This project will
help to enhance education in developing countries. There are many devices that were
used in designing the network, such as routers, switches, backup, firewall, and servers.
use technology in order to be able to achieve outcomes. As the hub of that connected
environment, the network must be fast, adaptable, flexible, and secure in order to make
the 21st century learning environment possible. As the hub of that connected
environment, the network must be fast, adaptable, flexible, and secure in order to make
communication among faculty, staff, and students. For example, faculty and students can
have closer contact and better communication, even on small campuses that pride
electronic mail conversations. Faculty and staff can more easily contact each other,
19
without the typical situation of telephone tag. Student groups can arrange meetings,
faculty can distribute assignments to students, students can turn in assignments, library
books can be ordered from inter-library loan--these are just a few of the many ways that
campus activities are facilitated by communication over a campus network. (D. Aldrich
2018)
campuswide databases for student and employee records, scheduling, procurement, and
other business processes leads to more efficient work, flattens hierarchies, and removes
network such as the Internet and a subnetwork such as a server-based (e.g., web server)
but must ensure reliability in accordance with the security measures and standards
Hayudini 2021)
providing a central focus for management of resources and services. The network makes
resources. Such coordinated management allows better use of resources, helps eliminate
20
turf issues, clarifies confusion about service sources, and allows much more efficient
strategies for handling infrastructure components like cable systems. (C. Kalmanek 2016)
Universities
destruction and other incidents. Campus network is the basis of daily teaching, scientific
construction of campus network security. Based on this, this paper studies the campus
network security. The security of campus network has been paid more and more attention
by us. Although our network security technology means are mature now, for the campus
network, which is a special network carrier, there are many problems in its management
because of the large number of users and the wide coverage of the network. Study and
Network security has become the protection of the wisdom of the campus
security protection has been unable to meet the current security needs. This paper
analyzes the major security threats facing the campus network, and presents the campus
network security protection measures from the physical layer, network layer, system
21
layer, application layer and management of five aspects, thus constructing the campus
A campus network faces challenges to address core issues of security which are
networks which deliver required security. This is essential because, it prevents the
institution from suffering any significant attacks associated with network. A university
library, and connections with the external uses. (Md. N. Bin Ali 2013)
Educational Enterprise system such as Federal Polytechnic Mubi was carried out of the
desire to protect the enterprise network against accidental or deliberate attempt to modify
through interconnected network groups. The use and popularity of the internet and
computer networks have grown over the years, giving great importance to gaining access
universities. Colleges and universities can strengthen the propaganda of campus network
security, improve the rules and regulations of college network security management, and
The concerns over network security have become more complicated as the range
of devices has increased past computers such as desktops or laptops. These systems use
22
operating systems with small memories and protection mechanisms. Commonly, these
devices are able to connect via peer devices or networks, using similar protocols to
that of wireless networks, such as BLE, Bluetooth, NFC, ZigBee, Wi-Fi, LoRaWan,
attacking, and tampering with various kinds of information, such as examination results,
examination papers, school card funds information and so on. Faced with this situation,
we can adopt the means of data encryption, which usually means to change the way
information is expressed, and its purpose is to protect the real information. This will
make it impossible for unauthorized users to access protected information. There are
always criminals trying to get information that he should not get through various means.
Network security has been going through a long and rough development process.
Computers have become much more powerful, network bandwidth have become much
higher, there are more and more users having access to Internet and technologies have
become more and more sophisticated. We should keep working and improving security
systems in order to protect the valuable assets from the adversaries. (Salar Faraji et al
2018)
23
universities that were discussed before, developing a hybrid network infrastructure for
the stakeholders of CHTM building would sufficient to resolve the existing network
routines in a wireless ad hoc network. The focus has been on the design, implementation
Campolo, et al 2015)
The results of a study investigating the potential of using social network analysis
between teachers. The goal of this method is to use data about teacher collaboration
within schools to map the distribution of expertise and resources needed to enact reforms.
It’s crucial to take into account a number of aspects while assessing a network design
schools, these are the main issues that any author would take into account. (John Smith
2011)
Scalability is the network's capacity to manage a rising ability to add new services
and apps, as well as the quantity of users and devices. A top attention should be given to
24
security, utilizing tools like firewalls. There are 19 installed intrusion detection and
prevention systems and safe wireless access points. As a result, the network will be
secured from threats and student and teacher data will be secure. (S. Williams, 2014)
As both students and teachers rely on the network for online learning and
research, network speed and dependability are particularly essential. It is crucial to have a
wired and wireless network with enough capacity and low latency. This will guarantee
uninterrupted student access to online materials and participation in online classes. (M.
Johnson, 2013)
To ensure that the network can be readily maintained and troubleshoot by the IT
team, ease of management is crucial. Network maintenance can be made simpler and
monitoring and reporting tools, and remote access capabilities. As a result, the IT team
won't have to spend as much time managing the network and can instead concentrate on
performance, security, and scalability, when evaluating our network infrastructure design,
Chapter III
Methodology
Research Design
The study will be using the descriptive developmental research designs which will
be the guide of the researchers for the improvement or development on making a network
computer network, a concept or method is needed in designing it, and here the PPDIOO
method will be used and uses two types of network topologies, namely star and ring
topologies. With the design of this computer network, it can help schools in the teaching
and learning process and can improve the quality of teaching, the quality of knowledge
and the quality of the abilities of students and teachers. In addition (A. Purwanto and B.
Soewito, 2021). Among researches on network optimization using PPDIOO are Design
Availability Using PPDIOO Life Cycle Approach method, and Optimization of a Wi-Fi
26
Wireless Network that Maximizes the Level of Satisfaction of Users and Allows the Use
The researchers will be guided through the use of PPDIOO Network Lifecycle.
The researchers will be processing the network design of the infrastructure that they
study and by the time that the researchers will ongoing in their study the PPDIOO will be
The Research Adopted the PPDIOO Network Lifecycle as a reflects the phases of
a standard network’s lifestyle. As shown in the figure, the PPDIOO lifecycle phases are
separate.
The researchers adopted the PPDIOO Network Lifecycle as a guide to the study.
As shown in the figure 2.1 the PPDIOO lifecycle phases are separate, yet closely related.
PREPARE
OPTIMIZE PLAN
PPDIOO
METHODOLOGY
OPERATE DESIGN
IMPLEMENT
Design. It will ensure that the step that made will be follow. The researchers will provide
27
a framework for the design deliverables. It will encourage consistency in the creative
researchers will allow the network technician validate the designed network.
The Researchers will follow the PPDIOO Network Lifecycle which the PPDIOO
describes:
Prepare phase. In this phase the researchers will prepare what will be the needed tools
and also the expenses that they will provide by breakdown it or having a list for budget.
The researchers also prepare the network design or the network infrastructure.
Plan phase. The researchers will identify the network requirements or the tools and
equipment that may use, where the network will be installed and the security. This phase
be assessing the plan or infrastructure where or when will it will process. A project plan
helps manage the tasks, responsibilities, critical turning point, and resources. The project
plan should range with the scope, cost, and resources. The researchers will be planning
Design phase. After the preparation and planning the design phase will be the next. The
researchers will decide if the planned equipment’s and tools are tuned on what the
researchers plan through the discussion with the network technician. The network design
specification that is produced is a well detailed design that, security, scalability, and
performance.
Implement phase. The researchers will proceed on implementing the design that had
been accepted.
Operate phase. The researchers are in the final test for the network design the
high availability and reducing expenses. The monitoring of the network will always
monitor to see if the planned initial data for the network lifecycle's Optimize phase.
Optimize phase. The researchers will the one to control the network management, this
phase will to resolve the issues what will be the problem on the network. In the PPDIOO
process, the optimization phase can prompt a network redesign if too many network
problems and errors arise, if performance does not meet expectations, or if new
Although Design is one of the six PPDIOO phases, all the other phases influence
design decisions, and the Design phase interacts closely with them, as follows:
Interview. The researchers will gather information through asking the network
technicians. Based on (A. & S., 1997). Both qualitative and quantitative researchers tend
to rely on the interview as the basic method of data gathering, whether the purpose is to
obtain a rich, in-depth experiential account of an event or episode in the life of the
respondent.
Therefore, the researchers will use this instrument to gather some useful
information’s to know what will be the process on their study on making a network
Questionnaire. The researcher will use or make a question to be ask to the network
technicians. According to (M.A. Sinclair 1975). For simplicity, this paper deals with
continuum with written questionnaires, require different treatment and are omitted.
29
The researchers will make a questionnaire that can help their study in network design and
Observation. The researchers will use this instrument to observe participants ongoing
main area of observation may be a specific locality where interesting events and
interactions usually occur, but often the research problem requires a “multi local” or
“trans local” fieldwork where a researcher can follow people, objects, a specific symbol,
The researchers will use the observation to look around what’s happening in the CHTM
building who are connected in the router. The researchers will observe if the network is
The researchers will use different requirements in designing the proposed network
infrastructure of the College of Hotel and Tourism Management with the follow:
Network Equipment are component that interacts at one or more protocol layers.
This comprises hubs, routers, switches, and end devices. There are features that can be
measured in network devices. Researchers intend to purchase new network devices that
are needed to be added in order to enhance the network and security of the CHTM
routers, switches, firewalls, servers, and other devices that are used to create, manage,
and secure the network. The equipment is used to create a secure and reliable network
infrastructure that can be used for data transmission, file sharing, and other network-
based activities.
The researchers will use this method as it is useful for designing a new network
infrastructure design in the CHTM building for the faculty and students.
IP Addressing Schema.
This makes it possible for users and apps to choose a specific network or host
with whom to communicate. It also assists in locating the hardware connected to the
network. Researchers would logically arrange the IP addresses in order to find specific
devices. In this case, researchers will be using the Class B IP addressing schema for the
devices that is in the network infrastructure of the CHTM building. U. Ghosh; R. Datta
(2015) These devices can allocate where the host assigns a specific IP address or will be
distributed among the network devices based on the network architecture or topology in a
The creation of security networks that guarantee the safety of any underlying data
amongst the people that is connected to any devices in the network infrastructure of the
CHTM building. It serves as the foundation of the security protection for your network.
Researchers agreed on installing firewalls and setting security protocols to protect the
Weighted Mean
some of the individual values. According to Kybernetika Praha (2016) weights are
approaches of introducing weights to the arithmetic mean aggregation link the weights
and single observed scorevalues. If this link is based on the ordinal approach, we obtain
the OWA (Ordered Weighted Average). Observe that OWA operators can be viewed as
“symmetrization” of weighted arithmetic means, and that both OWA’s and weighted
arithmetic means are related to the number of all criteria. When all the weights are equal,
Where:
w = The weight
x = the value
The researchers used weighted means to know the acceptability of the designed
2.00-2.99 Acceptable A
Table 3.1 shows the legend for the interpretation of weighted mean and its ranges.
The researchers in calculating the weighted mean gathered from the evaluation forms
Chapter IV
problem, and the internet speed is too slow to satisfy user demand because the Access
Point is situated on the second floor of the structure, other floor levels' connections are
substantially slower. There are fourteen (14) rooms in the CHTM building. To broaden
their knowledge and expertise for this investigation, the researchers would like to conduct
As show in figure 4.1.1 were there are four (4) access points that have two (2)
inside the dean’s office and two (2) in the faculty offices. There is one (1) network rack
in the ground floor. Outside the building the researchers see that there are three (3)
CCTV’S in the center, left side and right side of the building. The researchers find out
that the UTP cable at the back that connects to the dean’s office is hanging.
The figure 4.2. Is the second floor of the CHTM building. The researchers find
out that in this floor is they have only one (1) access point and no CCTV.
Figure 4.3 shows the existing network at third floor, and there is no CCTV or any
internet access
improve the current network that they have at the moment. The proposed plan will also
The researchers will put an additional Access points , a switch , a cctv and etc.
that will help the CHTM building to have a better internet connections and also the
The researchers will propose network infrastructure to improve the network and
In The figure 4.4, the proposed plan of the researchers on the ground floor is shown by
adding an access point in the hallway and the utp cable will be fixed it in the wall so that
it will not be a hanging cable. The cctv’ will remain as if it is and it is show in figure 4.4
The figure 4.5 shows the plan of the researchers on the 2 nd floor which is to add
one (1) access point and two (2) CCTVs for the protection of the students and teachers of
the CHTM building and other students that are studying other courses.
The figure 4.6 shows the proposed plan of the third floor which is to put three (3)
access point and two (2) CCTVs for students and teachers to have access to the internet
big structure.
network.
Network Network cables are used to link and transfer data and
networks.
Table 4.1 shows the symbols and its descriptions used on designing proposed
network infrastructure.
Security Description
Physical The researchers will proposed and use the current network
security around the CHTM Building. The researchers will put
Network
also a CCTV’s inside the building for the safety of the
Security teachers, students and non-teaching staffs.
Access Control The researchers will suggest using a different SSIDs with
Guest Network enable. To prevent the CHTM building from
38
The researchers will list the need equipment’s and tools for the network
infrastructure in the establishment of CHTM bldg. The budget that they will use in this is
₱50,000.00 – ₱100,000.00. The researchers will canvas for the prices of the needing
equipment and tools to know if their target budget will be enough or exceed.
Supports PoE+
Access Point TP- and 1201 Mbps on 5 GHz totals 1775 Mbps Wi-Fi speeds.
faster speeds.
UTP Cable digital and analogue voice and video (RGB) signals on LANs.
reduce
The researcher will discuss the network security architecture for the proposed
network infrastructure for CHTM Building. The researchers will be using Physical and
Network around the CHTM Building. The researchers will put also a CCTV’s
Security inside the building for the safety of the CHTM building and also the
41
The researchers will put a security password for the internet access
Access Control enable. To prevent the CHTM building from accessing any private IP
IP Addressing Schema
Figure 4.7 shows the researcher proposed this network diagram, the internet can
be protected by using a firewall and the CHTM building has three (3) stories on it the
ground floor have one (1) switch and five (5) access points and the second floor have two
(2) access points and it is connected to switch and the third floor have 3 access point and
Figure 4.8 shows the current network diagram in the CHTM building
Figure 4.9, This is the proposed network diagram that the researchers proposed.
There are additional access points and CCTV’s to improve the internet connection and to
make sure that the security of the students and faculty of the CHTM building is recorded.
Table 4.5 shows the ip addresses of each devices used on the proposed network
Network Cost
Server Rack
Table 4.6 shows the total financial cost upon purchasing the needed tools,
equipment and devices in order to implement the utilization of hybrid networks through
efficient network engineering on the CHTM building. With the bought materials, it
ensures that the internet and security matters on the building will be enhanced.
A questionnaire checklist was prepared and conducted with the cooperation of the
CCIT faculty who are specialized in networking. The items in the questionnaire were
divided into two parts. Part I included the personal data of the respondents and Part II
46
contained the rating scale, which includes the category, scale value, and rating. For every
item in the questionnaire, there were five choices with their corresponding rating value:
(5) Highly Acceptable, (4) Very Acceptable, (3) Acceptable, (2) Fairly Acceptable, and
The statistical tool used in determining the acceptability of the developed system,
were by means of getting the weighted scores and weighted mean of the responses
towards the different statements about the system. In finding the weighted score, the
(wf)
following formula was used: ∑x = n where w = weight, f = frequency and n =
number of respondents. There were five (5) respondents who took part in the survey,
which is among faculty. The respondents were asked to put a check mark which
Network Scalability
Table 4.6 shows the perception of evaluators on the system with respect to its
Manageability.
Table 4.7 shows that the respondents agreed on the information of the network
scalability of the network infrastructure as reflected with the weighted mean of 4.38
(Highly Acceptable).
Network Security
4. How are user access and privileges managed and controlled? 4.4 HA
Table 4.8 shows that the respondents agreed on the information of the network
security of the network infrastructure as reflected with the weighted mean of 4.44 (Highly
Acceptable).
Network Performance
Table 4.8 shows the perception of evaluators on the system with respect to its
Performance.
Table 4.9 shows that the respondents agreed on the information of the network
performance of the network infrastructure as reflected with the weighted mean of 4.64
(Highly Acceptable).
49
Network Usability
Table 4.9 shows the perception of evaluators on the system with respect to its
Security.
Table 4.10 shows that the respondents agreed on the information of the network
usability of a network infrastructure as reflected with the weighted mean of 4.48 (Highly
Acceptable).
Network Manageability
Table 4.10 shows the perception of evaluators on the system with respect to its
Scalability.
Table 4.11 shows that the respondents agreed on the information of the network
manageability of the network infrastructure as reflected with the weighted mean of 4.56
(Highly Acceptable).
Based on the test results of each criteria provided by the respondents, garnering
the weighted mean average of 4.56 (Highly Acceptable), the network infrastructure
acceptance is proven, and therefore, indicate the readiness of the implementation. The
Criteria WM DESC
Scalability 4.38 HA
Security 4.44 HA
Performance 4.64 HA
Usability 4.48 HA
Manageability 4.56 HA
Chapter V
of the whole study. The findings of the study without so much detailed information is
written in the summary. Generalizations and other interferences would be seen in the
study can also be seen in this chapter. Generally, this chapter aims to cover up the end
Findings
1. The current network infrastructure of the CHTM building consists of only few
equipment’s which are: (a) 5 Access Points - 2 inside the dean's office and 2 inside the
faculty room at the ground floor, and another 1 at the second floor. (b) 1 network rack at
the ground floor (c) 4 CCTVs located at the right, left and center outside the building by
the ground floor and the other one is at the second floor. Apparently, there is no access
proposed budget for the infrastructure that ranges from ₱50,000 to ₱100,000.
Correspondingly, the researchers' final network architecture design runs ₱91, 744.It has
3. The current network infrastructure in the CHTM building is poorly thought out
in its architecture. Only faculty and the dean have access to the internet. Because access
53
points are more sparsely distributed on the ground floor, it is challenging for students to
4. The IT experts have given the proposed network infrastructure design for the
for deployment and satisfies the requirements for scalability, availability, security,
Recommendation
researchers want to propose the design made of network infrastructure to have a better
2. The researchers will apply the efficient network engineering like adding a
network devices that required, ip schema, network security architecture and overall
network security processes, and the network cost that may be used in buying the added
devices.
3. The researchers would like to recommend also that from time to time
monitoring the network if there will be no problems or troubleshoot if any case the
should be functional and aligned for the foreseeable future, and the architecture should
suit users.
Conclusion
54
Considering the range of the internet, the placements of internet access need to be
Network Security Architecture and Overall Network Security Processes, d) Network Cost
is to be improved to utilize the most out of the current network and connections they have
at hand.
3. The design of the network infrastructure in the CHTM building has produced a
low quality of internet connection and accessed much often. The researchers’ proposal
References
56
References
https://escholarship.org/repository
https://arxiv.org/pdf/1810.03670.pdf
https://www.scribd.com/document/542430203/https-2Fd1wqtxts1xzle7-cloudfront-net-
2F55649417-2Fimagem-pdf-1517091550-respo-2021-08-20-23-12-55
Available at:
https://jwcn-eurasipjournals.springeropen.com/articles/10.1155/2009/532434
A survey on internet performance measurement platforms and related ... (no date).
2015.pdf
https://scholar.valpo.edu/cgi/viewcontent.cgi?article=1002&context=itcrpr
57
Cultivation of black soldier fly larvae on almond byproduct as a ... (no date). Available
at: https://www.proquest.com/openview/9460fae7294e9db5d8ea3cf9ee05c886/1?pq-
origsite=gscholar&cbl=2026366&diss=y
https://www.theseus.fi/bitstream/handle/10024/47351/Sulaimon_Adeniji.pdf?
sequence=1
Eric - Education Resources Information Center. (n.d.). Retrieved February 1, 2023, from
https://files.eric.ed.gov/fulltext/ED604388.pdf
John Dewey in the 21st Century - ed. (n.d.). Retrieved January 1, 2023, from
https://files.eric.ed.gov/fulltext/EJ1158258.pdf
idrc.dspacedirect.org/handle/10625/44431
https://www.sciencedirect.com/topics/computer-science/infrastructure-network
https://www.commscope.com/solutions/enterprise-networks/smart-campus/
58
planning-principles
Cisco. (2022, February 25). What is network infrastructure? Cisco. Retrieved February 1,
network-infrastructure.html
Cisco. (2022, February 25). What is network infrastructure? Cisco. Retrieved February 1,
network-infrastructure.html
Kybernetika Praha (January 2006) Weighted means and weighting functions, from
https://www.researchgate.net/publication/236158980_Weighted_means_and_weighting_
functions
59
Appendices A
Below are statements on the acceptability of the Network Design Infrastructure as to its
constructive design. Please rate the level by putting a check mark () on the column that
5 Highly Acceptable
4 Very Acceptable
3 Acceptable
2 Fairly Acceptable
1 Not Acceptable
Statement Rating
A. Network Scalability 1 2 3 4 5
demands?
needed?
expansion?
devices?
60
Sub-Total
D. Network Security 1 2 3 4 5
attacks?
Sub-Total
E. Network Performance 1 2 3 4 5
and delay?
performance?
ensure performance?
mobile users?
Sub-Total
61
F. Network Usability 1 2 3 4 5
users?
business needs?
Sub-Total
H. Network Manageability 1 2 3 4 5
administered?
technical users?
Sub-Total
62
Comments/Suggestions:
Appendices B
Documentations:
Appendices
C
64
Curriculum Vitae
Contact #: 09563909254
PERSONAL INFORMATION:
Nickname : Steph
Age : 22
Status : Single
Citizenship : Filipino
EDUCATIONAL BACKGROUND:
Contact #: 09271342774
PERSONAL INFORMATION:
Nickname : Kent
Age : 23
Religion : Catholic
Status : Single
Citizenship : Filipino
EDUCATIONAL BACKGROUND:
Contact #: 09398621742
PERSONAL INFORMATION:
Nickname : Migo
Age : 21
Religion : LDS
Status : Single
Citizenship : Filipino
EDUCATIONAL BACKGROUND:
Contact #: 09109892855
PERSONAL INFORMATION:
Nickname : Jon
Age : 21
Religion : Catholic
Status : Single
Citizenship : Filipino
EDUCATIONAL BACKGROUND:
Contact #: 09560992749
PERSONAL INFORMATION:
Nickname : Ben
Age : 21
Religion : Catholic
Status : Single
Citizenship : Filipino
EDUCATIONAL BACKGROUND:
Contact #: 09184858192
PERSONAL INFORMATION:
Nickname : Kate
Age : 21
Religion : Catholic
Status : Single
Citizenship : Filipino
EDUCATIONAL BACKGROUND: