SlideShare a Scribd company logo
1 of 53
CAN
CAMPUS
AREA
NETWORK.
DONE BY
Jakaria
Mithu Chandra Sheel
Abdullah Al Mamun
SUPERVISED
BY
Professor Dr. Abdul Halim Shaikh,PhD.
Dean
Faculty of Design and Technology
Shanto Mariam University of Technology
WHAT IS CAN
OR WHY WE
NAME IT CAN
CAN = Campus Area Network.
It is the LAN in the Campus of Shanto
Mariam University of Creative
Technology
WHAT IS LAN
AND HOW IT
WORK?
SCOPES
Analyzing
• Analyzing the
existing network
system.
Finding
• Finding the solution
for better
performance using
existing network.
Designing
• Designing the
Network according
to Requirement.
Finding
• Finding the
malfunctioned device
and replacing them with
the better one may be
new one.
Studying
• Studying the
feasibility of propose
network.
Constructing
• Constructing the LAN.
Installing
• Installing Useful software to perform
better for data sharing such as
firewall for securing the system from
malware.
ANALYZING
Collaborate with GETCO
How the connections of internet are made from ISP companies.
Closely observe the operations that they done.
SMUCT NETWORK STRUCTURE FOR INTERNET
STAR TOPOLOGY
CONDITION OF COMPUTER LAB
The LAB of building 1
number of computers 20 No LAN and no interconnection between them
The LAB of Building 2
2 LAB
consisting of 60 computers
Building 5A
4 LAB
consisting of 98 computers
CONDITIONS OF
COMPUTER LAB
Physical Network.
The scenario.
PROBLEMS TO ESTABLISH LAN
Malfunctioned
switch and lack
of required
number of switch.
Unorganized
cabling.
SOLUTIONS
Install Install SERVER for automated and organized the control system.
Remove Remove defected cables and install new cables.
Install Install new switches.
INSTALLING SWITCHES
Switch is one type of hub with intelligence
Avoid Collision domain
Functions
• Learning : Learning MAC addresses
• Forwarding : Forwarding Packets to
destination
• Preventing Loops : Using STP(Spanning
Tree Protocol)
SWITCH CALCULATION
Lab Existing number of Switches Number of Switches needed
1303 0 1 switch of 24 ports
2203 1(24ports) 1 switch of 16 ports
2503 1(Not in good condition) 1 switch with 16 ports
51303 0 1 switch of 8 ports
51401 2(24 ports and 16 ports) No needs of extra switch
51402 1(24 ports) 1 Switch with 8 ports
51404 1(24 ports) 1 switch of 8 ports
NUMBER OF
SWITCHES
NEEDED TO
ESHTABLISH
THE LAN
1 switch of
24 ports
2 switches
of 16 ports
3 switches
of 8 ports
CABLING
70% of problems in the network
typical cabling costs are around 10%
from the overall network deployment cost
CONDITION OF
CABLING IN LAB
Unorganized.
Poorly connected to
connectors
There is no way to recognize
the specific cable of specific
Computer.
SOLUTION
Find out
poorly
connected
cables
Then fix
it in a
right
way.
DESIGNING
THE
NETWORK
8 Labs
4 Buildings
More then 177
computers.
IP ADDRESS ALLOCATION
IP series 192.168.169.0 to
192.168.169.255
Total IP Address :
254
Total computer:
177
SUBNETTING
If we want to allocate subnets for every lab
Then the scenario will be like
Number of borrowed bit will become 8
11111111.11111111.11111111.1111111
1
All octoate become filled.
If we divide into 4 subnets for four
buildings then we will
get 62 IP addresses per subnet.
Where as only 5A has 123 computers.
So It is impossible.
AFTER ALL OF THIS IF WE DIVIDE INTO 2 SUBNETS THEN WE
WILL GET
126 HOST IP ADDRESS PER SUBNET
192.168.169.0
to
192.168.169.128
192.168.169.129
to
192.168.169.255
Building 5(A,B,C) Building 1,2
RISK ANALYSIS OF 2 SUBNETS
5A has 123 computers. If the number of computers will increase
then it will face shortage of IP address.
If we don’t use the subnet then we will get 254 Host IP address.
Where the LAB’s consist of 177 computers.
Then we will get (254 – 177) = 77 Host IP Address
CONSTRUCTING
THE LAN
Each Building’s computers are connected to
POP.
So each building is connected to each other
via POP.
If we use this Network then it will be the most
cost saving and secure solution.
BENEFITS OF
USING
GETCO’S
NETWORK
Supervision free
High speed data transmission due to Optical
Fiber
Cost of wiring a long distance between
buildings
CONFIGURING LAB’S LAN
Cabling Switch
configuring
IP Address
allocation
CABLING
1. We checked each cable
2. Then found the defected cable.
3. And reconfigure it or replace it by
new cable.
CABLING
• We use 100 meter cat6 cable and
some cat 5 cable.
• Connector RJ45
• crimping/cutting/stripping tool
• Cable tester
• Number both end of the cable with
associate number of Computer.
VIDEO OF
CABLING
Straight cabling.
Cross Cabling.
Data sharing using switch.
Data sharing without switch.
STRAIGHT CABLING
CROSS CABLING.
DATA SHARING USING SWITCH.
DATA SHARING WITHOUT SWITCH.
SERVER
A server is a computer program that provides
services to other computer programs (and their
users) in the same or other computers. The
computer that a server program runs in is also
frequently referred to as a server.
TYPES OF SERVER
application server: provides the
business logic for an application
program
proxy server: software that acts
as an intermediary between an
endpoint device
mail server: receives incoming e-
mail from local users
virtual server: program running
on a shared server that is
configured in such a way that it
seems to each user that they
have complete control of a
server.
file server: responsible for the
central storage and
management of data files so
that other computers on the same
network can access them.
policy server:security component
of a policy-based network that
provides authorization services
and facilitates tracking and
control of files.
FILE SERVER
SERVER
OPERATING
SYSTEM
Windows Server, Mac OS X Server, and
variants of Linux such as Red Hat Enterprise
Linux (RHEL) and SUSE Linux Enterprise
Server
Windows and Linux are widely used.
WINDOWS OVER LINUX
It is faster
to do
things On
MS
windows
It is easier
to
configure
MS
windows
server
With
Windows,
you need
less
people
Windows
server is
more
secure
Open
projects,
Open
source &
accountab
ility
Backup
GPO
(Group
Policy
Object)
ANOTHER BIG REASON
Roaming user profile
• Automatic resource availability. A user's unique profile is automatically available
when he or she logs on to any computer on the network.
• Simplified computer replacement and backup. When a user's computer must be
replaced, it can be replaced easily because all of the user's profile information
is maintained separately on the network, independent of an individual computer.
STORAGE ALLOCATION AND GROUP POLICY
Allocate 2GB/student
Validity 6 months for bi semester student and 4 months for tri-semester student
Default group Policy
VIDEO OF
SERVER
OPERATIONS
Creating UserCreating
Assigning Roaming ProfileAssigning
Configuring Client PC to get under server.Configuring
CREATING USER
CONFIGURING CLIENT COMPUTER
ROAMING USER PROFILE
THANKS TO
Zahid Hasan(Lecturer)
Mizanur Rahman Sinha(Lecturer)
Md. Selim Azad
Aminul Islam
Professor Abdul Halim Sheikh,Phd
Dean
Faculty of Design and Technology
Shanto Mariam University of Creative
Technology
PRESENTATION SLIDES ARE PREPARED BY
Abdullah Al Mamun
Founder: coderstutor.com
Intern at Shanto-Mariam University of Creative Technology, Uttara, Dhaka.
LinkedIn: https://www.linkedin.com/in/abdullah-al-mamun-sm/
Facebook: https://www.facebook.com/abdullah.mamun1204
EVERYONE

More Related Content

What's hot

Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manetMeena S Pandi
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security systemIJAEMSJORNAL
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddvEditor Jacotech
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALASaikiran Panjala
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509IJMER
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Nasir Bhutta
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manetKunal Prajapati
 
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...IJERA Editor
 
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardAnalyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardIJCSIS Research Publications
 
Multilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet ProtocolsMultilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet ProtocolsNasir Bhutta
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Tương Hoàng
 

What's hot (20)

Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security system
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 
K011117277
K011117277K011117277
K011117277
 
network
networknetwork
network
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
2 1 lan
2 1 lan2 1 lan
2 1 lan
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
 
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
Distributed Packet Filtering Firewall for Enhanced Security In Mobile Ad-Hoc ...
 
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardAnalyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
 
Network security
Network securityNetwork security
Network security
 
Multilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet ProtocolsMultilayer Security Architecture for Internet Protocols
Multilayer Security Architecture for Internet Protocols
 
Security issues
Security issuesSecurity issues
Security issues
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 

Similar to LAN Design and implementation of Shanto Mariam University of Creative Technology

Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksAtif Shahzad
 
CN project 713711699701-5.pdf
CN project 713711699701-5.pdfCN project 713711699701-5.pdf
CN project 713711699701-5.pdfDakshBaveja
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingssuser06ea42
 
manual on networking cabling with pratical guide
manual on networking cabling with pratical guidemanual on networking cabling with pratical guide
manual on networking cabling with pratical guideNuhuSamaila
 
CCNA-lab-Manual.pdf
CCNA-lab-Manual.pdfCCNA-lab-Manual.pdf
CCNA-lab-Manual.pdfDrPreethiD1
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdfSherefHesham
 
Networking & Servers
Networking & ServersNetworking & Servers
Networking & ServersBecky Holden
 
Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)Yasir Bashir
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)ateeq85905
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]Avijit Nath
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyManas Saha
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-networklklokesh
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologiesAyush0734
 
ccna is the best certification in the industry
ccna is the best certification in the industryccna is the best certification in the industry
ccna is the best certification in the industryArifAhmad647254
 

Similar to LAN Design and implementation of Shanto Mariam University of Creative Technology (20)

Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networks
 
CN project 713711699701-5.pdf
CN project 713711699701-5.pdfCN project 713711699701-5.pdf
CN project 713711699701-5.pdf
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
 
manual on networking cabling with pratical guide
manual on networking cabling with pratical guidemanual on networking cabling with pratical guide
manual on networking cabling with pratical guide
 
CCNA-lab-Manual.pdf
CCNA-lab-Manual.pdfCCNA-lab-Manual.pdf
CCNA-lab-Manual.pdf
 
I and z
I and zI and z
I and z
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
 
COM526_Lecture 1.pdf
COM526_Lecture 1.pdfCOM526_Lecture 1.pdf
COM526_Lecture 1.pdf
 
Networking & Servers
Networking & ServersNetworking & Servers
Networking & Servers
 
Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrin
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
 
ccna presentation
ccna presentationccna presentation
ccna presentation
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & Technology
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
ccna is the best certification in the industry
ccna is the best certification in the industryccna is the best certification in the industry
ccna is the best certification in the industry
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

LAN Design and implementation of Shanto Mariam University of Creative Technology

  • 2. DONE BY Jakaria Mithu Chandra Sheel Abdullah Al Mamun
  • 3. SUPERVISED BY Professor Dr. Abdul Halim Shaikh,PhD. Dean Faculty of Design and Technology Shanto Mariam University of Technology
  • 4. WHAT IS CAN OR WHY WE NAME IT CAN CAN = Campus Area Network. It is the LAN in the Campus of Shanto Mariam University of Creative Technology
  • 5. WHAT IS LAN AND HOW IT WORK?
  • 6. SCOPES Analyzing • Analyzing the existing network system. Finding • Finding the solution for better performance using existing network. Designing • Designing the Network according to Requirement. Finding • Finding the malfunctioned device and replacing them with the better one may be new one. Studying • Studying the feasibility of propose network. Constructing • Constructing the LAN. Installing • Installing Useful software to perform better for data sharing such as firewall for securing the system from malware.
  • 7. ANALYZING Collaborate with GETCO How the connections of internet are made from ISP companies. Closely observe the operations that they done.
  • 8. SMUCT NETWORK STRUCTURE FOR INTERNET STAR TOPOLOGY
  • 9. CONDITION OF COMPUTER LAB The LAB of building 1 number of computers 20 No LAN and no interconnection between them The LAB of Building 2 2 LAB consisting of 60 computers Building 5A 4 LAB consisting of 98 computers
  • 10. CONDITIONS OF COMPUTER LAB Physical Network. The scenario.
  • 11. PROBLEMS TO ESTABLISH LAN Malfunctioned switch and lack of required number of switch. Unorganized cabling.
  • 12. SOLUTIONS Install Install SERVER for automated and organized the control system. Remove Remove defected cables and install new cables. Install Install new switches.
  • 13. INSTALLING SWITCHES Switch is one type of hub with intelligence Avoid Collision domain Functions • Learning : Learning MAC addresses • Forwarding : Forwarding Packets to destination • Preventing Loops : Using STP(Spanning Tree Protocol)
  • 14. SWITCH CALCULATION Lab Existing number of Switches Number of Switches needed 1303 0 1 switch of 24 ports 2203 1(24ports) 1 switch of 16 ports 2503 1(Not in good condition) 1 switch with 16 ports 51303 0 1 switch of 8 ports 51401 2(24 ports and 16 ports) No needs of extra switch 51402 1(24 ports) 1 Switch with 8 ports 51404 1(24 ports) 1 switch of 8 ports
  • 15. NUMBER OF SWITCHES NEEDED TO ESHTABLISH THE LAN 1 switch of 24 ports 2 switches of 16 ports 3 switches of 8 ports
  • 16. CABLING 70% of problems in the network typical cabling costs are around 10% from the overall network deployment cost
  • 17. CONDITION OF CABLING IN LAB Unorganized. Poorly connected to connectors There is no way to recognize the specific cable of specific Computer.
  • 20.
  • 21.
  • 22. IP ADDRESS ALLOCATION IP series 192.168.169.0 to 192.168.169.255 Total IP Address : 254 Total computer: 177
  • 23. SUBNETTING If we want to allocate subnets for every lab Then the scenario will be like Number of borrowed bit will become 8 11111111.11111111.11111111.1111111 1 All octoate become filled.
  • 24. If we divide into 4 subnets for four buildings then we will get 62 IP addresses per subnet. Where as only 5A has 123 computers. So It is impossible.
  • 25. AFTER ALL OF THIS IF WE DIVIDE INTO 2 SUBNETS THEN WE WILL GET 126 HOST IP ADDRESS PER SUBNET 192.168.169.0 to 192.168.169.128 192.168.169.129 to 192.168.169.255 Building 5(A,B,C) Building 1,2
  • 26. RISK ANALYSIS OF 2 SUBNETS 5A has 123 computers. If the number of computers will increase then it will face shortage of IP address. If we don’t use the subnet then we will get 254 Host IP address. Where the LAB’s consist of 177 computers. Then we will get (254 – 177) = 77 Host IP Address
  • 27. CONSTRUCTING THE LAN Each Building’s computers are connected to POP. So each building is connected to each other via POP. If we use this Network then it will be the most cost saving and secure solution.
  • 28. BENEFITS OF USING GETCO’S NETWORK Supervision free High speed data transmission due to Optical Fiber Cost of wiring a long distance between buildings
  • 29.
  • 30. CONFIGURING LAB’S LAN Cabling Switch configuring IP Address allocation
  • 31. CABLING 1. We checked each cable 2. Then found the defected cable. 3. And reconfigure it or replace it by new cable.
  • 32. CABLING • We use 100 meter cat6 cable and some cat 5 cable. • Connector RJ45 • crimping/cutting/stripping tool • Cable tester • Number both end of the cable with associate number of Computer.
  • 33. VIDEO OF CABLING Straight cabling. Cross Cabling. Data sharing using switch. Data sharing without switch.
  • 38.
  • 39. SERVER A server is a computer program that provides services to other computer programs (and their users) in the same or other computers. The computer that a server program runs in is also frequently referred to as a server.
  • 40. TYPES OF SERVER application server: provides the business logic for an application program proxy server: software that acts as an intermediary between an endpoint device mail server: receives incoming e- mail from local users virtual server: program running on a shared server that is configured in such a way that it seems to each user that they have complete control of a server. file server: responsible for the central storage and management of data files so that other computers on the same network can access them. policy server:security component of a policy-based network that provides authorization services and facilitates tracking and control of files.
  • 42. SERVER OPERATING SYSTEM Windows Server, Mac OS X Server, and variants of Linux such as Red Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise Server Windows and Linux are widely used.
  • 43. WINDOWS OVER LINUX It is faster to do things On MS windows It is easier to configure MS windows server With Windows, you need less people Windows server is more secure Open projects, Open source & accountab ility Backup GPO (Group Policy Object)
  • 44. ANOTHER BIG REASON Roaming user profile • Automatic resource availability. A user's unique profile is automatically available when he or she logs on to any computer on the network. • Simplified computer replacement and backup. When a user's computer must be replaced, it can be replaced easily because all of the user's profile information is maintained separately on the network, independent of an individual computer.
  • 45. STORAGE ALLOCATION AND GROUP POLICY Allocate 2GB/student Validity 6 months for bi semester student and 4 months for tri-semester student Default group Policy
  • 46. VIDEO OF SERVER OPERATIONS Creating UserCreating Assigning Roaming ProfileAssigning Configuring Client PC to get under server.Configuring
  • 50.
  • 51. THANKS TO Zahid Hasan(Lecturer) Mizanur Rahman Sinha(Lecturer) Md. Selim Azad Aminul Islam Professor Abdul Halim Sheikh,Phd Dean Faculty of Design and Technology Shanto Mariam University of Creative Technology
  • 52. PRESENTATION SLIDES ARE PREPARED BY Abdullah Al Mamun Founder: coderstutor.com Intern at Shanto-Mariam University of Creative Technology, Uttara, Dhaka. LinkedIn: https://www.linkedin.com/in/abdullah-al-mamun-sm/ Facebook: https://www.facebook.com/abdullah.mamun1204