SlideShare a Scribd company logo
1 of 7
For a world in motion™.
As the world’s specialist in mobile broadband, we’ll help you enable your end users to do more than ever before with the
world’s most efficient mobile networks, the intelligence to maximize their value and the services to make it all work
together.
From the first ever call on GSM, to the first call on LTE; we operate at the forefront of each generation of mobile technology.
Our global experts invent the new capabilities you need in your networks. We provide the world’s most efficient mobile
networks, the intelligence to maximize the value of those networks, and the services to make it all work together seamlessly.
With an unswerving focus on quality, efficiency and reliability we help you meet your mobile customers’ demands for
universal content and connectivity more efficiently and effectively.
Together, we deliver the innovations in mobile technology that enable people and businesses everywhere to do more than
ever before.
As a mobile operator, you face challenges from many sides that put your mobile network and your business model under
extreme pressure.
By transforming your mobile network and your business, you’ll turn your challenges into opportunities.
Working closely with you, we deliver the products and services that will help drive your success - today and tomorrow.
Abstract
Telecommunications carriers and serviceproviders are facing issues of traffic loss and delay
due to multiple fibre cuts and failures. The key challenges operators are facing today is offering
high service level availability to its customers which can be achieved through highly automated
resilient networks.
As technology advances in society the need for wired and wireless networking has become
essential. With the advent of new networking technologies with their advantages and
disadvantages, like security, the hardware requirements, the range and benefits are
different. Wireless networking takes into consideration the range, mobility, and the several
types of hardware components needed to establish a wireless network. Considering all the
technological advances SNM Networks provides network solution for ABC technologies.
Introduction
Wireless networks have given a privilege to organizations to have fewercables and slightly less
management, but few more hardware component.
In order to offermobility and future ready services, networkdesigned forABC technologies
comprises of both wireless and wired network.
SNM has analysed the key requirements of ABC technologies and crafted a comprehensive
solution that willfulfill the ABC’s current and future business needs.
BusinessIT Requirements
1. Setup a network forits officein Georgia (head office) and branch in New York.
2. Officemust have following
3. Setup of meeting conferenceroom with VoIP phones and must have surveillance camera
through-out the office.
4. Full Wi-Fi access with 802.11i security protection.
5. Should have backup connectionin case of network failure.
6. A printer for each officewhichcan be accessed by all the systems within the office.
7. Networkoutage and maintenance need to be informed 2 weeks prior.
8. RFID flooraccess will be maintained by Honeywell systems and data should be
incorporated within their servers.
9. Total cost of installation should not exceed USD 50,000
10. Maximum time forinstalling the network is 12 weeks.
Technical Solutionoffered
1. To connectofficesin Georgia and branch officein New Yorkwe are using WAN.
2. PowerOverEthernet
3. Optical cable(OM4)
4. CAT 6 UTP
5. Surveillance camera
6. Opted for carrier XYZwhichuses two different POPstoconnect Primary and backup
networks.
7. Wi-Fi access point with 40*40 meter square 802.1x mode
8. Print server application forconnecting all the systems with one printer
HardwareComponents
Major Networking Hardware Components
a. NetworkInterface Cards
b. Routers (Internal routers and border routers)
c. Switches
d. Access Points (40m x 40 m square) - coverage area
e. Printers
f. VoIP Phones - voiceover IP phones
g. RFID tags
h. Optical cable
i. UTP cable
j. Server/Data server
k. Desktop/laptop/PC
l. Surveillance cameras
m. Powerover Ethernet
a. NIC- A NIC is a devicethat connects a computer or other device to a network. For
computers, the NIC is usually installed in an expansion slot and has a chip that handles the
physical and data-link layers of networkcommunications. (Cert.org/Tech).
b. Modem is designed to operate using yourexisting cable lines. Cable internet has a high
bandwidth and can support most, if not, all applications, ABC technologies is using.
c. A router is a devicethat routes data from one network to another network. A router is
connected to at least twonetworks, commonly two networksor a networkand its ISP's
network. A router allows for everyoneon the networkto access the internet.
d. Another key component is a print server. A print server is used to connectprinters to a
networkto allow fornetwork printing. The server will actas a buffer;storing the messaging
and printing them in order of the queue. This device can drastically reduce the cost of
networking because now everyone can use the same printer without having a printer attached
to every computer.
e. A hub is a deviceoffered to connects the cables from computers and other devices such
as printers in a network.Traditionally, hubs are used forstar topology networks, but they are
offeredto use with other configurations to make it easy to add and remove computers without
bringing down the network.
f. A switch is a device similar to a hub that enables the connectionof multiple computers,
access points, and other networkenabled devices. The differencebetween a hub and a switchis
that a switchfilters the data that passes through it, whereas hub does not.
g. Print server is used to connectprinters to a network to allow fornetwork printing. The
server will act as a buffer;storing the messaging and printing them in order of the queue. This
device can drastically reduce the cost of networking because now everyonecan use the same
printer without having a printer attached to every computer.
h. A VoIP phone or IP phone uses Voice overIP technologies for placing and transmitting
telephone calls over an IP network,such as the Internet, instead of the traditional public
switched telephone network(PSTN).It is cheap as voice is compressed in IP data network.
i. Radio-frequencyidentification (RFID)uses electromagneticfieldsto automaticallyidentify
and tracktags attached to objects. Offered with Access card _manual and a scanningunit at office
premises,like conferencing room and entry terminal.
j. Optical cables are offeredfor inter building connectivity.Single mode optical fibre OM4
with fullduplex communication is used to offerconnectivity
k. UTP cable (Unshielded twisted pair) is used within both officesforconnectivity.
l. Desktop/ PC are offeredfor workpurposes.
m. Security/surveillance cameras are a great way to provide security foryour home or
workplace.As wellas providing youwith video footageof any events that may happen, they also
act as a visible deterrent to criminals.
Technologiesoffered
a. Powerover Ethernet (POE) plus,this is sufficientfor voiceoverIP phones, surveillance
cameras, and most access points. This saves money because there is no need to install power
lines to these devices.
b. WAN- Wide Area Networkwill connecttwoofficesites via different RoW(Rights of
Way).
c. LAN- Local area network whichconnects the local officepremises at both the sites.
d. Wireless access -802.11i in 802.1x whichwill provide full wireless access for the
employees.
Time and cost savings - Networkcables do not require an electrician to fit them, and can be
located anywhere.
POE has many applications, but are offered forthree key areas:
VoIPphones - the original POE application. Using POE means phones have a single connection
to a wall socket, and can be remotely powered down, just like with the older analog systems.
IP cameras - POE is now ubiquitous on networked surveillance cameras, where it enables fast
deployment and easy repositioning.
Wireless– Wi-fiand Bluetooth APs and RFIDreaders are commonly PoE-compatible,to allow
remote locationaway fromAC outlets, and relocation followingsite surveys.
Flexibility - without being tethered to an electrical outlet, devices such as IP cameras and
wireless access points can be located wherever they are needed most, and repositioned easily if
required.
Advantages:
Safety - POE delivery is intelligent, and designed to protect networkequipment fromoverload,
under -powering, or incorrect installation.
Reliability - It can be backed-up by an uninterruptible powersupply, or controlled to easily
disable or reset devices.
Scalability - having power available on the network means that installation and distribution of
networkconnections is simple and effective.
Technical AssumptionsandDimensioningParameters
The prerequisites and assumptions taken while planning the networkand preparation of the
solution are mentioned below:
a. The Access points gives the coverage of 40 meters and 40-meter square
b. Twodifferent officesare interconnected via WANnetwork, 1st office100 meter length
and 80 meters wide, and 2nd office80 meter length and 60 meter are connected by optical cable
c. In office1, there are two windowsplanned to minimize dead zones. Office1is in New
Yorkand office2 is in Georgia.
d. To connecttwo buildings, optical cable is used.
NetworkcomponentandSystems
 Desktops 4 or 5
 Laptop computers: Printers: Two(one printer forconfidential printing and one printer-
fax combounit for general use)
 Servers: One (running Small Business Serve, looking after files, the Internet connection,
e-mail, and our customer database)
 Internet connection:50 Mbps cable modem connection.
 The server/ switchand some of the computers are linked by 100 Mbps Cat5 Ethernet
cables.
 Laptops are linked by an 802.11g wireless networkwith an access port.
 All computers run Windows XP Professional except for the print servers and two
administrative computers, whichrun Windows98.
Protection offered for ABC Network.
Remote access to a network is needed off the hours, but it increases the security risk, that needs
monitoring. To prevent such risks, FIREWALLSare activeto monitor egress and ingress routing
of information.
 ACLhas beenusedfor ALL IP addressandmonitoringof Firewall logswill bedone
daily.Therefore,employeesrequestedto checkwhat/howtheyareaccessing
information.
 Perimeterfirewall protectscomputersonnetworkfromthreatby makingthem
invisible.
 USE STRONG PASSWORD-canbe hacked by hackers by using automated tools,
therefore employees must ensure they keep password combination of letters, numbers
and characters and NOTjust simple dictionary words. BRUTE FORCE – mechanism is
required to hack difficultcombinations, hence are safe. For example-j32hdtuaq!>M?
PASSWORD isdifficultto breakin than WElCOME,HELLO,USERNAME orEmails.
USE WIRELESS NETWORK ACCESS POINT SECURITY
Wireless Networksuse Radio link instead of cables to connectto computers, therefore intruders
to enter into the network is easy.
802.11 security standards are used between access points and wireless host.
Drive by hackers; lurk into the network, by using employee’s credentials. The wireless access
points are double secured
 Initial authentication
 Encryptionofmessagesfor confidentiality,authentication,andmessage
integrity
Restricted access to wireless network willbe provided after officehours. WPA2, Wi-FiAlliance
marked products are placed at the company to improve information security and minimize
impersonation.
If employees, feel or see any suspicious or malicious content, please immediately report to IT
and security teams. The most common threats from wireless technologies are:
 Threats
 Eavesdropping
 Data modification
 Impersonation
Cost and time estimate
The individual cost of the equipments are given below:
Equipments Quantity Total
NetworkInterface Cards Pack $119.95
Routers (Internal routers and border routers) 2 $24,048
Switches 3 $1200
Access Points (40m x 40 m square) 10 $1700
Printers 1 $800
VoIP Phones - voiceover IP phones 1 $159
RFID tags Pack $54
Optical cable (OM4) 5 $999.5
UTP cable (CAT 6) 11 $73.92
Server/Data server 2 $11,894
Desktop/laptop/PC 6 $42699.94
Surveillance cameras 6 $479.94
Powerover Ethernet 7 $330
The approximate cost for the overall network setup is presumed to be around USD44,110.23.
We have taken the best quality products and equipment forour set up. Weare planning to get it
done by 9 weekswithout any intervention of natural calamities.
Reference
1. BusinessDataNetworksandSecurity10thEdition
by Raymond R. Panko (Author), Julia L. Panko (Author)
2. NSN.com
Sreejith Ammanathil, Neelabja Manna, Meghna Gupta
Data Communication and Networking
MSIS_567N_256_16S
May 10, 2016

More Related Content

What's hot

4g wireless technology
4g wireless technology 4g wireless technology
4g wireless technology hardik_khengar
 
4G WIRELESS TECHNOLOGY
4G WIRELESS TECHNOLOGY4G WIRELESS TECHNOLOGY
4G WIRELESS TECHNOLOGYTarun chandel
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal PresentationJan Aldrich Dorado
 
Shakhawat Hossain (062364056)
Shakhawat Hossain (062364056)Shakhawat Hossain (062364056)
Shakhawat Hossain (062364056)mashiur
 
4 g technology
4 g technology4 g technology
4 g technologyBeena Jain
 
Presenting 4 g technology
Presenting 4 g technologyPresenting 4 g technology
Presenting 4 g technologynsowmiya49
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-FiBhushan Jadhav
 
Kanazia ftth presentation
Kanazia ftth presentationKanazia ftth presentation
Kanazia ftth presentationaaack2362e
 
Seminar on 4G Wireless Communication
Seminar on 4G Wireless CommunicationSeminar on 4G Wireless Communication
Seminar on 4G Wireless CommunicationShubham Roy
 
Lifi technology presentation
Lifi technology presentation Lifi technology presentation
Lifi technology presentation ShivPatel206800
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technologyRashmi Joaa
 
Automating the Design of ftth Networks
Automating the Design of ftth NetworksAutomating the Design of ftth Networks
Automating the Design of ftth NetworksEsri
 
In building solutions ibs using distributed antenna system
In building solutions  ibs  using distributed antenna systemIn building solutions  ibs  using distributed antenna system
In building solutions ibs using distributed antenna systemIAEME Publication
 
Wireless Communication Technologies (WIFI ,Bluetooth , NFC )
Wireless Communication Technologies (WIFI ,Bluetooth , NFC )Wireless Communication Technologies (WIFI ,Bluetooth , NFC )
Wireless Communication Technologies (WIFI ,Bluetooth , NFC )layth jasim
 
Comm scope anixter-vision nyc das combined
Comm scope anixter-vision nyc das combinedComm scope anixter-vision nyc das combined
Comm scope anixter-vision nyc das combinedVision_Tech_Inc
 

What's hot (20)

WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
Wifi Technology
Wifi TechnologyWifi Technology
Wifi Technology
 
4g wireless technology
4g wireless technology 4g wireless technology
4g wireless technology
 
4G WIRELESS TECHNOLOGY
4G WIRELESS TECHNOLOGY4G WIRELESS TECHNOLOGY
4G WIRELESS TECHNOLOGY
 
4 g
4 g4 g
4 g
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal Presentation
 
4g technology
4g technology4g technology
4g technology
 
Shakhawat Hossain (062364056)
Shakhawat Hossain (062364056)Shakhawat Hossain (062364056)
Shakhawat Hossain (062364056)
 
4 g technology
4 g technology4 g technology
4 g technology
 
Presenting 4 g technology
Presenting 4 g technologyPresenting 4 g technology
Presenting 4 g technology
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Kanazia ftth presentation
Kanazia ftth presentationKanazia ftth presentation
Kanazia ftth presentation
 
Seminar on 4G Wireless Communication
Seminar on 4G Wireless CommunicationSeminar on 4G Wireless Communication
Seminar on 4G Wireless Communication
 
Lifi technology presentation
Lifi technology presentation Lifi technology presentation
Lifi technology presentation
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technology
 
Automating the Design of ftth Networks
Automating the Design of ftth NetworksAutomating the Design of ftth Networks
Automating the Design of ftth Networks
 
In building solutions ibs using distributed antenna system
In building solutions  ibs  using distributed antenna systemIn building solutions  ibs  using distributed antenna system
In building solutions ibs using distributed antenna system
 
Wireless Communication Technologies (WIFI ,Bluetooth , NFC )
Wireless Communication Technologies (WIFI ,Bluetooth , NFC )Wireless Communication Technologies (WIFI ,Bluetooth , NFC )
Wireless Communication Technologies (WIFI ,Bluetooth , NFC )
 
Comm scope anixter-vision nyc das combined
Comm scope anixter-vision nyc das combinedComm scope anixter-vision nyc das combined
Comm scope anixter-vision nyc das combined
 
3G
3G3G
3G
 

Similar to final doc

A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyaravindhawan
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology WriteupShital Kat
 
Structured cabling defined
Structured cabling definedStructured cabling defined
Structured cabling definedvaleribell
 
Jayeed 062424056 Ete605 Sec 2
Jayeed 062424056 Ete605 Sec 2Jayeed 062424056 Ete605 Sec 2
Jayeed 062424056 Ete605 Sec 2mashiur
 
Nt1310 Unit 8 Network Components
Nt1310 Unit 8 Network ComponentsNt1310 Unit 8 Network Components
Nt1310 Unit 8 Network ComponentsLisa Williams
 
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)SANTIAGO PABLO ALBERTO
 
"Islands of Connectivity" are harming profitability and slowing growth
"Islands of Connectivity" are harming profitability and slowing growth"Islands of Connectivity" are harming profitability and slowing growth
"Islands of Connectivity" are harming profitability and slowing growthMestizo Enterprises
 
Industrial Wireless Networking Solutions
Industrial Wireless Networking SolutionsIndustrial Wireless Networking Solutions
Industrial Wireless Networking SolutionsAssim Magid
 

Similar to final doc (20)

5G 2
5G 25G 2
5G 2
 
44.pptx
44.pptx44.pptx
44.pptx
 
GPON Primer
GPON PrimerGPON Primer
GPON Primer
 
Final project report
Final project reportFinal project report
Final project report
 
Lanvisn™ Clouds
Lanvisn™ Clouds Lanvisn™ Clouds
Lanvisn™ Clouds
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
 
Xyz company
Xyz companyXyz company
Xyz company
 
WiFi technology Writeup
WiFi technology WriteupWiFi technology Writeup
WiFi technology Writeup
 
Wifi
WifiWifi
Wifi
 
Structured cabling defined
Structured cabling definedStructured cabling defined
Structured cabling defined
 
Ethernet and LIFI
Ethernet and LIFIEthernet and LIFI
Ethernet and LIFI
 
Jayeed 062424056 Ete605 Sec 2
Jayeed 062424056 Ete605 Sec 2Jayeed 062424056 Ete605 Sec 2
Jayeed 062424056 Ete605 Sec 2
 
Nt1310 Unit 8 Network Components
Nt1310 Unit 8 Network ComponentsNt1310 Unit 8 Network Components
Nt1310 Unit 8 Network Components
 
5G perfect align
5G perfect align5G perfect align
5G perfect align
 
5 g-ppt
5 g-ppt5 g-ppt
5 g-ppt
 
What is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdfWhat is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdf
 
5g tech
5g tech5g tech
5g tech
 
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
Conectividad inalámbrica para Internet de las cosas(Telecomunicaciones)
 
"Islands of Connectivity" are harming profitability and slowing growth
"Islands of Connectivity" are harming profitability and slowing growth"Islands of Connectivity" are harming profitability and slowing growth
"Islands of Connectivity" are harming profitability and slowing growth
 
Industrial Wireless Networking Solutions
Industrial Wireless Networking SolutionsIndustrial Wireless Networking Solutions
Industrial Wireless Networking Solutions
 

final doc

  • 1. For a world in motion™. As the world’s specialist in mobile broadband, we’ll help you enable your end users to do more than ever before with the world’s most efficient mobile networks, the intelligence to maximize their value and the services to make it all work together. From the first ever call on GSM, to the first call on LTE; we operate at the forefront of each generation of mobile technology. Our global experts invent the new capabilities you need in your networks. We provide the world’s most efficient mobile networks, the intelligence to maximize the value of those networks, and the services to make it all work together seamlessly. With an unswerving focus on quality, efficiency and reliability we help you meet your mobile customers’ demands for universal content and connectivity more efficiently and effectively. Together, we deliver the innovations in mobile technology that enable people and businesses everywhere to do more than ever before. As a mobile operator, you face challenges from many sides that put your mobile network and your business model under extreme pressure. By transforming your mobile network and your business, you’ll turn your challenges into opportunities. Working closely with you, we deliver the products and services that will help drive your success - today and tomorrow.
  • 2. Abstract Telecommunications carriers and serviceproviders are facing issues of traffic loss and delay due to multiple fibre cuts and failures. The key challenges operators are facing today is offering high service level availability to its customers which can be achieved through highly automated resilient networks. As technology advances in society the need for wired and wireless networking has become essential. With the advent of new networking technologies with their advantages and disadvantages, like security, the hardware requirements, the range and benefits are different. Wireless networking takes into consideration the range, mobility, and the several types of hardware components needed to establish a wireless network. Considering all the technological advances SNM Networks provides network solution for ABC technologies. Introduction Wireless networks have given a privilege to organizations to have fewercables and slightly less management, but few more hardware component. In order to offermobility and future ready services, networkdesigned forABC technologies comprises of both wireless and wired network. SNM has analysed the key requirements of ABC technologies and crafted a comprehensive solution that willfulfill the ABC’s current and future business needs. BusinessIT Requirements 1. Setup a network forits officein Georgia (head office) and branch in New York. 2. Officemust have following 3. Setup of meeting conferenceroom with VoIP phones and must have surveillance camera through-out the office. 4. Full Wi-Fi access with 802.11i security protection. 5. Should have backup connectionin case of network failure. 6. A printer for each officewhichcan be accessed by all the systems within the office. 7. Networkoutage and maintenance need to be informed 2 weeks prior. 8. RFID flooraccess will be maintained by Honeywell systems and data should be incorporated within their servers. 9. Total cost of installation should not exceed USD 50,000 10. Maximum time forinstalling the network is 12 weeks. Technical Solutionoffered 1. To connectofficesin Georgia and branch officein New Yorkwe are using WAN. 2. PowerOverEthernet 3. Optical cable(OM4) 4. CAT 6 UTP 5. Surveillance camera 6. Opted for carrier XYZwhichuses two different POPstoconnect Primary and backup networks. 7. Wi-Fi access point with 40*40 meter square 802.1x mode 8. Print server application forconnecting all the systems with one printer
  • 3. HardwareComponents Major Networking Hardware Components a. NetworkInterface Cards b. Routers (Internal routers and border routers) c. Switches d. Access Points (40m x 40 m square) - coverage area e. Printers f. VoIP Phones - voiceover IP phones g. RFID tags h. Optical cable i. UTP cable j. Server/Data server k. Desktop/laptop/PC l. Surveillance cameras m. Powerover Ethernet a. NIC- A NIC is a devicethat connects a computer or other device to a network. For computers, the NIC is usually installed in an expansion slot and has a chip that handles the physical and data-link layers of networkcommunications. (Cert.org/Tech). b. Modem is designed to operate using yourexisting cable lines. Cable internet has a high bandwidth and can support most, if not, all applications, ABC technologies is using. c. A router is a devicethat routes data from one network to another network. A router is connected to at least twonetworks, commonly two networksor a networkand its ISP's network. A router allows for everyoneon the networkto access the internet. d. Another key component is a print server. A print server is used to connectprinters to a networkto allow fornetwork printing. The server will actas a buffer;storing the messaging and printing them in order of the queue. This device can drastically reduce the cost of networking because now everyone can use the same printer without having a printer attached to every computer. e. A hub is a deviceoffered to connects the cables from computers and other devices such as printers in a network.Traditionally, hubs are used forstar topology networks, but they are offeredto use with other configurations to make it easy to add and remove computers without bringing down the network. f. A switch is a device similar to a hub that enables the connectionof multiple computers, access points, and other networkenabled devices. The differencebetween a hub and a switchis that a switchfilters the data that passes through it, whereas hub does not. g. Print server is used to connectprinters to a network to allow fornetwork printing. The server will act as a buffer;storing the messaging and printing them in order of the queue. This device can drastically reduce the cost of networking because now everyonecan use the same printer without having a printer attached to every computer. h. A VoIP phone or IP phone uses Voice overIP technologies for placing and transmitting telephone calls over an IP network,such as the Internet, instead of the traditional public switched telephone network(PSTN).It is cheap as voice is compressed in IP data network.
  • 4. i. Radio-frequencyidentification (RFID)uses electromagneticfieldsto automaticallyidentify and tracktags attached to objects. Offered with Access card _manual and a scanningunit at office premises,like conferencing room and entry terminal. j. Optical cables are offeredfor inter building connectivity.Single mode optical fibre OM4 with fullduplex communication is used to offerconnectivity k. UTP cable (Unshielded twisted pair) is used within both officesforconnectivity. l. Desktop/ PC are offeredfor workpurposes. m. Security/surveillance cameras are a great way to provide security foryour home or workplace.As wellas providing youwith video footageof any events that may happen, they also act as a visible deterrent to criminals. Technologiesoffered a. Powerover Ethernet (POE) plus,this is sufficientfor voiceoverIP phones, surveillance cameras, and most access points. This saves money because there is no need to install power lines to these devices. b. WAN- Wide Area Networkwill connecttwoofficesites via different RoW(Rights of Way). c. LAN- Local area network whichconnects the local officepremises at both the sites. d. Wireless access -802.11i in 802.1x whichwill provide full wireless access for the employees. Time and cost savings - Networkcables do not require an electrician to fit them, and can be located anywhere. POE has many applications, but are offered forthree key areas: VoIPphones - the original POE application. Using POE means phones have a single connection to a wall socket, and can be remotely powered down, just like with the older analog systems. IP cameras - POE is now ubiquitous on networked surveillance cameras, where it enables fast deployment and easy repositioning. Wireless– Wi-fiand Bluetooth APs and RFIDreaders are commonly PoE-compatible,to allow remote locationaway fromAC outlets, and relocation followingsite surveys. Flexibility - without being tethered to an electrical outlet, devices such as IP cameras and wireless access points can be located wherever they are needed most, and repositioned easily if required. Advantages: Safety - POE delivery is intelligent, and designed to protect networkequipment fromoverload, under -powering, or incorrect installation. Reliability - It can be backed-up by an uninterruptible powersupply, or controlled to easily disable or reset devices. Scalability - having power available on the network means that installation and distribution of networkconnections is simple and effective.
  • 5. Technical AssumptionsandDimensioningParameters The prerequisites and assumptions taken while planning the networkand preparation of the solution are mentioned below: a. The Access points gives the coverage of 40 meters and 40-meter square b. Twodifferent officesare interconnected via WANnetwork, 1st office100 meter length and 80 meters wide, and 2nd office80 meter length and 60 meter are connected by optical cable c. In office1, there are two windowsplanned to minimize dead zones. Office1is in New Yorkand office2 is in Georgia. d. To connecttwo buildings, optical cable is used. NetworkcomponentandSystems  Desktops 4 or 5  Laptop computers: Printers: Two(one printer forconfidential printing and one printer- fax combounit for general use)  Servers: One (running Small Business Serve, looking after files, the Internet connection, e-mail, and our customer database)  Internet connection:50 Mbps cable modem connection.  The server/ switchand some of the computers are linked by 100 Mbps Cat5 Ethernet cables.  Laptops are linked by an 802.11g wireless networkwith an access port.  All computers run Windows XP Professional except for the print servers and two administrative computers, whichrun Windows98. Protection offered for ABC Network. Remote access to a network is needed off the hours, but it increases the security risk, that needs monitoring. To prevent such risks, FIREWALLSare activeto monitor egress and ingress routing of information.  ACLhas beenusedfor ALL IP addressandmonitoringof Firewall logswill bedone daily.Therefore,employeesrequestedto checkwhat/howtheyareaccessing information.  Perimeterfirewall protectscomputersonnetworkfromthreatby makingthem invisible.  USE STRONG PASSWORD-canbe hacked by hackers by using automated tools, therefore employees must ensure they keep password combination of letters, numbers and characters and NOTjust simple dictionary words. BRUTE FORCE – mechanism is required to hack difficultcombinations, hence are safe. For example-j32hdtuaq!>M? PASSWORD isdifficultto breakin than WElCOME,HELLO,USERNAME orEmails. USE WIRELESS NETWORK ACCESS POINT SECURITY Wireless Networksuse Radio link instead of cables to connectto computers, therefore intruders to enter into the network is easy. 802.11 security standards are used between access points and wireless host.
  • 6. Drive by hackers; lurk into the network, by using employee’s credentials. The wireless access points are double secured  Initial authentication  Encryptionofmessagesfor confidentiality,authentication,andmessage integrity Restricted access to wireless network willbe provided after officehours. WPA2, Wi-FiAlliance marked products are placed at the company to improve information security and minimize impersonation. If employees, feel or see any suspicious or malicious content, please immediately report to IT and security teams. The most common threats from wireless technologies are:  Threats  Eavesdropping  Data modification  Impersonation Cost and time estimate The individual cost of the equipments are given below: Equipments Quantity Total NetworkInterface Cards Pack $119.95 Routers (Internal routers and border routers) 2 $24,048 Switches 3 $1200 Access Points (40m x 40 m square) 10 $1700 Printers 1 $800 VoIP Phones - voiceover IP phones 1 $159 RFID tags Pack $54 Optical cable (OM4) 5 $999.5 UTP cable (CAT 6) 11 $73.92 Server/Data server 2 $11,894 Desktop/laptop/PC 6 $42699.94 Surveillance cameras 6 $479.94 Powerover Ethernet 7 $330
  • 7. The approximate cost for the overall network setup is presumed to be around USD44,110.23. We have taken the best quality products and equipment forour set up. Weare planning to get it done by 9 weekswithout any intervention of natural calamities. Reference 1. BusinessDataNetworksandSecurity10thEdition by Raymond R. Panko (Author), Julia L. Panko (Author) 2. NSN.com Sreejith Ammanathil, Neelabja Manna, Meghna Gupta Data Communication and Networking MSIS_567N_256_16S May 10, 2016