1. For a world in motion™.
As the world’s specialist in mobile broadband, we’ll help you enable your end users to do more than ever before with the
world’s most efficient mobile networks, the intelligence to maximize their value and the services to make it all work
together.
From the first ever call on GSM, to the first call on LTE; we operate at the forefront of each generation of mobile technology.
Our global experts invent the new capabilities you need in your networks. We provide the world’s most efficient mobile
networks, the intelligence to maximize the value of those networks, and the services to make it all work together seamlessly.
With an unswerving focus on quality, efficiency and reliability we help you meet your mobile customers’ demands for
universal content and connectivity more efficiently and effectively.
Together, we deliver the innovations in mobile technology that enable people and businesses everywhere to do more than
ever before.
As a mobile operator, you face challenges from many sides that put your mobile network and your business model under
extreme pressure.
By transforming your mobile network and your business, you’ll turn your challenges into opportunities.
Working closely with you, we deliver the products and services that will help drive your success - today and tomorrow.
2. Abstract
Telecommunications carriers and serviceproviders are facing issues of traffic loss and delay
due to multiple fibre cuts and failures. The key challenges operators are facing today is offering
high service level availability to its customers which can be achieved through highly automated
resilient networks.
As technology advances in society the need for wired and wireless networking has become
essential. With the advent of new networking technologies with their advantages and
disadvantages, like security, the hardware requirements, the range and benefits are
different. Wireless networking takes into consideration the range, mobility, and the several
types of hardware components needed to establish a wireless network. Considering all the
technological advances SNM Networks provides network solution for ABC technologies.
Introduction
Wireless networks have given a privilege to organizations to have fewercables and slightly less
management, but few more hardware component.
In order to offermobility and future ready services, networkdesigned forABC technologies
comprises of both wireless and wired network.
SNM has analysed the key requirements of ABC technologies and crafted a comprehensive
solution that willfulfill the ABC’s current and future business needs.
BusinessIT Requirements
1. Setup a network forits officein Georgia (head office) and branch in New York.
2. Officemust have following
3. Setup of meeting conferenceroom with VoIP phones and must have surveillance camera
through-out the office.
4. Full Wi-Fi access with 802.11i security protection.
5. Should have backup connectionin case of network failure.
6. A printer for each officewhichcan be accessed by all the systems within the office.
7. Networkoutage and maintenance need to be informed 2 weeks prior.
8. RFID flooraccess will be maintained by Honeywell systems and data should be
incorporated within their servers.
9. Total cost of installation should not exceed USD 50,000
10. Maximum time forinstalling the network is 12 weeks.
Technical Solutionoffered
1. To connectofficesin Georgia and branch officein New Yorkwe are using WAN.
2. PowerOverEthernet
3. Optical cable(OM4)
4. CAT 6 UTP
5. Surveillance camera
6. Opted for carrier XYZwhichuses two different POPstoconnect Primary and backup
networks.
7. Wi-Fi access point with 40*40 meter square 802.1x mode
8. Print server application forconnecting all the systems with one printer
3. HardwareComponents
Major Networking Hardware Components
a. NetworkInterface Cards
b. Routers (Internal routers and border routers)
c. Switches
d. Access Points (40m x 40 m square) - coverage area
e. Printers
f. VoIP Phones - voiceover IP phones
g. RFID tags
h. Optical cable
i. UTP cable
j. Server/Data server
k. Desktop/laptop/PC
l. Surveillance cameras
m. Powerover Ethernet
a. NIC- A NIC is a devicethat connects a computer or other device to a network. For
computers, the NIC is usually installed in an expansion slot and has a chip that handles the
physical and data-link layers of networkcommunications. (Cert.org/Tech).
b. Modem is designed to operate using yourexisting cable lines. Cable internet has a high
bandwidth and can support most, if not, all applications, ABC technologies is using.
c. A router is a devicethat routes data from one network to another network. A router is
connected to at least twonetworks, commonly two networksor a networkand its ISP's
network. A router allows for everyoneon the networkto access the internet.
d. Another key component is a print server. A print server is used to connectprinters to a
networkto allow fornetwork printing. The server will actas a buffer;storing the messaging
and printing them in order of the queue. This device can drastically reduce the cost of
networking because now everyone can use the same printer without having a printer attached
to every computer.
e. A hub is a deviceoffered to connects the cables from computers and other devices such
as printers in a network.Traditionally, hubs are used forstar topology networks, but they are
offeredto use with other configurations to make it easy to add and remove computers without
bringing down the network.
f. A switch is a device similar to a hub that enables the connectionof multiple computers,
access points, and other networkenabled devices. The differencebetween a hub and a switchis
that a switchfilters the data that passes through it, whereas hub does not.
g. Print server is used to connectprinters to a network to allow fornetwork printing. The
server will act as a buffer;storing the messaging and printing them in order of the queue. This
device can drastically reduce the cost of networking because now everyonecan use the same
printer without having a printer attached to every computer.
h. A VoIP phone or IP phone uses Voice overIP technologies for placing and transmitting
telephone calls over an IP network,such as the Internet, instead of the traditional public
switched telephone network(PSTN).It is cheap as voice is compressed in IP data network.
4. i. Radio-frequencyidentification (RFID)uses electromagneticfieldsto automaticallyidentify
and tracktags attached to objects. Offered with Access card _manual and a scanningunit at office
premises,like conferencing room and entry terminal.
j. Optical cables are offeredfor inter building connectivity.Single mode optical fibre OM4
with fullduplex communication is used to offerconnectivity
k. UTP cable (Unshielded twisted pair) is used within both officesforconnectivity.
l. Desktop/ PC are offeredfor workpurposes.
m. Security/surveillance cameras are a great way to provide security foryour home or
workplace.As wellas providing youwith video footageof any events that may happen, they also
act as a visible deterrent to criminals.
Technologiesoffered
a. Powerover Ethernet (POE) plus,this is sufficientfor voiceoverIP phones, surveillance
cameras, and most access points. This saves money because there is no need to install power
lines to these devices.
b. WAN- Wide Area Networkwill connecttwoofficesites via different RoW(Rights of
Way).
c. LAN- Local area network whichconnects the local officepremises at both the sites.
d. Wireless access -802.11i in 802.1x whichwill provide full wireless access for the
employees.
Time and cost savings - Networkcables do not require an electrician to fit them, and can be
located anywhere.
POE has many applications, but are offered forthree key areas:
VoIPphones - the original POE application. Using POE means phones have a single connection
to a wall socket, and can be remotely powered down, just like with the older analog systems.
IP cameras - POE is now ubiquitous on networked surveillance cameras, where it enables fast
deployment and easy repositioning.
Wireless– Wi-fiand Bluetooth APs and RFIDreaders are commonly PoE-compatible,to allow
remote locationaway fromAC outlets, and relocation followingsite surveys.
Flexibility - without being tethered to an electrical outlet, devices such as IP cameras and
wireless access points can be located wherever they are needed most, and repositioned easily if
required.
Advantages:
Safety - POE delivery is intelligent, and designed to protect networkequipment fromoverload,
under -powering, or incorrect installation.
Reliability - It can be backed-up by an uninterruptible powersupply, or controlled to easily
disable or reset devices.
Scalability - having power available on the network means that installation and distribution of
networkconnections is simple and effective.
5. Technical AssumptionsandDimensioningParameters
The prerequisites and assumptions taken while planning the networkand preparation of the
solution are mentioned below:
a. The Access points gives the coverage of 40 meters and 40-meter square
b. Twodifferent officesare interconnected via WANnetwork, 1st office100 meter length
and 80 meters wide, and 2nd office80 meter length and 60 meter are connected by optical cable
c. In office1, there are two windowsplanned to minimize dead zones. Office1is in New
Yorkand office2 is in Georgia.
d. To connecttwo buildings, optical cable is used.
NetworkcomponentandSystems
Desktops 4 or 5
Laptop computers: Printers: Two(one printer forconfidential printing and one printer-
fax combounit for general use)
Servers: One (running Small Business Serve, looking after files, the Internet connection,
e-mail, and our customer database)
Internet connection:50 Mbps cable modem connection.
The server/ switchand some of the computers are linked by 100 Mbps Cat5 Ethernet
cables.
Laptops are linked by an 802.11g wireless networkwith an access port.
All computers run Windows XP Professional except for the print servers and two
administrative computers, whichrun Windows98.
Protection offered for ABC Network.
Remote access to a network is needed off the hours, but it increases the security risk, that needs
monitoring. To prevent such risks, FIREWALLSare activeto monitor egress and ingress routing
of information.
ACLhas beenusedfor ALL IP addressandmonitoringof Firewall logswill bedone
daily.Therefore,employeesrequestedto checkwhat/howtheyareaccessing
information.
Perimeterfirewall protectscomputersonnetworkfromthreatby makingthem
invisible.
USE STRONG PASSWORD-canbe hacked by hackers by using automated tools,
therefore employees must ensure they keep password combination of letters, numbers
and characters and NOTjust simple dictionary words. BRUTE FORCE – mechanism is
required to hack difficultcombinations, hence are safe. For example-j32hdtuaq!>M?
PASSWORD isdifficultto breakin than WElCOME,HELLO,USERNAME orEmails.
USE WIRELESS NETWORK ACCESS POINT SECURITY
Wireless Networksuse Radio link instead of cables to connectto computers, therefore intruders
to enter into the network is easy.
802.11 security standards are used between access points and wireless host.
6. Drive by hackers; lurk into the network, by using employee’s credentials. The wireless access
points are double secured
Initial authentication
Encryptionofmessagesfor confidentiality,authentication,andmessage
integrity
Restricted access to wireless network willbe provided after officehours. WPA2, Wi-FiAlliance
marked products are placed at the company to improve information security and minimize
impersonation.
If employees, feel or see any suspicious or malicious content, please immediately report to IT
and security teams. The most common threats from wireless technologies are:
Threats
Eavesdropping
Data modification
Impersonation
Cost and time estimate
The individual cost of the equipments are given below:
Equipments Quantity Total
NetworkInterface Cards Pack $119.95
Routers (Internal routers and border routers) 2 $24,048
Switches 3 $1200
Access Points (40m x 40 m square) 10 $1700
Printers 1 $800
VoIP Phones - voiceover IP phones 1 $159
RFID tags Pack $54
Optical cable (OM4) 5 $999.5
UTP cable (CAT 6) 11 $73.92
Server/Data server 2 $11,894
Desktop/laptop/PC 6 $42699.94
Surveillance cameras 6 $479.94
Powerover Ethernet 7 $330
7. The approximate cost for the overall network setup is presumed to be around USD44,110.23.
We have taken the best quality products and equipment forour set up. Weare planning to get it
done by 9 weekswithout any intervention of natural calamities.
Reference
1. BusinessDataNetworksandSecurity10thEdition
by Raymond R. Panko (Author), Julia L. Panko (Author)
2. NSN.com
Sreejith Ammanathil, Neelabja Manna, Meghna Gupta
Data Communication and Networking
MSIS_567N_256_16S
May 10, 2016