SlideShare a Scribd company logo
1 of 10
Download to read offline
City University
Project
On
Network Design of BASIS office
Course Title: Computer Networks Laboratory
Course Code: CSE 318
Submitted To
Pranab Bandhu Nath
Senior Lecturer,
Department of CSE
City University.
Submitted By
Md Selim Hossain
181472561
47th
Batch
Screenshot from video:
Bangladesh Association of Software and Information Services
(BASIS)
Abstract:
The paper outline the steps involved in structure network design and deployment for a small office
need. It present the steps of a structured network design and demon started a practical
implementation of the steps using a real-life casestudy. The design is simulated using Cisco Packet
Trace software and Wire Shark protocol analyzer.
Introduction:
Extensive planning should go into a network implementation. Just like any project, need is
identified and then a plan outlines are process from beginning to end. A good project plan will
help identify any strengths, weaknesses, opportunities, or threats. The plan should clearly define
the tasks, and the order in which tasks are completed.
Project Plan:
It is important to have a formal planning procedure for any nontrivial project. It is sometimes
argued that most projects involve modifications of existing systems, and therefore formal system
planning is too time consuming and offers meager benefits. Before creating a project, we need to
determine what we will use the project for. After that the components have to be determined
according to the work. Every task from start to finish has to be completed step by step. All the PCs
that we will use in this project will be able to communicate with each other. The PCs will be
connected via CAT-6 UTP cable and switch. We will use 2 servers here. Web server and DNS
server. I will use the web server to communicate between the client and the server using HTTP
and the computers will have a DNS server to communicate with each other by translating the
numeric IP addresses.
BASIS Floor - 01
Logical Diagram
Physical Diagram
BITM Floor - 02
Logical Diagram
Physical Diagram
Overall Logical Daigram View
Overall Physical Diagram View
Importance of Network Design:
When start-ups or expanding businesses map out a network for their business, it’s
common to have the tendency to take a shortcut or skip the planning phase in the
attempt to get it online immediately. It’s best to note that all networks with
impressive security come from impressive network design plans, and not just an
after-thought. We can easily make out a well-thought-out network design from that
of being pieced together in sections over time. Good networks work fast and smooth.
Our business’ network should have a good platform for our business or office
applications. Good network design plans consider possible changes that may occur
in our business without the need for a total redesign. Our team is only as effective
as the IT resources and network they’re using every day. To get the most out of the
work performance, we need to invest in a properly laid out network infrastructure.
Device Cost
Device Price (BDT) Number of Devices Total Price (BDT)
HP Pro One 400 G6 Core
i5 10th Gen All in One
PC
69,500 37 2,57,1500
TP-Link Archer AX50
AX3000 3000 Mbps
Gigabit Dual-Band Wi-
Fi 6 Router
12,250 1 12,250
Cisco SG350-28P 28-
Port Gigabit oE
Managed Switch
37,500 9 337,500
Logitech C920E Pro
Full HD Webcam
10,000 12 120,000
Transtec INVERTER
Split Air Conditioner
51,000 9 459,000
Smart Window &
Door
40,000 14 560,000
Server setup (4h) 2,100 2 16,800
x 4hr each)
HP Laser Jet Pro MFP
M227fdn Multifunction
Printer
31,500 5 157,500
Cat-6 UTP cabling
Used for the majority
of the network
60 300ft 18,000
Cable lock: Kensington
K64615US Pick-
resistant lock; cut-
resistant 8ft cable
2000 4 8,000
Smart Phone 50,000 1 50,000
Xiaomi Smart Home
Gateway
7,500 1 7,500
Total Cost=4318050
Physical Security:
The first level of security in any computer network is physical security. Physical
security is important for workstations but vital for servers. Any hacker worth his or
her salt can quickly defeat all but the most paranoid security measures if he or she
can gain physical access to a server. We have to take some step to make security
strong. They are -
• Lock the computer room.
• Give the keys only to people you trust.
• Keep track of who has the keys.
• Mount the servers on cases or racks that have locks.
• Disable the floppy drive on the server.
Advantage of Network design:
1. Efficient Network Performance.
2. Allows Resilience.
3. Makes Room for Scalability.
4. Work Collaboration Made Easier.
5. Speed Increase.
Disadvantage of Network design:
The approach may not take all necessary applications and services into consideration,
leading to a design that ultimately may not meet the needs of an organization, and may
need to be redesigned in the future.
Conclusion:
A secure network diagram needs to be created for network design. Because the success
of an organization depends on its network security.

More Related Content

What's hot

Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorIRJET Journal
 
How to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsHow to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsReal-Time Innovations (RTI)
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019Zscaler
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET Journal
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiespavan penugonda
 
Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Open Networking Summits
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Real-Time Innovations (RTI)
 
L'Internet des objets (IDO)
L'Internet des objets (IDO)L'Internet des objets (IDO)
L'Internet des objets (IDO)Cisco Canada
 
What is Web-Scale IT ?
What is Web-Scale IT ?What is Web-Scale IT ?
What is Web-Scale IT ?Ahmed Banafa
 
Cloud Network Technology Development & Deployment Trends
Cloud Network  Technology Development & Deployment TrendsCloud Network  Technology Development & Deployment Trends
Cloud Network Technology Development & Deployment TrendsHuawei Enterprise Hong Kong
 
Mainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT PlatformMainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT PlatformSasa Klopanovic
 
The Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security FirstThe Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security FirstDell World
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trustZscaler
 

What's hot (20)

Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
 
How to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsHow to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of Things
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
 
IoT-A ARM
IoT-A ARMIoT-A ARM
IoT-A ARM
 
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...IRJET -  	  Importance of Edge Computing and Cloud Computing in IoT Technolog...
IRJET - Importance of Edge Computing and Cloud Computing in IoT Technolog...
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
 
Jini technology ppt
Jini technology pptJini technology ppt
Jini technology ppt
 
Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...Virtual Application Networks Innovations Advance Software-defined Network Lea...
Virtual Application Networks Innovations Advance Software-defined Network Lea...
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?
 
L'Internet des objets (IDO)
L'Internet des objets (IDO)L'Internet des objets (IDO)
L'Internet des objets (IDO)
 
What is Web-Scale IT ?
What is Web-Scale IT ?What is Web-Scale IT ?
What is Web-Scale IT ?
 
Cloud Network Technology Development & Deployment Trends
Cloud Network  Technology Development & Deployment TrendsCloud Network  Technology Development & Deployment Trends
Cloud Network Technology Development & Deployment Trends
 
Mainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT PlatformMainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT Platform
 
The Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security FirstThe Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security First
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 

Similar to Network Design for BASIS Office

181472589 basis project report
181472589  basis project report181472589  basis project report
181472589 basis project reportIsmailSaruar
 
Bangladesh Computer Council Networking Project
Bangladesh Computer Council Networking ProjectBangladesh Computer Council Networking Project
Bangladesh Computer Council Networking ProjectMDMusab
 
Bcc network connection
Bcc network connectionBcc network connection
Bcc network connectionMDMusab
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
Software team linkedin
Software team linkedinSoftware team linkedin
Software team linkedinPrysmian Group
 
MobilFlex - POC - Brief - v1.0.pdf
MobilFlex - POC - Brief - v1.0.pdfMobilFlex - POC - Brief - v1.0.pdf
MobilFlex - POC - Brief - v1.0.pdfMihai Buta
 
The Case for Automated Network Diagramming a NetBrain WhitePaper
The Case for Automated Network Diagramming a NetBrain WhitePaperThe Case for Automated Network Diagramming a NetBrain WhitePaper
The Case for Automated Network Diagramming a NetBrain WhitePaperKen Flott
 
ITT CNS Capstone Project
ITT CNS Capstone ProjectITT CNS Capstone Project
ITT CNS Capstone ProjectKyle Montoya
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docxhoney725342
 
OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?NAIM Networks, Inc.
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
181472561 presentation on computer networks
181472561 presentation on computer networks181472561 presentation on computer networks
181472561 presentation on computer networksMd Selim Hossain
 
Sdwan webinar
Sdwan webinarSdwan webinar
Sdwan webinarpmohapat
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks Abaram Network Solutions
 

Similar to Network Design for BASIS Office (20)

181472589 basis project report
181472589  basis project report181472589  basis project report
181472589 basis project report
 
Project
ProjectProject
Project
 
THESIS.pptx
THESIS.pptxTHESIS.pptx
THESIS.pptx
 
En35793797
En35793797En35793797
En35793797
 
Bangladesh Computer Council Networking Project
Bangladesh Computer Council Networking ProjectBangladesh Computer Council Networking Project
Bangladesh Computer Council Networking Project
 
Bcc network connection
Bcc network connectionBcc network connection
Bcc network connection
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrin
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Software team linkedin
Software team linkedinSoftware team linkedin
Software team linkedin
 
Final project report
Final project reportFinal project report
Final project report
 
MobilFlex - POC - Brief - v1.0.pdf
MobilFlex - POC - Brief - v1.0.pdfMobilFlex - POC - Brief - v1.0.pdf
MobilFlex - POC - Brief - v1.0.pdf
 
The Case for Automated Network Diagramming a NetBrain WhitePaper
The Case for Automated Network Diagramming a NetBrain WhitePaperThe Case for Automated Network Diagramming a NetBrain WhitePaper
The Case for Automated Network Diagramming a NetBrain WhitePaper
 
ITT CNS Capstone Project
ITT CNS Capstone ProjectITT CNS Capstone Project
ITT CNS Capstone Project
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?OVNC 2015-Software-Defined Networking: Where Are We Today?
OVNC 2015-Software-Defined Networking: Where Are We Today?
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
181472561 presentation on computer networks
181472561 presentation on computer networks181472561 presentation on computer networks
181472561 presentation on computer networks
 
Sdwan webinar
Sdwan webinarSdwan webinar
Sdwan webinar
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 

Recently uploaded

CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 

Recently uploaded (20)

CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 

Network Design for BASIS Office

  • 1. City University Project On Network Design of BASIS office Course Title: Computer Networks Laboratory Course Code: CSE 318 Submitted To Pranab Bandhu Nath Senior Lecturer, Department of CSE City University. Submitted By Md Selim Hossain 181472561 47th Batch
  • 2. Screenshot from video: Bangladesh Association of Software and Information Services (BASIS)
  • 3. Abstract: The paper outline the steps involved in structure network design and deployment for a small office need. It present the steps of a structured network design and demon started a practical implementation of the steps using a real-life casestudy. The design is simulated using Cisco Packet Trace software and Wire Shark protocol analyzer. Introduction: Extensive planning should go into a network implementation. Just like any project, need is identified and then a plan outlines are process from beginning to end. A good project plan will help identify any strengths, weaknesses, opportunities, or threats. The plan should clearly define the tasks, and the order in which tasks are completed. Project Plan: It is important to have a formal planning procedure for any nontrivial project. It is sometimes argued that most projects involve modifications of existing systems, and therefore formal system planning is too time consuming and offers meager benefits. Before creating a project, we need to determine what we will use the project for. After that the components have to be determined according to the work. Every task from start to finish has to be completed step by step. All the PCs that we will use in this project will be able to communicate with each other. The PCs will be connected via CAT-6 UTP cable and switch. We will use 2 servers here. Web server and DNS server. I will use the web server to communicate between the client and the server using HTTP and the computers will have a DNS server to communicate with each other by translating the numeric IP addresses.
  • 4. BASIS Floor - 01 Logical Diagram Physical Diagram
  • 5. BITM Floor - 02 Logical Diagram Physical Diagram
  • 8. Importance of Network Design: When start-ups or expanding businesses map out a network for their business, it’s common to have the tendency to take a shortcut or skip the planning phase in the attempt to get it online immediately. It’s best to note that all networks with impressive security come from impressive network design plans, and not just an after-thought. We can easily make out a well-thought-out network design from that of being pieced together in sections over time. Good networks work fast and smooth. Our business’ network should have a good platform for our business or office applications. Good network design plans consider possible changes that may occur in our business without the need for a total redesign. Our team is only as effective as the IT resources and network they’re using every day. To get the most out of the work performance, we need to invest in a properly laid out network infrastructure. Device Cost Device Price (BDT) Number of Devices Total Price (BDT) HP Pro One 400 G6 Core i5 10th Gen All in One PC 69,500 37 2,57,1500 TP-Link Archer AX50 AX3000 3000 Mbps Gigabit Dual-Band Wi- Fi 6 Router 12,250 1 12,250 Cisco SG350-28P 28- Port Gigabit oE Managed Switch 37,500 9 337,500 Logitech C920E Pro Full HD Webcam 10,000 12 120,000 Transtec INVERTER Split Air Conditioner 51,000 9 459,000 Smart Window & Door 40,000 14 560,000 Server setup (4h) 2,100 2 16,800
  • 9. x 4hr each) HP Laser Jet Pro MFP M227fdn Multifunction Printer 31,500 5 157,500 Cat-6 UTP cabling Used for the majority of the network 60 300ft 18,000 Cable lock: Kensington K64615US Pick- resistant lock; cut- resistant 8ft cable 2000 4 8,000 Smart Phone 50,000 1 50,000 Xiaomi Smart Home Gateway 7,500 1 7,500 Total Cost=4318050 Physical Security: The first level of security in any computer network is physical security. Physical security is important for workstations but vital for servers. Any hacker worth his or her salt can quickly defeat all but the most paranoid security measures if he or she can gain physical access to a server. We have to take some step to make security strong. They are - • Lock the computer room. • Give the keys only to people you trust. • Keep track of who has the keys. • Mount the servers on cases or racks that have locks. • Disable the floppy drive on the server.
  • 10. Advantage of Network design: 1. Efficient Network Performance. 2. Allows Resilience. 3. Makes Room for Scalability. 4. Work Collaboration Made Easier. 5. Speed Increase. Disadvantage of Network design: The approach may not take all necessary applications and services into consideration, leading to a design that ultimately may not meet the needs of an organization, and may need to be redesigned in the future. Conclusion: A secure network diagram needs to be created for network design. Because the success of an organization depends on its network security.