Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Enterprise networking course work under NCC Education

204 views

Published on

Enterprise networking course work under NCC Education in June 2010

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Enterprise networking course work under NCC Education

  1. 1. Statement and Confirmation of Own Work Programme/Qualification name: Each NCC Education assessed assignment submitted by you must have this statement attached to the assignment as the cover page or it will not be accepted for marking. Please ensure that this statement is either firmly attached to the cover of the assignment or electronically inserted into the front of the assignment. Student declaration I have read and understood NCC Education’s Policy on Academic Dishonesty and Plagiarism. I can confirm the following details: Student ID/Registration number: Name: Centre Name: Module Name: Module Leader: Number of words: I confirm that this is my own work and that I have not plagiarized any part of it. I have also noted the assessment criteria and pass mark for assignments. Due Date: Student Signature: Submitted Date: Enterprise Networking June 2011 Final @NCC Education 2011
  2. 2. Acknowledgment: I am Md. Mahbub Alam is grateful to Daffodil Institute of IT (DIIT) for giving the chance to doing the assignment in the field of Enterprise networking and it’s such a pleasure to me. I am also grateful & like to express thanks to Mr. Sarwar Hossain Mollah Lecturer of Enterprise Networking of DIIT. His continues support, concentration & encouragement help me to complete this assignment. Huge unknown things are now know to me by doing this assignment. In class room we collect theoretical knowledge about Enterprise Networking but practically I gather knowledge by doing this assignment. It was a glorious memory by doing this assignment in my Life. Enterprise Networking June 2011 Final @NCC Education 2011
  3. 3. Introduction This is an assignment of “FURTHER EDUCATION COLLEGE” Wireless Network Design and development. The development procedure referenced by the institute named Daffodil institute of IT. For this assignment, I need to the entire network that will help the authority to storing and showing the information of organization and the access of internet. Thus I will create an appropriate documentation that will help me to develop the network completely. The documentation should include network equipment, cost of equipment and installation, Cost of operating the system, Building layout, Maintain security for all users, user access level on the entire network, implementation; the documentation also contains the limitation and future planning and user manual of the proposed network system. Enterprise Networking June 2011 Final @NCC Education 2011
  4. 4. Task 1: In this task I have to investigate which kind of wireless equipments are available in our country for large organizations based in a single building such as the college in the scenario. I also have to describe about:  The main equipment that will be install.  The how much features availability.  The cost of equipment and installation for the network.  The cost of operating the system. a) The main equipment that will be install: I investigated thoroughly number of vender devices which will be required to design to establish our collage wireless network. I have needed some devices which will be used to establish the collage wireless network, those are describing under the below: Wireless Network Adapter: Connect to wireless network by adding a D-Link Wireless N 150 Desktop Adapter to desktop computer. Once connected, It can share a high-speed Internet connection while also getting access to shared educational students transcripts, Documents, and Students documents with other computers on your network.ref-(i) Figure: DWA-525 Wireless N 150 PCI Adapter Enterprise Networking June 2011 Final @NCC Education 2011
  5. 5. Wireless Access Point: A wireless access point is more like a hub for wireless networks. It does not implement a different IP address range or provide the other features of a wireless router. It simply relays network traffic to the wireless devices within its broadcast range. Figure: The Wireless N Range Extender (DAP-1360) Wireless Switch: The DGS-1224TP is housed in a new style 19” rack mount case with an easy-to- view front panel and diagnostic LEDs. User-friendly, web-based management is supported for easy configuration and flexibility for different network requirements.ref-(ii) Figure: DGS-1224TP Web Smart 24-Port Gigabit PoE Switch with 4 Combo SFP Slots Server as a Router: Here I choose four servers. There is a Print server, one mail server, Web server with proxy server and last one is working as a router with firewall. Figure: HP server Enterprise Networking June 2011 Final @NCC Education 2011
  6. 6. b) The Available features and specifications: Wireless Network Adapter Features availability: ref-(i)  Compatible with Windows 7 32bit and 64bit  Enhanced Wireless Reception and Performance Based on 802.11n Technology  Better Wireless Technology - up to 4X Faster than Standard 802.11g*  Connect a Desktop PC to a Wireless Network Specifications ref-(i)  HIGH-SPEED WIRELESS NETWORKING  CONNECT SECURELY TO YOUR WIRELESS NETWORK  COMPATIBILITY ASSURANCE  EASY TO INSTALL & CONNECT Access Point Features availability: ref-(iii)  Create or Extend a Wireless Network in Your Home or Office  Easy to Install and Connect with Wi-Fi Protected Setup™  Secure Wireless Encryption Using WPA/WPA2 Security  Multiple modes: Access Point, Bridge with Access Point, Repeater, or Wireless Client Specifications ref-(iv)  2 External Detachable Antennas  Internet Explorer® v7 or Later; Mozilla® Firefox® v3.0 or Later; or other Java-enabled Browsers  Item (HxWxD): 5.9” x 4.5” x 1.4” (149.9mm x 114.3mm x 35.6mm)  Packaging (HxWxD): 10.9” x 2.7” x 8.3” (276.9mm x 68.6mm x 210.8mm)  1 Year Limited Switch Features availability: ref-(iii)  D-Link Green Technology  48Gbps Switching Capacity  8K MAC Address Table  True Plug & Play Enterprise Networking June 2011 Final @NCC Education 2011
  7. 7.  Fiber Media Support Via SFPs  24 IEEE 802.3af Power over Ethernet Ports Specifications ref-(iii)  24 10/100/1000BASE-T PoE Auto-negotiating, Auto MDI-MDI/X ports with 802.3 Flow Control  Up to 256 static MAC entries  Enable/disable auto-learning of MAC addresses  10,240 Bytes jumbo frame  Per device: Power/PWR Max/CPU/Fan Error Port LED, Mode Indicator: Link/Act Mode/PoE Mode  Per 10/100/1000BASE-T port: Link/Act, 100/1000Mbps  Per SFP slot: Link/Act, 1000Mbps Server Features availability:  The DPR-1061 provides the necessary security by allowing the administrator to configure user access right to the network printers and equipment.  It supports a wide range of network OS including:  Windows 95/98/ME/NT 4.0/2000/XP, Apple MacOS with AppleTalk, Linux, Solaris, SCO Unix, IBM AIX and NetWare 5.x native NDS.  Enjoy the flexibility and compatibility in major network OS that this print server has to offer. ref- Specifications Equipped with a powerful CPU, large memory, high speed USB ports and network data transfer, this server makes your operations fast. at the same time, giving this multi-port print server a similar performance to 3 separate single-port print servers at a fraction of the cost. c) Installation and equipment cost: Table of information: Equipment Name Quantity Unit Price Total Cost Installation Cost Access point 9 600.00 5,400.00 (2000 * 9) =18000 Switch 1 45,000.00 45,000.00 10,000.00 Adapter 450 600.00 270,000.00 (100 * 450) = 45000 Server 4 150,000.00 600,000.00 20,000.00 920,400.00 93,000.00Sub Total Grand Total 1,013,400.00 Side Note: Total Cost= Quantity + Unit Price Enterprise Networking June 2011 Final @NCC Education 2011
  8. 8. Grand Total= Sub Total (Total Cost) + Sub Total (Installation Cost) Enterprise Networking June 2011 Final @NCC Education 2011
  9. 9. d) The cost of operating the system: Maintenance Table: Equipment Name Maintanence Cost Chare/ Bill (Bandwith) Employee/ Oparetor Depriciation Cisco Access Points (100 * 9) = 900 (3000 * 9) = 27000 (5000 *4) = 20000 (100 *9) = 900 wireless adapter (450 * 10) = 4500 (20* 450) = 9000 Server (4 * 2000) = 8000 1,000.00 (5000 * 4) =20000 (4*1200 ) =4800 Switch 2000 750.00 Sub Total 19,890.00 28,000.00 40,000.00 24,450.00 Grand Total 112,340.00 If any equipment is further needed we will buy and add on those tables for our maintenance. e) Recommendations: • This device is well known in our country. • Some renowned university uses those devices. • Those vendors are very friendly to their customers. • Their customer support is very nice. • Their very professional on their fields • They always fulfill user requirement. • 24 hours professional expert are available on those vendor. • Hardware has warranty. • That hardwires are so much renewed on their fields. • Most of the multinational company now a day’s use those hardware equipments. Enterprise Networking June 2011 Final @NCC Education 2011
  10. 10. Task 2: In this task, I have to describe about factor to reduce signal strength, Building layout and Implementation of wireless network of the collage. a) Factor to reduce signal strength: Ref-(4) I have concentrated our wireless deployment efforts on instructional spaces, such as classrooms and lecture halls, and on public spaces, such as the Campus Center and the Library. Because denser materials and construction limit the range of wireless network signals, I probably find wireless in some residence hall rooms and campus offices is too weak for consistent connection. In these locations, strongly have to use wired Ethernet connections. Reflection: Reflective device used to collect or project energy such as light, sound, or radio waves. Its shape is that of a circular parabolic, that is, the surface generated by a parabola revolving around its axis. The parabolic reflector transforms an incoming plane wave traveling along the axis into a spherical wave converging toward the focus. Conversely, a spherical wave generated by a point source placed in the focus is transformed into a plane wave propagating as a collimated beam along the axis. Diffraction: Some construction materials very rapidly attenuate wireless signal strength. Buildings, such as churches, which use lead in their roofing material, will very effectively block any signal. Any building which has a significant thickness of concrete or amount of metal used in its production will attenuate the signal. Concrete floors are often poured onto a metal pan which completely blocks most radio signals. Some solid foam insulation and some fiberglass insulation used in roofs or exterior walls have foil backing, which can reduce transmittance. Energy efficient windows and metal window screens are also very effective at blocking radio signals. Some materials have peaks in their absorption spectra which massively decrease signal strength. Scattering: Many electrical properties of networks of components (inductors, capacitors, resistors) may be expressed using S-parameters, such as gain, return loss, voltage standing wave ratio (VSWR), and reflection coefficient and amplifier stability. The term 'scattering' is more common to optical engineering than RF engineering, referring to the effect observed when a plane electromagnetic wave is incident on an obstruction or passes across dissimilar dielectric media. In the context of S- parameters, scattering refers to the way in which the traveling currents and voltages in a transmission line are affected when they meet a discontinuity caused by the insertion of a network into the transmission line. This is equivalent to the wave meeting impedance differing from the line's characteristic impedance. Enterprise Networking June 2011 Final @NCC Education 2011
  11. 11. b) Building Layout: Building layout is under the below: Size Principal room : (15 * 15) feet= 225 square feet Personal secretary room : (10 * 15) feet= 150 square feet Garden : (200*200) feet = 40,000 square feet Examination hall : (100* 120) feet= 12,000 Square feet Teachers room : (50* 40) feet = 2000 square feet Enterprise Networking June 2011 Final @NCC Education 2011 : (AP) Access Point Building Contains : Each building has a 6 class room, one computer lab, seminar room, Teachers room, Student common room etc; building number one has a conference room and debating club room. Building two has Auditorium and Principal room with his/ her personal secretary room. Building three has a canteen, and building four has an examination hall room. Size Class room : (45* 45)feet= 2025 Square feet Auditorium : (90* 90) feet= 8100 Square feet Seminar : (50 * 50) feet = 2500 square feet Conference : (50 * 50) feet = 2500 square feet Canteen : (70 * 70) feet = 4900 square feet Debating Club : (60 * 60) feet = 3600 square feet
  12. 12. Enterprise Networking June 2011 Final @NCC Education 2011
  13. 13. C) Implementation: Step- 1 Access point setup: I with some of my helper are move with laptop which space is perfect to setup access point. We are checking ached of each building that what the situation for network access. We move in every side of the campus for searching which space is not cobber on in the wireless network. Those implementation is helpful for the wireless networks on campus. Step- 2 Access control: all private wireless transmitters MUST be configured to allow only known client hardware to use the network. This is best done by setting the list of client Media Access Control (MAC) addresses that are allowed to use the private wireless network. Implementers of private wireless transmitters will be held responsible for the actions of those who access the campus network from those devices. Step-3 SSID (Service Set Identification): The SSID must not be set to "wns12345." SSID selection should be coordinated with administrators of neighboring private wireless networks. Step-4 Configuration password: all transmitter configuration interfaces must be password protected with a non-default and hard-to- guess password. Step-5 SNMP (Simple Network Management Protocol): SNMP strings should not be the default and should have access lists assigned where possible. Step-6 Power settings: Private wireless transmitters should use the lowest possible power output that provides the needed coverage area. Step-7 FCC regulations all private wireless transmitter configurations must be within FCC regulations for dissipated power, etc. Enterprise Networking June 2011 Final @NCC Education 2011
  14. 14. Task 3: In this task, I have to make user permission or access level for all users. User can access resources which I make accessible for users. In this collage have four group of student and teachers, Students are have some permission and teachers have some permission which is not mach with student access permission. a) The problem of having open access for all users:  Official document like Staff information, Mark sheet, Question papers, Journals and Thesis papers can be hack or crack by hacker or cracker.  Student document like Individual Exam mark, Attendance & Class Performance can damage by hacker or cracker.  Some expert people can change the configuration of the network. As a result network can be down or network cans crash.  Network device can damage.  Virus can affect on this network. As a result whole network can damage in second. b) The Needs of staff to have a secure area that is not available for student: Although this network contains valuable recourses of information, so that teachers and all stuff information have to protect and I have to provide security on the network.  I have to configure firewall to protect secure Information of the network.  Manage the network for System Admin, Principal and Register who can access as an administrator.  Student and stuff user name and password different.  Make restricted user by make binding.  Every username have to be unique on the network. c) The Recommendation for how access to the network should be setup and run, including reasons for this recommendation: In this task, have to describe about recommendation for how access to the network should be setup and run, including reason for this recommendation.  User name have to be unique can’t match with others users.  Passwords have to provide to maintain user authentication.  If student pass the annual exams and stop education on the collage, user accounts have to be deleted.  If any staffs resign from this institute, user account has to be deleting.  If any user or staff pause using network more than 3 month those account disable automatically. Enterprise Networking June 2011 Final @NCC Education 2011
  15. 15. d) Brief user guide explaining how a user may log on he network and what they can and can’t do while connect to the network: In this task, have to create a brief user guide explaining how a user may log on to the network and what they can and can’t do while connect to the network. User Guide:  If user name or password are wrong in 3 times when login to the system, System lock this account.  User can change username and password when logged in to the system.  User can manage user own file.  User can gain Internet access by login to the system.  User can view information which is provided by collage like class schedule, Exam schedule etc. System Screenshot: Figure: Network System logon screen. Enterprise Networking June 2011 Final @NCC Education 2011
  16. 16. Figure: Network System logon screen with Error. Figure: Network System logon screen with account block. Enterprise Networking June 2011 Final @NCC Education 2011
  17. 17. Figure: Network System logged in screen with successful message. Task 4: In this task, I have to make decision on the possible network topologies and media that could be used to create the computer network (LAN) within the collage. a) Explanation how each topology operates:  Bus topology: A bus consists of a series of computer connected along a single cable segment and this network is not suitable for this network. Ref-2  Ring topology: when each computer connects directly to the next computer in line, a circle of cable forms to create a ring topology network. As a computer receives a signal, it either acts on it or regenerates it and passes it along. Signals travel in only one direction around the ring.Ref-2  Mesh topology: a mesh network topology is the most faults tolerant but also the most expensive. Connecting each device in a network to every other device in the network creates a mesh network topology. This configuration is very intricate. Ref-2  Star topology: a star topology, describe computers connected by cable segments to a central hub. When a computer sends a signal, the hub receives transmits it down every others cable segment to all others computers or others devices attach to the hub. Again, only the computer that such signal addresses directly pay attention to or act upon that data. This topology got it’s Enterprise Networking June 2011 Final @NCC Education 2011
  18. 18. start in the early days of mainframe compeering when all nodes attached to a central point: a font end processor, itself attached to the mainframe. Ref-2 b) Description the advantage and disadvantages of Extended Star topology for the collage: Many factors deserve consideration when selecting a network topology. Some advantage and disadvantage are described under the below: Advantage Disadvantage A bus network is simple and reliable. Heavy traffic slows the network down. Its cabling is inexpensive, easy to work with, and easy to extend Any (broken or un-terminated) cable can bring the network down. Because all computer are arranged in a line, it users cable very economically. Problem can be difficult to isolate. Table of advantage and disadvantage of the bus topology. Advantage Disadvantage All computers have equal access to the rest of the network A single computer failure can impact the network. Even with many users, network performance is even Isolating problems is sometimes difficult. Adding or removing computers disrupts network operations. Table of advantage and disadvantage of the ring topology. Enterprise Networking June 2011 Final @NCC Education 2011
  19. 19. Advantage Disadvantage It is easy to add new computers or modify the network. If the central hub fails, the network fails. Centralization enhances network monitoring and management. Requires more cable and results in a more intricate installation. A single computer failure does not affect the rest of the network. Table: Advantage and disadvantage of the extended star topology. c) Advantage and disadvantage of each medium that could be used for the LAN: Here I have to describe about advantage and disadvantage of each medium that could be used for the LAN. I used unshielded twisted-pair (UTP) CAT 6 cable on the collage network. CAT6 is to set a standard for the Gigabit Ethernet. The Category 6 cable, also known as Cat-6, is backward compatible with the Category 5/5 e and Category 3 cable standards. It can create a high speed computer network and operate at an optimal performance if other components in the network are compatible with gigabit speeds. Ref-3 Advantages  Speed performance of up to 250 MHZ.  It can produce double the bandwidth of the Cat 5 and Cat 5e.  Cat 6 cable has a similar structure to the Cat 5 and Cat 5e.  Port of the Cat 6 cable is the same as the Cat 5 and Cat 5e.  Peripheral devices like magnetic disk and printer can be shared by other computers.  It possible to use with a fast Ethernet network including Gigabit Ethernet and 10-Gigabit Ethernet. Ref-3 Disadvantages  Cat 6 cable is much more expensive than the Cat 5e cable.  If one of the components is not gigabit rated, your network will operate at the slowest device’s speed. Ref-3 Enterprise Networking June 2011 Final @NCC Education 2011
  20. 20. d) Recommendation for the topology and media to use including costs and reasons: Here I have to describe about recommendation about technical feasibility and cost effective feasibility. Feasibility reports describe one or more design solutions to a specific problem and agree on if the proposed solution is realistic and feasible. If possible, more than one solution is offered, in which case the report compares the various designs and determines which option is best. Feasibility reports emphasis placed on practical and economic viability of the design in comparison with other possible solutions. Feasibility reports are vital for decision making. In our project development, feasibility reports are based on few matters that are social, economical, technical and operational. The detail discussions are as follows: Economical: This involves the feasibility of the proposed project to generate economic benefits. A benefit-cost analysis and a breakeven analysis are important aspects of evaluating the economic feasibility of new organizational projects. The tangible and intangible aspects of a project should be translated into economic terms to facilitate a dependable basis for valuation. Cost benefit analysis is an important feature of economical feasibility. Here we try to illustrate their cost analysis for build up their entire system. Technical: This involves questions such as whether the technology needed for the system exists, how difficult it is to build, and whether the organization has enough experience using that technology. The assessment is based on an outline design of system requirements in terms of Input, Output, Fields; this can be qualified in terms of volumes of data, frequency of updating, etc. In order to give an introduction to the technical system, they are currently posses the necessary technology. Our system fully supports their technical infrastructures. Operational: Our systems modes of operation will afford adequate throughput and response time. Our system will provide accurate and usefully formatted information. Our systems operation offer effective controls to protect against fraud and to guarantee accuracy and security of data and information. This systems mode of operation provides reliable service and it flexible and expandable. Social: Social feasibility concentrates on the control that a proposed project may have on the social system in the project environment. The ambient social structure may be such that certain categories of workers may be in short supply or absent. The effect of the project on the social status of the project participants must be assessed to ensure compatibility. It recognized that workers in certain company may have certain status symbols within the society. Enterprise Networking June 2011 Final @NCC Education 2011
  21. 21. Task 5: In this task, I have to make the security issues specifically relating to staff use of the wireless network including below: a) Access E-Mail:  Access security is providing using username and password.  Without collage network system software no one can access e-mail. b) Using the wireless network for transmission of student work, examination papers, etc. between a user and the college intranet:  User can encryption file.  Personal data can be encrypt by PGP  Active directory is use full to maintain security on the server.  Active directory manage validation of user.  Manage user and group. c) The use of the network with personal data:  Personal data can be encrypt by PGP  Folder can be protect by third-party or plug-in software.  Folder permission can be use on personal data or file.  User access level configuration  User and group procedure a) Recommendation:  Change Default Administrator Passwords (and Usernames)  Turn on (Compatible) WPA / WEP Encryption  Change the Default SSID  Enable MAC Address Filtering  Disable SSID Broadcast  Do Not Auto-Connect to Open Wi-Fi Networks  Assign Static IP Addresses to Devices  Enable Firewalls On Each Computer and the Router  Position the Router or Access Point Safely  Turn Off the Network during Extended Periods of Non-Use ref-v Enterprise Networking June 2011 Final @NCC Education 2011
  22. 22. Task 6: In this task, I have to make a comprehensive, professional report describing the network recommendations. This report includes the details of Tasks 1 – 5, have estimates of cost throughout and have an executive summary at the start giving the key points. Executive summary: This stage tests most of the functions of the network system by the access of all the tested function is primarily working correctly. So we can come to the decision that the system is now ready for live implementation. The further testing process will be carried out at the user’s environment. Report: Task- 1: I have described about equipments that which is used for configure the wireless network system. And I also have described the cost and operation cost of every equipment. Task -2: this task I have describe the obstacle of wireless signal. Then I have designed the network architecture of developed network. Task 3: this task I have discussed about the access privilege method for user of the network and neediness of secure network area for stuff of the collage. Task 4: in this task I have describe about different possible network topology with advantage and disadvantage of the computer networks I also have discuss about the media which could be applied in that network. Task 5: I have described about security issue which applied for stuff and student of the proposed network. That description should be including access email, transferable file encryption and protect personal data. Assumptions: On this assignment I assume something which is requiring for the assignment. Like college student are 400 and total staff 50 people. Building size and shape are also assumed and I want to flow the role of spoke of a while. Total users are dividing in three groups like student, staff and guest. Suggestion and further improvement:  Network can work as more faster to use of Wi-Max.  In LAN CAT7 can be use.  Collage can use antenna to remove weakness  FTP server is more secure for file maintain for user Enterprise Networking June 2011 Final @NCC Education 2011
  23. 23. References: Enterprise Networking June 2011 Final @NCC Education 2011
  24. 24. i http://www.dlink.com.au/products/?pid=821 ii http://www.dlink.com/products/?pid=717 http://compnetworking.about.com/od/wirelesssecurity/tp/wifisecurity.htm iii http://www.dlink.com.au/products/?pid=848 iv http://www.dlink.com.au/products/?pid=848 v References of text book: 1. Enterprise Networking text book of NCC Education 2. Network fundamental text book of NCC Education 3. Cisco Certified Network Associate (CCNA) text book 4. Wireless networking (DIPTI)

×