For a world in motion™.
As the world’s specialist in mobile broadband, we’ll help you enable your end users to do more than ever before with the
world’s most efficient mobile networks, the intelligence to maximize their value and the services to make it all work
together.
From the first ever call on GSM, to the first call on LTE; we operate at the forefront of each generation of mobile technology.
Our global experts invent the new capabilities you need in your networks. We provide the world’s most efficient mobile
networks, the intelligence to maximize the value of those networks, and the services to make it all work together seamlessly.
With an unswerving focus on quality, efficiency and reliability we help you meet your mobile customers’ demands for
universal content and connectivity more efficiently and effectively.
Together, we deliver the innovations in mobile technology that enable people and businesses everywhere to do more than
ever before.
As a mobile operator, you face challenges from many sides that put your mobile network and your business model under
extreme pressure.
By transforming your mobile network and your business, you’ll turn your challenges into opportunities.
Working closely with you, we deliver the products and services that will help drive your success - today and tomorrow.
Abstract
Telecommunications carriers and serviceproviders are facing issues of traffic loss and delay
due to multiple fibre cuts and failures. The key challenges operators are facing today is offering
high service level availability to its customers which can be achieved through highly automated
resilient networks.
As technology advances in society the need for wired and wireless networking has become
essential. With the advent of new networking technologies with their advantages and
disadvantages, like security, the hardware requirements, the range and benefits are
different. Wireless networking takes into consideration the range, mobility, and the several
types of hardware components needed to establish a wireless network. Considering all the
technological advances SNM Networks provides network solution for ABC technologies.
Introduction
Wireless networks have given a privilege to organizations to have fewercables and slightly less
management, but few more hardware component.
In order to offermobility and future ready services, networkdesigned forABC technologies
comprises of both wireless and wired network.
SNM has analysed the key requirements of ABC technologies and crafted a comprehensive
solution that willfulfill the ABC’s current and future business needs.
BusinessIT Requirements
1. Setup a network forits officein Georgia (head office) and branch in New York.
2. Officemust have following
3. Setup of meeting conferenceroom with VoIP phones and must have surveillance camera
through-out the office.
4. Full Wi-Fi access with 802.11i security protection.
5. Should have backup connectionin case of network failure.
6. A printer for each officewhichcan be accessed by all the systems within the office.
7. Networkoutage and maintenance need to be informed 2 weeks prior.
8. RFID flooraccess will be maintained by Honeywell systems and data should be
incorporated within their servers.
9. Total cost of installation should not exceed USD 50,000
10. Maximum time forinstalling the network is 12 weeks.
Technical Solutionoffered
1. To connectofficesin Georgia and branch officein New Yorkwe are using WAN.
2. PowerOverEthernet
3. Optical cable(OM4)
4. CAT 6 UTP
5. Surveillance camera
6. Opted for carrier XYZwhichuses two different POPstoconnect Primary and backup
networks.
7. Wi-Fi access point with 40*40 meter square 802.1x mode
8. Print server application forconnecting all the systems with one printer
HardwareComponents
Major Networking Hardware Components
a. NetworkInterface Cards
b. Routers (Internal routers and border routers)
c. Switches
d. Access Points (40m x 40 m square) - coverage area
e. Printers
f. VoIP Phones - voiceover IP phones
g. RFID tags
h. Optical cable
i. UTP cable
j. Server/Data server
k. Desktop/laptop/PC
l. Surveillance cameras
m. Powerover Ethernet
a. NIC- A NIC is a devicethat connects a computer or other device to a network. For
computers, the NIC is usually installed in an expansion slot and has a chip that handles the
physical and data-link layers of networkcommunications. (Cert.org/Tech).
b. Modem is designed to operate using yourexisting cable lines. Cable internet has a high
bandwidth and can support most, if not, all applications, ABC technologies is using.
c. A router is a devicethat routes data from one network to another network. A router is
connected to at least twonetworks, commonly two networksor a networkand its ISP's
network. A router allows for everyoneon the networkto access the internet.
d. Another key component is a print server. A print server is used to connectprinters to a
networkto allow fornetwork printing. The server will actas a buffer;storing the messaging
and printing them in order of the queue. This device can drastically reduce the cost of
networking because now everyone can use the same printer without having a printer attached
to every computer.
e. A hub is a deviceoffered to connects the cables from computers and other devices such
as printers in a network.Traditionally, hubs are used forstar topology networks, but they are
offeredto use with other configurations to make it easy to add and remove computers without
bringing down the network.
f. A switch is a device similar to a hub that enables the connectionof multiple computers,
access points, and other networkenabled devices. The differencebetween a hub and a switchis
that a switchfilters the data that passes through it, whereas hub does not.
g. Print server is used to connectprinters to a network to allow fornetwork printing. The
server will act as a buffer;storing the messaging and printing them in order of the queue. This
device can drastically reduce the cost of networking because now everyonecan use the same
printer without having a printer attached to every computer.
h. A VoIP phone or IP phone uses Voice overIP technologies for placing and transmitting
telephone calls over an IP network,such as the Internet, instead of the traditional public
switched telephone network(PSTN).It is cheap as voice is compressed in IP data network.
i. Radio-frequencyidentification (RFID)uses electromagneticfieldsto automaticallyidentify
and tracktags attached to objects. Offered with Access card _manual and a scanningunit at office
premises,like conferencing room and entry terminal.
j. Optical cables are offeredfor inter building connectivity.Single mode optical fibre OM4
with fullduplex communication is used to offerconnectivity
k. UTP cable (Unshielded twisted pair) is used within both officesforconnectivity.
l. Desktop/ PC are offeredfor workpurposes.
m. Security/surveillance cameras are a great way to provide security foryour home or
workplace.As wellas providing youwith video footageof any events that may happen, they also
act as a visible deterrent to criminals.
Technologiesoffered
a. Powerover Ethernet (POE) plus,this is sufficientfor voiceoverIP phones, surveillance
cameras, and most access points. This saves money because there is no need to install power
lines to these devices.
b. WAN- Wide Area Networkwill connecttwoofficesites via different RoW(Rights of
Way).
c. LAN- Local area network whichconnects the local officepremises at both the sites.
d. Wireless access -802.11i in 802.1x whichwill provide full wireless access for the
employees.
Time and cost savings - Networkcables do not require an electrician to fit them, and can be
located anywhere.
POE has many applications, but are offered forthree key areas:
VoIPphones - the original POE application. Using POE means phones have a single connection
to a wall socket, and can be remotely powered down, just like with the older analog systems.
IP cameras - POE is now ubiquitous on networked surveillance cameras, where it enables fast
deployment and easy repositioning.
Wireless– Wi-fiand Bluetooth APs and RFIDreaders are commonly PoE-compatible,to allow
remote locationaway fromAC outlets, and relocation followingsite surveys.
Flexibility - without being tethered to an electrical outlet, devices such as IP cameras and
wireless access points can be located wherever they are needed most, and repositioned easily if
required.
Advantages:
Safety - POE delivery is intelligent, and designed to protect networkequipment fromoverload,
under -powering, or incorrect installation.
Reliability - It can be backed-up by an uninterruptible powersupply, or controlled to easily
disable or reset devices.
Scalability - having power available on the network means that installation and distribution of
networkconnections is simple and effective.
Technical AssumptionsandDimensioningParameters
The prerequisites and assumptions taken while planning the networkand preparation of the
solution are mentioned below:
a. The Access points gives the coverage of 40 meters and 40-meter square
b. Twodifferent officesare interconnected via WANnetwork, 1st office100 meter length
and 80 meters wide, and 2nd office80 meter length and 60 meter are connected by optical cable
c. In office1, there are two windowsplanned to minimize dead zones. Office1is in New
Yorkand office2 is in Georgia.
d. To connecttwo buildings, optical cable is used.
NetworkcomponentandSystems
 Desktops 4 or 5
 Laptop computers: Printers: Two(one printer forconfidential printing and one printer-
fax combounit for general use)
 Servers: One (running Small Business Serve, looking after files, the Internet connection,
e-mail, and our customer database)
 Internet connection:50 Mbps cable modem connection.
 The server/ switchand some of the computers are linked by 100 Mbps Cat5 Ethernet
cables.
 Laptops are linked by an 802.11g wireless networkwith an access port.
 All computers run Windows XP Professional except for the print servers and two
administrative computers, whichrun Windows98.
Protection offered for ABC Network.
Remote access to a network is needed off the hours, but it increases the security risk, that needs
monitoring. To prevent such risks, FIREWALLSare activeto monitor egress and ingress routing
of information.
 ACLhas beenusedfor ALL IP addressandmonitoringof Firewall logswill bedone
daily.Therefore,employeesrequestedto checkwhat/howtheyareaccessing
information.
 Perimeterfirewall protectscomputersonnetworkfromthreatby makingthem
invisible.
 USE STRONG PASSWORD-canbe hacked by hackers by using automated tools,
therefore employees must ensure they keep password combination of letters, numbers
and characters and NOTjust simple dictionary words. BRUTE FORCE – mechanism is
required to hack difficultcombinations, hence are safe. For example-j32hdtuaq!>M?
PASSWORD isdifficultto breakin than WElCOME,HELLO,USERNAME orEmails.
USE WIRELESS NETWORK ACCESS POINT SECURITY
Wireless Networksuse Radio link instead of cables to connectto computers, therefore intruders
to enter into the network is easy.
802.11 security standards are used between access points and wireless host.
Drive by hackers; lurk into the network, by using employee’s credentials. The wireless access
points are double secured
 Initial authentication
 Encryptionofmessagesfor confidentiality,authentication,andmessage
integrity
Restricted access to wireless network willbe provided after officehours. WPA2, Wi-FiAlliance
marked products are placed at the company to improve information security and minimize
impersonation.
If employees, feel or see any suspicious or malicious content, please immediately report to IT
and security teams. The most common threats from wireless technologies are:
 Threats
 Eavesdropping
 Data modification
 Impersonation
Cost and time estimate
The individual cost of the equipments are given below:
Equipments Quantity Total
NetworkInterface Cards Pack $119.95
Routers (Internal routers and border routers) 2 $24,048
Switches 3 $1200
Access Points (40m x 40 m square) 10 $1700
Printers 1 $800
VoIP Phones - voiceover IP phones 1 $159
RFID tags Pack $54
Optical cable (OM4) 5 $999.5
UTP cable (CAT 6) 11 $73.92
Server/Data server 2 $11,894
Desktop/laptop/PC 6 $42699.94
Surveillance cameras 6 $479.94
Powerover Ethernet 7 $330
The approximate cost for the overall network setup is presumed to be around USD44,110.23.
We have taken the best quality products and equipment forour set up. Weare planning to get it
done by 9 weekswithout any intervention of natural calamities.
Reference
1. BusinessDataNetworksandSecurity10thEdition
by Raymond R. Panko (Author), Julia L. Panko (Author)
2. NSN.com
Sreejith Ammanathil, Neelabja Manna, Meghna Gupta
Data Communication and Networking
MSIS_567N_256_16S
May 10, 2016

final doc

  • 1.
    For a worldin motion™. As the world’s specialist in mobile broadband, we’ll help you enable your end users to do more than ever before with the world’s most efficient mobile networks, the intelligence to maximize their value and the services to make it all work together. From the first ever call on GSM, to the first call on LTE; we operate at the forefront of each generation of mobile technology. Our global experts invent the new capabilities you need in your networks. We provide the world’s most efficient mobile networks, the intelligence to maximize the value of those networks, and the services to make it all work together seamlessly. With an unswerving focus on quality, efficiency and reliability we help you meet your mobile customers’ demands for universal content and connectivity more efficiently and effectively. Together, we deliver the innovations in mobile technology that enable people and businesses everywhere to do more than ever before. As a mobile operator, you face challenges from many sides that put your mobile network and your business model under extreme pressure. By transforming your mobile network and your business, you’ll turn your challenges into opportunities. Working closely with you, we deliver the products and services that will help drive your success - today and tomorrow.
  • 2.
    Abstract Telecommunications carriers andserviceproviders are facing issues of traffic loss and delay due to multiple fibre cuts and failures. The key challenges operators are facing today is offering high service level availability to its customers which can be achieved through highly automated resilient networks. As technology advances in society the need for wired and wireless networking has become essential. With the advent of new networking technologies with their advantages and disadvantages, like security, the hardware requirements, the range and benefits are different. Wireless networking takes into consideration the range, mobility, and the several types of hardware components needed to establish a wireless network. Considering all the technological advances SNM Networks provides network solution for ABC technologies. Introduction Wireless networks have given a privilege to organizations to have fewercables and slightly less management, but few more hardware component. In order to offermobility and future ready services, networkdesigned forABC technologies comprises of both wireless and wired network. SNM has analysed the key requirements of ABC technologies and crafted a comprehensive solution that willfulfill the ABC’s current and future business needs. BusinessIT Requirements 1. Setup a network forits officein Georgia (head office) and branch in New York. 2. Officemust have following 3. Setup of meeting conferenceroom with VoIP phones and must have surveillance camera through-out the office. 4. Full Wi-Fi access with 802.11i security protection. 5. Should have backup connectionin case of network failure. 6. A printer for each officewhichcan be accessed by all the systems within the office. 7. Networkoutage and maintenance need to be informed 2 weeks prior. 8. RFID flooraccess will be maintained by Honeywell systems and data should be incorporated within their servers. 9. Total cost of installation should not exceed USD 50,000 10. Maximum time forinstalling the network is 12 weeks. Technical Solutionoffered 1. To connectofficesin Georgia and branch officein New Yorkwe are using WAN. 2. PowerOverEthernet 3. Optical cable(OM4) 4. CAT 6 UTP 5. Surveillance camera 6. Opted for carrier XYZwhichuses two different POPstoconnect Primary and backup networks. 7. Wi-Fi access point with 40*40 meter square 802.1x mode 8. Print server application forconnecting all the systems with one printer
  • 3.
    HardwareComponents Major Networking HardwareComponents a. NetworkInterface Cards b. Routers (Internal routers and border routers) c. Switches d. Access Points (40m x 40 m square) - coverage area e. Printers f. VoIP Phones - voiceover IP phones g. RFID tags h. Optical cable i. UTP cable j. Server/Data server k. Desktop/laptop/PC l. Surveillance cameras m. Powerover Ethernet a. NIC- A NIC is a devicethat connects a computer or other device to a network. For computers, the NIC is usually installed in an expansion slot and has a chip that handles the physical and data-link layers of networkcommunications. (Cert.org/Tech). b. Modem is designed to operate using yourexisting cable lines. Cable internet has a high bandwidth and can support most, if not, all applications, ABC technologies is using. c. A router is a devicethat routes data from one network to another network. A router is connected to at least twonetworks, commonly two networksor a networkand its ISP's network. A router allows for everyoneon the networkto access the internet. d. Another key component is a print server. A print server is used to connectprinters to a networkto allow fornetwork printing. The server will actas a buffer;storing the messaging and printing them in order of the queue. This device can drastically reduce the cost of networking because now everyone can use the same printer without having a printer attached to every computer. e. A hub is a deviceoffered to connects the cables from computers and other devices such as printers in a network.Traditionally, hubs are used forstar topology networks, but they are offeredto use with other configurations to make it easy to add and remove computers without bringing down the network. f. A switch is a device similar to a hub that enables the connectionof multiple computers, access points, and other networkenabled devices. The differencebetween a hub and a switchis that a switchfilters the data that passes through it, whereas hub does not. g. Print server is used to connectprinters to a network to allow fornetwork printing. The server will act as a buffer;storing the messaging and printing them in order of the queue. This device can drastically reduce the cost of networking because now everyonecan use the same printer without having a printer attached to every computer. h. A VoIP phone or IP phone uses Voice overIP technologies for placing and transmitting telephone calls over an IP network,such as the Internet, instead of the traditional public switched telephone network(PSTN).It is cheap as voice is compressed in IP data network.
  • 4.
    i. Radio-frequencyidentification (RFID)useselectromagneticfieldsto automaticallyidentify and tracktags attached to objects. Offered with Access card _manual and a scanningunit at office premises,like conferencing room and entry terminal. j. Optical cables are offeredfor inter building connectivity.Single mode optical fibre OM4 with fullduplex communication is used to offerconnectivity k. UTP cable (Unshielded twisted pair) is used within both officesforconnectivity. l. Desktop/ PC are offeredfor workpurposes. m. Security/surveillance cameras are a great way to provide security foryour home or workplace.As wellas providing youwith video footageof any events that may happen, they also act as a visible deterrent to criminals. Technologiesoffered a. Powerover Ethernet (POE) plus,this is sufficientfor voiceoverIP phones, surveillance cameras, and most access points. This saves money because there is no need to install power lines to these devices. b. WAN- Wide Area Networkwill connecttwoofficesites via different RoW(Rights of Way). c. LAN- Local area network whichconnects the local officepremises at both the sites. d. Wireless access -802.11i in 802.1x whichwill provide full wireless access for the employees. Time and cost savings - Networkcables do not require an electrician to fit them, and can be located anywhere. POE has many applications, but are offered forthree key areas: VoIPphones - the original POE application. Using POE means phones have a single connection to a wall socket, and can be remotely powered down, just like with the older analog systems. IP cameras - POE is now ubiquitous on networked surveillance cameras, where it enables fast deployment and easy repositioning. Wireless– Wi-fiand Bluetooth APs and RFIDreaders are commonly PoE-compatible,to allow remote locationaway fromAC outlets, and relocation followingsite surveys. Flexibility - without being tethered to an electrical outlet, devices such as IP cameras and wireless access points can be located wherever they are needed most, and repositioned easily if required. Advantages: Safety - POE delivery is intelligent, and designed to protect networkequipment fromoverload, under -powering, or incorrect installation. Reliability - It can be backed-up by an uninterruptible powersupply, or controlled to easily disable or reset devices. Scalability - having power available on the network means that installation and distribution of networkconnections is simple and effective.
  • 5.
    Technical AssumptionsandDimensioningParameters The prerequisitesand assumptions taken while planning the networkand preparation of the solution are mentioned below: a. The Access points gives the coverage of 40 meters and 40-meter square b. Twodifferent officesare interconnected via WANnetwork, 1st office100 meter length and 80 meters wide, and 2nd office80 meter length and 60 meter are connected by optical cable c. In office1, there are two windowsplanned to minimize dead zones. Office1is in New Yorkand office2 is in Georgia. d. To connecttwo buildings, optical cable is used. NetworkcomponentandSystems  Desktops 4 or 5  Laptop computers: Printers: Two(one printer forconfidential printing and one printer- fax combounit for general use)  Servers: One (running Small Business Serve, looking after files, the Internet connection, e-mail, and our customer database)  Internet connection:50 Mbps cable modem connection.  The server/ switchand some of the computers are linked by 100 Mbps Cat5 Ethernet cables.  Laptops are linked by an 802.11g wireless networkwith an access port.  All computers run Windows XP Professional except for the print servers and two administrative computers, whichrun Windows98. Protection offered for ABC Network. Remote access to a network is needed off the hours, but it increases the security risk, that needs monitoring. To prevent such risks, FIREWALLSare activeto monitor egress and ingress routing of information.  ACLhas beenusedfor ALL IP addressandmonitoringof Firewall logswill bedone daily.Therefore,employeesrequestedto checkwhat/howtheyareaccessing information.  Perimeterfirewall protectscomputersonnetworkfromthreatby makingthem invisible.  USE STRONG PASSWORD-canbe hacked by hackers by using automated tools, therefore employees must ensure they keep password combination of letters, numbers and characters and NOTjust simple dictionary words. BRUTE FORCE – mechanism is required to hack difficultcombinations, hence are safe. For example-j32hdtuaq!>M? PASSWORD isdifficultto breakin than WElCOME,HELLO,USERNAME orEmails. USE WIRELESS NETWORK ACCESS POINT SECURITY Wireless Networksuse Radio link instead of cables to connectto computers, therefore intruders to enter into the network is easy. 802.11 security standards are used between access points and wireless host.
  • 6.
    Drive by hackers;lurk into the network, by using employee’s credentials. The wireless access points are double secured  Initial authentication  Encryptionofmessagesfor confidentiality,authentication,andmessage integrity Restricted access to wireless network willbe provided after officehours. WPA2, Wi-FiAlliance marked products are placed at the company to improve information security and minimize impersonation. If employees, feel or see any suspicious or malicious content, please immediately report to IT and security teams. The most common threats from wireless technologies are:  Threats  Eavesdropping  Data modification  Impersonation Cost and time estimate The individual cost of the equipments are given below: Equipments Quantity Total NetworkInterface Cards Pack $119.95 Routers (Internal routers and border routers) 2 $24,048 Switches 3 $1200 Access Points (40m x 40 m square) 10 $1700 Printers 1 $800 VoIP Phones - voiceover IP phones 1 $159 RFID tags Pack $54 Optical cable (OM4) 5 $999.5 UTP cable (CAT 6) 11 $73.92 Server/Data server 2 $11,894 Desktop/laptop/PC 6 $42699.94 Surveillance cameras 6 $479.94 Powerover Ethernet 7 $330
  • 7.
    The approximate costfor the overall network setup is presumed to be around USD44,110.23. We have taken the best quality products and equipment forour set up. Weare planning to get it done by 9 weekswithout any intervention of natural calamities. Reference 1. BusinessDataNetworksandSecurity10thEdition by Raymond R. Panko (Author), Julia L. Panko (Author) 2. NSN.com Sreejith Ammanathil, Neelabja Manna, Meghna Gupta Data Communication and Networking MSIS_567N_256_16S May 10, 2016