This document outlines a network design for a small office. It includes descriptions of the devices, logical and physical diagrams of the network layout, and details of servers and security features. The total cost of the proposed design is approximately 34.64 lakh taka. Key aspects of the design include connections between rooms and devices via switches, a server room with five servers, and security features like CCTV cameras, motion detectors, and smart door locks. The network aims to provide a secure infrastructure to support file sharing, email, and device connectivity across the office.
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSProf Ansari
The goal of network administration is to ensure that the users of networks receive the information and technically serves with the quality of services they expect.
Network administration means the management of network infrastructures devices (such as router and switches)
Network administration compromises of 3 majors groups:
1. Network provisioning
2. Network operations
3. Network maintenance
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSProf Ansari
The goal of network administration is to ensure that the users of networks receive the information and technically serves with the quality of services they expect.
Network administration means the management of network infrastructures devices (such as router and switches)
Network administration compromises of 3 majors groups:
1. Network provisioning
2. Network operations
3. Network maintenance
Fast Ethernet cables are uses for interdependent connection; on the other hand, serial cables are used for the connection of central organization router with department routers.
LAN Design for 15 flats : Park Pride ApartmentsSubhajit Sahu
Local Area network for 15 flats in 5-floor Park Pride Apartments
For providing Internet connection & File sharing
- Ravi Kumar Nandigam
The design of a modern local area network (LAN) addresses a number of challenges that network architects and administrators are struggling with for the best time. Conventional LANs are designed for a PC workstation that will create significant design challenges for networking new intelligent systems.
I have discussed about the common problem of network issues of a computer . How we can find out what is the bug on our network wizerd and what should we do for that perticular problem . I also discussed about the physical hardware problem and how to find out what the problem is and what is the way to find the solution for it . If you think for a problem that i am finished or my machine is finished it is your foolishness . So you can read my slides and can find out the problem and their solution .
Hotel network scenario implementation by using cisco packet tracerHome
Computer network has become the most significant issue in our day-to-day life. Networking companies depend on the proper functioning and analysis of their networks for Front Office Department Housekeeping Department, Food and Beverage Service Department. Food Production or Kitchen Department, Reception area etc. Mainly interfacing with the network is induced by one of the other user/users to share some data with them. Therefore, this paper is about communication among users present at remote sites, sharing this same network HNS. HNS stands for the Hotel Network Scenario. Therefore, in this work the network is designed using Cisco Packet Tracer. The paper describes how the tool can be used to develop a simulation model of the AAHA Hotel of Bahawalnagar. The study provides into various concepts such as topology design, IP address configuration and how to send information in the form of packets in a single network and the use of virtual Local Area Network (VLANs) to separate the traffic generated by a different department.
Error detection and correction
Data link control and protocols
Point-to-Point access (PPP)
Multiple Access
Local Area Networks: Ethernet
Wireless LANS
Virtual Circuit Switching: Frame Relay and ATM
Group 5:
Reymart John Aguho
Lawrence Valdez
Trishia Mae Salazar
Gayle Allyson Guitones
Dempster Winston Corpuz
Matthew Erickson Quinto
Marc Vincent Maneja
A framework that helps to understand complex network interactions. It is the part of the Internet communications process where these connections occur, by sending packets of data back and forth between different networks. There are two models that are widely referenced today: OSI and TCP/IP. The concepts are similar, but the layers themselves differ between the two models.
Fast Ethernet cables are uses for interdependent connection; on the other hand, serial cables are used for the connection of central organization router with department routers.
LAN Design for 15 flats : Park Pride ApartmentsSubhajit Sahu
Local Area network for 15 flats in 5-floor Park Pride Apartments
For providing Internet connection & File sharing
- Ravi Kumar Nandigam
The design of a modern local area network (LAN) addresses a number of challenges that network architects and administrators are struggling with for the best time. Conventional LANs are designed for a PC workstation that will create significant design challenges for networking new intelligent systems.
I have discussed about the common problem of network issues of a computer . How we can find out what is the bug on our network wizerd and what should we do for that perticular problem . I also discussed about the physical hardware problem and how to find out what the problem is and what is the way to find the solution for it . If you think for a problem that i am finished or my machine is finished it is your foolishness . So you can read my slides and can find out the problem and their solution .
Hotel network scenario implementation by using cisco packet tracerHome
Computer network has become the most significant issue in our day-to-day life. Networking companies depend on the proper functioning and analysis of their networks for Front Office Department Housekeeping Department, Food and Beverage Service Department. Food Production or Kitchen Department, Reception area etc. Mainly interfacing with the network is induced by one of the other user/users to share some data with them. Therefore, this paper is about communication among users present at remote sites, sharing this same network HNS. HNS stands for the Hotel Network Scenario. Therefore, in this work the network is designed using Cisco Packet Tracer. The paper describes how the tool can be used to develop a simulation model of the AAHA Hotel of Bahawalnagar. The study provides into various concepts such as topology design, IP address configuration and how to send information in the form of packets in a single network and the use of virtual Local Area Network (VLANs) to separate the traffic generated by a different department.
Error detection and correction
Data link control and protocols
Point-to-Point access (PPP)
Multiple Access
Local Area Networks: Ethernet
Wireless LANS
Virtual Circuit Switching: Frame Relay and ATM
Group 5:
Reymart John Aguho
Lawrence Valdez
Trishia Mae Salazar
Gayle Allyson Guitones
Dempster Winston Corpuz
Matthew Erickson Quinto
Marc Vincent Maneja
A framework that helps to understand complex network interactions. It is the part of the Internet communications process where these connections occur, by sending packets of data back and forth between different networks. There are two models that are widely referenced today: OSI and TCP/IP. The concepts are similar, but the layers themselves differ between the two models.
NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.
Introduction
Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For bot.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
"Protectable subject matters, Protection in biotechnology, Protection of othe...
Project report,nowrin
1. 1
Project Name:Bangladesh Association of Software
And Information Services Network Design
Course Title: ComputerNetworks Lab
Course Code: CSE 318
SubmittedTo
PranabBandhu Nath
Senior Lecturer,
Dept. of CSE,
City University, Dhaka.
Submitted By
Nowrin Jahan Siam
ID:1925102501
Batch:51st
Date of Submission: 2/11/2021
2. 2
ABSTRACT
In this report, the steps are outlined that would allow to design and fulfill all the necessary
requirements for running a small office. In this report a detailed overview has been presented
based on the estimates which has been ensured by visiting the main office. This report will help
to understand the structured network design and will also demonstrate the practical
implementation of the steps which has been identified by real life case study. The design has
been simulated using the Cisco Packet Tracer software
4. 4
Project Details
In this Project, I’m trying to develop basis network system and give high security and use some
modern devices.
Device:Computer, Printer, Switch, Router, Wire Cable, Some digital devices like smart door
lock,smart light etc . I’m using some sensor like motion sensor, smoke detector,siren,fire monitor
etc. I also use a CCTV camera for security .
Computer: I’m using a computer in information zone , server room ,training room, manager
room, all the rooms for communicating each room to another room . Every Computer connected
to a server. If anyone wants to give mail or transfer files that person can transfer files or mail one
computer to another computer. This project, I’m using two types of computer desktop computer
and Laptop computer.
Switch: A network switch (also called switching hub, bridging hub, and is networking hardware
that connects devices on a computer network by using packet switching to receive and forward
data to the destination device. In this project I’m using Cisco SF300-24PP-K9 24-Port POE
Managed Network Switch. Price 12800tk per piece.
Router: A router is a networking device that forwards data packets between computer networks.
Routers perform the traffic directing functions on the Internet. Then, using information in its
routing table or routing policy, it directs the packet to the next network on its journey.
Motion Detector: A motion detector is an electrical device that utilizes a sensor to detect nearby
motion. Such a device is often integrated as a component of a system that automatically performs
a task .
CCTV Camera: This camera only for monitoring. It givehigh security. In this project, I’m using
Dahua HAC-HFW1400D 4MP HDCVI IR Bullet Camera-3500tk.
Server: Network Server is a computer in Network that is designated to provide one or more
network service. For example file server, database server etc. In this project, I’m using Dell
EMC PowerEdge R740 2U Rack Server
5. 5
AC: An air conditioner is a system or a machine that treats air in a defined, usually enclosed area
via a refrigeration cycle in which warm air is removed and replaced with cooler air.
Smart Door Lock: A smart lock is arguably the most important part of a truly smart, connected
home. Not only will it allow you to come and go as you please.
8. 8
This is the full view of my project. Project name is Basis Networks Design. In this project, I’m
design 3 floor building networks design. Now I’m describe about floor wise design-
Ground Floor:This floor is use for car parking and transport car store.There have security
door,CCTV camera, smoke Detector and Smart LED light.
9. 9
First Floor: This floor have one waiting room, one information room and,2 training room and a
server room. Every room have AC, Security Door, CCTV camera, Smock Detector .
Training room: have 5Desktop Computer, one printer. All are connected to 1 switch.
Server Room: In server room there are 5 servers,1 switch,1 webcam and a pc.
Information zone:In information zone there are 3 pc ,1 webcam,1 AC and a printer.
Second Floor: This floor have manager room and 6 others room Every room have AC, Security
Door, CCTV camera, Smock Detector.
10. 10
Manager Room: This room have a computer and laptop. This are connecter to the server by using
cable, wire and switch. All room are connected to Smart device.
Room 1:This room have a computer and switch ,AC etc. This are connecter to the server by
using cable, wire and switch. All room are connected to Smart device.
Room 2: This room have a computer and switch ,AC etc. This are connecter to the server by
using cable, wire and switch. All room are connected to Smart device
Room 3:
Room 6: This room have a computer and switch ,AC etc. This room have a computer and switch
,AC etc. This are connecter to the server by using cable, wire and switch. All room are connected
to Smart device
Room 4: This room have a computer and switch ,AC etc. This are connecter to the server by
using cable, wire and switch. All room are connected to Smart device
Room 5: This room have a computer and switch ,AC etc. This are connecter to the server by
using cable, wire and switch. All room are connected to Smart device.
This are connecter to the server by using cable, wire and switch. All room are connected to
Smart device
11. 11
Server details:In this project .I’m using DNS,DHCP,FTP,EMAIL,IOT those 5 server
DNS sever:
A DNS server is a computer server that contains a database of public IP addresses and their
associated hostnames, and in most cases serves to resolve, or translate, those names to IP
addresses as requested. DNS servers run special software and communicate with each other
using special protocols.
.
12. 12
DHCP Server: A DHCP Server is a network server that automatically provides and assigns IP
addresses, default gateways and other network parameters to client devices. It relies on the
standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to
broadcast queries by clients.
Email Server: A mail server (or email server) is a computer system that sends and receives
email. Mail servers send and receive email using standard email protocols. For example, the
SMTP protocol sends messages and handles outgoing mail requests. The IMAP and POP3
protocols receive messages and are used to process incoming mail.
14. 14
FTP Server: The File Transfer Protocol is a standard network protocol used for the transfer of
computer files between a client and server on a computer network. FTP is built on a client-server
model architecture using separate control and data connections between the client and the server.
15. 15
IOT Server: IoT Data Server is a "Data Integration Controller" consisting of high reliable
industrial computer and non-programming data integration software. ... These functions will help
the data management in various scenes from the production cell system to production line,
factory, cloud system.
16. 16
Total Cost:
No. Device Name Model Quantity Cost Per
Product
Total cost
1. Router Asus RT-Ac500UHP
AC1500 Dual Band
Wifi Router with MU-
MIMO
1 9,600 9,6000
2. Switches Netgear FS728TP 24- 13 20,000 260,000
17. 17
port fast Ethernet
Racmount poe smart
managed pro switch
3. Printer HP DeskJet Plus INK
Advantage 6475 all in
one printer
5 13,000 65,000
4. Access point BDCOM WAP2100
T22E Wireless AP
1 8,500 8,500
5. Cables D-Link CAT 6 UTP
Cable 305M 23AWG
Grey
10 3,000 30,000
6. Slicer Silhouette Cameo 4 1 36,500 36,500
7 Laptop Avita Liber v14 core i5
10th Gen 14”FHD laptop
Himalayan blue
3 57,500 172,500
8 Computers Walton Kaiman Ex S
WDPC1010 Intel core
i3-10100 desktop pc
33 36,990 1,220,670
9 Webcam Xiaomi Vidlok W77
Full HD Webcam black
13 2,550 33,150
10. AC Gree GS24CT410 2 Ton
Split Air Conditioner
11 67,000 737,000
11. Smart door
lock
ZKTeco LH3000 Smart
door lock
13 9,700 126,100
12. CRIMPER 1 6,035 6,035
13. Server Dell power edge
R720xd 2U SERVER
5. 125,000 630,500
14. MOTION
DETECTOR
2 600 1200
15. SIREN 2 500 1000
18. 18
16. SMOKE
DETECTOR
2 1000 2000
17. FIRE
MONITOR
2 2000 4000
Grand Total 34,64,165
Advantage of network design
1.Failoure of computer will not affect other cpmputer
2.Easy to troubleshoot
3.Easy to add or remove the computer in a network.
4. switch can be easily replaced
Disadvantage of network design
1. Performance of transmission depends on the switch.
2. Installation cost is high.
3. Failure of the switch will stop the transmission.
.
19. 19
This Networks Topology Security system:
1.Routers use to maintain data security.
2.switch for protecting our data.
3.server networks
4.IP and MAC based internet connection.
Conclusion:
A secure network design has been ensured for the company. However, the cost might seem a bit
high but this will help in the long run to secure the complete system. The success of a company
depends specifically on the security of the network, which they are using. The network design
has been developed keeping the security of the entire system in mind that will allow the company
to achieve success of the organization fulfilling all the needs of the company.
Referance:javapoin.com,tutorial point.com,bd stall .com