Sie sind auf Seite 1von 41

DATA CABLING MANAGEMENT

OF ACLC COLLEGE OF APALIT

CHAPTER I

INTRODUCTION

The aim of the researchers is to implement an improved Data Cabling Management of

ACLC College of Apalit. The said campus formally opened its door on May 2004 with 256

students enrolled and it is one of biggest branch of ACLC in the Philippines, a well-known College

that offers computer and other courses.

Local Area Network (LAN) is commonly used for computer laboratories. It is a type of

network that uses wired connection to link the computer and other networking devices. The project

will use Star Topology, where the computers will be individually connected to a Switch. The major

benefit of using the Star Topology is when a cable fails, only one node will be affected.

The proponents sought to conduct a study concerning the network infrastructure of the

ACLC College of Apalit’s existing cabling management. The Local Area Network (LAN) were

installed between the two-computer laboratories with only one server. The laboratories are

operating for more than 10 years and the existing cables have never been replaced from the day

that they were installed, that’s why the proponents decided to redesign the infrastructure

efficiently.

The researchers noticed that the laboratories need additional equipment to fully optimize

their cabling management. One of the examples are Patch Panel and Data Cabinet by the use of

this equipment the cabling management will be more organized and the different networking

devices will be arranged in one place.

1|Page
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Statement of the Problem

The common problem that the users encountered when using Computer laboratories are

sometimes the network is not reliable that causes disturbance because the cables are improperly

organized due to lack of equipment and networking devices. The existing cables need to be

replaced with new and better-quality cables.

1. Ever since when the Local Area Network was established in 2004, it was maintained but

never improved hence, the old cables are affecting the network performance.

2. Due to the absence of third-party router the network is not configured properly such us

bandwidth control and blocking of prohibited websites to avoid the students accessing

them.

3. Due to the absence of a Patch Panel and Data Cabinet, the cable management of the

laboratories is not properly arranged that caused disturbance for those who are using the

laboratories.

Objective of the Study

The main objective of the study is to develop a project for ACLC College of Apalit to

improve the Data Cabling & LAN of their Computer Laboratories. Listed below are the specific

objectives of the proposed project.

 To provide a better cable management for the two Computer Laboratories of ACLC

College of Apalit.

 To enhance the security of the network by configuring its setting to block prohibited

websites and allow the router for fair distribution of bandwidth.

 To organize the networking devices by adding Patch Panel and Data Cabinet.

2|Page
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Significance of the Study

The study will benefit the following:

School - The proposed project will provide the ACLC College of Apalit another means to

endorse their school with its better Computer laboratories to deliver the Quality Education with

efficient facilities to aspiring student who wants to enroll.

Students - The proposed project will provide the students a greater experience during

laboratory hours. With a better cabling management, the students will no longer experience the

loss of connectivity to the network which they frequently encounter when using the computers.

I.T facilitators – The proposed project will allow the I.T facilitators to organize and manage

the computer laboratories with the help of the added networking devices. It will also help the

I.T facilitators to monitor the laboratories and troubleshoot the computers including cables

with ease.

Future researchers – The proposed project will assist and guide the future researchers in

understanding network cabling management. It will also serve as their reference information

when conducting new researches.

3|Page
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Scope and Limitation of the Study

This study is primarily focused on the Data Cabling Management of ACLC College of

Apalit. The researchers aim to improve the cabling infrastructure of the campus.

Scope of the Study

The system will cover the following:

 The proposed design will cover the cable replacement for the two computer

laboratories to dismiss the loss of connectivity of the computers to the network.

 The proposed design will cover the Organization of the wires and cables for the two

computer laboratories to avoid the inconvenience of messy cable management. The

proposed design will cover the network bandwidth setup to allow the computers to

acquire equal bandwidth distribution and blocking of prohibited websites to ensure

the students to stay focused during laboratory hours.

 The proposed design will cover the adding of Patch Panel to organize all cables and

help the I.T facilitators to troubleshoot with ease when problems occur.

Limitation of the Study

The system will not cover the following:

 The proposed design will not handle the repositioning of the computers.

 The proposed design will not cover the maintenance and upgrade of the network

setup

 The proposed design will only cover the College Department laboratories

4|Page
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

 The proposed project will only serve as a design for ACLC College of Apalit and

will not cover the implementation.

Definition of Terms

This section shows the precise description of the terms based on how it is used in the

proposal.

Bandwidth – In an analog transmission, it refers to the difference between the highest and lowest

frequency that is available to a device while in a digital transmission, it refers to the number of bits

of information that can be transferred.

Client – Is any device that is connected to a network that sends or receive files from a server or

from other devices.

EMI – Short for Electromagnetic Interference, it is the presence of unwanted electrical signals in

a transmission medium. It is typically caused by nearby electronic equipment.

Ethernet – Is a family of network standards that are frequently used in LANs, MANs and WANs.

With the passage of time, it was refined to accommodate higher data rates and longer distances. It

is currently the dominant network standard.

Full Duplex - A transmission mode on which two or more devices can send and receive data

packets simultaneously.

IP Address – Short for Internet Protocol is a string of numbers that is used to logically identify a

d6vice in a network. Since it is a logical address, it is subject to changes.

5|Page
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

ISP – Short for Internet Service Provider, is a company that provides internet access to an

establishment or to a resident in a specific area.

LAN – Short for Local Area Network, is a type of Network that provides connection for computers

in a small area typically a floor in a building or the whole building itself.

MAC Address – Short for Media Access Control, a unique identifier physically assigned to

connected devices on a network that is composed of hexadecimal characters. It is assigned by the

manufacturer into the device’s firmware and never meant to be changed.

Packet – A unit of data that is transmitted between the sender and the receiver on a network.

Volt-Ampere – Is a unit of measurement used to rate the electrical-power capacity of a UPS.

Wi-Fi – Short for Wireless Fidelity, is a type of connection that allows a nearby device to

connect to a Local Area Network via Radio Waves that comply to the IEEE 802.11 Standards.

Network - Is a collection of computers, servers, mainframes, network devices, peripherals, or

other devices connected to one another to allow the sharing of data.

6|Page
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

CHAPTER II

THEORETICAL FRAMEWORK

This chapter will present the related literature and studies after the thorough and detailed

search done by the proponents. This will also present the theoretical and conceptual framework

and lastly the definition of terms of better comprehension of the study.

Review of Related Literature

According to Michael Lawrence all networks, regardless of their size, have similar

foundational requirements. Embark on a network design project identifying current and future

business requirements to ensure you plan the right technology as your business grows. One of the

most critical choices is deciding if your business should consolidate voice services over the data

network to minimize the cost of the network. When you highlight these types of issues and discuss

requirements clearly at the start of the project, you benefit both financial and technical planning.

Planning and designing of the cable layout plays an important part of network design as it

provides the physical communication path for your company. Consult with a cable design

professional experienced in areas to minimize the potential for equipment interference. Consulting

with a cable company provides peace of mind that you've planned the correct type of cable and

included fire code specifications.

Collect your existing physical and logical network diagrams to support the current state

design. Identify routers, switches, LAN uplink bandwidth, network equipment cabinets, power and

7|Page
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

cooling information, and current standards for the fiber and the copper cable plant. For the logical

design, obtain current information for the IP address design for the LAN including virtual LAN

information and connectivity requirements, if more than one building is present. Document

protocols used in the network, including routing protocols used for connectivity between buildings.

Conclusion

In this related literature the researchers came to a conclusion that planning and designing

of the cable layout takes a big part on how the company will operate in its every day operation. In

the proposed project the researchers will use Sketch up to create a design for the proposed project

and Cisco Packet Tracer for the logical design.

Review of Related Studies

A Secured and Wireless Network Setup Proposal for AMA Basic Education of Apalit

According to the author Aries Soriano the network setup proposal is a detailed plan of a

secured and wireless network setup for AMA Basic Education. The researchers have considered

using the best topology and structured cabling for the proposed network where the network and

security issues managed properly and the number and types of users have an access to the network.

Structured design and documentation were used as data gathering tools as part of network

planning and network analysis. The respondent was the network administrator of AMA basic

education. The researchers scouted the area to analyze and examine the whole network laboratory

and computer rooms to gather enough information.

8|Page
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

All possible requirements of the network to be developed were carefully evaluated and

documented in network analysis phase. After the requirements were studied, the topology was

prepared. During this phase, the researchers focused on providing a reliable network setup for the

school. The network topology was ready and the requirements were studied in the next phase.

Then, the hardware requirements were tested for any negligent action and faults with the help of

Cisco Packet Tracer in the hardware testing phase. By applying the required alteration on the

network, the network system is now prepared for deployment. The AMA Basic Education will be

then able to build up the network performance which provides a holistic, quality education for

students.

A Proposed Network Setup and WI-FI Connection for Sulipan Apalit Computer Laboratory.

This study named “A Proposed Network Setup for Sulipan Apalit High School” attempted

to solved the deficiency of the aforementioned school in terms of Computer-based Education. The

researchers had considered using the appropriated topology and cabling path for the proposed

network to ensure compatibility and efficient operation. Security measures had been also employed

to ensure the proposed network setup will be protected from and security threats.

Observation and documentation were used as a data gathering tools as part of network

planning and network analysis. The respondent was the IT Administrator of Sulipan Apalit High

School. The researchers scouted the area and gathered enough information needed to come up with

the proper network setup. The current situation in Sulipan Apalit High School and its existing IT

Facilities were carefully documented and examined in network analysis. After the gathered data

were analyzed, network design came next. During this stage, the researchers planned on providing

reliable network setup proposal for the school. The network setup proposal was ready and the

9|Page
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

requirements were studied in the next stage. The network setup was tested for any errors and faults

via Cisco Packet Tracer in the network testing stage. The network system is now ready after

applying the required modifications on the network setup. The network setup will be observed for

its real-time performance.

In the last stage of the project deployment, the IT Facilitator will be tasked in keeping the

network operation and maintenance. A reliable network design and cabling is important to the

overall network functionality. The proposal’s goal is to focus on providing reliable internet

connection and network setup for the students and teachers of the Sulipan Apalit High School.

The choice of network devices is critical in every network setup. One must ensure it

compatibility with each other and the speed will not be limited by each component. The proposed

network setup will enable the teachers of Sulipan Apalit High School to be more effective in

teaching when it comes to technology. The students will also learn more effectively by the use of

interactive audio-visual lesson modules.

Security measures are provided by Avast Anti-Virus and Install-Block Avast Antivirus and

takes care of the client computers from viruses or any malicious programs that roam across the

internet ensuring the students can browse confidently. Install-Block will be in the charge of fending

of notorious students installing miscellaneous programs and accessing critical system settings and

menus like Task Manager.

Conclusion

The researchers conclude that the related studies and the proposed project have some

similarities when it comes to the idea on how solve the existing problems. The said studies and the

proposed project used the same technique in the data gathering stage by using surveys, interviews

10 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

and documentation. The related studies and the proposed project both considered the best topology

and structured cabling for their project. But there is a difference between the said related studies

and the proposed project. And that is the said studies focuses on the wireless network setup and

the proposed project focuses on the data cabling management of the computer laboratory.

Conceptual Framework

INPUT PROCESS OUTPUT

Planning

 Interview
 Survey
 Research
 Concepting a
design

Defining
 Data Gathering
 Conduct a study Data Cabling
- Interview
 What topology to
- Survey Management
use
- Questionnaires  What is the for ACLC College of
- Research problem Apalit
 What is the
solution

Designing
 Sketch-up

Testing
 Cisco Packet
Tracer

11 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

CHAPTER III

METHODOLOGY

Project Research Design

In this chapter, different tools and methods in developing the proposed project will be

discussed. The Network Layout and Waterfall Model of the proposed project will be shown in this

chapter.

12 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Figure 3.0 – Network Diagram

Figure 3.1 – Cisco Packet Tracer Layout

Project Development

ACLC College of Apalit is a College that has two computer laboratories that are located

on the 2nd floor of the building. The researchers proposed to renovate the two laboratories to avoid

disturbance when using them. The main issue of the laboratories is that the cables itself are not

properly arranged that’s why the researchers proposed to replace all the cables that are

malfunctioning.

In order to start the project, the researchers conducted a research and gathered information about

the ACLC College of Apalit. Using all the gathered information the researchers are now able

analyze them. After that the researchers are now able to do the project designing using Google

13 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Sketchup to create the interior design of the laboratories and Cisco Packet Tracer for visual

simulation of the network.

Waterfall Model

The waterfall model is a list of steps that can easy to understand and can be used as a design

guideline in the project development process. It conceptualizes the method from top to bottom

level of the progress that is made.

Project Planning and


Data Gathering

Project Analysis

Project Design

Project Testing

Project Implementation

Project Maintenance

Figure 3.2 Waterfall model

Project Planning and Data Gathering

14 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

In this project development phase, the proponents established a plan to identify the goals

and required components of the proposed project. Gathering of important information will help

the proponents to gain more idea about the proposed project.

Project Analysis

This phase will carefully evaluate all gathered information to help the researchers analyze

the proposed project. Using all the evaluated information the researchers will able to identify on

what necessary actions are needed for the proposed project.

Project Design

After further analysis of all the gathered information, the proponents will now able to

develop a design for the proposed project.

Star Topology

A Star topology is a network topology that is used for a Local Area Network (LAN) where

all nodes are connected to the central connection point individually like a switch or hub. This kind

of topology will take more than cable than other topology, but the benefit of it is that when a cable

fails only one node will be take down.

15 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Figure 3.3 Star Topology

Project Testing

In this phase the proposed project will be presented to the critics in order to determine if

there is are some existing problem or any other issues of its current state. With the result of the test

that have been conducted, the researchers can now determine what needs to be improve with the

project.

Project Implementation

In this phase, all of the requirements that is needed for the project are fulfilled. After the

project testing and adjustment that were made, the proposed project is now ready for

implementation

16 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Project Maintenance

This phase will cover the maintaining and improving of the project after the implementation. In

this way the researchers can track the progress of the project and to monitor its current state for

the possibility of an upgrade.

Evaluation Procedure

The researchers provided a survey questionnaire that was used as a research instrument

consisting series of questions than can help when evaluating the proposed project. The respondent

will be the students and instructors of ACLC College of Apalit.

Evaluation Criteria

Below are the given criteria which will serve as a basis to determine if the proposed project

has the quality to be implemented.

Functionality - this refers to the level in which the proposed project has the ability to

perform its function and served the purpose well.

A. Functionality

1. Suitability. Functions are appropriate to specifications.


2. Accurateness. Functions are correct.
3. Interoperability. Software can interact with other components or systems.
4. Compliance. Adherence to standards.
5. Security. Provision for security requirements.
Reliability – This refers to the extent with which the proposed study is being trustworthy

or performing consistently well.

17 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

B. Reliability

1. Maturity. Absence of failures.


2. Fault Tolerance. Ability to withstand and recover from component failure.
3. Recoverability. Ability to bring back a failed system to full operation.
4. Correctness. Ability to produce correct output or reports.

Usability – this refers to the level in which the proposed project has the capability of being

used.

C. Usability

1. Understandability. Ease of which is the systems function can be understood.


2. Learnability. Learning effort for different users. i.e., novice, expert, casual etc.
3. Operability. Ability of the software to be easily operated by a giver user in a given
environment.
4. Provision for comfort and convenience.

Instrument and Techniques Used

The survey questionnaire was used as a research instrument which is consisting series of

questions for the gathering of information from the respondents. Also, interviews are conducted

with the I.T Facilitator and Instructors to acquire more useful information in developing the

project. Those technique and instrument that had been used will help the researchers gain more

information to make an adjustment and to enhance the proposed project.

Grading system for the Evaluation Criteria of the Proposed Study Rating Board Description

18 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

RATING DESCRIPTION

4.50 – 5.00 Excellent

3.50 – 4.49 Very Good

2.50 – 3.49 Good

1.50 – 2.49 Fair

1.00 – 1.49 Poor

Project Evaluation

This section presents the result of the survey for the Data Cabling Management of ACLC

College of Apalit. This survey is done to know the insight of the respondents to the proposed study,

which help for the improvement of the proposed system.

Functionality

Figure 3.4 shows the result of the respondent’s idea on the feature of the study in term of

its functionality. The first indicator has a computed mean of 4.63 Average.

A. Functionality Mean Interpretation

1. Suitability. Functions are appropriate to specifications. 4.83 Excellent

2. Accurateness. Functions are correct. 4.6 Excellent

3. Interoperability. Software can interact with other components or systems. 4.46 Excellent

4. Compliance. Adherence to standards. 4.7 Excellent

5. Security. Provision for security requirements. 4.56 Excellent

AVERAGE 4.63 Excellent

`Reliability

Figure 3.5 shows the result of the respondent’s idea on the feature of the study in term of

its reliability. The first indicator has a computed mean of 4.66 Average.

19 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

B. Reliability Mean Interpretation

1. Maturity. Absence of failures. 4.66 Excellent

2. Fault Tolerance. Ability to withstand and recover from component failure. 4.63 Excellent

3. Recoverability. Ability to bring back a failed system to full operation. 4.63 Excellent

4. Correctness. Ability to produce correct output or reports. 4.73 Excellent

AVERAGE 4.66 Excellent

Usability

Figure 3.6 shows the result of the respondent’s idea on the feature of the study in term of

its Usability. The first indicator has a computed mean of 4.55 Average.

C. Usability Mean Interpretation

1. Understandability. Ease of which is the systems function can be understood. 4.46 Very Good

2. Learnability. Learning effort for different users. i.e., novice, expert, casual etc. 4.56 Excellent

3. Operability. Ability of the software to be easily operated by a giver user in a given 4.53 Excellent
environment.
4. Provision for comfort and convenience. 4.66 Excellent

AVERAGE 4.55 Excellent

20 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

CHAPTER IV

Presentation and Discussions

Project Technical Description

Cisco Packet Tracer

Cisco Packet Tracer is a powerful network simulation program that allows students to

experiment with network behavior and ask “what if” questions. As an integral part of the

Networking Academy comprehensive learning experience, Packet Tracer provides simulation,

visualization, authoring, assessment, and collaboration capabilities to facilitate the teaching and

learning of complex technology concepts. Packet Tracer supplements physical equipment in the

classroom by allowing students to create a network with an almost unlimited number of devices,

encouraging practice, discovery, and troubleshooting. The simulation-based learning environment

helps students develop 21st century skills such as decision making, creative and critical thinking,

and problem solving. Packet Tracer complements the Networking Academy curricula, allowing

instructors to easily teach and demonstrate complex technical concepts and networking systems

design. Instructors can customize individual or multiuser activities, providing hands-on lessons for

students that offer value and relevance in their classrooms. Students can build, configure, and

troubleshoot networks using virtual equipment and simulated connections, alone or in

collaboration with other students. Packet Tracer offers an effective, interactive environment for

learning networking concepts and protocols. Most importantly, Packet Tracer helps students and

instructors create their own virtual “network worlds” for exploration, experimentation, and

explanation of networking concepts and technologies.

21 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

SketchUp

A 3D modeling program from Google that is known for its ease of use. Used for

architectural purposes as well as films and games, designs are created in two dimensions, which,

using a patented method, are pushed and pulled into three dimensions. Introduced in 2000 by

@Last Software, Google acquired the company in 2006. Google 3D Warehouse is a central portal

where anyone can contribute 3D components for SketchUp users. SketchUp is also noted for its

integration with Google Earth. Buildings can be extracted from Google Earth and stored as models

in 3D Warehouse for future SketchUp designs.

Operating system

An operating system (OS) is the program that, after being initially loaded into the computer

by a boot program, manages all the other programs in a computer. The other programs are

called applications or application programs. The application programs make use of the operating

system by making requests for services through a defined application program interface (API). In

addition, users can interact directly with the operating system through a user interface such as a

command line or a graphical user interface (GUI). An operating system performs these services

for applications in a multitasking operating system where multiple programs can be running at the

same time, the operating system determines which applications should run in what order and how

much time should be allowed for each application before giving another application a turn. It

manages the sharing of internal memory among multiple applications. It handles input and output

to and from attached hardware devices, such as hard disks, printers, and dial-up ports. It sends

messages to each application or interactive user (or to a system operator) about the status of

22 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

operation and any errors that may have occurred. It can offload the management of what are

called batch jobs (for example, printing) so that the initiating application is freed from this work.

On computers that can provide parallel processing, an operating system can manage how to divide

the program so that it runs on more than one processor at a time. All major computer platforms

(hardware and software) require and sometimes include an operating system, and operating

systems must be developed with different features to meet the specific needs of various from

factors.

Windows 7

Windows 7 is the Microsoft Windows operating system (OS) released commercially in

October 2009 as the successor to Windows Vista. Windows 7 is built on the Windows Vista kernel

and was intended to be an update to the Vista OS. It uses the same Aero user interface (UI) that

debuted in Windows Vista. As a result, to many end users, the biggest changes between Vista and

Windows 7 were faster boot times, new UIs and the addition of Internet Explorer (IE) 8. The OS

is widely available in three retail editions: Windows 7 Home Premium, Professional and Ultimate.

Starter, Home Basic and Enterprise editions are available in some markets. In development,

Windows 7 was known by the code names Blackcomb and Vienna.

Windows 8

Windows 8 is a personal computer operating system that is part of the Windows NT family.

Windows 8 introduced significant changes to the Windows operating system and its user interface

23 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

(UI), targeting both desktop computers and tablets. It is a touch-optimized platform based on the

modern Metro design architecture, which specifies how applications are delivered and rendered in

the UI .Along with having a much different look and feel from its predecessor, Windows 7,

Windows 8 also boasted faster startup times and better performance, but it failed to reach critical

mass among business and consumer users alike. The lack of a Windows 8 Start menu marked a

major departure from past versions of the operating system. Microsoft replaced the well-known

Start menu with a larger Start screen, which provided access to applications and other resources

through Live Tiles, a set of icons laid out in a grid. This design offered users an experience similar

to that of mobile devices. The OS also marked the debut of the Charms bar for accessing specific

features, such as desktop settings and universal search. The Charms bar appeared on the right side

of the screen and was available to users at any time, no matter what they were doing. Windows

8 also came with USB 3.0 support, an updated Task Manager, Unified Extensible Firmware

Interface Secure Boot and a number of preinstalled applications, such as Photos, Mail, Calendar

and Messaging. In addition, Windows Explorer was rebranded File Explorer and included a

Microsoft Office-like ribbon -- a bar across the top of File Explorer that features items users can

click to create a new folder, copy a folder or accomplish other tasks. Windows 8 also provided file

backup through the File History feature, which constantly protected users' personal files in several

folders, including Favorites and Contacts. When logging onto Windows 8, users provided their

Microsoft online account credentials, unless they specifically overrode this default behavior. This

approach allowed Windows 8 to synchronize a user's settings across devices. The OS also

integrated with the Windows Store and the SkyDrive cloud storage service -- now Microsoft

OneDrive. Other features included improved multi monitor support, ISO mounting, refresh and

restart capabilities, and Windows Defender -- Windows' built-in antimalware software.

24 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Windows 10

Windows 10 is a Microsoft operating system for personal computers, tablets, embedded

devices and internet of things devices. Microsoft released Windows 10 in July 2015 as a follow-

up to Windows 8. The company has said it will update Windows 10 in perpetuity rather than

release a new, full-fledged operating system as a successor. Anyone adopting Windows 10 can

upgrade legacy machines directly from Windows 7 or Windows 8 to Windows 10 without re-

imaging or an upgrade when it is set to run. Windows 10 features built-in capabilities that allow

corporate IT departments to use mobile device management (MDM) software to secure and control

devices running the operating system. In addition, organizations can use traditional desktop

management software such as Microsoft System Center Configuration Manager. Windows 10

Mobile is a version of the operating system Microsoft designed specifically for smartphones

performing intrusive and time-consuming system wipes and upgrade procedures. To upgrade from

a previous version of Windows 10, IT or users run the Windows 10 OS installer, which transfers

any applications and software on the previous OS, as well as settings and preferences over to

Windows 10. Organizations and users can pick and choose how they will patch and update

Windows 10. IT or users can access a Windows 10 upgrade through the Windows Update Assistant

to manually begin an upgrade or wait for Windows Update to offer

25 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Hardware Requirements

Router

Figure 4.1 Router

A router is a networking device that forwards data packets between computer networks.

Routers perform the traffic directing functions on the Internet. A data packet is typically forwarded

from one router to another through the networks that constitute the internetwork until it reaches its

destination node. A router is connected to two or more data lines from different networks (as

opposed to a network switch, which connects data lines from one single network). When a data

packet comes in on one of the lines, the router reads the address information in the packet to

determine its ultimate destination. Then, using information in its routing table or routing policy, it

directs the packet to the next network on its journey. This creates an overlay internetwork.

Nowadays, Wi-Fi Connection is now integrated into the router itself removing the need for

a separate Wi-Fi Device. The earliest generations are plain 2.4GHz Single Band Wi-Fi-Routers

with minimal features. As time goes on, more features are increasingly being included like Dual

26 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Band Wi-Fi Connection, Bandwidth Management, USB Connection, Content Filtering and

Beamforming.

Network Switch

Figure 4.2 - Network Switch with 24 Ethernet Ports

A switch is a device in a computer network that electrically and logically connects together

other devices. Multiple data cables are plugged into a switch to enable communication between

different networked devices. Switches manage the flow of data across a network by transmitting a

received message only to the one or more devices for which the message was intended. Each

networked device connected to a switch can be identified using a MAC Address, allowing the

switch to regulate the flow of traffic. This maximizes the security and efficiency of the network.

A network switch is a multiport network bridge that uses hardware addresses to process

and forward data at the Data link Layer(layer 2) of the OSI model. Switches can also process data

at the Network Layer(layer 3) by additionally incorporating routing functionality that most

commonly uses IP Addresses to perform packet forwarding; such switches are commonly known

as Layer-3 Switches or Multilayer Switches.

27 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

A switch is essentially a more advanced network hub in terms of functionality and

transmission capabilities but share the same principles. A switch can determine the sender and

receiver of data packets so it can selectively forward incoming data packets. Thus, eliminating

unnecessary transmissions. A switch can provide a full duplex 10/100/1000Mbit/s Bandwidth to

each Ethernet Port unlike a Hub in which the Bandwidth is shared among the connected client

PCs. A switch has a higher number of Ethernet Ports (8 – 48 Ethernet Ports) so it can accommodate

more clients simultaneously wherein a Hub is limited to 4 – 8 Ethernet Ports.

Category 5 Enhanced Unshielded Twisted Pair Cable

Figure 4.3 Cat 5E UTP Cable

Unshielded Twisted Pair Cable is a type of cable that consists of two independently

insulated wires twisted around one another. The use of two wires twisted together helps to reduce

crosstalk and electromagnetic induction. While twisted-pair cable is used by older telephone

networks and is the least expensive type of local-area network (LAN) cable, most networks contain

some twisted-pair cabling at some point along the network. UTP cabling does not offer as high

bandwidth or as good protection from interference as other cables but it is less expensive and easier

to work with.

28 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Category 5 Enhanced is an improvement to the existing Category 5 Twisted Pair Cable. It

is designed to accommodate Full Duplex 1000Base-T/Gigabit Ethernet and provide

100/1000Mbit/s of Bandwidth for up to 100Meters. It also incorporates more stringent cable

specifications for reducing crosstalk and other forms of electromagnetic interference.

Registered Jack/RJ45 Connector

Figure 4.4 – Pair of RJ-45 Connectors

RJ45 is a type of connector commonly used for Ethernet networking. It looks similar to a

telephone jack, but is slightly wider. Since Ethernet cables have an RJ45 connector on each end,

Ethernet cables are sometimes also called RJ45 cables. The "RJ" in RJ45 stands for "registered

jack," since it is a standardized networking interface. The "45" simply refers to the number of the

interface standard. Each RJ45 connector has eight pins, which means an RJ45 cable contains eight

separate wires. If looked closely at the end of an Ethernet cable, the eight wires can be actually

seen, which are each a different color. Four of them are solid colors, while the other four are

striped. RJ45 cables can be wired in two different ways. One version is called T-568A and the

other is T-568B.

29 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Cable Duct/Conduit

Figure 4.5 – Cable Raceway with Detachable Cover

A cable duct also known as electrical conduit is a tube used to protect and route electrical

wiring in a building or non-building structure. Electrical conduit provides very good protection to

enclosed conductors from impact, moisture, and chemical vapors. Varying numbers, sizes, and

types of cables can be pulled into a conduit, which simplifies design and construction compared

to multiple runs of cables or the expense of customized composite cable. Conduit system can be

made waterproof or submersible. Metal conduit can be used to shield sensitive circuits from

electromagnetic interference, and also can prevent emission of such interference from enclosed

power cables. When installed with proper sealing fittings, a conduit will not permit the flow of

flammable gases and vapors, which provides protection from fire and explosion hazard in areas

handling volatile substances.

30 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Data Cabinet / Network Cabinet

Figure 4.6 – Data Cabinet / Network Cabinet

Network cabinets or Network Racks are often confused for server cabinets. However,

there is a difference. Network cabinets are generally used for the storage of routers, patch panels,

switches and a wide variety of networking equipment as well as networking accessories. In most

cases a network cabinet will be far shallower than a server rack cabinet, generally measuring in

at less than thirtyone inches deep. Networking cabinets will sometimes have glass or a strong

plastic front door. Network cabinets also generally do not have perforated enclosures. The type

of equipment generally housed in network cabinets does not generate the same amount of heat as

that housed inside a server rack.

Because one product cannot fulfill the needs of all office equipment storage, it may become

necessary to do a thorough evaluation of the type of equipment being used, or that will be used,

in order to make the most informed purchasing decision. In many cases, office spaces will

require the use of both a server rack and a networking cabinet in order to house the various

equipment that will be used there.

31 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

It is important to note, that improperly housing heat generating equipment is dangerous. This

could cause damage to your equipment, or worse could become a fire hazard due to the

temperatures which some servers can generate. Good rack dealers will help you decide which

product is best for you

Project Structured Organization

Network Design

Figure 4.7 – ACLC College of Apalit Computer Lab Floor Plan

32 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Figure 4.8 – Front View of ACLC College of Apalit Computer Lab 1

Figure 4.9 – Inside View of ACLC College of Apalit Computer Lab 1

33 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Figure 4.10 – Top View of ACLC College of Apalit Computer Lab

Figure 4.11 – Conduit in the floor

34 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Figure 4.12 – Cable Raceway in the floor

Figure 4.13 – Networking Devices in Data Cabinet

35 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Figure 4.14 – ACLC College of Apalit Computer Lab 2

Figure 4.15 – Inside View of ACLC College of Apalit Computer Lab 2

36 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Figure 4.16 – Top View of ACLC College of Apalit Computer Lab 2

Figure 4.17 – Conduit and raceway in Computer Lab 2

37 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Figure 4.18 – ACLC COLLEGE OF APALIT

38 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

CHAPTER V

Summary, Conclusion and Recommendation

In this chapter, the proponents summarize the important details and finding that are taken

in the study. The proponents also present the conclusion and recommendation that can be made

based from the details in the study.

Summary

This study named Data Cabling Management of ACLC College of Apalit aims to solve the

problem that they still encounter in the computer laboratories. The researchers had considered

using the appropriate topology and cabling management for the proposed network to ensure the

compatibility and efficient operation. The researchers also added security measure to assure that

the proposed project is protected from any security threats.

Survey, Interview, Observation and Documentation were used as a data gathering tools in

the network planning and network analysis phase. The respondents are the students, IT Facilitator

and IT Instructors of ACLC College of Apalit. The researchers observed the area where they

analyze the computer laboratories to gather information that are needed and can help to come up

with the proper data cabling management.

The ACLC College of Apalit and its existing computer laboratories were precisely

documented and examined in network analysis phase. After all the gathered data were analyzed,

the network design was prepared. In this phase, the researchers built a Sketchup model of the

computer laboratories to visualize the result of the proposed project. And the network setup was

39 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

tested for any error and faults via Cisco Packet Tracer in the network testing phase. The network

setup will be observed in real-time performance and further adjustments will be made if necessary,

to meet its objectives.

In the project maintenance phase, the IT Facilitator is the responsible for the operating,

monitoring and maintaining of the network. With the proposed project he’s now able to monitor

the website that the students can access and they will able to do their task without any disturbance

with the help of the data cabling management project.

Conclusion

A stable network design and cabling management is very important to a computer

laboratory. The Data Cabling Management of ACLC College of Apalit’s objective is to provide a

reliable network connection and a better cabling management for those who will use the computer

laboratories to ensure that the satisfaction is always there.

The proposed project will enable the Instructors of ACLC College of Apalit to be more

effective when teaching their respective students during laboratory hours. As the students will no

longer able to access prohibited website and the IT Facilitator can easily organize the laboratories

with the help of added networking devices such as Patch Panel and Data Cabinet. With the help of

the positive feedbacks from the student, it will help the school to boost its popularity and promote

it as a school with a superb computer laboratory which will attract many aspiring students.

40 | P a g e
DATA CABLING MANAGEMENT
OF ACLC COLLEGE OF APALIT

Recommendation

Given the previous data, findings and analysis, the researchers propose the following

recommendations;

 This project proposal should serve as a reference for the future researchers when

conducting their own proposal.

 Upgrading the computers operating system of ACLC College of Apalit

laboratories from 32bit to 64bit to fully maximize the use of the installed 8gb

RAM.

 The I.T Facilitator should conduct a weekly checking of the laboratories to ensure

that all computers are properly working to avoid problems when the students are

using the lab.

41 | P a g e

Das könnte Ihnen auch gefallen