Sie sind auf Seite 1von 43

Bhagya S

Bhagya N
Dumindi K
Anjaman T
Assumptions(5)

Report Content (10)

Diagrams and/or Figures (20)

Group Component
Analytical and Critical Thinking (20)

Documentation (5)

Referencing (10)

Group Total (70)

Presentation (20)

Progress Report (5)

Workload Matrix (5)


Individual Component

Individual Total (30)

Grand Total (100)


Networks and Networking Asia Pacific Institute of Information
Technology

Table of Contents

ACKNOWLEDGEMENT.........................................................................................................6
1.0 Introduction..........................................................................................................................7
2.0 Perceived Assumptions........................................................................................................8
3.0 Perceived Limitations...........................................................................................................8
4.0 Network Plan........................................................................................................................9
4.1Main Plan..........................................................................................................................9
4.2 Building 1.......................................................................................................................13
4.2.1 Ground Floor...........................................................................................................13
4.2.2 First Floor................................................................................................................14
4.2.3 Second Floor...........................................................................................................15
4.3 Building 2.......................................................................................................................16
4.3.1 Ground floor............................................................................................................16
4.3.2 First floor.................................................................................................................17
4.3.3 Second floor............................................................................................................18
4.4 Building 3.......................................................................................................................19
4.4.1 Ground floor............................................................................................................19
4.4.2 First Floor................................................................................................................20
4.4.3 Second Floor...........................................................................................................21
4.5 Building 4.......................................................................................................................22
4.5.1 Ground floor............................................................................................................22
4.5.2 First Floor................................................................................................................23
4.5.3 Second Floor...........................................................................................................24
4.6 Network Cabling............................................................................................................25
4.7 Wireless Connectivity....................................................................................................27
5.0 Linking the APIIT city campus and the APIIT law school................................................28
6.0 Backup plans......................................................................................................................30
7.0 Conclusion..........................................................................................................................32
8.0 Appendices.........................................................................................................................33
8.1 Workload Matrix............................................................................................................33
8.2 Gantt Chart.....................................................................................................................34
8.3 Minutes of meetings.......................................................................................................35

2
Networks and Networking Asia Pacific Institute of Information
Technology

8.3.1 Meeting 1................................................................................................................35


8.3.2 Meeting 2................................................................................................................36
8.3.3 Meeting 3................................................................................................................37
8.3.4 Meeting 4................................................................................................................38
8.3.5 Meeting 5................................................................................................................39
9.0 List of References..........................................................................................................40

3
Networks and Networking Asia Pacific Institute of Information
Technology

Table of Figures
Figure 1: Main Network Plan.....................................................................................................9
Figure 2: Building 1 Ground floor...........................................................................................13
Figure 3: Building 1First floor.................................................................................................14
Figure 4: Building 1 Second floor............................................................................................15
Figure 5: Building 2 Ground floor...........................................................................................16
Figure 6: Building 2 First floor................................................................................................17
Figure 7: Building 2 Second floor............................................................................................18
Figure 8: Building 3 Ground floor...........................................................................................19
Figure 9: Building 3 First floor................................................................................................20
Figure 10: Building 3 Second floor..........................................................................................21
Figure 11: Building 4 Ground floor.........................................................................................22
Figure 12: Building 4 First floor..............................................................................................23
Figure 13: Building 4 Second floor..........................................................................................24
Figure 14: CAT 5e cable..........................................................................................................25
Figure 15: Linking between the two campuses........................................................................28
Figure 16: Gantt Chart.............................................................................................................34

ACKNOWLEDGEMENT

4
Networks and Networking Asia Pacific Institute of Information
Technology

We would like to express our deep gratitude to all those who gave us the possibility to
complete this assignment. We are deeply indebted to our teacher Mr. Udesh  Amarasinghe
whose help, stimulating suggestions and encouragement helped us in the completion of this
assignment

We would like to thank Asia Pacific Institute for Information Technology (APIIT) for
providing us with library and computer laboratory facilities as well as the other necessary
facilities which was required for the completion of this assignment.

Especially, we would like to give our special thanks to our parents whose patient love and
support enabled us to complete this work.

5
Networks and Networking Asia Pacific Institute of Information
Technology

1.0 Introduction

The networking project scenario requires us to create a network for the APIIT Law School,
which will consist of four buildings each separated by 10 meters. The CEO of APIIT Lanka
wishes to offer the law degree in newly purchased four buildings which are situated closer to
each other. All four buildings which will make up the entire Law School are 250 meters away
from the current APIIT building.

The CEO wants the new APIIT Law School to function independently, where it would have
all departments such as Academic, Accounts, HR, IT, Business within the building. The CEO
also requires the new APIIT Law School’s IT system to have a relationship with the current
system of APIIT Lanka. Therefore a secure network should be established in order for the
Law School to connect with the main building, this network should provide security of
confidential data, accessibility of resources, e-mail facilities, back-up plans, etc. The network
also should be able to have high speed access to the internet.

As the network consultants of this proposal, we have prepared a network plan to fulfill the
requirements mentioned.

6
Networks and Networking Asia Pacific Institute of Information
Technology

2.0 Perceived Assumptions

 For this network plan to APIIT Law School we don’t deem the expenses.

3.0 Perceived Limitations

 PSTN network is not established on our Network Plan to APIIT campus.

7
Networks and Networking Asia Pacific Institute of Information
Technology

4.0 Network Plan


4.1Main Plan

Figure 1: Main Network Plan


Internet Connectivity

In Sri Lanka there are three main internet connections available to Local Area Network.

 Leased lines
 WI-MAX
 ADSL

After comparing the security options, ease of management and the accuracy of data in those
three connections we decided to use leased line connection. Leased line connections give a
constant bandwidth connection. We decided to take one leased line from Dialog and two
leased lines from Sri Lanka Telecom. The reasons to take the LAN connection from different
8
Networks and Networking Asia Pacific Institute of Information
Technology

dealers are to keep the internet connection in the APIIT law school constant even though if
one of those dealers’ connections get corrupted.

In order to provide and better service to the users without and bandwidth dilemma we
decided to use 512 Mbps. After integrating the those three lines with a load balancer it is used
for servers and for the users to browse and to connect to the internet.

Firewalls

Bradley Mitchell (n. d) stated that:

A network firewall protects a computer network from unauthorized access. Network firewalls
may be hardware devices, software programs, or a combination of the two. Network firewalls
guard an internal computer network against malicious access from the outside. Firewalls may
also be configured to limit access to the outside from internal users.

In this network proposal we have used dual-firewall architecture to protect the internal
network more effectively than single-firewall architecture. The dual-firewall architecture has
two firewalls, the external firewall and internal firewall. The external firewall is used to.
Network traffic is permitted into the DMZ (Demilitarized Zone) from both the internal and
external network, but however no traffic from the external network can directly access the
internal network.

So therefore the external firewall will be configured to grant access to and from the DMZ and
external network, while the internal firewall allows access to and from the DMZ and internal
network. This will increase security of the internal network as there is no direct access from
the external networks.

E-mail Server

The e-mail server is used by APIIT to provide e-mail facilities to staff and students. So since
this server would be accessed by students and lectures when they are not within APIIT
premises, the e-mail server is placed in the DMZ area. Placing it in the DMZ will allow users
from external networks like students and lecturers to access their e-mails.

Backup Server

This is the way to keep the essential files into one single compressed encrypted file so that
they can be used in an tragedy. If the system faced up with a corruption those data can be
restored and get the system in to normal condition easily.
The backup server is connected layer 3 backbone switch which is updated every time when
there is a change in the system. The backbone switch is protected by an inner firewall so that
in any situation backup server is truly protected

9
Networks and Networking Asia Pacific Institute of Information
Technology

10
Networks and Networking Asia Pacific Institute of Information
Technology

DHCP/ DNS server

DHCP stands for Dynamic Host Configuration Protocol and is used to assign IP addresses to
hosts in the network automatically. This also can be done manually but as that is a time
taking and inefficient that DHCP is taken as the best method to assign Ip addresses to hosts. It
gives IP addresses for number of hosts at a given time. But if the user doesn’t use the IP
address for specific time the DHCP server has the ability to assign that IP address to another
host. Every time when there is a change in the DHCP is should update the DNS server.

DNS stands for Domain Name Service and this used to store large number of IP addresses
and also used to cover human readable names of hosts to IP addresses. DHCP and DNS
severs are protected by an inner firewall so that in any situation DHCP and DNS severs are
truly protected

In our network plan to APIIT Law School we assigned many wireless access points so rather
than assigning IP address manually to the users every time they log to the WIFI we are
planning to use DHCP so that it can assign IP addresses automatically. Also a DNS server
along with that to store the IP addresses.

(The Computer Technology Documentation Project. n. d)

Print server

When a user requests for a print this should assign the job to vacant printer. This is managing
the printing requests from the clients. So that let the client to user any printer whenever he or
she logs to any computer in those labs. Print server is protected by an inner firewall so that in
any situation print server is truly protected.

Database server

This is the main database for both students and the staff stores their details. This has the
ability to be accessed by any computer. Rather than storing the data in every unconnected
computer this sharing method is more efficient. Database server is protected by an inner
firewall so that in any situation database server is truly protected.

11
Networks and Networking Asia Pacific Institute of Information
Technology

VPN server

We are planning to use a VPN server to link APIIT and 1st building and also to link the four
building so that data can transfer mainly through the VPN. Another purpose of the VPN
server is to supervise and validate the users who connect in and out through the VPN.

Proxy server

According to our network we will planning to use windows based server called ISA server. In
our network this is mainly use for internet security, packet filtering, user authentication,
caching storage devices and act as a firewall.

Web server / Application server (www.apiit.lk)

In our network system this web server will run for the internet applications. Mainly we will
use this server because of the web application of the APIIT law school. Here we use Apache
Linux based software as our web server. It’s use because it gets more security and more
reliable to the server.

File server

This contains only the storage and authentications of the users. Course materials lecture’s
files and students files stored in this server. It will be easy to both students and lectures.

 Network - Attached Storage

This is a use of file storage device in the network. This NAS will be configured from
the file server. It’s useful to file sharing, sharing printers and media streamer in our
network.

(CBS Interactive 2010)

Learning Management System (LMS)

Learning Management System is used for student’s teaching support material, students
support materials, online registrations, online student’s chatting for academic purposes,
online classes, online assignment submissions and online questioners in our network. The
LMA software that we are planning to use is Moodle.

(E-Learning Consulting 2010)

12
Networks and Networking Asia Pacific Institute of Information
Technology

4.2 Building 1

This is a main building in the APIIT Law School. It has two floors. Hall the building contains
with Layer 2 and Layer 3 network switches. Difference between the Layer 2 and Layer 3
switch is Layer 2 switch is not a manageable switch and Layer 3 switch is a manageable
switch. Also Layer 2 switch is use just for broad casting purposes. Layer 3 switch is nearly
same as routers and inside of that it includes operating systems.

4.2.1 Ground Floor

Floor Plan

According to main network diagram this floor will contains four departments and
receptionist. Departments such as Accounts department, Human resources department,
Information department and Business department.

Network Plan

Figure 2: Building 1 Ground floor

These departments’ computers, receptionist computer and wireless access point connected
with Layer 2, 24 port switch. From that switch all the cables will connected to the backbone
switch of the 2nd floor server room.

13
Networks and Networking Asia Pacific Institute of Information
Technology

Layer 2, 32port switch will connected all the devices in 1st floor in building one. It connected
to the Layer 3 switch in the server room.

4.2.2 First Floor

Floor Plan

This floor contains with 4 labs, 1 research lab, tech room and the server room. Each 4 labs
and wireless access point will connect to the Layer 2, 48 port switch.

Network Plan

Figure 3: Building 1First floor


Each lab has a Layer 2, 48 port switch. Those cables are connected to the Layer 2, 32 port
switch in the 1st floor. Then it will connect to the backbone switch. Wireless access point also
connected to the Layer 2 floor switch.

14
Networks and Networking Asia Pacific Institute of Information
Technology

4.2.3 Second Floor

Floor Plan

Building 1, 2nd floor mainly with the 2 staff rooms, 1 meeting room, 6 class rooms and
academic department. Each staff room will connected to the Layer 2, 32 port switch.
Academic departments’ computers also connected to the Layer 2, 34 port switches.

Network Plan

Figure 4: Building 1 Second floor


Each staff room will have Layer 2, 32 port switches and academic department will have
Layer 2, 32 port switches. These 3 switches and wireless access point will connect to the
building one 2nd floor Layer 2, 32 port switch. Also 6 computers in the class rooms staff
rooms Layer 2, 32 port switches and academic departments Layer 2, 32 port switch will
connect the Layer 2, 32 port switch in the 2nd floor. Then that switches’ cable will connect to
the backbone switch in the server room.

15
Networks and Networking Asia Pacific Institute of Information
Technology

4.3 Building 2

4.3.1 Ground floor

Floor plan

The second building ground floor consists of two counselor rooms, six syndicate rooms and
one Staffordshire office.

Network plan

Figure 5: Building 2 Ground floor


As seen in the above diagram this floor consists of a few devices such as a wireless device,
computers, patch panel and a Layer 2 switch. The wireless device is a wireless router set with
a secure username and password, so that an outsider will be restricted from logging into the
network. An Access point is set up in the middle of the floor so that any student, lecturer or
employee within APIIT can get better access to the WI-FI connection.

16
Networks and Networking Asia Pacific Institute of Information
Technology

The Layer 2 switch used in the ground floor will have an eight port switch considering the
few number of computers used in this floor. All the computers will be connected to the patch
panel and then to the Layer 2 switch.

4.3.2 First floor

Floor plan

The first floor consists of the library, a study room and four syndicate rooms.

Network plan

Figure 6: Building 2 First floor


In the above network plan of the floor there are three computers, patch panel and a wireless
access point. These devices are connected to a patch panel which in turn is connected using
an eight port Layer 2 switch, common to all other floors in all four buildings. The wireless
access point is once again set in the middle of the floor to give user of the WI-FI connection
better access.

17
Networks and Networking Asia Pacific Institute of Information
Technology

4.3.3 Second floor

Floor plan

The second floor consists of the Cafeteria and Game Zone.

Network plan

Figure 7: Building 2 Second floor


As shown in the diagram there is only a wireless access point, a patch panel and a Layer 2
switch used on this on this floor. The WI-FI connection is the main thing that any user in the
second floor make used of.

18
Networks and Networking Asia Pacific Institute of Information
Technology

4.4 Building 3

4.4.1 Ground floor

Floor Plan

Ground floor of this building is going to be used as examination hall which is consists of
small exam halls.

Network Plan

As shown below this floor consists of a wireless access point which is connected to a layer 2
switch and that will be used as the main switch of each floor in this building.

Figure 8: Building 3 Ground floor


For the ground floor main switch eight port layer 2 switch is used. Wireless connection will
be secured from a password so that the connection will be protected from non APIIT people.
Wireless access point is connected to a Patch Panel and it is connecting to the layer 2 switch.
When any device which is connected to the switch went out of order that should be removed

19
Networks and Networking Asia Pacific Institute of Information
Technology

from the switch. When we are doing that there is a high chance of getting the cable or the
switch damaged. So the purposes of the patch panel are to protect the switch and the cable
and to avoid unwanted expenses.

4.4.2 First Floor

Floor Plan

This floor is going to be use to have class rooms. There will be 13 class rooms in this floor.
Every class room will have an individual computer for the lecturer.

Network Plan

As shown in the above diagram, this floor consists of 13 computers, wireless access point and
a layer 2 switch. Computers and the wireless access point will connected to the layer 2 switch

Figure 9: Building 3 First floor


For the first floor we are going to use 16 ports Layer 2 .Wireless access point and the
computers will be connect to a patch panel and that will be connected to the switch.

20
Networks and Networking Asia Pacific Institute of Information
Technology

4.4.3 Second Floor

Floor Plan

This area must be leaved for future enhancements. So we left this area to be a free area.

Network Plan

Figure 10: Building 3 Second floor


As shown above, this floor only has a layer 2 switch.

This floor should be a free undecided area for any purposes. So we are planned to fix a 64
port layer 2 switch so that we can fix large number of devices to that easily in the future.

21
Networks and Networking Asia Pacific Institute of Information
Technology

4.5 Building 4

4.5.1 Ground floor

Floor Plan

Ground floor of this building is planned to be used as examination hall and the floor will be
partitioned into five exam halls.

Network Plan

Figure 11: Building 4 Ground floor


As revealed in the above figure this floor consists of a wireless access point which is
connected to a layer 2 switch .Layer 2 switch will be the main switch in an every floor in the
entire building

As for the ground floor main switch will be an eight port layer 2 switch is going to be used..
Wireless access point is connected to a Patch Panel and it is connecting to the layer 2 switch.
When any device which is fixed to the switch go doesn’t work that should be removed from

22
Networks and Networking Asia Pacific Institute of Information
Technology

the switch.. If either the cable or the switch get damaged when we are removing the cable
from the switch that will cost a lot of money as they cost a lot. The purpose of the patch panel
is to protect the switch and the cable by connecting the both switch and the cable to that and
make the connection of them inside the patch panel.

4.5.2 First Floor

Floor Plan

This floor is going to be use to have six classrooms, three syndicate rooms and two court
rooms.

Network Plan

As shown below this floor will have six computers, wireless access point and a layer 2
switch. Computers and the wireless access point is going to be connected to the switch

Figure 12: Building 4 First floor


We are going to use 16 ports Layer 2 switch .Wireless access point and the computers will be
connect to a patch panel and that will be connected to the switch.

23
Networks and Networking Asia Pacific Institute of Information
Technology

4.5.3 Second Floor

Floor Plan

This is to be leaved for future enhancements

Network Plan

Figure 13: Building 4 Second floor


As shown above this floor only has a layer 2 switch.

This floor should be a free area which supposed to be decided later by the APIIT Law School
authority. So we are planned to fix 64 ports, layer 2 switch so that we can fix large number of
devices to that easily in the future.

24
Networks and Networking Asia Pacific Institute of Information
Technology

4.6 Network Cabling

In our proposed network plan to APIIT law school we are requesting to use the be law cables.

1. CAT 5e cables

2. CAT 6e cables

3. Fiber Optics Cables

CAT 5e cables

This is the developed version of CAT 5 cables. There are four pairs of copper twisted cables
inside this cable. This has a speed of 100oMbps and carry signals for 100m.Benifit of this
cable is it has a lesser chance of meddling with another cable which is also running in the
same track. This is preferred to travel data for short distances. So in our proposed network
system we are planning to use this cable to connect devices to the patch panel and connect the
switch and the patch panel as the distance between them is lesser. After consideration the cost
of the cable and ease of the fixing we decided to use this for above purposes.

(CableOrganizer.com. 2002)

Figure 14: CAT 5e cable


Source: http://www.google.lk/imgres?imgurl=http://www.chinapans.com/images/cat5e-
c.jpg&imgrefurl=http://sites.google.com/site/ebaby88888/ospcables&usg=__ie82wEgh28dU
EC9ucHNmfC1W40I=&h=200&w=200&sz=4&hl=en&start=18&zoom=1&tbnid=anMtcqFk
1yQwQM:&tbnh=156&tbnw=156&prev=/images%3Fq%3DCAT%2B5e%26hl%3Den
%26sa%3DG%26biw%3D1280%26bih%3D656%26gbv%3D2%26tbs
%3Disch:10,740&itbs=1&iact=rc&dur=114&ei=zSmNTOyaDof-
vQOQy5ncBw&oei=AyiNTMrIL4GmvQPCqMGpCg&esq=2&page=2&ndsp=18&ved=1t:4
29,r:11,s:18&tx=50&ty=56&biw=1280&bih=656

25
Networks and Networking Asia Pacific Institute of Information
Technology

CAT 6e cables
This cable also much more similar to the CAT 5 /CAT 5 e cable the only main difference
which make CAT 6e better than them is a one structural difference which is called as
longitudinal separator. Longitudinal separator. This separator isolates the four pairs of twisted
cables which will reduces crosstalk, allows for faster data transfer and also has a higher
bandwidth comparing to the CAT 5e cables. So we are planning to use that to connect the
Layer 2 switches to patch panel and Layer 3 switches to the panel in order to connect layer 2
and layer 3 switches. This also again uses to connect layer 3 switches in an every building to
the backbone layer 3 main switch. All the cables are always don’t connect to the devices
directly they are connecting to each other with the use of the patch panel.

(CableOrganizer.com. 2002)

Fiber Optics Cables


Fiber optics is one of the latest methods of transferring data. The reasons for been so famous
among those copper is the low cost, high data carrying capacity and also as there is no fear of
any danger such as fire as there is no electricity. The other advantages of fiber optics are that
they have a highest bandwidth and also the signal loss is totally reduced in fiber optics.

So because of these reasons we planned to use fiber optics to connect the four Law School
Buildings and the APIIT main building.

(CableOrganizer.com. 2002)

26
Networks and Networking Asia Pacific Institute of Information
Technology

4.7 Wireless Connectivity

According to network diagram in each and every building floor will have a wireless access
point. When we want to connect to a wireless connection we should connect the wired
equivalent privacy key. Because if not hackers or crackers can easily enter the network.

In every floor wireless access point is in the middle of the floor. It covers 360 degrees. If
wired access point’s signal strength not enough to floor then use the wireless extenders for
alternative Wi-Fi solutions.

(About.com 2010)
(Internet.com 2010)

Wireless Network Standards

Wireless network standards are created by Institute of Electrical and Electronics Engineers
(IEEE). It founded in 1884. Here are some IEEE standards.

 802.11
 802.11a
 802.11b
 802.11g

In our networking diagram we are planning to use IEEE standards of 802.11 and 802.11a

802.11

This standard is develops for wireless LANs standards. These wireless LANs gets 1 or 2
transmissions in the 2.4 GHz band. Also this has been expended in 802.11d standard version.

802.11a

This wireless LAN provides up to 54 Mbps in the 5 GHz. These products of standards are
considered as Wi-Fi certified.
(Internet.com
2010)

27
Networks and Networking Asia Pacific Institute of Information
Technology

5.0 Linking the APIIT city campus and the APIIT law school

Figure 15: Linking between the two campuses


This is a very important part of the applied network proposal. As the users of one building
should be able to connect and communicate with the other buildings, as well as share
resources we have to consider a type of connection. The network consultants in our group
proposed to use a VPN after considering a possible use of point-to-point and remote access.
Research has been conducted on the types of connections mentioned above, the reason for
choosing VPN over the other two types of connections has been explained below:

 Point-to-Point (Wireless access)


 VPN (Virtual Private Network - wired)

28
Networks and Networking Asia Pacific Institute of Information
Technology

Point-to-Point

Point-to-Point access is a lot cheaper compared to VPN; this is implemented by using a


wireless bridge each placed on the respective buildings and are linked to the network using
radio frequency. Aside from the low cost, this connection has a few issues which include
exposure of radio signals to places outside the internal network. When radio signals are
exposed, people in the external environment (outside the internal network) will be able to
hack into the system, therefore this leads to a serious security issue where all APIIT’s
confidential data will be exposed to outside parties. Another disadvantage of point-to-point
would be that the weather is likely to affect the transmission of data.

VPN (Virtual Private Network)

A virtual private network (VPN) is a network that uses a dedicated private line which is
“virtually” private to provide connections between offices, remote workers and the Internet.

(Annabel Z. Dodd. 2005)

This can also be described as a dedicated and secure path provided by the ISP (Internet
Service Provider) to connect between LAN networks. In our network proposal we have
decided to use leased lines from SLT and dialog, these are used for internet access. So with a
VPN when we go online or try to communicate with the other building’s network the data
that is transferred will be encrypted, therefore making it harder for external networks to gain
access to the VPN. This method is reliable and secure, but the main disadvantage is the cost
of purchasing the required leased lines. However compared to Point-to-Point access this, a
VPN is far more efficient.

29
Networks and Networking Asia Pacific Institute of Information
Technology

6.0 Backup plans

Using RAID systems

Mainly there are two types of RAID systems. They are hardware arid systems and software
raid systems. The purpose of using RAID systems are speed of the hard drives and the
automatically backup data.

In here we are using RAID 1 system for our network. It called as Mirror technique or
Duplexing technique. It’s a fault tolerance system. According to mirror system this has two
hard drives for same data. If one hard drive fails nothing will happens same thing happens
from the other hard drive.

(Charles M. Kozierok 2001)


(Western Digital 2010)

Source: http://www.raids.co.uk/raid_0+1.htm

Dual Backbone Implementation

According to this network plan building one 2 nd floor has the server room. It uses Layer 3,
3com backbone switch. If there will be any emergency and the backbone switch will be
broken down hole network will be disaster. Because of that we use an alternative backbone
switch for our network.

30
Networks and Networking Asia Pacific Institute of Information
Technology

(Elsevier B.V. 2010)


(IEEE 2010)

Remote backup

If physically network will be damaged easy to have a backup server in a remote distance area.
This backup will be sending online from the internet and physically stores in the remote
place.

(Online Holdings 2010)

Backup Cables

We have used backup cables in our network proposal, so if there is damage occurred to a
cable it would still have backup cables to replace it.

31
Networks and Networking Asia Pacific Institute of Information
Technology

7.0 Conclusion

After discussing and researching on the types of networks and connectivity options, we
decided to connect all four buildings of the APIIT Law School using Fiber Optic cables and
also we used Fiber optic cables to connect the Law School to the main APIIT Campus
Building.

Aside from the cabling we have decided to link the two Campuses using a Virtual Private
Network (VPN) connection, because a VPN is more secure and reliable than other types of
connections such as Point-to-Point access.

Backup Plans have been implemented by using backup cables such as CAT5e cables, etc; so
that in the event that a cable is not working it will be replaced by the backup cables. RAID
system is used to back-up data, as well as Remote back-ups and Dual-backbone
implementation.

Overall researching about types of networks, connections, cables and other equipment had
both been a challenging and an educational experience.

32
Networks and Networking Asia Pacific Institute of Information
Technology

8.0 Appendices
8.1 Workload Matrix

Bhagya Dumidi Bhagya Aminath


Contents
Senanayake Kaduruwana Subhashini Thawfeeq
Introduction 100% - - -
Perceived Assumptions 25% 25% 25% 25%
Perceived Limitations - 100% - -
Main Plan 25% 25% 25% 25%
Building 1 - - 100% -
Network
Building 2 100% - - -
Plan
Building 3 - 100% - -
Building 4 - - - 100%
Network Cabling - 100% - -
Wireless Connectivity - - 100% -
Linking the APIIT city
campus and the APIIT 100% - - -
law school
Backup plans - - 100% -
Conclusion - - - 100%
Workload Matrix 25% 25% 25% 25%
Gantt Chart 25% 25% 25% 25%
Minutes of Meetings - - 100% -

Group Members

33
Networks and Networking Asia Pacific Institute of Information
Technology

Bhagya Nirmalee Senanayake CB003651: __________________________________

Duminidi Kalhari Kaduruwana CB003636: __________________________________

K. D. Bhagya Subhashini CB003647: __________________________________

Aminath Anjaman Thawfeeq CB003647: __________________________________

8.2 Gantt Chart

34
Networks and Networking Asia Pacific Institute of Information
Technology

Figure 16: Gantt Chart

8.3 Minutes of meetings

8.3.1 Meeting 1

Lecturer’s Signature: ________________________________________________

35
Networks and Networking Asia Pacific Institute of Information
Technology

8.3.2 Meeting 2

Lecturer’s Signature: ________________________________________________

36
Networks and Networking Asia Pacific Institute of Information
Technology

8.3.3 Meeting 3

Lecturer’s Signature: ________________________________________________

37
Networks and Networking Asia Pacific Institute of Information
Technology

38
Networks and Networking Asia Pacific Institute of Information
Technology

8.3.4 Meeting 4

Lecturer’s Signature: ________________________________________________

39
Networks and Networking Asia Pacific Institute of Information
Technology

8.3.5 Meeting 5

Lecturer’s Signature: ________________________________________________

40
Networks and Networking Asia Pacific Institute of Information
Technology

9.0 List of References

About.com 2010, DMZ - Demilitarized Zone, [Online], Available:


http://compnetworking.about.com/cs/networksecurity/g/bldef_dmz.htm [Accessed 30 August
2010]

About.com 2010, Wireless Product Equipment - Network Routers, Access Points, Adapters
and More, [Online], Available:
http://compnetworking.about.com/od/wireless/ss/wirelessgear_7.htm [Accessed 31 August
2010]

Annabel Z. Dodd. 2005, VPNS and Specialized Network Services, Pearson Education Inc

Anon. n.d, RAID 1 - Mirroring - Fault Tolerance, [Online], Available:


http://www.bestpricecomputers.co.uk/glossary/raid-1.htm [Accessed 04 September 2010]

Bradley Mitchell (n. d), Wireless / Networking  Guide,[Online], Available:


http://compnetworking.about.com/od/firewalls/g/bldef_firewall.htm [Accessed August 8th
2010]

CableOrganizer.com. 2002, Knowledge Database - F.A.Q., [Online],


Available:http://cableorganizer.com/answers/about-cableorganizercom.html[Accessed
August 10th 2010]

CBS Interactive 2010, Best network attached storage, [Online], Available:


http://reviews.cnet.com/best-network-attached-storage/ [Accessed 11 September 2010]

Charles M. Kozierok April 17, 2001, RAID Level 1, [Online], Available:


http://www.pcguide.com/ref/hdd/perf/raid/levels/singleLevel1-c.html [Accessed 03
September 2010]

e-Learning Consulting 2010, Learning Management System (LMS), [Online], Available:


http://www.e-learningconsulting.com/products/learning-management-system.html [Accessed
11 September 2010]

Elsevier B.V. 2010, The DUAL backbone network: distributed and parallel processing on a
large scale, [Online], Available: http://www.sciencedirect.com/science?

41
Networks and Networking Asia Pacific Institute of Information
Technology

_ob=ArticleURL&_udi=B6TYT-4998S62-
2G&_user=10&_coverDate=12/31/1987&_rdoc=1&_fmt=high&_orig=search&_origin=sear
ch&_sort=d&_docanchor=&view=c&_searchStrId=1458543918&_rerunOrigin=google&_ac
ct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=123de143fe67e934788f39
e119fda559&searchtype=a [Accessed 07 September 2010]

IEEE 10 August 2010, IEEE 802 LAN/MAN Standards Committee, [Online], Available:
http://www.ieee802.org/ [Accessed 02 September 2010]

IEEE 2010, Real Time Estimation for Usage-Dependent Reliability on a Dual-Backbone


Network Subsystem, [Online], Available:
http://www.computer.org/portal/web/csdl/doi/10.1109/FTCS.1999.781069 [Accessed 08
September 2010]

Internet.com 2010, 802.11, [Online], Available:


http://www.webopedia.com/quick_ref/WLANStandards.asp [Accessed 02 September 2010]

Internet.com 2010, DMZ, [Online], Available:


http://www.webopedia.com/TERM/D/DMZ.html [Accessed 30 August 2010]

Internet.com 2010, WEP, [Online], Available:


http://www.webopedia.com/TERM/W/WEP.html [Accessed 01 September 2010]

Internet.com 2010, Wireless Networking Standards, [Online], Available:


http://www.webopedia.com/quick_ref/WLANStandards.asp [Accessed 02 September 2010]

Online Holdings 2010, Remote Backup Systems, [Online], Available: http://www.remote-


backup.com/rbackup/ [Accessed 09 September 2010]

The Computer Technology Documentation Project (n. d), Domain Name Service, [Online],
Available:http://www.comptechdoc.org/independent/networking/guide/netdns.html
[Accessed * August 8th 2010]

Western Digital 2010, About RAID, [Online], Available:


http://www.wdc.com/en/products/raid/ [Accessed 05 September 2010]

42
Networks and Networking Asia Pacific Institute of Information
Technology

43

Das könnte Ihnen auch gefallen