Beruflich Dokumente
Kultur Dokumente
Submitted in partial fulfillment for the degree of Bachelor of Science (Hons) in Computing
Deshan Ilangakoon
Ahamed Nishadh
Dilshan Zuhdi
GROUP COMPONENT
Diagrams and/or Figures (20) Analytical and Critical Thinking (20) Documentation (5)
i
Referencing (10) Group Total (70) Presentation (20) Progress Report (5) Workload Matrix (5) Individual Total (30) Grand Total (100)
INDIVIDUAL COMPONENT
WORKLOAD MATRIX
Name / CB No. Work Assigned Work Completed Comments & Signature Dilshan Introduction Objectives RequirementSpecifications Scope Assumptions Floor Description and designGround Floor Second Floor Security Options Limitations Floor Description and designFirst Floor Third Floor Fourth Floor Topologies Feasibility Study Conclusion Meeting Minutes Gantt Chart Backbone Network plan Floor Description and designFifth Floor Sixth Floor Seventh Floor Backup options Ahamed Deshan
ALL COMPLETED
ALL COMPLETED
ALL COMPLETED
ii
iii
ACKNOWLEDGEMENTS
Firstly we would like to thank our lecturer Mr.Udesha Amarasinghe for all the help and guidance given to us while doing this assignment. Especially for teaching us this module in such a way that we were able to learn this highly technical module very easily. Also we would like to thank Mr. Balachandran of the School of Computing of APIIT for all the assistance given in preparing this document. Also there are many individuals who have helped us in numerous ways directly and indirectly so that we were able to complete this assignment. APIIT Lanka for providing us with resources and the Tech Team at APIIT Lanka for their assistance at required times. And last but not least our friends, parents and the well-wishers without whose moral support and encouragement, we would not have been able to do a good job. Finally, if there are any shortcomings in this project, then we request to excuse us for all those and accept this documentation. Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi
iv
TABLE OF CONTENTS
1.0 INTRODUCTION ........................................................................................... 1 2.0 ANALYSIS ..................................................................................................... 2 3.0 OBJECTIVES .................................................................................................. 3 4.0 REQUIREMENT SPECIFICATIONS ............................................................. 4 5.0 SCOPE ............................................................................................................ 5 6.0 ASSUMPTIONS .............................................................................................. 6 7.0 FLOOR AND NETWORK PLANS ................................................................. 8 7.1 BACKBONE NETWORK PLAN................................................................ 8 7.1.1 DNS SERVER ...................................................................................... 8 7.1.2 DHCP SERVER.................................................................................... 8 7.1.3 SIP SERVER ........................................................................................ 8 7.1.4 BACKUP SERVER .............................................................................. 9 7.1.5 EMAIL SERVER .................................................................................. 9 7.1.6 PRINT SERVER ................................................................................... 9 7.1.7 ANTIVIRUS SERVER ......................................................................... 9 7.1.8 DATABASE SERVER ......................................................................... 9 7.1.9 FILE SERVER .....................................................................................10 7.1.10 PROXY SERVER ..............................................................................10 7.1.11 SWITCHES .......................................................................................10 7.1.12 WIRELESS ACCESS POINTS ..........................................................12
7.1.13 ROUTERS .........................................................................................13 7.1.14 FIREWALL .......................................................................................14 7.1.15 ADSL ................................................................................................14 7.2 GROUND FLOOR .....................................................................................15 7.2.1 FLOOR PLAN .....................................................................................16 7.2.2 NETWORK PLAN ..............................................................................16 7.3 FIRST FLOOR ...........................................................................................18 7.3.1 - FLOOR PLAN .....................................................................................19 7.3.2 - NETWORK PLAN ...............................................................................19 7.4 SECOND FLOOR ......................................................................................20 7.4.1 FLOOR PLAN .....................................................................................21 7.4.2 NETWORK PLAN ..............................................................................21 7.4.4 SERVER ROOM .................................................................................23 7.5 THIRD FLOOR..........................................................................................26 7.5.1 FLOOR PLAN .....................................................................................26 7.5.2 NETWORK PLAN ..............................................................................26 7.6 FOURTH FLOOR ......................................................................................29 7.6.1 FLOOR PLAN .....................................................................................29 7.6.2 NETWORK PLAN ..............................................................................29 7.7 FIFTH FLOOR ...........................................................................................32 7.7.1 FLOOR PLAN .....................................................................................32
vi
7.7.2 NETWORK PLAN ..............................................................................32 7.8 SIXTH FLOOR ..........................................................................................34 7.8.1 FLOOR PLAN .....................................................................................34 7.8.2 NETWORK PLAN ..............................................................................34 7.9 SEVENTH FLOOR ....................................................................................37 7.9.1 FLOOR PLAN .....................................................................................37 7.9.2 NETWORK PLAN ..............................................................................37 8.0 BACKUP OPTIONS ...................................................................................... 39 8.1 ONLINE BACKUP ....................................................................................39 8.2 BACKUP SERVER....................................................................................39 8.3 NETWORK HARDWARE FAILURE .......................................................40 9.0 TOPOLOGIES ............................................................................................... 41 9.1 TREE TOPOLOGY....................................................................................41 9.2 STAR TOPOLOGY ...................................................................................42 10.0 FEASIBILITY STUDY ............................................................................... 43 10.1 - TECHNICAL FEASIBILITY....................................................................43 10.2 - OPERATIONAL FEASIBILITY ..............................................................44 10.3 SCHEDULE FEASIBILITY.....................................................................45 10.4 ECONOMIC FEASIBILITY ....................................................................45 11.0 SECURITY .................................................................................................. 46 11.1 FIREWALL..............................................................................................46
vii
11.2 PROXY SERVER ....................................................................................46 11.3 VIRTUAL LAN .......................................................................................47 11.4 PASSWORD PROTECTED WI-FI ..........................................................47 11.5 ANTIVIRUS SERVER.............................................................................47 12.0 LIMITATIONS ............................................................................................ 48 13.0 CONCLUSION ............................................................................................ 49 BIBLIOGRAPHY .................................................................................................. 50 MEETING MINUTES ............................................................................................ 52 1st MEETING......................................................................................................52 2nd MEETING .....................................................................................................53 3rd MEETING .....................................................................................................54 4th MEETING .....................................................................................................55 5th MEETING .....................................................................................................56 6th MEETING .....................................................................................................57 7TH MEETING ....................................................................................................58
viii
TABLE OF FIGURES
Figure 1 - BACKBONE NETWORK DIAGRAM........................................................................ 15 Figure 2 - GROUND FLOOR DIAGRAM ................................................................................ 18 Figure 3 - FIRST FLOOR DIAGRAM ...................................................................................... 20 Figure 4 - SECOND FLOOR DIAGRAM ................................................................................. 23 Figure 5 - SERVER ROOM DIAGRAM ................................................................................... 25 Figure 6 - THIRD FLOOR NETWORK DIAGRAMV.................................................................. 28 Figure 7 - FOURTH FLOOR NETWOKR DIAGRAM ................................................................ 31 Figure 8 - FIFTH FLOOR NETWORK DIAGRAM .................................................................... 33 Figure 9 - SIXTH FLOOR NETWORK DIAGRAM..................................................................... 36 Figure 10 - SEVENTH FLOOR NETWORK DIAGRAM ............................................................. 38 Figure 11 - Tree Topology ................................................................................................. 41 Figure 12 - STAR TOPOLOGY ........................................................................................ 42
ix
1.0 INTRODUCTION
Seashells Colombo is a member of the internationally renowned Confifi Seashells Group of Hotel. The management of Seashells Group have decided to set up a new hotel in the Southern part of Sri Lanka with the tourism industry picking up. The new hotel is named Seashells Reef and is located near the sea and is considered a beach hotel. The hotel is a luxury and semi-luxury hotel and will be catering to the local as well as foreign tourists. The hotel consists of 100 rooms spread across 7 floors. The hotel also has 2 banquet halls, restaurants, coffee shops, sales outlets, recreational areas and a VIP business center. With the construction of the building started, the management of Seashells group has requested us to design a network plan for their hotel connecting all areas of the hotel to a centralized location so as to provide services to the customers as well as to provide a secure and efficient and fast connectivity for the management and the staff. Considering all these aspects we have come up with this documentation providing all the relevant plans to set up a fully secure and efficient network to the hotel. From the type of cables to be used to the method they are to be wired along, everything has been looked into in this documentation as well as the type of devices to be used, the security systems in place, methods the devices are connected are all addressed in this documentation. It should also be noted that while designing the network we have taken note of further upgrades in the future and allowed facilities to be easily upgraded with minimum difficulty.
2.0 ANALYSIS
Our group was assigned the task of creating a network plan for Seashells Colombo. As a part of this project that we are undertaking the first task at hand is to identify the problems. After this we had to do several researches into the best way to implement the solution that we had identified for solving the requirements of Seashell Colombo. We analyzed the problem that we were facing and developed solutions using the research that we had carried out. We identified after this the best and most suited way of laying the network and the most suited hardware that would help laid a network of the highest quality.
3.0 OBJECTIVES
The computers that the staff will be using and the computers that the guests will be using have been set up on two different networks. At places they have been physically separated using different hardware and at times have been virtually separated using virtualization of networks. This is to ensure that guests cannot access the staff network due to security issues. Wireless networks are placed in all the floors so that users with wireless network accessible devices can use connect to the network and use the services. The wireless networks are primarily intended to be used by the guests and no access is given to the staff network on the wireless networks. More than one external connectivity methods are used, such as 3 separate ADSL lines and 4 separate PSTN telephone lines so as to level off the load that is being put on the network due to the size of the network. This will ensure that external connectivity will remain smooth with less traffic interference. A firewall has been installed to monitor all incoming traffic through the internet while a proxy server has been installed in the network to monitor all outbound network traffic. This is done so as to secure the networks and the inbound and outbound traffic to provide a quality service to the guests. The network is being designed with the intention of future upgrades in mind.
5.0 SCOPE
To make this project of networking the hotel, there are certain aspects that we need to consider. They are: What kind of devices have to be used? What kind of network needs to be used? What are the services that will be provided in the network? What are the security measures and standards that need to be implemented for data protection? y y
y
y y y y
What is the budget of this project? The feasibility of this project. Where and how devices and are to be placed in the building for and efficient network.
6.0 ASSUMPTIONS
In this project, we have taken certain assumptions so as to make this assignment a success. They are as follows: y The network plan has been done according to a very average budget although the hotel had not specified a budget for us to work on. y Backups are taken on the backup server only and no offsite backups are taken. y y The best possible network solution is being submitted to Seashells Group. All the cabling and the installation will be either done by us or by certified professionals so that the network works flawlessly. y If one external connection line (ADSL or PSTN) is down due to malfunctioning, the rest of the lines will take over the job automatically while the faulty line is being repaired. y y The backup server will manage all the backup processes. In the case of guest rooms, the networking is shown for only one room in each floor. This is because all the other rooms will also have a similar networking process done except that the cabling will change depending on the availability at the time of cabling. y Although shown in the diagrams that there is a computer in every room, it is not the case. Only an RJ45 port is available in each room with a spare 1m cable in each room to connect the users personal devices. y The telephones shown in the diagrams are physically present in the rooms and the guests cannot connect any other devices to those connections. y All the cabling will be done along the ceiling since we assume that there will be a space between the concrete floors and the ceilings which allow wiring to be done along the ceilings. y Appropriate measures are being taken to protect the cabling and the devices and jacks so as to prevent corrosion or salt building up since the hotel is located near the sea. y Sufficient electrical power is available at the hotel to support the core of the network (servers and switches and other devices).
The wireless access point devices are able to support the entire floor with minimum signal drop.
y y
No dead zones are created due to two wireless networks clashing each other. The network plan submitted is able to meet all the requirements said by the management.
The cable duct houses not only the network cables but also other electric wiring of the hotel.
The devices such as switches and wireless access points are placed in safe and secure locations when they are exposed publicly.
The cables connected to the devices, are connected to the appropriate place of each device, and not as shown in the diagrams. (Ex. the network cable connected to the computer is connected to the NIC of the computer and not to the monitor or keyboard)
The Wireless networks are secured using network keys so that no user from outside can access the network. The password to be used is widely publicized inside the hotel so that guests can only access the network and are changed every 90 days to keep the network secured.
Adequate IP addresses are available for a considerable number of wireless devices to be connected.
database server, performs tasks such as data analysis, storage, data manipulation, archiving, and other non-user specific tasks. (Webopedia, n.d.) We use this server to maintain our database system easily.
7.1.11 SWITCHES
What is a Switch? Why do we use them? A Network Switch is a hardware appliance with a fixed number of Network Ports (RJ-45 Ports) that can connect multiple Network devices to the LAN (Local Area Network). They are mainly used for sharing Internet connectivity between multiple computers or sharing some network resource like Printer or NAS Box so that they can be accessed by all the users of the network. Layer 2 Switch and Standards we will be using:
10
The Layer 2 Switches are for all in to the 2nd Layer of the OSI Model and these switches are hardware based. It can also be called as Standard Switch and it required a Media Access Control Address (MAC) to identify the Source and the Destination of the Data Packet. Layer 2 Switch Standards 1. The 1st Standard that we use is the DES-3552 xStack it is a 48 port Layer 2 Switch. We use this switch in Several Floors they are: y Ground floor- we use a 48 port to this floor is to connect the guest computers, printer and the wireless access point. y 2nd Floor- we use this switch to connect all the staff network computers, the Wireless access point and the network printers. y 3rd Floor- we use this switch to connect all the network computers, the wireless access point and the network telephones. y 4th Floor- we use two 48 port switches in this floor we use one switch for the network computers and the wireless access point and the other is for the network telephones. y 5th Floor- we use this switch to connect all the network computers, wireless access point and network telephones. y 6th floor- we use this switch to connect all the network computers, wireless access point and network telephones. y 7th Floor- we use two Layer 2 Switches. We use one switch for the network computers and the wireless access point and the other is for the network telephones.
2. The 2nd Standard that we use is the DGS-3426P it is a 24 port Layer 2 Switch. We use this switch in Several Floors they are: y Ground floor- We use 2 switches one is to connect all the shop computers, Restaurant Computers and the kitchen computers. And the other switch is to the network telephones.
11
1st Floor- we use a switch here to connect all the network computers, network telephones and the wireless access point. 2nd Floor- we use 2 switches one is to connect all the servers and the other one is for the network telephones.
Layer 3 Switch and the Standards we will be using: Its a hardware device which operates in the network layer of the OSI Model. A layer 3 switch is separated from a router is that L3 switch contains hardware which have been optimized to pass data as fast any layer 2 switch and they have the ability to make decisions on how to transmit traffic and is the usual behavior of a router. A Layer 3 Switch is also faster than a Router because of its hardware switching capabilities. Layer 3 Switch Standards The standard we will be using is DGS-3650. Its a 48 port layer 3 switch and we use this switch as our backbone switch in our network.
802.11g Standard: It applies to wireless LANs and is used for transmission over short distances at up to 54-Mbps in the 2.4 GHz bands. 802.11n Standard: 802.11n builds upon previous 802.11 standards by adding multiple-input multipleoutput (MIMO). The additional transmitter and receiver antennas allow for increased data throughput through spatial multiplexing and increased range by exploiting the spatial diversity through coding schemes like Altamonte coding. The real speed would be 100 Mbit/s (even 250 Mbit/s in PHY level), and so up to 4-5 times faster than 802.11g. From these Standards we use the 802.11.n because its the latest technology in wireless access point. (Webopedia, n.d.)
7.1.13 ROUTERS
It is a device that sends data packet along the network. Its used to connect two or more networks together. They are located at the gateways where two or more networks connected. And it keeps the critical devices data flowing between networks and keeps the networks connected to the internet. The main advantages of a router are: y y y y y It limits the collision domain. It can connect to different architectures and media. It can function on WAN and LAN. It can filter the broadcast. It can determine the best path for the data reach.
(AllInterview.com, n.d.) In our network we have 8 routers. Every floor we have put a router to access internet wirelessly. And we are having a ADSL router to get the internet connection.
13
7.1.14 FIREWALL
Its a system that is designed to prevent from unauthorized access to or from a private network. It can implement in both hardware or software or a combination of the both. It is usually used to prevent unauthorized internet users from private networks connected to the internet, especially intranets. (Webopedia, n.d.) What do firewalls do? y y y The most basic type firewall performs Packet Filtering. A second type of firewall, which provides additional security, is called Circuit Relay. Another and still more involved approach is the Application Level Gateway.
(PC-Help, n.d.)
7.1.15 ADSL
The definition of ADSL is Asymmetric Digital Subscriber Line. Its a type of a DSL communication technology used to connect internet. This allows more data to send over existing copper telephone lines (POTS) when we compared to the traditional modem lines. A special filter called microfilter in installed on a subscribers telephone line to allow both ADSL and regular voice services to be used at the same time. ADSL requires a special ADSL modem and subscribers must be in close geographical locations to the provider's central office to receive ADSL service. Typically this distance is within a radius of 2 to 2.5 miles. ADSL supports data rates of from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and from 16 to 640 Kbps when sending data (known as the upstream rate). (Webopedia, n.d.)
Advantages of ADSL y y y y y It can use higher data rate of 26mbps maximum wherever possible. It uses a normal telephone lines. And it is easy to start using ADSL. We can use modem and telephone simultaneously using the ADSL splitter. ADSL modems are cheap and anyone can afford it. Its always on connection.
14
BACKBONE DIAGRAM
Figure 1 - BACKBONE NETWORK DIAGRAM
15
current era with almost every modern mobile communication device being able to connect to a wireless network. With the wireless access point, guests especially in the lobby area and the restaurant area plus any guest in the whole of the ground floor can connect to the wireless network of the hotel using a communication device and access the services provided by the hotel.
17
18
19
20
21
The second switch used in this floor is for the VoIP telephone network. Since all the telephones are connected to just one network, no separate sub networks are being made for this network and all telephone lines are connected to one switch. The other Layer 2 switch used in this floor is the switch for the server room to connect all the servers. More detailed description of the server room and the network of the server room are given below.
22
23
24
25
26
The mini restraint and recreational are of floor have each one network port and one telephone line. The network port will be used to maintain their records and inventory and therefore will be in a separate VLAN. This will allow for higher security for the administrative work of the hotel. All telephone networks will be using a VoIP to communicate internally and also with the any outside line via the VoIP server.
27
28
will be in a separate VLAN. This will allow for higher security for the administrative work of the hotel. All telephone networks will be using a VoIP to communicate internally and also with the any outside line via the VoIP server.
30
31
32
33
34
1st VLAN is to the guest rooms Network ports and wireless access point. 2nd VLAN is to the purchasing department, stores and Engineering department Network computers. 3rd VLAN is to the guest room, purchasing department, stores and Engineering department telephones. We divide guest rooms and wireless access point VLAN from department, stores and Engineering department VLAN because to keep the department files and data secured. And no one cannot access to the department network.
35
36
37
38
40
9.0 TOPOLOGIES
9.1 TREE TOPOLOGY
The network for Seashell-Reef has been laid using two distinct topologies. The first topology is a tree topology. This topology is a collection of both bus and star topologies. In a tree topology there is a main backbone cable which acts as the trunk of the tree and from this smaller networks go out to form the branches of the this tree topology. A drawback however with the tree topology is that the central backbone cable fails the entire network will fail along with it. Tree topology is illustrated further in the diagram given bellow. We have used the Tree topology to lay the switches going from the main Backbone switch to the separate switches in each floor. The main line runs form the ground floor all the way up to the top floor and in each floor a line is taped from the main line and then taken to the separate smaller sub networks which have been laid in the second topology that we have used which is Star topology. The telephone networks are also placed in the same topological order as the computer networks. There is a main line that goes to all the floors and it is from this main line that all the other branches are taken.
41
Figure 12 - STAR TOPOLOGY Where the star topology is found in our network is where in each floor the network cables are drawn out from the central switch to the network ports. This is how the star topology has been implemented. This topology is executed in each of the floors with guest bed rooms and also in the VIP centre and the other administrative departments. In each floor the telephone lines also taken in a star topological manner. All the telephone lines are connected to one central switch and get distributed out over the floor from that point. (University of South Florida, n.d.)
42
43
44
The above are the unit prices for several vital products that we would be using in the network for Seashell-Reef. We would be acquiring several of these above mentioned products along with more products also from d-Link Corporation. (NewEgg, n.d.) (D-Link, n.d.) (D-Link, n.d.) (D-Link, n.d.)
45
11.0 SECURITY
One of the main objectives while creating this network is the security. It was requested by the clients that the network should be secured so that their private data is not compromised and any unauthorized access is not allowed into the network. With these aspects in mind we have implemented the following security strategies in the network to make the network safe and secure. Firewall Proxy Server Virtual LAN Password protected Wi-Fi Antivirus Server
11.1 FIREWALL
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. (Webopedia, n.d.) In our network, we have implemented one hardware based firewall. The firewall is placed between the Load Balancer and the Router so that all incoming traffic from any one of the 3 ADSL lines are first filtered from unauthorized access before being allowed to the Router to be allowed into the private network of the hotel.
46
47
12.0 LIMITATIONS
y Although provisions have been made for further upgrades in the future, extensive upgrades will require considerable investment as new equipment will have to be obtained. y Access to the network is available on two levels only. If more user access levels need to be added, the network will have to be reconfigured as a whole. y The staff and guest network are not physically separated in certain instances thereby posing a small security threat. If a very knowledgeable hacker gets into the network, he might be able to access the staff network from the guest network.
48
13.0 CONCLUSION
The task that was presented to us was to create a communication network for Seashell Colombos newest hotel Seashell-Reef. For this network the management of Seashell Colombo have required that the system be of the highest standards and have to be able to provide efficiency, security, speed and reliability. To ensure this our team has conducted extensive research into the products that are available in the market and have selected the most suitable of these products that comply with the requirements that have been specified by the client. Products have all been bought from D-Link Corporation to ensure that the products that are used in the network are fast, reliable and durable. For this we have not compromised on cost when it came to purchasing of the best quality products. Also the entire team performed professionally and contributed their fullest efforts into ensuring that the system was developed to the required standards.
49
BIBLIOGRAPHY
AllInterview.com, n.d. Networking All Other. [Online] Available at: http://www.allinterview.com/showanswers/60080.html [Accessed 21 Aug 2011]. D-Link, n.d. DES-3228PA. [Online] Available at: http://www.dlink.com/products/?pid=644 [Accessed 21 Aug 2011]. D-Link, n.d. DES-3552. [Online] Available at: http://www.dlink.com/products/?pid=800 [Accessed 21 Aug 2011]. D-Link, n.d. DIR-330. [Online] Available at: http://www.dlink.com/products/?pid=564 [Accessed 21 Aug 2011]. Mitchell, B., n.d. access point, wireless. [Online] Available at: http://compnetworking.about.com/cs/wireless/g/bldef_ap.htm [Accessed 21 Aug 2011]. Mitchell, B., n.d. What Is a DNS Server? [Online] Available at: http://compnetworking.about.com/od/dns_domainnamesystem/f/dns_servers.htm [Accessed 21 Aug 2011]. NewEgg, n.d. D-Link DGS-3650. [Online] Available at: http://www.newegg.com/product/product.aspx?Item=N82E16833127344&CMP=AFCC8Junction&nm_mc=AFC-C8Junction&cm_mmc=AFC-C8Junction-_-na-_-na-_na&AID=10440897&PID=1796839&SID=10204226 [Accessed 21 Aug 2011]. PC-Help, n.d. What is a firewall? [Online] Available at: http://www.pchelp.org/www.nwinternet.com/pchelp/security/firewalls.htm#proxy [Accessed 21 Aug 2011]. SearchNetworking, n.d. file server. [Online] Available at: http://searchnetworking.techtarget.com/definition/file-server [Accessed 21 Aug 2011]. Tuning 2.0, n.d. ADSL Technology for Faster Internet Speeds. [Online] Available at: http://www.tuning.co.in/adsl-technology-for-faster-internet-speeds/ [Accessed 21 Aug 2011]. University Information Technology Services, n.d. Indian University - University Information Technology Services. [Online] Available at: http://kb.iu.edu/data/adov.html [Accessed 21 Aug 2011]. University of South Florida, n.d. What is a Topology? [Online] Available at: http://fcit.usf.edu/network/chap5/chap5.htm [Accessed 21 Aug 2001]. Webopedia, n.d. 802.11. [Online] Available at: http://www.webopedia.com/TERM/8/802_11.html [Accessed 21 Aug 2011].
50
Webopedia, n.d. ADSL. [Online] Available at: http://www.webopedia.com/TERM/A/ADSL.html [Accessed 21 Aug 2011]. Webopedia, n.d. database server. [Online] Available at: http://www.webopedia.com/TERM/D/database_server.html [Accessed 21 Aug 2011]. Webopedia, n.d. firewall. [Online] Available at: http://www.webopedia.com/TERM/F/firewall.html [Accessed 21 Aug 2011]. Webopedia, n.d. firewall. [Online] Available at: http://www.webopedia.com/TERM/F/firewall.html [Accessed 21 Aug 2011]. Webopedia, n.d. proxy server. [Online] Available at: http://www.webopedia.com/TERM/P/proxy_server.html [Accessed 21 Aug 2011]. Webopedia, n.d. VLAN. [Online] Available at: http://www.webopedia.com/TERM/V/VLAN.html [Accessed 21 Aug 2011]. WhatIsMyIPAddress, n.d. What is IPv6? [Online] Available at: http://whatismyipaddress.com/sip [Accessed 21 Aug 2011].
51
MEETING MINUTES
1st MEETING
Meeting/Project Name: Meeting 1 Date of Meeting: 05th July 2011 Time: 03.30 pm Minutes Prepared By: Deshan Ilangakoon Location: APIIT Cafeteria 1. Meeting Objective To identify the requirement that has been specified by the client and assign initial work 2. Attendance at Meeting Present Absent Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Dilshan Zuhdi (CB004150) 3. Agenda and Notes, Decisions, Issues Topic Identify the problem that was presented to us and try to find suitable solution for prevailing problem. Handling the meeting minutes and the Gantt chart 4. Action Items Action Create Gantt chart Initial research Owner Deshan Ilangakoon Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi Due Date 07/07/2011 10/70/2011
5. Next Meeting (if applicable) Date: 11/07/2011 Time: 03.30pm Objective: Planning requirement specification
Location:
APIIT Cafeteria
. Group Leader
. Lecturer
52
2nd MEETING
Meeting/Project Name: Meeting 2 Date of Meeting: 11th of July 2011 Minutes Prepared By: Deshan Ilangakoon 1. Meeting Objective Allocate task of requirement gathering 2. Attendance at Meeting Present Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Dilshan Zuhdi (CB004150) 3. Agenda and Notes, Decisions, Issues Topic All group members were assigned the task of gathering information for the planned solution Time: Location: 03.30 pm APIIT Cafeteria
Absent
Time 03.30 pm
4. Action Items Action Find information regarding the requirements for the network to be designed. Owner Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi Due Date 15/07/2011
5. Next Meeting (if applicable) Date: 18/07/2011 Time: Objective: Start Research
05.00pm
Location:
APIIT Cafeteria
. Group Leader
. Lecturer
53
3rd MEETING
Meeting/Project Name: Meeting 3 Date of Meeting: 18th July 2011 Minutes Prepared By: Deshan Ilangakoon 1. Meeting Objective Start work on research 2. Attendance at Meeting Present Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Dilshan Zuhdi (CB004150) 3. Agenda and Notes, Decisions, Issues Topic Each member was to carry out research on a specific hardware that would be used in the network that was to be laid. Check on work allocated during previous meeting 4. Action Items Action Hardware research Owner Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi Due Date 15/07/2011 Time: Location: 05.00 pm APIIT Cafeteria
Absent
5. Next Meeting (if applicable) Date: 26/07/2011 Time: Objective: Network panning
03.30 pm
Location:
APIIT Cafeteria
. Group Leader
. Lecturer
54
4th MEETING
Meeting/Project Name: Meeting 4 Date of Meeting: 26th July 2011 Minutes Prepared By: Deshan Ilangakoon 1. Meeting Objective Start work on network plan 2. Attendance at Meeting Present Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Dilshan Zuhdi (CB004150) 3. Agenda and Notes, Decisions, Issues Topic Designing floor plan and network diagram for company. Check on work allocated during previous meeting. 4. Action Items Action Develop the floor plan and network diagram. Owner Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi Due Date 08/08/2011 Time: Location: 03.30 pm APIIT Cafeteria
Absent
5. Next Meeting (if applicable) Date: 08/08/2011 Time: 03.30 pm Objective: Start on documentation
Location:
APIIT Cafeteria
. Group Leader
. Lecturer
55
5th MEETING
Meeting/Project Name: Meeting 5 Date of Meeting: 08th August 2011 Minutes Prepared By: Deshan Ilangakoon 1. Meeting Objective Start documentation 2. Attendance at Meeting Present Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Dilshan Zuhdi (CB004150) 3. Agenda and Notes, Decisions, Issues Topic Start making the documentation for the final project document. Check on work allocated during previous meeting. 4. Action Items Action Documentation Owner Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi Due Date 17/08/2011 Time: Location: 03.30 pm APIIT Cafeteria
Absent
5. Next Meeting (if applicable) Date: 18/08/2011 Time: Objective: Compiling document
05.00 pm
Location:
APIIT Cafeteria
. Group Leader
. Lecturer
56
6th MEETING
Meeting/Project Name: Meeting 6 Date of Meeting: 18th August 2011 Minutes Prepared By: Deshan Ilangakoon 1. Meeting Objective Compiling the document 2. Attendance at Meeting Present Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Dilshan Zuhdi (CB004150) 3. Agenda and Notes, Decisions, Issues Topic All documentation done so far was handed over so that it could be compiled and added into a single document with the proper formatting. Check on work allocated during previous meeting. 4. Action Items Action Compiling document Owner Ahamed Nishadh Due Date 21/08/2011 Time: Location: 05.00 pm APIIT Cafeteria
Absent
Time 05.00 pm
Ahamed Nishadh
05.15 pm
10.00 am
Location:
Objective:
. Group Leader
. Lecturer
57
7TH MEETING
Meeting/Project Name: Date of Meeting: Minutes Prepared By: 1. Meeting Objective Close of project meeting 2. Attendance at Meeting Present Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Dilshan Zuhdi (CB004150) 3. Agenda and Notes, Decisions, Issues Topic Thanking all members for the hard work done and for completing the required work on time. Meeting 6 21st August 2011 Deshan Ilangakoon Time: Location: 10.00 am Ahamed Nishadhs Residence
Absent
Time 10.00
Location:
. Group Leader
. Lecturer
58