Sie sind auf Seite 1von 15

Polytechnic University of the Philippines College of Engineering

ELECTRONICS AND COMMUNICATIONS ENGINEERING


Engineering & Architecture Bldg., Anonas St., Pureza St., NDC Compound Sta. Mesa, Manila

Computer Network within the ECE Department (3rd floor CE Building)

By

Lei Anne MariAbas Lenard Finez Sarah Joy A. Vargas


ECE 5-1

Submitted to: Engr. BheverlieQuetua

October 2011

TABLE OF CONTENTS

PAGE

I. II. III. IV. V. VI. VII.

Description of the Project Design of the Network Documentation for additional requirement Hardware Specifications of the Network Schedule of Task Schedule of Expenses Challenges

1 4 7 10 11 12 13

DESCRIPTION OF THE PROJECT


Situation in which the Project Exists

The purpose of this document is to apply networking knowledge in real scenario. With the project to construct a computer network within the Electronics and Communications Engineering Department located at third floor Engineering and Architecture building, Anonas St., Pureza St., NDC Compound Sta. Mesa, Manila. With an objective of interconnecting networks within the ECE premises considering ECE Department, ECE Laboratory, ECE Networking laboratory room and allotting slots for other ECE classroom.

Network Scope

The proposed network is to serve the ECE Department which includes the Chairpersons Office, Laboratory, networking laboratory and seven

classrooms.

Objectives of the Network

The network is designed to achieve several specific business/operational objectives:

1.

Secure Service: The main objective of this network is to interconnect networks within the ECE Premises considering ECE Department, ECE

Laboratory, ECE Networking Laboratory room allotting slots for other ECE classroom.

2.

Integration and Update: Presently there are many LANs in the building, but much of the equipment is out of date, many of the LANs are incompatible with each other, and not connected in a system-wide network. This proposal describes a LAN that can be used to interconnect students and the faculty.

3.

Versatile Information Processing: The network will enable users to retrieve, process, and store ASCII and non-ASCII text, still graphics, audio, and video from any connected computer. The administrator has the access to delete or modify any file inside it however; all clients have the right to add files on it.

Intended Users

The primary users of the network be the three administrators, which are the current chairperson, head of ECE laboratory and the President if the ECE Student Society. Other users are the ECE students and faculty.

Design Assumptions

This design assumes the following:

1.

The Administrators are at the ECE laboratory office, ECE Chairpersons Office, ECE Student Society.

2.

For lecture and laboratory classrooms a single computer is placed.

Security Requirements

A firewall will be used so unauthorized users will be restricted. Part of the security will be Users accounts and passwords that will give limited access. There will be different access capabilities for network managers and users.

DESIGN OF THE NETWORK

THE NETWORK DESIGN:

In the star topology, all computers and other network devices connect to a central device called a hub or switch. Each connected device requires a single cable to be connected to the hub, creating a point-to-point connection between the device and the hub. Using a separate cable to connect to the hub allows the network to be expanded without disruption to the network. A break in any single cable will not cause the entire network to fail.

The star topology is the most widely implemented network design in use today, but it is not without its shortcomings. Because all devices connect to a centralized hub, this creates a single point of failure for the network. If the hub fails, any device connected to it will not be able to access the network. Because of the number of cables required and the need for network devices, the cost of a star network is often higher than other topologies.

Advantages Star networks are easily expanded without disruption to the network. Cable failure affects only a single user. Easy to troubleshoot and isolate problems.

Disadvantages Requires more cable than most of the other topologies. A central connecting device allows for a single point of failure. More difficult than other topologies to implement.

IP ADDRESS FOR EACH OF THE FOLLOWING DEVICES




IP address each systems are assigned a unique IP address so that it can

communicate on the network. Device Wireless Router IP Address 192.168.0.1

Classrooms Device PC PC PC PC PC PC PC PC @ @ @ @ @ @ @ @ 306b 306a 305 304b 304a 303b 303a 318 IP Address 192.168.0.2 192.168.0.3 192.168.0.4 192.168.0.5 192.168.0.6 192.168.0.7 192.168.0.8 192.168.0.9

ECE Department Device PC Server-PC ECE Laboratory Device PC IP Address 192.168.0.11 192.168.0.13

IP Address 192.168.0.10

ECESS Device PC IP Address 192.168.0.12

In the most commonly deployed version of TCP/IP, version 4, (IPv4) addresses are composed of four sets of 8 bits referred to as octets. These are expressed in numbers and separated by periods. An example of a TCP/IP address is 192.168.3.2. This format is often referred to as a 32-bit dotted decimal.

Determining Network and Node Addresses Subnet IP Address Network Mask Address 255.0.0.0 192.168.10. 192 100 255.255.0.0 192.168.10. 192.168 100 255.255.255 192.168.10. 192.168.10 .0 100

Node Address 168.10.100 10.100 100

Default Subnet Masks Associated with IP Address Classes Address Class Default Subnet Mask A 255.0.0.0 B 255.255.0.0 C 255.255.255.0

DOCUMENTATION FOR ADDITIONAL REQUIREMENTS


SOFTWARE Windows 2000 and Windows Server 2003.Windows 2000 was the follow-up to the popular Windows NT 4 network operating system, and it quicklyestablished itself as a reliable and robust operating system. Windows 2000 built on the success of its predecessor and offered many improvements and advancements. In 2003, Microsoft released the latest version of its Windows server family of productsthe aptly named Windows Server 2003. Microsoft still currently supports Windows 2000, and many organizations still have Windows 2000 Server systems deployed. Three different versions of Windows 2000 are available for server platforms: Windows 2000 Server, Advanced Server, and Datacenter Server. Windows 2000 is also available as a workstation operating system: Windows 2000 Professional. Windows 2000 Professional has the majority of features, capabilities, and strengths of Windows 2000 Server products but omits the server-type network services and capabilities.

Windows Authentication.The authentication process facilitated by a Windows server allows users logging on to the network to identify themselves to the Active Directory, and subsequently to access all the network resources to which they have permissions. This means that it is necessary to log on only once to access all the resources on the network. The nature of directory services means that other applications, such as a Web server, can interface with the directory and use the same authentication information.

In addition to the standard authentication mechanism of usernames and passwords, Windows server platforms also support other authentication systems such as smartcards and biometrics. Implementation of these methods requires additional hardware and software.

Windows Server File and Print Services.The provision of file and print sharing services is a mainstay of any network operating systems, and Windows servers are no exception. Windows server systems use a principle called shares to make areas of a disk available to users. These shares can be secured by share permissions that can be used on any file system, along with file and folder permissions if they are resident on New Technology File System (NTFS) partitions.

Right Full Control Modify Read & Execute List Folder Contents Read Write

Description Provides all rights Allows files to be modified Allows files to be read and executed (that is, run) Allows the files in a folder to be listed Allows a file to be read Allows a file to be written to

Windows Security.Windows server operating systems provide a full range of security features that make for very securenetwork operating systems. Windows Server 2003 is considered more secure than Windows 2000, as it employs a "secure by default" strategy through which unnecessary applications, services, and security configurations are disabled by default. Administrators can then enable applications and services on an as needed basis.

Authentication security is provided on Windows servers through Kerberos version 5. File system security and encryption are provided

through NTFS permissions and EFS. Network communication can be protected by a range of security and authentication protocols, though IPSec is most commonly used on Windows server networks to provide both encryption and authentication for network data. FLOOR PLAN

HARDWARE SPECIFICATIONS OF THE NETWORK

DEVICE y HP Equivalent MCS Server (MCS-7845-H3 V01) y Wireless-N Broadband Router (WRT300N)

y y y y

SPECIFICATION DL380G6, 1xQC Intel 5540 2.53Ghz processor, 6GB RAM, 4x300GB SAS HDDs, iLO Adv. Pack, redundant power, TPM, 8GB internal USB flash Features:Full duplex capability, firewall protection, DMZ port, DHCP support, NAT support, MDI/MDI-X switch, Stateful Packet Inspection (SPI), MAC address filtering, VPN passthrough, 256bit encryption, Access Point operational mode, firmware upgradable, MIMO technology Frequency Band:2.4 GHz Switching Protocol:Ethernet OS Required: Microsoft Windows 2000 / XP Interfaces: 1 x network - Ethernet 10Base-T/100Base-TX - RJ-45 ( WAN ) 4 x network - Ethernet 10BaseT/100Base-TX - RJ-45 1 x network Radio-Ethernet Data Link Protocol: Ethernet, Fast Ethernet, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n

HP A3100-24 SI 2-slot Switch (JD309A)

y Ports: 2 port expansion module slots; 24 autosensing 10/100 ports(IEEE 802.3 Type 10BASE-T, IEEE 802.3u Type 100BASE-TX), Duplex: half or full; 1 RJ45 serial console port y Mounting: Mounts in an EIA standard 19-in. telco rack or equipment cabinet (hardware included) y Memory and processor: storage: 64 MB SDRAM, 8 MB flash, packet buffer size: 256KB y Latency:< 10 s y Routing/switching capacity:8.8 Gbps

SCHEDULE OF TASK
Name Start Date Time y 09/26/11
y 09/27/11
5pm 7pm

End Date y 09/26/11


y 09/27/11 y 09/28/11 y 10/14/11

Time 7pm 8pm 12nn 6pm

Task
y Paperwork (Parts I, II and III) y Partial simulation of connection of workstations y Paperwork (Parts IV and VI) y Actual measurement of the department y Preparation of the presentation Gathering of Data (workstations) y Paperwork (Parts I, II and II) y Simulation of connection of y Actual measurement of the department y Preparation of the presentation y Paperwork (Parts IV and VI) y Partial simulation of connection of workstations y Simulation of the designed network within ECE premises (3rd Floor) y Actual measurement of the department y Preparation of the presentation

Abas, Lei Anne Mari

y 09/28/11 y 10/14/11

9am 3pm

y 09/26/11
y 09/27/11

5pm
3:00pm 10am 3pm

y 09/26/11
y 09/26/11 y 09/25/11 y 10/14/11

7pm

5pm 1pm 6pm

Finez, Leonard

y 09/28/11 y 10/14/11

y 09/26/11
y 09/27/11

10am 9am

y 09/28/11
y 09/24/11 y 09/26/11 y 10/14/11

4pm 1:30pm 5pm 6pm

Vargas, Sarah Joy

y 09/28/11 y 10/14/11

3pm

3pm

SCHEDULE OF EXPENSES
Devices and Cables CAT5 RJ-45 Router Switch Quantity 240 m 30 1 2 Price P1920 P90 P580 P1500

ESTIMATED TOTAL: P4090

CHALLENGES

The proponents are challenged to design a network that is feasible to the ECE department at third floor Engineering and Architecture building, Anonas St., Pureza St., NDC Compound Sta. Mesa, Manila. For this design the users are limited to a small number and so we, the proponents, are challenged to design it in a way that every students within a classroom could interconnect into the network, bearing in mind the additional requirement of being accessible for only ECE students and faculty thus facilitating a secure network. The actual wiring and layout of the system for the department has also been considered and so the location of each device has to be determined.

Das könnte Ihnen auch gefallen