Beruflich Dokumente
Kultur Dokumente
By
October 2011
TABLE OF CONTENTS
PAGE
Description of the Project Design of the Network Documentation for additional requirement Hardware Specifications of the Network Schedule of Task Schedule of Expenses Challenges
1 4 7 10 11 12 13
The purpose of this document is to apply networking knowledge in real scenario. With the project to construct a computer network within the Electronics and Communications Engineering Department located at third floor Engineering and Architecture building, Anonas St., Pureza St., NDC Compound Sta. Mesa, Manila. With an objective of interconnecting networks within the ECE premises considering ECE Department, ECE Laboratory, ECE Networking laboratory room and allotting slots for other ECE classroom.
Network Scope
The proposed network is to serve the ECE Department which includes the Chairpersons Office, Laboratory, networking laboratory and seven
classrooms.
1.
Secure Service: The main objective of this network is to interconnect networks within the ECE Premises considering ECE Department, ECE
Laboratory, ECE Networking Laboratory room allotting slots for other ECE classroom.
2.
Integration and Update: Presently there are many LANs in the building, but much of the equipment is out of date, many of the LANs are incompatible with each other, and not connected in a system-wide network. This proposal describes a LAN that can be used to interconnect students and the faculty.
3.
Versatile Information Processing: The network will enable users to retrieve, process, and store ASCII and non-ASCII text, still graphics, audio, and video from any connected computer. The administrator has the access to delete or modify any file inside it however; all clients have the right to add files on it.
Intended Users
The primary users of the network be the three administrators, which are the current chairperson, head of ECE laboratory and the President if the ECE Student Society. Other users are the ECE students and faculty.
Design Assumptions
1.
The Administrators are at the ECE laboratory office, ECE Chairpersons Office, ECE Student Society.
2.
Security Requirements
A firewall will be used so unauthorized users will be restricted. Part of the security will be Users accounts and passwords that will give limited access. There will be different access capabilities for network managers and users.
In the star topology, all computers and other network devices connect to a central device called a hub or switch. Each connected device requires a single cable to be connected to the hub, creating a point-to-point connection between the device and the hub. Using a separate cable to connect to the hub allows the network to be expanded without disruption to the network. A break in any single cable will not cause the entire network to fail.
The star topology is the most widely implemented network design in use today, but it is not without its shortcomings. Because all devices connect to a centralized hub, this creates a single point of failure for the network. If the hub fails, any device connected to it will not be able to access the network. Because of the number of cables required and the need for network devices, the cost of a star network is often higher than other topologies.
Advantages Star networks are easily expanded without disruption to the network. Cable failure affects only a single user. Easy to troubleshoot and isolate problems.
Disadvantages Requires more cable than most of the other topologies. A central connecting device allows for a single point of failure. More difficult than other topologies to implement.
Classrooms Device PC PC PC PC PC PC PC PC @ @ @ @ @ @ @ @ 306b 306a 305 304b 304a 303b 303a 318 IP Address 192.168.0.2 192.168.0.3 192.168.0.4 192.168.0.5 192.168.0.6 192.168.0.7 192.168.0.8 192.168.0.9
ECE Department Device PC Server-PC ECE Laboratory Device PC IP Address 192.168.0.11 192.168.0.13
IP Address 192.168.0.10
In the most commonly deployed version of TCP/IP, version 4, (IPv4) addresses are composed of four sets of 8 bits referred to as octets. These are expressed in numbers and separated by periods. An example of a TCP/IP address is 192.168.3.2. This format is often referred to as a 32-bit dotted decimal.
Determining Network and Node Addresses Subnet IP Address Network Mask Address 255.0.0.0 192.168.10. 192 100 255.255.0.0 192.168.10. 192.168 100 255.255.255 192.168.10. 192.168.10 .0 100
Default Subnet Masks Associated with IP Address Classes Address Class Default Subnet Mask A 255.0.0.0 B 255.255.0.0 C 255.255.255.0
Windows Authentication.The authentication process facilitated by a Windows server allows users logging on to the network to identify themselves to the Active Directory, and subsequently to access all the network resources to which they have permissions. This means that it is necessary to log on only once to access all the resources on the network. The nature of directory services means that other applications, such as a Web server, can interface with the directory and use the same authentication information.
In addition to the standard authentication mechanism of usernames and passwords, Windows server platforms also support other authentication systems such as smartcards and biometrics. Implementation of these methods requires additional hardware and software.
Windows Server File and Print Services.The provision of file and print sharing services is a mainstay of any network operating systems, and Windows servers are no exception. Windows server systems use a principle called shares to make areas of a disk available to users. These shares can be secured by share permissions that can be used on any file system, along with file and folder permissions if they are resident on New Technology File System (NTFS) partitions.
Right Full Control Modify Read & Execute List Folder Contents Read Write
Description Provides all rights Allows files to be modified Allows files to be read and executed (that is, run) Allows the files in a folder to be listed Allows a file to be read Allows a file to be written to
Windows Security.Windows server operating systems provide a full range of security features that make for very securenetwork operating systems. Windows Server 2003 is considered more secure than Windows 2000, as it employs a "secure by default" strategy through which unnecessary applications, services, and security configurations are disabled by default. Administrators can then enable applications and services on an as needed basis.
Authentication security is provided on Windows servers through Kerberos version 5. File system security and encryption are provided
through NTFS permissions and EFS. Network communication can be protected by a range of security and authentication protocols, though IPSec is most commonly used on Windows server networks to provide both encryption and authentication for network data. FLOOR PLAN
DEVICE y HP Equivalent MCS Server (MCS-7845-H3 V01) y Wireless-N Broadband Router (WRT300N)
y y y y
SPECIFICATION DL380G6, 1xQC Intel 5540 2.53Ghz processor, 6GB RAM, 4x300GB SAS HDDs, iLO Adv. Pack, redundant power, TPM, 8GB internal USB flash Features:Full duplex capability, firewall protection, DMZ port, DHCP support, NAT support, MDI/MDI-X switch, Stateful Packet Inspection (SPI), MAC address filtering, VPN passthrough, 256bit encryption, Access Point operational mode, firmware upgradable, MIMO technology Frequency Band:2.4 GHz Switching Protocol:Ethernet OS Required: Microsoft Windows 2000 / XP Interfaces: 1 x network - Ethernet 10Base-T/100Base-TX - RJ-45 ( WAN ) 4 x network - Ethernet 10BaseT/100Base-TX - RJ-45 1 x network Radio-Ethernet Data Link Protocol: Ethernet, Fast Ethernet, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n
y Ports: 2 port expansion module slots; 24 autosensing 10/100 ports(IEEE 802.3 Type 10BASE-T, IEEE 802.3u Type 100BASE-TX), Duplex: half or full; 1 RJ45 serial console port y Mounting: Mounts in an EIA standard 19-in. telco rack or equipment cabinet (hardware included) y Memory and processor: storage: 64 MB SDRAM, 8 MB flash, packet buffer size: 256KB y Latency:< 10 s y Routing/switching capacity:8.8 Gbps
SCHEDULE OF TASK
Name Start Date Time y 09/26/11
y 09/27/11
5pm 7pm
Task
y Paperwork (Parts I, II and III) y Partial simulation of connection of workstations y Paperwork (Parts IV and VI) y Actual measurement of the department y Preparation of the presentation Gathering of Data (workstations) y Paperwork (Parts I, II and II) y Simulation of connection of y Actual measurement of the department y Preparation of the presentation y Paperwork (Parts IV and VI) y Partial simulation of connection of workstations y Simulation of the designed network within ECE premises (3rd Floor) y Actual measurement of the department y Preparation of the presentation
y 09/28/11 y 10/14/11
9am 3pm
y 09/26/11
y 09/27/11
5pm
3:00pm 10am 3pm
y 09/26/11
y 09/26/11 y 09/25/11 y 10/14/11
7pm
Finez, Leonard
y 09/28/11 y 10/14/11
y 09/26/11
y 09/27/11
10am 9am
y 09/28/11
y 09/24/11 y 09/26/11 y 10/14/11
y 09/28/11 y 10/14/11
3pm
3pm
SCHEDULE OF EXPENSES
Devices and Cables CAT5 RJ-45 Router Switch Quantity 240 m 30 1 2 Price P1920 P90 P580 P1500
CHALLENGES
The proponents are challenged to design a network that is feasible to the ECE department at third floor Engineering and Architecture building, Anonas St., Pureza St., NDC Compound Sta. Mesa, Manila. For this design the users are limited to a small number and so we, the proponents, are challenged to design it in a way that every students within a classroom could interconnect into the network, bearing in mind the additional requirement of being accessible for only ECE students and faculty thus facilitating a secure network. The actual wiring and layout of the system for the department has also been considered and so the location of each device has to be determined.