HSSN New _final

Embed Size (px)

Citation preview

  • 7/31/2019 HSSN New _final

    1/34

    Hardware software systems and Network

    Hardware ,software system and network Page 1

    ASIA PACIFIC INSTITUTE OF INFORMATION

    TECHNOLOGY

    Hardware software systems and Network

    Network Proposal for ICT Resources Malaysia Public Limited

    Company

    CE00382-HSSN2-CSE

    Submitted to :Mr. Arun Choudary

    Submitted on4/8/2010

    Hand Out Date: 15 FEBRUARY 2011

    Submitted By: Neenu John (PT0881130)

  • 7/31/2019 HSSN New _final

    2/34

    Hardware software systems and Network

    Hardware ,software system and network Page 2

    CERTIFICATE

    This is to certify that Mr. Neenu John of 6th

    semester pursuing B.Engg. (Honors) Degree from

    A.P.I.I.T SD INDIA has successfully completed the Individual project in Hardware, Software

    System and Networks module under the guidance of Lecturer Mr. Arun Chaudhary within the

    stipulated time duration.

    Neenu John Module Lecturer: (Mr. Arun Choudhary)

    PT0881130 __________________________

    Date: - April 8, 2011

  • 7/31/2019 HSSN New _final

    3/34

    Hardware software systems and Network

    Hardware ,software system and network Page 3

    Table of contents

    1.Abstract5

    2.Introduction..6

    2.1Preface..6

    2.2 Objectives..6

    3 Analyzing the layout of ICT..7

    3.1 Assumptions..7

    4 Network...8

    4.1 Network Advantage 8

    4.2 Network Disadvantage9

    4.3 Types of Network..9

    4.3.1 LAN9

    4.3.2 WAN.10

    4.3.3 MAN..10

    4.4 Network Architecture..10

    4.4.1 Peer-to-peer10

    4.4.2 Client Server...11

    4.5 network Topology12

    4.5. Mesh Topology....12

    4.5.2 Star topology.13

    4.5.3 Bus Topology14

    4.5. 4Ring Topology.......14

    4.5.5 Tree Topology.15

  • 7/31/2019 HSSN New _final

    4/34

    Hardware software systems and Network

    Hardware ,software system and network Page 4

    4.6 Transmission Media..16

    4.6 .1 Twisted pair cables 16

    4.6.2 Coaxial Cables17

    4.6.3 fiber optics17

    4.6.4 Comparison between cables.18

    4.7 Standards,protocols and applications....19

    Proposed Network and justifications..20

    5.1 proposed LAN solution diagram20

    5.2 proposed WAN solution diagram..21

    5.3 proposed network Architecture.21

    5.4 Proposed network topology..22

    5.5 proposed transmission medium...23

    5.6 Description of above scenario....24

    5.7 Virtual Private Network25

    5.8 IP Addressing....26

    6 Requirements and Cost estimation of proposed system27

    7 network Problems.28

    8 Future Enhancements........28

    9Conclusion...29

    10 Gantt Chart..30

    11. References..31

  • 7/31/2019 HSSN New _final

    5/34

    Hardware software systems and Network

    Hardware ,software system and network Page 5

    1. Abstract

    Major part of the world is in the hands of technology .Like the telephone and the television, the

    network and data communication has performs an important role in restructuring our daily lives

    While folks of an older generation remember a much different age, most people can hardly

    remember a time where the network and data communication was not available.

    The Internet is not just a network; it is a whole community in and out of itself. It is a revolution

    that changed our society, our lives, and our entire world. What other thing can we invariably say

    has completely connected everyone in the world, one that is free of social and cultural

    differences? The Network acts as a common ground, a community of information and

    recreation, for the world to walk upon. As of now, it is even easier for some to meet friends on-

    line than in real life - with sites like Myspace and Facebook dominating most of the social

    scene. These are best examples of social network sites.

    The main aim of this assignment is to suggest a effective and efficient network for ICT

    Resources Malaysia Public Limited Company, which is the one of the supplier of business

    equipment and office supplies of its kind in South East Asia. This network proposal includes the

    details about the network that is suitable for the ICT and the advantages and disadvantages of it.It also includes the network topologies, transmission media, protocols, network devices,

    architecture technologies, possible problems and the future enhancements in the network of ICT.

    .

  • 7/31/2019 HSSN New _final

    6/34

    Hardware software systems and Network

    Hardware ,software system and network Page 6

    2. Introduction

    2.1 Preface

    ICT Resources Malaysia Public Limited Company has hired you as a network consultant. This

    company is the only supplier of business equipment and office supplies of its kind in South East

    Asia. The lack of competition has caused the owners not to make major investments into the

    business. A nationally recognized competitor recently opened for business with plans to put ICT

    Resources out of business. In response to this, the owners of ICT Resources have decided to

    reinvest substantial sum of money in the company.

    2.2 Objectives

    To provide an efficient and effective network for ICT Network.

    Identify the advantage and disadvantage of Networks.

    Understanding the type transmission media

    Understanding different type of topology

    Indentify and provide suitable network topology and transmission medium for ICT

    Resources.

    Identify and propose the LAN and WAN network connections

  • 7/31/2019 HSSN New _final

    7/34

    Hardware software systems and Network

    Hardware ,software system and network Page 7

    3.Analyzing the Layout of the ICT

    ICT Resources locally owns a 2 storey building and currently has already grown to a level where

    they now have resources of 35 staff and this figure is still growing. They have developed and

    spread their business to 3 strategic locations throughout South East Asia with more upcoming

    offices in other locations planned for 2012. These new offices will incorporate the retail concept

    coupled with local sales offices.

    ICT Resources decided to set up office with approximately 30 to 35 employees. The goal is to

    determine the type of network topology they will need within the office. Consider the types ofcomputer and number of printers, audio devices, microphones, LCD projectors, and

    multifunction peripherals that are needed. Before they invest money in the local area network,

    the owner wants to know more about networks and internet connection.

    3.1 Assumptions

    Now there is no internet facility for all the employees in ICT expect the location head

    In the main office there are 3 departments. Production department, accounts department

    and

    Administrative department

    Presently there is no local network inside the office.

    The number of employees in each department is as, 5 in accounts,5 in administrator, 19 in

    and 2 as network administrators.

    Each employee has each computer and each computer have sound device and micro

    phone.

    Each department consist of one printer, production department consist of LCD projectors

    and one security cameras.

  • 7/31/2019 HSSN New _final

    8/34

    Hardware software systems and Network

    Hardware ,software system and network Page 8

    4. Network

    Network is a collection of computers and devices that are interconnected with each other

    .through communication links .Link is a communication pathway which helps to transfer data

    from one device to another device .A computer network can interact with other network by two

    ways wired or wirelessly .For efficient communication , two device must be connected with

    each other. There are two possible type of connection are available one is point to to point

    another one is multipoint.

    Pointtopoint : A point- to point connection provides a dedicated link between two devices

    .It is used to establish the direct connection.

    Multipoint : A multipoint connection in which more than two specific device shares a single link.

    4.1. Network Advantage

    Information Sharing : The main advantage of network is information sharing. A large

    number of users belonging to same area or same organization but spread over at different

    places can communicate and share useful files, software and information at right times

    via network of computers.

    Speed: Sharing and transferring of data occurring in a network is rapid. So we can send

    the data of larger size like high resolution photographs over the network.

    Flexible Access: Computer network allows accessing the file in a flexible manner.

    Security: Network is also allows establishing security by ensuring that the network users

    may only have access to certain files and applications. Sensitive files and data in the

    network are password protected to avoid the illegal coping of data

    Work Group Computing: Work group software such as Microsoft back office allows

    concurrent access of files and data.

    Centralized Software Management: Files can be stored on a central computer (the file

    server) allowing data to be shared throughout the entire network

    Cost: Individual license copy of many software may be costly. Shared programs on the

    network allows easy up gradation of file server rather than the individual work stations.

  • 7/31/2019 HSSN New _final

    9/34

    Hardware software systems and Network

    Hardware ,software system and network Page 9

    Resource sharing: Network allows to share the resources like printer , scanner , fax

    machines modems

    Back up Facility: Files can be backed up more easily when they are all on a central

    fileserver rather than when they are scattered across a number of independent

    workstations.

    4.2 Network Disadvantage

    Loss of data and resources: Network failure and device failure will shut the entire

    network it causes loss data. Network faults cause loss of resources. If the network stops

    operating then it may not be possible to access to various computers.

    Difficult to manage: Network set up is very costly because of hardware and software.

    Network set up take a lot of time to complete. The larger the network becomes difficult to

    manage

    Location of resources: Resources could not be located too far from users. If resources are

    too far it take to much time to share the resources like printer .it will negatively affect the

    access flexibility.

    Storage space and Bandwidth: Users may use too much bandwidth - for example when

    listening to music files or watching video clips - preventing others from using the

    network facilities properly .Usage of larger storage may cause problems on the network.

    4.3 Types of Network

    According to the size of the network we can divide the network into three types. Local Area Network

    (LAN), Wide Area Network (WAN) and Metropolitan Area Network (MAN).

    4.3.1 LAN (Local Area Network)

    Local area networks are designed to allow resources to be shared between personal computers or

    workstations. The resources to be shared can include hardware, software or data .The best

    example of LAN is found in business organizations. One of the computers may be given a large

    capacity disc which acts as a server to clients. Softwares are installed into central server and is

    used by the whole network group .The most common LAN topologies are bus ,ring ,star

  • 7/31/2019 HSSN New _final

    10/34

    Hardware software systems and Network

    Hardware ,software system and network Page 10

    .currently LAN size is limited to few kilometers. Generally, LAN is using one type of

    transmission medium.

    4.3.2 WAN (Wide Area Network)

    Wide aera network provides long distance transmission of data ,image audios and video

    information over large geographic aera.WAN can be simple like dial up lines connect to the

    individual pc and internet .It can be complex also like backbones that connect the internet. We

    normally refers two types WAN switched WAN connects to the end systems and the point to

    point WAN connects home computer to an internet service provider.

    4.3.2 MAN (Metropolitan Area Network)

    A metropolitan area network is a network with a size between a LAN and a WAN. It normally

    covers the area inside a town or a city .A best example of a MAN is the part of telephone

    network that can provide a high-speed DSL line to the customer .MAN provides high speed

    connectivity, normally to the internet. It provides the internet connectivity for a LAN in a

    metropolitan network.

    4.4 Network Architecture

    Network architecture, is the logical and structural layout of the network consisting of

    transmission equipment, software and communication protocols and infrastructure (wired or

    wireless) transmission of data and connectivity between components

    http://en.kioskea.net/faq/2761-what-is-network-architecture

    4.4.1 Peer-to-peer Network

    Peer-to peer network is a type of network in which each

    workstation has equivalent capabilities and responsibilities.

    Peer-to-peer networks are generally simpler, but they usually

    do not offer the same performance under heavy loads. In peer

    to peer network there is no dedicate server . Thus each

    computer in such a network is part server and part client

    Figure .1

    http://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/W/workstation.htmlhttp://www.webopedia.com/TERM/L/load.htmlhttp://www.webopedia.com/TERM/L/load.htmlhttp://www.webopedia.com/TERM/W/workstation.htmlhttp://www.webopedia.com/TERM/N/network.html
  • 7/31/2019 HSSN New _final

    11/34

    Hardware software systems and Network

    Hardware ,software system and network Page 11

    4.4.2 Client server Network

    In client-server architecture, a business's computer

    network will have a server computer, which functions as

    the "back bone of the organization, and a group of client

    computers, which are commonly called workstations. By

    using the server we can improve efficiency of client

    server architecture .Most of the cases the server part of

    client server having large capacity of storage and also

    provides high functionality .Client part in the client server

    architecture are smaller computer having individual

    responsibilities.

    Architecture Advantage Disadvantage

    Client Server

    Centralized Resources

    Centralized storage of data.Easier to find and backup the data

    and the files

    Efficient

    Multiple users can use hardware

    and software

    Security

    Central Server Machine can secure

    all other workstations.

    Scalability

    Easy to upgrade resources

    If the server goes down, it

    takes part or the wholenetwork with it.

    It is more expensive to

    install.

    Needs to be maintained by

    staff with high IT skills.

    Peer to -Peer Reduced cost(the costs involved Only suitable for small no

    Figure 2.

  • 7/31/2019 HSSN New _final

    12/34

    Hardware software systems and Network

    Hardware ,software system and network Page 12

    in such a network are hardware,

    cabling and maintenance )

    well tested simplicity

    Connected using simple and

    straightforward cabling

    of computers

    No Centralized system

    Lack of security

    Table. 1

    4.5 Network Topology

    Network topology refers to the Structure or design of the connected devices. Network topologies

    can be physical or logical. Physical Topology means the physical design of a network including

    the devices, location and cable installation. Logical Topology refers to the fact that how dataactually transfers in a network as opposed to its design.

    4.5.1 Mesh topology

    In mesh topology every device has a dedicated point to point connection with every other device.

    The term dedicated means that link carries traffic only between the two devices it connects. In

    mesh topology needs n(n-1)/2 duplex mode links ,n is

    the no of nodes.

    Network Topology

    Mesh Star Bus Ring Tree

    Figure 3

    Figure 4.

  • 7/31/2019 HSSN New _final

    13/34

    Hardware software systems and Network

    Hardware ,software system and network Page 13

    Advantage Disadvantage

    Use of large no of links reduce networktraffic

    A mesh topology is robust in nature .ifone link becomes unusable it does not

    disable the entire system.

    It offers privacy and security

    Use of large number of cables makesthe network very much expensive

    Interconnection of device leads todifficulty in installation and

    reconfiguration of devices

    Hardware required to connect each linkcan make it more expensive to

    implement

    Table 2

    4.5.2 Star topology

    In a star topology each device has a dedicated point to

    point connection with only device usually known as a

    hub. In a star topology devices are not directly linked to

    one another. Unlike mesh topology it does not allow

    direct traffic between the devices. The controller act as

    an exchange between the two devices.

    Advantage disadvantage

    Less expensive than mesh topology

    because it requires less number ofcables.

    Easy to install and reconfigure it,

    each device needs only one link

    and one input-output port.

    Robust it nature, failure of onesystem doesnt affect the whole

    network

    Dependency of all topology on a single

    point called hub. If the hub goes downthen the whole system will be dead.

    The cost of the hub make the network

    more expensive

    Table 3

    Figure 5.

  • 7/31/2019 HSSN New _final

    14/34

    Hardware software systems and Network

    Hardware ,software system and network Page 14

    4.5.3 Bus topology

    A bus uses multipoint connection instead of point to

    point-to-point connection. Tap in a bus topology one

    cable acts as a backbone and nodes are connected in a

    bus topology through drop lines tap.A drop line is aconnection running between the device and the main

    cable.

    Advantage Disadvantage

    A Bus topology is easier toinstall.Less expensive than star andmesh because less cables are

    required,Less redundancy of cables

    Difficulty in reconnection and faultisolationSignal reflection at the taps can countdegradation and quality

    breaks in the bus cable stops alltransmission.

    Table 4

    4.5.4 Ring Topology

    In a ring topology each device has a dedicated point to point link with one two device on either

    side of each. Signal is passed along the ring in one direction from one device to another device

    until it reaches a destination. Each device in a ring

    topology uses a repeater.

    Figure 6

    Figure 7.

  • 7/31/2019 HSSN New _final

    15/34

    Hardware software systems and Network

    Hardware ,software system and network Page 15

    Advantage Disadvantage

    A ring is relatively easy to install and

    reconfigure it.In a ring topology each device linked

    only its intermediate neighbors. For

    addition and removal we need tochange only two connections.

    It uses unidirectional traffic. A break in the

    ring can stop all transmissions.

    Table 5

    4.5.5Tree Topology

    A tree is a variation of star topology. Nodes in a tree are linked to standard controller known ashub which directly controls the traffic of the network. However not every device are directly

    connected to the central hub. Majority of the devices are

    connected to the secondary hub.

    Advantage Disadvantage

    It provides point to point connectivity

    with the primary and the secondary

    hub.

    It provides an easy exchange

    If the back bone line breaks the entire

    segment will go down.

    Table 6

    Figure 8.

  • 7/31/2019 HSSN New _final

    16/34

    Hardware software systems and Network

    Hardware ,software system and network Page 16

    4.6 Transmission Media

    Transmission media is anything that carry signal from source to destination. Best example

    transmission media is air. It can be metallic cables or fiber optics cable. In telecommunication

    transmission media is divided in to two broad categories guided media and the unguided media.

    Guided media provides connection from source to destination by using twisted pain cables ,

    coaxial cables , and fiber optic cables. Unguided media

    4.6.1 Twisted Pair Cable

    Twisted pair cable consist two conductors having an insulation coating .One of the wire used to

    carry signal to the receiver, and the other is used only as a ground reference. The receiver uses

    the difference between the two. There is a chance to inference and cross talk it results in the

    creation of unwanted signal. Effect of the unwanted

    signals change according to the arrangement of wires

    like wires are parallel .If both wires situated at different

    location then the noise or crosstalk will be more, this

    results in a difference at the receiver. By twisting the

    pairs, we can maintain .Twisting makes it possible that

    both wires are equally affected by external influences

    .Two types of twisted pair cables are available.

    Unshielded twisted pair and shielded twisted pair cables.

    Transmission Media

    Guided

    (Wired)

    Twisted pair cable Fiber -optic cable Coaxial Cable

    Unguided

    (wireless)

    Free Space

    Figure 9.

    Figure 10.

  • 7/31/2019 HSSN New _final

    17/34

    Hardware software systems and Network

    Hardware ,software system and network Page 17

    4.6.2 Coaxial Cable

    Un like twisted pair cables Coaxial cable carries signal

    having higher frequency .Coaxial cable has a central core

    conductor of solid or standard wire enclosed in a insulating

    sheath which is ,in turn, encased in an outer conductor of

    metal foil braid or a combination of the two. The outer

    metallic wrapping serves both as a shield against noise and as the second conductor , which

    completes the circuit. Coaxial cables are widely used in analog telephone networks.

    4.6.3 Fiber Optic cable

    A fiber optic cables transmits signal in the form of

    light .These cables are made by glass or plastics.

    Signal in the fiber optics transmits on the basis of total

    internal reflection. Fiber optics use reflection to guide

    light through a channel. A glass or a plastic core is

    surrounded by a cladding of less dense glass or

    plastic. The difference in density of two materials

    must be such that a beam of light moving through the core is reflected off the cladding instead of

    being refracted to it. Fiber optics is often found in back bone networks.

    Figure 11.

    Figure 12.

  • 7/31/2019 HSSN New _final

    18/34

    Hardware software systems and Network

    Hardware ,software system and network Page 18

    4.6.4Comparison between Cables

    Characteristics Coaxial Cable Twisted Pair Cables Fiber Optics

    Susceptibility to

    interference

    Good resistance to

    interference

    UTP: Very susceptible

    STP: Good resistance

    Not susceptible to

    interference

    Ease of

    installation

    Easy to install UTP: Very easy; often

    preinstalled

    STP: Moderately easy Difficult to install

    Flexibility

    Fairly flexible UTP: Most flexible

    STP: Less flexible than

    UTP

    Less flexible than

    coaxial cable

    Special features

    Electronic support

    components are less

    expensive than twisted-

    pair cable

    UTP: Same as telephone

    wire; often preinstalled in

    buildings

    STP: Supports higher

    transmission rates than

    UTP

    Supports voice, data,

    and video

    Transmission

    rates

    4-100 Mbps UTP: 4-100 Mbps

    STP: 16-500 Mbps

    100 Mbps or more (

    > 1Gbps)

    Table 7 [1]

  • 7/31/2019 HSSN New _final

    19/34

    Hardware software systems and Network

    Hardware ,software system and network Page 19

    4.7 Standards, Protocols and Application

    Protocols are the special rules that exist for the data interchange at the application program level. Computer networking involves many different pieces of hardware and software that help move

    data from one computer to another. These different elements could not work together unless they

    had a common understanding of formats, codes and operating procedures. A protocol is a

    combination of these factors codified into a common standard. All networking technologies have

    standards associated with them. Network standards facilitate the interoperability of network

    technologies.[2]

    TCP/IP Protocol or Internet Protocol

    TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language

    or protocol of the Internet. It can also be used as a communications protocol in a private network

    (either an intranet or an extranet). Main functions of TCP/IP protocol is described below.[3]

    Addressing/Multiplexing: The main function of TCP protocol is multiplexing the data

    received from various process .This help to send the data on the network layer.

    Connection establishment, management and termination: TCP provides set of procedures

    that devices follow to negotiate and establish TCP connection over which data can travel.

    Data handling and packaging: TCP defines a mechanism by which applications are able

    to send data from it to higher levels

    Routing / Indirect Delivery

    When source and final destination are situated so far away means both are not attached

    directly. In these case datagram can send indirectly

    Fragmentation and Reassembly

    However, the maximum frame size of each physical/data-link network using IP may be

    different. For this reason, IP includes the ability to fragment IP datagrams into pieces so

    they can each be carried on the local network

    http://www.ehow.com/computers/http://whatis.techtarget.com/definition/0,289893,sid9_gci212377,00.htmlhttp://whatis.techtarget.com/definition/0,289893,sid9_gci212089,00.htmlhttp://whatis.techtarget.com/definition/0,289893,sid9_gci212089,00.htmlhttp://whatis.techtarget.com/definition/0,289893,sid9_gci212377,00.htmlhttp://www.ehow.com/computers/
  • 7/31/2019 HSSN New _final

    20/34

    Hardware software systems and Network

    Hardware ,software system and network Page 20

    5. Proposed Networks & Justifications

    5.1 Proposed LAN Solution Diagrams

    Figure 13.

  • 7/31/2019 HSSN New _final

    21/34

    Hardware software systems and Network

    Hardware ,software system and network Page 21

    5.2 WAN Solution Diagrams

    ISP

    5.3 Proposed network Architecture

    Client server architecture is suit for ICT resources.ICT resources is spread over the south east

    asia. In a client-server model, there can be only one server and one or more than one clients. The

    clients are connected to the server. Server is a computer system that is shared by several users in

    network. A network consists of more than one computer,each performing a particular task .This

    model consists of high end servers, which provides services to the clients as per the request sent

    by the client on a network. Client systems never function as servers. It is not possible for one

    client to access shared resources on another clients system .client server architecture offers more

    security than per to peer technology.

    Congestion: Client-server networks can become congested and overload the server with requests

    Network Alterations: In client-server set-ups, a server can be altered without disturbing the

    clients, while P2P systems require accessing every peer in the network.[4]

    Figure 14.

  • 7/31/2019 HSSN New _final

    22/34

    Hardware software systems and Network

    Hardware ,software system and network Page 22

    5.4 Proposed Network Topology

    Proposed network topology for ICT resources is extended star topology. Extended star topology

    is the combination two star topology .Each devices are connected to the central controller calledhub .In star topology direct linkage of connected device is not allowable. So the breakage of one

    device does not depends the entire system. The entire system can continue its working.

    A star topology is less expensive than a mesh topology. In a star each device needs only one link

    and one I/O port to connect it to any other number of others. This factor also makes it easy to

    install and reconfigure .Far less cabling needs to be housed , and additions, moves and deletions

    involve only one connection between that device and hub.

    (Example of star topology)

    Hub

    Figure 15.

  • 7/31/2019 HSSN New _final

    23/34

    Hardware software systems and Network

    Hardware ,software system and network Page 23

    5.5 Proposed transmission medium

    Proposed transmission media for ICT resources is fiber optic cables. we need two types of mediums

    in which one medium for the internal LAN and other for the connection to the ISP (Internet service

    Provider). Ethernet 10BaseT (Cat5e, Unshielded Twisted Pair cable) is used for LAN configuration

    Advantage of Cat5e cables.

    Flexibility : Flexibility is one of the major advantages offered by Cat5 cables. The

    technology it uses is so simple that it is possible for a nonprofessional person to install it

    and start using it. Cables can also be as long as you need

    Ease of Installation: A Cat5 cable is very user-friendly to install

    Ruggedness: Cat5e cables are not easy to break or snap. If they do break, it is easy to

    repair them.

    For connection to Internet service provider 10BaseF is recommended which is supported by

    Optical Fiber. Reasons for opting optical fiber for connection to ISP are .

    No shock hazard

    Longer life expectancy than copper or coaxial cable

    High data rate and high band width

    Secure communications

  • 7/31/2019 HSSN New _final

    24/34

    Hardware software systems and Network

    Hardware ,software system and network Page 24

    5.6 Description for above scenario

    LAN

    ICT resources consist of LAN and WAN network.ICT network office is a two storeybuildingaccording to the network diagram Ground floor have accounts section and administrative section.

    Administrative department contain five personal computers, one fax machine and one printer.

    Telephones are used for communicate with the clients and also communicate with the other

    department.fax machines are used for client communication .Printer is used to take the important

    documents .The whole network is connected by hub. Here hub acts as a connector. It connects

    the wires coming from different branches.

    Accounts department in the ground floor contains s personal computer one printer and one

    telephone connection. Telephone communication allows client communication.

    VLAN Configuration for First Floor

    A VLAN allows a network administrator to create groups of logically networked devices that act

    as if they are on their own independent network, even if they share a common infrastructure with

    other VLANs. The benefits of VLAN are Security, cost reduction, higher performance,

    broadcast storm migration, IT staff efficiency and Simpler project or applicationmanagement.

    Advantages

    Cost And time Reduction

    Creating virtual work groups

    Security

    First Floor contains production department which contains 21 personal computer ,one video

    camera ,one printer , one projector , projector screen ,telephone. Server room is located in first

    floor. Routers are used to connecting networks together. A router runs on software that allows

    the device to move data from one networkto another. Routers operate at the networklayer.

    http://www.inetdaemon.com/tutorials/computers/software/index.shtmlhttp://www.inetdaemon.com/tutorials/networking/lan/index.shtmlhttp://www.inetdaemon.com/tutorials/networking/lan/index.shtmlhttp://www.inetdaemon.com/tutorials/networking/lan/index.shtmlhttp://www.inetdaemon.com/tutorials/networking/lan/index.shtmlhttp://www.inetdaemon.com/tutorials/computers/software/index.shtml
  • 7/31/2019 HSSN New _final

    25/34

    Hardware software systems and Network

    Hardware ,software system and network Page 25

    WAN

    ICT resources Malaysia is the only supplier of business equipment and office supplies of its kind

    in South East Asia. They have developed and spread their business to 3 strategic locations

    throughout South East Asia with more upcoming offices in other locations planned for 2012.This

    office is distributed in a particular geographic area so we have to establish the Wireless area

    network for communication between these offices. The above diagram shows the WAN network

    diagram contains 3 network firewalls for security and the entire network bulding.ICT network

    uses switched WAN network. It connects the end systems, which usually comprise a router

    (internetworking connecting device) that connects to another LAN or WAN. The best example of

    switched WAN is ATM networks.

    5.7 VPN (Virtual Private Network)

    A virtual private network (VPN) is a network that uses a

    public telecommunication infrastructure, such as the

    Internet, to provide remote offices or individual users with

    secure access to their organization's network. A virtual

    private network can be contrasted with an expensive

    system of owned or leased lines that can only be used by

    one organization. The goal of a VPN is to provide the

    organization with the same capabilities, but at a much

    lower cost.[5]

    Advantages

    Cost saving: eliminating the need for expensive long-distance leased lines. VPN reduces long-distance telephone charge .It offers offloading of support cost

    Flexibility and Reliability: VPN is improving the reliability of data services of company.

    Better Performance: Owing to the fact that more high capacity data service options can be

    used, the bandwidth and efficiency of the network generally increases after a VPN solution is

    installed.

    Figure 16.

  • 7/31/2019 HSSN New _final

    26/34

    Hardware software systems and Network

    Hardware ,software system and network Page 26

    Improved Security: The use of encryption protocols and authentication helps secure the data

    that is t raveling over the VPN channel

    Disadvantages of VPN

    . VPNs require an in-depth understanding of public network security issues and proper

    deployment of precautions.

    The availability and performance of an organization's wide-area VPN (over the Internet in

    particular) depends on factors largely outside of their control.

    5.8 IP Addressing

    An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP

    network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each

    representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is

    known as "dotted decimal" notation. The Class of the address and the subnet mask determine

    which part belongs to the network address and which part belongs to the node address .There are

    five different class addresses class A (begin with 0xxx, or 1 to 126 decimal), class B(10xx,

    or 128 to 191 decimal),class c(10xx, or 128 to 191 decimal),class D(1110, or 224 to

    239 decimal), Class E(1111, or 240 to 254 decimal).ICT will get a privet address form ISP and

    the all devices inside will use public IP address.The IP range, subnet mask, and network address

    for each network of ICT is as below. All network address is given below

    Ground Floor

    Network Address 192.168.1.1

    Subnet Mask 255.255.255.254Starting IP Address 192.168.1.2

    Last IP Address 192.168.1.11

    First Floor Network Address 192.168.1.12

    Subnet Mask 255.255.255.254

  • 7/31/2019 HSSN New _final

    27/34

    Hardware software systems and Network

    Hardware ,software system and network Page 27

    Starting IP Address 192.168.1.12

    Last IP Address 192.168.1.33

    Table 8

    6 .Requirements and Cost estimation of proposed system

    Device type Number providesPer

    cost(Rs)

    Total

    (Rs)

    Router 4 port ethernet 1 Cisco 553000 553000

    Hub 10 mpbs 4 port

    ethernet

    3 HP 2500 7500

    Database server Media smart

    servers

    1 Dell 28700 28700

    Telephone Land Phone 3 BSNL 600 1800

    Printer Ink jetprinter 3 hp 6500 19500

    Fax 1 hp 6950 6950

    Projector With RJ 45 port 1 HP 5500 5500

    Cable CAT5e 4500 mts 1400

    per1000 mts

    6300

    Security Camera Video camera 1 Ice mart 550 550

    Total 132100

    Table 9

  • 7/31/2019 HSSN New _final

    28/34

    Hardware software systems and Network

    Hardware ,software system and network Page 28

    7 .Network Problems

    Cables: Most of the network problems are caused by faulty cables. Breakage of cables

    leads to the shut down of the entire net work system.

    Connectivity issues: This can be caused by a number of things, including configuration

    changes or the malfunction of connectivity devices, such as in the case of a switch, router

    or hub. The first thing to do, of course, is to check your physical connections. If

    something is disconnected, you'll need to reconnect and test it in order to make sure that

    the problem is resolved

    Duplication of IP address: Each IP address in the network refers a specific computer. But

    sometimes two will receive the same one as the result of an error. When this happens Software problems: Registry problems may also cause a networking issue, an error or

    invalid attack of the software installed in a network can dump the entire system.

    Security Issues: unauthorized access leads to lose data. Virus and the malwares

    (corrupted program files) are common threat which we can find on the network.

    8. Future Enhancements

    ICT resources Malaysia is going to establish their 3 branches on south east asia.

    Employees and customers will also increase. Use one more server or mainframe to

    manage the entire network system.

    Use secure modems, crypto cable routers for ensuring the security of the entire network

    system.

    Implement new techniques and install new software to check security concerns like

    hacking and stealing of information.

    Use of efficient firewall like packet filtering to protect the network

    Instead of using extended star topology. Use hybrid topologies.

    Use advance network cables for LAN and WAN

  • 7/31/2019 HSSN New _final

    29/34

    Hardware software systems and Network

    Hardware ,software system and network Page 29

    9. Conclusion

    As per the requirement of ICT Network resource proposed contain the combination of LAN and

    WAN Network. Extended star topology is used to build the whole network .The main advantage

    of using this topology is , it requires less amount of cables .Network firewalls are added to this

    network for ensuring the entire network security. Client server architecture is proposed for this

    network .in client server network one computer is act as a server and the rest of them will be the

    clients. Data will transmit between the client and the server.

    Fiber optic cables are suggested for ICT resources as transmission medium. In fiber optic cables

    high frequency and high bandwidth data will travel. It increases the network efficiency.

    Each department has different networks so that data will be secure between departments.

    The concept of VLAN will help this dividing network. Hug is acts as a connector. The normal

    cost for the development of network is calculated and it will not become a big amount when it

    comes to profit after the using it. To connect between the buildings the VPN concept is used its

    more cost effective and efficient too.

  • 7/31/2019 HSSN New _final

    30/34

    Hardware software systems and Network

    Hardware ,software system and network Page 30

    10.Gantt Chart

  • 7/31/2019 HSSN New _final

    31/34

    Hardware software systems and Network

    Hardware ,software system and network Page 31

    11.References

    1.Network Cables. Available: http://pluto.ksi.edu/~cyh/cis370/ebook/ch02b.htm.

    Last accessed 27 march 2011.

    2.Network Protocols. Available: http://www.ehow.com/info_8144331_network-

    protocols-necessary.html. Last accessed 1 april 2011

    3.TCP/IP Protocols. Available: http://sawaal.ibibo.com/computers-and-

    technology/what-function-tcp-ip-protocol-422668.html. Last accessed 5 Apri

    l2011.

    http://sawaal.ibibo.com/computers-and-technology/what-function-tcp-ip-protocol-422668.html.%20%20Last%20accessed%205%20Apri%20l2011http://sawaal.ibibo.com/computers-and-technology/what-function-tcp-ip-protocol-422668.html.%20%20Last%20accessed%205%20Apri%20l2011http://sawaal.ibibo.com/computers-and-technology/what-function-tcp-ip-protocol-422668.html.%20%20Last%20accessed%205%20Apri%20l2011http://sawaal.ibibo.com/computers-and-technology/what-function-tcp-ip-protocol-422668.html.%20%20Last%20accessed%205%20Apri%20l2011http://sawaal.ibibo.com/computers-and-technology/what-function-tcp-ip-protocol-422668.html.%20%20Last%20accessed%205%20Apri%20l2011http://sawaal.ibibo.com/computers-and-technology/what-function-tcp-ip-protocol-422668.html.%20%20Last%20accessed%205%20Apri%20l2011
  • 7/31/2019 HSSN New _final

    32/34

    Hardware software systems and Network

    Hardware ,software system and network Page 32

    4.Client Server Architecture. Available:

    http://www.ehow.com/facts_5525462_client-server-advantages-

    disadvantages.html. Last accessed 5 April2011.

    5.Virtual Private Network. Available:http://searchenterprisewan.techtarget.com/definition/virtual-private-network. Last

    accessed 5 April2011.

    Books Referred

    1. Forouzan Behrouz (2007).Data Communication and Networking. 4th ed. New

    Delhi: Tata McGraw Hill,pp 139-189.

    2. Cisco Network Academy (2006)Exploration One. 4th Ed. Cisco

    Picture Reference

    1. Diagram of Peer to Peer connection. Available:

    http://www.google.co.in/imgres?q=Peer-

    topeer+Network&hl=en&sa=X&tbm=isch&prmd=ivns&tbnid=BqMT2po9CfSHs

    M:&imgrefurl=http://fcit.usf.edu/network/chap6/chap6.htm&ei=8TydTdaoIo3Uv

    QOTmvjIBg&zoom=1&iact=hc. Last accessed 4 th April 2011

    2. Diagram of client server Architecture. Available:

    http://www.google.co.in/imgres?q=Peer-

    topeer+Network&hl=en&sa=X&tbm=isch&prmd=ivns&tbnid=BqMT2po9CfSHs

    M:&imgrefurl=http://fcit.usf.edu/network/chap6/chap6.htm&ei=8TydTdaoIo3Uv

    QOTmvjIBg&zoom=1&iact=hc. Last accessed 4 th Aprill 2011

    3. Diagram of Mesh topology. Available:

    http://www.google.co.in/imgres?imgurl=http://www.brainbell.com/tutorials/Netw

    orking/images/01fig06.gif&imgrefurl=http://www.brainbell.com/tutorials/Networ

    king/Mesh_Topology.html&h=249&w=350&sz=29&tbni. Last accessed 6 th april

    2011.

    4. Diagram of Star topology. Available:

    http://www.google.co.in/imgres?imgurl=http://fcit.usf.edu/network/chap5/pics/sta

    r.gif&imgrefurl=http://fcit.usf.edu/network/chap5/chap5.htm&h=287&w=333&sz

    http://www.ehow.com/facts_5525462_client-server-advantages-disadvantages.html.%20Last%20accessed%205%20April2011http://www.ehow.com/facts_5525462_client-server-advantages-disadvantages.html.%20Last%20accessed%205%20April2011http://searchenterprisewan.techtarget.com/definition/virtual-private-network.%20Last%20accessed%205%20April2011http://searchenterprisewan.techtarget.com/definition/virtual-private-network.%20Last%20accessed%205%20April2011http://searchenterprisewan.techtarget.com/definition/virtual-private-network.%20Last%20accessed%205%20April2011http://searchenterprisewan.techtarget.com/definition/virtual-private-network.%20Last%20accessed%205%20April2011http://www.ehow.com/facts_5525462_client-server-advantages-disadvantages.html.%20Last%20accessed%205%20April2011http://www.ehow.com/facts_5525462_client-server-advantages-disadvantages.html.%20Last%20accessed%205%20April2011
  • 7/31/2019 HSSN New _final

    33/34

    Hardware software systems and Network

    Hardware ,software system and network Page 33

    =11&tbnid=2iuY8MQ5BauCSM:&tbnh=103&tbnw=119&pr. Last accessed 2th

    april 2011.

    5. Diagram of Ring topology. Available:

    http://www.google.co.in/imgres?imgurl=http://fcit.usf.edu/network/chap5/pics/sta

    r.gif&imgrefurl=http://fcit.usf.edu/network/chap5/chap5.htm&h=287&w=333&sz

    =11&tbnid=2iuY8MQ5BauCSM:&tbnh=103&tbnw=119&pr. Last accessed 1th

    april 2011

    6. Diagram of Bus topology. Available:

    http://www.google.co.in/imgres?q=ring+topology&um=1&hl=en&tbm=isch&tbn

    id=dyISn3ioMWItdM:&imgrefurl=http://www.free-computer-

    tips.info/networking-tips/network-

    topologies.html&ei=uFOdTbCRIIrsuAO6wOSuBA&. Last accessed 6th april

    2011.

    7. Diagram of tree topology. Available:

    http://www.google.co.in/imgres?q=tree+topology&um=1&hl=en&tbm=isch&tbni

    d=pU6HcZykbt7RRM:&imgrefurl=http://www.free-computer-

    tips.info/networking-tips/mesh-topology-tree-topology-and-hybrid-topology.h.

    Last accessed 6th april 2011.

    8.

    Twisted pair. Available:http://www.google.co.in/imgres?q=twisted+pair+cable&um=1&hl=en&tbm=isch

    &tbnid=1cjgklGPlHjxrM:&imgrefurl=http://www.techinterview.info/cable.html&

    ei=6F6dTc7FKYKyuAPb-9nLBA&zoom=1&iact=hc&vpx=316&vpy=10. Last

    accessed 27 march 2011.

    9. Coaxial Cable. Available:

    http://www.google.co.in/imgres?q=coaxial+cable&um=1&hl=en&tbm=isch&tbni

    d=usGarN3dU3WvxM:&imgrefurl=http://courses.wccnet.edu/computer/mod/ng0

    8c.htm&ei=6WCdTaPKDYiavgPvpvDBBA&zoom=1&iact=rc&dur=439&oei.

    Last accessed 27 march 2011.

    10.Virtual Private Network. Available:

    http://www.google.co.in/imgres?imgurl=http://www.digitalworldtokyo.com/entryi

    mages/2008/02/080212_VPN.jpg&imgrefurl=http://www.digitalworldtokyo.com/

  • 7/31/2019 HSSN New _final

    34/34

    Hardware software systems and Network

    index.php/digital_tokyo/articles/remote_workers_rej. Last accessed 27 march

    2011.