Upload
ahamed-nishadh
View
311
Download
0
Embed Size (px)
DESCRIPTION
Networks and Networking Assignment Documentation
Citation preview
ASIA PACIFIC INSTITUTE OF INFORMATION TECHNOLOGY
APIIT Diploma Part II
INCOURSE ASSIGNMENT
NETWORKS AND NETWORKING
Prepared ByA.N.Ahamed Nishadh (CB004081)
S.D.Ilangakoon (CB004041) M.J.Dilshan Zuhdi (CB004150)
Module Code & TitleAICT003-3-2 – Networks and Networking
CohortDF10A1ICT
Date of Submission
22nd August 2011
Instructor
Mr.Udesh Amarasinghe
Submitted in partial fulfillment for the degree of
Bachelor of Science (Hons) in Computing
GROUP COMPONENTINDIVIDUAL
COMPONENT
Assu
mpti
ons
(5)
Repo
rt c
onte
nt (1
0)
Dia
gram
s an
d/or
Fig
ures
(20)
Anal
ytica
l and
Criti
cal
Thin
king
(20)
Doc
umen
tatio
n (5
)
Refe
renc
ing
(10)
Gro
up T
otal
(70)
Pres
enta
tion
(20)
Prog
ress
Rep
ort
(5)
Wor
kloa
d M
atrix
(5)
Indi
vidu
al T
otal
(30)
Gra
nd T
otal
(100
)
Ahamed Nishadh
Deshan Ilangakoon
Dilshan Zuhdi
i
WORKLOAD MATRIX
Name / CB No.
Work Assigned Work Completed
Comments & Signature
Dilshan Ahamed Deshan
Ahamed Nishadh
(CB004081)
IntroductionObjectivesRequirement-SpecificationsScope AssumptionsFloor Description and design-Ground FloorSecond Floor
Security OptionsLimitations
ALL COMPLETED
Deshan Ilangakoon (CB004041)
Floor Description and design-First FloorThird Floor Fourth Floor
TopologiesFeasibility StudyConclusionMeeting MinutesGantt Chart
ALL COMPLETED
Dilshan Zuhdi
(CB004150)
Backbone Network plan
Floor Description and design-Fifth Floor Sixth Floor Seventh Floor
Backup options
ALL COMPLETED
ii
PROJECT GNATT CHART
iii
ACKNOWLEDGEMENTS
Firstly we would like to thank our lecturer Mr.Udesha Amarasinghe for all the help
and guidance given to us while doing this assignment. Especially for teaching us this
module in such a way that we were able to learn this highly technical module very
easily. Also we would like to thank Mr. Balachandran of the School of Computing of
APIIT for all the assistance given in preparing this document.
Also there are many individuals who have helped us in numerous ways directly and
indirectly so that we were able to complete this assignment.
APIIT Lanka for providing us with resources and the Tech Team at APIIT Lanka for
their assistance at required times.
And last but not least our friends, parents and the well-wishers without whose moral
support and encouragement, we would not have been able to do a good job.
Finally, if there are any shortcomings in this project, then we request to excuse us for
all those and accept this documentation.
Ahamed Nishadh
Deshan Ilangakoon
Dilshan Zuhdi
iv
TABLE OF CONTENTS
1.0 – INTRODUCTION................................................................................................1
2.0 – ANALYSIS..........................................................................................................2
3.0 – OBJECTIVES......................................................................................................3
4.0 – REQUIREMENT SPECIFICATIONS................................................................4
5.0 – SCOPE.................................................................................................................5
6.0 – ASSUMPTIONS..................................................................................................6
7.0 – FLOOR AND NETWORK PLANS....................................................................8
7.1 – BACKBONE NETWORK PLAN...................................................................8
7.1.1 – DNS SERVER..........................................................................................8
7.1.2 – DHCP SERVER........................................................................................8
7.1.3 – SIP SERVER.............................................................................................8
7.1.4 – BACKUP SERVER..................................................................................9
7.1.5 – EMAIL SERVER......................................................................................9
7.1.6 – PRINT SERVER.......................................................................................9
7.1.7 – ANTIVIRUS SERVER.............................................................................9
7.1.8 – DATABASE SERVER.............................................................................9
7.1.9 – FILE SERVER........................................................................................10
7.1.10 – PROXY SERVER.................................................................................10
7.1.11 – SWITCHES...........................................................................................10
v
7.1.12 – WIRELESS ACCESS POINTS............................................................12
7.1.13 – ROUTERS.............................................................................................13
7.1.14 – FIREWALL...........................................................................................14
7.1.15 – ADSL....................................................................................................14
7.2 – GROUND FLOOR........................................................................................15
7.2.1 – FLOOR PLAN........................................................................................16
7.2.2 – NETWORK PLAN.................................................................................16
7.3 – FIRST FLOOR..............................................................................................18
7.3.1 - FLOOR PLAN.........................................................................................19
7.3.2 - NETWORK PLAN..................................................................................19
7.4 – SECOND FLOOR.........................................................................................20
7.4.1 – FLOOR PLAN........................................................................................21
7.4.2 – NETWORK PLAN.................................................................................21
7.4.4 – SERVER ROOM....................................................................................23
7.5 – THIRD FLOOR.............................................................................................26
7.5.1 – FLOOR PLAN........................................................................................26
7.5.2 – NETWORK PLAN.................................................................................26
7.6 – FOURTH FLOOR.........................................................................................29
7.6.1 – FLOOR PLAN........................................................................................29
7.6.2 – NETWORK PLAN.................................................................................29
7.7 – FIFTH FLOOR..............................................................................................32
vi
7.7.1 – FLOOR PLAN........................................................................................32
7.7.2 – NETWORK PLAN.................................................................................32
7.8 – SIXTH FLOOR..............................................................................................34
7.8.1 – FLOOR PLAN........................................................................................34
7.8.2 – NETWORK PLAN.................................................................................34
7.9 – SEVENTH FLOOR.......................................................................................37
7.9.1 – FLOOR PLAN........................................................................................37
7.9.2 – NETWORK PLAN.................................................................................37
8.0 – BACKUP OPTIONS..........................................................................................39
8.1 – ONLINE BACKUP.......................................................................................39
8.2 – BACKUP SERVER.......................................................................................39
8.3 – NETWORK HARDWARE FAILURE.........................................................40
9.0 – TOPOLOGIES...................................................................................................41
9.1 – TREE TOPOLOGY.......................................................................................41
9.2 – STAR TOPOLOGY.......................................................................................42
10.0 – FEASIBILITY STUDY...................................................................................43
10.1 - TECHNICAL FEASIBILITY......................................................................43
10.2 - OPERATIONAL FEASIBILITY.................................................................44
10.3 – SCHEDULE FEASIBILITY.......................................................................45
10.4 – ECONOMIC FEASIBILITY.......................................................................45
11.0 – SECURITY......................................................................................................46
vii
11.1 – FIREWALL.................................................................................................46
11.2 – PROXY SERVER........................................................................................46
11.3 – VIRTUAL LAN...........................................................................................47
11.4 – PASSWORD PROTECTED WI-FI.............................................................47
11.5 – ANTIVIRUS SERVER................................................................................47
12.0 – LIMITATIONS................................................................................................48
13.0 – CONCLUSION................................................................................................49
BIBLIOGRAPHY.......................................................................................................50
MEETING MINUTES................................................................................................52
1st MEETING..........................................................................................................52
2nd MEETING.........................................................................................................53
3rd MEETING..........................................................................................................54
4th MEETING..........................................................................................................55
5th MEETING..........................................................................................................56
6th MEETING..........................................................................................................57
7TH MEETING........................................................................................................58
viii
TABLE OF FIGURES
Figure 1 - BACKBONE NETWORK DIAGRAM..........................................................................15
Figure 2 - GROUND FLOOR DIAGRAM...................................................................................18
Figure 3 - FIRST FLOOR DIAGRAM.........................................................................................20
Figure 4 - SECOND FLOOR DIAGRAM....................................................................................23
Figure 5 - SERVER ROOM DIAGRAM......................................................................................25
Figure 6 - THIRD FLOOR NETWORK DIAGRAMV....................................................................28
Figure 7 - FOURTH FLOOR NETWOKR DIAGRAM...................................................................31
Figure 8 - FIFTH FLOOR NETWORK DIAGRAM......................................................................33
Figure 9 - SIXTH FLOOR NETWORK DIAGRAM.......................................................................36
Figure 10 - SEVENTH FLOOR NETWORK DIAGRAM...............................................................38
Figure 11 - Tree Topology....................................................................................................41
Figure 12 - STAR TOPOLOGY...........................................................................................42
ix
1.0 – INTRODUCTION
Seashells Colombo is a member of the internationally renowned Confifi Seashells
Group of Hotel. The management of Seashells Group have decided to set up a new
hotel in the Southern part of Sri Lanka with the tourism industry picking up.
The new hotel is named Seashells Reef and is located near the sea and is considered
a beach hotel. The hotel is a luxury and semi-luxury hotel and will be catering to the
local as well as foreign tourists.
The hotel consists of 100 rooms spread across 7 floors. The hotel also has 2 banquet
halls, restaurants, coffee shops, sales outlets, recreational areas and a VIP business
center.
With the construction of the building started, the management of Seashells group has
requested us to design a network plan for their hotel connecting all areas of the hotel
to a centralized location so as to provide services to the customers as well as to
provide a secure and efficient and fast connectivity for the management and the staff.
Considering all these aspects we have come up with this documentation providing all
the relevant plans to set up a fully secure and efficient network to the hotel. From the
type of cables to be used to the method they are to be wired along, everything has
been looked into in this documentation as well as the type of devices to be used, the
security systems in place, methods the devices are connected are all addressed in this
documentation. It should also be noted that while designing the network we have
taken note of further upgrades in the future and allowed facilities to be easily
upgraded with minimum difficulty.
1
2.0 – ANALYSIS
Our group was assigned the task of creating a network plan for Seashells Colombo.
As a part of this project that we are undertaking the first task at hand is to identify
the problems. After this we had to do several researches into the best way to
implement the solution that we had identified for solving the requirements of
Seashell Colombo.
We analyzed the problem that we were facing and developed solutions using the
research that we had carried out. We identified after this the best and most suited
way of laying the network and the most suited hardware that would help laid a
network of the highest quality.
2
3.0 – OBJECTIVES
The computers that the staff will be using and the computers that the guests will be
using have been set up on two different networks. At places they have been
physically separated using different hardware and at times have been virtually
separated using virtualization of networks. This is to ensure that guests cannot access
the staff network due to security issues.
Wireless networks are placed in all the floors so that users with wireless network
accessible devices can use connect to the network and use the services. The wireless
networks are primarily intended to be used by the guests and no access is given to
the staff network on the wireless networks.
More than one external connectivity methods are used, such as 3 separate ADSL
lines and 4 separate PSTN telephone lines so as to level off the load that is being put
on the network due to the size of the network. This will ensure that external
connectivity will remain smooth with less traffic interference.
A firewall has been installed to monitor all incoming traffic through the internet
while a proxy server has been installed in the network to monitor all outbound
network traffic. This is done so as to secure the networks and the inbound and
outbound traffic to provide a quality service to the guests.
The network is being designed with the intention of future upgrades in mind.
3
4.0 – REQUIREMENT SPECIFICATIONS
The hotel has 100 guest rooms. All the guest rooms need to be wired with a RJ45
port so that guests can connect their device to the network.
Each room will also have a telephone that will be able to call any internal section of
the hotel and take outside calls through an operator.
All departments will also have computers that are also connected to the network.
A wireless network is present in all the floors to provide secure wireless connectivity
to users to access the network.
Necessary departments and the VIP business center should have network printing
facilities to be able to print from any computer in that sub network.
Adequate security measures need to be taken for data protection.
Unauthorized access to the network should be prevented.
4
5.0 – SCOPE
To make this project of networking the hotel, there are certain aspects that we need
to consider. They are:
What kind of devices have to be used?
What kind of network needs to be used?
What are the services that will be provided in the network?
What are the security measures and standards that need to be implemented
for data protection?
What is the budget of this project?
The feasibility of this project.
Where and how devices and are to be placed in the building for and efficient
network.
5
6.0 – ASSUMPTIONS
In this project, we have taken certain assumptions so as to make this assignment a success. They are as follows:
The network plan has been done according to a very average budget although
the hotel had not specified a budget for us to work on.
Backups are taken on the backup server only and no offsite backups are
taken.
The best possible network solution is being submitted to Seashells Group.
All the cabling and the installation will be either done by us or by certified
professionals so that the network works flawlessly.
If one external connection line (ADSL or PSTN) is down due to
malfunctioning, the rest of the lines will take over the job automatically while
the faulty line is being repaired.
The backup server will manage all the backup processes.
In the case of guest rooms, the networking is shown for only one room in
each floor. This is because all the other rooms will also have a similar
networking process done except that the cabling will change depending on
the availability at the time of cabling.
Although shown in the diagrams that there is a computer in every room, it is
not the case. Only an RJ45 port is available in each room with a spare 1m
cable in each room to connect the user’s personal devices.
The telephones shown in the diagrams are physically present in the rooms
and the guests cannot connect any other devices to those connections.
All the cabling will be done along the ceiling since we assume that there will
be a space between the concrete floors and the ceilings which allow wiring to
be done along the ceilings.
Appropriate measures are being taken to protect the cabling and the devices
and jacks so as to prevent corrosion or salt building up since the hotel is
located near the sea.
Sufficient electrical power is available at the hotel to support the core of the
network (servers and switches and other devices).
6
The wireless access point devices are able to support the entire floor with
minimum signal drop.
No dead zones are created due to two wireless networks clashing each other.
The network plan submitted is able to meet all the requirements said by the
management.
The cable duct houses not only the network cables but also other electric
wiring of the hotel.
The devices such as switches and wireless access points are placed in safe
and secure locations when they are exposed publicly.
The cables connected to the devices, are connected to the appropriate place of
each device, and not as shown in the diagrams. (Ex. the network cable
connected to the computer is connected to the NIC of the computer and not to
the monitor or keyboard)
The Wireless networks are secured using network keys so that no user from
outside can access the network. The password to be used is widely publicized
inside the hotel so that guests can only access the network and are changed
every 90 days to keep the network secured.
Adequate IP addresses are available for a considerable number of wireless
devices to be connected.
7
7.0 – FLOOR AND NETWORK PLANS
7.1 – BACKBONE NETWORK PLAN
The diagram shown at the end of this section shows the main backbone network plan
of the hotel. The network consists of the following devices and services used and
provided in the network.
7.1.1 – DNS SERVER
The Domain Name System (DNS) is a standard technology for managing the names
of Web sites and other Internet domains. DNS technology allows you to type names
into your Web browser and your computer to automatically find that address on the
Internet. (Mitchell, n.d.)
We use this server to manage our websites names and internet domains that goes out
from our network and comes to our network.
7.1.2 – DHCP SERVER
Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a
server to automatically assign an IP address to a computer from a defined range of
numbers configured for a given network. (University Information Technology
Services, n.d.)
The reason for using a DHCP server is to allocate a unique IP address for each
device that will be connecting up to the hotel’s network. The DHCP sever will have
to allocate a IP for all network ports in the guest rooms, administrative departments
and also for the servers and the VoIP telephone lines.
7.1.3 – SIP SERVER
Session Initiation Protocol (SIP) is a communications protocol used to create,
modify, and terminate sessions with one or more users. SIP sessions can include
voice communications, instant messaging, and multimedia applications. SIP is most
8
widely used to initiate and terminate Voice over Internet Protocol (VOIP) calls.
(WhatIsMyIPAddress, n.d.)
We mainly use this server for voice communication.
7.1.4 – BACKUP SERVER
Sever that lets you to save your data in compressed file. From this we can relocate
the data to another computer. This server will help to ensure the safety of the hotel’s
valuable data in the case the original data is lost or gets corrupted. A backup server
should be frequently updated and backups of files taken regularly
We use this server to protect our data. And to ensure that the data is secured if
anything goes wrong in the network.
7.1.5 – EMAIL SERVER
Email Server provides the email facilities in your network.
We use this Server to provide email addresses to the staffs to communicate through
the network. From this the organizations data files and other important stuffs will be
secured when sending to others and outsides cannot access.
7.1.6 – PRINT SERVER
This Server can be a device or software that shows the print requests and print
queues.
We use this Server so any guest or staff can print their documents from a network
printer. This way we do not need to install a printer to every computer.
7.1.7 – ANTIVIRUS SERVER
We use this Server to provide the security of our network. We have used Bit
Defender Virus Guard as it is more reliable and one of the leading virus guard in the
world.
9
7.1.8 – DATABASE SERVER
Database server is the term used to refer to the back-end system of a database
application using client/server architecture. The back-end, sometimes called a
database server, performs tasks such as data analysis, storage, data manipulation,
archiving, and other non-user specific tasks. (Webopedia, n.d.)
We use this server to maintain our database system easily.
7.1.9 – FILE SERVER
A file server is a computer responsible for the central storage and management of
data files so that other computers on the same network can access the files. A file
server allows users to share information over a network without having to physically
transfer files by floppy diskette or some other external storage device.
(SearchNetworking, n.d.)
We use file Server to transfer information inside the network without an external
device.
7.1.10 – PROXY SERVER
A server that sits between a client application, such as a Web browser, and a real
server. It intercepts all requests to the real server to see if it can fulfill the requests
itself. If not, it forwards the request to the real server. (Webopedia, n.d.)
We have used a proxy server to act as a gateway server to separate the network from
outside networks and to filter out the unwanted sites.
7.1.11 – SWITCHES
What is a Switch? Why do we use them?
A Network Switch is a hardware appliance with a fixed number of Network Ports
(RJ-45 Ports) that can connect multiple Network devices to the LAN (Local Area
Network). They are mainly used for sharing Internet connectivity between multiple
computers or sharing some network resource – like Printer or NAS Box so that they
can be accessed by all the users of the network.
10
Layer 2 Switch and Standards we will be using:
The Layer 2 Switches are for all in to the 2nd Layer of the OSI Model and these
switches are hardware based. It can also be called as “Standard Switch” and it
required a Media Access Control Address (MAC) to identify the Source and the
Destination of the Data Packet.
Layer 2 Switch Standards
1. The 1st Standard that we use is the DES-3552 xStack it is a 48 port Layer 2
Switch.
We use this switch in Several Floors they are:
Ground floor- we use a 48 port to this floor is to connect the guest
computers, printer and the wireless access point.
2nd Floor- we use this switch to connect all the staff network
computers, the Wireless access point and the network printers.
3rd Floor- we use this switch to connect all the network computers, the
wireless access point and the network telephones.
4th Floor- we use two 48 port switches in this floor we use one switch
for the network computers and the wireless access point and the other
is for the network telephones.
5th Floor- we use this switch to connect all the network computers,
wireless access point and network telephones.
6th floor- we use this switch to connect all the network computers,
wireless access point and network telephones.
7th Floor- we use two Layer 2 Switches. We use one switch for the
network computers and the wireless access point and the other is for
the network telephones.
2. The 2nd Standard that we use is the DGS-3426P it is a 24 port Layer 2
Switch.
We use this switch in Several Floors they are:
Ground floor- We use 2 switches one is to connect all the shop
computers, Restaurant Computers and the kitchen computers. And the
other switch is to the network telephones.
11
1st Floor- we use a switch here to connect all the network computers,
network telephones and the wireless access point.
2nd Floor- we use 2 switches one is to connect all the servers and the
other one is for the network telephones.
Layer 3 Switch and the Standards we will be using:
It’s a hardware device which operates in the network layer of the OSI Model. A layer
3 switch is separated from a router is that L3 switch contains hardware which have
been optimized to pass data as fast any layer 2 switch and they have the ability to
make decisions on how to transmit traffic and is the usual behavior of a router. A
Layer 3 Switch is also faster than a Router because of its hardware switching
capabilities.
Layer 3 Switch Standards
The standard we will be using is DGS-3650. It’s a 48 port layer 3 switch and we use
this switch as our backbone switch in our network.
7.1.12 – WIRELESS ACCESS POINTS
Wireless access points (AP or WAP) are specially configured nodes on wireless local
area networks (WLAN). Access points act as a central transmitter and receiver of
WLAN radio signals. The standard that we have used for the wireless transmission
media is DIR-330. (Mitchell, n.d.)
802.11b Standard:
An extension to 802.11 that applies to wireless LANS and provides 11 Mbps
transmission (with a fallback to 5.5, 2 and 1-Mbps) in the 2.4 GHz band. 802.11b
uses only DSSS. 802.11b was 1999 ratification to the original 802.11 standard.
802.11a Standard:
An extension to 802.11 that applies to wireless LANs and provides up to 54-Mbps in
the 5GHz band. 802.11a uses an orthogonal frequency division multiplexing
encoding scheme rather than FHSS or DSSS.
12
802.11g Standard:
It applies to wireless LANs and is used for transmission over short distances at up to
54-Mbps in the 2.4 GHz bands.
802.11n Standard:
802.11n builds upon previous 802.11 standards by adding multiple-input multiple-
output (MIMO). The additional transmitter and receiver antennas allow for increased
data throughput through spatial multiplexing and increased range by exploiting the
spatial diversity through coding schemes like Altamonte coding. The real speed
would be 100 Mbit/s (even 250 Mbit/s in PHY level), and so up to 4-5 times faster
than 802.11g.
From these Standards we use the 802.11.n because it’s the latest technology in
wireless access point. (Webopedia, n.d.)
7.1.13 – ROUTERS
It is a device that sends data packet along the network. It’s used to connect two or
more networks together. They are located at the gateways where two or more
networks connected. And it keeps the critical devices data flowing between networks
and keeps the networks connected to the internet.
The main advantages of a router are:
It limits the collision domain. It can connect to different architectures and media. It can function on WAN and LAN. It can filter the broadcast. It can determine the best path for the data reach.
(AllInterview.com, n.d.)
In our network we have 8 routers. Every floor we have put a router to access internet wirelessly. And we are having a ADSL router to get the internet connection.
13
7.1.14 – FIREWALL
It’s a system that is designed to prevent from unauthorized access to or from a
private network. It can implement in both hardware or software or a combination of
the both. It is usually used to prevent unauthorized internet users from private
networks connected to the internet, especially intranets. (Webopedia, n.d.)
What do firewalls do?
The most basic type firewall performs Packet Filtering. A second type of firewall, which provides additional security, is called
Circuit Relay. Another and still more involved approach is the Application Level Gateway.
(PC-Help, n.d.)
7.1.15 – ADSL
The definition of ADSL is Asymmetric Digital Subscriber Line. It’s a type of a DSL
communication technology used to connect internet. This allows more data to send
over existing copper telephone lines (POTS) when we compared to the traditional
modem lines. A special filter called microfilter in installed on a subscriber’s
telephone line to allow both ADSL and regular voice services to be used at the same
time. ADSL requires a special ADSL modem and subscribers must be in close
geographical locations to the provider's central office to receive ADSL service.
Typically this distance is within a radius of 2 to 2.5 miles. ADSL supports data rates
of from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and from
16 to 640 Kbps when sending data (known as the upstream rate). (Webopedia, n.d.)
Advantages of ADSL
It can use higher data rate of 26mbps maximum wherever possible. It uses a normal telephone lines. And it is easy to start using ADSL. We can use modem and telephone simultaneously using the ADSL splitter. ADSL modems are cheap and anyone can afford it. It’s always on connection.
(Tuning 2.0, n.d.)
14
BACKBONE DIAGRAM
Figure 1 - BACKBONE NETWORK DIAGRAM
15
7.2 – GROUND FLOOR
7.2.1 – FLOOR PLAN
The ground floor is one of the important floors of the hotel. This is because the floor
will be one of the busiest floors in terms of guests. The floor consists of a lobby area,
sales outlets, restaurant, reception plus the VIP business center. The ground floor is
where most of the guests will be using the networks compared to the other floors.
The cable duct is situated in the top left corner of the building and is in the same
position in all the floors. The cable duct is used to send cables vertically along all the
floors so that they are not seen outside to the visitors of the hotel.
7.2.2 – NETWORK PLAN
As said in the floor plan description, this floor is the busiest floor in the hotel. So we
have strategically networked this floor so that the different sections are separated.
This floor has 2 separate network switches in place. One switch is for all the
computers that the staff will be using. A 24 port Layer 2 switch is being used in this
case. Only 15 machines are connected to this switch. The rest of the ports are kept so
that they can be used if more computers are added to the network in the future as an
upgrade option. A separate switch is being used in this case instead of using a large
port number switch and connecting the other PC’s also is to separate the staff
network from the guest network due to security reasons. A Virtual LAN (VLAN) can
also be used but was not used in this instance as the guest network in the ground
floor is for the VIP center only and that has been put separately on a single switch.
The second switch used in this floor is for the VIP Business Center and for the
telephone network. A 48 port Layer 2 switch is being used in this case and is
virtually broken into two networks using VLAN thereby separating the computer
network and the VoIP Telephone network. The computer network from this switch is
used by guests only and more exclusively by the VIP Business Club users.
In addition to these, we also suggest that a wireless network access point be set up in
this floor. Wireless network connectivity is a very necessary requirement in the
16
current era with almost every modern mobile communication device being able to
connect to a wireless network. With the wireless access point, guests especially in
the lobby area and the restaurant area plus any guest in the whole of the ground floor
can connect to the wireless network of the hotel using a communication device and
access the services provided by the hotel.
17
GROUND FLOOR DIAGRAM
Figure 2 - GROUND FLOOR DIAGRAM
18
7.3 – FIRST FLOOR
7.3.1 - FLOOR PLAN
The first floor has four main rooms. These rooms are the diamond banquet hall, the
Rainbow banquet hall, the banquet office and service department and the banquet
kitchen.
7.3.2 - NETWORK PLAN
This floor consists of only six machines, three telephones and one wireless access
point. The floor also has only one 12 port Layer 2 Switch since there are very few
connections that are required. The ports in this switch have been separated into three
Virtual Local Area Networks (VLAN).
The VLAN has been divided in such a manner to accommodate the telephone
network, the Wireless Access Point (WAP) network and the first floor computer
responsible for the administrative work in that floor. The purpose of dividing the
network in such a manner is so that the WAP which is accessible to the guests will
not leave the administrative network vulnerable to any external party.
The Banquet halls’ only means of access to the internet is via the WAP that is
located in the center of the floor. This is to provide any guest who is in the either of
the halls or the lobby to access to internet browsing using any device that has a
wireless adapter.
The banquet office and service department has five computers that will allow the
employees in this department to maintain their databases and information files.
These computers will be linked up to the Layer 2 switch that is in the floor to their
corresponding VLAN. This room also has two (2) Voice over IP (VoIP) telephone
links also connected to the floors switch. This will allow the persons in this
department to communicate with other departments or to any other telephone line.
19
FIRST FLOOR DIAGRAM
Figure 3 - FIRST FLOOR DIAGRAM
20
7.4 – SECOND FLOOR
7.4.1 – FLOOR PLAN
The second floor of the building is the most important floor of the hotel in terms of
administration since most of the administrative sections of the hotel are located in
this floor. The floor is divided into different sections to house different departments
and in some cases prominent individuals such as the Managing Director and the
General Manager etc.
The floor also is home to the Server Room which houses all the servers and other
network equipment of the hotel. Along with the Server Room is the IT Department.
Access to the Server Room is given through the IT Department only so that no
unauthorized access is done to the Server Room.
In addition to all the departments and offices in the floor, a small lobby area is also
available in the middle of the floor for visitors of the offices.
7.4.2 – NETWORK PLAN
As said above, this floor is the administrative capital of the hotel. Most of the hotels
administration is done in this floor. This floor consists of 3 Layer 2 switches and 1
Layer 3 switch which will be the main backbone switch of the hotel.
The first Layer 2 switch used in this floor is to connect all the computers used in the
various departments of the floor. A 48 port Layer 2 switch is being used in this
instance and is broken into several VLAN’s to accommodate the different
departments in the floor. The reason why the different departments are separated into
VLAN’s is because of data security so that one department cannot access the
network of another department. One port in the switch has been made into a separate
VLAN so as to accommodate the wireless access point that is available in this floor.
The wireless access point is a public network so it is put into a separate network to
isolate it from the other networks.
21
The second switch used in this floor is for the VoIP telephone network. Since all the
telephones are connected to just one network, no separate sub networks are being
made for this network and all telephone lines are connected to one switch.
The other Layer 2 switch used in this floor is the switch for the server room to
connect all the servers. More detailed description of the server room and the network
of the server room are given below.
22
SECOND FLOOR DIAGRAM
Figure 4 - SECOND FLOOR DIAGRAM
23
7.4.4 – SERVER ROOM
The Server Room is the most important section of the hotel when it comes to
networking since it houses all the important networking equipment of the hotel. A
detailed diagram of the server room is given below.
The server room contains two main switches. One is a 24 Port Layer 3 switch which
connects all the servers in the room together to form one sub network. Although only
10 different servers are available, a larger number port switch is being used so that if
in the future for any upgrades, they can be done easily.
The other switch in the Server Room is the 24 port Layer 3 Main Backbone Switch.
This is the main switch of the hotel and all other small switches and external
connection devices (Ex. ADSL Router) are connected to this switch. Only one Layer
3 switch is used in the hotel due to the cost involved and all other switches used in
the system are layer 2 switches which will serve the purpose of networking the hotel.
As shown in the diagram, 3 ADSL connections are to be taken. The 3 connections to
be taken are the package named “Web Master” from Sri Lanka Telecom. Each
package comes with a 4Mbps Download Speed and a 512Kbps Upload Speed with a
60 GB threshold Volume per month. A Static IP is also given to every connection
that is obtained. The 3 ADSL connections are then connected to a Load Balancer.
From the load balancer the connection is given to the Firewall which will filter the
incoming and outgoing network traffic and then allow the connections to the pass
through to the ADSL Router which is then connected to the Main Layer 3 Backbone
Switch.
Also as specified earlier, we suggest that a VoIP telephone network be used for the
internal telephone network. For this, a Digital PABX Device is installed in the Server
Room to which 4 Separate PSTN Telephone Connections are connected to. The
PSTN Connections are obtained from Sri Lanka Telecom. From the Digital PABX
Device the line is then connected the Main Layer 3 Backbone Switch which will then
route connections as required.
24
SERVER ROOM DIAGRAM
Figure 5 - SERVER ROOM DIAGRAM
25
7.5 – THIRD FLOOR
7.5.1 – FLOOR PLAN
The third floor has eighteen bed rooms, a mini restaurant and a recreational area.
This floor has a cable duct from which the network cables for the floor are pulled.
This floor’s network utilization will be limited to the occasional use by a guest and
the major contributor for network activity will be the restaurant and the recreational
area.
7.5.2 – NETWORK PLAN
This floor will have 20 network ports, 20 telephone lines and wireless access point.
These devices will be connected to one 48 port Layer 2 switch to connect all the
network cables. The floor’s switch will be broken in to three VLAN to help the hotel
maintain security.
The purpose of breaking the switch in this manner is to make the network traffic
coming from the restaurant and the recreational area separate from the normal guest
network. This will help in maintaining network security as one network cannot
access the other network. Also a separate network is placed for the telephone lines.
The wireless access point will be connected up to the VLAN separated for the guests.
In this floor as mentioned above there are 18 guest rooms. In each of these rooms
there will be placed a network port and a telephone line. Each of the rooms will be
networked in the same manner and will use up 18 of the networks ports used in the
floor and 18 of the telephone lines that are provided for the floor. These network
ports will be connected to the VLAN allocated for the guests in the floor’s switch
and the telephone lines will be connected to their respective VLAN ports.
The wireless access point on this floor is places in the center of the floor to allow all
the guests to access the internet with any device containing a wireless adapter. This
will also be connected to the guest VLAN in the floor’s switch.
26
The mini restraint and recreational are of floor have each one network port and one
telephone line. The network port will be used to maintain their records and inventory
and therefore will be in a separate VLAN. This will allow for higher security for the
administrative work of the hotel.
All telephone networks will be using a VoIP to communicate internally and also with
the any outside line via the VoIP server.
27
THIRD FLOOR DIAGRAM
Figure 6 - THIRD FLOOR NETWORK DIAGRAMV
28
7.6 – FOURTH FLOOR
7.6.1 – FLOOR PLAN
The fourth floor has twenty five bed and the Room Service Department. This floor
has a cable duct from which the network cables for the floor are pulled.
This floor’s network utilization will be limited to the occasional use by a guest and
the major contributor for network activity will be the restaurant and the recreational
area.
7.6.2 – NETWORK PLAN
This floor will have 26 network ports, 26 telephone lines and wireless access point.
These devices will be connected to two 48 port Layer 2 switches one for the VoIP
telephone lines and one for the floors network ports. The floor’s switch for the
network ports will be broken into two VLAN to ensure hotel security.
The purpose of breaking the switch in this manner is to make the network traffic
coming from the normal guest network and the traffic from the Room Service
Department separate. This will help in maintaining network security as one network
cannot access the other network. The wireless access point will be connected up to
the VLAN separated for the guests in the in the switch used for the network ports.
In this floor as mentioned above there are 25 guest rooms. In each of these rooms
there will be placed a network port and a telephone line. Each of the rooms will be
networked in the same manner and will use up 25 of the networks ports used in the
floor and 25 of the telephone lines that are provided for the floor. These network
ports will be connected to the VLAN allocated for the guests in the floor’s switch
and the telephone lines will be connected to their respective switch.
The wireless access point on this floor is places in the center of the floor to allow all
the guests to access the internet with any device containing a wireless adapter. This
will also be connected to the guest VLAN in the floor’s switch for the network ports.
The Room Service Department will have one network port and one telephone line.
The network port will be used to maintain their records and inventory and therefore
29
will be in a separate VLAN. This will allow for higher security for the administrative
work of the hotel.
All telephone networks will be using a VoIP to communicate internally and also with
the any outside line via the VoIP server.
30
FOURTH FLOOR DIAGRAM
Figure 7 - FOURTH FLOOR NETWOKR DIAGRAM
31
7.7 – FIFTH FLOOR
7.7.1 – FLOOR PLAN
In this floor there are 18 guest rooms, one House keeping Department and a Laundry
is available.
7.7.2 – NETWORK PLAN
For each guest room there will be a network port that will allow the guest to access
internet through the network and each guest room will be having a telephone to
communicate with the reception or name a call to an outside telephone.
There will be 2 network computers to the House keeping department to handle their
file data and access to the internet. And also there will be 2 telephone connected to
this department to call to other departments, reception or to call an outside telephone.
There will be 1 network computer to the laundry to handle their file data and access
to the internet. And also there will be a telephone connected to this department to
call to other departments, reception or to call an outside telephone.
There will be a wireless access point also in this floor. This wireless access point is
in the center of the floor to get the whole floor covered from the wireless network.
From this guests or the staffs can access internet from any device that can access
internet wirelessly.
For this floor we have put a 48 port layer 2 switches. In this we have divided this in
to 3 VLAN. 1st VLAN is to the guest rooms Network ports and wireless access
point.2nd VLAN is to the Housekeeping department and Laundry Network
computers.3rd VLAN is to the guest room, Housekeeping department and laundry
telephones.
We divide guest rooms and wireless access point VLAN from Housekeeping
department and Laundry VLAN because to keep the department files and data
secured. And no one cannot access to the department network.
32
33
FIFTH FLOOR DIAGRAM
Figure 8 - FIFTH FLOOR NETWORK DIAGRAM
34
7.8 – SIXTH FLOOR
7.8.1 – FLOOR PLAN
In this floor there are 9 guest rooms, a purchasing department, Engineering
department and stores are available.
7.8.2 – NETWORK PLAN
For each guest room there will be a network port that will allow the guest to access
internet through the network and each guest room will be having a telephone to
communicate with the reception or name a call to an outside telephone.
There will be 6 network computers to the purchasing department to handle their file
data and access to the internet. And also there will be 2 telephone connected to this
department to call to other departments, reception or to call an outside telephone.
And there will be 4 network computers to the Stores to handle their file data and
access to the internet. And also there will be 2 telephone connected to this
department to call to other departments, reception or to call an outside telephone.
And also there will be 2 network computers to the Engineering department to handle
their file data and access to the internet. And also there will be 2 telephone connected
to this department to call to other departments, reception or to call an outside
telephone.
And will be a wireless access point also in this floor. This wireless access point is in
the center of the floor to get the whole floor covered from the wireless network.
From this guests or the staffs can access internet from any device that can access
internet wirelessly. In the lobby area there is no network computer available for the
guests or staffs. So only way they can browse internet is through wireless access
point.
For this floor we have put a 48 port layer 2 switches. In this we have divided this in
to 3 VLAN.
35
1st VLAN is to the guest rooms Network ports and wireless access point.
2nd VLAN is to the purchasing department, stores and Engineering department
Network computers.
3rd VLAN is to the guest room, purchasing department, stores and Engineering
department telephones.
We divide guest rooms and wireless access point VLAN from department, stores and
Engineering department VLAN because to keep the department files and data
secured. And no one cannot access to the department network.
36
SIXTH FLOOR DIAGRAM
Figure 9 - SIXTH FLOOR NETWORK DIAGRAM
37
7.9 – SEVENTH FLOOR
7.9.1 – FLOOR PLAN
In this floor there are 30 guest rooms are available.
7.9.2 – NETWORK PLAN
For each guest room there will be a network port that will allow the guest to access
internet through the network and each guest room will be having a telephone to
communicate with the reception or name a call to an outside telephone.
There will be a wireless access point also in this floor. This wireless access point is
in the center of the floor to get the whole floor covered from the wireless network.
From this guests or the staffs can access internet from any device that can access
internet wirelessly.
For this floor we have put two 48 port layer 2 switches.
The 1st layer 2 switch is for the guest rooms Network ports and wireless access point.
The 2nd layer 2 switch is for the VoIP Telephone.
We use 2 switches here because there are 30 computer network ports and 30
telephones so we cannot VLAN one switch in to two. Because our layer 2 switch
have only 48 ports. So we need 2 layer 2 switches. One is for the guest rooms and
wireless access point and the other one is for the VoIP telephones.
38
SEVENTH FLOOR DIAGRAM
Figure 10 - SEVENTH FLOOR NETWORK DIAGRAM
39
8.0 – BACKUP OPTIONS
In a network, backup options are vital since during a network failure or during an
unforeseen event the data is destroyed, the backups help in bringing the network
back to the previous situation at the time the last backup was taken.
In our network, there are two different backup options which are
• Online backup
• Backup server
8.1 – ONLINE BACKUP
An online backup is where the data is backed up into an online location. And in the
event of a disaster, can be easily retrieved by the system administrator and used to
revive the network.
Online backups are safe and reliable since they are hosted at an unknown location
and offsite so any unauthorized personal intending to destroy the data in the network
will find it hard to find the backups to destroy them.
Another reason why online backups are being used is because it’s less work for the
staff of the hotel. The staff would not need to constantly keep monitoring the backup
process as it will be automatically done and be done all the time. Also the backups
will be encrypted so that unless the decryption code is known, the backups cannot be
accessed. Also the system administrator or the person who has the privileges to
access the backups can access it from anywhere in the world with an internet
connection if they need to.
8.2 – BACKUP SERVER
The backup server is used for onsite backup purposes. The backup server will
primarily backup all the data on the servers in the hotel on an hourly basis. Rules
have been set in the server so as to delete backup files that are more than a few
40
numbers of days old so that the latest backups are available and old backups are
deleted as they are obsolete.
8.3 – NETWORK HARDWARE FAILURE
In the event of a hardware failure in the network such as a switch or a router or
cables, we have suggested that backup devices are kept on standby in the store room
of the hotel so they can be used in the event of a need. It is recommended that 2
Layer 2 switches, 2 wireless routers, few meters of cables of the types used be kept
and be used during an emergency situation while the faulty device can be repaired
and or replaced. This way it is ensured that the network is alive all the time. Also
network monitoring software installed in the system administrators computers will
indicated as soon as a network device fails so that they can be replaced as soon as
possible.
41
9.0 – TOPOLOGIES
9.1 – TREE TOPOLOGY
The network for Seashell-Reef has been laid using two distinct topologies. The first
topology is a tree topology. This topology is a collection of both bus and star
topologies. In a tree topology there is a main backbone cable which acts as the trunk
of the tree and from this smaller networks go out to form the branches of the this tree
topology. A drawback however with the tree topology is that the central backbone
cable fails the entire network will fail along with it. Tree topology is illustrated
further in the diagram given bellow.
We have used the Tree topology to lay the switches going from the main Backbone
switch to the separate switches in each floor. The main line runs form the ground
floor all the way up to the top floor and in each floor a line is taped from the main
line and then taken to the separate smaller sub networks which have been laid in the
second topology that we have used which is Star topology.
The telephone networks are also placed in the same topological order as the
computer networks. There is a main line that goes to all the floors and it is from this
main line that all the other branches are taken.
Figure 11 - Tree Topology
42
43
9.2 – STAR TOPOLOGY
The way in which this topology is laid is that where all the computers are connected
to one central hub. This method provides great advantages such that if a fault occurs
in one area it is easy to identify it and repair the damaged area without disrupting the
flow of information to the other networks. A disadvantage however is that if the
central hub device fails then the entire network in that branch will fail. The star
topology is explained further in the illustration given bellow.
Figure 12 - STAR TOPOLOGY
Where the star topology is found in our network is where in each floor the network
cables are drawn out from the central switch to the network ports. This is how the
star topology has been implemented. This topology is executed in each of the floors
with guest bed rooms and also in the VIP centre and the other administrative
departments.
In each floor the telephone lines also taken in a star topological manner. All the
telephone lines are connected to one central switch and get distributed out over the
floor from that point. (University of South Florida, n.d.)
44
10.0 – FEASIBILITY STUDY
10.1 - TECHNICAL FEASIBILITY
Seashell Reef is a new hotel that is being built up and therefore does not already
contain the required hardware to implement a communication network. Therefore the
network will have to be laid from the beginning.
The technical expertise needed for laying the network will be provided by our
company. However after the network has been laid and the hotel is functioning on a
daily basis, Seashell Reef will require a small team of trained professionals to
maintain and operate the network system. This team can be provided by our
company or can be hired from outside and will work under the management at
Seashell – Reef.
The technology required for this network is readily available in the open market and
can be purchased at any moment. The hardware that this network requires will be
bought from D-Link Corporation.
45
10.2 - OPERATIONAL FEASIBILITY
The new network system that we have developed uses high quality and high end
hardware devices that will allow for a faster and more efficient system. The cabling
that will be user is Shielded Twisted Pair (STP) cables. This along with the high
quality hardware devices will provide for a faster network system.
This system will cost a fairly high amount as we shall be using high end products
and will be focusing on quality rather than the price of the product. However the
products will not be over priced and will not waste any of Seashell–Reef’s monetary
resources.
In this network system to ensure the highest security for the company we have
ensured that the administrative network will not be visible to the guests and they
have been kept separate using a virtual Local Area Network (VLAN). This works in
the manner that the ports have been internally configured in a way that guests ports
cannot see the administrative ports or vice versa, in effect virtually breaking the
switch into 2 separate switches. This will allow Seashell-Reef to maintain a very
high level of security.
This network also has been laid using several switches and a in every floor several
ports in each switch have been left free to allow for the network to grow and expand.
This way new switch can be added in and the floor will be able to accommodate
more network cables.
46
10.3 – SCHEDULE FEASIBILITY
The General Manager at Seashell-Reef has given our company a period or one year
to complete the laying of the network for the hotel. This time period is more than
adequate to complete the task that has been presented to us. Our team feels confident
that we can accomplish the task at hand well within the given time duration.
10.4 – ECONOMIC FEASIBILITY
For the purpose of laying the network for Seashell-Reef we have finalised that all
required hardware products will be purchased from D-Link Corporation. D-Link is
and internationally recognised company for its high quality products and services.
This makes their products high priced but this is due to their products quality and
durability.
A list of some of the products that we will be obtaining is given bellow. The prices
have been given in US Dollars and have been converted to Sri Lankan Rupees at a
rate of 1$ = 110LKR.
Product PriceThe DGS-3650 48-port Managed Layer 3 switch LKR 342,973/=DES-3552 xStack 48-port Managed Layer 2 switch LKR 109,927/=DGS-3426P 24-port Managed Layer 2 switch LKR 102,232/=DIR-330 WIRELESS G VPN ROUTER, 4-PORT 10/100 SWITCH
LKR 12,091/=
The above are the unit prices for several vital products that we would be using in the
network for Seashell-Reef. We would be acquiring several of these above mentioned
products along with more products also from d-Link Corporation.
(NewEgg, n.d.)
(D-Link, n.d.)
(D-Link, n.d.)
(D-Link, n.d.)
47
11.0 – SECURITY
One of the main objectives while creating this network is the security. It was
requested by the clients that the network should be secured so that their private data
is not compromised and any unauthorized access is not allowed into the network.
With these aspects in mind we have implemented the following security strategies in the network to make the network safe and secure.
• Firewall• Proxy Server• Virtual LAN• Password protected Wi-Fi• Antivirus Server
11.1 – FIREWALL
A system designed to prevent unauthorized access to or from a private network.
Firewalls can be implemented in both hardware and software, or a combination of
both. Firewalls are frequently used to prevent unauthorized Internet users from
accessing private networks connected to the Internet, especially intranets. All
messages entering or leaving the intranet pass through the firewall, which examines
each message and blocks those that do not meet the specified security criteria.
(Webopedia, n.d.)
In our network, we have implemented one hardware based firewall. The firewall is
placed between the Load Balancer and the Router so that all incoming traffic from
any one of the 3 ADSL lines are first filtered from unauthorized access before being
allowed to the Router to be allowed into the private network of the hotel.
11.2 – PROXY SERVER
A proxy server is being installed in our network so that the outbound traffic is
filtered before it leaves the private network of the hotel. A hardware based proxy
server is installed in the network whereas all outbound traffic is first routed to the
proxy server and then if permitted will be allowed to leave the network.
48
Description of the proxy server is given in the servers section.
11.3 – VIRTUAL LAN
A network of computers that behave as if they are connected to the same wire even
though they may actually be physically located on different segments of a LAN.
VLANs are configured through software rather than hardware, which make them
extremely flexible. One of the biggest advantages of VLANs is that when a computer
is physically moved to another location, it can stay on the same VLAN without any
hardware reconfiguration. (Webopedia, n.d.)
In our network, we have extensively implemented VLAN’s so as to reduce the cost
involved in having additional hardware. For this purpose, all the switches that we
have used throughout the network are Managed Switches so that the ports can be
Managed and broken into separate sub networks for VLAN’s to be created.
Advantage of doing this is that one network cannot access the other network
although they are in the same switch which makes it easier to separate the staff and
the guest networks.
11.4 – PASSWORD PROTECTED WI-FI
The hotel consists of 8 different Wireless network access points covering the whole
building. Since wireless networks without passwords can be accessed by any one, we
have decided to protect the networks using passwords. Any guest connecting to the
wireless network of the hotel will have to enter a network key or password to
connect to the network. It is also recommended that the password be changed by the
system administrators every certain number of days so as to keep the network
protected.
11.5 – ANTIVIRUS SERVER
The antivirus server is installed for two purposes. One is to provide antivirus options
to all the staff used computers in the network. The other is to protect the network
from any virus’s spreading by monitoring the network and eliminating such viruses
so that they don’t affect the network.
A detailed description of the Antivirus Server is given in the Servers section.
49
50
12.0 – LIMITATIONS
Although provisions have been made for further upgrades in the future,
extensive upgrades will require considerable investment as new equipment
will have to be obtained.
Access to the network is available on two levels only. If more user access
levels need to be added, the network will have to be reconfigured as a whole.
The staff and guest network are not physically separated in certain instances
thereby posing a small security threat. If a very knowledgeable hacker gets
into the network, he might be able to access the staff network from the guest
network.
51
13.0 – CONCLUSION
The task that was presented to us was to create a communication network for
Seashell Colombo’s newest hotel Seashell-Reef. For this network the management of
Seashell Colombo have required that the system be of the highest standards and have
to be able to provide efficiency, security, speed and reliability.
To ensure this our team has conducted extensive research into the products that are
available in the market and have selected the most suitable of these products that
comply with the requirements that have been specified by the client.
Products have all been bought from D-Link Corporation to ensure that the products
that are used in the network are fast, reliable and durable. For this we have not
compromised on cost when it came to purchasing of the best quality products.
Also the entire team performed professionally and contributed their fullest efforts
into ensuring that the system was developed to the required standards.
52
BIBLIOGRAPHY
AllInterview.com, n.d. Networking All Other. [Online] Available at: http://www.allinterview.com/showanswers/60080.html [Accessed 21 Aug 2011].
D-Link, n.d. DES-3228PA. [Online] Available at: http://www.dlink.com/products/?pid=644 [Accessed 21 Aug 2011].
D-Link, n.d. DES-3552. [Online] Available at: http://www.dlink.com/products/?pid=800 [Accessed 21 Aug 2011].
D-Link, n.d. DIR-330. [Online] Available at: http://www.dlink.com/products/?pid=564 [Accessed 21 Aug 2011].
Mitchell, B., n.d. access point, wireless. [Online] Available at: http://compnetworking.about.com/cs/wireless/g/bldef_ap.htm [Accessed 21 Aug 2011].
Mitchell, B., n.d. What Is a DNS Server? [Online] Available at: http://compnetworking.about.com/od/dns_domainnamesystem/f/dns_servers.htm [Accessed 21 Aug 2011].
NewEgg, n.d. D-Link DGS-3650. [Online] Available at: http://www.newegg.com/product/product.aspx?Item=N82E16833127344&CMP=AFC-C8Junction&nm_mc=AFC-C8Junction&cm_mmc=AFC-C8Junction-_-na-_-na-_-na&AID=10440897&PID=1796839&SID=10204226 [Accessed 21 Aug 2011].
PC-Help, n.d. What is a firewall? [Online] Available at: http://www.pc-help.org/www.nwinternet.com/pchelp/security/firewalls.htm#proxy [Accessed 21 Aug 2011].
SearchNetworking, n.d. file server. [Online] Available at: http://searchnetworking.techtarget.com/definition/file-server [Accessed 21 Aug 2011].
Tuning 2.0, n.d. ADSL Technology for Faster Internet Speeds. [Online] Available at: http://www.tuning.co.in/adsl-technology-for-faster-internet-speeds/ [Accessed 21 Aug 2011].
University Information Technology Services, n.d. Indian University - University Information Technology Services. [Online] Available at: http://kb.iu.edu/data/adov.html [Accessed 21 Aug 2011].
University of South Florida, n.d. What is a Topology? [Online] Available at: http://fcit.usf.edu/network/chap5/chap5.htm [Accessed 21 Aug 2001].
Webopedia, n.d. 802.11. [Online] Available at: http://www.webopedia.com/TERM/8/802_11.html [Accessed 21 Aug 2011].
53
Webopedia, n.d. ADSL. [Online] Available at: http://www.webopedia.com/TERM/A/ADSL.html [Accessed 21 Aug 2011].
Webopedia, n.d. database server. [Online] Available at: http://www.webopedia.com/TERM/D/database_server.html [Accessed 21 Aug 2011].
Webopedia, n.d. firewall. [Online] Available at: http://www.webopedia.com/TERM/F/firewall.html [Accessed 21 Aug 2011].
Webopedia, n.d. firewall. [Online] Available at: http://www.webopedia.com/TERM/F/firewall.html [Accessed 21 Aug 2011].
Webopedia, n.d. proxy server. [Online] Available at: http://www.webopedia.com/TERM/P/proxy_server.html [Accessed 21 Aug 2011].
Webopedia, n.d. VLAN. [Online] Available at: http://www.webopedia.com/TERM/V/VLAN.html [Accessed 21 Aug 2011].
WhatIsMyIPAddress, n.d. What is IPv6? [Online] Available at: http://whatismyipaddress.com/sip [Accessed 21 Aug 2011].
54
MEETING MINUTES
1st MEETING
Meeting/Project Name: Meeting 1Date of Meeting: 05th July 2011 Time: 03.30 pmMinutes Prepared By: Deshan Ilangakoon Location: APIIT Cafeteria1. Meeting ObjectiveTo identify the requirement that has been specified by the client and assign initial work2. Attendance at Meeting
Present AbsentAhamed Nishadh (CB004081)Deshan Ilangakoon (CB004041)Dilshan Zuhdi (CB004150)
3. Agenda and Notes, Decisions, IssuesTopic Owner Time
Identify the problem that was presented to us and try to find suitable solution for prevailing problem.
Ahamed NishadhDeshan IlangakoonDilshan Zuhdi
03.30pm
Handling the meeting minutes and the Gantt chart
Deshan Ilangakoon 04.00pm
4. Action ItemsAction Owner Due Date
Create Gantt chart Deshan Ilangakoon 07/07/2011
Initial researchAhamed NishadhDeshan IlangakoonDilshan Zuhdi
10/70/2011
5. Next Meeting (if applicable)Date: 11/07/2011 Time: 03.30pm Location: APIIT CafeteriaObjective: Planning requirement specification
…………………………………
.
Group Leader
………………………………….
Lecturer
55
2nd MEETING
Meeting/Project Name: Meeting 2Date of Meeting: 11th of July 2011 Time: 03.30 pmMinutes Prepared By: Deshan Ilangakoon Location: APIIT Cafeteria1. Meeting ObjectiveAllocate task of requirement gathering2. Attendance at Meeting
Present AbsentAhamed Nishadh (CB004081)Deshan Ilangakoon (CB004041)Dilshan Zuhdi (CB004150)
3. Agenda and Notes, Decisions, IssuesTopic Owner Time
All group members were assigned the task of gathering information for the planned solution
Ahamed NishadhDeshan IlangakoonDilshan Zuhdi
03.30 pm
4. Action ItemsAction Owner Due Date
Find information regarding the requirements for the network to be designed.
Ahamed NishadhDeshan IlangakoonDilshan Zuhdi
15/07/2011
5. Next Meeting (if applicable)Date: 18/07/2011 Time: 05.00pm Location: APIIT CafeteriaObjective: Start Research
…………………………………
.
Group Leader
………………………………….
Lecturer
56
3rd MEETING
Meeting/Project Name: Meeting 3Date of Meeting: 18th July 2011 Time: 05.00 pmMinutes Prepared By: Deshan Ilangakoon Location: APIIT Cafeteria1. Meeting ObjectiveStart work on research2. Attendance at Meeting
Present AbsentAhamed Nishadh (CB004081)Deshan Ilangakoon (CB004041)Dilshan Zuhdi (CB004150)
3. Agenda and Notes, Decisions, IssuesTopic Owner Time
Each member was to carry out research on a specific hardware that would be used in the network that was to be laid.
Ahamed NishadhDeshan IlangakoonDilshan Zuhdi
05.00 pm
Check on work allocated during previous meeting
Ahamed Nishadh 05.15 pm
4. Action ItemsAction Owner Due Date
Hardware research Ahamed NishadhDeshan IlangakoonDilshan Zuhdi
15/07/2011
5. Next Meeting (if applicable)Date: 26/07/2011 Time: 03.30 pm Location: APIIT CafeteriaObjective: Network panning
…………………………………
.
Group Leader
………………………………….
Lecturer
57
4th MEETING
Meeting/Project Name: Meeting 4Date of Meeting: 26th July 2011 Time: 03.30 pmMinutes Prepared By: Deshan Ilangakoon Location: APIIT Cafeteria1. Meeting ObjectiveStart work on network plan2. Attendance at Meeting
Present AbsentAhamed Nishadh (CB004081)Deshan Ilangakoon (CB004041)Dilshan Zuhdi (CB004150)
3. Agenda and Notes, Decisions, IssuesTopic Owner Time
Designing floor plan and network diagram for company.
Ahamed NishadhDeshan IlangakoonDilshan Zuhdi
03.30 pm
Check on work allocated during previous meeting.
Ahamed Nishadh 03.45 pm
4. Action ItemsAction Owner Due Date
Develop the floor plan and network diagram. Ahamed NishadhDeshan IlangakoonDilshan Zuhdi
08/08/2011
5. Next Meeting (if applicable)Date: 08/08/2011 Time: 03.30 pm Location: APIIT CafeteriaObjective: Start on documentation
…………………………………
.
Group Leader
………………………………….
Lecturer
58
5th MEETING
Meeting/Project Name: Meeting 5Date of Meeting: 08th August 2011 Time: 03.30 pmMinutes Prepared By: Deshan Ilangakoon Location: APIIT Cafeteria1. Meeting ObjectiveStart documentation2. Attendance at Meeting
Present AbsentAhamed Nishadh (CB004081)Deshan Ilangakoon (CB004041)Dilshan Zuhdi (CB004150)
3. Agenda and Notes, Decisions, IssuesTopic Owner Time
Start making the documentation for the final project document.
Ahamed NishadhDeshan IlangakoonDilshan Zuhdi
03.30 pm
Check on work allocated during previous meeting.
Ahamed Nishadh 03.45 pm
4. Action ItemsAction Owner Due Date
Documentation Ahamed NishadhDeshan IlangakoonDilshan Zuhdi
17/08/2011
5. Next Meeting (if applicable)Date: 18/08/2011 Time: 05.00 pm Location: APIIT CafeteriaObjective: Compiling document
…………………………………
.
Group Leader
………………………………….
Lecturer
59
6th MEETING
Meeting/Project Name: Meeting 6Date of Meeting: 18th August 2011 Time: 05.00 pmMinutes Prepared By: Deshan Ilangakoon Location: APIIT Cafeteria1. Meeting ObjectiveCompiling the document2. Attendance at Meeting
Present AbsentAhamed Nishadh (CB004081)Deshan Ilangakoon (CB004041)Dilshan Zuhdi (CB004150)
3. Agenda and Notes, Decisions, IssuesTopic Owner Time
All documentation done so far was handed over so that it could be compiled and added into a single document with the proper formatting.
Ahamed Nishadh05.00 pm
Check on work allocated during previous meeting.
Ahamed Nishadh 05.15 pm
4. Action ItemsAction Owner Due Date
Compiling document Ahamed Nishadh 21/08/2011
5. Next Meeting (if applicable)Date: 21/08/2011 Time: 10.00 am Location: Ahamed
Nishadh’s Residence
Objective: Close of project meeting
…………………………………
.
Group Leader
…………………………………
.
Lecturer
60
7TH MEETING
Meeting/Project Name: Meeting 6Date of Meeting: 21st August 2011 Time: 10.00 amMinutes Prepared By: Deshan Ilangakoon Location: Ahamed Nishadh’s
Residence1. Meeting ObjectiveClose of project meeting2. Attendance at Meeting
Present AbsentAhamed Nishadh (CB004081)Deshan Ilangakoon (CB004041)Dilshan Zuhdi (CB004150)
3. Agenda and Notes, Decisions, IssuesTopic Owner Time
Thanking all members for the hard work done and for completing the required work on time.
Ahamed Nishadh10.00
4. Action ItemsAction Owner Due Date
5. Next Meeting (if applicable)Date: Time: Location:Objective:
…………………………………
.
Group Leader
…………………………………
.
Lecturer
61