Documente Academic
Documente Profesional
Documente Cultură
Page 1
CERTIFICATE
This is to certify that Mr. Neenu John of 6th semester pursuing B.Engg. (Honors) Degree from A.P.I.I.T SD INDIA has successfully completed the Individual project in Hardware, Software System and Networks module under the guidance of Lecturer Mr. Arun Chaudhary within the stipulated time duration.
Page 2
Table of contents
1.Abstract5 2.Introduction..6
2.1Preface..6 2.2 Objectives..6
Page 4
1. Abstract
Major part of the world is in the hands of technology .Like the telephone and the television, the network and data communication has performs an important role in restructuring our daily lives While folks of an older generation remember a much different age, most people can hardly remember a time where the network and data communication was not available. The Internet is not just a network; it is a whole community in and out of itself. It is a revolution that changed our society, our lives, and our entire world. What other thing can we invariably say has completely connected everyone in the world, one that is free of social and cultural differences? The Network acts as a common ground, a community of information and
recreation, for the world to walk upon. As of now, it is even easier for some to meet friends online than in real life - with sites like Myspace and Facebook dominating most of the social scene. These are best examples of social network sites. The main aim of this assignment is to suggest a effective and efficient network for ICT
Resources Malaysia Public Limited Company, which is the one of the supplier of business equipment and office supplies of its kind in South East Asia. This network proposal includes the details about the network that is suitable for the ICT and the advantages and disadvantages of it. It also includes the network topologies, transmission media, protocols, network devices, architecture technologies, possible problems and the future enhancements in the network of ICT.
Page 5
2. Introduction
2.1 Preface
ICT Resources Malaysia Public Limited Company has hired you as a network consultant. This company is the only supplier of business equipment and office supplies of its kind in South East Asia. The lack of competition has caused the owners not to make major investments into the business. A nationally recognized competitor recently opened for business with plans to put ICT Resources out of business. In response to this, the owners of ICT Resources have decided to reinvest substantial sum of money in the company.
2.2 Objectives
To provide an efficient and effective network for ICT Network. Identify the advantage and disadvantage of Networks. Understanding the type transmission media Understanding different type of topology Indentify and provide suitable network topology and transmission medium for ICT Resources.
Page 6
ICT Resources locally owns a 2 storey building and currently has already grown to a level where they now have resources of 35 staff and this figure is still growing. They have developed and spread their business to 3 strategic locations throughout South East Asia with more upcoming offices in other locations planned for 2012. These new offices will incorporate the retail concept coupled with local sales offices. ICT Resources decided to set up office with approximately 30 to 35 employees. The goal is to determine the type of network topology they will need within the office. Consider the types of computer and number of printers, audio devices, microphones, LCD projectors, and multifunction peripherals that are needed. Before they invest money in the local area network, the owner wants to know more about networks and internet connection.
3.1 Assumptions
Now there is no internet facility for all the employees in ICT expect the location head In the main office there are 3 departments. Production department, accounts department and
Administrative department Presently there is no local network inside the office. The number of employees in each department is as, 5 in accounts,5 in administrator, 19 in and 2 as network administrators.
Each employee has each computer and each computer have sound device and micro phone.
Each department consist of one printer, production department consist of LCD projectors and one security cameras.
Page 7
4. Network
Network is a collection of computers and devices that are interconnected with each other .through communication links .Link is a communication pathway which helps to transfer data from one device to another device .A computer network can interact with other network by two ways wired or wirelessly .For efficient communication , two device must be connected with each other. There are two possible type of connection are available one is point to to point another one is multipoint. Point to point : A point- to point connection provides a dedicated link between two devices .It is used to establish the direct connection. Multipoint : A multipoint connection in which more than two specific device shares a single link.
Page 8
4.3.1 LAN (Local Area Network) Local area networks are designed to allow resources to be shared between personal computers or workstations. The resources to be shared can include hardware, software or data .The best example of LAN is found in business organizations. One of the computers may be given a large capacity disc which acts as a server to clients. Softwares are installed into central server and is used by the whole network group .The most common LAN topologies are bus ,ring ,star
Hardware ,software system and network Page 9
4.4.1 Peer-to-peer Network Peer-to peer network is a type of network in which each workstation has equivalent capabilities and responsibilities. Peer-to-peer networks are generally simpler, but they usually do not offer the same performance under heavy loads. In peer to peer network there is no dedicate server . Thus each computer in such a network is part server and part client
Figure .1 Hardware ,software system and network Page 10
4.4.2 Client server Network In client-server architecture, a business's computer network will have a server computer, which functions as the "back bone of the organization, and a group of client computers, which are commonly called workstations. By using the server we can improve efficiency of client server architecture .Most of the cases the server part of client server having large capacity of storage and also provides high functionality .Client part in the client server
Figure 2.
responsibilities. Architecture Advantage Centralized Resources Centralized storage of data. Easier to find and backup the data and the files Efficient Client Server Multiple users can use hardware and software Security Central Server Machine can secure all other workstations. Scalability Easy to upgrade resources Peer to -Peer Reduced cost (the costs involved Only suitable for small no Disadvantage If the server goes down, it takes part or the whole
network with it. It is more expensive to install. Needs to be maintained by staff with high IT skills.
Page 11
straightforward cabling
Network Topology
Mesh
Star
Bus
Figure 3
Ring
Tree
4.5.1 Mesh topology In mesh topology every device has a dedicated point to point connection with every other device. The term dedicated means that link carries traffic only between the two devices it connects. In mesh topology needs n(n-1)/2 duplex mode links ,n is the no of nodes.
Figure 4.
Page 12
Advantage Use of large no of links reduce network traffic A mesh topology is robust in nature .if one link becomes unusable it does not disable the entire system. It offers privacy and security
Disadvantage Use of large number of cables makes the network very much expensive Interconnection of device leads to difficulty in installation and reconfiguration of devices Hardware required to connect each link can make it more expensive to implement
Table 2 4.5.2 Star topology In a star topology each device has a dedicated point to point connection with only device usually known as a hub. In a star topology devices are not directly linked to one another. Unlike mesh topology it does not allow direct traffic between the devices. The controller act as an exchange between the two devices.
Figure 5.
Advantage Less expensive than mesh topology because it requires less number of cables. Easy to install and reconfigure it, each device needs only one link and one input-output port. Robust it nature, failure of one system doesnt affect the whole network
disadvantage Dependency of all topology on a single point called hub. If the hub goes down then the whole system will be dead. The cost of the hub make the network more expensive
Table 3
Page 13
Figure 6
Figure 4.
Advantage A Bus topology is easier to install. Less expensive than star and mesh because less cables are required, Less redundancy of cables
Disadvantage Difficulty in reconnection and fault isolation Signal reflection at the taps can count degradation and quality breaks in the bus cable stops all transmission.
Table 4
4.5.4 Ring Topology In a ring topology each device has a dedicated point to point link with one two device on either side of each. Signal is passed along the ring in one direction from one device to another device until it reaches a destination. Each device in a ring topology uses a repeater.
A ring is relatively easy to install and It uses unidirectional traffic. A break in the reconfigure it. ring can stop all transmissions. In a ring topology each device linked only its intermediate neighbors. For addition and removal we need to change only two connections. Table 5
4.5.5Tree Topology A tree is a variation of star topology. Nodes in a tree are linked to standard controller known as hub which directly controls the traffic of the network. However not every device are directly connected to the central hub. Majority of the devices are connected to the secondary hub.
Advantage It provides point to point connectivity with the primary and the secondary hub. It provides an easy exchange Table 6
Disadvantage
Figure 8.
If the back bone line breaks the entire segment will go down.
Page 15
Transmission Media
Guided (Wired)
Unguided (wireless)
Coaxial Cable
Free Space
Figure 9.
4.6.1 Twisted Pair Cable Twisted pair cable consist two conductors having an insulation coating .One of the wire used to carry signal to the receiver, and the other is used only as a ground reference. The receiver uses the difference between the two. There is a chance to inference and cross talk it results in the creation of unwanted signal. Effect of the unwanted signals change according to the arrangement of wires like wires are parallel .If both wires situated at different location then the noise or crosstalk will be more, this results in a difference at the receiver. By twisting the pairs, we can maintain .Twisting makes it possible that both wires are equally affected by external influences .Two types of twisted pair cables are available. Unshielded twisted pair and shielded twisted pair cables.
4.6.2 Coaxial Cable Un like twisted pair cables Coaxial cable carries signal having higher frequency .Coaxial cable has a central core conductor of solid or standard wire enclosed in a insulating sheath which is ,in turn, encased in an outer conductor of metal foil braid or a combination of the two. The outer
Figure 11.
metallic wrapping serves both as a shield against noise and as the second conductor , which completes the circuit. Coaxial cables are widely used in analog telephone networks.
4.6.3 Fiber Optic cable A fiber optic cables transmits signal in the form of light .These cables are made by glass or plastics. Signal in the fiber optics transmits on the basis of total internal reflection. Fiber optics use reflection to guide light through a channel. A glass or a plastic core is surrounded by a cladding of less dense glass or
Figure 12.
must be such that a beam of light moving through the core is reflected off the cladding instead of being refracted to it. Fiber optics is often found in back bone networks.
Page 17
Characteristics
Fiber Optics
STP: Good resistance UTP: Very easy; often preinstalled STP: Moderately easy
Difficult to install
UTP:
Most
STP: Less flexible than coaxial cable UTP Electronic components support UTP: Same as telephone Supports voice, data, are less wire; often preinstalled in and video
Special features
expensive than twisted- buildings pair cable STP: Supports rates higher than
4-100
Page 18
Page 19
Figure 13.
Page 20
ISP
Figure 14.
Page 21
A star topology is less expensive than a mesh topology. In a star each device needs only one link and one I/O port to connect it to any other number of others. This factor also makes it easy to install and reconfigure .Far less cabling needs to be housed , and additions, moves and deletions involve only one connection between that device and hub.
Hub
Page 22
Flexibility : Flexibility is one of the major advantages offered by Cat5 cables. The technology it uses is so simple that it is possible for a nonprofessional person to install it and start using it. Cables can also be as long as you need Ease of Installation: A Cat5 cable is very user-friendly to install Ruggedness: Cat5e cables are not easy to break or snap. If they do break, it is easy to repair them. For connection to Internet service provider 10BaseF is recommended which is supported by Optical Fiber. Reasons for opting optical fiber for connection to ISP are.
No shock hazard Longer life expectancy than copper or coaxial cable High data rate and high band width Secure communications
Page 23
Hardware software systems and Network 5.6 Description for above scenario
LAN ICT resources consist of LAN and WAN network.ICT network office is a two storeybuilding according to the network diagram Ground floor have accounts section and administrative section. Administrative department contain five personal computers, one fax machine and one printer. Telephones are used for communicate with the clients and also communicate with the other department.fax machines are used for client communication .Printer is used to take the important documents .The whole network is connected by hub. Here hub acts as a connector. It connects the wires coming from different branches. Accounts department in the ground floor contains s personal computer one printer and one telephone connection. Telephone communication allows client communication. VLAN Configuration for First Floor A VLAN allows a network administrator to create groups of logically networked devices that act as if they are on their own independent network, even if they share a common infrastructure with other VLANs. The benefits of VLAN are Security, cost reduction, higher performance,
broadcast storm migration, IT staff efficiency and Simpler project or application management. Advantages
First Floor contains production department which contains 21 personal computer ,one video camera ,one printer , one projector , projector screen ,telephone. Server room is located in first floor. Routers are used to connecting networks together. A router runs on software that allows the device to move data from one network to another. Routers operate at the network layer.
Page 24
Figure 16.
Advantages
Cost saving: eliminating the need for expensive long-distance leased lines. VPN reduces longdistance telephone charge .It offers offloading of support cost
Flexibility and Reliability: VPN is improving the reliability of data services of company. Better Performance: Owing to the fact that more high capacity data service options can be used, the bandwidth and efficiency of the network generally increases after a VPN solution is installed.
Page 25
Improved Security: The use of encryption protocols and authentication helps secure the data that is t raveling over the VPN channel
Disadvantages of VPN
. VPNs require an in-depth understanding of public network security issues and proper deployment of precautions.
The availability and performance of an organization's wide-area VPN (over the Internet in particular) depends on factors largely outside of their control.
5.8 IP Addressing
An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address.There are five different class addresses class A (begin with 0xxx, or 1 to 126 decimal), class B(10xx, or 128 to 191 decimal),class c(10xx, or 128 to 191 decimal),class D(1110, or 224 to 239 decimal), Class E(1111, or 240 to 254 decimal). ICT will get a privet address form ISP and the all devices inside will use public IP address. The IP range, subnet mask, and network address for each network of ICT is as below. All network address is given below
Network Address Ground Floor Subnet Mask Starting IP Address Last IP Address First Floor Network Address Subnet Mask
Hardware ,software system and network
Number 1 3
provides Cisco HP
Dell
28700
28700
3 3 1
BSNL hp hp HP
1 4500 mts
Video camera
Ice mart
550
550 132100
Table 9
Page 27
Cables: Most of the network problems are caused by faulty cables. Breakage of cables leads to the shut down of the entire net work system.
Connectivity issues: This can be caused by a number of things, including configuration changes or the malfunction of connectivity devices, such as in the case of a switch, router or hub. The first thing to do, of course, is to check your physical connections. If something is disconnected, you'll need to reconnect and test it in order to make sure that the problem is resolved
Duplication of IP address: Each IP address in the network refers a specific computer. But sometimes two will receive the same one as the result of an error. When this happens
Software problems: Registry problems may also cause a networking issue, an error or invalid attack of the software installed in a network can dump the entire system.
Security Issues: unauthorized access leads to lose data. Virus and the malwares (corrupted program files) are common threat which we can find on the network.
8. Future Enhancements
ICT resources Malaysia is going to establish their 3 branches on south east asia. Employees and customers will also increase. Use one more server or mainframe to manage the entire network system.
Use secure modems, crypto cable routers for ensuring the security of the entire network system.
Implement new techniques and install new software to check security concerns like hacking and stealing of information.
Use of efficient firewall like packet filtering to protect the network Instead of using extended star topology. Use hybrid topologies. Use advance network cables for LAN and WAN
Page 28
Page 29
10.Gantt Chart
Page 30
11.References
protocols-necessary.html. Last accessed 1 april 2011 Protocols. Available: http://sawaal.ibibo.com/computers-andLast accessed 5 Apri
technology/what-function-tcp-ip-protocol-422668.html.
Page 31
4. Client
Server
Architecture.
Available:
Books Referred
1. Forouzan Behrouz (2007). Data Communication and Networking. 4th ed. New Delhi: Tata McGraw Hill,pp 139-189. 2. Cisco Network Academy (2006) Exploration One. 4th Ed. Cisco
Picture Reference 1. Diagram of Peer to Peer connection. Available: http://www.google.co.in/imgres?q=Peertopeer+Network&hl=en&sa=X&tbm=isch&prmd=ivns&tbnid=BqMT2po9CfSHs M:&imgrefurl=http://fcit.usf.edu/network/chap6/chap6.htm&ei=8TydTdaoIo3Uv QOTmvjIBg&zoom=1&iact=hc. Last accessed 4 th April 2011 2. Diagram of client server Architecture. Available: http://www.google.co.in/imgres?q=Peertopeer+Network&hl=en&sa=X&tbm=isch&prmd=ivns&tbnid=BqMT2po9CfSHs M:&imgrefurl=http://fcit.usf.edu/network/chap6/chap6.htm&ei=8TydTdaoIo3Uv QOTmvjIBg&zoom=1&iact=hc. Last accessed 4 th Aprill 2011 3. Diagram of Mesh topology. Available: http://www.google.co.in/imgres?imgurl=http://www.brainbell.com/tutorials/Netw orking/images/01fig06.gif&imgrefurl=http://www.brainbell.com/tutorials/Networ king/Mesh_Topology.html&h=249&w=350&sz=29&tbni. Last accessed 6 th april 2011. 4. Diagram of Star topology. Available: http://www.google.co.in/imgres?imgurl=http://fcit.usf.edu/network/chap5/pics/sta r.gif&imgrefurl=http://fcit.usf.edu/network/chap5/chap5.htm&h=287&w=333&sz
Page 32
Page 34