enterprise networking course work under ncc education

31

Upload: md-mahbub-alam

Post on 13-Apr-2017

36 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Enterprise networking course work under NCC Education
Page 2: Enterprise networking course work under NCC Education

Statement and Confirmation of Own Work

Programme/Qualification name:

Each NCC Education assessed assignment submitted by you must have this statement attached to the assignment as the cover page or it will not be accepted for marking. Please ensure that this statement is either firmly attached to the cover of the assignment or electronically inserted into the front of the assignment.

Student declaration

I have read and understood NCC Education’s Policy on Academic Dishonesty andPlagiarism.

I can confirm the following details:

Student ID/Registration number:

Name:

Centre Name:

Module Name:

Module Leader:

Number of words:

I confirm that this is my own work and that I have not plagiarized any part of it. I have also noted the assessment criteria and pass mark for assignments.

Due Date:

Student Signature:

Submitted Date:

Enterprise Networking June 2011 Final @NCC Education 2011

Page 3: Enterprise networking course work under NCC Education

Acknowledgment:

I am Md. Mahbub Alam is grateful to Daffodil Institute of IT (DIIT) for giving the chance to doing the

assignment in the field of Enterprise networking and it’s such a pleasure to me. I am also grateful &

like to express thanks to Mr. Sarwar Hossain Mollah Lecturer of Enterprise Networking of DIIT. His

continues support, concentration & encouragement help me to complete this assignment. Huge

unknown things are now know to me by doing this assignment. In class room we collect theoretical

knowledge about Enterprise Networking but practically I gather knowledge by doing this assignment.

It was a glorious memory by doing this assignment in my Life.

Enterprise Networking June 2011 Final @NCC Education 2011

Page 4: Enterprise networking course work under NCC Education

Introduction

This is an assignment of “FURTHER EDUCATION COLLEGE” Wireless Network Design and

development. The development procedure referenced by the institute named Daffodil institute of

IT. For this assignment, I need to the entire network that will help the authority to storing and

showing the information of organization and the access of internet. Thus I will create an

appropriate documentation that will help me to develop the network completely. The

documentation should include network equipment, cost of equipment and installation, Cost of

operating the system, Building layout, Maintain security for all users, user access level on the

entire network, implementation; the documentation also contains the limitation and future

planning and user manual of the proposed network system.

Enterprise Networking June 2011 Final @NCC Education 2011

Page 5: Enterprise networking course work under NCC Education

Task 1:

In this task I have to investigate which kind of wireless equipments are available in our country for large organizations based in a single building such as the college in the scenario. I also have to describe about:

The main equipment that will be install. The how much features availability. The cost of equipment and installation for the network. The cost of operating the system.

a) The main equipment that will be install:

I investigated thoroughly number of vender devices which will be required to design to establish our

collage wireless network. I have needed some devices which will be used to establish the collage

wireless network, those are describing under the below:

Wireless Network Adapter: Connect to wireless network by adding a D-Link Wireless N 150 Desktop Adapter to desktop computer. Once connected, It can share a high-speed Internet connection while also getting access to shared educational students transcripts, Documents, and Students documents with other computers on your network.ref-(i)

Figure: DWA-525 Wireless N 150 PCI Adapter

i http://www.dlink.com.au/products/?pid=821Enterprise Networking June 2011 Final @NCC Education 2011

Page 6: Enterprise networking course work under NCC Education

Wireless Access Point: A wireless access point is more like a hub for wireless networks. It does not implement a different IP address range or provide the other features of a wireless router. It simply relays network traffic to the wireless devices within its broadcast range.

Figure: The Wireless N Range Extender (DAP-1360)

Wireless Switch: The DGS-1224TP is housed in a new style 19” rack mount case with an easy-to-view front panel and diagnostic LEDs. User-friendly, web-based management is supported for easy configuration and flexibility for different network requirements.ref-(ii)

Figure: DGS-1224TP Web Smart 24-Port Gigabit PoE Switch with 4 Combo SFP Slots

Server as a Router: Here I choose four servers. There is a Print server, one mail server, Web server with proxy server and last one is working as a router with firewall.

ii http://www.dlink.com/products/?pid=717

? http://compnetworking.about.com/od/wirelesssecurity/tp/wifisecurity.htmEnterprise Networking June 2011 Final @NCC Education 2011

Page 7: Enterprise networking course work under NCC Education

Figure: HP server

b) The Available features and specifications:

Wireless Network Adapter

Features availability: ref-(i)

Compatible with Windows 7 32bit and 64bit Enhanced Wireless Reception and Performance Based on 802.11n Technology

Better Wireless Technology - up to 4X Faster than Standard 802.11g*

Connect a Desktop PC to a Wireless Network

Specifications ref-(i)

HIGH-SPEED WIRELESS NETWORKING

CONNECT SECURELY TO YOUR WIRELESS NETWORK

COMPATIBILITY ASSURANCE

EASY TO INSTALL & CONNECT

Access Point

Features availability: ref-(iii)

Create or Extend a Wireless Network in Your Home or Office

Easy to Install and Connect with Wi-Fi Protected Setup™

Secure Wireless Encryption Using WPA/WPA2 Security

Multiple modes: Access Point, Bridge with Access Point, Repeater, or Wireless Client

Specifications ref-(iv)

2 External Detachable Antennas

Internet Explorer® v7 or Later; Mozilla® Firefox® v3.0 or Later; or other Java-enabled

Browsers

Item (HxWxD): 5.9” x 4.5” x 1.4” (149.9mm x 114.3mm x 35.6mm)

Packaging (HxWxD): 10.9” x 2.7” x 8.3” (276.9mm x 68.6mm x 210.8mm)

1 Year Limited

Enterprise Networking June 2011 Final @NCC Education 2011

Page 8: Enterprise networking course work under NCC Education

Switch

Features availability: ref-(iii)

D-Link Green Technology 48Gbps Switching Capacity

8K MAC Address Table

True Plug & Play

Fiber Media Support Via SFPs

24 IEEE 802.3af Power over Ethernet Ports

Specifications ref-(iii)

24 10/100/1000BASE-T PoE Auto-negotiating, Auto MDI-MDI/X ports with 802.3 Flow Control

Up to 256 static MAC entries

Enable/disable auto-learning of MAC addresses

10,240 Bytes jumbo frame

Per device: Power/PWR Max/CPU/Fan Error Port LED, Mode Indicator: Link/Act Mode/PoE

Mode

Per 10/100/1000BASE-T port: Link/Act, 100/1000Mbps

Per SFP slot: Link/Act, 1000Mbps

Server

Features availability:

The DPR-1061 provides the necessary security by allowing the administrator to configure user

access right to the network printers and equipment.

It supports a wide range of network OS including:

Windows 95/98/ME/NT 4.0/2000/XP, Apple MacOS with AppleTalk, Linux, Solaris, SCO Unix,

IBM AIX and NetWare 5.x native NDS.

Enjoy the flexibility and compatibility in major network OS that this print server has to offer. ref-

SpecificationsEquipped with a powerful CPU, large memory, high speed USB ports and network data transfer, this server makes your operations fast. at the same time, giving this multi-port print server a similar performance to 3 separate single-port print servers at a fraction of the cost.

c) Installation and equipment cost:

Table of information:

Enterprise Networking June 2011 Final @NCC Education 2011

Page 9: Enterprise networking course work under NCC Education

Side Note:Total Cost= Quantity + Unit PriceGrand Total= Sub Total (Total Cost) + Sub Total (Installation Cost)

Enterprise Networking June 2011 Final @NCC Education 2011

Page 10: Enterprise networking course work under NCC Education

d) The cost of operating the system:

Maintenance Table:

If any equipment is further needed we will buy and add on those tables for our maintenance.

e) Recommendations:

This device is well known in our country.

Some renowned university uses those devices.

Those vendors are very friendly to their customers.

Their customer support is very nice.

Their very professional on their fields

They always fulfill user requirement.

24 hours professional expert are available on those vendor.

Hardware has warranty.

That hardwires are so much renewed on their fields.

Most of the multinational company now a day’s use those hardware equipments.

Enterprise Networking June 2011 Final @NCC Education 2011

Page 11: Enterprise networking course work under NCC Education

Task 2:

In this task, I have to describe about factor to reduce signal strength, Building layout and Implementation of wireless network of the collage.

a) Factor to reduce signal strength: Ref-(4)

I have concentrated our wireless deployment efforts on instructional spaces, such as classrooms and lecture halls, and on public spaces, such as the Campus Center and the Library. Because denser materials and construction limit the range of wireless network signals, I probably find wireless in some residence hall rooms and campus offices is too weak for consistent connection. In these locations, strongly have to use wired Ethernet connections.

Reflection:

Reflective device used to collect or project energy such as light, sound, or radio waves. Its shape is that of a circular parabolic, that is, the surface generated by a parabola revolving around its axis. The parabolic reflector transforms an incoming plane wave traveling along the axis into a spherical wave converging toward the focus. Conversely, a spherical wave generated by a point source placed in the focus is transformed into a plane wave propagating as a collimated beam along the axis.

Diffraction:

Some construction materials very rapidly attenuate wireless signal strength. Buildings, such as churches, which use lead in their roofing material, will very effectively block any signal. Any building which has a significant thickness of concrete or amount of metal used in its production will attenuate the signal. Concrete floors are often poured onto a metal pan which completely blocks most radio signals. Some solid foam insulation and some fiberglass insulation used in roofs or exterior walls have foil backing, which can reduce transmittance. Energy efficient windows and metal window screens are also very effective at blocking radio signals. Some materials have peaks in their absorption spectra which massively decrease signal strength.

Scattering:

Many electrical properties of networks of components (inductors, capacitors, resistors) may be expressed using S-parameters, such as gain, return loss, voltage standing wave ratio (VSWR), and reflection coefficient and amplifier stability. The term 'scattering' is more common to optical engineering than RF engineering, referring to the effect observed when a plane electromagnetic wave is incident on an obstruction or passes across dissimilar dielectric media. In the context of S-parameters, scattering refers to the way in which the traveling currents and voltages in a transmission line are affected when they meet a discontinuity caused by the insertion of a network into the transmission line. This is equivalent to the wave meeting impedance differing from the line's characteristic impedance.

Enterprise Networking June 2011 Final @NCC Education 2011

Page 12: Enterprise networking course work under NCC Education

b) Building Layout: Building layout is under the below:

Size

Principal room : (15 * 15) feet= 225 square feetPersonal secretary room : (10 * 15) feet= 150 square feetGarden : (200*200) feet = 40,000 square feetExamination hall : (100* 120) feet= 12,000 Square feetTeachers room : (50* 40) feet = 2000 square feet

Enterprise Networking June 2011 Final @NCC Education 2011

: (AP) Access Point

Building Contains

:

Each building has a 6 class room, one computer lab, seminar room, Teachers room, Student common room etc; building number one has a conference room and debating club room. Building two has Auditorium and Principal room with his/ her personal secretary room. Building three has a canteen, and building four has an examination hall room.

Size

Class room :(45* 45)feet= 2025

Square feet

Auditorium :(90* 90) feet= 8100

Square feet

Seminar :(50 * 50) feet = 2500

square feet

Conference :(50 * 50) feet = 2500

square feet

Canteen :(70 * 70) feet = 4900

square feetDebating

Club:

(60 * 60) feet = 3600 square feet

Page 13: Enterprise networking course work under NCC Education

Enterprise Networking June 2011 Final @NCC Education 2011

Page 14: Enterprise networking course work under NCC Education

C) Implementation:

Step- 1 Access point setup:I with some of my helper are move with laptop which space is perfect to setup access point. We are checking ached of each building that what the situation for network access. We move in every side of the campus for searching which space is not cobber on in the wireless network. Those implementation is helpful for the wireless networks on campus.

Step- 2 Access control:all private wireless transmitters MUST be configured to allow only known client hardware to use the network. This is best done by setting the list of client Media Access Control (MAC) addresses that are allowed to use the private wireless network. Implementers of private wireless transmitters will be held responsible for the actions of those who access the campus network from those devices.

Step-3 SSID (Service Set Identification):The SSID must not be set to "wns12345." SSID selection should be coordinated with administrators of neighboring private wireless networks.

Step-4 Configuration password:all transmitter configuration interfaces must be password protected with a non-default and hard-to-guess password.

Step-5 SNMP (Simple Network Management Protocol):SNMP strings should not be the default and should have access lists assigned where possible.

Step-6 Power settings:Private wireless transmitters should use the lowest possible power output that provides the needed coverage area.

Step-7 FCC regulations all private wireless transmitter configurations must be within FCC regulations for dissipated power, etc.

Enterprise Networking June 2011 Final @NCC Education 2011

Page 15: Enterprise networking course work under NCC Education

Task 3:

In this task, I have to make user permission or access level for all users. User can access resources which I make accessible for users. In this collage have four group of student and teachers, Students are have some permission and teachers have some permission which is not mach with student access permission.

a) The problem of having open access for all users:

Official document like Staff information, Mark sheet, Question papers, Journals and Thesis

papers can be hack or crack by hacker or cracker.

Student document like Individual Exam mark, Attendance & Class Performance can

damage by hacker or cracker.

Some expert people can change the configuration of the network. As a result network can

be down or network cans crash.

Network device can damage.

Virus can affect on this network. As a result whole network can damage in second.

b) The Needs of staff to have a secure area that is not available for student:

Although this network contains valuable recourses of information, so that teachers and all stuff information have to protect and I have to provide security on the network.

I have to configure firewall to protect secure Information of the network.

Manage the network for System Admin, Principal and Register who can access as an

administrator.

Student and stuff user name and password different.

Make restricted user by make binding.

Every username have to be unique on the network.

c) The Recommendation for how access to the network should be setup and run, including reasons for this recommendation:

In this task, have to describe about recommendation for how access to the network should be setup and run, including reason for this recommendation.

User name have to be unique can’t match with others users.

Passwords have to provide to maintain user authentication.

If student pass the annual exams and stop education on the collage, user accounts have to be

deleted.

If any staffs resign from this institute, user account has to be deleting.

If any user or staff pause using network more than 3 month those account disable

automatically.

Enterprise Networking June 2011 Final @NCC Education 2011

Page 16: Enterprise networking course work under NCC Education

d) Brief user guide explaining how a user may log on he network and what they can and can’t do while connect to the network:

In this task, have to create a brief user guide explaining how a user may log on to the network and what they can and can’t do while connect to the network.

User Guide: If user name or password are wrong in 3 times when login to the system, System lock this

account.

User can change username and password when logged in to the system.

User can manage user own file.

User can gain Internet access by login to the system.

User can view information which is provided by collage like class schedule, Exam schedule

etc.

System Screenshot:

Figure: Network System logon screen.

Enterprise Networking June 2011 Final @NCC Education 2011

Page 17: Enterprise networking course work under NCC Education

Figure: Network System logon screen with Error.

Figure: Network System logon screen with account block.

Enterprise Networking June 2011 Final @NCC Education 2011

Page 18: Enterprise networking course work under NCC Education

Figure: Network System logged in screen with successful message.

Task 4:

In this task, I have to make decision on the possible network topologies and media that could be used to create the computer network (LAN) within the collage.

a) Explanation how each topology operates:

Bus topology: A bus consists of a series of computer connected along a single cable

segment and this network is not suitable for this network. Ref-2

Ring topology: when each computer connects directly to the next computer in line, a circle of

cable forms to create a ring topology network. As a computer receives a signal, it either acts

on it or regenerates it and passes it along. Signals travel in only one direction around the

ring.Ref-2

Mesh topology: a mesh network topology is the most faults tolerant but also the most

expensive. Connecting each device in a network to every other device in the network creates

a mesh network topology. This configuration is very intricate. Ref-2

Star topology: a star topology, describe computers connected by cable segments to a central

hub. When a computer sends a signal, the hub receives transmits it down every others cable

segment to all others computers or others devices attach to the hub. Again, only the computer

that such signal addresses directly pay attention to or act upon that data. This topology got it’s Enterprise Networking June 2011 Final @NCC Education 2011

Page 19: Enterprise networking course work under NCC Education

start in the early days of mainframe compeering when all nodes attached to a central point: a

font end processor, itself attached to the mainframe. Ref-2

b) Description the advantage and disadvantages of Extended Star topology for the collage: Many factors deserve consideration when selecting a network topology. Some advantage and

disadvantage are described under the below:

Advantage Disadvantage

A bus network is simple and reliable. Heavy traffic slows the network down.

Its cabling is inexpensive, easy to work with,

and easy to extend

Any (broken or un-terminated) cable can bring the

network down.

Because all computer are arranged in a line, it

users cable very economically.

Problem can be difficult to isolate.

Table of advantage and disadvantage of the bus topology.

Advantage Disadvantage

All computers have equal access to the rest of

the network

A single computer failure can impact the network.

Even with many users, network performance is

even

Isolating problems is sometimes difficult.

Adding or removing computers disrupts network

operations.

Table of advantage and disadvantage of the ring topology.

Enterprise Networking June 2011 Final @NCC Education 2011

Page 20: Enterprise networking course work under NCC Education

Advantage Disadvantage

It is easy to add new computers or modify the

network.

If the central hub fails, the network fails.

Centralization enhances network monitoring

and management.

Requires more cable and results in a more intricate

installation.

A single computer failure does not affect the

rest of the network.

Table: Advantage and disadvantage of the extended star topology.

c) Advantage and disadvantage of each medium that could be used for the LAN:

Here I have to describe about advantage and disadvantage of each medium that could be used for the LAN. I used unshielded twisted-pair (UTP) CAT 6 cable on the collage network. CAT6 is to set a standard for the Gigabit Ethernet. The Category 6 cable, also known as Cat-6, is backward compatible with the Category 5/5 e and Category 3 cable standards. It can create a high speed computer network and operate at an optimal performance if other components in the network are compatible with gigabit speeds. Ref-3

Advantages

Speed performance of up to 250 MHZ.

It can produce double the bandwidth of the Cat 5 and Cat 5e.

Cat 6 cable has a similar structure to the Cat 5 and Cat 5e.

Port of the Cat 6 cable is the same as the Cat 5 and Cat 5e.

Peripheral devices like magnetic disk and printer can be shared by other computers.

It possible to use with a fast Ethernet network including Gigabit Ethernet and 10-Gigabit

Ethernet. Ref-3

Disadvantages

Cat 6 cable is much more expensive than the Cat 5e cable.

If one of the components is not gigabit rated, your network will operate at the slowest device’s

speed. Ref-3

Enterprise Networking June 2011 Final @NCC Education 2011

Page 21: Enterprise networking course work under NCC Education

d) Recommendation for the topology and media to use including costs and reasons: Here I have to describe about recommendation about technical feasibility and cost effective feasibility.

Feasibility reports describe one or more design solutions to a specific problem and agree on if the

proposed solution is realistic and feasible. If possible, more than one solution is offered, in which case

the report compares the various designs and determines which option is best. Feasibility reports

emphasis placed on practical and economic viability of the design in comparison with other possible

solutions. Feasibility reports are vital for decision making. In our project development, feasibility

reports are based on few matters that are social, economical, technical and operational. The detail

discussions are as follows:

Economical: This involves the feasibility of the proposed project to generate economic benefits.  A

benefit-cost analysis and a breakeven analysis are important aspects of evaluating the economic

feasibility of new organizational projects.  The tangible and intangible aspects of a project should be

translated into economic terms to facilitate a dependable basis for valuation. Cost benefit analysis is

an important feature of economical feasibility. Here we try to illustrate their cost analysis for build up

their entire system.

Technical: This involves questions such as whether the technology needed for the system exists,

how difficult it is to build, and whether the organization has enough experience using that technology.

The assessment is based on an outline design of system requirements in terms of Input, Output,

Fields; this can be qualified in terms of volumes of data, frequency of updating, etc. In order to give an

introduction to the technical system, they are currently posses the necessary technology. Our system

fully supports their technical infrastructures.

Operational: Our systems modes of operation will afford adequate throughput and response time.

Our system will provide accurate and usefully formatted information. Our systems operation offer

effective controls to protect against fraud and to guarantee accuracy and security of data and

information. This systems mode of operation provides reliable service and it flexible and expandable.

Social: Social feasibility concentrates on the control that a proposed project may have on the social

system in the project environment.  The ambient social structure may be such that certain categories

of workers may be in short supply or absent.  The effect of the project on the social status of the

project participants must be assessed to ensure compatibility. It recognized that workers in certain

company may have certain status symbols within the society.

Enterprise Networking June 2011 Final @NCC Education 2011

Page 22: Enterprise networking course work under NCC Education

Task 5:

In this task, I have to make the security issues specifically relating to staff use of the wireless network including below:

a) Access E-Mail:

Access security is providing using username and password.

Without collage network system software no one can access e-mail.

b) Using the wireless network for transmission of student work, examination papers, etc. between a user and the college intranet:

User can encryption file.

Personal data can be encrypt by PGP

Active directory is use full to maintain security on the server.

Active directory manage validation of user.

Manage user and group.

c) The use of the network with personal data:

Personal data can be encrypt by PGP

Folder can be protect by third-party or plug-in software.

Folder permission can be use on personal data or file.

User access level configuration

User and group procedure

a) Recommendation:

Change Default Administrator Passwords (and Usernames)

Turn on (Compatible) WPA / WEP Encryption

Change the Default SSID

Enable MAC Address Filtering

Disable SSID Broadcast

Do Not Auto-Connect to Open Wi-Fi Networks

Assign Static IP Addresses to Devices

Enable Firewalls On Each Computer and the Router

Position the Router or Access Point Safely

Turn Off the Network during Extended Periods of Non-Use ref-v

v

References of text book:Enterprise Networking June 2011 Final @NCC Education 2011

Page 23: Enterprise networking course work under NCC Education

1. Enterprise Networking text book of NCC Education

2. Network fundamental text book of NCC Education

3. Cisco Certified Network Associate (CCNA) text book

4. Wireless networking (DIPTI)

Enterprise Networking June 2011 Final @NCC Education 2011

Page 24: Enterprise networking course work under NCC Education

Task 6:

In this task, I have to make a comprehensive, professional report describing the network recommendations. This report includes the details of Tasks 1 – 5, have estimates of cost throughout and have an executive summary at the start giving the key points.

Executive summary:

This stage tests most of the functions of the network system by the access of all the tested function is

primarily working correctly. So we can come to the decision that the system is now ready for live

implementation. The further testing process will be carried out at the user’s environment.

Report:

Task- 1: I have described about equipments that which is used for configure the wireless network system. And I also have described the cost and operation cost of every equipment.

Task -2: this task I have describe the obstacle of wireless signal. Then I have designed the network architecture of developed network.

Task 3: this task I have discussed about the access privilege method for user of the network and neediness of secure network area for stuff of the collage.

Task 4: in this task I have describe about different possible network topology with advantage and disadvantage of the computer networks I also have discuss about the media which could be applied in that network.

Task 5: I have described about security issue which applied for stuff and student of the proposed network. That description should be including access email, transferable file encryption and protect personal data.

Assumptions:

On this assignment I assume something which is requiring for the assignment. Like college student

are 400 and total staff 50 people. Building size and shape are also assumed and I want to flow the

role of spoke of a while. Total users are dividing in three groups like student, staff and guest.

Suggestion and further improvement:

Network can work as more faster to use of Wi-Max.

In LAN CAT7 can be use.

Collage can use antenna to remove weakness

FTP server is more secure for file maintain for user

Enterprise Networking June 2011 Final @NCC Education 2011

Page 25: Enterprise networking course work under NCC Education

References:

iii http://www.dlink.com.au/products/?pid=848

iv http://www.dlink.com.au/products/?pid=848Enterprise Networking June 2011 Final @NCC Education 2011