hssn new _final
TRANSCRIPT
-
7/31/2019 HSSN New _final
1/34
Hardware software systems and Network
Hardware ,software system and network Page 1
ASIA PACIFIC INSTITUTE OF INFORMATION
TECHNOLOGY
Hardware software systems and Network
Network Proposal for ICT Resources Malaysia Public Limited
Company
CE00382-HSSN2-CSE
Submitted to :Mr. Arun Choudary
Submitted on4/8/2010
Hand Out Date: 15 FEBRUARY 2011
Submitted By: Neenu John (PT0881130)
-
7/31/2019 HSSN New _final
2/34
Hardware software systems and Network
Hardware ,software system and network Page 2
CERTIFICATE
This is to certify that Mr. Neenu John of 6th
semester pursuing B.Engg. (Honors) Degree from
A.P.I.I.T SD INDIA has successfully completed the Individual project in Hardware, Software
System and Networks module under the guidance of Lecturer Mr. Arun Chaudhary within the
stipulated time duration.
Neenu John Module Lecturer: (Mr. Arun Choudhary)
PT0881130 __________________________
Date: - April 8, 2011
-
7/31/2019 HSSN New _final
3/34
Hardware software systems and Network
Hardware ,software system and network Page 3
Table of contents
1.Abstract5
2.Introduction..6
2.1Preface..6
2.2 Objectives..6
3 Analyzing the layout of ICT..7
3.1 Assumptions..7
4 Network...8
4.1 Network Advantage 8
4.2 Network Disadvantage9
4.3 Types of Network..9
4.3.1 LAN9
4.3.2 WAN.10
4.3.3 MAN..10
4.4 Network Architecture..10
4.4.1 Peer-to-peer10
4.4.2 Client Server...11
4.5 network Topology12
4.5. Mesh Topology....12
4.5.2 Star topology.13
4.5.3 Bus Topology14
4.5. 4Ring Topology.......14
4.5.5 Tree Topology.15
-
7/31/2019 HSSN New _final
4/34
Hardware software systems and Network
Hardware ,software system and network Page 4
4.6 Transmission Media..16
4.6 .1 Twisted pair cables 16
4.6.2 Coaxial Cables17
4.6.3 fiber optics17
4.6.4 Comparison between cables.18
4.7 Standards,protocols and applications....19
Proposed Network and justifications..20
5.1 proposed LAN solution diagram20
5.2 proposed WAN solution diagram..21
5.3 proposed network Architecture.21
5.4 Proposed network topology..22
5.5 proposed transmission medium...23
5.6 Description of above scenario....24
5.7 Virtual Private Network25
5.8 IP Addressing....26
6 Requirements and Cost estimation of proposed system27
7 network Problems.28
8 Future Enhancements........28
9Conclusion...29
10 Gantt Chart..30
11. References..31
-
7/31/2019 HSSN New _final
5/34
Hardware software systems and Network
Hardware ,software system and network Page 5
1. Abstract
Major part of the world is in the hands of technology .Like the telephone and the television, the
network and data communication has performs an important role in restructuring our daily lives
While folks of an older generation remember a much different age, most people can hardly
remember a time where the network and data communication was not available.
The Internet is not just a network; it is a whole community in and out of itself. It is a revolution
that changed our society, our lives, and our entire world. What other thing can we invariably say
has completely connected everyone in the world, one that is free of social and cultural
differences? The Network acts as a common ground, a community of information and
recreation, for the world to walk upon. As of now, it is even easier for some to meet friends on-
line than in real life - with sites like Myspace and Facebook dominating most of the social
scene. These are best examples of social network sites.
The main aim of this assignment is to suggest a effective and efficient network for ICT
Resources Malaysia Public Limited Company, which is the one of the supplier of business
equipment and office supplies of its kind in South East Asia. This network proposal includes the
details about the network that is suitable for the ICT and the advantages and disadvantages of it.It also includes the network topologies, transmission media, protocols, network devices,
architecture technologies, possible problems and the future enhancements in the network of ICT.
.
-
7/31/2019 HSSN New _final
6/34
Hardware software systems and Network
Hardware ,software system and network Page 6
2. Introduction
2.1 Preface
ICT Resources Malaysia Public Limited Company has hired you as a network consultant. This
company is the only supplier of business equipment and office supplies of its kind in South East
Asia. The lack of competition has caused the owners not to make major investments into the
business. A nationally recognized competitor recently opened for business with plans to put ICT
Resources out of business. In response to this, the owners of ICT Resources have decided to
reinvest substantial sum of money in the company.
2.2 Objectives
To provide an efficient and effective network for ICT Network.
Identify the advantage and disadvantage of Networks.
Understanding the type transmission media
Understanding different type of topology
Indentify and provide suitable network topology and transmission medium for ICT
Resources.
Identify and propose the LAN and WAN network connections
-
7/31/2019 HSSN New _final
7/34
Hardware software systems and Network
Hardware ,software system and network Page 7
3.Analyzing the Layout of the ICT
ICT Resources locally owns a 2 storey building and currently has already grown to a level where
they now have resources of 35 staff and this figure is still growing. They have developed and
spread their business to 3 strategic locations throughout South East Asia with more upcoming
offices in other locations planned for 2012. These new offices will incorporate the retail concept
coupled with local sales offices.
ICT Resources decided to set up office with approximately 30 to 35 employees. The goal is to
determine the type of network topology they will need within the office. Consider the types ofcomputer and number of printers, audio devices, microphones, LCD projectors, and
multifunction peripherals that are needed. Before they invest money in the local area network,
the owner wants to know more about networks and internet connection.
3.1 Assumptions
Now there is no internet facility for all the employees in ICT expect the location head
In the main office there are 3 departments. Production department, accounts department
and
Administrative department
Presently there is no local network inside the office.
The number of employees in each department is as, 5 in accounts,5 in administrator, 19 in
and 2 as network administrators.
Each employee has each computer and each computer have sound device and micro
phone.
Each department consist of one printer, production department consist of LCD projectors
and one security cameras.
-
7/31/2019 HSSN New _final
8/34
Hardware software systems and Network
Hardware ,software system and network Page 8
4. Network
Network is a collection of computers and devices that are interconnected with each other
.through communication links .Link is a communication pathway which helps to transfer data
from one device to another device .A computer network can interact with other network by two
ways wired or wirelessly .For efficient communication , two device must be connected with
each other. There are two possible type of connection are available one is point to to point
another one is multipoint.
Pointtopoint : A point- to point connection provides a dedicated link between two devices
.It is used to establish the direct connection.
Multipoint : A multipoint connection in which more than two specific device shares a single link.
4.1. Network Advantage
Information Sharing : The main advantage of network is information sharing. A large
number of users belonging to same area or same organization but spread over at different
places can communicate and share useful files, software and information at right times
via network of computers.
Speed: Sharing and transferring of data occurring in a network is rapid. So we can send
the data of larger size like high resolution photographs over the network.
Flexible Access: Computer network allows accessing the file in a flexible manner.
Security: Network is also allows establishing security by ensuring that the network users
may only have access to certain files and applications. Sensitive files and data in the
network are password protected to avoid the illegal coping of data
Work Group Computing: Work group software such as Microsoft back office allows
concurrent access of files and data.
Centralized Software Management: Files can be stored on a central computer (the file
server) allowing data to be shared throughout the entire network
Cost: Individual license copy of many software may be costly. Shared programs on the
network allows easy up gradation of file server rather than the individual work stations.
-
7/31/2019 HSSN New _final
9/34
Hardware software systems and Network
Hardware ,software system and network Page 9
Resource sharing: Network allows to share the resources like printer , scanner , fax
machines modems
Back up Facility: Files can be backed up more easily when they are all on a central
fileserver rather than when they are scattered across a number of independent
workstations.
4.2 Network Disadvantage
Loss of data and resources: Network failure and device failure will shut the entire
network it causes loss data. Network faults cause loss of resources. If the network stops
operating then it may not be possible to access to various computers.
Difficult to manage: Network set up is very costly because of hardware and software.
Network set up take a lot of time to complete. The larger the network becomes difficult to
manage
Location of resources: Resources could not be located too far from users. If resources are
too far it take to much time to share the resources like printer .it will negatively affect the
access flexibility.
Storage space and Bandwidth: Users may use too much bandwidth - for example when
listening to music files or watching video clips - preventing others from using the
network facilities properly .Usage of larger storage may cause problems on the network.
4.3 Types of Network
According to the size of the network we can divide the network into three types. Local Area Network
(LAN), Wide Area Network (WAN) and Metropolitan Area Network (MAN).
4.3.1 LAN (Local Area Network)
Local area networks are designed to allow resources to be shared between personal computers or
workstations. The resources to be shared can include hardware, software or data .The best
example of LAN is found in business organizations. One of the computers may be given a large
capacity disc which acts as a server to clients. Softwares are installed into central server and is
used by the whole network group .The most common LAN topologies are bus ,ring ,star
-
7/31/2019 HSSN New _final
10/34
Hardware software systems and Network
Hardware ,software system and network Page 10
.currently LAN size is limited to few kilometers. Generally, LAN is using one type of
transmission medium.
4.3.2 WAN (Wide Area Network)
Wide aera network provides long distance transmission of data ,image audios and video
information over large geographic aera.WAN can be simple like dial up lines connect to the
individual pc and internet .It can be complex also like backbones that connect the internet. We
normally refers two types WAN switched WAN connects to the end systems and the point to
point WAN connects home computer to an internet service provider.
4.3.2 MAN (Metropolitan Area Network)
A metropolitan area network is a network with a size between a LAN and a WAN. It normally
covers the area inside a town or a city .A best example of a MAN is the part of telephone
network that can provide a high-speed DSL line to the customer .MAN provides high speed
connectivity, normally to the internet. It provides the internet connectivity for a LAN in a
metropolitan network.
4.4 Network Architecture
Network architecture, is the logical and structural layout of the network consisting of
transmission equipment, software and communication protocols and infrastructure (wired or
wireless) transmission of data and connectivity between components
http://en.kioskea.net/faq/2761-what-is-network-architecture
4.4.1 Peer-to-peer Network
Peer-to peer network is a type of network in which each
workstation has equivalent capabilities and responsibilities.
Peer-to-peer networks are generally simpler, but they usually
do not offer the same performance under heavy loads. In peer
to peer network there is no dedicate server . Thus each
computer in such a network is part server and part client
Figure .1
http://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/W/workstation.htmlhttp://www.webopedia.com/TERM/L/load.htmlhttp://www.webopedia.com/TERM/L/load.htmlhttp://www.webopedia.com/TERM/W/workstation.htmlhttp://www.webopedia.com/TERM/N/network.html -
7/31/2019 HSSN New _final
11/34
Hardware software systems and Network
Hardware ,software system and network Page 11
4.4.2 Client server Network
In client-server architecture, a business's computer
network will have a server computer, which functions as
the "back bone of the organization, and a group of client
computers, which are commonly called workstations. By
using the server we can improve efficiency of client
server architecture .Most of the cases the server part of
client server having large capacity of storage and also
provides high functionality .Client part in the client server
architecture are smaller computer having individual
responsibilities.
Architecture Advantage Disadvantage
Client Server
Centralized Resources
Centralized storage of data.Easier to find and backup the data
and the files
Efficient
Multiple users can use hardware
and software
Security
Central Server Machine can secure
all other workstations.
Scalability
Easy to upgrade resources
If the server goes down, it
takes part or the wholenetwork with it.
It is more expensive to
install.
Needs to be maintained by
staff with high IT skills.
Peer to -Peer Reduced cost(the costs involved Only suitable for small no
Figure 2.
-
7/31/2019 HSSN New _final
12/34
Hardware software systems and Network
Hardware ,software system and network Page 12
in such a network are hardware,
cabling and maintenance )
well tested simplicity
Connected using simple and
straightforward cabling
of computers
No Centralized system
Lack of security
Table. 1
4.5 Network Topology
Network topology refers to the Structure or design of the connected devices. Network topologies
can be physical or logical. Physical Topology means the physical design of a network including
the devices, location and cable installation. Logical Topology refers to the fact that how dataactually transfers in a network as opposed to its design.
4.5.1 Mesh topology
In mesh topology every device has a dedicated point to point connection with every other device.
The term dedicated means that link carries traffic only between the two devices it connects. In
mesh topology needs n(n-1)/2 duplex mode links ,n is
the no of nodes.
Network Topology
Mesh Star Bus Ring Tree
Figure 3
Figure 4.
-
7/31/2019 HSSN New _final
13/34
Hardware software systems and Network
Hardware ,software system and network Page 13
Advantage Disadvantage
Use of large no of links reduce networktraffic
A mesh topology is robust in nature .ifone link becomes unusable it does not
disable the entire system.
It offers privacy and security
Use of large number of cables makesthe network very much expensive
Interconnection of device leads todifficulty in installation and
reconfiguration of devices
Hardware required to connect each linkcan make it more expensive to
implement
Table 2
4.5.2 Star topology
In a star topology each device has a dedicated point to
point connection with only device usually known as a
hub. In a star topology devices are not directly linked to
one another. Unlike mesh topology it does not allow
direct traffic between the devices. The controller act as
an exchange between the two devices.
Advantage disadvantage
Less expensive than mesh topology
because it requires less number ofcables.
Easy to install and reconfigure it,
each device needs only one link
and one input-output port.
Robust it nature, failure of onesystem doesnt affect the whole
network
Dependency of all topology on a single
point called hub. If the hub goes downthen the whole system will be dead.
The cost of the hub make the network
more expensive
Table 3
Figure 5.
-
7/31/2019 HSSN New _final
14/34
Hardware software systems and Network
Hardware ,software system and network Page 14
4.5.3 Bus topology
A bus uses multipoint connection instead of point to
point-to-point connection. Tap in a bus topology one
cable acts as a backbone and nodes are connected in a
bus topology through drop lines tap.A drop line is aconnection running between the device and the main
cable.
Advantage Disadvantage
A Bus topology is easier toinstall.Less expensive than star andmesh because less cables are
required,Less redundancy of cables
Difficulty in reconnection and faultisolationSignal reflection at the taps can countdegradation and quality
breaks in the bus cable stops alltransmission.
Table 4
4.5.4 Ring Topology
In a ring topology each device has a dedicated point to point link with one two device on either
side of each. Signal is passed along the ring in one direction from one device to another device
until it reaches a destination. Each device in a ring
topology uses a repeater.
Figure 6
Figure 7.
-
7/31/2019 HSSN New _final
15/34
Hardware software systems and Network
Hardware ,software system and network Page 15
Advantage Disadvantage
A ring is relatively easy to install and
reconfigure it.In a ring topology each device linked
only its intermediate neighbors. For
addition and removal we need tochange only two connections.
It uses unidirectional traffic. A break in the
ring can stop all transmissions.
Table 5
4.5.5Tree Topology
A tree is a variation of star topology. Nodes in a tree are linked to standard controller known ashub which directly controls the traffic of the network. However not every device are directly
connected to the central hub. Majority of the devices are
connected to the secondary hub.
Advantage Disadvantage
It provides point to point connectivity
with the primary and the secondary
hub.
It provides an easy exchange
If the back bone line breaks the entire
segment will go down.
Table 6
Figure 8.
-
7/31/2019 HSSN New _final
16/34
Hardware software systems and Network
Hardware ,software system and network Page 16
4.6 Transmission Media
Transmission media is anything that carry signal from source to destination. Best example
transmission media is air. It can be metallic cables or fiber optics cable. In telecommunication
transmission media is divided in to two broad categories guided media and the unguided media.
Guided media provides connection from source to destination by using twisted pain cables ,
coaxial cables , and fiber optic cables. Unguided media
4.6.1 Twisted Pair Cable
Twisted pair cable consist two conductors having an insulation coating .One of the wire used to
carry signal to the receiver, and the other is used only as a ground reference. The receiver uses
the difference between the two. There is a chance to inference and cross talk it results in the
creation of unwanted signal. Effect of the unwanted
signals change according to the arrangement of wires
like wires are parallel .If both wires situated at different
location then the noise or crosstalk will be more, this
results in a difference at the receiver. By twisting the
pairs, we can maintain .Twisting makes it possible that
both wires are equally affected by external influences
.Two types of twisted pair cables are available.
Unshielded twisted pair and shielded twisted pair cables.
Transmission Media
Guided
(Wired)
Twisted pair cable Fiber -optic cable Coaxial Cable
Unguided
(wireless)
Free Space
Figure 9.
Figure 10.
-
7/31/2019 HSSN New _final
17/34
Hardware software systems and Network
Hardware ,software system and network Page 17
4.6.2 Coaxial Cable
Un like twisted pair cables Coaxial cable carries signal
having higher frequency .Coaxial cable has a central core
conductor of solid or standard wire enclosed in a insulating
sheath which is ,in turn, encased in an outer conductor of
metal foil braid or a combination of the two. The outer
metallic wrapping serves both as a shield against noise and as the second conductor , which
completes the circuit. Coaxial cables are widely used in analog telephone networks.
4.6.3 Fiber Optic cable
A fiber optic cables transmits signal in the form of
light .These cables are made by glass or plastics.
Signal in the fiber optics transmits on the basis of total
internal reflection. Fiber optics use reflection to guide
light through a channel. A glass or a plastic core is
surrounded by a cladding of less dense glass or
plastic. The difference in density of two materials
must be such that a beam of light moving through the core is reflected off the cladding instead of
being refracted to it. Fiber optics is often found in back bone networks.
Figure 11.
Figure 12.
-
7/31/2019 HSSN New _final
18/34
Hardware software systems and Network
Hardware ,software system and network Page 18
4.6.4Comparison between Cables
Characteristics Coaxial Cable Twisted Pair Cables Fiber Optics
Susceptibility to
interference
Good resistance to
interference
UTP: Very susceptible
STP: Good resistance
Not susceptible to
interference
Ease of
installation
Easy to install UTP: Very easy; often
preinstalled
STP: Moderately easy Difficult to install
Flexibility
Fairly flexible UTP: Most flexible
STP: Less flexible than
UTP
Less flexible than
coaxial cable
Special features
Electronic support
components are less
expensive than twisted-
pair cable
UTP: Same as telephone
wire; often preinstalled in
buildings
STP: Supports higher
transmission rates than
UTP
Supports voice, data,
and video
Transmission
rates
4-100 Mbps UTP: 4-100 Mbps
STP: 16-500 Mbps
100 Mbps or more (
> 1Gbps)
Table 7 [1]
-
7/31/2019 HSSN New _final
19/34
Hardware software systems and Network
Hardware ,software system and network Page 19
4.7 Standards, Protocols and Application
Protocols are the special rules that exist for the data interchange at the application program level. Computer networking involves many different pieces of hardware and software that help move
data from one computer to another. These different elements could not work together unless they
had a common understanding of formats, codes and operating procedures. A protocol is a
combination of these factors codified into a common standard. All networking technologies have
standards associated with them. Network standards facilitate the interoperability of network
technologies.[2]
TCP/IP Protocol or Internet Protocol
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language
or protocol of the Internet. It can also be used as a communications protocol in a private network
(either an intranet or an extranet). Main functions of TCP/IP protocol is described below.[3]
Addressing/Multiplexing: The main function of TCP protocol is multiplexing the data
received from various process .This help to send the data on the network layer.
Connection establishment, management and termination: TCP provides set of procedures
that devices follow to negotiate and establish TCP connection over which data can travel.
Data handling and packaging: TCP defines a mechanism by which applications are able
to send data from it to higher levels
Routing / Indirect Delivery
When source and final destination are situated so far away means both are not attached
directly. In these case datagram can send indirectly
Fragmentation and Reassembly
However, the maximum frame size of each physical/data-link network using IP may be
different. For this reason, IP includes the ability to fragment IP datagrams into pieces so
they can each be carried on the local network
http://www.ehow.com/computers/http://whatis.techtarget.com/definition/0,289893,sid9_gci212377,00.htmlhttp://whatis.techtarget.com/definition/0,289893,sid9_gci212089,00.htmlhttp://whatis.techtarget.com/definition/0,289893,sid9_gci212089,00.htmlhttp://whatis.techtarget.com/definition/0,289893,sid9_gci212377,00.htmlhttp://www.ehow.com/computers/ -
7/31/2019 HSSN New _final
20/34
Hardware software systems and Network
Hardware ,software system and network Page 20
5. Proposed Networks & Justifications
5.1 Proposed LAN Solution Diagrams
Figure 13.
-
7/31/2019 HSSN New _final
21/34
Hardware software systems and Network
Hardware ,software system and network Page 21
5.2 WAN Solution Diagrams
ISP
5.3 Proposed network Architecture
Client server architecture is suit for ICT resources.ICT resources is spread over the south east
asia. In a client-server model, there can be only one server and one or more than one clients. The
clients are connected to the server. Server is a computer system that is shared by several users in
network. A network consists of more than one computer,each performing a particular task .This
model consists of high end servers, which provides services to the clients as per the request sent
by the client on a network. Client systems never function as servers. It is not possible for one
client to access shared resources on another clients system .client server architecture offers more
security than per to peer technology.
Congestion: Client-server networks can become congested and overload the server with requests
Network Alterations: In client-server set-ups, a server can be altered without disturbing the
clients, while P2P systems require accessing every peer in the network.[4]
Figure 14.
-
7/31/2019 HSSN New _final
22/34
Hardware software systems and Network
Hardware ,software system and network Page 22
5.4 Proposed Network Topology
Proposed network topology for ICT resources is extended star topology. Extended star topology
is the combination two star topology .Each devices are connected to the central controller calledhub .In star topology direct linkage of connected device is not allowable. So the breakage of one
device does not depends the entire system. The entire system can continue its working.
A star topology is less expensive than a mesh topology. In a star each device needs only one link
and one I/O port to connect it to any other number of others. This factor also makes it easy to
install and reconfigure .Far less cabling needs to be housed , and additions, moves and deletions
involve only one connection between that device and hub.
(Example of star topology)
Hub
Figure 15.
-
7/31/2019 HSSN New _final
23/34
Hardware software systems and Network
Hardware ,software system and network Page 23
5.5 Proposed transmission medium
Proposed transmission media for ICT resources is fiber optic cables. we need two types of mediums
in which one medium for the internal LAN and other for the connection to the ISP (Internet service
Provider). Ethernet 10BaseT (Cat5e, Unshielded Twisted Pair cable) is used for LAN configuration
Advantage of Cat5e cables.
Flexibility : Flexibility is one of the major advantages offered by Cat5 cables. The
technology it uses is so simple that it is possible for a nonprofessional person to install it
and start using it. Cables can also be as long as you need
Ease of Installation: A Cat5 cable is very user-friendly to install
Ruggedness: Cat5e cables are not easy to break or snap. If they do break, it is easy to
repair them.
For connection to Internet service provider 10BaseF is recommended which is supported by
Optical Fiber. Reasons for opting optical fiber for connection to ISP are .
No shock hazard
Longer life expectancy than copper or coaxial cable
High data rate and high band width
Secure communications
-
7/31/2019 HSSN New _final
24/34
Hardware software systems and Network
Hardware ,software system and network Page 24
5.6 Description for above scenario
LAN
ICT resources consist of LAN and WAN network.ICT network office is a two storeybuildingaccording to the network diagram Ground floor have accounts section and administrative section.
Administrative department contain five personal computers, one fax machine and one printer.
Telephones are used for communicate with the clients and also communicate with the other
department.fax machines are used for client communication .Printer is used to take the important
documents .The whole network is connected by hub. Here hub acts as a connector. It connects
the wires coming from different branches.
Accounts department in the ground floor contains s personal computer one printer and one
telephone connection. Telephone communication allows client communication.
VLAN Configuration for First Floor
A VLAN allows a network administrator to create groups of logically networked devices that act
as if they are on their own independent network, even if they share a common infrastructure with
other VLANs. The benefits of VLAN are Security, cost reduction, higher performance,
broadcast storm migration, IT staff efficiency and Simpler project or applicationmanagement.
Advantages
Cost And time Reduction
Creating virtual work groups
Security
First Floor contains production department which contains 21 personal computer ,one video
camera ,one printer , one projector , projector screen ,telephone. Server room is located in first
floor. Routers are used to connecting networks together. A router runs on software that allows
the device to move data from one networkto another. Routers operate at the networklayer.
http://www.inetdaemon.com/tutorials/computers/software/index.shtmlhttp://www.inetdaemon.com/tutorials/networking/lan/index.shtmlhttp://www.inetdaemon.com/tutorials/networking/lan/index.shtmlhttp://www.inetdaemon.com/tutorials/networking/lan/index.shtmlhttp://www.inetdaemon.com/tutorials/networking/lan/index.shtmlhttp://www.inetdaemon.com/tutorials/computers/software/index.shtml -
7/31/2019 HSSN New _final
25/34
Hardware software systems and Network
Hardware ,software system and network Page 25
WAN
ICT resources Malaysia is the only supplier of business equipment and office supplies of its kind
in South East Asia. They have developed and spread their business to 3 strategic locations
throughout South East Asia with more upcoming offices in other locations planned for 2012.This
office is distributed in a particular geographic area so we have to establish the Wireless area
network for communication between these offices. The above diagram shows the WAN network
diagram contains 3 network firewalls for security and the entire network bulding.ICT network
uses switched WAN network. It connects the end systems, which usually comprise a router
(internetworking connecting device) that connects to another LAN or WAN. The best example of
switched WAN is ATM networks.
5.7 VPN (Virtual Private Network)
A virtual private network (VPN) is a network that uses a
public telecommunication infrastructure, such as the
Internet, to provide remote offices or individual users with
secure access to their organization's network. A virtual
private network can be contrasted with an expensive
system of owned or leased lines that can only be used by
one organization. The goal of a VPN is to provide the
organization with the same capabilities, but at a much
lower cost.[5]
Advantages
Cost saving: eliminating the need for expensive long-distance leased lines. VPN reduces long-distance telephone charge .It offers offloading of support cost
Flexibility and Reliability: VPN is improving the reliability of data services of company.
Better Performance: Owing to the fact that more high capacity data service options can be
used, the bandwidth and efficiency of the network generally increases after a VPN solution is
installed.
Figure 16.
-
7/31/2019 HSSN New _final
26/34
Hardware software systems and Network
Hardware ,software system and network Page 26
Improved Security: The use of encryption protocols and authentication helps secure the data
that is t raveling over the VPN channel
Disadvantages of VPN
. VPNs require an in-depth understanding of public network security issues and proper
deployment of precautions.
The availability and performance of an organization's wide-area VPN (over the Internet in
particular) depends on factors largely outside of their control.
5.8 IP Addressing
An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP
network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each
representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is
known as "dotted decimal" notation. The Class of the address and the subnet mask determine
which part belongs to the network address and which part belongs to the node address .There are
five different class addresses class A (begin with 0xxx, or 1 to 126 decimal), class B(10xx,
or 128 to 191 decimal),class c(10xx, or 128 to 191 decimal),class D(1110, or 224 to
239 decimal), Class E(1111, or 240 to 254 decimal).ICT will get a privet address form ISP and
the all devices inside will use public IP address.The IP range, subnet mask, and network address
for each network of ICT is as below. All network address is given below
Ground Floor
Network Address 192.168.1.1
Subnet Mask 255.255.255.254Starting IP Address 192.168.1.2
Last IP Address 192.168.1.11
First Floor Network Address 192.168.1.12
Subnet Mask 255.255.255.254
-
7/31/2019 HSSN New _final
27/34
Hardware software systems and Network
Hardware ,software system and network Page 27
Starting IP Address 192.168.1.12
Last IP Address 192.168.1.33
Table 8
6 .Requirements and Cost estimation of proposed system
Device type Number providesPer
cost(Rs)
Total
(Rs)
Router 4 port ethernet 1 Cisco 553000 553000
Hub 10 mpbs 4 port
ethernet
3 HP 2500 7500
Database server Media smart
servers
1 Dell 28700 28700
Telephone Land Phone 3 BSNL 600 1800
Printer Ink jetprinter 3 hp 6500 19500
Fax 1 hp 6950 6950
Projector With RJ 45 port 1 HP 5500 5500
Cable CAT5e 4500 mts 1400
per1000 mts
6300
Security Camera Video camera 1 Ice mart 550 550
Total 132100
Table 9
-
7/31/2019 HSSN New _final
28/34
Hardware software systems and Network
Hardware ,software system and network Page 28
7 .Network Problems
Cables: Most of the network problems are caused by faulty cables. Breakage of cables
leads to the shut down of the entire net work system.
Connectivity issues: This can be caused by a number of things, including configuration
changes or the malfunction of connectivity devices, such as in the case of a switch, router
or hub. The first thing to do, of course, is to check your physical connections. If
something is disconnected, you'll need to reconnect and test it in order to make sure that
the problem is resolved
Duplication of IP address: Each IP address in the network refers a specific computer. But
sometimes two will receive the same one as the result of an error. When this happens Software problems: Registry problems may also cause a networking issue, an error or
invalid attack of the software installed in a network can dump the entire system.
Security Issues: unauthorized access leads to lose data. Virus and the malwares
(corrupted program files) are common threat which we can find on the network.
8. Future Enhancements
ICT resources Malaysia is going to establish their 3 branches on south east asia.
Employees and customers will also increase. Use one more server or mainframe to
manage the entire network system.
Use secure modems, crypto cable routers for ensuring the security of the entire network
system.
Implement new techniques and install new software to check security concerns like
hacking and stealing of information.
Use of efficient firewall like packet filtering to protect the network
Instead of using extended star topology. Use hybrid topologies.
Use advance network cables for LAN and WAN
-
7/31/2019 HSSN New _final
29/34
Hardware software systems and Network
Hardware ,software system and network Page 29
9. Conclusion
As per the requirement of ICT Network resource proposed contain the combination of LAN and
WAN Network. Extended star topology is used to build the whole network .The main advantage
of using this topology is , it requires less amount of cables .Network firewalls are added to this
network for ensuring the entire network security. Client server architecture is proposed for this
network .in client server network one computer is act as a server and the rest of them will be the
clients. Data will transmit between the client and the server.
Fiber optic cables are suggested for ICT resources as transmission medium. In fiber optic cables
high frequency and high bandwidth data will travel. It increases the network efficiency.
Each department has different networks so that data will be secure between departments.
The concept of VLAN will help this dividing network. Hug is acts as a connector. The normal
cost for the development of network is calculated and it will not become a big amount when it
comes to profit after the using it. To connect between the buildings the VPN concept is used its
more cost effective and efficient too.
-
7/31/2019 HSSN New _final
30/34
Hardware software systems and Network
Hardware ,software system and network Page 30
10.Gantt Chart
-
7/31/2019 HSSN New _final
31/34
Hardware software systems and Network
Hardware ,software system and network Page 31
11.References
1.Network Cables. Available: http://pluto.ksi.edu/~cyh/cis370/ebook/ch02b.htm.
Last accessed 27 march 2011.
2.Network Protocols. Available: http://www.ehow.com/info_8144331_network-
protocols-necessary.html. Last accessed 1 april 2011
3.TCP/IP Protocols. Available: http://sawaal.ibibo.com/computers-and-
technology/what-function-tcp-ip-protocol-422668.html. Last accessed 5 Apri
l2011.
http://sawaal.ibibo.com/computers-and-technology/what-function-tcp-ip-protocol-422668.html.%20%20Last%20accessed%205%20Apri%20l2011http://sawaal.ibibo.com/computers-and-technology/what-function-tcp-ip-protocol-422668.html.%20%20Last%20accessed%205%20Apri%20l2011http://sawaal.ibibo.com/computers-and-technology/what-function-tcp-ip-protocol-422668.html.%20%20Last%20accessed%205%20Apri%20l2011http://sawaal.ibibo.com/computers-and-technology/what-function-tcp-ip-protocol-422668.html.%20%20Last%20accessed%205%20Apri%20l2011http://sawaal.ibibo.com/computers-and-technology/what-function-tcp-ip-protocol-422668.html.%20%20Last%20accessed%205%20Apri%20l2011http://sawaal.ibibo.com/computers-and-technology/what-function-tcp-ip-protocol-422668.html.%20%20Last%20accessed%205%20Apri%20l2011 -
7/31/2019 HSSN New _final
32/34
Hardware software systems and Network
Hardware ,software system and network Page 32
4.Client Server Architecture. Available:
http://www.ehow.com/facts_5525462_client-server-advantages-
disadvantages.html. Last accessed 5 April2011.
5.Virtual Private Network. Available:http://searchenterprisewan.techtarget.com/definition/virtual-private-network. Last
accessed 5 April2011.
Books Referred
1. Forouzan Behrouz (2007).Data Communication and Networking. 4th ed. New
Delhi: Tata McGraw Hill,pp 139-189.
2. Cisco Network Academy (2006)Exploration One. 4th Ed. Cisco
Picture Reference
1. Diagram of Peer to Peer connection. Available:
http://www.google.co.in/imgres?q=Peer-
topeer+Network&hl=en&sa=X&tbm=isch&prmd=ivns&tbnid=BqMT2po9CfSHs
M:&imgrefurl=http://fcit.usf.edu/network/chap6/chap6.htm&ei=8TydTdaoIo3Uv
QOTmvjIBg&zoom=1&iact=hc. Last accessed 4 th April 2011
2. Diagram of client server Architecture. Available:
http://www.google.co.in/imgres?q=Peer-
topeer+Network&hl=en&sa=X&tbm=isch&prmd=ivns&tbnid=BqMT2po9CfSHs
M:&imgrefurl=http://fcit.usf.edu/network/chap6/chap6.htm&ei=8TydTdaoIo3Uv
QOTmvjIBg&zoom=1&iact=hc. Last accessed 4 th Aprill 2011
3. Diagram of Mesh topology. Available:
http://www.google.co.in/imgres?imgurl=http://www.brainbell.com/tutorials/Netw
orking/images/01fig06.gif&imgrefurl=http://www.brainbell.com/tutorials/Networ
king/Mesh_Topology.html&h=249&w=350&sz=29&tbni. Last accessed 6 th april
2011.
4. Diagram of Star topology. Available:
http://www.google.co.in/imgres?imgurl=http://fcit.usf.edu/network/chap5/pics/sta
r.gif&imgrefurl=http://fcit.usf.edu/network/chap5/chap5.htm&h=287&w=333&sz
http://www.ehow.com/facts_5525462_client-server-advantages-disadvantages.html.%20Last%20accessed%205%20April2011http://www.ehow.com/facts_5525462_client-server-advantages-disadvantages.html.%20Last%20accessed%205%20April2011http://searchenterprisewan.techtarget.com/definition/virtual-private-network.%20Last%20accessed%205%20April2011http://searchenterprisewan.techtarget.com/definition/virtual-private-network.%20Last%20accessed%205%20April2011http://searchenterprisewan.techtarget.com/definition/virtual-private-network.%20Last%20accessed%205%20April2011http://searchenterprisewan.techtarget.com/definition/virtual-private-network.%20Last%20accessed%205%20April2011http://www.ehow.com/facts_5525462_client-server-advantages-disadvantages.html.%20Last%20accessed%205%20April2011http://www.ehow.com/facts_5525462_client-server-advantages-disadvantages.html.%20Last%20accessed%205%20April2011 -
7/31/2019 HSSN New _final
33/34
Hardware software systems and Network
Hardware ,software system and network Page 33
=11&tbnid=2iuY8MQ5BauCSM:&tbnh=103&tbnw=119&pr. Last accessed 2th
april 2011.
5. Diagram of Ring topology. Available:
http://www.google.co.in/imgres?imgurl=http://fcit.usf.edu/network/chap5/pics/sta
r.gif&imgrefurl=http://fcit.usf.edu/network/chap5/chap5.htm&h=287&w=333&sz
=11&tbnid=2iuY8MQ5BauCSM:&tbnh=103&tbnw=119&pr. Last accessed 1th
april 2011
6. Diagram of Bus topology. Available:
http://www.google.co.in/imgres?q=ring+topology&um=1&hl=en&tbm=isch&tbn
id=dyISn3ioMWItdM:&imgrefurl=http://www.free-computer-
tips.info/networking-tips/network-
topologies.html&ei=uFOdTbCRIIrsuAO6wOSuBA&. Last accessed 6th april
2011.
7. Diagram of tree topology. Available:
http://www.google.co.in/imgres?q=tree+topology&um=1&hl=en&tbm=isch&tbni
d=pU6HcZykbt7RRM:&imgrefurl=http://www.free-computer-
tips.info/networking-tips/mesh-topology-tree-topology-and-hybrid-topology.h.
Last accessed 6th april 2011.
8.
Twisted pair. Available:http://www.google.co.in/imgres?q=twisted+pair+cable&um=1&hl=en&tbm=isch
&tbnid=1cjgklGPlHjxrM:&imgrefurl=http://www.techinterview.info/cable.html&
ei=6F6dTc7FKYKyuAPb-9nLBA&zoom=1&iact=hc&vpx=316&vpy=10. Last
accessed 27 march 2011.
9. Coaxial Cable. Available:
http://www.google.co.in/imgres?q=coaxial+cable&um=1&hl=en&tbm=isch&tbni
d=usGarN3dU3WvxM:&imgrefurl=http://courses.wccnet.edu/computer/mod/ng0
8c.htm&ei=6WCdTaPKDYiavgPvpvDBBA&zoom=1&iact=rc&dur=439&oei.
Last accessed 27 march 2011.
10.Virtual Private Network. Available:
http://www.google.co.in/imgres?imgurl=http://www.digitalworldtokyo.com/entryi
mages/2008/02/080212_VPN.jpg&imgrefurl=http://www.digitalworldtokyo.com/
-
7/31/2019 HSSN New _final
34/34
Hardware software systems and Network
index.php/digital_tokyo/articles/remote_workers_rej. Last accessed 27 march
2011.