• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28
  29. 29
    29
  30. 30
    30
  31. 31
    31
  32. 32
    32
  33. 33
    33
  34. 34
    34
  35. 35
    35
  36. 36
    36
  37. 37
    37
  38. 38
    38
  39. 39
    39
  40. 40
    40
  41. 41
    41
  42. 42
    42
  43. 43
    43
  44. 44
    44
  45. 45
    45
  46. 46
    46
  47. 47
    47
  48. 48
    48
  49. 49
    49
  50. 50
    50
  51. 51
    51
  52. 52
    52
  53. 53
    53
  54. 54
    54
  55. 55
    55
  56. 56
    56
  57. 57
    57
  58. 58
    58

Network Design

Extracts from this document...

Introduction

Networks and Networking – AICT003-3-2

Table of Contents

Introduction

Assumptions

Network Plan

Main diagram

Internet Connectivity

Servers

First floor

Second floor

Third floor

Forth floor

Fifth floor

Sixth floor

VoIP

Cabling

Wireless access

Linking the Campus

IP Addressing

Standardization

Structured Cabling Standards (ANSI/TIA/EIA-568)

Backup Plans

Limitations

Bibliography

Conclusion


Introduction

APIIT Law School is established to provide law degrees in Sri-Lanka from end of 2009.This new law school will be established in a newly purchased 5 floor building nearby the APIIT main City campus.

The business interaction and the IT infrastructure of the new law school will be independent from the main campus.

The proposed computer network should be able to provide high speed access to the internet and also  a connection between main campus and the new law school also should be established .the sharing of the network also should be controlled according to the different users .

The proposed network should be crash proof and should consist of backup plans in case of a network failure.


Assumptions

  • The assumption that cost in not a major issue was taken into consideration.
  • We assumed that single point failures will not occur often.
  • We also assumed that there are no technological constraints.

Network Plan

Figure 1 – Law School Network Diagram

Internet Connectivity

We proposed leased line connections compared to ADSL and Wi-MAX connections because according to Dialog Telekom PLC (2008) Wi-MAX broadband is a shared bandwidth services so actual speeds may vary due to many factors like internet traffic, selected plan, so there will be no static speed.

But according to Sri-Lanka Telecom (2008) leased lines are dedicated connection so speed will be fixed and it’s monitored around the clock to provide the highly reliable uninterrupted service.

We proposed to use two leased lines - one leased line dedicated to internet and other leased line is a VPN leased line and its dedicated to VPN to the main campus.

...read more.

Middle

Lab wiring plan

image07.jpg

Figure 6 – Lab wiring overview

The proposed wiring plans for the labs are shown in the above figure. Computers will be divided into 10 rows, 4 computers in each row. Nearby each row there will be a wall outlet and cabling from the computers will be connecting to it. Cables from the wall outlet will be connected to the patch panel and from the patch panel those cables will be connected to the Lab switch using patch cables. All the network devices in the labs will be connected to the switch using star topology.


Server room

image08.jpg

Figure 7 – Server Room


Forth floor

Floor Plan briefing  

In the fourth floor all the class rooms are located.

Network plan

image09.jpg

Figure 8 – Level 4 Floor Plan

As shown in the figure above the level main switch will be connected to the server backbone though the air duct there will be shared switches in the class rooms, that would mean that one switch will be used in two class rooms. We use switches in class rooms considering a future network expansion, or a backup situation.

Equipment briefing

We propose to use IEEE 802.3 standard 12 or 24 Port Layer 2 switches which support 1Gpbs or 10Gpbs.


Fifth floor

Floor Plan briefing  

Fifth floor will have the meeting room, conference hall, staff room, CEO office and a store room.

Network Plan

image10.jpg

Figure 9 - Level 5 Floor Plan

As shown in the figure above the hierarchical approach is followed and there will be a main switch for the fifth floor and other switches are connected to it from it, we provide separate switches for meeting room, and conference hall because in the future if these location have to change the network can be easily

...read more.

Conclusion

Remote backup

To guarantee the security of the confidential data we proposed to use a remote backup or an online backup system. We don’t keep a backup server in the law school premises because in case of a disaster like fire the backup server will be destroyed and backup will be not useful.  

Backup lines

To use in case of an emergency we can keep backup lines to the floors though the air vent. If the current cable goes down the network can be restored with the emergency line.


Limitations

  • Cannot overcome single point failures.
  • No proper media streaming facilities.
  • VoIP services are limited to voice services.

Bibliography

  • American National Standards Institute (ANSI) (2006).Commercial building telecommunications standards. United States: ANSI
  • B&B Electronics (2002). Ethernet basics . Ottawa,United States: B&B Electronics.
  • Black Box (2008). Wirless Networking. Pennsylvania : Black Box.
  • David Barnett,David Groth,Jim McBee (2004). Cabling: The Complete Guide to Network Wiring, . United States : SYBEX Inc.
  • Eric Maiwald. Network Security: A Beginner's Guide. Second Edition. McGraw-Hill/Osborne, 2003.
  • IEEE Instrumentation and Measurement Society (2004).Errata to IEEE Standard Codes, Formats, Protocols, and Commond Commands for Use With IEEE Std 488.1-1987, IEEE Standard Digital Interface for Programmable Instrumentation. United States: IEEE Instrumentation and Measurement Society
  • Intel Corporation (2003). 10 Gigabit Ethernet Technology Overview. United States: Intel Corporation.
  • Internet Security Systems (2004). VoIP: The Evolving Solution and the Evolving Threat. United States: Internet Security Systems
  • MegaPath Communications (2005). Implementing an IP VPN. Costa Mesa, CA: MegaPath Communication
  • Motorola, inc (2007). Point-To-Point Solutions and WiMAX. Ashburton, Devon: Motorola, inc
  • RADVISION Ltd (2004). SIP Server Technical Overview. United States : RADVISION Ltd .
  • Siemon (2008). Cabling Lifecycles and Total Cost of Ownership. United States: Siemon.

Conclusion

The purpose of this project was to implement a network plan for the APIIT Law School.

After several weeks of research we came up with solutions and new technologies that could be useful to implementing the network. The use of all our research in this system provides a network that is very effective and provides optimum features in the best way possible.


Appendix

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Marked by a teacher

    UK Copyright and File Sharing

    5 star(s)

    For example, in an effort to combat file sharing, many websites started to offer individual music tracks at just a few pence, and scaled back marketing of relatively expensive albums. This has resulted in more fans buying single track downloads than obtaining them illegally (The Leading Question, n.d.).

  2. NETWORK DESIGN PROPOSAL

    The majority of the data will be text (ASCII and non-ASCII), but there will be some still graphics and possibly a small amount of voice and video (primarily for PC-based teleconferencing). Data Sources. Data will be created and used at all end stations on the network.

  1. OMC-R and CBSC ATP Overview

    Change to the etc directory by entering the following command: cd /etc 4. View the inittab file by entering the following command: more inittab 5. Verify that all terminal ports will be set to the off state, not to the respawn state.

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    Function Number of clock cycles (� 106) Computation time with a CPU of 600 MHz ( ms) Image Copy 1.8 2.8 Defragmentation 4.7 7.5 Resizing Quad Gen 10.8 17.28 File Mapping 0.3 0.48 Reprocess Image 12.5 20 Template Matching 4.4 7 Process Image 21.6 34.4 Total 56.1 89.46 Table 5.5

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    The author's opinion shaped this article from beginning to end. 2. Topic: A Brief History of the Object-Oriented Approach Reference: Capretz, L.F. (2003). A Brief History of the Object-Oriented Approach.

  2. Toronto Airport Case Study Wireless Applications

    Therefore, GTAA had to incorporate "best-in-class" technology and provide excellent performance to offset this reluctance. Extensive utilization of wireless applications was one area that GTAA felt it could provide significant flexibility and advantages for the airline customers. Performance/Survivability Problems One of the key decisions of the implementation was to utilize an end-to-end integrated IP network.

  1. This report will discuss the benefits and constraints of network systems and topologies.

    database server A database server is a software component than a hardware component, It can provide database services to other programs exist in the same computer or any other network. A database server works in the client-server architecture, and this is ensured by the Database Management System you use.

  2. Precautions against internet scamming

    According to Rusch,The scammers usually aim at obtaining information such as passwords , user names, credit numbers, and so forth (2001). Effects of this to e-commerce can be immense. Smith points out that Scammers may end up using other people identity to carry out online transactions.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work