Network Design

Table of Contents Introduction 3 Assumptions 4 Network Plan 5 Main diagram 5 Internet Connectivity 7 Servers 10 First floor 14 Second floor 17 Third floor 19 Forth floor 23 Fifth floor 25 Sixth floor 27 VoIP 29 Cabling 31 Wireless access 34 Linking the Campus 36 IP Addressing 39 Standardization 40 Structured Cabling Standards (ANSI/TIA/EIA-568) 40 Backup Plans 43 Limitations 44 Bibliography 45 Conclusion 47 Introduction APIIT Law School is established to provide law degrees in Sri-Lanka from end of 2009.This new law school will be established in a newly purchased 5 floor building nearby the APIIT main City campus. The business interaction and the IT infrastructure of the new law school will be independent from the main campus. The proposed computer network should be able to provide high speed access to the internet and also a connection between main campus and the new law school also should be established .the sharing of the network also should be controlled according to the different users . The proposed network should be crash proof and should consist of backup plans in case of a network failure. Assumptions o The assumption that cost in not a major issue was taken into consideration. o We assumed that single point failures will not occur often. o We also assumed that there are no technological constraints. Network Plan Figure 1 - Law

  • Word count: 5213
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Individual_Project_Proposal

Individual Project Proposal Project title Implementation of a Security Wireless LAN for the company Key words Wireless; Network Security; Capital Portal; pfSense Problem definition Nowadays, information technology updates second by second. Wide range of business software application systems are designed to cater diversified business needs. Especially for the wireless network, it can be save a lot cable. For this reason, it has been spreading rapidly around the campus, café, airport etc. Unfortunately, many implementations are being done without attention to issues of security and authentication. As a result, most wireless networks are set up so that anyone with proper equipment can access the network, even from outside the building. Anyone with the improper tools can also spy on traffic. They can see WEP key or password as well as other data. These dangers are not just theoretical. Tools to tap nearby wireless networks are widely available, even for palmtop devices. A whole subculture has sprung up of people going around, scanning for open wireless nodes, and publicizing them to people who want free wireless access. Global aim Base on the above problem. I want to setup a more and reliable wireless method for our visitors do a couple of things of my company. It is called "captive portal". There are little points why I want to do it. One, it helps us to be a hospitable

  • Word count: 1885
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay