Networks and Networking

97
ASIA PACIFIC INSTITUTE OF INFORMATION TECHNOLOGY APIIT Diploma Part II INCOURSE ASSIGNMENT NETWORKS AND NETWORKING Prepared By A.N.Ahamed Nishadh (CB004081) S.D.Ilangakoon (CB004041) M.J.Dilshan Zuhdi (CB004150) Module Code & Title AICT003-3-2 – Networks and Networking Cohort DF10A1ICT Date of Submission 22 nd August 2011 Instructor Mr.Udesh Amarasinghe Submitted in partial fulfillment for the degree of Bachelor of Science (Hons) in Computing

description

Networks and Networking Assignment Documentation

Transcript of Networks and Networking

Page 1: Networks and Networking

ASIA PACIFIC INSTITUTE OF INFORMATION TECHNOLOGY

APIIT Diploma Part II

INCOURSE ASSIGNMENT

NETWORKS AND NETWORKING

Prepared ByA.N.Ahamed Nishadh (CB004081)

S.D.Ilangakoon (CB004041) M.J.Dilshan Zuhdi (CB004150)

Module Code & TitleAICT003-3-2 – Networks and Networking

CohortDF10A1ICT

Date of Submission

22nd August 2011

Instructor

Mr.Udesh Amarasinghe

Submitted in partial fulfillment for the degree of

Bachelor of Science (Hons) in Computing

Page 2: Networks and Networking

GROUP COMPONENTINDIVIDUAL

COMPONENT

Assu

mpti

ons

(5)

Repo

rt c

onte

nt (1

0)

Dia

gram

s an

d/or

Fig

ures

(20)

Anal

ytica

l and

Criti

cal

Thin

king

(20)

Doc

umen

tatio

n (5

)

Refe

renc

ing

(10)

Gro

up T

otal

(70)

Pres

enta

tion

(20)

Prog

ress

Rep

ort

(5)

Wor

kloa

d M

atrix

(5)

Indi

vidu

al T

otal

(30)

Gra

nd T

otal

(100

)

Ahamed Nishadh

Deshan Ilangakoon

Dilshan Zuhdi

i

Page 3: Networks and Networking

WORKLOAD MATRIX

Name / CB No.

Work Assigned Work Completed

Comments & Signature

Dilshan Ahamed Deshan

Ahamed Nishadh

(CB004081)

IntroductionObjectivesRequirement-SpecificationsScope AssumptionsFloor Description and design-Ground FloorSecond Floor

Security OptionsLimitations

ALL COMPLETED

Deshan Ilangakoon (CB004041)

Floor Description and design-First FloorThird Floor Fourth Floor

TopologiesFeasibility StudyConclusionMeeting MinutesGantt Chart

ALL COMPLETED

Dilshan Zuhdi

(CB004150)

Backbone Network plan

Floor Description and design-Fifth Floor Sixth Floor Seventh Floor

Backup options

ALL COMPLETED

ii

Page 4: Networks and Networking

PROJECT GNATT CHART

iii

Page 5: Networks and Networking

ACKNOWLEDGEMENTS

Firstly we would like to thank our lecturer Mr.Udesha Amarasinghe for all the help

and guidance given to us while doing this assignment. Especially for teaching us this

module in such a way that we were able to learn this highly technical module very

easily. Also we would like to thank Mr. Balachandran of the School of Computing of

APIIT for all the assistance given in preparing this document.

Also there are many individuals who have helped us in numerous ways directly and

indirectly so that we were able to complete this assignment.

APIIT Lanka for providing us with resources and the Tech Team at APIIT Lanka for

their assistance at required times.

And last but not least our friends, parents and the well-wishers without whose moral

support and encouragement, we would not have been able to do a good job.

Finally, if there are any shortcomings in this project, then we request to excuse us for

all those and accept this documentation.

Ahamed Nishadh

Deshan Ilangakoon

Dilshan Zuhdi

iv

Page 6: Networks and Networking

TABLE OF CONTENTS

1.0 – INTRODUCTION................................................................................................1

2.0 – ANALYSIS..........................................................................................................2

3.0 – OBJECTIVES......................................................................................................3

4.0 – REQUIREMENT SPECIFICATIONS................................................................4

5.0 – SCOPE.................................................................................................................5

6.0 – ASSUMPTIONS..................................................................................................6

7.0 – FLOOR AND NETWORK PLANS....................................................................8

7.1 – BACKBONE NETWORK PLAN...................................................................8

7.1.1 – DNS SERVER..........................................................................................8

7.1.2 – DHCP SERVER........................................................................................8

7.1.3 – SIP SERVER.............................................................................................8

7.1.4 – BACKUP SERVER..................................................................................9

7.1.5 – EMAIL SERVER......................................................................................9

7.1.6 – PRINT SERVER.......................................................................................9

7.1.7 – ANTIVIRUS SERVER.............................................................................9

7.1.8 – DATABASE SERVER.............................................................................9

7.1.9 – FILE SERVER........................................................................................10

7.1.10 – PROXY SERVER.................................................................................10

7.1.11 – SWITCHES...........................................................................................10

v

Page 7: Networks and Networking

7.1.12 – WIRELESS ACCESS POINTS............................................................12

7.1.13 – ROUTERS.............................................................................................13

7.1.14 – FIREWALL...........................................................................................14

7.1.15 – ADSL....................................................................................................14

7.2 – GROUND FLOOR........................................................................................15

7.2.1 – FLOOR PLAN........................................................................................16

7.2.2 – NETWORK PLAN.................................................................................16

7.3 – FIRST FLOOR..............................................................................................18

7.3.1 - FLOOR PLAN.........................................................................................19

7.3.2 - NETWORK PLAN..................................................................................19

7.4 – SECOND FLOOR.........................................................................................20

7.4.1 – FLOOR PLAN........................................................................................21

7.4.2 – NETWORK PLAN.................................................................................21

7.4.4 – SERVER ROOM....................................................................................23

7.5 – THIRD FLOOR.............................................................................................26

7.5.1 – FLOOR PLAN........................................................................................26

7.5.2 – NETWORK PLAN.................................................................................26

7.6 – FOURTH FLOOR.........................................................................................29

7.6.1 – FLOOR PLAN........................................................................................29

7.6.2 – NETWORK PLAN.................................................................................29

7.7 – FIFTH FLOOR..............................................................................................32

vi

Page 8: Networks and Networking

7.7.1 – FLOOR PLAN........................................................................................32

7.7.2 – NETWORK PLAN.................................................................................32

7.8 – SIXTH FLOOR..............................................................................................34

7.8.1 – FLOOR PLAN........................................................................................34

7.8.2 – NETWORK PLAN.................................................................................34

7.9 – SEVENTH FLOOR.......................................................................................37

7.9.1 – FLOOR PLAN........................................................................................37

7.9.2 – NETWORK PLAN.................................................................................37

8.0 – BACKUP OPTIONS..........................................................................................39

8.1 – ONLINE BACKUP.......................................................................................39

8.2 – BACKUP SERVER.......................................................................................39

8.3 – NETWORK HARDWARE FAILURE.........................................................40

9.0 – TOPOLOGIES...................................................................................................41

9.1 – TREE TOPOLOGY.......................................................................................41

9.2 – STAR TOPOLOGY.......................................................................................42

10.0 – FEASIBILITY STUDY...................................................................................43

10.1 - TECHNICAL FEASIBILITY......................................................................43

10.2 - OPERATIONAL FEASIBILITY.................................................................44

10.3 – SCHEDULE FEASIBILITY.......................................................................45

10.4 – ECONOMIC FEASIBILITY.......................................................................45

11.0 – SECURITY......................................................................................................46

vii

Page 9: Networks and Networking

11.1 – FIREWALL.................................................................................................46

11.2 – PROXY SERVER........................................................................................46

11.3 – VIRTUAL LAN...........................................................................................47

11.4 – PASSWORD PROTECTED WI-FI.............................................................47

11.5 – ANTIVIRUS SERVER................................................................................47

12.0 – LIMITATIONS................................................................................................48

13.0 – CONCLUSION................................................................................................49

BIBLIOGRAPHY.......................................................................................................50

MEETING MINUTES................................................................................................52

1st MEETING..........................................................................................................52

2nd MEETING.........................................................................................................53

3rd MEETING..........................................................................................................54

4th MEETING..........................................................................................................55

5th MEETING..........................................................................................................56

6th MEETING..........................................................................................................57

7TH MEETING........................................................................................................58

viii

Page 10: Networks and Networking

TABLE OF FIGURES

Figure 1 - BACKBONE NETWORK DIAGRAM..........................................................................15

Figure 2 - GROUND FLOOR DIAGRAM...................................................................................18

Figure 3 - FIRST FLOOR DIAGRAM.........................................................................................20

Figure 4 - SECOND FLOOR DIAGRAM....................................................................................23

Figure 5 - SERVER ROOM DIAGRAM......................................................................................25

Figure 6 - THIRD FLOOR NETWORK DIAGRAMV....................................................................28

Figure 7 - FOURTH FLOOR NETWOKR DIAGRAM...................................................................31

Figure 8 - FIFTH FLOOR NETWORK DIAGRAM......................................................................33

Figure 9 - SIXTH FLOOR NETWORK DIAGRAM.......................................................................36

Figure 10 - SEVENTH FLOOR NETWORK DIAGRAM...............................................................38

Figure 11 - Tree Topology....................................................................................................41

Figure 12 - STAR TOPOLOGY...........................................................................................42

ix

Page 11: Networks and Networking

1.0 – INTRODUCTION

Seashells Colombo is a member of the internationally renowned Confifi Seashells

Group of Hotel. The management of Seashells Group have decided to set up a new

hotel in the Southern part of Sri Lanka with the tourism industry picking up.

The new hotel is named Seashells Reef and is located near the sea and is considered

a beach hotel. The hotel is a luxury and semi-luxury hotel and will be catering to the

local as well as foreign tourists.

The hotel consists of 100 rooms spread across 7 floors. The hotel also has 2 banquet

halls, restaurants, coffee shops, sales outlets, recreational areas and a VIP business

center.

With the construction of the building started, the management of Seashells group has

requested us to design a network plan for their hotel connecting all areas of the hotel

to a centralized location so as to provide services to the customers as well as to

provide a secure and efficient and fast connectivity for the management and the staff.

Considering all these aspects we have come up with this documentation providing all

the relevant plans to set up a fully secure and efficient network to the hotel. From the

type of cables to be used to the method they are to be wired along, everything has

been looked into in this documentation as well as the type of devices to be used, the

security systems in place, methods the devices are connected are all addressed in this

documentation. It should also be noted that while designing the network we have

taken note of further upgrades in the future and allowed facilities to be easily

upgraded with minimum difficulty.

1

Page 12: Networks and Networking

2.0 – ANALYSIS

Our group was assigned the task of creating a network plan for Seashells Colombo.

As a part of this project that we are undertaking the first task at hand is to identify

the problems. After this we had to do several researches into the best way to

implement the solution that we had identified for solving the requirements of

Seashell Colombo.

We analyzed the problem that we were facing and developed solutions using the

research that we had carried out. We identified after this the best and most suited

way of laying the network and the most suited hardware that would help laid a

network of the highest quality.

2

Page 13: Networks and Networking

3.0 – OBJECTIVES

The computers that the staff will be using and the computers that the guests will be

using have been set up on two different networks. At places they have been

physically separated using different hardware and at times have been virtually

separated using virtualization of networks. This is to ensure that guests cannot access

the staff network due to security issues.

Wireless networks are placed in all the floors so that users with wireless network

accessible devices can use connect to the network and use the services. The wireless

networks are primarily intended to be used by the guests and no access is given to

the staff network on the wireless networks.

More than one external connectivity methods are used, such as 3 separate ADSL

lines and 4 separate PSTN telephone lines so as to level off the load that is being put

on the network due to the size of the network. This will ensure that external

connectivity will remain smooth with less traffic interference.

A firewall has been installed to monitor all incoming traffic through the internet

while a proxy server has been installed in the network to monitor all outbound

network traffic. This is done so as to secure the networks and the inbound and

outbound traffic to provide a quality service to the guests.

The network is being designed with the intention of future upgrades in mind.

3

Page 14: Networks and Networking

4.0 – REQUIREMENT SPECIFICATIONS

The hotel has 100 guest rooms. All the guest rooms need to be wired with a RJ45

port so that guests can connect their device to the network.

Each room will also have a telephone that will be able to call any internal section of

the hotel and take outside calls through an operator.

All departments will also have computers that are also connected to the network.

A wireless network is present in all the floors to provide secure wireless connectivity

to users to access the network.

Necessary departments and the VIP business center should have network printing

facilities to be able to print from any computer in that sub network.

Adequate security measures need to be taken for data protection.

Unauthorized access to the network should be prevented.

4

Page 15: Networks and Networking

5.0 – SCOPE

To make this project of networking the hotel, there are certain aspects that we need

to consider. They are:

What kind of devices have to be used?

What kind of network needs to be used?

What are the services that will be provided in the network?

What are the security measures and standards that need to be implemented

for data protection?

What is the budget of this project?

The feasibility of this project.

Where and how devices and are to be placed in the building for and efficient

network.

5

Page 16: Networks and Networking

6.0 – ASSUMPTIONS

In this project, we have taken certain assumptions so as to make this assignment a success. They are as follows:

The network plan has been done according to a very average budget although

the hotel had not specified a budget for us to work on.

Backups are taken on the backup server only and no offsite backups are

taken.

The best possible network solution is being submitted to Seashells Group.

All the cabling and the installation will be either done by us or by certified

professionals so that the network works flawlessly.

If one external connection line (ADSL or PSTN) is down due to

malfunctioning, the rest of the lines will take over the job automatically while

the faulty line is being repaired.

The backup server will manage all the backup processes.

In the case of guest rooms, the networking is shown for only one room in

each floor. This is because all the other rooms will also have a similar

networking process done except that the cabling will change depending on

the availability at the time of cabling.

Although shown in the diagrams that there is a computer in every room, it is

not the case. Only an RJ45 port is available in each room with a spare 1m

cable in each room to connect the user’s personal devices.

The telephones shown in the diagrams are physically present in the rooms

and the guests cannot connect any other devices to those connections.

All the cabling will be done along the ceiling since we assume that there will

be a space between the concrete floors and the ceilings which allow wiring to

be done along the ceilings.

Appropriate measures are being taken to protect the cabling and the devices

and jacks so as to prevent corrosion or salt building up since the hotel is

located near the sea.

Sufficient electrical power is available at the hotel to support the core of the

network (servers and switches and other devices).

6

Page 17: Networks and Networking

The wireless access point devices are able to support the entire floor with

minimum signal drop.

No dead zones are created due to two wireless networks clashing each other.

The network plan submitted is able to meet all the requirements said by the

management.

The cable duct houses not only the network cables but also other electric

wiring of the hotel.

The devices such as switches and wireless access points are placed in safe

and secure locations when they are exposed publicly.

The cables connected to the devices, are connected to the appropriate place of

each device, and not as shown in the diagrams. (Ex. the network cable

connected to the computer is connected to the NIC of the computer and not to

the monitor or keyboard)

The Wireless networks are secured using network keys so that no user from

outside can access the network. The password to be used is widely publicized

inside the hotel so that guests can only access the network and are changed

every 90 days to keep the network secured.

Adequate IP addresses are available for a considerable number of wireless

devices to be connected.

7

Page 18: Networks and Networking

7.0 – FLOOR AND NETWORK PLANS

7.1 – BACKBONE NETWORK PLAN

The diagram shown at the end of this section shows the main backbone network plan

of the hotel. The network consists of the following devices and services used and

provided in the network.

7.1.1 – DNS SERVER

The Domain Name System (DNS) is a standard technology for managing the names

of Web sites and other Internet domains. DNS technology allows you to type names

into your Web browser and your computer to automatically find that address on the

Internet. (Mitchell, n.d.)

We use this server to manage our websites names and internet domains that goes out

from our network and comes to our network.

7.1.2 – DHCP SERVER

Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a

server to automatically assign an IP address to a computer from a defined range of

numbers configured for a given network. (University Information Technology

Services, n.d.)

The reason for using a DHCP server is to allocate a unique IP address for each

device that will be connecting up to the hotel’s network. The DHCP sever will have

to allocate a IP for all network ports in the guest rooms, administrative departments

and also for the servers and the VoIP telephone lines.

7.1.3 – SIP SERVER

Session Initiation Protocol (SIP) is a communications protocol used to create,

modify, and terminate sessions with one or more users. SIP sessions can include

voice communications, instant messaging, and multimedia applications. SIP is most

8

Page 19: Networks and Networking

widely used to initiate and terminate Voice over Internet Protocol (VOIP) calls.

(WhatIsMyIPAddress, n.d.)

We mainly use this server for voice communication.

7.1.4 – BACKUP SERVER

Sever that lets you to save your data in compressed file. From this we can relocate

the data to another computer. This server will help to ensure the safety of the hotel’s

valuable data in the case the original data is lost or gets corrupted. A backup server

should be frequently updated and backups of files taken regularly

We use this server to protect our data. And to ensure that the data is secured if

anything goes wrong in the network.

7.1.5 – EMAIL SERVER

Email Server provides the email facilities in your network.

We use this Server to provide email addresses to the staffs to communicate through

the network. From this the organizations data files and other important stuffs will be

secured when sending to others and outsides cannot access.

7.1.6 – PRINT SERVER

This Server can be a device or software that shows the print requests and print

queues.

We use this Server so any guest or staff can print their documents from a network

printer. This way we do not need to install a printer to every computer.

7.1.7 – ANTIVIRUS SERVER

We use this Server to provide the security of our network. We have used Bit

Defender Virus Guard as it is more reliable and one of the leading virus guard in the

world.

9

Page 20: Networks and Networking

7.1.8 – DATABASE SERVER

Database server is the term used to refer to the back-end system of a database

application using client/server architecture. The back-end, sometimes called a

database server, performs tasks such as data analysis, storage, data manipulation,

archiving, and other non-user specific tasks. (Webopedia, n.d.)

We use this server to maintain our database system easily.

7.1.9 – FILE SERVER

A file server is a computer responsible for the central storage and management of

data files so that other computers on the same network can access the files. A file

server allows users to share information over a network without having to physically

transfer files by floppy diskette or some other external storage device.

(SearchNetworking, n.d.)

We use file Server to transfer information inside the network without an external

device.

7.1.10 – PROXY SERVER

A server that sits between a client application, such as a Web browser, and a real

server. It intercepts all requests to the real server to see if it can fulfill the requests

itself. If not, it forwards the request to the real server. (Webopedia, n.d.)

We have used a proxy server to act as a gateway server to separate the network from

outside networks and to filter out the unwanted sites.

7.1.11 – SWITCHES

What is a Switch? Why do we use them?

A Network Switch is a hardware appliance with a fixed number of Network Ports

(RJ-45 Ports) that can connect multiple Network devices to the LAN (Local Area

Network). They are mainly used for sharing Internet connectivity between multiple

computers or sharing some network resource – like Printer or NAS Box so that they

can be accessed by all the users of the network.

10

Page 21: Networks and Networking

Layer 2 Switch and Standards we will be using:

The Layer 2 Switches are for all in to the 2nd Layer of the OSI Model and these

switches are hardware based. It can also be called as “Standard Switch” and it

required a Media Access Control Address (MAC) to identify the Source and the

Destination of the Data Packet.

Layer 2 Switch Standards

1. The 1st Standard that we use is the DES-3552 xStack it is a 48 port Layer 2

Switch.

We use this switch in Several Floors they are:

Ground floor- we use a 48 port to this floor is to connect the guest

computers, printer and the wireless access point.

2nd Floor- we use this switch to connect all the staff network

computers, the Wireless access point and the network printers.

3rd Floor- we use this switch to connect all the network computers, the

wireless access point and the network telephones.

4th Floor- we use two 48 port switches in this floor we use one switch

for the network computers and the wireless access point and the other

is for the network telephones.

5th Floor- we use this switch to connect all the network computers,

wireless access point and network telephones.

6th floor- we use this switch to connect all the network computers,

wireless access point and network telephones.

7th Floor- we use two Layer 2 Switches. We use one switch for the

network computers and the wireless access point and the other is for

the network telephones.

2. The 2nd Standard that we use is the DGS-3426P it is a 24 port Layer 2

Switch.

We use this switch in Several Floors they are:

Ground floor- We use 2 switches one is to connect all the shop

computers, Restaurant Computers and the kitchen computers. And the

other switch is to the network telephones.

11

Page 22: Networks and Networking

1st Floor- we use a switch here to connect all the network computers,

network telephones and the wireless access point.

2nd Floor- we use 2 switches one is to connect all the servers and the

other one is for the network telephones.

Layer 3 Switch and the Standards we will be using:

It’s a hardware device which operates in the network layer of the OSI Model. A layer

3 switch is separated from a router is that L3 switch contains hardware which have

been optimized to pass data as fast any layer 2 switch and they have the ability to

make decisions on how to transmit traffic and is the usual behavior of a router. A

Layer 3 Switch is also faster than a Router because of its hardware switching

capabilities.

Layer 3 Switch Standards

The standard we will be using is DGS-3650. It’s a 48 port layer 3 switch and we use

this switch as our backbone switch in our network.

7.1.12 – WIRELESS ACCESS POINTS

Wireless access points (AP or WAP) are specially configured nodes on wireless local

area networks (WLAN). Access points act as a central transmitter and receiver of

WLAN radio signals. The standard that we have used for the wireless transmission

media is DIR-330. (Mitchell, n.d.)

802.11b Standard:

An extension to 802.11 that applies to wireless LANS and provides 11 Mbps

transmission (with a fallback to 5.5, 2 and 1-Mbps) in the 2.4 GHz band. 802.11b

uses only DSSS. 802.11b was 1999 ratification to the original 802.11 standard.

802.11a Standard:

An extension to 802.11 that applies to wireless LANs and provides up to 54-Mbps in

the 5GHz band. 802.11a uses an orthogonal frequency division multiplexing

encoding scheme rather than FHSS or DSSS.

12

Page 23: Networks and Networking

802.11g Standard:

It applies to wireless LANs and is used for transmission over short distances at up to

54-Mbps in the 2.4 GHz bands.

802.11n Standard:

 802.11n builds upon previous 802.11 standards by adding multiple-input multiple-

output (MIMO). The additional transmitter and receiver antennas allow for increased

data throughput through spatial multiplexing and increased range by exploiting the

spatial diversity through coding schemes like Altamonte coding. The real speed

would be 100 Mbit/s (even 250 Mbit/s in PHY level), and so up to 4-5 times faster

than 802.11g.

From these Standards we use the 802.11.n because it’s the latest technology in

wireless access point. (Webopedia, n.d.)

7.1.13 – ROUTERS

It is a device that sends data packet along the network. It’s used to connect two or

more networks together. They are located at the gateways where two or more

networks connected. And it keeps the critical devices data flowing between networks

and keeps the networks connected to the internet.

The main advantages of a router are:

It limits the collision domain. It can connect to different architectures and media. It can function on WAN and LAN. It can filter the broadcast. It can determine the best path for the data reach.

(AllInterview.com, n.d.)

In our network we have 8 routers. Every floor we have put a router to access internet wirelessly. And we are having a ADSL router to get the internet connection.

13

Page 24: Networks and Networking

7.1.14 – FIREWALL

It’s a system that is designed to prevent from unauthorized access to or from a

private network. It can implement in both hardware or software or a combination of

the both. It is usually used to prevent unauthorized internet users from private

networks connected to the internet, especially intranets. (Webopedia, n.d.)

What do firewalls do?

The most basic type firewall performs Packet Filtering. A second type of firewall, which provides additional security, is called

Circuit Relay. Another and still more involved approach is the Application Level Gateway.

(PC-Help, n.d.)

7.1.15 – ADSL

The definition of ADSL is Asymmetric Digital Subscriber Line. It’s a type of a DSL

communication technology used to connect internet. This allows more data to send

over existing copper telephone lines (POTS) when we compared to the traditional

modem lines. A special filter called microfilter in installed on a subscriber’s

telephone line to allow both ADSL and regular voice services to be used at the same

time. ADSL requires a special ADSL modem and subscribers must be in close

geographical locations to the provider's central office to receive ADSL service.

Typically this distance is within a radius of 2 to 2.5 miles. ADSL supports data rates

of from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and from

16 to 640 Kbps when sending data (known as the upstream rate). (Webopedia, n.d.)

Advantages of ADSL

It can use higher data rate of 26mbps maximum wherever possible. It uses a normal telephone lines. And it is easy to start using ADSL. We can use modem and telephone simultaneously using the ADSL splitter. ADSL modems are cheap and anyone can afford it. It’s always on connection.

(Tuning 2.0, n.d.)

14

Page 25: Networks and Networking

BACKBONE DIAGRAM

Figure 1 - BACKBONE NETWORK DIAGRAM

15

Page 26: Networks and Networking

7.2 – GROUND FLOOR

7.2.1 – FLOOR PLAN

The ground floor is one of the important floors of the hotel. This is because the floor

will be one of the busiest floors in terms of guests. The floor consists of a lobby area,

sales outlets, restaurant, reception plus the VIP business center. The ground floor is

where most of the guests will be using the networks compared to the other floors.

The cable duct is situated in the top left corner of the building and is in the same

position in all the floors. The cable duct is used to send cables vertically along all the

floors so that they are not seen outside to the visitors of the hotel.

7.2.2 – NETWORK PLAN

As said in the floor plan description, this floor is the busiest floor in the hotel. So we

have strategically networked this floor so that the different sections are separated.

This floor has 2 separate network switches in place. One switch is for all the

computers that the staff will be using. A 24 port Layer 2 switch is being used in this

case. Only 15 machines are connected to this switch. The rest of the ports are kept so

that they can be used if more computers are added to the network in the future as an

upgrade option. A separate switch is being used in this case instead of using a large

port number switch and connecting the other PC’s also is to separate the staff

network from the guest network due to security reasons. A Virtual LAN (VLAN) can

also be used but was not used in this instance as the guest network in the ground

floor is for the VIP center only and that has been put separately on a single switch.

The second switch used in this floor is for the VIP Business Center and for the

telephone network. A 48 port Layer 2 switch is being used in this case and is

virtually broken into two networks using VLAN thereby separating the computer

network and the VoIP Telephone network. The computer network from this switch is

used by guests only and more exclusively by the VIP Business Club users.

In addition to these, we also suggest that a wireless network access point be set up in

this floor. Wireless network connectivity is a very necessary requirement in the

16

Page 27: Networks and Networking

current era with almost every modern mobile communication device being able to

connect to a wireless network. With the wireless access point, guests especially in

the lobby area and the restaurant area plus any guest in the whole of the ground floor

can connect to the wireless network of the hotel using a communication device and

access the services provided by the hotel.

17

Page 28: Networks and Networking

GROUND FLOOR DIAGRAM

Figure 2 - GROUND FLOOR DIAGRAM

18

Page 29: Networks and Networking

7.3 – FIRST FLOOR

7.3.1 - FLOOR PLAN

The first floor has four main rooms. These rooms are the diamond banquet hall, the

Rainbow banquet hall, the banquet office and service department and the banquet

kitchen.

7.3.2 - NETWORK PLAN

This floor consists of only six machines, three telephones and one wireless access

point. The floor also has only one 12 port Layer 2 Switch since there are very few

connections that are required. The ports in this switch have been separated into three

Virtual Local Area Networks (VLAN).

The VLAN has been divided in such a manner to accommodate the telephone

network, the Wireless Access Point (WAP) network and the first floor computer

responsible for the administrative work in that floor. The purpose of dividing the

network in such a manner is so that the WAP which is accessible to the guests will

not leave the administrative network vulnerable to any external party.

The Banquet halls’ only means of access to the internet is via the WAP that is

located in the center of the floor. This is to provide any guest who is in the either of

the halls or the lobby to access to internet browsing using any device that has a

wireless adapter.

The banquet office and service department has five computers that will allow the

employees in this department to maintain their databases and information files.

These computers will be linked up to the Layer 2 switch that is in the floor to their

corresponding VLAN. This room also has two (2) Voice over IP (VoIP) telephone

links also connected to the floors switch. This will allow the persons in this

department to communicate with other departments or to any other telephone line.

19

Page 30: Networks and Networking

FIRST FLOOR DIAGRAM

Figure 3 - FIRST FLOOR DIAGRAM

20

Page 31: Networks and Networking

7.4 – SECOND FLOOR

7.4.1 – FLOOR PLAN

The second floor of the building is the most important floor of the hotel in terms of

administration since most of the administrative sections of the hotel are located in

this floor. The floor is divided into different sections to house different departments

and in some cases prominent individuals such as the Managing Director and the

General Manager etc.

The floor also is home to the Server Room which houses all the servers and other

network equipment of the hotel. Along with the Server Room is the IT Department.

Access to the Server Room is given through the IT Department only so that no

unauthorized access is done to the Server Room.

In addition to all the departments and offices in the floor, a small lobby area is also

available in the middle of the floor for visitors of the offices.

7.4.2 – NETWORK PLAN

As said above, this floor is the administrative capital of the hotel. Most of the hotels

administration is done in this floor. This floor consists of 3 Layer 2 switches and 1

Layer 3 switch which will be the main backbone switch of the hotel.

The first Layer 2 switch used in this floor is to connect all the computers used in the

various departments of the floor. A 48 port Layer 2 switch is being used in this

instance and is broken into several VLAN’s to accommodate the different

departments in the floor. The reason why the different departments are separated into

VLAN’s is because of data security so that one department cannot access the

network of another department. One port in the switch has been made into a separate

VLAN so as to accommodate the wireless access point that is available in this floor.

The wireless access point is a public network so it is put into a separate network to

isolate it from the other networks.

21

Page 32: Networks and Networking

The second switch used in this floor is for the VoIP telephone network. Since all the

telephones are connected to just one network, no separate sub networks are being

made for this network and all telephone lines are connected to one switch.

The other Layer 2 switch used in this floor is the switch for the server room to

connect all the servers. More detailed description of the server room and the network

of the server room are given below.

22

Page 33: Networks and Networking

SECOND FLOOR DIAGRAM

Figure 4 - SECOND FLOOR DIAGRAM

23

Page 34: Networks and Networking

7.4.4 – SERVER ROOM

The Server Room is the most important section of the hotel when it comes to

networking since it houses all the important networking equipment of the hotel. A

detailed diagram of the server room is given below.

The server room contains two main switches. One is a 24 Port Layer 3 switch which

connects all the servers in the room together to form one sub network. Although only

10 different servers are available, a larger number port switch is being used so that if

in the future for any upgrades, they can be done easily.

The other switch in the Server Room is the 24 port Layer 3 Main Backbone Switch.

This is the main switch of the hotel and all other small switches and external

connection devices (Ex. ADSL Router) are connected to this switch. Only one Layer

3 switch is used in the hotel due to the cost involved and all other switches used in

the system are layer 2 switches which will serve the purpose of networking the hotel.

As shown in the diagram, 3 ADSL connections are to be taken. The 3 connections to

be taken are the package named “Web Master” from Sri Lanka Telecom. Each

package comes with a 4Mbps Download Speed and a 512Kbps Upload Speed with a

60 GB threshold Volume per month. A Static IP is also given to every connection

that is obtained. The 3 ADSL connections are then connected to a Load Balancer.

From the load balancer the connection is given to the Firewall which will filter the

incoming and outgoing network traffic and then allow the connections to the pass

through to the ADSL Router which is then connected to the Main Layer 3 Backbone

Switch.

Also as specified earlier, we suggest that a VoIP telephone network be used for the

internal telephone network. For this, a Digital PABX Device is installed in the Server

Room to which 4 Separate PSTN Telephone Connections are connected to. The

PSTN Connections are obtained from Sri Lanka Telecom. From the Digital PABX

Device the line is then connected the Main Layer 3 Backbone Switch which will then

route connections as required.

24

Page 35: Networks and Networking

SERVER ROOM DIAGRAM

Figure 5 - SERVER ROOM DIAGRAM

25

Page 36: Networks and Networking

7.5 – THIRD FLOOR

7.5.1 – FLOOR PLAN

The third floor has eighteen bed rooms, a mini restaurant and a recreational area.

This floor has a cable duct from which the network cables for the floor are pulled.

This floor’s network utilization will be limited to the occasional use by a guest and

the major contributor for network activity will be the restaurant and the recreational

area.

7.5.2 – NETWORK PLAN

This floor will have 20 network ports, 20 telephone lines and wireless access point.

These devices will be connected to one 48 port Layer 2 switch to connect all the

network cables. The floor’s switch will be broken in to three VLAN to help the hotel

maintain security.

The purpose of breaking the switch in this manner is to make the network traffic

coming from the restaurant and the recreational area separate from the normal guest

network. This will help in maintaining network security as one network cannot

access the other network. Also a separate network is placed for the telephone lines.

The wireless access point will be connected up to the VLAN separated for the guests.

In this floor as mentioned above there are 18 guest rooms. In each of these rooms

there will be placed a network port and a telephone line. Each of the rooms will be

networked in the same manner and will use up 18 of the networks ports used in the

floor and 18 of the telephone lines that are provided for the floor. These network

ports will be connected to the VLAN allocated for the guests in the floor’s switch

and the telephone lines will be connected to their respective VLAN ports.

The wireless access point on this floor is places in the center of the floor to allow all

the guests to access the internet with any device containing a wireless adapter. This

will also be connected to the guest VLAN in the floor’s switch.

26

Page 37: Networks and Networking

The mini restraint and recreational are of floor have each one network port and one

telephone line. The network port will be used to maintain their records and inventory

and therefore will be in a separate VLAN. This will allow for higher security for the

administrative work of the hotel.

All telephone networks will be using a VoIP to communicate internally and also with

the any outside line via the VoIP server.

27

Page 38: Networks and Networking

THIRD FLOOR DIAGRAM

Figure 6 - THIRD FLOOR NETWORK DIAGRAMV

28

Page 39: Networks and Networking

7.6 – FOURTH FLOOR

7.6.1 – FLOOR PLAN

The fourth floor has twenty five bed and the Room Service Department. This floor

has a cable duct from which the network cables for the floor are pulled.

This floor’s network utilization will be limited to the occasional use by a guest and

the major contributor for network activity will be the restaurant and the recreational

area.

7.6.2 – NETWORK PLAN

This floor will have 26 network ports, 26 telephone lines and wireless access point.

These devices will be connected to two 48 port Layer 2 switches one for the VoIP

telephone lines and one for the floors network ports. The floor’s switch for the

network ports will be broken into two VLAN to ensure hotel security.

The purpose of breaking the switch in this manner is to make the network traffic

coming from the normal guest network and the traffic from the Room Service

Department separate. This will help in maintaining network security as one network

cannot access the other network. The wireless access point will be connected up to

the VLAN separated for the guests in the in the switch used for the network ports.

In this floor as mentioned above there are 25 guest rooms. In each of these rooms

there will be placed a network port and a telephone line. Each of the rooms will be

networked in the same manner and will use up 25 of the networks ports used in the

floor and 25 of the telephone lines that are provided for the floor. These network

ports will be connected to the VLAN allocated for the guests in the floor’s switch

and the telephone lines will be connected to their respective switch.

The wireless access point on this floor is places in the center of the floor to allow all

the guests to access the internet with any device containing a wireless adapter. This

will also be connected to the guest VLAN in the floor’s switch for the network ports.

The Room Service Department will have one network port and one telephone line.

The network port will be used to maintain their records and inventory and therefore

29

Page 40: Networks and Networking

will be in a separate VLAN. This will allow for higher security for the administrative

work of the hotel.

All telephone networks will be using a VoIP to communicate internally and also with

the any outside line via the VoIP server.

30

Page 41: Networks and Networking

FOURTH FLOOR DIAGRAM

Figure 7 - FOURTH FLOOR NETWOKR DIAGRAM

31

Page 42: Networks and Networking

7.7 – FIFTH FLOOR

7.7.1 – FLOOR PLAN

In this floor there are 18 guest rooms, one House keeping Department and a Laundry

is available.

7.7.2 – NETWORK PLAN

For each guest room there will be a network port that will allow the guest to access

internet through the network and each guest room will be having a telephone to

communicate with the reception or name a call to an outside telephone.

There will be 2 network computers to the House keeping department to handle their

file data and access to the internet. And also there will be 2 telephone connected to

this department to call to other departments, reception or to call an outside telephone.

There will be 1 network computer to the laundry to handle their file data and access

to the internet. And also there will be a telephone connected to this department to

call to other departments, reception or to call an outside telephone.

There will be a wireless access point also in this floor. This wireless access point is

in the center of the floor to get the whole floor covered from the wireless network.

From this guests or the staffs can access internet from any device that can access

internet wirelessly.

For this floor we have put a 48 port layer 2 switches. In this we have divided this in

to 3 VLAN. 1st VLAN is to the guest rooms Network ports and wireless access

point.2nd VLAN is to the Housekeeping department and Laundry Network

computers.3rd VLAN is to the guest room, Housekeeping department and laundry

telephones.

We divide guest rooms and wireless access point VLAN from Housekeeping

department and Laundry VLAN because to keep the department files and data

secured. And no one cannot access to the department network.

32

Page 43: Networks and Networking

33

Page 44: Networks and Networking

FIFTH FLOOR DIAGRAM

Figure 8 - FIFTH FLOOR NETWORK DIAGRAM

34

Page 45: Networks and Networking

7.8 – SIXTH FLOOR

7.8.1 – FLOOR PLAN

In this floor there are 9 guest rooms, a purchasing department, Engineering

department and stores are available.

7.8.2 – NETWORK PLAN

For each guest room there will be a network port that will allow the guest to access

internet through the network and each guest room will be having a telephone to

communicate with the reception or name a call to an outside telephone.

There will be 6 network computers to the purchasing department to handle their file

data and access to the internet. And also there will be 2 telephone connected to this

department to call to other departments, reception or to call an outside telephone.

And there will be 4 network computers to the Stores to handle their file data and

access to the internet. And also there will be 2 telephone connected to this

department to call to other departments, reception or to call an outside telephone.

And also there will be 2 network computers to the Engineering department to handle

their file data and access to the internet. And also there will be 2 telephone connected

to this department to call to other departments, reception or to call an outside

telephone.

And will be a wireless access point also in this floor. This wireless access point is in

the center of the floor to get the whole floor covered from the wireless network.

From this guests or the staffs can access internet from any device that can access

internet wirelessly. In the lobby area there is no network computer available for the

guests or staffs. So only way they can browse internet is through wireless access

point.

For this floor we have put a 48 port layer 2 switches. In this we have divided this in

to 3 VLAN.

35

Page 46: Networks and Networking

1st VLAN is to the guest rooms Network ports and wireless access point.

2nd VLAN is to the purchasing department, stores and Engineering department

Network computers.

3rd VLAN is to the guest room, purchasing department, stores and Engineering

department telephones.

We divide guest rooms and wireless access point VLAN from department, stores and

Engineering department VLAN because to keep the department files and data

secured. And no one cannot access to the department network.

36

Page 47: Networks and Networking

SIXTH FLOOR DIAGRAM

Figure 9 - SIXTH FLOOR NETWORK DIAGRAM

37

Page 48: Networks and Networking

7.9 – SEVENTH FLOOR

7.9.1 – FLOOR PLAN

In this floor there are 30 guest rooms are available.

7.9.2 – NETWORK PLAN

For each guest room there will be a network port that will allow the guest to access

internet through the network and each guest room will be having a telephone to

communicate with the reception or name a call to an outside telephone.

There will be a wireless access point also in this floor. This wireless access point is

in the center of the floor to get the whole floor covered from the wireless network.

From this guests or the staffs can access internet from any device that can access

internet wirelessly.

For this floor we have put two 48 port layer 2 switches.

The 1st layer 2 switch is for the guest rooms Network ports and wireless access point.

The 2nd layer 2 switch is for the VoIP Telephone.

We use 2 switches here because there are 30 computer network ports and 30

telephones so we cannot VLAN one switch in to two. Because our layer 2 switch

have only 48 ports. So we need 2 layer 2 switches. One is for the guest rooms and

wireless access point and the other one is for the VoIP telephones.

38

Page 49: Networks and Networking

SEVENTH FLOOR DIAGRAM

Figure 10 - SEVENTH FLOOR NETWORK DIAGRAM

39

Page 50: Networks and Networking

8.0 – BACKUP OPTIONS

In a network, backup options are vital since during a network failure or during an

unforeseen event the data is destroyed, the backups help in bringing the network

back to the previous situation at the time the last backup was taken.

In our network, there are two different backup options which are

• Online backup

• Backup server

8.1 – ONLINE BACKUP

An online backup is where the data is backed up into an online location. And in the

event of a disaster, can be easily retrieved by the system administrator and used to

revive the network.

Online backups are safe and reliable since they are hosted at an unknown location

and offsite so any unauthorized personal intending to destroy the data in the network

will find it hard to find the backups to destroy them.

Another reason why online backups are being used is because it’s less work for the

staff of the hotel. The staff would not need to constantly keep monitoring the backup

process as it will be automatically done and be done all the time. Also the backups

will be encrypted so that unless the decryption code is known, the backups cannot be

accessed. Also the system administrator or the person who has the privileges to

access the backups can access it from anywhere in the world with an internet

connection if they need to.

8.2 – BACKUP SERVER

The backup server is used for onsite backup purposes. The backup server will

primarily backup all the data on the servers in the hotel on an hourly basis. Rules

have been set in the server so as to delete backup files that are more than a few

40

Page 51: Networks and Networking

numbers of days old so that the latest backups are available and old backups are

deleted as they are obsolete.

8.3 – NETWORK HARDWARE FAILURE

In the event of a hardware failure in the network such as a switch or a router or

cables, we have suggested that backup devices are kept on standby in the store room

of the hotel so they can be used in the event of a need. It is recommended that 2

Layer 2 switches, 2 wireless routers, few meters of cables of the types used be kept

and be used during an emergency situation while the faulty device can be repaired

and or replaced. This way it is ensured that the network is alive all the time. Also

network monitoring software installed in the system administrators computers will

indicated as soon as a network device fails so that they can be replaced as soon as

possible.

41

Page 52: Networks and Networking

9.0 – TOPOLOGIES

9.1 – TREE TOPOLOGY

The network for Seashell-Reef has been laid using two distinct topologies. The first

topology is a tree topology. This topology is a collection of both bus and star

topologies. In a tree topology there is a main backbone cable which acts as the trunk

of the tree and from this smaller networks go out to form the branches of the this tree

topology. A drawback however with the tree topology is that the central backbone

cable fails the entire network will fail along with it. Tree topology is illustrated

further in the diagram given bellow.

We have used the Tree topology to lay the switches going from the main Backbone

switch to the separate switches in each floor. The main line runs form the ground

floor all the way up to the top floor and in each floor a line is taped from the main

line and then taken to the separate smaller sub networks which have been laid in the

second topology that we have used which is Star topology.

The telephone networks are also placed in the same topological order as the

computer networks. There is a main line that goes to all the floors and it is from this

main line that all the other branches are taken.

Figure 11 - Tree Topology

42

Page 53: Networks and Networking

43

Page 54: Networks and Networking

9.2 – STAR TOPOLOGY

The way in which this topology is laid is that where all the computers are connected

to one central hub. This method provides great advantages such that if a fault occurs

in one area it is easy to identify it and repair the damaged area without disrupting the

flow of information to the other networks. A disadvantage however is that if the

central hub device fails then the entire network in that branch will fail. The star

topology is explained further in the illustration given bellow.

Figure 12 - STAR TOPOLOGY

Where the star topology is found in our network is where in each floor the network

cables are drawn out from the central switch to the network ports. This is how the

star topology has been implemented. This topology is executed in each of the floors

with guest bed rooms and also in the VIP centre and the other administrative

departments.

In each floor the telephone lines also taken in a star topological manner. All the

telephone lines are connected to one central switch and get distributed out over the

floor from that point. (University of South Florida, n.d.)

44

Page 55: Networks and Networking

10.0 – FEASIBILITY STUDY

10.1 - TECHNICAL FEASIBILITY

Seashell Reef is a new hotel that is being built up and therefore does not already

contain the required hardware to implement a communication network. Therefore the

network will have to be laid from the beginning.

The technical expertise needed for laying the network will be provided by our

company. However after the network has been laid and the hotel is functioning on a

daily basis, Seashell Reef will require a small team of trained professionals to

maintain and operate the network system. This team can be provided by our

company or can be hired from outside and will work under the management at

Seashell – Reef.

The technology required for this network is readily available in the open market and

can be purchased at any moment. The hardware that this network requires will be

bought from D-Link Corporation.

45

Page 56: Networks and Networking

10.2 - OPERATIONAL FEASIBILITY

The new network system that we have developed uses high quality and high end

hardware devices that will allow for a faster and more efficient system. The cabling

that will be user is Shielded Twisted Pair (STP) cables. This along with the high

quality hardware devices will provide for a faster network system.

This system will cost a fairly high amount as we shall be using high end products

and will be focusing on quality rather than the price of the product. However the

products will not be over priced and will not waste any of Seashell–Reef’s monetary

resources.

In this network system to ensure the highest security for the company we have

ensured that the administrative network will not be visible to the guests and they

have been kept separate using a virtual Local Area Network (VLAN). This works in

the manner that the ports have been internally configured in a way that guests ports

cannot see the administrative ports or vice versa, in effect virtually breaking the

switch into 2 separate switches. This will allow Seashell-Reef to maintain a very

high level of security.

This network also has been laid using several switches and a in every floor several

ports in each switch have been left free to allow for the network to grow and expand.

This way new switch can be added in and the floor will be able to accommodate

more network cables.

46

Page 57: Networks and Networking

10.3 – SCHEDULE FEASIBILITY

The General Manager at Seashell-Reef has given our company a period or one year

to complete the laying of the network for the hotel. This time period is more than

adequate to complete the task that has been presented to us. Our team feels confident

that we can accomplish the task at hand well within the given time duration.

10.4 – ECONOMIC FEASIBILITY

For the purpose of laying the network for Seashell-Reef we have finalised that all

required hardware products will be purchased from D-Link Corporation. D-Link is

and internationally recognised company for its high quality products and services.

This makes their products high priced but this is due to their products quality and

durability.

A list of some of the products that we will be obtaining is given bellow. The prices

have been given in US Dollars and have been converted to Sri Lankan Rupees at a

rate of 1$ = 110LKR.

Product PriceThe DGS-3650 48-port Managed Layer 3 switch LKR 342,973/=DES-3552 xStack 48-port Managed Layer 2 switch LKR 109,927/=DGS-3426P 24-port Managed Layer 2 switch LKR 102,232/=DIR-330 WIRELESS G VPN ROUTER, 4-PORT 10/100 SWITCH

LKR 12,091/=

The above are the unit prices for several vital products that we would be using in the

network for Seashell-Reef. We would be acquiring several of these above mentioned

products along with more products also from d-Link Corporation.

(NewEgg, n.d.)

(D-Link, n.d.)

(D-Link, n.d.)

(D-Link, n.d.)

47

Page 58: Networks and Networking

11.0 – SECURITY

One of the main objectives while creating this network is the security. It was

requested by the clients that the network should be secured so that their private data

is not compromised and any unauthorized access is not allowed into the network.

With these aspects in mind we have implemented the following security strategies in the network to make the network safe and secure.

• Firewall• Proxy Server• Virtual LAN• Password protected Wi-Fi• Antivirus Server

11.1 – FIREWALL

A system designed to prevent unauthorized access to or from a private network.

Firewalls can be implemented in both hardware and software, or a combination of

both. Firewalls are frequently used to prevent unauthorized Internet users from

accessing private networks connected to the Internet, especially intranets. All

messages entering or leaving the intranet pass through the firewall, which examines

each message and blocks those that do not meet the specified security criteria.

(Webopedia, n.d.)

In our network, we have implemented one hardware based firewall. The firewall is

placed between the Load Balancer and the Router so that all incoming traffic from

any one of the 3 ADSL lines are first filtered from unauthorized access before being

allowed to the Router to be allowed into the private network of the hotel.

11.2 – PROXY SERVER

A proxy server is being installed in our network so that the outbound traffic is

filtered before it leaves the private network of the hotel. A hardware based proxy

server is installed in the network whereas all outbound traffic is first routed to the

proxy server and then if permitted will be allowed to leave the network.

48

Page 59: Networks and Networking

Description of the proxy server is given in the servers section.

11.3 – VIRTUAL LAN

A network of computers that behave as if they are connected to the same wire even

though they may actually be physically located on different segments of a LAN.

VLANs are configured through software rather than hardware, which make them

extremely flexible. One of the biggest advantages of VLANs is that when a computer

is physically moved to another location, it can stay on the same VLAN without any

hardware reconfiguration. (Webopedia, n.d.)

In our network, we have extensively implemented VLAN’s so as to reduce the cost

involved in having additional hardware. For this purpose, all the switches that we

have used throughout the network are Managed Switches so that the ports can be

Managed and broken into separate sub networks for VLAN’s to be created.

Advantage of doing this is that one network cannot access the other network

although they are in the same switch which makes it easier to separate the staff and

the guest networks.

11.4 – PASSWORD PROTECTED WI-FI

The hotel consists of 8 different Wireless network access points covering the whole

building. Since wireless networks without passwords can be accessed by any one, we

have decided to protect the networks using passwords. Any guest connecting to the

wireless network of the hotel will have to enter a network key or password to

connect to the network. It is also recommended that the password be changed by the

system administrators every certain number of days so as to keep the network

protected.

11.5 – ANTIVIRUS SERVER

The antivirus server is installed for two purposes. One is to provide antivirus options

to all the staff used computers in the network. The other is to protect the network

from any virus’s spreading by monitoring the network and eliminating such viruses

so that they don’t affect the network.

A detailed description of the Antivirus Server is given in the Servers section.

49

Page 60: Networks and Networking

50

Page 61: Networks and Networking

12.0 – LIMITATIONS

Although provisions have been made for further upgrades in the future,

extensive upgrades will require considerable investment as new equipment

will have to be obtained.

Access to the network is available on two levels only. If more user access

levels need to be added, the network will have to be reconfigured as a whole.

The staff and guest network are not physically separated in certain instances

thereby posing a small security threat. If a very knowledgeable hacker gets

into the network, he might be able to access the staff network from the guest

network.

51

Page 62: Networks and Networking

13.0 – CONCLUSION

The task that was presented to us was to create a communication network for

Seashell Colombo’s newest hotel Seashell-Reef. For this network the management of

Seashell Colombo have required that the system be of the highest standards and have

to be able to provide efficiency, security, speed and reliability.

To ensure this our team has conducted extensive research into the products that are

available in the market and have selected the most suitable of these products that

comply with the requirements that have been specified by the client.

Products have all been bought from D-Link Corporation to ensure that the products

that are used in the network are fast, reliable and durable. For this we have not

compromised on cost when it came to purchasing of the best quality products.

Also the entire team performed professionally and contributed their fullest efforts

into ensuring that the system was developed to the required standards.

52

Page 63: Networks and Networking

BIBLIOGRAPHY

AllInterview.com, n.d. Networking All Other. [Online] Available at: http://www.allinterview.com/showanswers/60080.html [Accessed 21 Aug 2011].

D-Link, n.d. DES-3228PA. [Online] Available at: http://www.dlink.com/products/?pid=644 [Accessed 21 Aug 2011].

D-Link, n.d. DES-3552. [Online] Available at: http://www.dlink.com/products/?pid=800 [Accessed 21 Aug 2011].

D-Link, n.d. DIR-330. [Online] Available at: http://www.dlink.com/products/?pid=564 [Accessed 21 Aug 2011].

Mitchell, B., n.d. access point, wireless. [Online] Available at: http://compnetworking.about.com/cs/wireless/g/bldef_ap.htm [Accessed 21 Aug 2011].

Mitchell, B., n.d. What Is a DNS Server? [Online] Available at: http://compnetworking.about.com/od/dns_domainnamesystem/f/dns_servers.htm [Accessed 21 Aug 2011].

NewEgg, n.d. D-Link DGS-3650. [Online] Available at: http://www.newegg.com/product/product.aspx?Item=N82E16833127344&CMP=AFC-C8Junction&nm_mc=AFC-C8Junction&cm_mmc=AFC-C8Junction-_-na-_-na-_-na&AID=10440897&PID=1796839&SID=10204226 [Accessed 21 Aug 2011].

PC-Help, n.d. What is a firewall? [Online] Available at: http://www.pc-help.org/www.nwinternet.com/pchelp/security/firewalls.htm#proxy [Accessed 21 Aug 2011].

SearchNetworking, n.d. file server. [Online] Available at: http://searchnetworking.techtarget.com/definition/file-server [Accessed 21 Aug 2011].

Tuning 2.0, n.d. ADSL Technology for Faster Internet Speeds. [Online] Available at: http://www.tuning.co.in/adsl-technology-for-faster-internet-speeds/ [Accessed 21 Aug 2011].

University Information Technology Services, n.d. Indian University - University Information Technology Services. [Online] Available at: http://kb.iu.edu/data/adov.html [Accessed 21 Aug 2011].

University of South Florida, n.d. What is a Topology? [Online] Available at: http://fcit.usf.edu/network/chap5/chap5.htm [Accessed 21 Aug 2001].

Webopedia, n.d. 802.11. [Online] Available at: http://www.webopedia.com/TERM/8/802_11.html [Accessed 21 Aug 2011].

53

Page 64: Networks and Networking

Webopedia, n.d. ADSL. [Online] Available at: http://www.webopedia.com/TERM/A/ADSL.html [Accessed 21 Aug 2011].

Webopedia, n.d. database server. [Online] Available at: http://www.webopedia.com/TERM/D/database_server.html [Accessed 21 Aug 2011].

Webopedia, n.d. firewall. [Online] Available at: http://www.webopedia.com/TERM/F/firewall.html [Accessed 21 Aug 2011].

Webopedia, n.d. firewall. [Online] Available at: http://www.webopedia.com/TERM/F/firewall.html [Accessed 21 Aug 2011].

Webopedia, n.d. proxy server. [Online] Available at: http://www.webopedia.com/TERM/P/proxy_server.html [Accessed 21 Aug 2011].

Webopedia, n.d. VLAN. [Online] Available at: http://www.webopedia.com/TERM/V/VLAN.html [Accessed 21 Aug 2011].

WhatIsMyIPAddress, n.d. What is IPv6? [Online] Available at: http://whatismyipaddress.com/sip [Accessed 21 Aug 2011].

54

Page 65: Networks and Networking

MEETING MINUTES

1st MEETING

Meeting/Project Name: Meeting 1Date of Meeting: 05th July 2011 Time: 03.30 pmMinutes Prepared By: Deshan Ilangakoon Location: APIIT Cafeteria1. Meeting ObjectiveTo identify the requirement that has been specified by the client and assign initial work2. Attendance at Meeting

Present AbsentAhamed Nishadh (CB004081)Deshan Ilangakoon (CB004041)Dilshan Zuhdi (CB004150)

3. Agenda and Notes, Decisions, IssuesTopic Owner Time

Identify the problem that was presented to us and try to find suitable solution for prevailing problem.

Ahamed NishadhDeshan IlangakoonDilshan Zuhdi

03.30pm

Handling the meeting minutes and the Gantt chart

Deshan Ilangakoon 04.00pm

4. Action ItemsAction Owner Due Date

Create Gantt chart Deshan Ilangakoon 07/07/2011

Initial researchAhamed NishadhDeshan IlangakoonDilshan Zuhdi

10/70/2011

5. Next Meeting (if applicable)Date: 11/07/2011 Time: 03.30pm Location: APIIT CafeteriaObjective: Planning requirement specification

…………………………………

.

Group Leader

………………………………….

Lecturer

55

Page 66: Networks and Networking

2nd MEETING

Meeting/Project Name: Meeting 2Date of Meeting: 11th of July 2011 Time: 03.30 pmMinutes Prepared By: Deshan Ilangakoon Location: APIIT Cafeteria1. Meeting ObjectiveAllocate task of requirement gathering2. Attendance at Meeting

Present AbsentAhamed Nishadh (CB004081)Deshan Ilangakoon (CB004041)Dilshan Zuhdi (CB004150)

3. Agenda and Notes, Decisions, IssuesTopic Owner Time

All group members were assigned the task of gathering information for the planned solution

Ahamed NishadhDeshan IlangakoonDilshan Zuhdi

03.30 pm

4. Action ItemsAction Owner Due Date

Find information regarding the requirements for the network to be designed.

Ahamed NishadhDeshan IlangakoonDilshan Zuhdi

15/07/2011

5. Next Meeting (if applicable)Date: 18/07/2011 Time: 05.00pm Location: APIIT CafeteriaObjective: Start Research

…………………………………

.

Group Leader

………………………………….

Lecturer

56

Page 67: Networks and Networking

3rd MEETING

Meeting/Project Name: Meeting 3Date of Meeting: 18th July 2011 Time: 05.00 pmMinutes Prepared By: Deshan Ilangakoon Location: APIIT Cafeteria1. Meeting ObjectiveStart work on research2. Attendance at Meeting

Present AbsentAhamed Nishadh (CB004081)Deshan Ilangakoon (CB004041)Dilshan Zuhdi (CB004150)

3. Agenda and Notes, Decisions, IssuesTopic Owner Time

Each member was to carry out research on a specific hardware that would be used in the network that was to be laid.

Ahamed NishadhDeshan IlangakoonDilshan Zuhdi

05.00 pm

Check on work allocated during previous meeting

Ahamed Nishadh 05.15 pm

4. Action ItemsAction Owner Due Date

Hardware research Ahamed NishadhDeshan IlangakoonDilshan Zuhdi

15/07/2011

5. Next Meeting (if applicable)Date: 26/07/2011 Time: 03.30 pm Location: APIIT CafeteriaObjective: Network panning

…………………………………

.

Group Leader

………………………………….

Lecturer

57

Page 68: Networks and Networking

4th MEETING

Meeting/Project Name: Meeting 4Date of Meeting: 26th July 2011 Time: 03.30 pmMinutes Prepared By: Deshan Ilangakoon Location: APIIT Cafeteria1. Meeting ObjectiveStart work on network plan2. Attendance at Meeting

Present AbsentAhamed Nishadh (CB004081)Deshan Ilangakoon (CB004041)Dilshan Zuhdi (CB004150)

3. Agenda and Notes, Decisions, IssuesTopic Owner Time

Designing floor plan and network diagram for company.

Ahamed NishadhDeshan IlangakoonDilshan Zuhdi

03.30 pm

Check on work allocated during previous meeting.

Ahamed Nishadh 03.45 pm

4. Action ItemsAction Owner Due Date

Develop the floor plan and network diagram. Ahamed NishadhDeshan IlangakoonDilshan Zuhdi

08/08/2011

5. Next Meeting (if applicable)Date: 08/08/2011 Time: 03.30 pm Location: APIIT CafeteriaObjective: Start on documentation

…………………………………

.

Group Leader

………………………………….

Lecturer

58

Page 69: Networks and Networking

5th MEETING

Meeting/Project Name: Meeting 5Date of Meeting: 08th August 2011 Time: 03.30 pmMinutes Prepared By: Deshan Ilangakoon Location: APIIT Cafeteria1. Meeting ObjectiveStart documentation2. Attendance at Meeting

Present AbsentAhamed Nishadh (CB004081)Deshan Ilangakoon (CB004041)Dilshan Zuhdi (CB004150)

3. Agenda and Notes, Decisions, IssuesTopic Owner Time

Start making the documentation for the final project document.

Ahamed NishadhDeshan IlangakoonDilshan Zuhdi

03.30 pm

Check on work allocated during previous meeting.

Ahamed Nishadh 03.45 pm

4. Action ItemsAction Owner Due Date

Documentation Ahamed NishadhDeshan IlangakoonDilshan Zuhdi

17/08/2011

5. Next Meeting (if applicable)Date: 18/08/2011 Time: 05.00 pm Location: APIIT CafeteriaObjective: Compiling document

…………………………………

.

Group Leader

………………………………….

Lecturer

59

Page 70: Networks and Networking

6th MEETING

Meeting/Project Name: Meeting 6Date of Meeting: 18th August 2011 Time: 05.00 pmMinutes Prepared By: Deshan Ilangakoon Location: APIIT Cafeteria1. Meeting ObjectiveCompiling the document2. Attendance at Meeting

Present AbsentAhamed Nishadh (CB004081)Deshan Ilangakoon (CB004041)Dilshan Zuhdi (CB004150)

3. Agenda and Notes, Decisions, IssuesTopic Owner Time

All documentation done so far was handed over so that it could be compiled and added into a single document with the proper formatting.

Ahamed Nishadh05.00 pm

Check on work allocated during previous meeting.

Ahamed Nishadh 05.15 pm

4. Action ItemsAction Owner Due Date

Compiling document Ahamed Nishadh 21/08/2011

5. Next Meeting (if applicable)Date: 21/08/2011 Time: 10.00 am Location: Ahamed

Nishadh’s Residence

Objective: Close of project meeting

…………………………………

.

Group Leader

…………………………………

.

Lecturer

60

Page 71: Networks and Networking

7TH MEETING

Meeting/Project Name: Meeting 6Date of Meeting: 21st August 2011 Time: 10.00 amMinutes Prepared By: Deshan Ilangakoon Location: Ahamed Nishadh’s

Residence1. Meeting ObjectiveClose of project meeting2. Attendance at Meeting

Present AbsentAhamed Nishadh (CB004081)Deshan Ilangakoon (CB004041)Dilshan Zuhdi (CB004150)

3. Agenda and Notes, Decisions, IssuesTopic Owner Time

Thanking all members for the hard work done and for completing the required work on time.

Ahamed Nishadh10.00

4. Action ItemsAction Owner Due Date

5. Next Meeting (if applicable)Date: Time: Location:Objective:

…………………………………

.

Group Leader

…………………………………

.

Lecturer

61