This documentation is a proposal for design and implementation of a network in an IT college that is located in Melbourne city. The investigation includes designing network diagrams for each of the buildings that are within the college environment, both physical and legitimate layouts [1]. The configuration additionally portrays hardware equipment required, topology alternatives of the network, volume evaluated, asset prerequisites and the cost of establishment.
The work to be performed during this process will involve design and installation of a suitable network topology that will meet the requirements of the IT College. This will include establishment and setup of all system gadgets, wiring and design of the floor layouts and fixing the network components in their required positions. Fixing of the devices will involve switches, routers, servers and configuring of computers to be compatible with the network system. Lastly users will be taught on how to connect to the network.
These are devices that are physical and tangible, that will be used during the network configuration. There are various factors that determine the kind of devices that will be used in any given network [2]. The network topology used determines the volume of hardware components that will be used any given network. Data type used also determine the kind of the hardware components that will be required during installation of the network. Data that will flow in the network will include files, website information and all the data that involving the college. Voice data communication is also required in the network. Devices that will be used in the network involve the following:
Computers – These are network end devices that will be used by students to access the network.
Routers – These are devices that will be used in forwarding network packets in the network.
Wireless Access points – these are hardware components that allow wireless devices to connect to the wired network.
Printers – used for printing information on paper.
Servers – they are used for storing all the information within a network [3].
RJ-connectors –These are devices that are used in terminating the cables to make connection successfully.
The following table shows hardware requirements of the network.
Device |
Explanation |
Seller |
Items Quantity |
Amount per item |
Total price |
Router |
24 gigabit switches |
Cisco sellers |
3 |
$240 |
$720 |
Wireless Access Points |
Net rear Access points |
Cisco sellers |
2 |
$200 |
$600 |
Server |
360 Power edge Server |
Cisco sellers |
7 |
$1000 |
$7000 |
RJ-45 connectors |
Connectors |
Cisco sellers |
100pkt |
$10 |
$1000 |
Printer |
Inject printers |
Apple Sellers |
2 |
$1000 |
$2000 |
48- port switches |
Cisco switches |
Labra Sellers |
7 |
$100 |
$700 |
Laptops |
Hip |
Hip tech |
3 |
$300 |
$3000 |
Computers |
· Intel core I3 · 8GB RAM · 500GB hard disk · 32 inch screen · Windows operating system |
HP-computers |
200 |
$200 |
$4000 |
UPS |
Contec-48volts |
Wow sellers |
7 |
$2000 |
$14000 |
Labor cost |
$1000 |
||||
Operating systems |
Windows 7 NA 8 |
Microsoft corporation |
2 |
$1000 |
$2000 |
Surveillance camera |
Wireless security camera |
||||
Total cost |
$34020 |
The tot cost that will be used in the network implementation will be $34020.
Both windows 7 & 8 will be used in the network. Windows 7 will run on client’s computers while windows 8 will be installed in the server [4]. Basic applications like word and notepad will run from the client side. Other applications like the campus website and other programs or important details will be stored on the server. Each computer in the lab will have two accounts, the user account and Admin account. The user will be given limited access while the admin will have all the privileges in accessing any information in the client computers. Users will have no access on the server, they will only read the uploaded information. The network will serve almost 500 users including the college staff. No one will be able to connect to the network outside the companies from outside the college compound. Within the school, the network will be twenty four hours open every day.
The server will be located in each computer room .This means that each computer room will have the server room. The server rooms will be well equipped and well ventilated with air conditioners. Switches, servers and other electric components will be stored in this kind of rooms. Cable trees will be used in cable management to make the room neat. Other devices like Ups are used to control power in the server room to prevent damages to the available equipment
Several network firewalls will be installed in the system for security purposes. This will prevent the network from security threats like malicious codes and Trojan viruses that may affect the functioning of the network [5]. There will also be security to wireless networks so that only students can connect to the network. The passwords will also be encrypted using AES algorithm to prevent the attackers from cracking the passwords and having access to the network.
The following shows how different network devices will be arranged in the network
Building 1
Above is a network diagram for building 1. The building is divided into four computer rooms. Each room has 35 works stations and an IP phone for communication. At the right end is a lobby with a wireless access point. People around this areas can connect to the wireless network and use it. The network in each room is connected to ISP so that the network in the building is controlled from on region [6]. Computers are connected to the network from the switch using Ethernet cables to form star topology.
Building 2
The above is a network diagram that will be used to implement the network in the building. The building is divided into three computer rooms. Each room will contain 35 computers .The servers are also located in each computer room. Networks in the three rooms are linked together using the ISP router that also links the network in the two buildings. This building also has lobby area that has a Wireless Access point. Computers will be connected to the switch through Ethernet cables [7]. This connection will form star topology which makes the network to be fast. Network from to the classrooms is connect from the ISP router.
The diagram above shows the layouts of computers in each computer in the lab. The labs are structured using the same design that is shown above. Computers are arranged in walls and then the tutor computers are set up at the center of the rooms. The room also has a camera for security purposes.
Network device |
Interface |
IP address |
Subnet Mask |
Default gateway |
Routers |
Ga/0 |
192.34.23.1 |
255.255.255.0 |
n/a |
Servers |
Ga/0 |
193.24.2.1 |
255.255.255.0 |
n/a |
Computer |
Ga/a |
172.234.2.1 |
255.255.255.0 |
n/a |
Router#
Router configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router (confit) #interface GigabitEthernet0/0
Router (confit-if) #
Router (confit-if) #exit
Router (confit) #interface set0/1
Router (confit-if) # imp address 192.34.23.1 255.255.255.0
Router# no shut
%SYS-5-CONFIG_I: Co
Server
Outer>enable
Server#
Server configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Server (confit) #interface GigabitEthernet0/0
Server (confit-if) #
Server (confit-if) #exit
Server (confit) #interface GigabitEthernet0/1
Server (confit-if) #imp address 193.24.2.1 255.255.255.0
Router# no shut
%SYS-5-CONFIG_I: Co
Conclusion
Usage of the system will be more effective and fruitful if the gadgets that are specified in the proposition are utilized. The star topology utilized will make the system more first since it has no information crash. Strong passwords that are provided to the wireless network will prevent any unauthorized access to the network. Encryption of passwords with AES encryption makes it impossible for attacker’s to crack them to intrude the system.
References
[1] Jiang, X., Dawson-Haggerty, S., Dutta, P. and Culler, D, Design and implementation of a high-fidelity ac metering network. In Information Processing in Sensor Networks, 2009. IPSN 2009. International Conference on (pp. 253-264). IEEE, .2009
[2] Petra, R.K., Nedevschi, S., Surana, S., Sheth, A., Subramanian, L. and Brewer, E.A., WiLDNet: Design and Implementation of High Performance WiFi Based Long Distance Networks. In NSDI (Vol. 1, No. 1, p. 1),2010.
[3] Pakzad, S.N., Fenves, G.L., Kim, S. and Culler, D.E. Design and implementation of scalable wireless sensor network for structural monitoring. Journal of infrastructure systems, 14(1), pp.89-101.2008
[4] Cabaret, J., Sommers, J., Braford, P., Stan, C., Tsing, D. and Wright, S. Power awareness in network design and routing. In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE (pp. 457-465). IEEE, 2008.
[5] Han, D.M. and Lim, J.H. Design and implementation of smart home energy management systems based on ZigBee. IEEE Transactions on Consumer Electronics, 56(3), 2010
[6] Milosz, E., Lane, N.D., Fodor, K., Peterson, R., Lu, H., Muscles, M., Eidelman, S.B., Zheng, X. and Campbell, A.T. Sensing meets mobile social networks: the design, implementation and evaluation of the concede application. In Proceedings of the 6th ACM conference on Embedded network sensor systems (pp. 337-350). ACM, 2008.
[6] Kodak, C., Marks, J. and Stieber, S. Automating the layout of network diagrams with specified visual organization. IEEE Transactions on Systems, Man, and Cybernetics, 24(3), pp.440-454, 2008.
[7] Wang, S.Y., Chou, C.L. and Lin, C.C. The design and implementation of the Nuns network simulation engine. Simulation Modelling Practice and Theory, 15(1), pp.57-81, 2011.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download