Project Scope
This documentation is a proposal for network implementation for a primary e- commerce business. The organization which is merging two small business into one business is migrating into a story building to occupy the first three floors. The project aims at designing a network that will support all the businesses to run more efficiently than before. The first floor is divided into three rooms, reception, foyer and a warehouse. At the reception point, it will have five workstations for employees. The warehouse room will contain four computers and the foyer room will have two workstations. The first floor which will have five offices and 40 cubicle will have a wireless access Point at one of the offices. Each office will also have a data point. The second floor will be divided into four rooms with a meeting room. The wireless access point will be mounted in the meeting room so that guests can use the Wi-Fi during special meetings. Each room will have data points for employees. IP phones will be used for calling the service room any time any support is required.
This project aims at designing network for the e-commerce organization. The organization is expecting a high speed internet connection that will be used by the employees in their daily activities. The organization which occupies the first three floors of the building will be divided into several rooms. Each room is required to have a workstation. Each building is also to be fixed with a wireless access point for Wi-Fi connection. The network will be secured so that only authorized personnel will access it. So here we will design the scalable and efficient network that will meet the organizations requirements [1].
The volume of hardware components that are required in any given network design depends on the available number of users and the budget plan of the organization. While on the other hand the type of hardware devices required in the network depends on the data type that will be required to flow in the network [2]. Datatype that is required will be reports, web applications and files like bulletins. Here we will have several components that will be used in the system in order to make the network faster and efficient. The following devices will be used in the network.
Computers: They will be used as end devices for internet connection.
Ethernet cat 5: These are cables that will be used for connecting the network devices.
Fiber cables: They will be used for fiber connection between LAN switch and the fiber switch.
Servers: This will be the data center where information will stored in the organization [3].
Switches: These are devices that are used to expand the network in any connection.
Cameras: They will be used for security purposes.
Device |
Explanation |
Seller |
Items Quantity |
Amount per item |
Total price |
Routers |
24 gigabit routers |
Dell sellers |
3 |
$340 |
$740 |
Access Points |
Net rear Access points |
Dell sellers |
2 |
$220 |
$640 |
Server |
360 Power edge Server |
Dell sellers |
7 |
$1000 |
$7000 |
RJ-45 connector |
Connectors |
Hp sellers |
50pkt |
$10 |
$500 |
Printers |
Inject printers |
hp Sellers |
3 |
$1000 |
$3000 |
48 & 24- port switches |
Cisco switches |
Avaya Sellers |
8 |
$100 |
$800 |
Laptops |
Hip |
Avaya tech |
3 |
$320 |
$960 |
Desktop Computers |
· Intel core I3 · 8GB RAM · 500GB hard disk · 32 inch screen · Windows operating system |
Wow computers |
100 |
$200 |
$2000 |
UPS |
Contec-48volts |
Wow sellers |
7 |
$3000 |
$21000 |
Labor cost |
$2000 |
||||
Operating systems |
Windows 8 & 7 |
Microsoft technologies |
2 |
$1000 |
$2000 |
Surveillance cameras |
Wireless security camera |
Ali juma technologies |
|||
Total cost |
$540020 |
The total cost that will be used in implementation will be $540020.
The operating systems that will be used in the network implementation are windows 7 and 8. They will run from different parts of the system. Windows 7 will run from the client side. This means that all the desktop computers will have windows 7 operating system. These client computers will have applications like Microsoft word and access running on them. While from the server, windows 8 will be installed since it more secure than Windows 7 [4]. The server will store all the important information about the organization. Website database and other business applications will run from the server side.
Network Hardware Components
Two or more accounts will be created in the computers that are owned by the organization. One account will be for the user while the other account will be owned by the network admin. Users will have limited access to the network as compared to the management team. Users will perform functions like reading and updating information on the system. The network will serve almost a maximum users of 150 employees [4]. Wi-Fi will support and connect to all employees devices after they have registered with the network admins. Any device that will not be registered won’t be able to connect to the wireless network.
In order for the network to be more secure, firewalls will be installed in the network. Firewall software is used to prevent the system from being attacked by viruses and malicious codes that may cause or hinder the functioning of the system. Wireless networks at each floor will have different passwords to make the network more secure. Wireless network passwords will not be given to individuals [5]. The network admin will be the one to connect users’ devices to the network. To prevent attackers from cracking the Wi-Fi passwords, they will be encrypted using AEs algorithm that is very difficult to be cracked.
Other equipment that will be used in the network will include UPS, repeaters and hub. UPS is an electronic component device that controls the shutting down process of devices in case there is power loss. Repeaters on the other hand are devices that are used to increase the strength of a signal while routers are the devices that are used to forward packets in a network. They find the shortest path in which a packet travels from its source to the destination.
The system will have data recovery plan on all servers in a secondary hard disk. Also some of the data will be stored in the cloudy for the system to be more secure. The data recovery plan will use windows backup system to save data in the secondary hard disk [6]. The system will be set with automatic data recovery plan every night at the end of each week. Fundamentally, windows restore plans of windows seven will be installed in the systems in order to recover data when it is deleted by mistake by users.
The first active directory will be installed in the domain server named www.business.com. Three groups will be set in this domain type which will include the administration, staff and other employees working for the company. These groups will be given different limitation of access to the system.
The following diagram shows how the network components will be arranged in the building.
Above is the design network diagram that will be used in the network implementation. Each floor will be connected to its own switch as shown above. The switches can then be extended by connecting to other switches in order to increase the number of ports. The switches will be linked together using a router.
Security
The above is the network diagram of the ground floor. The floor will be divided into three rooms which will be the reception, foyer and a warehouse. The reception which is located at the entry door of the building will have five workstations as shown in the above diagram. Each data point will be connected to the switch using cables to form star topology. The floor will have one printer that is linked to the network and will be located at the reception room. Also Wireless access points will be located at the reception room. The reception will have one IP phone for making calls to other offices. The warehouse will have four workstations and IP phones for calling while the foyer room will only have four workstations.
Above is a network diagram of the first floor of the building. The floor will consist of five offices and forty open cubic offices. Each office will have two workstations and each cubicle office will have one data point. The wireless access point will be mounted at the open office. A printer will also be located at the open office. Each room will have an IP phone for calling. Servers will be also be located one of the five rooms. They will be connected to the switches through fiber cables. The server room will have several firewalls for security purposes
The second floor will be divided into three offices. Each office will have two data points. The floor also has thirty open cubicle offices. Each cubicle office will have a workstation. The wireless access point and the printer will be located at that meeting room. IP phones that will be used for calling the service desk will be in each office. The cubicle offices will only have one phone.
Devices that are used in the network will be configured using different commands. The following is the IP address table [6]. It contains IP addresses that will be used in configuring the network.
Device |
interface |
IP address |
Subnet mask |
Default Gateway |
Switch port |
Router |
Ga0/0 |
192.168.1.1 |
255.255.255.0 |
n/a |
n/a |
S0/0/0 |
10.1.1.2 |
255.255.255.0 |
n/a |
Fa/0 |
|
Server 1 |
Fa0/1 |
192.168.1.5 |
255.255.255.0 |
n/a |
Fa0 |
Server 2 |
Fa00/2 |
192.168.1.6 |
255.255.255.0 |
192.168.3.1 |
Fa3 |
Server 3 |
Fa0 4 |
192.168.7 |
255.255.255.0 |
192.167.3.4 |
Fa 03 |
Router [7]
Router>enable
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface GigabitEthernet0/1
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/1
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/2
Router(config-if)#ip address 192.168.1.1 255.255.255.0
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/2
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/1
Router(config-if)#
Router#
%SYS-5-CONFIG_I: Configured from console by console
Router 2
Router>enable
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface GigabitEthernet0/1
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/1
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/2
Router(config-if)#ip address 192.168.2.1 255.255.255.0
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/2
Router(config-if)#
Router(config-if)#exit
Router(config)#interface GigabitEthernet0/1
Router(config-if)#
Router#
%SYS-5-CONFIG_I: Configured from console by console
Server r
>enable
Server 1r#
Server 2r#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.(config)#interface
Sever 1GigabitEthernet0/1
Server (config-if)#
Server1(config-if)#exit
Server 1(config)#interface GigabitEthernet0/1
Server 1r(config-if)#
Server 1(config-if)#exit
Server 1(config)#interface GigabitEthernet0/2
Server 1(config-if)#ip address 192.168.2.1 255.255.255.0
Server 1(config-if)#exit
Server1 (config)#interface GigabitEthernet0/2
Server 1(config-if)#
It has generic,
Ethernet is lo,
Local port is 192.167.1.3,
Remote host is 127.0.0.1,
Remote port is 20000,
Network TAP interface is 10.0.0.14.
It is shown below [2].
Computer configuration
Computer 2
It has generic,
Ethernet is lo,
Local port is 30000,
Remote host is 192.168.5.1,
Remote port is 20000,
Network TAP interface is 192.168.4.1.
It is shown below.
address 10.1.1.2
P Address: |
10.1.1.2 |
Network Address: |
10.1.1.2 |
Usable Host IP Range: |
10.1.1.2 – 10.1.1.7 |
Broadcast Address: |
10.1.1.2 |
Total Number of Hosts: |
4 |
Number of Usable Hosts: |
2 |
Subnet Mask: |
255.255.255.252 |
Wildcard Mask: |
0.0.0.3 |
Binary Subnet Mask: |
11111111.11111111.11111111.11111100 |
IP Class: |
C |
Routers are configured with different IP address. Each cable that is connected to the router has an IP address as shown in the diagram below [9].
The ip addresses for cable ga0/0
Conclusion
The project was successfully designed for the business organization. The business organization which contains 150 employees. The proposed network will have high-speed and support the large number of users.it is designed to be more efficient and scalable and to serve the organization in 24hrs every day. The star topology implemented will make the network faster since it does not cause data collision in the network.
References
[1] Jiang, X., Dawson-Haggerty, S., Dutta, P. and Culler,. Design and implementation of a high-fidelity ac metering network. In Information Processing in Sensor Networks, 2009. IPSN 2009. International Conference on (pp. 253-264). IEEE,2009.
[2]. Priyantha, N.B., Kansal, A., Goraczko, M. and Zhao, F. Tiny web services: design and implementation of interoperable and evolvable sensor networks. In Proceedings of the 6th ACM conference on Embedded network sensor systems (pp. 253-266). ACM,2008.
[3]. Pakzad, S.N., Fenves, G.L., Kim, S. and Culler, D.E., Design and implementation of scalable wireless sensor network for structural monitoring. Journal of infrastructure systems, 14(1), pp.89-101,2008.
[4]. Miluzzo, E., Lane, N.D., Fodor, K., Peterson, R., Lu, H., Musolesi, M., Eisenman, S.B., Zheng, X. and Campbell, A.T.. Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application. In Proceedings of the 6th ACM conference on Embedded network sensor systems (pp. 337-350). ACM. 2009.
[5]. Martin, J. and Leben, J.. TCP/IP networking: architecture, administration, and programming. PTR Prentice-Hall.2010.
[6]. Mak, K.H. and Holland, B.L.,. Migrating electrical power network SCADA systems to TCP/IP and Ethernet networking. Power Engineering Journal, 16(6), pp.305-311,2010.
[7]. Forouzan, A.B.. Data communications & networking (sie). Tata McGraw-Hill Education,2009.
[8]. Suh, C., Mir, Z.H. and Ko, Y.B.. Design and implementation of enhanced IEEE 802.15. 4 for supporting multimedia service in Wireless Sensor Networks. Computer Networks, 52(13), pp.2568-2581,2008.
[9]. Sun, Y., Hashiguchi, T., Minh, V.Q., Wang, X., Morikawa, H. and Aoyama, T. Design and implementation of an optical burst-switched network testbed. IEEE Communications Magazine, 43(11), pp.S48-S55, 2009