Project Hardware Requirements
This documentation is a proposal for a network design and configuration for an e-commerce organization in the new three floor building. The study involves designing network diagrams for each level of the offices, both physical and logical layouts.The design also describes the hardware equipment, topology options or network architecture, volume estimated, resource requirements and the cost of installation.
The e- commerce organization is expanded and also planning to merge with other business organizations in-order to fulfill its objectives. The building is new with very few interior walls to suit the needs of the organization. This allows a wide range and flexibility to design and install a new computer data network system. The organization uses ground, first and second floor of the building. It has about 100 employees who will be using workstations for their daily duties.
The work to be performed during this tasks include design and installation of fully extended star network. This will involve installation and configuration of all network devices, cabling and setting up of interfaces which will include multifunctioning devices routers, switches, servers, racks and all related software that are required in the network [1].
These are the physical and tangible devices that will be installed in the network [2]. The kind of hardware devices to be installed will depend on the datatype that will be used and topology implemented in the network. Data type used in the network will include reports, bulletins information on accounts and webpages. Also there will be voice communication among the employees. The following table shows some of the hardware components that will be installed in the network with their prices and descriptions [3].
Resources |
Description |
Supplier |
Quantity |
Amount |
Total |
Computers |
· Intel Pentium dual core · 4GB RAM · 1TB hard disk · 22 inch screen · Windows operating system |
Dell corporation |
100 |
$220 |
$22000 |
Surveillance camera |
Net gear Arlo Wireless security camera VMC3030 |
Net gear |
3 |
$200 |
$600 |
Router |
48 gigabit Ethernet blade switch |
Cisco corporation |
4 |
$299 |
$897 |
Wireless access points |
Net gear Wireless Access point |
Avaya |
3 |
$132 |
$396 |
Printer |
Hp laser wireless printer |
hp |
2 |
$400 |
$800 |
Sever |
Power Edge T630 Tower server |
Dell corporation |
3 |
$3000 |
9000 |
RJ-connectors |
· RJ -45 connectors · RJ -11 connectors |
hp |
100pk each |
$30 |
$300 |
24 port switch |
· Avaya 24 port switch |
Hp corporation |
4 |
$100 |
$ 400 |
Tough switch |
For access ports connection |
Avaya |
2 |
$100 |
$200 |
Cat 6 cabling |
Cat 6 cables |
Dell corporation |
4 roles |
$100 |
$400 |
UPS |
Avaya ups |
Dell corporation |
6 |
$1000 |
$6000 |
Laptop |
apple |
Apple Sellers |
1 |
$1000 |
$1000 |
licenses |
Windows OS 2008 |
Windows corporation |
1 |
$1000 |
$1000 |
license |
Windows 0S 2007 |
Windows corporation |
1 |
$1000 |
$1000 |
Labor |
$20000 |
||||
Total cost |
$63993 |
The total cost for implementation of the network will be $ 63993.
Data will be created and transmitted within the network from all workstations. Applications will run on windows 7 on workstations while on the server, applications will run on windows 8.Other applications like Microsoft access, notepad and business applications will run from the server side [4]. The network will be inaccessible from outside the company’s compound. A maximum of 100 users will be expected to be using the network at any particular time and the administration team will be given the first priority. The network is expected to be functioning twenty fours in each day of the week.
Based on the company’s requirement the LAN network is expected to operate at 99% and undiscovered at an error rate of 1%.
A firewall will be implemented in the network to prevent unauthorized users from accessing the network. Some of the users’ accounts will be given limited access to the network [5]. This means that there will be different privileges for users and managers to access the network.
This room will be located in the first floor. It shall be locked and properly ventilated with air conditioners. Servers, switches, Ups and other electrical devices with be housed in this room. Cable management system will also be implemented to keep the server room neat and cat 6 cable will be used to connect the devices together [6]r. Uninterruptible power supply is used to control shutting up of devices in case there is power loss.
Security Requirements
Above is a network diagram that will be used in implementation of the network at the company. The company will have three servers. The servers are connected to Router0 via Switch0. Router0 is then connected to other two routers which are router 1 and router 2. The three routers are connected to three deferent switches which then connects to workstations. Each room floor has different number of workstations. Patch panels are used to increase the number of ports for more connection within the floors [7].
The ground floor is divided into three rooms. They include reception, warehouse and foyer rooms. Reception room has five workstations as shown and surveillance camera located opposite the door to the reception desks. Wireless access point is also mounted on the reception room to be used by visitors. Reception room also has a cabinet where switches are mounted to provide network connections to workstations within the floor. Warehouse room has fours workstations while foyer room has two workstations. Computers are connected to the switch via cables to form star topology as shown in the above diagram [8].
The first floor of the company is designed as shown above. It has five offices. One of the office is divided into cubicles as shown above with computers for employees. One workstation is mounted on each office. Network switch is installed at the open office for connection with end devices e.g. desktop computers. The open office also has wireless access points for network connection with other devices such as tablets and phones. Surveillance camera is amounted at the open office for security purposes.
The figure above shows a network floor layout of the third floor. The room is divided into three offices. One office is the meeting room while the other one is an open office with workstations for employees. Wireless access point will be mounted at the meeting room to be used by guests during their meetings. Computers are connected to the network through cat 5 Ethernet cables to form star topology
Device |
interface |
IP ADDRESS |
Subnet mask |
Default gateway |
Switch port |
Server 0 |
Fa0/0 |
192.168.1.1 |
255.255.255.0 |
n/a |
|
Server 1 |
Fa0/2 |
192.168.2.6 |
255.255.255.252 |
n/a |
|
Server 2 |
Fa/03 |
192.168.2.5 |
255.255.255.252 |
n/a |
|
Router 1 |
Se0/1 |
10.1.1.1 |
255.255.255.252 |
n/a |
|
Router 0 |
Se0/1 Se0/0 |
10.2.2.2 |
255.255.255.252 |
n/a |
|
Router 2 |
Se0/1 |
10.3.3.3 |
255.255.255.252 |
n/a |
|
Pc S |
Ga0/0 |
192.168.10.1/100 |
255.255.0 |
192.168.1.1 |
1-48 |
outer>enable
server#
server#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
server(config)#interface GigabitEthernet0/0
server(config-if)#
server(config-if)#exit
server(config)#interface GigabitEthernet0/1
server(config-if)#ip address 192.168.1.1 255.255.255.0
router# no shut
%SYS-5-CONFIG_I: Co
Server 1
outer>enable
server#
server#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
server(config)#interface GigabitEthernet0/0
server(config-if)#
server(config-if)#exit
server(config)#interface GigabitEthernet0/1
server(config-if)#ip address 192.168.2.6 255.255.255.252
router# no shut
%SYS-5-CONFIG_I: Co
Server 2
outer>enable
server#
server#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
server(config)#interface GigabitEthernet0/0
server(config-if)#
server(config-if)#exit
server(config)#interface GigabitEthernet0/1
server(config-if)#ip address 192.168.2.5 255.255.255.252
router# no shut
%SYS-5-CONFIG_I: Co
Router 1
outer>enable
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface GigabitEthernet0/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface set0/1
Router(config-if)# ip address 10.1.1.1 255.255.255.252
Router# no shut
%SYS-5-CONFIG_I: Co
Router 0
router>enable
Router#
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface GigabitEthernet0/0
Router(config-if)#
Router(config-if)#exit
Router(config)#interface set0/1
Router(config-if)# ip address 10.2.2.2 255.255.255.252
Router# no shut
Conclusion
Implementation of the network will be more efficient and successful if only the devices that are mentioned in the proposal are used. The extended star topology used will be make the network to have high speed since it has no data collision
References
[1]Magnanti, T.L. and Wong, R.T. Network design and transportation planning: Models and algorithms. Transportation science, 18(1), pp.1-55, 2010.
[2]Oberlender, G.D. and Oberlender, G.D. Project management for network design and implementation (Vol. 2). New York: McGraw-Hill.2013.
[3]Jung, S. and su Kim, S. Hardware implementation of a real-time neural network controller with a DSP and an FPGA for nonlinear systems. IEEE Transactions on Industrial Electronics, 54(1), pp.265-271.2014.
[4] Wu, C. and Liu, Y. Queuing network modeling of transcription typing. ACM Transactions on Computer-Human Interaction (TOCHI), 15(1), p.6, 2008.
[5]Perlman, R., Kaufman, C. and Speciner, M. Network security: private communication in a public world. Pearson Education India, 2016.
[6]. Kim, S.S. and Jung, S. April. Hardware implementation of a real time neural network controller with a DSP and an FPGA. In IEEE International Conference on Robotics and Automation (Vol. 5, pp. 4639-4644). IEEE; 2009
[7]Kruskal, J.B. and Seery, J.B. Designing network diagrams. In Proc. First General Conf. on Social Graphics (pp. 22-50).July, 2010.
[8] Ramanathan, R. and Rosales-Hain, Topology control of multihop wireless networks using transmit power adjustment. In Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (pp. 404-413). IEEE.march, 2016.
[9]Craft, P.K., Philbrick, C.M. and Boucher, L.B., Alacritech Inc. Network interface device that fast-path processes solicited session layer read commands. U.S. Patent 7,124,205, 2009;