Local Area Network System



Similar documents
Lesson 24 Network Fundamentals

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Module 5 Introduction to Processes and Controls

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Computer Networking Networks

Multi-Homing Dual WAN Firewall Router

A typical router setup between WebSAMS and ITEd network is shown below for reference. DSU. Router

Firewall Architecture

Using the Internet Outcome1

Multifunctional Broadband Router User Guide. Copyright Statement

Small Business Server Part 2

In this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network

Sweex Wireless BroadBand Router + 4 port switch + print server

CMPD 323 DATA COMMUNICATION & COMPUTER NETWORKS. Chapter 5: Network Design and Troubleshooting Scenarios

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka

Remote PC Guide for Standalone PC Implementation

Advanced Higher Computing. Computer Networks. Homework Sheets

Local Area Networks (LANs) Blueprint (May 2012 Release)

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

Audit4 Installation Requirements

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

Firewalls. Chapter 3

White Paper Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

IT Data Communication and Networks (Optional)

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

Microsoft Technologies

CONFIGURING THE AVG FIREWALL

Gigabit SSL VPN Security Router

GETTING STARTED WITH A COMPUTER SYSTEM FACTSHEET

VPN Overview. The path for wireless VPN users

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0

Network Expansion Devices, Switches & Routers

- Introduction to PIX/ASA Firewalls -

CMPT 471 Networking II

LogMeIn Hamachi. Getting Started Guide

Quick-Start Guide. solo gateway

Using Ranch Networks for Internal LAN Security

Understanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

TECHNICAL SECURITY AND DATA BACKUP POLICY

Information Technology Security Procedures

Gigabit Content Security Router

Network Services Internet VPN

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Appendix B Network, Routing, Firewall, and Basics

To get started, you will need the following items Product Key Router with firewall capability Network cables

Quick Reference Guide: Server Hosting

Lab Developing ACLs to Implement Firewall Rule Sets

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Lab Configuring Access Policies and DMZ Settings

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

High Speed. Internet BroadBand Router. User Guide

High Speed. Internet BroadBand Router. User Guide

Windows Remote Access

Chapter 2 TCP/IP Networking Basics

SonicWALL PCI 1.1 Implementation Guide

EZblue BusinessServer The All - In - One Server For Your Home And Business

Network Technology (10101)

Wireless Broadband Router. Manual

Chapter 1 Instructor Version

Local Area Networks: Software and Support Systems

Getting Started KX-TDA5480

BR-6104K / BR-6104KP Fast Ethernet Broadband Router User s Manual

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Firewalls for the Home & Small Business. Gordon Giles DTEC Professor: Dr. Tijjani Mohammed

Allworx Installation Course

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Server application Client application Quick remote support application. Server application

Chapter 11 Supporting a Small Business Network

Network Security Guidelines. e-governance

Page 1 of 7. Computer Networking

Student Halls Network. Connection Guide

ICANWK406A Install, configure and test network security

Data Network Security Policy

Web Publishing (Ch. 11.4)

Steelcape Product Overview and Functional Description

Networks. The two main network types are: Peer networks

UIP1868P User Interface Guide

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

Chapter 12 Homework CIT J001/02/04/06. Name: Date: Course: Test:

Load Balancer LB-2. User s Guide

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

Protecting the Home Network (Firewall)

Stable and Secure Network Infrastructure Benchmarks

Load Balancing Router. User s Guide

Wireless Network Standard and Guidelines

BROADBAND FIREWALL ROUTER WITH 1-USB + 1-PARALLEL PRINT SERVER PORT

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

EZblue BusinessServer The All - In - One Server For Your Home And Business

XRT-401C XRT-402C XRT-204C

Understand VLANs, Wired LANs, and Wireless LANs

Training Program: Network Admin. Program Structure: Hardware and Appliances. Networking

Transcription:

N1 P.0 Hong Kong Certificate of Education Examination Computer and Information Technology Paper 3 : Coursework Report Local Area Network System Student ID : Date :

N1 P.1 Content : I. Introduction 2 II. Objective 2 III. Problem Specification 2 IV. Working Schedule 3 V. Network Design 4 VI. Design Specifications 5 VII. Testing 5 VIII. Further Enhancement 8 IX. Conclusion 9 X. References 9

N1 P.2 I. Introduction Though computers are capable of carrying out their intended function in a standalone mode, computers will be much stronger if they can exchange information with one another. In past, countless number of business companies had used computer in their daily run. For example, they used computer in accounting to record every transaction of the company made, in trading to record selling and buying information, in personnel management to record every employee s information and etc. However, nowadays the success of the Internet makes people to sense that network is a much more powerful tool for them to enhance their business and make their company running more efficient. II. Objective In this project, a LAN system will be designed for a medium-sized company. Through this networking system, the company can effectively reduce daily running cost, the company internal works can be more systematic and well organized, and the communication of the employees in the company can become more efficiently. The network can be used to share files, share company programme. Employees can communicate with one another through some network communication programme such as ICQ and MSN Messagers. Besides, some expensive hardware such as color printer can be shared by a lot of employees. Finally, employees can use the network to search information. III. Problem Specification The following is the assumptions for the medium-sized company: The company contains 80 employees; Each employee has been provided a computer; The company contains 4 departments : Accounting Department, Marketing Department, Personnel Department and Trading Department; All employees in the company are allowed go onto the Internet; All employees are able to access laser printer; The budget of the whole computer networking project is $1,000,000.

N1 P.3 IV. Working Schedule Date Time Used Related Work Remark 14/12/02 2 hours Question analysis and The size of the requirement setting company. The need of the company. 17/12/02 3 hours Search related information Find and study the from world wide web and concept of computer library networking 18/12/02 2 hours Design the network Use the software Paraben LAN Charter to draw the network diagram 19/12/02 2 hours Refine the network design 28/12/02 2 hours Start to write the interim report Write Introduction part and Objective part 29/12/02 5 hours Continue to write the interim Write Design report Specifications part Discussion, Conclusion part and Working Schedule 03/01/03 1 hour Finish the interim Write the Reference Grammar checking 04/01/03 45 mins Discuss the report with teacher Find the weakness of the report 05/01/03 3 hours Final Report Writing Refine the interim report

N1 P.4 V. Network Design Network Design Insecure Connection Firewall Broadband Router Internet Web Server Email Server Personnel Dpartment Secure Connection Accounting Department 5 Computers Switch 5 Computers Print Server Switch Switch Print Server Printer Printer PDC Server File Server Backup Server Database Server Proxy Server Trading Department Marketing Department Switch Router 60 Computers Print Server 5 Computers Printer Print Server PDC Server CAT 5 Network Cable Printer File Server Fiber-optic Cable

N1 P.5 VI. Design Specifications There are two approaches to build this network Mainframe/terminal and server/client. In my design, server/client approach will be used. Although the price of a terminal computer is lower than client computer, the price of a mainframe computer is very high and cannot be afforded by a medium-sized computer. Also, the function of a client computer is better than that of the terminal. If the network is down, client computer can still work alone, but terminal will not work anymore. The cost of a terminal computer is not much higher than a client computer. Hence, I have chosen server/client network. CAT5 UTP cables are used because the cost of UTP cable is very low and can be easily installed. Also, CAT5 UTP cable can support high bandwidth and up to 100Mbit per second. There are alternative choices of cabling such as coaxial cable, fiber-optic and wireless connection. Coaxial cable is also very cheap and easy to install. However, network connected by coaxial cable cannot support a lot of computers. Wireless connection is another good choice since it does not need to deploy a cabling system which makes installation very easy. With wireless connection, you do not need to make any cable trays. You can also move computers around the company and do not need to concern any cable issues. However, the cost of wireless LAN is much expensive. Wireless LAN requires a lot of wireless hubs and transmitters which are quite expensive. Besides, the transmission speed of wireless LAN is much slower than that of cable-based LAN. Hence, in my network design, wireless connection will not be used. Another alternative choice for cabling is fiber-optics. It can support very high bandwidth, but the cost of it is very high and the installation is very difficult. In company s daily operation, such high bandwidth (2Gbit per second) is much more than enough. Hence fiber-optic cable is only used at the network backbone that interconnects each of the individual LANs scattered throughout the trading company. This also allows the company network to expand in future. To operate at 100Mbs speed, 100Base-T designed network cards and 100Base-T switched hubs are used. In general, a switch interconnects

N1 P.6 computers and passes data among them. I use switch and do not use hubs because the performance of switch is better. Hence, though switch is more expensive than hub, switch is selected for the network. Since the marketing department is very large and has a lot of computers. Hence, marketing department is spilt to another domain and so the internal traffic of the marketing department will not use up the bandwidth of the whole network. In this sub-network, a primary domain server is used to maintain a database of usernames and passwords. A file server is used for storing and sharing files for all client computers. It also enforces security on the network by ensuing that only individuals holding proper permissions can access the files. In addition, a router is used to connect the marketing department s network to the main network. This lets computers in the marketing department s network can still access the company s database server, proxy server and email server. Each department can print a high-end laser printers shared by a number of computers than to purchase low-end printers for each individual computer. An application-specific firewall is used to prevent hackers go into the company s network. A firewall can reject untrusted packets from the Internet and protect computers in the intra-network. Also, it can restrict the running of some high risk applications such as ftp and telnet. A firewall can also restrict employees from going some Given the trend towards web-based computing, a web server is put into the company s network. Web-based systems provide efficient ways to share information, either within the company's private network or externally via the Internet. As this is a trading company, the company can create and maintain a company web site in the web server. Through this web site, the company can promote its product to customers. In future, company can even extend the function of the web site, so that customer can buy products through the web site. Database server supports the applications used in the company and it can store all daily company operation information such as employee s personal record, company financial information, company product information and etc. Many businesses have specialized applications that operate from network

N1 P.7 servers. These applications may operate in conjunction with the database systems. In order to speed up the Internet connection, a proxy server is employed into the network. Besides, proxy server can prevent employee s computer directly communicate with external computers. This can further protect the network from attack. Since some information stored in the file server and database server may be very important, so we should backup all this information constantly. Backup server should have a tape drive are added into the network. We can schedule the computer to make a full backup every week and make an incremental backup everyday. All client computers in the network will use MS Windows XP Professional Edition as the operating system since this is most common OS nowadays. PDC server uses MS Windows 2000 Server. In order to reduce the cost, email server, proxy server and web server will use Linux as the OS. MySQL is used as the database management system. Also, hardware-based firewall and hardware-based print server will be used since the performance of hardware-based device is better and the configuration of them is much simpler.

N1 P.8 VII. Testing We should first use cable tester to test each CAT 5 cable and ensure that every cable is connectable and no broken inside. Check if the servers are working properly Check if each client can login the network Check if each client can connect to the servers and use the services provided by the server Check if the network speed is acceptable Check if the backup server can successfully backup the data and restore the data After the above checking, we can let employees of that company to test the network. VIII. Further Enhancement In this network design, there are some feasibilities for further expansion of the network. The backbone of the whole network can use fiber-optics which can support much more computers. If the company extends its size and opens many branches in different countries, Virtual Private Network (VPN) server can be added into the network. Then company branches network in different countries can be connected together. In another point of view, individual employee may access company network at home through VPN connection. This is a cheap way to enhance the network since we only need to spend about $30,000 to buy a VPN server. To be more stable and secure, web and email server can be split into two servers, so that when one server is hacked or down, another server will not be affected. There is a kind server called Backup Domain Controller Server (BDC) which can automatically replace the job of PDC server when PDC is down. That will make the network more trustable.

N1 P.9 IX. Conclusion A medium-sized company network has been designed and every parts of the network have been carefully analyzed. After creating this network, I am sure the run cost of the company can be reduced since the computer resources can be better used and managed. Also, communication between employees can be more efficiently. References [1] Eric Hall. Network Design Manual -- Internet Firewall Essentials. The Business Tech. Network. http://www.networkcomputing.com/netdesign/wall1.html [2] Art Wittmann. Network Design Manual -- Designing-And Redesigning-Today's Local Area Network. The Business Tech. Network. http://www.networkcomputing.com/netdesign/ wall1.html [3] Marshall Breeding. Network Design Manual -- Designing and Building the Best Small Office Network From the Ground Up. The Business Tech. Network. http://www.networkcomputing.com/netdesign/ wall1.html [4] Fred Halsall. Data Communications, Computer Networks and Open Systems Fourth Edition. Addison-Wesley Publishing Company.