Professional Documents
Culture Documents
A Capstone Project
Presented to the Faculty of the
College of Information Technology and Computer Science
University of the Cordilleras
In Partial Fulfillment
of the Requirement for the Degree
BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
By:
TRISTEN LOUIE AROMIN CASTRO
JASON BRYLLE LACA BERNABE
MOUSA TAHA ALNATHARI
FEBRUARY 2016
Project Overview| 2
Chapter 1
INTRODUCTION
Background of the study
Information and Communication Technology (ICT) are the
technologies requires to process information, technologies such
as electronic computers, communication devices, and even software
applications to store, transmit, convert, and retrieve
information. According to NotaRazi (2012), a network
infrastructure are groups of interconnected computer systems,
connected by the various parts of a telecommunications
architecture. The infrastructure refers to the organization of
its various parts and its configurations, from individual
networked computers to routers, cables, wireless access points,
switches, backbones, network protocols, and network access
methodologies. Infrastructures can be either open or closed, such
as the open architecture of the Internet or the closed
architecture of a private intranet. It can operate over wired or
wireless network connections, or a combination of both.
According to Technopedia (2016) The term ICT is commonly
referred to the convergence of technologies that exemplify ICT
include the merging of audiovisual, telephone and computer
networks through a common cabling system Apparently, Information
Project Overview| 3
Project Overview| 4
Project Overview| 5
Project Overview| 6
Project Overview| 7
Project Overview| 8
Project Overview| 9
Project Overview| 10
connect with and speak to the server. Just as the customer speaks
to his server, the client uses the network to send and receive
communications about its order, or request. The server will take
the request and make sure that the request is valid. If
everything checks out okay, then the server will fetch the
request and serve the client.
The server can make a request from the client as well. It
may want to check up on the status of the client, or ask if it
has received any security patches, or if it still needs resources
from the server. If not, the server will close the connection in
order to free up network traffic.
Imagine a server standing next to a customer who just stares
at the menu without ordering anything After 15 minutes, it would
be a good idea for the server to leave and check on other
customers. In both cases, the server moves on to other clients as
needed. (Study, 2016)
P2p networking type is most commonly used computer networks.
This type of network is very cost effective but supports lesser
number of computers in network. Ten to fifteen computers can be
connected to each other using p2p networking model without
Project Overview| 11
Project Overview| 12
by human, small mistake by one of the user can hold the work for
other users on same p2p network.
Choosing right kind of networking model is very important
for organization. The difference in p2p and client server model
is that p2p does not have any device or computer that controls
computers on network whereas; client / server model has one
dedicated computer which is called server. It is called dedicated
server. All computers are connected to hub and hub is connected
to dedicated server. Server is responsible to perform according
to the request sent to it by clients. For example server can act
as print server, if client request a print of document server
will send print command to printer and it will be printed. Same
way all the files are stored on the server and not on client
computer, same client can retrieve data by using any other
computer on the same network. This concept is known as
centralization, this enables server to keep profile of users,
data, and software etc., completely in tacked and organized.
Normal computer can also be configured as server and it
should be alright and perform server tasks efficiently, but if
network growth is on seen and many computers are required to
attach to network thats where we might need proper server to
take over the network.
Project Overview| 13
Project Overview| 14
Project Overview| 15
Project Overview| 16
Project Overview| 17
Project Overview| 18
Project Overview| 19
Project Overview| 20
Project Overview| 21
Definition of Terms
Backbone. A central conduit designed to transfer network
traffic.
Data Sharing. The ability to share the same data resource
with multiple applications or users.
Hub. A hardware device that is used to network multiple
computers together.
Modem. A modem is a communication device that can be either
internal or external to your computer. It allows one computer to
Project Overview| 22
Project Overview| 23
Disk
Drive.
spindle
of
magnetic
disks,
called
Project Overview| 24
with
internal
lines.
It
is
used
to
connect
public
or
system
that
responds
to
requests
across
Chapter 2
METHODOLOGY
The chapter will present the network design methodology that
shall be used in the study, scope and delimitation of the study,
data gathering techniques and sources of data.
Network Design Methodology
The researchers shall use the Top-Down Network Design
Methodology. The Top-Down Methodology for the proposed network
infrastructure plan is very similar to the methods used for
structured software development and system design as shown in
Figure 1. The researchers has selected the Top-Down Methodology
Project Overview| 25
Project Overview| 26
Project Overview| 27
Project Overview| 28
Project Overview| 29