You are on page 1of 29

Project Overview| 1

NETWORK INFRASTRUCTURE PLAN FOR


PINES INTERNATIONAL ACADEMY (PIA)

A Capstone Project
Presented to the Faculty of the
College of Information Technology and Computer Science
University of the Cordilleras

In Partial Fulfillment
of the Requirement for the Degree
BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

By:
TRISTEN LOUIE AROMIN CASTRO
JASON BRYLLE LACA BERNABE
MOUSA TAHA ALNATHARI

FEBRUARY 2016

Project Overview| 2

Chapter 1
INTRODUCTION
Background of the study
Information and Communication Technology (ICT) are the
technologies requires to process information, technologies such
as electronic computers, communication devices, and even software
applications to store, transmit, convert, and retrieve
information. According to NotaRazi (2012), a network
infrastructure are groups of interconnected computer systems,
connected by the various parts of a telecommunications
architecture. The infrastructure refers to the organization of
its various parts and its configurations, from individual
networked computers to routers, cables, wireless access points,
switches, backbones, network protocols, and network access
methodologies. Infrastructures can be either open or closed, such
as the open architecture of the Internet or the closed
architecture of a private intranet. It can operate over wired or
wireless network connections, or a combination of both.
According to Technopedia (2016) The term ICT is commonly
referred to the convergence of technologies that exemplify ICT
include the merging of audiovisual, telephone and computer
networks through a common cabling system Apparently, Information

Project Overview| 3

and Communication Technology does not have its own universal


definition, for the concepts, applications and methods that are
used in ICT are constantly changing and evolving on an almost
daily basis, the broadness of ICT covers any product that will
store, retrieve, manipulate, transmit or receive information
electronically in a digital form.
Machajewski (2011), a computer network is a set of connected
computers, computers on a network are called nodes. Connections
could be done by either cabling, mostly commonly the Ethernet
Cable, or wirelessly through radio waves such as Bluetooth, WiFi,
etc. Connected computers can share resources such as access to
the Internet, using printers, file servers and others. A network
is a multi-purposed connection which allows a single computer to
do more. Computer Networks can be broken down to topologies,
which is a technique of connecting computers.
Early examples of a computer network is a network of
communicating computers that was used as part of the U.S.
military's Semi-Automatic Ground Environment (SAGE) radar system.
In 1969, the University of California at Los Angeles, the
Stanford Research Institute, the University of California at
Santa Barbara and the University of Utah were connected as part
of the Advanced Research Projects Agency Network (ARPANET)

Project Overview| 4

project. It is this network that evolved to become what we now


call the Internet. Networks are used to facilitate communication
via email, video conferencing, instant messaging, enable multiple
users to share a single hardware device like a printer or
scanner, enable file sharing across the network, allow for the
sharing of software or operating programs on remote systems, make
information easier to access and maintain among network users.
(Technopedia, 2016)
Internet, sometimes called the Net, in simple terms is a
network of the interlinked computer networking in the whole world
that uses the Internet Protocol Suite (TCP IP) which is
accessible to the general public.
The basic requirements for connecting to the Internet are a
computer device, a working Internet line and the right modem for
that Internet line. Computer devices such as PC, a Macintosh or
Linux computer, a tablet PC or a smartphone. However, there are
many other electronic devices that can also be used to access the
Internet. Examples of a working Internet line include a fiberoptic connection, a DSL line, a cable connection, a Wi-Fi
connection, a 3G or 4G cellular connection, a dial-up line and
satellite Internet. In addition, for computers that are part of a
network, an Internet connection can come via an Internet gateway,

Project Overview| 5

through which other computers in the network connect to the


Internet. The third essential component of an Internet connection
is the modem or router. It must correspond to the Internet line
installed in order to work. Lastly, software programs such as
Internet browsers and email clients are optional (Ask, 2011).
One of the longstanding goals of network security design is
to be able to prove that any system is secure.
Designers would like to be able to show that a properly
implemented and operated system, acquires its objectives for
confidentiality, integrity, availability and other attributes
against the variety of threats the system may encounter.
Computer scientists have made small progress in proving
lower bounds for the difficulty of solving the specific
mathematical problems underlying most modern cryptography. Though
the problems are believed to be very difficult, theres no
assurance that it would be that difficult, and indeed it turns
out that some of it may be quite easy to solve given the
availability of a full-scale quantum computer.
Even given building blocks that offer a high level of
security, designers, as well as implementers, may well put it
together in unexpected ways that ultimately undermine the very
goals the designers were supposed to achieve (Burt, 2015).

Project Overview| 6

A business with confidential informations most important


aspect is network security. When it comes to the Internet and
Local Area Networks (LAN), security is at the forefront of
computer-related issues.
There will be many benefits for an organization for adopting
a network security system. The company will be protected against
disruption that comes from outside sources, and it also keeps the
employees or workforce more focused and productive. It also
allows the company to meet mandatory regulatory compliance with
state and federal agencies. It also protects customers data
thereby safeguarding against legal action due to data theft.
These kind of protections are un-comparably priceless when
considering possible damage to the company.
Organizations and companies mostly use computer technology
for security, reliability, energy efficiency and the need of
real-time information. These advantages help in reducing
organization operating cost while delivering a quality service to
its client. These kind of technologies are adopted by government
agencies to better serve its employees. Different government
agencies in different location can be interconnected to work
easily with the help of this technology.

Project Overview| 7

Network Infrastructure Types Based on OSI Model Layer are


some of the things that are needed for Improving ICT
Infrastructures. There are four to layer in the OSI Model being
used because of the different tasks needed for an ICT Infra like
delivering and Receiving Data without incurring any errors also
by providing Connection-Oriented Communication, Same Order
Delivery, Data Integrity, Flow Control, Traffic Control,
Multiplexing and Byte orientation. Also transmitting data across
a physical network link with error handling and recovery, dataflow over a network and full network flow.
The Transport layer work transparently within the layers
above to deliver and receive data without errors. It send side
breaks application messages into segments and passes on to the
network layer. The receiving side reassembles segments into
messages and passes to the application layer.
Also it can provide Connection-Oriented Communication, Same Order
Delivery, Data Integrity, Flow Control, Traffic Control,
Multiplexing and Byte orientation. (Technopedia, 2016)
The Data Link Layer is responsible for transmitting data
across a physical network link. Each physical medium has linklayer specifications for network and link-layer protocol
characteristics such as physical addressing, network topology,

Project Overview| 8

error notification, frame sequencing, and flow control which is


according to juniper.net.
It also says that it includes Physical Addressing, Network
Topology, Error Notification, Frame Sequencing, Flow Control,
Data Link Sublayers, and MAC Addressing. (Juniper, 2010)
The application layer, the seventh layer of the OSI model
and the only one that directly interacts with the end user. The
application layer provides Kinds of services, namely, Simple Mail
Transfer Protocol, File transfer, Web surfing, Web chat, Email
clients, Network data sharing, Virtual terminals, various files
and data operations and according to Technopedia it provides full
end-user access to a variety of shared network services for
efficient OSI model data flow. It has many responsibilities,
including error handling and recovery, data flow over a network
and full network flow.
It is also used to develop network-based applications. More
than 15 protocols are used in the application layer, including
File Transfer Protocol, Telnet, Trivial File Transfer Protocol
and Simple Network Management Protocol. Its major network device
or component is the gateway. (Technopedia, 2016)
Lastly the Network Layer which is also called the backbone
Of the OSI model It can select and manage the best logical path

Project Overview| 9

for data transfer between nodes. It contains hardware devices


like routers, bridges, firewalls and switches, but it actually
creates a logical image of the most efficient communication route
and implements it with a physical medium.
Peer-to-peer network is where Computers are connected to
each other via the server and the internet. In other words Each
Devices or Computers that are connected to the P2P can be a
Server and at the same time a Client. This allows us to connect
and share files with each other via our computers. The only
requirements for a computer to join a peer-to-peer network are an
Internet connection and P2P software. Common P2P software
programs include Kazaa, Limewire, BearShare, Morpheus, and
Acquisition. These programs connect to a P2P network, such as
"Gnutella," which allows the computer to access thousands of
other systems on the network. While P2P networking makes file
sharing easy and convenient, is also has led to a lot of software
piracy and illegal music downloads. Therefore, it is best to be
on the safe side and only download software and music from
legitimate websites. (Techterms, 2016)
A Client-Server network is designed for end-users, called
clients, to access resources such as files, songs, video
collections, or some other service from a central computer called

Project Overview| 10

a server. A server's sole purpose is to do what its name implies


- serve its clients.

The client uses the network as a way to

connect with and speak to the server. Just as the customer speaks
to his server, the client uses the network to send and receive
communications about its order, or request. The server will take
the request and make sure that the request is valid. If
everything checks out okay, then the server will fetch the
request and serve the client.
The server can make a request from the client as well. It
may want to check up on the status of the client, or ask if it
has received any security patches, or if it still needs resources
from the server. If not, the server will close the connection in
order to free up network traffic.
Imagine a server standing next to a customer who just stares
at the menu without ordering anything After 15 minutes, it would
be a good idea for the server to leave and check on other
customers. In both cases, the server moves on to other clients as
needed. (Study, 2016)
P2p networking type is most commonly used computer networks.
This type of network is very cost effective but supports lesser
number of computers in network. Ten to fifteen computers can be
connected to each other using p2p networking model without

Project Overview| 11

problem, more number of computers often create problems. All


computers possesses same status within the network and no
computer control any other computer but it self, this network
does not have server to control and monitor. Security level is
not towards higher side and each work station itself is
responsible for security. Using p2p models files can be shared
among computers. Files like, videos, audios, pictures,
spreadsheets and all digital media can be sent or received with
in the network. Printers, scanners and internet can be shared
with in all computers. Before deciding to implement P2P model one
must know the limitations of this type. Getting to know later can
be frustrating big time.

Peer to Peer looks very simple, quite

cost effective and attractive, yet it can keep progress very


limited. Peer-To-Peer networks are designed for limited number
computers, it will start creating issues when exceed 15 number of
computers, High security levels cannot be achieved using p2p
networks, so if organization have concerns with security p2p will
not be that great.
Organizational growth will outgrow p2p networks; it will not
support growing number of computers when increased above fifteen.
Regular training is required for computer users of p2p network.
P2P network is control by computers and computers are controlled

Project Overview| 12

by human, small mistake by one of the user can hold the work for
other users on same p2p network.
Choosing right kind of networking model is very important
for organization. The difference in p2p and client server model
is that p2p does not have any device or computer that controls
computers on network whereas; client / server model has one
dedicated computer which is called server. It is called dedicated
server. All computers are connected to hub and hub is connected
to dedicated server. Server is responsible to perform according
to the request sent to it by clients. For example server can act
as print server, if client request a print of document server
will send print command to printer and it will be printed. Same
way all the files are stored on the server and not on client
computer, same client can retrieve data by using any other
computer on the same network. This concept is known as
centralization, this enables server to keep profile of users,
data, and software etc., completely in tacked and organized.
Normal computer can also be configured as server and it
should be alright and perform server tasks efficiently, but if
network growth is on seen and many computers are required to
attach to network thats where we might need proper server to
take over the network.

Project Overview| 13

Servers are powerful machines when compared to normal desktop


computers.

Controlling developed network can only be done by

dedicated servers that have higher specifications to support


network. Servers can have better processing speed with multiple
processors capability available. Server machine have higher RAM
to load and execute software with ease. More advanced network
cards installed for faster data transfer. Hard drives are way
bigger to store the data for entire clients. Hardware can be
plugged in and plugged out while server is on, this helps network
stable, and hardware like hard disk can be removed and attached
accordingly.
Operating systems are also specially designed for servers.
Server OS have much more features file serving, print serving,
backing up data, enhanced security features etc. There are few
major Server OS which are used commonly in servers, Windows
server NT. 2000, 2003, Linux and Novell NetWare. Windows server
2003 is more powerful and enhanced for much higher security
levels, Linux servers provide the maximum security to networks.
(Wifinotes, 2016)
After a thorough investigation of a study regarding Network
Infrastructure plan for BCNHS, Subala (2011) stated that the
current network infrastructure of BCNHS was mainly used for

Project Overview| 14

internet browsing. There was also an internal website that was


established with the use of one computer as the intranet server.
There were problems that was encountered in the existing
network infrastructure of the school, such as weak security, the
network security is limited due to teachers lack of visual
supervising to the students, thus making the network vulnerable
to viruses, worms, spyware and computer hacks.

Large part of the

network will be affected when one of the switches lags, hangs or


whenever it is disrupted. Some workstations had slow Internet
access while the others had excessive allotted bandwidth; there
was no constant or steady connection on the workstations and
limited network security and control.
Based on the findings, the researcher of the study concluded
that, the BCNHS has medium-sized network with computers capable
of connecting to a Local Area Network (LAN) for communication
purposes. But the network equipment needed to be replaced for
network management and control centralization. The problems
encountered restrained the efficiency and productivity of the
stakeholders caused by a poorly managed network infrastructure.
In a different related literature titled Pines City
National High School Network Infrastructure Plan, Bautista, et.
al. (2011) included in the researchers findings, encountering

Project Overview| 15

slow Internet access, due to multiple Internet connections from


PLDT, and Smart Broadband; not internet security, which allows
the students to browse any websites, no network security were
implemented, making the network prone to virus attacks, and the
students have access to the computers at any time, without
supervision, the students can accidentally download corrupted
files, malwares, and infect the computers.
The researchers in the study concluded that the current ICT
of Pines City National High School was inefficient due to the
physical and logical network being redundant, hierarchical and
not scalable. Not having a file server might lead PCNHS more
likely to encounter virus attacks that results to corruption of
files and data.
In another related literature title Network Infrastructure
Plan of Saint Louis High School Philex by Bacani, et. al.
(2012), the researchers in the study found out that the existing
ICT set-up of SLHS is stand-alone and different computers did not
have access to the Internet. The problems encountered by the
researchers included, no provision for back-up, loss of data due
to decentralized nature of storage, and malwares that resulted to
computer malfunction. The network infrastructure plan was to

Project Overview| 16

replace computers to improve the ICT set-up of the school and to


have better and faster delivery of services to the students.
Based on the findings, the researchers concluded that the
ICT set-up of SLHS's data storage, computer storage and security
was very vulnerable to virus attacks. The benefits of having a
network environment was not fully realized in the ICT set-up. To
fully implement the network infrastructure for the school,
computers were needed to be replaced. The proposed NIP for SLHSPhilex shall address the problems brought by the old network setup.
With all the benefits of networking to academic
institutions, the researchers are encouraged to undertake the
study by designing a network infrastructure plan for Pines
International Academy. This study aims to maximize the
utilization of the resources available in the school campus.
Through this development, information availability for various
departments as well as sharing of computer equipment will be
possible.
Company Profile
Accredited by the Technical Education and Skills Development
Authority (TESDA) on October 29, 2002, Pines International
Academy(PIA) is an Educational Facility which started to offer

Project Overview| 17

courses for English Language Learners(ELLs) in the introductory,


intermediate, and advanced levels alongside the vital recognition
of the need to continuously sharpen the teaching skills of its
English as a Foreign Language(EFL)teachers, and the undisputable
necessity to develop the existing curriculum in order to address
the diverse and changing needs of EFL learners.
More than a decade from the time it was established, PIA now
is the home for 350 Filipino employees as well as students from
Korea, Japan, and Vietnam with a population ranging from 200 to
350 during peak season. In addition, PIA boasts of having its own
Pines English Proficiency Test that aims to assess the learning
progression of ELLs and to identify their respective weaknesses,
thereby giving direction to the Curriculum Research and
Development Team of PIA to make adjustments in the current
language learning programs, and to develop courses that
specifically target the enhancement of language skills crucial in
the acquisition of English as a second language.
Moreover, in view of the ardent necessity to upgrade the
teaching and learning of EFL, PIA now offers courses
characterized by structured curriculum that allows ELLs to master
English skills from Level 1 to Level 10, plus, special module
classes in TOEIC and TOEIC Speaking, TOEFL, IELTS, and OPIc. The

Project Overview| 18

meticulous placement of learners from the first to the tenth


level based on their varying proficiency helps them acquire
skills needed to become more eloquent speakers and effective
communicators in general.
On the other hand, through the years, PIA had evolved into
an institution that not only provides quality English education
to the Asian youth who come within its bounds, but is also
committed to its corporate social responsibility of sponsoring
underprivileged but deserving Filipino students to study in the
university. Currently, PIA is sending 5 scholars to school in 2
major universities in the city, namely, Saint Louis University
and the University of the Cordilleras.
Furthermore, true to its commitment of providing quality
English Education to the Asian youth, PIA pioneered in the
conceptualization of citywide speech and essay writing
competition for the students of Baguio, dubbed as ESLympics.
Initially, ESLympics was created for students in the tertiary
level only, enrolled in various colleges and universities within
the city.
Nonetheless, acknowledging the novelty and the significance
of this activity, Baguio City Mayor Mauricio Domogan Moved for

Project Overview| 19

the inclusion of elementary pupils and high school students in


the competitions.
Hence, on its 3rd year, ESLympics was turned into a citywide
contest that taps the best speakers and writers among elementary,
high school, and university students and has now become an annual
event in Baguio City solely and exclusively organized by PIA in
partnership with the City Government of Baguio. Indeed, PIA has
earned its niche in the EFL industry; a household name that
embodies excellence, success, endurance, passion, and service.
Pines International Academy a name that is synonymous with
quality English education.
Purpose of the Study
The main purpose of the study focused on creating a network
infrastructure for Pines International Academy.
This was favorable and beneficial to the following entities:
To Pines International Academy. The proposed network
infrastructure assisted PIA in attaining a more effective and
efficient work place through the reduction of unnecessary space
utilized by files and their storage units, easier access to files
and its sharing, minimizing effort needed to obtain and process
school documents, upgrading the facilities and overall reduction

Project Overview| 20

of minimal hassles such as walking or displacement from and to a


location.
To the Staff. The proposed study helps the employees to do
their jobs efficiently because of the lightened burden brought
about file related problems (e.g. procuring time, file weight,
procuring time, etc.), efficiency of the network, and
accessibility to shared computers and printers in the faculty
room.
To the Students. The proposed benefitted the students
through the efficient use of the network features that allowed
improved productivity and reduced work delays.
To the Researchers. The proposed study refreshed and
improved their knowledge on network infrastructure and furthered
enabled them in critical analysis and important decisions to
solve different problems that will be encountered in the future.
To the Future Researchers. The proposed study would benefit
the future researchers as a foundation or a guide for similar
topics to be done and could also serve as literary basis for
further researches.
Objectives of the Study

Project Overview| 21

The main focus of the study was to design a Network


Infrastructure Plan for Pines International Academy.
Specifically, the researchers aimed in achieving the following
objectives:
1. To identify the current ICT infrastructure of DSWD
2. To plan the logical and physical network design

for Pines International Academy


3. To develop the security measures for proposed

network infrastructure for Pines International Academy

Definition of Terms
Backbone. A central conduit designed to transfer network
traffic.
Data Sharing. The ability to share the same data resource
with multiple applications or users.
Hub. A hardware device that is used to network multiple
computers together.
Modem. A modem is a communication device that can be either
internal or external to your computer. It allows one computer to

Project Overview| 22

connect with another computer and transfer data over telephone


lines.
Switches. Used to network multiple computers together.
Firewall. A computer security system that controls the flow
of data from one computer or network to another.
Hypertext Transfer Protocol (http). The communications
protocol used to connect to Web Servers on the Internet or on a
local network.
Uniform Resource Locator (URL). The address that defines the
route to a file on an Internet Server.
Wireless Access Point. A device that allows wireless devices
to connect to a wired network using Wi-Fi, Bluetooth, or related
standards.
Static Routing. The process in which the network
administrator would manually configure network routers with all
information necessary for successful packet forwarding.
Operating System (OS). Perform basic tasks, such as
recognizing input from the keyboard, sending output to the
display screen, keeping track of files and directories on the
disk, and controlling peripheral devices such as disk drives and
printers.

Project Overview| 23

Local Area Network (LAN). A computer network limited to a


small area such as an office building, university, or even a
residential home.
Hardware. Refers to the physical parts of a computer and
related device.
Software. A general term that is used to describe computer
programs. Relate terms such as software programs, applications,
scripts, and instruction sets.
Internet Protocol. It provides a standard set of rules for
sending and receiving data through Internet.
Subnetting. Breaking a large network into smaller networks.
You can accomplish this by changing the subnet mask.
Processor. A small chip that resides in computers and other
electronic devices. Its basic job is to receive input and provide
the appropriate output.
Memory. Refers any medium of data storage.
Hard

Disk

Drive.

spindle

of

magnetic

disks,

called

platters, that record and store information.


Open Source. It means the programs source code is freely
available to the public.

Project Overview| 24

Main Distribution Frame. A wiring rack that connects outside


lines

with

internal

lines.

It

is

used

to

connect

public

or

private lines coming into the building to internal networks.


Network Access. Part of telecommunications network which
connects subscribers to their immediate service provider.
Network Protocol. A system of digital rules for message
exchange within or between computers, well defined formats for
exchanging messages.
Servers.

system

that

responds

to

requests

across

computer network to provide, or help provide a network service.

Chapter 2
METHODOLOGY
The chapter will present the network design methodology that
shall be used in the study, scope and delimitation of the study,
data gathering techniques and sources of data.
Network Design Methodology
The researchers shall use the Top-Down Network Design
Methodology. The Top-Down Methodology for the proposed network
infrastructure plan is very similar to the methods used for
structured software development and system design as shown in
Figure 1. The researchers has selected the Top-Down Methodology

Project Overview| 25

as the methodology to be used for the network infrastructure plan


for Pines International Academy because of its emphasis on
meeting both business and technical requirements of the
organization.
The benefits of Analyze Requirements, Develop Logical
Design, Develop Physical Design, Documents Design, Implement and
Test Network, Monitor and Optimize Network Performance (ADDDIM)
are to reduce Total Cost of Ownership (TCO), speed-up access to
network resources and applications, and the availability of the
required applications and services.
Figure 1.
Top-Down Network Design Methodology

The Top-Down Methodology consists of six phases:


Analyze Requirements. The phase shall include the analysis
of business goals, constraints, technical goals, and
characterization of the existing network and network traffic.

Project Overview| 26

The researchers in this phase shall conduct an interview


with the network administrator of the school. The researchers
will also conduct ocular inspections for the entire the school.
Develop Logical Design. The phase includes the logical
network design that should refer to logical addressing used to
describe the network.
In this phase the researchers shall design the network
topology, the network addressing and naming scheme, select
switching and routing protocols, and developing network security
for the school.
Develop Physical Design. The phase consists about selecting
the appropriate network equipments and technologies.
The researchers will choose the specific VLAN technology
that suits the logical design for the virtual local area network
plan for the school.
Documents Design. This phase contains the documentation of
the network design.
The researchers shall record the progress and other
informations regarding to the network design.
Implement and Test Network. This phase contains the testing
and optimization of the network design. The network as designed
and optimized is implemented for business or production use.
The researchers will not perform this phase.

Project Overview| 27

Monitor and Optimize Network Performance. This phase covers


the observation or monitoring the networks day to day operation
and maintenance.
The researchers shall not execute this phase.
Scope and Delimination
The scope of the study will cover the Pines International
Academy's Department. It shall focus on the design of the ICT
Network Infrastructure Plan for the Department of Pines
International Academy. The study will include the floor plan as
well as the wall plan design also the layout of the cables and
the requirements, to be able to come up with an ICT Network
Infrastructure Plan that is best suited for Pines International
Academy Division. Only Analyze Requirements (Phase1), Develop
Logical Design (Phase2), Develop Physical Design (Phase3), and
Documents Design (Phase4) will be included on the study. Phase 5
and 6 were excluded because the study shall be reviewed.
Data Gathering Techniques
The researchers shall conduct interviews and documents that
was provided by the company. As for the logical and physical
design, the researchers shall conduct ocular observation and
inspection on Pines International Academy.
Interview. This method shall be used in acquiring precise,
consistent and more accurate information needed for the study.

Project Overview| 28

Getting information face to face with the interviewee is a great


way to extract information.
Ocular Observation and Inspection. This method shall be used
to gather insight on the current best practices on the workplace
network design, and the device information from the network
equipment.
Document Analysis. This shall be used in analyzing the
building infrastructure for appropriate devices for positioning,
and the distribution by viewing the building floor diagrams and
by reading the literatures on the workplace network design. It
will also be used to gather information on the business
requirements by reading the capital strategic plan.
Sources of Data
Direct interviews and document analysis are necessary
sources in gathering the needed and important data. The
respondent for the interview shall be one of the computer
maintenance technologist at Pines International Academy.
Other respondents such as the students, and staffs shall be
interviewed by the researchers for other information and also by
analyzing the documents provided by the school will also be
needed for the study.

Project Overview| 29

The copy of the floor plan shall be provided by the school


itself. The researchers were given a chance to observe the
existing the existing network infrastructure of the School.
Software Development Tools
Here are the Software Development tools that will be needed
or shall be used for the study.
Cisco Packet Tracer. The tool shall be used in testing the
network connections such as IP addressing, IP subnets, network
structures, and more.
Gliffy. This will be used to draw the floor plan of Pines
International Academy.

You might also like