Professional Documents
Culture Documents
Chapter 1
INTRODUCTION
Project Context
issues for the success of every enterprise. Networking, especially with full access
including traditional reference materials and timely facts. It also allows easier
accessibility for people to share their files, which greatly helps them with saving
more time and effort, since they could do file sharing more accordingly and
effectively.
Nursery to Senior High School which led them to grow and be recognized in their
area. Being a new school, not everything is developed and many projects are still
ongoing. One of the projects needed by the school which is still not implemented
There are many advantages of having a network in their campus and they
are not making the most out of it and being left out. An example is having ability
to Share Files, Data and Information which is very beneficial for large
2
for desired people. The availability of information and a secured file sharing
information of students and users can be found. And probably the most essential
can use to implement network infrastructure in the campus. This will help them
improve their overall productivity by sharing files to their peers, having a reliable
their campus which will increase their efficiency. The objectives of the proposed
network is to:
1. Provide a network design for the entire campus which can be used
infrastructure
lives. It allows users to share information, interact with each other and improve
overall productivity. These things are crucial to the needs of the campus thus we
propose a network design and layout for St. Bridget College Alitagtag.
The proposal contains the topology that shows the network design based on their
campus structure. They will have the ability to Share Files, Data and Information
organized manner and facilitate access for desired people. Scalability in a way
that the proposed network is capable of future upgrades and internet connectivity
Proponents
activities.
School/Client
This project will benefit the school and help them in creating
The time frame of the project will be approximately 1 year. That will
The study covers all the laboratories and end users in the campus which
includes the computer laboratory, robotics laboratory, faculty rooms and offices.
It will cover the four buildings mainly the Elementary, High school, Senior High
school and Admin building in making the network design. This includes the
management of their network. The study also includes network security, network
network and.
5
Definition of Terms
End user The person who uses the product (Learners Dictionary)
uses rules to control incoming and outgoing network traffic. (Margaret Rouse,
2014)
Intermediary devices provides connectivity and ensure that data flows across
the network. Example: switch, routers, etc. (Cisco Networking Academy, 2013)
Beal, 2014)
Technology The branch of knowledge that deals with the creation and use of
technical means and their interrelation with life, society, and the environment.
(Dictionary)
Server a system that delivers content or services to end users over the
internet. (Technopedia)
6
Chapter 2
Technical Background
which shows the physical layout of the proposed network design and the logical
topology where it shows the flow of information of the network. Next is the
proponents will use softwares such as MS Visio for the diagram illustrations and
business cannot keep happy customers. Reliable phone and internet service can
The article is similar to the study because the main purpose of designing a
layout for the campus is for them to have a network infrastructure. Having a
network in a campus is very important especially for sharing files, security and
internet connections. The campus can also benefit from all the advantages of
having a network and this article is very much what is needed to explain how a
The article is somewhat different to the objective of the study. The main
objective of the study is to create and design a network layout for the campus.
The article tackles more on the purpose of the study which is to have a solid
support application requirements and deliver a high quality user experience. The
applications and file/print sharing services using desktop and later lap top PCs.
Today, the range of applications and supporting protocols has broadened while
One of the similarities is that it tackles a campus network which is also the
beneficiary of the study. It shows the topologies, design and possible hardwares
needed for a campus. It also shows the benefits and other features needed by a
campus to have a solid and secured network which is similar and can be used for
the study.
campus layout. The hardwares and some network equipments are different
mainly because of how big the layout is. The limitations are somewhat different
networked with little buzz or fanfare. School networks offer big advantages to
teachers and students, but this powerful tool comes with a price tag. Schools can
will be better prepared for future jobs in industry. Networks can help teachers to
complete better online lesson plans and forms from a variety of locations --
multiple classrooms, staff lounges, and their homes. In short, the promise of
The article is similar to the purpose of the study because the article above
discusses the advantages of having a computer network into the campus. It also
shows that having a network in the campus can increase overall productivity of
both students in which can help them be prepared on their future jobs and
Nevertheless there were some differences such as the article also tackles
online software tools which is beneficial to both teachers and students but it
contradicts the objective of the study which is to create a network design and
article provides a brief overview of some of the main ICT Infrastructure areas that
administration in schools. The article also highlights some shifts and trends that
are happening in how schools are using ICT. It also highlights some key ICT
areas for schools, including school wireless networks, which connect teacher and
student mobile devices via broadband to cloud based tools and applications.
which teachers can use their devices such as laptops and smartphones to
connect to the internet where they can wirelessly share and access network
resources easily where they would be more productive. A reliable connection and
As such there are some differences like the Bring your own device
more advanced phase in a network design . It is far from the objective of the
study which is to design the network. Also the purpose of the study is to create
Hossain2 and Md. Masud Parvez (2013), security has been a pivotal issue in the
important part of campus life and network security is essential for a campus.
Campus network faces challenges to address core issues of security which are
publishing and connection with the external users. Network security will prevent
network layout for the client. It also uses different security measures which is
crucial to the needs of a campus to protect their files. It focuses on the security of
the network and shows different security issues that a campus might experience
The difference is that this study focuses more on security and not the
solid network security for the campus. This is different to the study because
security is not the main objective and just part of the purpose of the study.
12
system on LAN security whose main aim is to upgrade the existing network,
handle traffic, provide reliable, fast connection and available anytime and ensure
The network devices are accessible remotely in a secure place away from
the actual physical university campus where they are prone to various types of
configuration and they have been authenticated by the system and they have the
required authorization.
The similarity is that it also tackles a campus network. It has the same
objectives like designing network layout and such. It shows the different
beneficial.
proponent's study is only network design and layout and not for implementation.
13
undergoing drastic transformation in response to end users' need for mobility and
Ethernet cables or wireless using radio waves, also known as Wi-Fi - Wireless
Fidelity. The technology of wireless connectivity has come of age, and is now a
Based on the article there are similarity from the study which is about
networks are to be used by teachers. Thus for optimal use, the proponents
chooses wireless equipment which supports dual band frequencies that can
The difference is that the study focuses more on wireless connections and
technical side of networking. While the proposed study focuses more on the
Based on the study of Elin Lundstrm (2014), the purpose of this thesis is
role in the network infrastructure. The author will with her work provide
knowledge about the role of third parties within networking and present the
factors in which the third party can improve their work to create and deepen
relationships between members of the network. The thesis will also generate and
disseminate knowledge about the benefits provided of third party and give advice
on how the third parties can create and exchange knowledge and resources to
to third parties. Also the studys goal is to generate knowledge about the benefits
of network.
Still there are some differences of both studies. They both differ on
objectives which the study aims to broaden the knowledge of network while the
proposed network is to create a network design and layout for the client.
15
exploratory analysis
risk. The purpose of this research was to examine first, what factors are
important to network risk judgments (Study 1) and second, how risky/safe each
complete list of factors was generated using a focus group method and validated
Both the research and the proposed study tackle and show the importance
of having network security. They effectively describe the factors of how risky/safe
The difference is that the research focuses more on network security while
the proposed study focuses more on the institution's Network design and layout.
16
Synthesis
many advantages of having a network and one example is having ability to share
files, data and information which is very beneficial for large organizations to
maintain their data in an organized manner. Having a secured file sharing and
needed to protect the whole network from attacks and other possible problems.
In implementing this, having a solid network design and layout is needed which is
Chapter 3
METHODOLOGY
Requirements Analysis
Saint Bridget College is a new school and being a new one, not everything
is developed and many projects are still ongoing. One of the projects needed by
the school which is still not implemented is having a whole campus network
infrastructure. They lack the ability to Share Files, Data and Information which is
manner. Secured file sharing which is very crucial especially in a campus where
different confidential information of students and users can be found. The school
Two (2) computers are connected which is being used by the cashier for their
online transactions. They lack internet connectivity in their facilities like computer
laboratories, faculty rooms and offices which is very much needed both by the
The figure shows the current physical topology of the campus. Internet
connection is only available in the admin building which connects two (2)
computers being used by the cashier and registrar. Different devices in the
faculty, offices, computer lab and robotics as shown above dont have network
connections at all.
19
SWOT Analysis
STRENGTH WEAKNESSES
in the 3 buildings
OPPORTUNITY THREATS
connection
Easy installation of cable structure
Requirements Documentation
The campus is a new school and most of their facilities are still being
upgraded and developed. Currently, there are a total of 80 users in the campus
including the computer laboratories and offices. The total network user that will
can still be accommodated considering that the proposed network should handle
any additional devices within 12 months. All the devices installed on the network
Device name
Router
Firewall
Switch
Server
Switch Cabinet
Wireless Router
Admin PC
RJ45 connector
UPS
21
set)
Server Specifications
Internal SSD
Operating system
Connection information
Gigabit connection
Application Requirements
computers and wireless connections for laptops in the whole campus which will
allow the students, students and faculty to access the internet for learning and
productivity purposes.
23
their network is secured from malicious threats like hackers, DoS, sniffing attacks
and other threats that may arise such as information leaks. It will provide highly
continuity. With this, the campus is confident that important files and information
are safe from arising threats and will perform at its utmost performance.
The Proposed network has twenty-four (24) hours seven (7) days uptime.
The proposed network can have 99.9% uptime by having a backup ISP to
Figure2.Bandwidth Computation
approximate internet bandwidth that the school needs. There are 3 things
needed in order to get the internet bandwidth. First is the total number of users
which is as of the today is 80 users. Next as seen in the figure above there are 3
types of users, the light, medium and heavy user which has their corresponding
download speeds per user. Thus by using the formula above, 80 users X
157kbps (157kbps is used for extra speed and scalability) = 12,500 or 100Mbps
Feasibility Study
Operational Feasibility
designed using the two-tier hierarchal design where the core and distribution
layer are collapsed into one layer. The proponents chose this architecture design
because SBCA is starting to build their network infrastructure, thus making the
design where only the core and distribution layers are implemented giving a
reduced network cost while maintaining most of the benefits of the three tier
hierarchical architecture.
SBCAs current network only has a small topology in the admin department and
the computers have no network connection at all, but through this proposal all
cable structure is well organized by using tunnels and underground wiring that
will provide low maintenance, fewer faults and is safe from shaking and shorting
Economic Feasibility
Currently, the school has an internet connection but is limited only to the
cashier. They lack the ability to share files, data and information which is needed
network includes the support of the high-speed network capabilities and different
necessary network equipment. The estimate total cost of all needed hardware
will be Php 396,850; the process of designing the layout will take a lot of time to
Table2.Cost
(4pcs)
Benefits
The proposed network will benefit the students, teachers and staff. If the
proposed network will be implemented, they are entitled to use the internet for
learning and research purposes. It can also provide file sharing capabilities to
28
both students and teachers via vlan configurations and is protected to malicious
Technical Feasibility
starting from the main router; it blooms to a growing network. Secondly, it saves
cost by reducing the amount of equipment needed to set up the network. Another
is that it allows for fine-tuned access control list traffic shaping and blocking
which is most effective to SBCA due to the fact that SBCA is starting from a small
wont have the distribution layer. Thus, only the core and access layers are
implemented.
gateway to the internet and also provides scalability and fast convergence. The
Access layer performs network entry control which grants users access to the
network.
29
Schedule Feasibility
Date Activity
-Project Context
-Objectives
-Definition of Terms
-Technical Background
Date Activity
-Synthesis
Requirements Analysis
- Current Process
- Operational Framework
- SWOT Analysis
Requirements Documentation
Device Requirements
- Application
Requirements
Requirements
Requirements
Feasibility Study
- Design of System,
Software, and
31
Date Activity
Processes
- Development Standards
- Testing Standards
-Project Completion
- Project Presentation
-Final Defense
32
Design
Final Network
Knowledge design and layout for
Requirements (Basic Network Designing
and Layout (Using St Bridget College
Networking Alitagtag
knowledge and Microsoft Visio)
technicalities)
Network Topology
and Configuration
Development Tools (Using Packet
(Packet Tracer, Tracer)
Microsoft Visio)
Figure3. Design
project. Development tools will also be needed to provide the necessary output
by using namely Packet Tracer and Microsoft Visio. The process that will be
done is the designing of the network for the campus by using Microsoft Visio and
the configuration of the network topology by using Packet tracer. The Output of
the project is the Network Design and Layout with the network topology of the
campus.
33
Network Design
Cabling Design.
This figure shows the proposed cabling design for the Senior High School
Building. The switch will be located in the faculty room in the first floor of the
building which will then be connected to a wireless router using UTP cable. The
switch is being connected to the admin building with 2 UTP cable for redundancy
purposes.
34
This shows the proposed cabling design for the High School building. The
switch is being connected to the admin building with 2 UTP cable for redundancy
purposes. It then distributes the connection to the offices and to the wireless
building. The switch is being connected to the admin building with 2 UTP cable
for redundancy purposes. It is located in the second floor of the building where
the computer laboratory is located. It will then distribute it to the different offices
This figure shows the proposed cabling design for the computer
the elementary building is located in this laboratory which will also distribute the
connection to the other offices and laboratory in the building. The switch is being
connected to the admin building with 2 UTP cable for redundancy purposes.
36
This figure shows the cabling structure in the Admin Building. This shows
the 2 ISP which is connected to the router. The main switch then distributes the
connection to the distribution switches which is connected using 2 UTP cables for
using 2 UTP cables for redundancy and to let the access layer access the
network.
37
This figure shows the proposed cabling design for the Senior High School
Building. The red line shows the Fiber Optic that run through the ground of the
building inside a tube tunnel where it gets to the underground until it reaches the
admin connected from the admin building to the SHS building. The switch will be
38
located in the faculty room in the first floor of the building which will then be
This shows the proposed cabling design for the High School building.
The switch in the library is connected to the admin building using the fiber optic
cable that run through the back of the building inside a tube tunnel where it gets
to the underground until it reaches the admin from the HS building. The switch
then distributes the connection to the offices and to the wireless router located in
Figure 6 shows the proposed cabling design for the Elementary building.
From the switch, the red line is the fiber optic cable that runs through the back of
the building inside a tube tunnel where it gets to the underground until it reaches
the admin. The switch will be located in the second floor of the building. It will be
in the computer laboratory which will then distribute it to the different offices and
laboratory in the building. The wireless router in the 3 rd floor is connected to the
This figure shows the proposed cabling design for the computer
the elementary building is located in this laboratory which will also distribute the
connection to the other offices and laboratory in the building. The red line is the
Fiber optic cable which connects the Admin Building to the Elementary building.
Network Devices
There will be a router, a switch, a wireless access points, server and different
networking cables such Ethernet cables. It will also have a firewall which is to
protect them in case of threats and information leaks which is a very crucial for a
campus which handles different information both by the students and teachers.
41
LAN Devices.
Table4.Switch Features
Static Routing
(LACP)
STP/RSTP/MSTP
IGMP Snooping
Port Isolation
Quality of Service
8 priority queues
DSCP QoS
Security Strategies
Storm Control
IP-MAC-Port Binding
ARP Inspection
Dos Defend
IPv6 Support
MLD Snooping
PMTU Discovery
Management
Web-based GUI
SNMP v1/v2c/v3
Dual Image
Table5.Server Features
RAID0/RAID1/RAID10. The
Table6.Admin PC Features
44
Internetworking Devices.
Table7.Router Features
Dual-radio performance,
Gigabit speeds
performance
management
Physical Topology
The figure above shows the proposed topology for Saint Bridget College
Alitagtag. The current 80 users are being connected to a one big network which
is separated by vlans. It also has 2 ISP with one as the primary and one as
backup. This will allow the students, faculty and staff to connect to the internet
Logical Topology.
Figure 10 shows the proposed logical topology of the campus. This shows
how the different faculty, offices and laboratory will be connected to the admin
building and how the connectivity will be distributed in the campus. The router will
IP Addressing Plan
The IP Block Address of the whole network is 172.16.0.0/24. Since there are four
172.16.0.82.
The development and testing for the network design will be tested using
simulation software, packet tracer in order to show that the proposed network is
indeed working at its fullest. The packet tracer will also serve as the testing
model that will showcase different features and functionality of the network
49
Appendix A
PROJECT PLAN
Project Manager
Network
Tech Support Head
Administrator
Under the manager, the tech support head will be the one in charge of routing
50
the structure cabling and supports the network admin in other tasks and the
Roles Responsibility
network equipment.
Table10. WBS
START END
Definition Phase
Final Manuscript 3 17 17
Manuscript 2 17 17
Designing Phase
Planning 19 17 17
3-Dec-
10-Jan- 3-May-
Network Configuration 65 18 18
52
Trial Phase
3-Dec-
12-Jan- 2-May-
Test Execution 60 18 18
5-May- 5-May-
Project Closure 1 18 18
27-Jul- 5-May-
Appendix B
TEST PLAN
Testing Approach
The testing will be done by the proponents to ensure that the proposed
network is working and reliable to use. All the testing will be done along with the
network configuration which will start after designing the final layout. Network
Configuration starting from the easiest part is the most effective approach for the
project. Aside from the configurations, these are some of the testing which will be
Ensuring the compatibility of the devices is very important especially in the start
that both the hardware and software application and devices are working with
Network Connectivity
connected to their respective LAN network and can also ping each
other.
Application connectivity
Hardware Testing
The hardware testing ensures the compatibility of the devices used in the
needed for the proposed network to work well. Hardware test steps are much
56
shorter, involving only a few steps to verify if a product works. It tests functional
System Testing
Protocol (DHCP)
Device capabilities
Table12.System Testing
packet tracer in order to test if the proposed topology is working or not. The first
57
test is to determine and configure the switching functionalities. The next test is
the network management which highlights the protocols and some security
configurations that will be used. Another test is the performance test which will
Test Environment
The test data that will be used is packet tracer. The packet tracer shall test
and verify the device configurations such as IP addressing, SSH, Passwords &
Banners, DHCP and VLAN configurations. It will also portray the whole topology
days)
Hardware
Security Testing
7 22-Jan-18 29-Jan-18
Hardware and
58
Assessment
Performance
Determination
Network
Configuration
Testing Deliverables
The test deliverables for the network design is the packet tracer. The
purpose of the packet tracer is to show that the created topology is optimized and
all of the hardware such as pc, switches, router and server are correctly
testing will be done by pinging. It is to validate if each end user is able to connect
to the network.
59
APPENDIX C
RISK PLAN
effect on at least one project objective. It is anything that could potentially impact
identifying, categorizing, prioritizing and planning for risks before they become
issues. The test data that will be used is packet tracer. The packet tracer shall
test and verify the device configurations such as IP addressing, SSH, Passwords
& Banners, DHCP and VLAN configurations. It will also portray the whole
Severity
0 Not Applicable
Probability
0 Not Applicable
1 Seldom
2 Occasional
3 Likely
4 Frequent