You are on page 1of 60

1

Chapter 1

INTRODUCTION

Project Context

Information and communication are two of the most important strategic

issues for the success of every enterprise. Networking, especially with full access

to the web, allows ways of communication that would simply be impossible

before it was developed. It allows access to a vast amount of useful information,

including traditional reference materials and timely facts. It also allows easier

accessibility for people to share their files, which greatly helps them with saving

more time and effort, since they could do file sharing more accordingly and

effectively.

Saint Bridget College Alitagtag marked its beginning at the

groundbreaking on December 15, 2006. The school offers education from

Nursery to Senior High School which led them to grow and be recognized in their

area. Being a new school, not everything is developed and many projects are still

ongoing. One of the projects needed by the school which is still not implemented

is having a whole campus network infrastructure.

There are many advantages of having a network in their campus and they

are not making the most out of it and being left out. An example is having ability

to Share Files, Data and Information which is very beneficial for large
2

organizations to maintain their data in an organized manner and facilitate access

for desired people. The availability of information and a secured file sharing

which is very crucial especially in a campus where different confidential

information of students and users can be found. And probably the most essential

needed by every school providing a computer course or subject is to have a

secured internet connection where users can connect simultaneously.

The proposal is to design a network layout, which is a guideline that they

can use to implement network infrastructure in the campus. This will help them

improve their overall productivity by sharing files to their peers, having a reliable

and fast connection and accessing the internet in a secured manner.

Goals and Objectives

The goal of the project is to design a network specifically suited for

their campus which will increase their efficiency. The objectives of the proposed

network is to:

1. Provide a network design for the entire campus which can be used

to have a fast and reliable connection.

2. Apply structured cabling management for an organized cabling

infrastructure

3. Secure network from unauthorized access through Firewall


3

4. To configure the proposed design layout through simulation.

Purpose and Description

In todays generation, technology has become an essential part of our

lives. It allows users to share information, interact with each other and improve

overall productivity. These things are crucial to the needs of the campus thus we

propose a network design and layout for St. Bridget College Alitagtag.

The proposal contains the topology that shows the network design based on their

campus structure. They will have the ability to Share Files, Data and Information

which is very beneficial for large organizations to maintain their data in an

organized manner and facilitate access for desired people. Scalability in a way

that the proposed network is capable of future upgrades and internet connectivity

within the campus. The beneficiary of the proposed network includes:

Proponents

This project will help the proponents to enhance their skill

and knowledge in network designing. They will able to learn more

about network planning which can help them in their future

activities.

School/Client

This project will benefit the school and help them in creating

network infrastructure in their campus.


4

Students and Teachers

This study will benefit the students to have access in the

internet, share files and data faster and easier.

The time frame of the project will be approximately 1 year. That will

conclude the documentation and network design to be presented to the client.

Scope and Limitation

The study covers all the laboratories and end users in the campus which

includes the computer laboratory, robotics laboratory, faculty rooms and offices.

It will cover the four buildings mainly the Elementary, High school, Senior High

school and Admin building in making the network design. This includes the

structured cabling management, IP and VLAN management for a more efficient

management of their network. The study also includes network security, network

configuration, wireless connections, DHCP server and Web server.

It does not include the development of system application related to

network and.
5

Definition of Terms

Bandwidth A measurement of the ability of an electronic communications

device or system. (Learners Dictionary)

End user The person who uses the product (Learners Dictionary)

Firewall a network security system, either hardware- or software-based, that

uses rules to control incoming and outgoing network traffic. (Margaret Rouse,

2014)

Intermediary devices provides connectivity and ensure that data flows across

the network. Example: switch, routers, etc. (Cisco Networking Academy, 2013)

Network defined as a group of two or more systems linked together. (Vangie

Beal, 2014)

Network media refers to cables linking workstations together

Technology The branch of knowledge that deals with the creation and use of

technical means and their interrelation with life, society, and the environment.

(Dictionary)

Topology A layout pattern of the interconnection between computers in a

network (Margaret Rouse, 2016)

Server a system that delivers content or services to end users over the

internet. (Technopedia)
6

Chapter 2

REVIEW OF RELATED LITERATURE

Technical Background

The Network design includes topologies such as the physical topology

which shows the physical layout of the proposed network design and the logical

topology where it shows the flow of information of the network. Next is the

structured cabling where it emphasizes the cabling infrastructure of the campus.

Also the proposed design includes the list of recommended hardware

components such as routers, switches and other network equipments. The

proponents will use softwares such as MS Visio for the diagram illustrations and

packet tracer for the logical topology.


7

Review of Related Literature and Related Systems

Why is a solid network infrastructure important for a business?

Based on an article from 10gea (2017), businesses depend on a network

infrastructure for all aspects of daily operations. The importance of a solid

network infrastructure is a crucial part of any business. Without customer contact,

there are no customers. Without a smoothly running order department, a

business cannot keep happy customers. Reliable phone and internet service can

be the difference between a profitable company and failing one.

The article is similar to the study because the main purpose of designing a

layout for the campus is for them to have a network infrastructure. Having a

network in a campus is very important especially for sharing files, security and

internet connections. The campus can also benefit from all the advantages of

having a network and this article is very much what is needed to explain how a

solid network can help them.

The article is somewhat different to the objective of the study. The main

objective of the study is to create and design a network layout for the campus.

The article tackles more on the purpose of the study which is to have a solid

network and shows the benefit of having one.


8

Campus Network Infrastructure, Base Reference Architecture

According to Brook Reams (2014), campus networks are designed to

support application requirements and deliver a high quality user experience. The

original campus network was designed to meet the requirements of client/server

applications and file/print sharing services using desktop and later lap top PCs.

Today, the range of applications and supporting protocols has broadened while

end-user devices have become mobile relying on wireless LAN (WLAN) to

support user mobility and consistent connectivity.

One of the similarities is that it tackles a campus network which is also the

beneficiary of the study. It shows the topologies, design and possible hardwares

needed for a campus. It also shows the benefits and other features needed by a

campus to have a solid and secured network which is similar and can be used for

the study.

The difference is that it tackles not a specific but more on a general

campus layout. The hardwares and some network equipments are different

mainly because of how big the layout is. The limitations are somewhat different

but overall the objective is similar.


9

Computer Networking in Todays School

According to Bradley Mitchell (2016), compared to home and business

environments, computers in elementary and secondary schools are being

networked with little buzz or fanfare. School networks offer big advantages to

teachers and students, but this powerful tool comes with a price tag. Schools can

profit from computer networking in many of the same ways as corporations or

families. Theoretically, students exposed to a networked environment in school

will be better prepared for future jobs in industry. Networks can help teachers to

complete better online lesson plans and forms from a variety of locations --

multiple classrooms, staff lounges, and their homes. In short, the promise of

school networks seems almost unlimited.

The article is similar to the purpose of the study because the article above

discusses the advantages of having a computer network into the campus. It also

shows that having a network in the campus can increase overall productivity of

both students in which can help them be prepared on their future jobs and

teachers which can help them be better at teaching by using network

equipments such as internet and etc.

Nevertheless there were some differences such as the article also tackles

online software tools which is beneficial to both teachers and students but it

contradicts the objective of the study which is to create a network design and

layout for the campus.


10

Technology Overview in Schools - ICT Infrastructure

Based on an article from PDST Technology in Education (2013), the

article provides a brief overview of some of the main ICT Infrastructure areas that

are becoming more relevant to support teaching, learning, assessment and

administration in schools. The article also highlights some shifts and trends that

are happening in how schools are using ICT. It also highlights some key ICT

areas for schools, including school wireless networks, which connect teacher and

student mobile devices via broadband to cloud based tools and applications.

Similarly, the proposed network also tackles about wireless network in

which teachers can use their devices such as laptops and smartphones to

connect to the internet where they can wirelessly share and access network

resources easily where they would be more productive. A reliable connection and

good bandwidth allocation is also needed to be more agile.

As such there are some differences like the Bring your own device

(BYOD) which is an alternative option to support mobile learning where it is in a

more advanced phase in a network design . It is far from the objective of the

study which is to design the network. Also the purpose of the study is to create

the schools first network design.


11

Design and Implementation of a Secure Campus Network

Based on a study by Mohammed Nadir Bin Ali, Mohamed Emran

Hossain2 and Md. Masud Parvez (2013), security has been a pivotal issue in the

design and deployment of an enterprise network. A Campus network is an

important part of campus life and network security is essential for a campus.

Campus network faces challenges to address core issues of security which are

governed by network architecture. Secured network protects an institution from

security attacks associated with network. A university network has a number of

uses, such as teaching, learning, research, management, e-library, result

publishing and connection with the external users. Network security will prevent

the university network from different types of threats and attacks.

Similarly, the study also tackles a campus network and to design a

network layout for the client. It also uses different security measures which is

crucial to the needs of a campus to protect their files. It focuses on the security of

the network and shows different security issues that a campus might experience

which is very much needed also by the study.

The difference is that this study focuses more on security and not the

network as a whole. It tackles more on solving security problems and designs a

solid network security for the campus. This is different to the study because

security is not the main objective and just part of the purpose of the study.
12

Design, Implementation and Management of JKUAT KAREN Secured LAN

The study created by Aganze Murhabazi Eliud (2014) is a network based

system on LAN security whose main aim is to upgrade the existing network,

handle traffic, provide reliable, fast connection and available anytime and ensure

security of users and the system.

The network devices are accessible remotely in a secure place away from

the actual physical university campus where they are prone to various types of

damages. From this remote location, network administrator is able to make

configuration and they have been authenticated by the system and they have the

required authorization.

The similarity is that it also tackles a campus network. It has the same

objectives like designing network layout and such. It shows the different

advantages and disadvantages of network to the campus which is very

beneficial.

The difference is that this study is for implementation while the

proponent's study is only network design and layout and not for implementation.
13

Establishing Campus Area Networking using a Combination of Wireless

and Wired Connectivity

According to R. Ganesan and C.R. Girija (2013), Computer networking is

undergoing drastic transformation in response to end users' need for mobility and

connectivity while exchanging information among computers. There are two

basic ways by which a computer network can be established - wired using

Ethernet cables or wireless using radio waves, also known as Wi-Fi - Wireless

Fidelity. The technology of wireless connectivity has come of age, and is now a

viable, low cost alternative to the traditional wired technologies.

Based on the article there are similarity from the study which is about

hardware specifications and Campus area network. As proposed, the wireless

networks are to be used by teachers. Thus for optimal use, the proponents

chooses wireless equipment which supports dual band frequencies that can

increase the overall effectiveness of the said equipment.

The difference is that the study focuses more on wireless connections and

technical side of networking. While the proposed study focuses more on the

Design and layout of the campus.


14

A Case Study on Third Party in the Process of Networking

Based on the study of Elin Lundstrm (2014), the purpose of this thesis is

to increase the understanding of networking and in particular the third party's

role in the network infrastructure. The author will with her work provide

knowledge about the role of third parties within networking and present the

factors in which the third party can improve their work to create and deepen

relationships between members of the network. The thesis will also generate and

disseminate knowledge about the benefits provided of third party and give advice

on how the third parties can create and exchange knowledge and resources to

provide benefits to the partners involved in networking.

Similarly, the study tackles the importance of understanding of the network

to third parties. Also the studys goal is to generate knowledge about the benefits

of network.

Still there are some differences of both studies. They both differ on

objectives which the study aims to broaden the knowledge of network while the

proposed network is to create a network design and layout for the client.
15

Factors influencing network risk judgments: a conceptual inquiry and

exploratory analysis

According J Cowley (2015), effectively assessing and configuring security

controls to minimize network risks requires human judgment. Little is known

about what factors network professionals perceive to make judgments of network

risk. The purpose of this research was to examine first, what factors are

important to network risk judgments (Study 1) and second, how risky/safe each

factor is judged (Study 2) by a sample of network professionals. In Study 1, a

complete list of factors was generated using a focus group method and validated

on a broader sample using a survey method with network professionals.

Both the research and the proposed study tackle and show the importance

of having network security. They effectively describe the factors of how risky/safe

the network is.

The difference is that the research focuses more on network security while

the proposed study focuses more on the institution's Network design and layout.
16

Synthesis

Having a network infrastructure is a crucial part of any business. There are

many advantages of having a network and one example is having ability to share

files, data and information which is very beneficial for large organizations to

maintain their data in an organized manner. Having a secured file sharing and

availability of different informations is very important especially in a campus

where different confidential information of students and users can be found.

Network security is very important and having different security measures is

needed to protect the whole network from attacks and other possible problems.

In implementing this, having a solid network design and layout is needed which is

a guideline that they can use in their campus.


17

Chapter 3

METHODOLOGY

Requirements Analysis

Saint Bridget College is a new school and being a new one, not everything

is developed and many projects are still ongoing. One of the projects needed by

the school which is still not implemented is having a whole campus network

infrastructure. They lack the ability to Share Files, Data and Information which is

very beneficial for large organizations to maintain their data in an organized

manner. Secured file sharing which is very crucial especially in a campus where

different confidential information of students and users can be found. The school

has a computer laboratory which is consist of 34 computers. They also have a

robotics laboratory which has a total of 13 laptops and different computers

located in different offices.

Currently, Internet connectivity is only available in the admin building.

Two (2) computers are connected which is being used by the cashier for their

online transactions. They lack internet connectivity in their facilities like computer

laboratories, faculty rooms and offices which is very much needed both by the

students and teachers.


18

Figure1.Current Physical Topology

The figure shows the current physical topology of the campus. Internet

connection is only available in the admin building which connects two (2)

computers being used by the cashier and registrar. Different devices in the

faculty, offices, computer lab and robotics as shown above dont have network

connections at all.
19

SWOT Analysis

Table1. SWOT analysis

STRENGTH WEAKNESSES

Wired internet connectivity in the Lack of whole campus network

admin building only infrastructure

Lack of internet connection available

in the 3 buildings

OPPORTUNITY THREATS

Improve Network Design of the Limited learning and communication

campus with security resources due to lack of internet

connection
Easy installation of cable structure

New hardware components


20

Requirements Documentation

The campus is a new school and most of their facilities are still being

upgraded and developed. Currently, there are a total of 80 users in the campus

including the computer laboratories and offices. The total network user that will

be supported by the network is about 100 users. Possible additional computers

can still be accommodated considering that the proposed network should handle

any additional devices within 12 months. All the devices installed on the network

include the following:

Device name

Router

Firewall

Switch

Server

Switch Cabinet

Wireless Router

Admin PC

RJ45 connector

CAT6 UTP cable

UPS
21

Brand and model

(Router) CISCO 2911 Router

(Firewall) CISCO ASA5505-SEC-BUN-K9 ASA 5500

(Switch) TP-Link JetStream T1600G-28PS 24-Port Gigabit

Smart POE + Switch w/ 4x SFP Slots (6pcs)

(Switch Cabinet) Safstar Wall Mount Network Server Data

Cabinet Enclosure Rack Glass Door Lock w/ Fan (12U) (4

set)

(UPS) APC Smart-UPS 1500VA UPS Battery Backup with


Pure Sine Wave Output (SMC1500) (5 pcs)
(CAT6 UTP) Dripstone CAT6 Solid UTP Cable 23AWG

1000ft LAN Network Ethernet RJ45 Wire, Blue (2 sets)

(RJ45 connector) Cybertech Cat6, Cat5e RJ-45 Ethernet

Crimp Connectors Pack of 100 (3 sets)

(Wireless AP) Ubiquiti Unifi Ap-AC Lite - Wireless Access

Point - 802.11 B/A/G/n/AC (4pcs)

(Admin PC) 2017 Dell Inspiron All-In-One 23.8"

Server Specifications

AMD Ryzen 1700X AM4 Processor + Corsair Hydro Series

H110i 280mm Liquid Cooler

GIGABYTE AORUS GA-AX370-Gaming 5


22

EVGA GeForce GTX 1050 Ti SC 4GB DDR5

Seagate 2TB BarraCuda

Corsair Vengeance LPX 16GB DDR4 3200Mhz

SeaSonic 650-Watt ATX12V/EPS12V 80 PLUS GOLD

Certified Active PFC Power Supply

Corsair Carbide Series SPEC-01 Mid Tower

Samsung 960 EVO Series - 250GB PCIe NVMe - M.2

Internal SSD

Operating system

Cisco IOS software (Networking equipment/s)

Windows 2012 OS (Server)

Windows 7 or higher (Desktop)

Connection information

Gigabit connection

Application Requirements

The proposed network design will provide internet connection to the 80

computers and wireless connections for laptops in the whole campus which will

allow the students, students and faculty to access the internet for learning and

productivity purposes.
23

Security and Privacy Considerations

The proposed design is to have a dedicated firewall security to secure that

their network is secured from malicious threats like hackers, DoS, sniffing attacks

and other threats that may arise such as information leaks. It will provide highly

secured, high-performance access and high availability to help ensure business

continuity. With this, the campus is confident that important files and information

are safe from arising threats and will perform at its utmost performance.

Reliability and Uptime Expectations

The Proposed network has twenty-four (24) hours seven (7) days uptime.

The proposed network can have 99.9% uptime by having a backup ISP to

eliminate unwanted interruptions and in case the primary network fails.


24

Figure2.Bandwidth Computation

The figure above shows the bandwidth computation in getting the

approximate internet bandwidth that the school needs. There are 3 things

needed in order to get the internet bandwidth. First is the total number of users

which is as of the today is 80 users. Next as seen in the figure above there are 3

types of users, the light, medium and heavy user which has their corresponding

download speeds per user. Thus by using the formula above, 80 users X

157kbps (157kbps is used for extra speed and scalability) = 12,500 or 100Mbps

where 1 user has a download speed of 157kbps.


25

Feasibility Study

Operational Feasibility

The proposed network design is operationally feasible because it is

designed using the two-tier hierarchal design where the core and distribution

layer are collapsed into one layer. The proponents chose this architecture design

because SBCA is starting to build their network infrastructure, thus making the

two-tier hierarchal design a more fitting architecture because of its practical

design where only the core and distribution layers are implemented giving a

reduced network cost while maintaining most of the benefits of the three tier

hierarchical architecture.

Also, the proposed network design is operationally feasible because

SBCAs current network only has a small topology in the admin department and

the computers have no network connection at all, but through this proposal all

computers including laptops will be connected to the internet. The proposed

cable structure is well organized by using tunnels and underground wiring that

will provide low maintenance, fewer faults and is safe from shaking and shorting

due to wind, accidents and others.


26

Economic Feasibility

Currently, the school has an internet connection but is limited only to the

cashier. They lack the ability to share files, data and information which is needed

to maintain their data in organized manner. The availability of information and a

secured file sharing which is very crucial in securing different confidential

information of students and users. The economic benefits of this proposed

network includes the support of the high-speed network capabilities and different

necessary network equipment. The estimate total cost of all needed hardware

will be Php 396,850; the process of designing the layout will take a lot of time to

assure the whole network functionality.

Table2.Cost

Device Name Brand And Model Cost

Router CISCO 2911 Router Php 48,750

CISCO ASA5505-SEC-BUN-K9 ASA

Firewall 5500 Php 17,500

TP-Link JetStream T1600G-28PS

24-Port Gigabit Smart POE + Switch

Switch w/ 4x SFP Slots (6pcs) Php 75,600

Dripstone CAT6 Solid UTP Cable

CAT6 UTP 23AWG 1000ft LAN Network Php 6,000


27

Ethernet RJ45 Wire, Blue (2 set)

Cybertech Cat6, Cat5e RJ-45

Ethernet Crimp Connectors 100pcs

RJ45 connector (3 sets) Php 1,500

Ubiquiti Unifi Ap-AC Lite - Wireless

Access Point - 802.11 B/A/G/n/AC

(4pcs)

Wireless AP Php 15,400

Admin PC 2017 Dell Inspiron All-In-One 23.8" Php 42,000

Server Customized Server Php 66,300

Safstar Wall Mount Network Server

Data Cabinet Enclosure Rack Glass

Switch Cabinet Door Lock w/ Fan (12U) (4 pcs) Php 14,800

APC Smart-UPS 1500VA UPS


Battery Backup with Pure Sine Wave
Output (SMC1500) (5 pcs)
UPS Php 82,000

Benefits

The proposed network will benefit the students, teachers and staff. If the

proposed network will be implemented, they are entitled to use the internet for

learning and research purposes. It can also provide file sharing capabilities to
28

both students and teachers via vlan configurations and is protected to malicious

threats and information leaks via firewall security.

Technical Feasibility

The proposed network design is technically feasible because hierarchal

topology is applied. This topology is used because firstly it is easy to design

starting from the main router; it blooms to a growing network. Secondly, it saves

cost by reducing the amount of equipment needed to set up the network. Another

is that it allows for fine-tuned access control list traffic shaping and blocking

unwanted traffic. The hierarchical model used is a two-tier hierarchal design

which is most effective to SBCA due to the fact that SBCA is starting from a small

network which consists of 80 computers and its cost effectiveness because it

wont have the distribution layer. Thus, only the core and access layers are

implemented.

The core layer is in charge of forwarding traffics at very high speeds,

gateway to the internet and also provides scalability and fast convergence. The

Access layer performs network entry control which grants users access to the

network.
29

Schedule Feasibility

Table3. Schedule Feasibility

Date Activity

28 June Assembly Guidelines

28 June Discussion of Manuscript Format

30 June Submission of Capstone Proposal

Topics to the TIC

03 July 04 July Approval of Proposal Topics

04 July Selection of Advisers

07 July Submission of Chapter 1

-Project Context

-Objectives

-Purpose and Description

-Scope and Limitations

-Definition of Terms

14 July Submission of Chapter 2

-Technical Background

-Review of Related Literature


30

Date Activity

and Related Systems

-Synthesis

24 July Submission of Chapter 3

Requirements Analysis

- Current Process

- Operational Framework

- SWOT Analysis

Requirements Documentation

- User and Network

Device Requirements

- Application

Requirements

- Security and Privacy

Requirements

- Reliability and Uptime

Requirements

Feasibility Study

- Design of System,

Software, and
31

Date Activity

Processes

Development and Testing

- Development Standards

- Testing Standards

27 July Submission of Appendix A D

27 July Release of Defense Schedule

31 July Submission of Final Manuscript

Submission of Consultation Form

03,04,05,06 August Capstone1 Defense

08 - 10 August Submission of Revised Manuscript

August May 2018 -Project Simulation

-Project Completion

- Project Presentation

-Final Defense
32

Design

Input Process Output

Final Network
Knowledge design and layout for
Requirements (Basic Network Designing
and Layout (Using St Bridget College
Networking Alitagtag
knowledge and Microsoft Visio)
technicalities)
Network Topology
and Configuration
Development Tools (Using Packet
(Packet Tracer, Tracer)
Microsoft Visio)

Figure3. Design

Basic Networking knowledge and technicalities will be needed for this

project. Development tools will also be needed to provide the necessary output

by using namely Packet Tracer and Microsoft Visio. The process that will be

done is the designing of the network for the campus by using Microsoft Visio and

the configuration of the network topology by using Packet tracer. The Output of

the project is the Network Design and Layout with the network topology of the

campus.
33

Network Design

Cabling Design.

Figure4.Proposed Cabling design SHS

This figure shows the proposed cabling design for the Senior High School

Building. The switch will be located in the faculty room in the first floor of the

building which will then be connected to a wireless router using UTP cable. The

switch is being connected to the admin building with 2 UTP cable for redundancy

purposes.
34

Figure5. Proposed Cabling Design HS

This shows the proposed cabling design for the High School building. The

switch is being connected to the admin building with 2 UTP cable for redundancy

purposes. It then distributes the connection to the offices and to the wireless

router located in the faculty room.

Figure6. Proposed Cabling Design Elementary Building

Figure 6 shows the proposed cabling design for the Elementary

building. The switch is being connected to the admin building with 2 UTP cable

for redundancy purposes. It is located in the second floor of the building where

the computer laboratory is located. It will then distribute it to the different offices

and laboratory in the building.


35

Figure7. Proposed Cabling Computer Laboratory

This figure shows the proposed cabling design for the computer

laboratory. The laboratory is consisting of a total of 34 computers. The switch in

the elementary building is located in this laboratory which will also distribute the

connection to the other offices and laboratory in the building. The switch is being

connected to the admin building with 2 UTP cable for redundancy purposes.
36

Figure8.Proposed Cabling design for Admin Building

This figure shows the cabling structure in the Admin Building. This shows

the 2 ISP which is connected to the router. The main switch then distributes the

connection to the distribution switches which is connected using 2 UTP cables for

redundancy purposes. The distribution layer connects to individual buildings

using 2 UTP cables for redundancy and to let the access layer access the

network.
37

Proposed Structured Cabling Design.

Figure9.Proposed Structured Cabling design SHS

This figure shows the proposed cabling design for the Senior High School

Building. The red line shows the Fiber Optic that run through the ground of the

building inside a tube tunnel where it gets to the underground until it reaches the

admin connected from the admin building to the SHS building. The switch will be
38

located in the faculty room in the first floor of the building which will then be

connected to a wireless router using the Ethernet cable.

Figure10. Proposed Structured Cabling Design HS

This shows the proposed cabling design for the High School building.

The switch in the library is connected to the admin building using the fiber optic

cable that run through the back of the building inside a tube tunnel where it gets

to the underground until it reaches the admin from the HS building. The switch

then distributes the connection to the offices and to the wireless router located in

the faculty room.


39

Figure11. Proposed Cabling Design Elementary Building

Figure 6 shows the proposed cabling design for the Elementary building.

From the switch, the red line is the fiber optic cable that runs through the back of

the building inside a tube tunnel where it gets to the underground until it reaches

the admin. The switch will be located in the second floor of the building. It will be

in the computer laboratory which will then distribute it to the different offices and

laboratory in the building. The wireless router in the 3 rd floor is connected to the

switch via UTP cable.


40

Figure12. Proposed Structured Cabling Computer Laboratory

This figure shows the proposed cabling design for the computer

laboratory. The laboratory is consisting of a total of 34 computers. The switch in

the elementary building is located in this laboratory which will also distribute the

connection to the other offices and laboratory in the building. The red line is the

Fiber optic cable which connects the Admin Building to the Elementary building.

Network Devices

Different networking equipments will be recommended in this project.

There will be a router, a switch, a wireless access points, server and different

networking cables such Ethernet cables. It will also have a firewall which is to

protect them in case of threats and information leaks which is a very crucial for a

campus which handles different information both by the students and teachers.
41

LAN Devices.

Table4.Switch Features

Switch Name Brand and Model Features

L2 and L2+ Features

Static Routing

Link Aggregation Control Protocol

(LACP)

802.1Q tag VLAN

STP/RSTP/MSTP

IGMP Snooping

Port Isolation

Quality of Service

Support IEEE 802.1P

8 priority queues

DSCP QoS

Rate limit feature

Security Strategies

Access Control List (L2~L4 ACL)

Switch TP-Link JetStream T1600G Port Security


42

Storm Control

SSL and SSH encryptions

802.1x and Radius Authentication

IP-MAC-Port Binding

ARP Inspection

Dos Defend

IPv6 Support

Dual IPv4/IPv6 Stack

MLD Snooping

PMTU Discovery

IPv6 Neighbor Discovery

Management

Web-based GUI

Command Line Interface(Telnet)

SNMP v1/v2c/v3

RMON (1,2,3,9 group)

Dual Image

Table5.Server Features

Device Name Brand And Model Features


43

The server features the new ryzen

cpu from AMD which is the ryzen 7

1700x which has an 8 core 16 threads

of computing. This will allow for a

blazing fast performance. It has 16gb

of DDR4 ram clocked at 3200Mhz.

The motherboard is the gigabyte x370

motherboard which supports Dual

channel ECC/Non-ECC DDR4

3200Mhz. Is also supports

RAID0/RAID1/RAID10. The

customized server is powered by a

EVGA Nvidia GeForce GTX1050ti

4GB for smooth graphics

performance. There is also a

Samsung 960evo PCIe NVMe M.2

SSD for blazing fast OS boot times

and sequential R/W speeds. Also

there a 2tb of Seagate HDD for other

Server Customized server files.

Table6.Admin PC Features
44

Device Name Brand And Model Features

The admin pc is a Dell all in

one PC. It is powered by a 6th

Core i5-6400T clock at 2.8Ghz,

12 GB or DDR4 ram, a 1TB of

HDD @ 5400rpm, DVD/CD

burner. It is bundled with a

2017 Dell Inspiron All-In- wireless keyboard, mouse and

Admin PC One 23.8" is using Windows 10.

Internetworking Devices.

Table7.Router Features

Device Name Brand And Model Features

Firewall protection, VPN

support, MPLS support, Syslog

support, IPv6 support, Class-

Based Weighted Fair Queuing

(CBWFQ), Weighted Random

Early Detection (WRED), Web

Router CISCO 2911 Router Services Management Agent


45

(WSMA), Net Flow

Table8.Wireless Access Point Features

Device Name Brand and Model Features

Dual-radio performance,

Gigabit speeds

Sleek, ultra-compact design

Designed for optimal RF

performance

Scalable enterprise Wi-Fi

management

Wireless Access Point Ubiquiti Unifi Ap-AC Lite


46

Physical Topology

Figure13.Proposed Physical Topology

The figure above shows the proposed topology for Saint Bridget College

Alitagtag. The current 80 users are being connected to a one big network which

is separated by vlans. It also has 2 ISP with one as the primary and one as

backup. This will allow the students, faculty and staff to connect to the internet

and share files efficiently.


47

Logical Topology.

Figure14. Proposed Logical Topology

Figure 10 shows the proposed logical topology of the campus. This shows

how the different faculty, offices and laboratory will be connected to the admin

building and how the connectivity will be distributed in the campus. The router will

be configured to accommodate 2 ISP.

IP Addressing Plan

The IP Block Address of the whole network is 172.16.0.0/24. Since there are four

buildings and each will have their own number of hosts.

For the Admin building the Network Address will be 172.16.0.64/29,

first usable will be 172.16.0.65, can have a total of 6 hosts which


48

consist of the router, server, admin pc, 2 cashier pc with a subnet

mask of 255.255.255.248 and a Gateway of 172.16.0.70.

For the SHS building the Network Address will be 172.16.0.80/30,

first usable will be 172.16.0.81, it has a total of 2 hosts which

consist of the wireless access point to be used for wireless devices.

It has a subnet mask of 255.255.255.252 and a Gateway of

172.16.0.82.

For the High School Building the Network Address will be

172.16.0.72/29, first usable will be 172.16.0.73, can have a total of

6 hosts which consist of 4 pc and a wireless access point with a

subnet mask of 255.255.255.248 and a Gateway of 172.16.0.78

. For the Elementary Building the Network Address will be

172.16.0.0/26, first usable will be 172.16.0.1, can have a total of 62

hosts which consist of 34 computers for the computer lab, 1 pc for

the faculty/guidance and 1 wireless access point with a subnet

mask of 255.255.255.192 and a Gateway of 172.16.0.62

Development and Testing

The development and testing for the network design will be tested using

simulation software, packet tracer in order to show that the proposed network is

indeed working at its fullest. The packet tracer will also serve as the testing

model that will showcase different features and functionality of the network
49

design. Connectivity testing will be done by pinging. It is to validate if each end

user is able to connect to the network.

Appendix A

PROJECT PLAN

Project Organizational Chart

Project Sponsor (Rep


from SBC)

Project Manager

Network
Tech Support Head
Administrator

Figure16. Organizational Chart

The project manager oversees all aspects in developing the network.

Under the manager, the tech support head will be the one in charge of routing
50

the structure cabling and supports the network admin in other tasks and the

Network administrator which maintains and configures network equipment.

Project Roles and Responsibilities

Table9. Roles and Responsibility

Roles Responsibility

Is the one who will supervise the whole

Project Manager project.

The Network Admin will be the one who

Network Administrator configure and maintain the security and

network equipment.

They will be the one to create the

Technical Support Head cabling routes and supports the

network admin in other tasks.


51

Work Breakdown Schedule

Table10. WBS

START END

PHASE DURATION(MANDAYS) DATE DATE

Definition Phase

Editing and Submission of 27-Jul- 31-Jul-

Final Manuscript 3 17 17

Submission of Revised 5-Aug- 8-Aug-

Manuscript 2 17 17

Designing Phase

Network Design 25-Aug- 2-Oct-

Planning 19 17 17

3-Dec-

Design and Layout 32 2-Oct-17 17

10-Jan- 3-May-

Network Configuration 65 18 18
52

Trial Phase

3-Dec-

Test Planning 22 5-Oct-17 17

12-Jan- 2-May-

Test Execution 60 18 18

5-May- 5-May-

Project Closure 1 18 18

27-Jul- 5-May-

Project Duration 204 17 18


53
54

Appendix B

TEST PLAN

Testing Approach

The testing will be done by the proponents to ensure that the proposed

network is working and reliable to use. All the testing will be done along with the

network configuration which will start after designing the final layout. Network

Configuration starting from the easiest part is the most effective approach for the

project. Aside from the configurations, these are some of the testing which will be

numerously tested by the proponents.

The proponents will do the hardware compatibility testing which is a type of

testing used to ensure compatibility of different hardware that will be used.

Ensuring the compatibility of the devices is very important especially in the start

of doing the configuration. Hardware and software assessment which ensures

that both the hardware and software application and devices are working with

each other. Performance baseline determination which is the evaluation of

performance of system in a network with varying parameters such as Bandwidth,

Operating speed, Capacity. It also checks application in different networks with

all parameters mentioned earlier.


55

Network Connectivity

PCs and other gadgets such as laptops and smartphones are

connected to their respective LAN network and can also ping each

other.

The server shall provide a DNS services for the campus.

End devices will be able to obtain DHCP (Dynamic Host

Configuration Protocol) when needed from the servers.

The network will be divided using VLANS for security purposes.

Application connectivity

Firewalls will be used for network protection and block the

unwanted sites from the public internet.

The proposed campus network is connected to the internet with 2

ISP with one of them acts as backup in case of internet failure.

Hardware Testing

The hardware testing ensures the compatibility of the devices used in the

network. It identifies if the hardware will be able to perform the requirements

needed for the proposed network to work well. Hardware test steps are much
56

shorter, involving only a few steps to verify if a product works. It tests functional

correctness and evaluate compatibility to other devices.

System Testing

Test Suite Test Suite Test Case

1. LAN Campus Switching

2. Network Management Dynamic Host Configuration

Protocol (DHCP)

Virtual Local Area Network (VLAN)

Passwords & Banners

3. Performance/Scalability End device Performance

Device capabilities

Table12.System Testing

These test suites shall be performed using a simulation tool such as

packet tracer in order to test if the proposed topology is working or not. The first
57

test is to determine and configure the switching functionalities. The next test is

the network management which highlights the protocols and some security

configurations that will be used. Another test is the performance test which will

show if all the devices are correctly connected and configured.

Test Environment

The test data that will be used is packet tracer. The packet tracer shall test

and verify the device configurations such as IP addressing, SSH, Passwords &

Banners, DHCP and VLAN configurations. It will also portray the whole topology

of the network design.

Test Estimation and Schedule

Table13. Estimation and Schedule

Phases Duration (Man- Start Date End date

days)

Hardware

Compatibility 6 14-Jan-18 20-Jan-18

Security Testing

7 22-Jan-18 29-Jan-18

Hardware and
58

Software 10 23-Feb-18 4-Mar-18

Assessment

Performance

Baseline 11 14-Mar-18 25-Mar-18

Determination

Network

Connectivity and 8 23-Apr-18 1-May-18

Configuration

Testing Deliverables

The test deliverables for the network design is the packet tracer. The

purpose of the packet tracer is to show that the created topology is optimized and

all of the hardware such as pc, switches, router and server are correctly

connected and is functioning with the required configurations. Connectivity

testing will be done by pinging. It is to validate if each end user is able to connect

to the network.
59

APPENDIX C

RISK PLAN

Risk Management Process

Project risk is an uncertain event or condition that, if it occurs, has an

effect on at least one project objective. It is anything that could potentially impact

the projects timeline, performance or budget. Risks are potentialities, and in a

project management context, when become realities, it will be classified as

issues that must be addressed. So risk management, then, is the process of

identifying, categorizing, prioritizing and planning for risks before they become

issues. The test data that will be used is packet tracer. The packet tracer shall

test and verify the device configurations such as IP addressing, SSH, Passwords

& Banners, DHCP and VLAN configurations. It will also portray the whole

topology structure of the network design.


60

Severity

0 Not Applicable

1 Less than 1 day slip in schedule

2 Greater than 1 day slip in schedule, increase of 5% cost

3 Greater than 2 days slip in schedule, increase of 7% cost

4 Greater than 3 days slip in schedule, increase of 10% cost

Probability

0 Not Applicable

1 Seldom

2 Occasional

3 Likely

4 Frequent

You might also like