You are on page 1of 33

BACHELOR OF SCIENCE (HONS) IN INFORMATION TECHNOLOGY

BIE1113/BIM 1113/DIE1123  FUNDAMENTAL OF COMPUTER SYSTEMS

Title : GROUP PROJECT

Due Date : 1/6/2019

Lecturer : AL-MUTAZBELLAH

Name : Muhammad Farhan Student ID# 110056484

Academic Honesty Policy Statement

I, hereby
attest that contents of this attachment are my own work. Referenced works, articles, art, programs, papers or
parts thereof are acknowledged at the end of this paper. This includes data excerpted from CD-ROMs, the
Internet, other private networks, and other people‟s disk of the computer system.
Student’s Signature : _____________________________

for office use only

LECTURER’S COMMMENTS/GRADE:

DATE : ______________

TIME : ________________

RECEIVER’S NAME : _______


Table of Contents
................................................................................................................................................................................1
INTRODUCTION: .........................................................................................................................................................4
PLANNING:..............................................................................................................................................................4
Introduction:...............................................................................................................................................................4
Refreshment: ..............................................................................................................................................................5
THE SPECIFICATION OF COMPUTER SYSTEM & TOOLS: .............................................................................................5
Lenovo V530s Personal Computer ..............................................................................................................................5
Lenovo Essential Wired Combo Keyboard & Mouse ...................................................................................................8
Think Vision E2054 19.5-inch LED Backlit LCD Monitor ..............................................................................................9
Printers .................................................................................................................................................................... 10
HP Ink Tank 315 ....................................................................................................................................................... 11
Video Surveillance 6620 and 6630 IP Cameras for Whole Area of Cybercafé: ........................................................ 12
Modems................................................................................................................................................................... 13
Switches:.................................................................................................................................................................. 13
Cisco SG100 24 24-Port Gigabit Switch ................................................................................................................... 13
Router: ..................................................................................................................................................................... 13
Linksys E4200 Maximum Performance Dual-Band N Router .................................................................................. 13
The Workstations Systems:...................................................................................................................................... 15
Think Station P520c Workstation ............................................................................................................................ 15
Software required in cyber café: ......................................................................................................................... 16
Operating system of 50 pc: ...................................................................................................................................... 16
Anti-virus software, ................................................................................................................................................. 16
Internet navigation software ................................................................................................................................... 17
Downloading Software: ........................................................................................................................................... 17
Word processing software ....................................................................................................................................... 17
Workstations System software: ............................................................................................................................... 17
Operating system .................................................................................................................................................... 17
Anti-virus software .................................................................................................................................................. 17
Surveillance of 50 pc software ................................................................................................................................. 17
Structure of the Cybercafé Plan: ..................................................................................................................... 18
Client Requests ........................................................................................................................................................ 18
Future scope of the project: ..................................................................................................................................... 18
Advantages .............................................................................................................................................................. 19
Disadvantages ......................................................................................................................................................... 19
Structure and functioning................................................................................................................................ 20
First level factoring: ................................................................................................................................................. 20
Client module: .......................................................................................................................................................... 21
The design layout of the cybercafé ................................................................................................................. 22
THE PHYSICAL INSIDE DESIGN ............................................................................................................. 23
......................................................................................................................................................................... 23
Implementation ............................................................................................................................................... 24
NETWORK EXISTING LOGICAL DIAGRAM................................................................................................................. 24
............................................................................................................................................................................. 24

................................................................................................................................................... 25
NETWORK ENVIROMENT ......................................................................................................................................... 25
PHYSICAL ENVIROMENT .......................................................................................................................................... 27
LOGICAL DESIGN ...................................................................................................................................................... 27
LOGICAL DIAGRAM ........................................................................................................................................ 27
PROPOSED DESIGN .................................................................................................................................................. 28
NETWORK ENVIROMENT ......................................................................................................................................... 28
ADDRESSING STRATEGY .......................................................................................................................................... 31
Network Management ............................................................................................................................................ 31
CONCLUSION ........................................................................................................................................................... 31
REFERENCE: ............................................................................................................................................................. 32
REFERENCE .............................................................................................................................................................. 32
APPENDIX A ............................................................................................................................................................. 33
INTRODUCTION:
Students, professionals, parents, authorities and other members of the community learn the value of
access to the Internet. The Internet is a rich source of educational information for students.
Professionals learn that access to computers and the Internet has great value. This is especially true
when they need research about a specific topic and cannot easily find information through more
traditional channels.

This assignment we create and plan the cybercafé in Limkokwing University of Creative Technology.
We concern the computer, internet speed, design layout, structure of systems and more feature of this
cybercafé.

Public Internet Access Point (PIAP) is public place where people access internet services. For
computer and internet access and internet services, millions of people around the world depend on
public access points like libraries, tele centres, and kiosk or Cyber Cafes. Most of these public access
points are commercial venues like internet café. Cyber Cafes models are most used in urban areas for
public internet access other than other public facilities like libraries, institutes, organizations, schools
colleges or universities. Internet cafe model is shared access model which is less expensive as
compared to the personal owned models which require cost of hardware, software and maintenance.
Cyber cafes, or Internet cafes, offer their customers access to computers with Internet connections for
a wide range of business and personal purposes. An entrepreneur can profit from a cyber cafe,
especially in a location where demand for public Internet access is high and unmet.

However we talk about business prospective of cybercafés. The Cyber Cafe Internet business is one
powerful and profitable large scale or Small scale business that can be opened by either Individual or
by Partnership. It all has to do with the capital. It is either a Joint or Personal business.

PLANNING:

Introduction:
The Limkokwing University of Creative Technology is Setting up a cyber café requires careful and
thoughtful planning in inside the campus because the quality of services it can offer are directly related
to planning. Careful attention in the beginning will help eliminate problems in the long run. Of course,
flexibility is also important.

Limkokwing University of Creative Technology is a required at least 50 computers. As we IT student,


we are recommended the “Lenovo V530s” desktop system because is low cost pc and very powerful
system with Lenovo Essential Wired Combo Keyboard & Mouse and we use also “ThinkVision E2054
19.5-inch LED”.

Refreshment:
The Limkokwing University of Creative Technology have many shops inside the campus like
WingsCoffee, Makanlah and etc. If Costumer use internet in Limkokwing internet café since one hour
so 50% off in wingscoffee shop and Second Thing if costumer have come on daily bases and internet
use time upto 4 hours so we give us to VIP costumer pass. In VIP costumer pass have three shops
Discount of limkokwing university (WingsCoffee, Manlah, 10Ten shop).

THE SPECIFICATION OF COMPUTER SYSTEM & TOOLS:

Lenovo V530s Personal Computer


Small device, big performance

Responsive, reliable, and compact, the V530s desktop is the perfect choice for everyday business.
Packed with the latest Intel Core i processors, DDR4 memory, and high-speed PCIe SSD, this desktop
handles multitasking and large files with ease, and will maximize your productivity in no time.

Let’s your business do more

Improve productivity with fast, responsive processors, memory, and storage—perfect for multitasking.
Further accelerate and optimize memory performance with optional Intel Optane memory without
compromising on storage capacity. And it‟s convenient for your employees, featuring four front-facing
USB ports for easy access to connect peripherals.
Tech Specs

Processor Intel

Memory
32GB max, UDIMM, DDR4-2666*, two 288-pin DIMM
sockets, non-ECC,
Dual-channel capable

Storage
Some: Hard Drive / SATA 6.0Gb/s, 3.5", 7200 rpm
Some: M.2 Solid State Drive (SSD) / PCIe NVMe,
PCIe 3.0 x 4
Some: Solid State Drive (SSD) / SATA 6.0Gb/s, 2.5"
Some:
Celeron
/ Pentium Processor), M.2
Optical Drive
Optional DVD Burner (DVD±RW), SATA 1.5Gb/s Drive, slim (9.0mm)

Onboard SATA
Two on-board SATA 6.0Gb/s connectors (for HDD/SSD and ODD)
Card reader
Optional 7-in-1 card reader (SD, SDHC, SDXC, MMC, MS, MS-Pro, MMC plus)

Graphics
Intel UHD Graphics 610/630 in processor uses main memory, DirectX 12,
one VGA, one Display Port, one HDMI, supports three independent displays,
Works along with discrete graphics to support more displays;
Max resolution: 4096x2304 (DP) @60Hz; 4096x2160 (HDMI) @24Hz;
1920x1080 (VGA)@60Hz
Some: NVIDIA GeForce GT 730, DirectX 12, 1GB or 2GB, GDDR5, PCIe 2.0 x8
Adapter, one VGA, one HDMI, 35 watts;
Max resolution: 3840x2160 (HDMI) @60Hz; 2048x1536 (VGA)@75Hz

Parallel Cable
Optional

Chipset
Intel B360 Chipset

Front ports
Two USB 3.1 Gen 2, two USB 3.1 Gen 1, microphone (3.5mm), combo audio/
Microphone jack (3.5mm), optional card reader

Rear ports
Two USB 3.1 Gen1, two USB 2.0, one serial, optional parallel,
One Ethernet (RJ-45), one VGA, one Display Port, one HDMI,
Additional VGA, Display Port, or HDMI on optional graphic card on some models
Line-out (3.5mm)

Rear audio ports


Audio support High Definition (HD) Audio, Realtek
ALC233, internal speaker (1.5 watt)

WLAN
Some: 11ac wireless, M.2 Card, Realtek 8821CE (dual band),
Wi-Fi + Bluetooth 4.2 combo adapter, 1x1
Some: 11ac wireless, M.2 Card, Intel Dual Band Wireless-AC 3165,
Wi-Fi + Bluetooth 4.0 combo adapter, 1x1
Bluetooth
Bluetooth 4.0 combo adapter, 1x1

Ethernet
Modem
Bluetooth 4.0 / 4.2 wireless, integrated in Wi-Fi + Bluetooth combo adapter
One gigabit eth

Mechanical
● SFF (7.4L), black colour, metal case
● 3.9" W X 12.0" D X 10.8" H
● 100mm W X 304.4mm D X 274.8mm H
● Approx. 9.3 lb. (4.2 kg), weight may vary by configuration
Bay 1: Slim external ODD bay
Bay 2: 3.5", internal, HDD/SSD (optional bay, bay comes with disk)
Slot 1: PCIe 3.0 x16
Slot 2: PCIe 3.0 x1
M.2 card slots: Two M.2 (one for WLAN, one for M.2 SSD)

Limited warranty
Some: 1-year depot repair or Carry-in service
Some: 1-year limited onsite service

Lenovo Essential Wired Combo Keyboard & Mouse


Overview
The Lenovo Essential Wired Combo Keyboard & Mouse keeps things simple. This durable keyboard
and mouse plugs into any USB port with wired reliability you can count on. The tough waterproof
membrane can handle accidental spills without risking performance. Enjoy feel-good typing with quiet
keys and number pad in a modern space saving layout. An ergonomic full-size mouse offers comfort
and support for all-day use. Increase your productivity as you smoothly complete tasks with the
1000DPI high resolution optical sensor. Wired USB connection for both keyboard and mouse; 2.5-zone
keyboard layout with dedicated numeric keypad; Adjustable tilt leg and spill resistant keyboard design;
Full-size ambidextrous mouse; Optical sensor and 1200 DPI resolution.

Tech Specs:
Height (US) 0.8in
Width (US) 5.76in
Depth (US) 16.69in
Weight (US) 1.26 lbs
Height 20.2mm
Width 146.4mm
Depth 424mm
Weight 0.57kg
Min Operating
10%
Humidity
Max Operating
90%
Humidity
Min Operating
0C
Temperature
Max Operating
50C
Temperature
Supported
OS
Operating
Independent
Systems
Warranty Types 1 Year - CRU

Think Vision E2054 19.5-inch LED Backlit LCD Monitor

Overview
Product Description: Think Vision E2054 19.5-inch LED Backlit LCD Monitor. The Lenovo Think Vision
E2054 monitor provides essential functionality for commercial users who need balance between
performance and value. With the wide-viewing angle IPS panel, images are clear at 178°/178° angle. It
is also designed to be compact and space-saving, supporting the Think Centre Tiny PC via VESA
bracket mounting. It is environmentally friendly with the latest green standards, including Energy Star
6.0 Certification, TUV Green Mark, EPEAT Sliver, TCO Display 6.0, CEL 1 and RoHs. 19.5” Colour
Monitor Digital Controls with 8-language OSD DDC 2B, DDC/CI, EDID 1.3 VGA HDCP
Support/Win7/Win 8&Win8.1/Win10 Logo ISO 9241-307 EPEAT Sliver Mercury-/Arsenic-free Glass
Energy Star 6.0 RoHS/China RoHS Compliance LED Backlight panel
Tech Specs
Maximum 1440x900
Resolution
Connections VGA
Display Type IPS
Brightness 250 cd/m2
Aspect Ratio 16:10
Stand Tilt only
Refresh Time 7Milliseconds
Screen LED Backlight
Illumination
Contrast Ratio 1000:01:00
Viewable Image 19.5
Size Inches
Power Supply Internal
Type
Present Display 18
Modes
Present Modes 18
Text
User 10
Programmable
Modes

Peripherals or Accessories
Besides these essential components, computer users often purchase additional devices, such as a
printer and a scanner.

Printers
This is the device that prints text or illustrations on paper. There are many different types of printers.
However, in terms of the technology they use, printers fall into three categories: dot-matrix, ink jet, and
laser printers.
But we use HP Ink Tank 315.
HP Ink Tank 315
Features:
Get up to 8,000 colour or 6,000 black pages at an extremely low cost
Print thousands of pages with high-capacity ink tank system. Print up to 8,000 pages with a set of HP
colour bottles or up to 6,000 pages with an HP black ink bottle. Print high volumes at an extremely low
cost-per-page with this high-capacity ink tank system.

Print darker, crisper text and get borderless, fade-resistant photos and documents that last up
to 22 times longer.
Count on darker, crisper text, time after time. Count on HP Original inks for photos that last up to 22
times longer. Create borderless brochures, flyers, photos, and other documents that look great—right in
your office. Get the features you need for work and other tasks with copy and scan functions.

Technical details

Advanced Features

Energy savings feature technology HP Auto-Off Technology

Fax smart software features No

Printer smart software features Manual Duplex

Scanner advanced features No

Processor

Processor speed 360 MHz

Printer
Specifications

Functions Print, copy, scan

Multitasking supported No
Automatic paper sensor No

Yes, up to 8.5 x 11 in (US letter), 210 x 297 mm


Borderless printing
(A4)

Storage device and direct print support Storage devices not supported

Duplex printing Manual (driver support provided)

Duty cycle (monthly, letter) Up to 1000 pages

Duty cycle (monthly, A4) Up to 1000 pages

Recommended monthly page volume 400 to 800

Envelope Feeder No

Internal Storage No

Memory card compatibility No

Paper trays, maximum 1

Paper trays, standard 1

Print colors Yes

Printer drivers included HP PCL 3 GUI

Print languages HP PCL 3 GUI

Recommended monthly page volume note Up to 1000 pages

Print technology HP Thermal Inkjet

Video Surveillance 6620 and 6630 IP Cameras for Whole Area of Cybercafé:
The Cisco Video Surveillance 6630 IP Camera is an outdoor, high-definition, full-functioning video
endpoint with industry-leading image quality and processing power. Its companion, the Cisco Video
Surveillance 6620 IP Camera, contains the same level of image quality in an indoor enclosure. The
cameras are capable of 1920 x 1080 resolutions while optimizing network utilization with either H.264
or Motion JPEG (MJPEG) compression. Contact closures allow integration with access control
systems. With its open, standards-based design, the cameras provide an ideal platform for integration
and operation as an independent device or as part of a Cisco Video Surveillance network.

Modems
Short for modulator-demodulator (m o - d e m), the modem is a device or program that allows a
computer to send data over telephone or cable lines. Computer information is stored digitally and sent
in the form of analogy waves. A modem converts between digital and analogy formats.
Besides connecting computers for e-mail or data transfer, the modem also allows computers to connect
to the Internet and to navigate the World Wide Web. We recommended and use in this internet cafe
ASUS RT-AC58U.

Switches:

Cisco SG100 24 24-Port Gigabit Switch


Cisco

100 Series Unmanaged Switches deliver powerful network performance and expandability for small
business networks, without the complexity. With no installation software and nothing to configure, the
Cisco 100 Series provides an Affordable, reliable network that works, right out of the box. Cisco is
SG100 24 24-Port Gigabit Switch is best for Limkokwing University of Creative cyber café in this
device have 24 ports of WLAN and We needs for 50 pc so there are three device required of 24 ports.

Router:

Linksys E4200 Maximum Performance Dual-Band N Router


Features
Wireless-N technology
Product overview
Built with leading 802 .11n technology, create a
powerful home wireless
Network in minutes. Connect your computers,
Internet-ready TVs, game
Consoles, smartphones, and other Wi-Fi devices at
fast transfer rates for an
Unrivalled experience.
Advanced security
Keep Wi-Fi freeloaders and Internet threats at bay
with WPA2 encryption and
SPI firewall to help keep your network protected.
Benefits of Fast Ethernet
Use the four Fast Ethernet (10/100) ports for quick file sharing between
Computers and servers.
Home network ready
Connect computers, printers, and more to your wireless network and the
Internet. QoS traffic prioritization technology delivers maximum speed and
Performance so you can enjoy fast downloads and reliable gaming.
Easy to manage
Cisco Connect software helps you customize your settings and quickly add
Multiple devices to your network:
IPv6 enabled
Supports the latest Internet protocol technology to future-proof your network.

Ethernet ports—Connect Ethernet cables (also called network cables) to these Fast Ethernet (10/100)
ports, colour coded blue, and to wired Ethernet network devices on your network.
• Internet port—Connect an Ethernet cable (also called a network or
Internet cable) to this port, colour coded yellow, and to your modem.
• Wi-Fi Protected Setup button—Press this button to easily configure
Wireless security on Wi-Fi Protected Setup-enabled network devices.
For more information, see “How to set up wireless security using Wi-Fi Protected Setup on page 43.
• Power indicator—Stays on steadily while Power is connected and Following a successful Wi-Fi
Protected Setup connection. Flashes slowly
During boot up, during firmware upgrades, and during
a Wi-Fi Protected Setup connection Flashes quickly
when there is a Wi-Fi Protected Setup
Error.
• Power—connect the included AC power adapter to
this port.

The Workstations Systems:


Workstation is a special computer designed for technical or scientific applications. Intended primarily to
be used by one person at a time, they are commonly connected to a local area network and run multi-
user operating systems. We use two workstation pc in Limkokwing University of Creative Technology
cybercafé.

Think Station P520c Workstation


Features

Designed for users, engineered for IT managers

Powerful enough to render VR, this high-performance workstation lets you tap the speed and efficiency
of Intel Xeon processing and NVIDIA Quadro graphics. It also comes with ISV certification from all the
major vendors like Autodesk, AVID, and Siemens. To learn more about ISV certification. Easy to set up,
deploy, and manage, the Think Station P520c endures rigorous testing in extreme environmental
conditions. So you can count on its reliability and durability. And with an exceptional design and build
quality, it gives you increased serviceability along with decreased downtime. A win-win for any
organization.

What's more, to fine-tine your workstation and keep it running at its peak, just download and run the
Lenovo Performance Tuner and Lenovo Workstation Diagnostics apps.
Processor
Intel Xeon W-2123 Processor (8.25MB Cache, up to
3.90GHz)
Operating System

Windows 10 Pro for Workstations 64 up to 4 Cores

Memory
16GB DDR4 2666MHz ECC RDIMM
Graphics

NVIDIA Quadro P400 2GB 3xMini DP High Profile

Hard Drive
1TB Hard Drive, 7200RPM, 3.5", SATA3
Optical Drive
No 1st Optical Drive Selected
Warranty
3 Year On-site
Mother board
P520C MB Intel Basin Falls

Software required in cyber café:

Operating system of 50 pc:


Operating System Windows 10 or windows 7

Anti-virus software,
McAfee, Norton, bitdefender and eset internet security
Internet navigation software
Internet Explorer, Netscape, Google Chrome and Firefox.

Downloading Software:
Internet Download Manager

Word processing software


Microsoft Word, Word Perfe, Nitro PDF, Adobe Reader

Workstations System software:

Operating system

Anti-virus software
BitDefender

Surveillance of 50 pc software
Antamedia Internet Café is a client / server application that secures public Internet
computers, kiosks, self-service devices, controls Wi-Fi Hotspot laptops and mobile
devices, provides POS facilities and much more. Your public computers are protected with the Client
Login screen, while Hotspot module shows login screen in the user‟s browser.

Obtain software licenses

A license is basically a certificate of authenticity, proving that the piece of software is legally installed on
the computer. It proves the software is not pirated. Shortly after the software is installed, a pop-up
window will ask that you register with the software‟s manufacturer, either by mail or e-mail. Registering
the software usually results in free or inexpensive updates.
Structure of the Cybercafé Plan:
This project basically contains two types of users: the server user and the Client user.
The Server user is the administrator of the Server machine who has the right to monitor each and
every client or customer. He will have the rights to remotely login or logout the client user. He solely
controls the Server machine.
system and start browsing
only if he is authenticated (by username and password) otherwise the Admin user can log him in
remotely. There can be multiple clients interacting with the server, sending multiple requests at the
same time.

Client Requests
This module will allow the customer of the cyber café to make request‟s for some of the items that are
predefined and will be displayed on his screen.
These requests will be shown up server screen and
the admin provides the customer with the requested
services to his place.

Future scope of the project:


 The aim of our project is to replace the paper works & works done manually and to
automate the existing trend in the cyber café. Be it user creation, their management or bill
generation, everything is Computerized. Since the admin job is done effortlessly and at the
same time the customer can enjoy his browsing time entirely, hence both the user and the
owner are at their ease.
 We have limited the server and the client into a single system. For real-time purposes we
can extend the software by installing the server components into a single system and have
multiple clients by installing the client components into many systems. Here multiple clients
can interact with the single server at the same time sending in multiple requests
simultaneously.
 Nowadays Cyber Crime has increased immensely. So in order to avoid the risk of getting
indulged in any scandals regarding cybercrime we can implement the FINGER PRINTING
Mechanisms in the cyber for the authentication of the clients or customers of the cyber.
 The acceptance of CREDIT and DEBIT CARDS for the payments can make the software
more versatile. Allowing the point of sale concept at the cyber café can be another attractive
feature of the software.

Advantages
 Print-monitoring monitors all the printer queues available on the server machine and
Stores the document names and other details of all the documents printed. This feature has certain
limitations.
 Internet connection monitoring the connectivity to the Internet is monitored and the data is
presented in the form of a graph.

 Customizable screens The Customer Login and Logout screens can have a background
Designed by you.

 Check status from anywhere on web Figures like the number of clients in session, the total
number of clients connected, the total amount collected after the last settlement etc., can be
availed online from anywhere in the world from our website.

 Standard time maintenance the server time is synchronized with our main Server and all the
clients get synchronized with the server, thus ensuring that the records are time stamped
accurately.

Disadvantages
PRIVACY
The biggest concern for most PC users is privacy. WI -Fi hotspots in most public areas are unsecured,
which means that others could potentially access information on your computer. If you forget to log out
of a public computer terminal, someone could access your email or other sensitive accounts. On a
Physical level, the person next to you in an Internet cafe can easily look over your shoulder. Internet
cafes or public terminals are not ideal for sensitive or work-related information.
COST
The cost of Internet at cyber cafes is relatively low and varies between countries. Most places charge
hourly, though some offer a one-time purchase fee. If you are travelling, purchasing an hour at an
Internet cafe to write home is significantly cheaper than paying for a monthly satellite fee. As WI -Fi
grows in abundance; more businesses are offering free Internet access to attract customers.

Structure and functioning

First level factoring:

Factoring of admin module:


Client module:

(Sanchez-Clark)
The design layout of the cybercafé
The PHYSICAL DESIGN
THE PHYSICAL INSIDE DESIGN
Implementation

NETWORK EXISTING LOGICAL DIAGRAM

The picture Shows existing logical network design.


From the figures, it can be concluded as no
segmentation, users at campus internet cafe use the
segment (flat addressing10.1.1.0/24), and the
Drawback by using flat addressing is broadcast. To
Enhancement Local Area Network the idea is to build
hierarchical network design, user‟s segmentation to all Limkokwing University users which spreads on
some buildings, high availability backbone and provide centralized management and monitoring system
for network devices (Choi, Song et al. 2007).

Support Systems:

 Number of Personal computer(s) : 52 units


 Division of staffs :
o Top Management :
Two main P520c Workstation servers controls from Chief Executive, Senior Manager
o 50 pc to public use
 Type of topology : Bus
 Type of network : LAN
 Type of router : Wired Router
 Type of computer network : Intranet and Internet for all staffs
 Type of security : Firewall (Bagus 2012)

NETWORK ENVIROMENT
Problem Description
1. Old switch Core switch which connect to server always faced a bottleneck
problem especially during peak hour since limitation of switch
bandwidth and everyone need to access to the server.
2. Cabling There are currently no patch panel or equipment racks for proper
cable management and mounting of switches. This can lead to more
frequent cabling failures. Most cabling recognized is standard
Category 5 cabling which is fit for paces just up to 100Mbps which
won't be sufficient for future employments. Cabling is likewise
unlabelled which makes it hard to trace when there are issues and
this slows resolution.
3. Remote A remote access Virtual Private Network (VPN) used to be set up for
Access Top and Middle level user to remote access data from the workplace
frameworks. Presently that VPN framework is not utilized for
specialized or operational reasons.
4. Backup A cursory review of the EMC Retrospect backup logs suggests that
Server not all data is being backed up to the Buffalo Network Attached
Storage (NAS) devices and it is attached hard drives and/or is not
being written reliably. Not having all application, databases, and data
directories backed up can make it impossible to restore lost data.
Additionally, the information that is being backed up to the Buffalo
NAS external drives is not being taken offsite thus all data and their
backups is subject to being lost in the event of a flood, fire, or theft
affecting the servers (even if it were being taken offsite, it is not
believed to be encrypted thus information could be stolen if these
offsite drives were stolen). Lastly, one of the four hard drives on the
Buffalo NAS is physically failing and may not be able to hold backup
information much longer.
5. Server Space Currently the data partition on the „widgets1file‟ server only has 5GB
free which is 4% free of its total disk space. The operating system
partition on this same server is at 4.6GB free which is 15% free of its
total disk space. The data partition on the „widgets1mail‟ server at
24GB free which is 18% free of its total disk space. A server which
runs out of disk space can either crash and become not available or
at the minimum not be able to store additional information and
possibly corrupt user information.
6. Single Aware with the security, the company place a firewall before the
Firewall gateway but it just not enough to have secure network. The
connection for a staff, middle manager and the top manager to
access server are directly interlinked which mean it has a probability
or give a chance for staff to get access or to tap the data that been
sent by their manager and there might be a possibility that the top or
middle manager are getting fault information.

PHYSICAL ENVIROMENT
Problem Description
Automatic Server During an extended power outage, the UPS batteries will get to be
Shutdown depleted and in the end quit giving energy to the servers bringing
about an unexpected shutdown of the servers. This sudden
disturbance of electrical supply to servers may cause data to be lost
or undermined.
Environment There is no monitoring and alarming if the encompassing temperature
Notification or humidity surpasses adequate limits. Alarming to administrators is
critical so that extreme temperature or humidity variations can be
addressed in a timely fashion in an auspicious manner to best secure
the interest in IT equipment which could somehow be harmed
Server Location The servers are currently in an area trafficked by non-IT staff and
could be effectively either incidentally or intentional disrupted. The
location of server hardware and system console itself is located in a
vulnerable area.

LOGICAL DESIGN

LOGICAL DIAGRAM
c
p

5
2
25 pc

PROPOSED DESIGN
PHYSICAL ENVIROMENT

Problem Solution
Automatic Server It is prescribed that APC Power Chute Network Shutdown
Shutdown software be installing on both Windows servers so they
close down appropriately before the UPS batteries get to be
depleted.

Environment It is suggested that temperature and humidity alarms be implemented


Notification via APC Network Management card with Environmental Monitoring to
be introduced in the current APC Smart-UPS uninterruptible power
supply (UPS).
Server Location Relocate server and system console near to IT personnel for
surveillance and to prevent server from affected by flood since IT
personnel lie on the middle floor of the building.

NETWORK ENVIROMENT
Problem Solution
Old switch Since core switch handle many request so it will require more
bandwidth. It is recommended to change current device which is have
100Mbps network limit to switch with 10Gbps.
All the other switch also need to be change from 100 Mbps to 1Gbps.
Cabling  It is recommended that a secure main
communications equipment room (MCER) be
established in the front office area with at least one
intermediate communication equipment room (ICER)
located in the manufacturing area using 50Um fibre
to interconnect the two closets.
 It is recommended to install Cat6 cabling to insure
10Gbps capability throughput in all office areas and
shielded Cat6 cabling in the manufacturing areas to
safeguard against (EMI) from overhead crane power
and bus bar power.
 MCER rooms should contain 19” X 7‟ open
equipment racks with overhead cable tray and
horizontal cable management on either side. If the
ICER room is located on the open manufacturing
floor, then a secure lockable cabinet should house all
patch panels and electronics.
 All cabling would be terminated on standard punch
down panels and jacks which use only a single piece
so would eliminate the brittle plastic issue.

Remote Access It is suggested that the necessity for a VPN be revaluated


after to decide whether it desires to implement the
recommended web-based portal for accessing customer
information and/or the more functional hosted e-mail &
collaboration system. Since certain types of information may
be web-based instead of VPN technology, VPN technology
may not be required. However, if VPN technology is still
required for access to various types of data or systems, then
TNSC is confident that it could rectify the issues associated
with the current implementation.

Backup Server It is strongly recommended that the entirety of each server‟s data be
backed up by a system that does so completely, routinely,
automatically, is monitored for failures, can virtually recreate a server
in case of server hardware failure, and also automatically transfers a
copy of the data offsite in case there is ever a disaster. Although
there may be alternatives, TNSC offers its Store IT backup solution
which provides all of the desired features.
Server Space It is recommended that the following approach be taken in
sequence:

Delete any information that is no longer needed on the servers.


 If the above step does not yield enough free space, then
archive information that is not frequently needed to an
external device for permanent storage.
 If the above steps do not yield enough space, then relocate
some information between the two servers and their
partitions so that each partition has sufficient free space.
 If the above steps do not yield enough space, then add
(a) physical drive(s) to the widget1file server so that it
has more available drive space.
 If the above steps do not yield enough free space,
then purchase a new physical server with more hard
drive space. This server should be equipped with
VMware sphere software which allows the physical
hardware to be shared by multiple virtual servers
such as the widget1file and widget1mail servers
which would be copied to this new physical server.
The benefit of virtual server hardware is that it allows
multiple servers to share the available capacity of the
hardware which results in less hardware needing to
be purchased. An added benefit of new hardware is
that it would be covered by a three year warranty
whereas the current servers would appear to be out
of warranty and don‟t have a maintenance contract in
place therefore current system failures would be
more costly and time consuming. (Bagus 2012)

ADDRESSING STRATEGY
Currently Champ has been supporting 50 wired user and around 30 other end devices and
Champ had intention on expanding their employees so we are using IP address class C that able to
support up to 253 devices. It is still able to support Champs‟s employees hiring plan.

IP: Class C - 192.168.10.1


Subnet Mask: 255.255.255.0
Total Available Hosts: 253
Network Address: 192.168.10.0
Range: 192.168.10.1 - 192.168.10.254
Broadcast: 192.168.10.255

Network Management
Network management is a important component in a campus network design. Network management
will be enabled at every network devices so that can be monitoring logging , troubleshooting, security
and other common management function.

CONCLUSION
Modern world is computer world where the things have to be done promptly that requires optimal
resources and optimal methods. Due to this inevitable requirement, computerisation of each and every
sector in the main stream is must, so that it can be held itself in the race.
The Limkokwing University of Creative Technology has create a new cybercafé for surfing the internet
along refreshment such as Wings Coffee, Makanlah food with discounts inside a cyberjaya campus for
university people or students and this plan or idea we give us to the Limkokwing University to make a
new cyber café.
We were First focus is to provide a high availability backbone in the network, redundant link and with
the highly configure computer system such as the client pc Lenovo V530s and the main workstation is
Think Station P520c along with tremendously use of networking tools (Linksys E4200, Cisco SG100 24
24 ). The cybercafé components is hierarchical structure network are the core layer, the distribution
layers and the access layers this project has been developed to create and provide the internet of the
Cyber Café. Our idea simplifies the fulfilment of their needs and student satisfaction. The student is
serviced at his footsteps wherein he just types in the request and he is just a click away. We would like
to convey our sincere gratitude and thanks to all, who stood as our backbone, in designing, formatting
and helping us in executing this project successfully.

REFERENCE:

Bagus, M. (2012). Campus Network Design And Implementation Using Top Down Approach: A Case Study
Tarumanagara University. proceedings intel conf information system business competitiveness.

Choi, B.-Y., et al. (2007). Outage analysis of a university campus network. Computer Communications and
Networks, 2007. ICCCN 2007. Proceedings of 16th International Conference on, IEEE.

REFERENCE
Babu, Dr. B. Vijay. “A Software Engineering Project on.” Project. 2017.

Bulder, B. www.suite101.com. 20 August 2005. <www.suite101.com/article.cfm/cyber_cafes/1743>.

Gilliam, Alex Franka & Jessie. Cyber Cafés A How-to Manual. Designing of Cyber Cafés. Washington, DC 20036:
Advocates for Youth , 2005.

Sanchez-Clark, Terry. CISCO Networking FAQ and Certification Review Questions and Answers. United States,
2011.
APPENDIX A
OVERVIEW OF THE SETTING UP PROCESS
People involved
Client or Target Audience: The ultimate user(s) of the cyber café
Cyber Café Coordinator: The person in charge of day-to-day running of the cyber café.
Cyber Café Manager: The person in charge of providing support and assistance on an as-needed
basis, to the Cyber Café Coordinator.
Planning
Appendix A: Setting Up a Cyber Café:
A Step-by-Step Questionnaire
This section provides guidance in the process of encouraging a cyber café initiative in your
organization;
as well as in assessing needs, identifying a target audience, and developing goals for the project.
1. Plant the seed internally. Meet with colleagues and discuss the potential benefits of a cyber café
for the organization, the community, and youth in the community. During the meeting, try to get
answers to the following questions:
1) Where do the members of the organization stand in regards to new technology? They believe:
• New technology is particularly useful for any organization.
• New technology trends are somewhat useful for the advancement/development of any organization.
• New technology trends are absolutely critical to the advancement/development of any organization.
2) Where does staff stand in regards to working with youth? Staffs says
• Working with youth is not particularly important for any organization.
• Youth volunteer in my organization, but they don‟t have a voice in the processes and decisions
of the organization.
• I involve youth in some of the processes and decisions of the organization.
• I involve youth in all the processes and decisions of the organization.

You might also like