You are on page 1of 17

LO3: Design Efficient Network

System

Pearson
Higher National Diploma in
Computing

Unit1: Networking

Done by: Thajudeen Mohamed


Nafrin

Unit Lecturer: Shakir Moulana


Table of Contents
1 Process of designing a Local Area Network (LAN).............................................................4
2 Devices that I used in Network Design..............................................................................5
2.1 Router........................................................................................................................ 5
2.2 Switch........................................................................................................................ 5
3 Cost of the Institute Network............................................................................................6
4 New Diagram with Security Requirement.........................................................................7
4.1 Firewall...................................................................................................................... 8
5 Maintenance Schedule of the Network............................................................................9
6 Steps of Preparing Network Cables.................................................................................10
6.1 Straight Through Cable............................................................................................10
6.2 Cross over cable.......................................................................................................12

1|Page
Table of Figures

Figure 1 Institute Network Diagram.........................................................................................4


Figure 2 New Diagram with Security Requirement..................................................................7
Figure 3 Straight Through Cable.............................................................................................10
Figure 4 Crossover Cable........................................................................................................12

2|Page
LO3: Design Efficient Network System
Introduction
In this report, I am going to create a LAN network for a small organization. And, I will
describe the devices I use for that network separately and also I will give a full explanation
about the cost for that LAN Network. Further, building a network is not enough. There must
be a complete clarity about the proper maintenance, its future plan and how it’s works. So
accordingly, I will explain each everything.

Furthermore, with this report anyone can get an idea of how to secure a LAN network and
how to protect it from hackers. Not only that, I will explain the steps of making network
cables in a clear way. It is also can help to them how to create a network cables. And, I will
write these everything in own word, not with the help of internet.

3|Page
1 Process of designing a Local Area Network (LAN)

First of all, my project is for a local educational institution. By analyzing the profile from
them I was able to make a proper plan. My job is to design a network diagram needed to
run their institution. It had to design the network system centered entirely on the LAN
network.

And, I set up that network system under the default gateway of 192.168.6.1. As a first step I
drew the 12 terminals found there in an orderly manner on my diagram, considering their
place. I provided different IP Addresses for each terminal. This is because linking through the
Internet requires that each terminal have a unique address.

As a second step, I used the switch to connect all the 12 terminals in the diagram. This is
because the information can be easily transmitted to the server by Switch using the IP
Address of the Terminals. The next step I installed the router inside the diagram, I
connected the router with the switch. Since the terminals are already connected to the
switch, you can use it to easily provide an Internet connection to those terminals. Finally, I
installed a server and connected it with Switch. This is because the data of the terminals can
be transferred to the server using the switch as mentioned above.

4|Page
Below I mention That Institute Network Diagram,

Figure 1 Institute Network Diagram

2 Devices that I used in Network Design

2.1 Router

A router utilizes a routing protocol, which permits it to communicate with different routers
and offer data with one another to discover which is the quickest and most suitable route to
send data. In its most normal use, a router permits numerous computers in an office to
exploit a same Internet connection. In this sense, the router works as a recipient of the
network connection with be liable for conveying it to all the PCs connected with it.

That’s how I added the router in my diagram. This is because it makes it easier for 12
terminals to provide an internet simultaneously.

5|Page
2.2 Switch

A switch is a device for interconnection of computer networks that works at the data link
layer (OSI Model). They are liable for the interconnection of hardware inside a similar
network, or what is the same, are the devices that, along with the cabling, make up LAN. A
switch is an interconnection device used to interconnect PCs in a networking formation
what is known as a LAN and whose specialized particulars observe the standard known as
Ethernet.

There are four port switches with essential capacities to cover little interconnection needs.
Be that as it may, we can likewise discover switches with several ports and with advanced
highlights. So, I added a switch with 16 ports to my diagram. Because, there are 12 terminals
in the institution. So, it is difficult to connect 12 terminals using an 8 port switch.

6|Page
3 Cost of the Institute Network

The Dell OptiPlex GX790 is one of the maximum widely used and currently used computers,
generally suitable for educational institutions. That is what I recommend to this educational
institution. Its price is only 21,000/=. And, the next requirement for the educational
institution is 16 Port Switch. This is because if there is a need to connect a device in the
future, the remaining ports to connect to it should be need. For that I recommend TP LINK
(TL-SG1016D). It is 10 / 100Mbps, made using the latest technology. Saves a lot of power
consumption. Therefore, it is relevant to the educational institution. Its price is 14,000/=.

Next up is the company-sized cables, priced at 15,000. They told us they use the internet
every time for institute works. Accordingly, we decided to use CAT 06 Cables. Next IBM
server(AMC) will be sufficient as a server for the usage of the educational institution. Its
price is 55,000 /=. And, I recommend Router Dialog Broadband to the institution.

This is because they offer more data packs at a much lower cost. Provides separate packages
for educational institutions. Package 01 offers 150 Gb data for 2500 /= month and Package
02 offers 250 GB data for 4500/= per month. They also provide free connection to
educational institutions. Package 02 will be sufficient for the use of this educational
institution.

I have defined the total cost by the table below.

Devices Cost
12 Terminals (Dell OptiPlex GX790) 252,000
Switch (TP LINK) 14,000
Cables (CAT 06) 15,000
Server (IBM server AMC) 55,000
Router (Dialog Broadband + package 02) 4,500
Total Cost 340,500

7|Page
4 New Diagram with Security Requirement

After watching our LAN design institute manager. He said to us the network looked like
insecure. Accordingly, we planned to draw a new diagram with security in mind as the next
step. Because, Security is a very important requirement when taking over a network. This is
because when we create a network and it is found to be unsafe, the chances of hackers or
viruses attacking our network are high. Therefore, we must always pay attention to its
security when creating a network. Based on that I have drawn a new diagram for the
institution using the "Fire wall" for security. In the new diagram below, I have protected the
firewall between the connection between the Router and the Switch. I have also used
different IP Addresses. If someone tries to hack the router with the IP address, they will not
be capable to hack the others (Terminals, Switch).

Figure 2 New Diagram with Security Requirement

8|Page
4.1 Firewall

It is a defense system dependent on the way that all incoming or outgoing traffic to the
network should fundamentally go through a security system capable of authorizing,
denying, and observing all that occurs, as per with an access control strategy between
networks. It controls both the communication from an external perspective and the traffic
produced from the machine itself or internal network. It acts on based on rules establish by
the security administrator or, failing that, the network administrator or the end client. These
rules characterize the relating actions to be completed when a packet that meets certain
attributes is gotten.

Despite the fact that there are programs that are sell under the name of firewall, a firewall
isn't a program, but consists of a set of hardware and software measures designed to ensure
a network installation. So, it is any system used to "separate" a machine or a subnet from
the rest, shielding it from services and protocols that may pose a security threat from the
outside. The space ensured by a firewall is known as a security perimeter, while the external
network is called a risk zone.

The fundamental functions of a firewall can be summarized as:

 Filter unauthorized access (through packet filtering, or by observing the content of


the Transport, Session, Presentation, and application protocol units).
 Keeping the accounting of the transactions carried out on the network.
 Alert in case of attacks or strange behavior of communication systems.

9|Page
5 Maintenance Schedule of the Network

Maintenance Monday Tuesday Wednesday Thursday Friday Saturda Sunday


y
Trouble Shooting The
problems
Software/ Hardware
installation or
configuration
Monitoring Network
performance
Planning for future
network progression
keep updating
network documents
and creating
Scheduling for
Backups

10 | P a g e
6 Steps of Preparing Network Cables

6.1 Straight Through Cable

The direct cable connects non-equal devices for this it is necessary that there be the same
distribution at both ends, that is, a direct cable is built by connecting the same standards to
each other. For example, Router to switch, Pc to router, Hub to pc.

Figure 3 Straight Through Cable

Required Materials

 Cable (Cat 5 twisted pair)


 Tweezers (punching machines)
 Razor
 Scissors
 Connectors (RJ45)
 Tester

Step 01

Cut a small portion of the cable jacket with the tip of the scissors

Step 02

Unwind and Discrete the cables according to the order

11 | P a g e
 White with orange
 Orange
 White with green
 Blue
 White with blue
 Green
 White with brown (Coffee Color)
 Brown (Coffee color)

Step 03

In the previous order and without releasing the cables, place them parallel to later cut them
to the same size approximately 15mm. taking care that they do not lose their place.

Step 04

Put the cables inside the connector without losing their order and making sure that each
one enters its corresponding lane.

Step 05

u Holding the cables and verifying that they have touched the inside of the connector with
great care, insert the clips to fix it.

Step 06

To make the second connector it is necessary to repeat the previous steps (from 1 to 6)

Step 07

As soon as the two connectors are ready, it is necessary to place them in a tester to check
that they are working correctly and avoid damage to the equipment to be linked.

12 | P a g e
6.2 Cross over cable

A crossover network cable is a cable that we can use to connect equipment to one another,
for instance, two PCs, to pass data between them effectively and without the requirement
for a switch, router…

The crossover network cable has the eight wires orchestrated diversely at the both ends. at
one side it follows the order set by the T568A standard and at the other by T568B, while the
network cable follows similar order at both ends.

Figure 4 Crossover Cable

Required Materials

 Cable
 Tweezers (punching machines)
 Razor
 Scissors
 Connectors (RJ45)
 crimper for RJ45
 Tester

Step 01

With a crimper for rj45, the network cable we need and two rj45 connectors, we have more
than enough to manufacture the crossover network cable.

13 | P a g e
Step 02

We start with the manufacture, for this we cut the cover of the network cable
approximately 3 cm, we will use the crimper to cut the cable, since most usually bring a
blade for this purpose.

Step 03

Once we have exposed the pairs of threads, we continue to separate them and stretch
them. We will have to leave the cables as straight as possible, avoiding that they are bent.

Step 04

Now it's time to order the cables in such a way that we get a crossover network cable. To do
this, we must have an order at one end while another order at the other ends of the cable,
which is specified in the table below:

PIN END 01 END 02


01 orange and White Green and White
02 Orange Green
03 Green and White Orange and White
04 Blue Blue
05 Blue and White Blue and White
06 Green Orange
07 Brown and White Brown and white
08 Brown Brown

Step 05

Now, and once we have ordered the cables, we cut the excess cable with the blade of the
crimper. The length should be around 1.5 cm. In addition, we will have to cut the cables, as
straight as we can, so that once we insert it into the connectors, they are correct.

14 | P a g e
Step 06

Next, we insert the cables inside the rj45 connector. We take the connector with the gold
contacts facing us. We must bear in mind that pin 1 of the rj45 connector is the first golden
contact on the left, and that each cable must be separated from the other by means of
guides that the connector itself brings inside.

Step 07

When all the cables are positioned correctly, we proceed to crimp the cable, that is, to fix
the connector to the cable using the crimper. We must apply pressure to the tool with force
but not excessive. As soon as the two connectors are ready, it is necessary to place them in
a tester to check that they are working correctly and avoid damage to the equipment to be
connected.

15 | P a g e
Conclusion
Complete knowledgeable of building a LAN network is gained during this assignment. Not
only this, I got a clear idea about how to create a maintenance of network and cost, use of
cables. Importantly, this is the first time I have written everything in an own word without
refer internet.

16 | P a g e

You might also like