Professional Documents
Culture Documents
System
Pearson
Higher National Diploma in
Computing
Unit1: Networking
1|Page
Table of Figures
2|Page
LO3: Design Efficient Network System
Introduction
In this report, I am going to create a LAN network for a small organization. And, I will
describe the devices I use for that network separately and also I will give a full explanation
about the cost for that LAN Network. Further, building a network is not enough. There must
be a complete clarity about the proper maintenance, its future plan and how it’s works. So
accordingly, I will explain each everything.
Furthermore, with this report anyone can get an idea of how to secure a LAN network and
how to protect it from hackers. Not only that, I will explain the steps of making network
cables in a clear way. It is also can help to them how to create a network cables. And, I will
write these everything in own word, not with the help of internet.
3|Page
1 Process of designing a Local Area Network (LAN)
First of all, my project is for a local educational institution. By analyzing the profile from
them I was able to make a proper plan. My job is to design a network diagram needed to
run their institution. It had to design the network system centered entirely on the LAN
network.
And, I set up that network system under the default gateway of 192.168.6.1. As a first step I
drew the 12 terminals found there in an orderly manner on my diagram, considering their
place. I provided different IP Addresses for each terminal. This is because linking through the
Internet requires that each terminal have a unique address.
As a second step, I used the switch to connect all the 12 terminals in the diagram. This is
because the information can be easily transmitted to the server by Switch using the IP
Address of the Terminals. The next step I installed the router inside the diagram, I
connected the router with the switch. Since the terminals are already connected to the
switch, you can use it to easily provide an Internet connection to those terminals. Finally, I
installed a server and connected it with Switch. This is because the data of the terminals can
be transferred to the server using the switch as mentioned above.
4|Page
Below I mention That Institute Network Diagram,
2.1 Router
A router utilizes a routing protocol, which permits it to communicate with different routers
and offer data with one another to discover which is the quickest and most suitable route to
send data. In its most normal use, a router permits numerous computers in an office to
exploit a same Internet connection. In this sense, the router works as a recipient of the
network connection with be liable for conveying it to all the PCs connected with it.
That’s how I added the router in my diagram. This is because it makes it easier for 12
terminals to provide an internet simultaneously.
5|Page
2.2 Switch
A switch is a device for interconnection of computer networks that works at the data link
layer (OSI Model). They are liable for the interconnection of hardware inside a similar
network, or what is the same, are the devices that, along with the cabling, make up LAN. A
switch is an interconnection device used to interconnect PCs in a networking formation
what is known as a LAN and whose specialized particulars observe the standard known as
Ethernet.
There are four port switches with essential capacities to cover little interconnection needs.
Be that as it may, we can likewise discover switches with several ports and with advanced
highlights. So, I added a switch with 16 ports to my diagram. Because, there are 12 terminals
in the institution. So, it is difficult to connect 12 terminals using an 8 port switch.
6|Page
3 Cost of the Institute Network
The Dell OptiPlex GX790 is one of the maximum widely used and currently used computers,
generally suitable for educational institutions. That is what I recommend to this educational
institution. Its price is only 21,000/=. And, the next requirement for the educational
institution is 16 Port Switch. This is because if there is a need to connect a device in the
future, the remaining ports to connect to it should be need. For that I recommend TP LINK
(TL-SG1016D). It is 10 / 100Mbps, made using the latest technology. Saves a lot of power
consumption. Therefore, it is relevant to the educational institution. Its price is 14,000/=.
Next up is the company-sized cables, priced at 15,000. They told us they use the internet
every time for institute works. Accordingly, we decided to use CAT 06 Cables. Next IBM
server(AMC) will be sufficient as a server for the usage of the educational institution. Its
price is 55,000 /=. And, I recommend Router Dialog Broadband to the institution.
This is because they offer more data packs at a much lower cost. Provides separate packages
for educational institutions. Package 01 offers 150 Gb data for 2500 /= month and Package
02 offers 250 GB data for 4500/= per month. They also provide free connection to
educational institutions. Package 02 will be sufficient for the use of this educational
institution.
Devices Cost
12 Terminals (Dell OptiPlex GX790) 252,000
Switch (TP LINK) 14,000
Cables (CAT 06) 15,000
Server (IBM server AMC) 55,000
Router (Dialog Broadband + package 02) 4,500
Total Cost 340,500
7|Page
4 New Diagram with Security Requirement
After watching our LAN design institute manager. He said to us the network looked like
insecure. Accordingly, we planned to draw a new diagram with security in mind as the next
step. Because, Security is a very important requirement when taking over a network. This is
because when we create a network and it is found to be unsafe, the chances of hackers or
viruses attacking our network are high. Therefore, we must always pay attention to its
security when creating a network. Based on that I have drawn a new diagram for the
institution using the "Fire wall" for security. In the new diagram below, I have protected the
firewall between the connection between the Router and the Switch. I have also used
different IP Addresses. If someone tries to hack the router with the IP address, they will not
be capable to hack the others (Terminals, Switch).
8|Page
4.1 Firewall
It is a defense system dependent on the way that all incoming or outgoing traffic to the
network should fundamentally go through a security system capable of authorizing,
denying, and observing all that occurs, as per with an access control strategy between
networks. It controls both the communication from an external perspective and the traffic
produced from the machine itself or internal network. It acts on based on rules establish by
the security administrator or, failing that, the network administrator or the end client. These
rules characterize the relating actions to be completed when a packet that meets certain
attributes is gotten.
Despite the fact that there are programs that are sell under the name of firewall, a firewall
isn't a program, but consists of a set of hardware and software measures designed to ensure
a network installation. So, it is any system used to "separate" a machine or a subnet from
the rest, shielding it from services and protocols that may pose a security threat from the
outside. The space ensured by a firewall is known as a security perimeter, while the external
network is called a risk zone.
9|Page
5 Maintenance Schedule of the Network
10 | P a g e
6 Steps of Preparing Network Cables
The direct cable connects non-equal devices for this it is necessary that there be the same
distribution at both ends, that is, a direct cable is built by connecting the same standards to
each other. For example, Router to switch, Pc to router, Hub to pc.
Required Materials
Step 01
Cut a small portion of the cable jacket with the tip of the scissors
Step 02
11 | P a g e
White with orange
Orange
White with green
Blue
White with blue
Green
White with brown (Coffee Color)
Brown (Coffee color)
Step 03
In the previous order and without releasing the cables, place them parallel to later cut them
to the same size approximately 15mm. taking care that they do not lose their place.
Step 04
Put the cables inside the connector without losing their order and making sure that each
one enters its corresponding lane.
Step 05
u Holding the cables and verifying that they have touched the inside of the connector with
great care, insert the clips to fix it.
Step 06
To make the second connector it is necessary to repeat the previous steps (from 1 to 6)
Step 07
As soon as the two connectors are ready, it is necessary to place them in a tester to check
that they are working correctly and avoid damage to the equipment to be linked.
12 | P a g e
6.2 Cross over cable
A crossover network cable is a cable that we can use to connect equipment to one another,
for instance, two PCs, to pass data between them effectively and without the requirement
for a switch, router…
The crossover network cable has the eight wires orchestrated diversely at the both ends. at
one side it follows the order set by the T568A standard and at the other by T568B, while the
network cable follows similar order at both ends.
Required Materials
Cable
Tweezers (punching machines)
Razor
Scissors
Connectors (RJ45)
crimper for RJ45
Tester
Step 01
With a crimper for rj45, the network cable we need and two rj45 connectors, we have more
than enough to manufacture the crossover network cable.
13 | P a g e
Step 02
We start with the manufacture, for this we cut the cover of the network cable
approximately 3 cm, we will use the crimper to cut the cable, since most usually bring a
blade for this purpose.
Step 03
Once we have exposed the pairs of threads, we continue to separate them and stretch
them. We will have to leave the cables as straight as possible, avoiding that they are bent.
Step 04
Now it's time to order the cables in such a way that we get a crossover network cable. To do
this, we must have an order at one end while another order at the other ends of the cable,
which is specified in the table below:
Step 05
Now, and once we have ordered the cables, we cut the excess cable with the blade of the
crimper. The length should be around 1.5 cm. In addition, we will have to cut the cables, as
straight as we can, so that once we insert it into the connectors, they are correct.
14 | P a g e
Step 06
Next, we insert the cables inside the rj45 connector. We take the connector with the gold
contacts facing us. We must bear in mind that pin 1 of the rj45 connector is the first golden
contact on the left, and that each cable must be separated from the other by means of
guides that the connector itself brings inside.
Step 07
When all the cables are positioned correctly, we proceed to crimp the cable, that is, to fix
the connector to the cable using the crimper. We must apply pressure to the tool with force
but not excessive. As soon as the two connectors are ready, it is necessary to place them in
a tester to check that they are working correctly and avoid damage to the equipment to be
connected.
15 | P a g e
Conclusion
Complete knowledgeable of building a LAN network is gained during this assignment. Not
only this, I got a clear idea about how to create a maintenance of network and cost, use of
cables. Importantly, this is the first time I have written everything in an own word without
refer internet.
16 | P a g e