An e-commerce company is looking to expand their business. In addition to this there is merger in between two small business and resulted in the formation of the organization. Hence, this gave rise to the need of the expansion of the business of the company. Hence, as a result the organization is subjected some major transformation of its business and the organizational structure. For the expansion of the business the company would be requiring 100 more employees. In addition to the employees the company would also require a new building. This building would be the new office of the organization. But, before acquire the office the company needs to set up a network within the building of the office. The network design of the office is to be made before accommodating the employees in the office.This report provides the details of the network that is to be constructed for the accommodation of the additional staffs of the company.
The report consists of the, project scope and also the network design that is to be developed for the implementation of the network in the office building. In addition to this, the network constrains and the hardware requirements are also provided in the report.
The main aim of the project is to design a successful network that can be implemented easily and also provide efficient facilities to the employees that would be implementing the network.
In addition to this, the main objectives of the project are:
- To develop a network that would be suitable for the business of the company.
- To develop a network that can be implemented very easily.
- To develop a network that can be implemented very cheaply.
- To develop a network that would provide efficient safety to the company and also to the staffs of the company.
- To develop a network that would be satisfying all the criteria of the company.
In addition to this there were some specific requirements that were cited for the project by the company. These criteria would be increasing the overall efficiency of the company and would also be making the business of the company more effective.
Firstly, the building that was acquired was new and hence the designing of the network was to be started from scratch. The building which the network was to be constructed had no previous existence of a network. Hence the components for the network had to procure from the market and also the design did not receive any kind of assistance from the previous projects.Secondly, the building was a three storied one and hence the network is to construct keeping in mind all the criteria of the building also had to meet the criteria of the individual floors of the building. Hence, the components were to be decided on the requirement of each of the floor.
Thirdly each floor had a different requirements. The building was divided into three sections: the ground floor, the first floor, and the second floor. The requirements of the ground floor was that it consisted of the three sections. The ground floor consisted the reception, the warehouse and the foyer. The requirement for the reception was that there was to be four points for the access to the network. In addition to this, the warehouse required four points for the access to the network. The foyer requires two data points for the access to the network.
In addition to this the plan of the first floor is relatively distinct form that of the ground floor. The first floor has five office rooms. In the office rooms there are requirements of two data points for each of the offices for the access to the network. In addition to this there are 40 cubicles in the first floor. The cubicles are to be numbered from 1 to 40 and each of the cubicles need to have at least two data points for each of the cubicles. The staffs are allotted in the cubicles. In addition to this the cubicle are open plan cubicles.
In addition to this, the third floor consists of three rooms. In one of the rooms there are four office cubicles. In one of the rooms there are 2 offices. All the cubicles and the cubicles requires two data points for their machines for the access to the network. In addition to this there is room where there are 30 cubicles. The cubicles requires two data points for each of them for the access to the network. In addition to this, there is meeting room that is situated in the second floor. The meeting room requires data points to four its access points to the network. All the floor requires the similar type of connectivity.
But, all the floors are to be allotted separate connections and this would in return help the administrator to control the flow of the traffic within the network. In addition to this, all the machines requires wireless access to the network and hence there is requirement of obtaining the wireless access point for each of the floor on the network. This would be enabling access to the network for the staffs from the remote locations.
In addition to all these it is assumed that the internet services would be obtained from the local internet service providers. Hence, the security of the network is also very essential. Hence there would requirement of efficient firewalls and security measures for the network. In addition to this it is also assumed that there would be 100 employees and hence the accommodation for the 100 employees are only made in the network. Although there are some slight provision for the extra systems in the network but some alterations for that has to be made to the network. In overall it is expect that network would be very efficient and provide some effective business options and also provide an efficient amount of security for the staffs and the organization as well.
Project hardware requirements
The project needs to be implemented with a great efficiency. The implementation of the network requires the following hardware Firstly, there is requirement of the switches. There needs to be three switches that are to be installed in the three floors of the building for the successful separation of the network into different sub divisions. In addition to this, the switches would also allow the separation of the connection into the different sectors of the network and also enable an efficient monitoring facility for the network. In the addition to this the Cisco PIX 535 UR firewall is selected for the firewall of the network that would be providing the security to the network. This is a licensed firewall and hence, they provide authenticated security services to the network. These would be increasing the security efficiency of the network to great extent.
The network is implemented with the LAN connections and hence, there would be requirements of wires for connecting the components of the network together. The CAT 5 Ethernet LAN wires would be used for the connection of the network components within the office building. The CAT 5 cables are twisted pair wires. They are used for the networks that are expanded over a long range. This cables would be providing noise frees services to the network and in addition to this the wires are also very cost efficient. Hence, they would be forming one the major components of the network and would be increasing the overall efficiency of the network.
The whole network is connected to a single server and would require to configure only the main router and the server. The IP provided to the router would be 192.168.0.100. In addition to this the server would be configured to a 192.168.1.100. This would enable the whole network to support more than 100 workstation within the network. In addition to this the Switches have MAC addresses assigned to the ports and the workstations would be connected to the switches with their MAC addresses. There would not be any more requirement to configure the other machines as the network only makes use of a single router which is connected to the three switches in the three different layers of the network. In addition to the wifi routers are configured with the WAP 1, WAP 2 and WAP 3.
They are secured with the WPA security settings and hence would not allow any kind of external users to access the system. In addition to this, the network router is configured with the DHCP protocol and the Server is configured with the HTTP, FTP and The SMTP Protocol. The DHCP would allow the network services to be spread from the routers to the different sectors of the network. In addition to this the HTTP protocol would allow the staffs to connect to the internet services and the FTP protocol would allow the staffs to exchange files and data among them very efficiently. This would be increasing the overall efficiency of the system. In addition to this the SMTP protocol would be allowing the users of the network to send the mail in between them and communicate in between themselves. In addition to this, this would increase the overall efficiency of the network and would make the network very effective.
For conclusion it can be said an efficient network layout is very important for any kind of business. In addition to this the network constrains of the business are also very crucial for the success of the business. In the present report a case of such a business have been provided. The business required to extend their office and hence require to acquire a new building for the purpose and hence also required a network layout for the building with three layers. In this the scope of the network has been provided and also in addition to this, a network layout is provided. This would be very efficient for the business. In addition to this the hardware components that would be required for the implementation of the network have also been provided in the report and also the effectiveness of the hardware in the network have been discussed. In addition to this the required configuration of the machine of the network have also been provided in this report and this would be providing an overall overview of the network and would provide useful information during the actual implementation of the network.
 Amadeo, M., Campolo, C., Molinaro, A. and Ruggeri, G., Content-centric wireless networking: A survey. Computer Networks, 72, pp.1-13. 2014.
 Boshmaf, Y., Muslukhov, I., Beznosov, K. and Ripeanu, M., Design and analysis of a social botnet. Computer Networks, 57(2), pp.556-578. 2013.
 Dziura, J.D., Post, L.A., Zhao, Q., Fu, Z. and Peduzzi, P., Strategies for dealing with missing data in clinical trials: from design to analysis. Yale J Biol Med, 86(3), pp.343-358. 2013.
 ElSawy, H., Hossain, E. and Haenggi, M., Stochastic geometry for modeling, analysis, and design of multi-tier and cognitive cellular wireless networks: A survey. IEEE Communications Surveys & Tutorials, 15(3), pp.996-1019. 2013.
 Ferguson, A.D., Guha, A., Liang, C., Fonseca, R. and Krishnamurthi, S., August. Participatory networking: An API for application control of SDNs. In ACM SIGCOMM Computer Communication Review (Vol. 43, No. 4, pp. 327-338). ACM. 2013.
 Kaddoum, G., Richardson, F.D. and Gagnon, F., Design and analysis of a multi-carrier differential chaos shift keying communication system. IEEE Transactions on Communications, 61(8), pp.3281-3291. 2013.
 Kim, Y. and Hwang, G., Design and analysis of medium access protocol: Throughput and short-term fairness perspective. IEEE/ACM Transactions on Networking (TON), 23(3), pp.959-972. 2015.
 Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S. and Uhlig, S., Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), pp.14-76. 2015.
 Kurose, J., Information-centric networking: The evolution from circuits to packets to content. Computer Networks, 66, pp.112-120. 2014.
 Laranjo, L., Arguel, A., Neves, A.L., Gallagher, A.M., Kaplan, R., Mortimer, N., Mendes, G.A. and Lau, A.Y., 2014. The influence of social networking sites on health behavior change: a systematic review and meta-analysis. Journal of the American Medical Informatics Association, pp.amiajnl-2014.
 Munzner, T., Visualization analysis and design. CRC Press. 2014.
 Peng, Q., Walid, A., Hwang, J. and Low, S.H., Multipath TCP: Analysis, design, and implementation. IEEE/ACM Transactions on Networking, 24(1), pp.596-609. 2016.
 Shao, S., Khreishah, A., Ayyash, M., Rahaim, M.B., Elgala, H., Jungnickel, V., Schulz, D., Little, T.D., Hilt, J. and Freund, R., Design and analysis of a visible-light-communication enhanced WiFi system. Journal of Optical Communications and Networking, 7(10), pp.960-973. 2015.
 Tekin, C. and Liu, M., Online learning methods for networking. Foundations and Trends® in Networking, 8(4), pp.281-409. 2015.
 Zhang, J., Hosseinabadi, M.T. and Ansari, N., Standards-compliant EPON sleep control for energy efficiency: Design and analysis. Journal of Optical Communications and Networking, 5(7), pp.677-685. 2013.