Sei sulla pagina 1di 11

SECURED LOCAL AREA NETWORK DESIGN AND MANAGEMENT OF

SASTRE FASHION AND SPORTSWEAR

A Project Proposal
Presented to

Dr. Andrew P. Ponte


College of Information Technology
Liceo de Cagayan University

In Partial Fulfillment of the Subject


NETWORK DESIGN AND MANAGEMENT
(BSIT-2104)

Submitted By
KEITH ESTOQUE
HARIELO JOHN PILANGA
DARYLL MACALAM
JOSE EDERANGO JR

October 2019
Chapter 1
THE RESEARCH PROBLEM AND ITS SCOPE

1.1 Introduction

Nowadays everywhere you go you belong to a network. A network of


people that have the same interest as you, or in an office, even in home. A
unconnected workplace is a real struggle it may stumble you, delay and
they may become a hindrance to your accomplishments. It is easier to
accomplish something when you are considered as a part of a network.
Devices and machine like Personal Computers, Laptops, Smart TV’s and
Mobile Phones can be used to reduce our work and boost our productivity.
Imagine having a machine and devices that is interconnected and managed
to a one network will lead to nearest success. Now how will a well managed
network will help a medium scale business to reduce time consuming
workloads and eliminate unnecessary procedures to accomplish task and
boost their productivity.
According to Lasisi Ahmed Babalola (May 2012) Networking is a basic
concept for an interconnection of system through a channel with the sole
purpose of exchanging information by implementing certain set of rules
which are defined within the system. Different systems can connect in
various ways to achieve certain objectives. However, one major way by
which an organization connects to achieve their desire goal is through the
adoption of local area network (LAN), which is the interconnection of
computers and network devices within a geographical area and providing
shared access to printers, file servers and other network devices
The proposed project hurdles to achieve a manageable, maintainable,
secured and cost effective network system for Sastre Fashion and
Sportswear to reduce time consuming workload and eliminate unnecessary
procedures.
1.2 Framework

Design of a local area network is therefore an important art. We have


already made the point that there is more to creating local area network
than simply connecting few computers together. If the local area network is
to cope with the high demands and expectations of such networks in a
modern organization, the network must be planned thoroughly on the basis
of the requirements of the operation it is going to be implemented in - you
need to design the network. Too many companies do not take this task
seriously enough - they decide to buy a solution proposed by a sales person,
which often does not match the requirements of the specific company
(Mikalsen et al. 2002). The key takeaway is that in today’s internet-driven
world, every business needs a reliable network to send and receive data
internally and externally. A LAN connects users within a single building or
multiple buildings that are close together. Sparklight Business (Local Area
Network Advantages)
Telerise “SME small business LAN local area network” cited. If you have
more than three PCs in your office it is worth considering the development
of a LAN. Having a print server might reduce your operating costs, as users
can share one printer. With a mail server you can introduce internal e-mail,
which is often more effective than scribbled messages and keeps an official
record of communications. And if you are introducing Internet access to your
company, a remote access server will enable more than one PC to have
access to the Internet with a simple dial-up connection (but do ensure you
install an adequate security firewall).
1.3 Statement of the Problem

This study aims to address the following problems:


1. File transfer/sharing is worst it is transfer by thumb drive
2. Files is highly vulnerable for ransomware and attacks
3. Direct access to router
4. LAN and WLAN is compact

1.4 Objectives of the Study

General Objectives
The researchers aim to produce a manageable, maintainable and cost
effective network system

Specific Objectives
1. To setup file server for easy file sharing and transfer
2. To setup firewall to block incoming possible attacks
3. To separate LAN and WLAN access point

1.5 Significance of the Study

The Company. The company will have a secured, maintainable,


manageable network system
The Owner. The owner will gain the maximum potential of her employees
The Staff/Employee. Will boost their productivity since the time
consuming workloads eradicated
The Future Researchers. The future researchers will gain idea and
additional information for further succession of their study
The Researchers. The researchers will obtain knowledge and
understanding how to manage and design a network and use it for their
future careers
1.6 Scope and Delimitation of the Study

The study focuses on achieving a secured, manageable, maintainable


and cost effective local area network that will:
1. Setup file server for easy file sharing and file transfer
2. Setup firewall to prevent for possible attacks like ransomware
3. A distributed access point for Production and Personnel

1.7 Output of the Study

The output of the study is a Secured Local Area Network of Sastre


Fashion and Sportswear that can help them prevent attackers for
ransomware and malicious attacks. It also provide a centralize file server
across the the network for file sharing and file transfer. We will comply with
company’s need and suggestion to implement with in the system that is
relevant to the problem stated.

1.8 Definition of Terms

TOPOLOGY - Network topology is the arrangement of the elements (links,


nodes, etc.) of a communication network.
WLAN - A wireless local area network (WLAN) is a wireless distribution
method for two or more devices that use high-frequency radio waves and
often include an access point to the internet.
LAN - Local Area Network is a computer network that spans a relatively
small area, usually confined to a single room, building or a group of
buildings
RANSOMWARE - Ransomware is an emerging form of malware that locks
the user out of their device, then demands an anonymous online payment to
restore access
Chapter 2
REVIEW OF LITERATURE AND STUDIES

2.1 Foreign Literature and Studies

According to Tamirat A. (May 2013). In today’s interconnected world it is


irrational to believe a computer network system is immune from an attacks
or think of it as too small to be considered as a predator by intruders to gain
whatever advantage they need. Sometimes company owners deceived by
thinking that company’s resource are not highly valued and hence, they are
not worth to be targeted. The reality is even at this moment companies are
losing a significant amount money and wealth because of negligence or lack
of awareness about the security issues.

2.2 Local Literature and Studies

With the advent of more powerful computers, advances in networking


technology, and high-speed internet, local computer networks have become
very important in offices and schools. A well-designed network facilitates
information sharing and communication between workers and students.
With readily available networking hardware, most local area networks can
easily be implemented, although a well designed network will vastly
outperform a poorly designed network. Factors that affect the quality of the
network are the computers, networking hardware, cable, and the network
topology, among others. A well-designed network should maximize
available resources to deliver its best performance. The network should
have fast transfer of data, minimal downtime, and ease of troubleshooting
and repair. A computer network is nothing but a connection of two or more
computers by a wire (physical cable) or by a wireless connection to
exchange information. The two types of network that can be developed in
home are wireless network and traditional wired network (Ethernet).
(Bisamos et al., 2013)
Chapter 3
METHODOLOGY

This chapter focuses on the methods and processes the researches


used as well as the different details regarding the research output

3.1 Project Setting


The research focuses on Secured Local Area Network Design and
Management of Sastre Fashion and Sportswear located at Door 1, Sophia’s
Dormitory, Kauswagan, Rodolfo N. Pelaez Boulevard, Cagayan de Oro City.

3.2 Data Gathering


The researchers conducted an interview on Sastre Fashion and
Sportswear and analyze the current system.

3.3 Project Design

The researchers will use the PPDIOO Model for the study for continuous
life-cycle of services required for a network to achieved and develop a
solution for the problem.

Figure 1 PPDIOO Model


The Secured Local Area Network Design and Management is
divided in different phases according to PPDIOO Model

Prepare - The researchers conducted an interview with the manager of


Sastre Fashion and Sportswear and figured out the the problem and planned
a effective solution that will solved the problem

Plan - In these phase, the researchers collect the information about their
hardware, location and architecture of their building so we can analyze and
design an effective network design.

Design - In these phase the researchers identified the hardware


requirements and the researchers also integrate their available hardware
devices that can still be reused in the proposed system

Implement - In these phase, the researchers will put their design into
action where they will setup firewall, file servers, shared printers and WLAN
spot. In these phase the researchers also solve the implementation errors
after they move to production.

Operate - In these phase, the researchers already deploy the system and in
these will be the moment the system will be managed and also detect the
faults in the network and minor moves, changes, adds.

Optimized - In these phase, the researchers will identify the long term
problems before they arise. This is where the life-cycle begins again.
Identifying the need here leads back to the Prepare phase to start a new
project.
3.3.1 Current Network Topology

Figure 2 Current Network System

3.3.2 Proposed Network Topology

Figure 3 Proposed Network System


3.3.3 Local Area Connectivity Map

Figure 4 Local Area Connectivity Map

3.3.4 Local Area Detailed Connectivity Map


Local Area Detailed Connectivity Map of Personnel

Figure 5 Local Area Detailed Connectivity Map of Personnel

3.3.5 Logical Topology

Figure 6 Logical Topology


3.3.8 VLSM Address Ranges
Table 1 VLSM Address Ranges
Usable Address Broadcast
Network Subnet Address Host Address
Range Address
Personnel 255.255.255.240 192.168.8.0/28 192.168.8.1/28- 192.168.8.16/25
192.168.8.15/28
WAN 255.255.255.252 192.168.8.17/30 192.168.8.18/30- 192.168.8.20/30
192.168.8.19/30

3.3.9 Payback Analysis for Network Installation

Chapter 4
SYSTEM AND HARDWARE REQUIREMENTS

4.1 Server
4.2 Workstation
4.3 Router
4.4 Switch
4.5 System Support

Chapter 5
CONCLUSION AND RECOMMEDATION

REFERENCES
APPENDICES
A Letter of Consent
B List of Plates
C Curriculum Vitae

Potrebbero piacerti anche