Você está na página 1de 18

1.

WAN DIAGRAM

Following is the diagram of the wide area network used in NET Electrical Pvt. Ltd.

Fig: WAN Diagram


The above diagram depicts that the main branch Singapore and all the branches of NET
Electrical Pvt. Ltd. which are located in Malaysia, Thailand and Australia, are interconnected
with each other through Internet. Taking cost in concern, the organization will not use leased line
from any Network Service Provider (NSP) as the network is WAN, rather they will take an
internet connection from their local ISPs (Internet Service Providers).

The main branch and its each branch is connected with its local ISP, that local ISP goes through
the Internet and is connected with the local ISP of another country which has rendered the
internet connection to the branch located their. Likewise, each branch is interconnected with
other branches, so that they could share the data and information as required by the organization.

Each branch has rendered Fiber Optic Cable connection from its local ISPs. As fiber optic cable
has the capacity of providing tremendous speed for data exchange, it is used by the organization
so that they can indulge high speed data connection. The ISPs of one country can be connected
with ISPs of other country in many ways. They might have used T3 lines, Fiber Optics,
technology like SONET (Synchronous Optical Networking) or ATM (Asynchronous Transfer
Mode), or they may even use VSAT (Very Small Aperture Terminal). It depends on the ISP we
will be rendering internet connection with; hence it is not an issue. Ultimately, the result is that
the main branch and all of its branches will be interconnected with each other over Internet.
Diagram of LAN in Thailand Branch

Fig: Thailand Branch LAN


Diagram of LAN in Malaysia Branch

Fig: Malaysia Branch LAN


Diagram of LAN in Australia Branch

Fig: Australia Branch LAN


From above diagrams of LANs of different branches of NET Electrical Pvt. Ltd. we can see that
the local area network of all branches is almost same. It is because, the working environment and
technology required is same in every branch. The PCs that are depicted in the diagram above are
in the ration of 1:7.

In above LAN figures, the Internet cloud represents the internet connectivity that each branch
has taken from its local ISP. The connection from the internet is then connected to the Router
directly. There hasn’t been used firewall between Router and internet because the router that is
used does possess firewall capability and includes firewall feature like packet inspection and IP
filtering. The Router used directs, the data packets travelling from one network to another.
Whenever there come the connection requests from another branch via internet, router is there to
direct them to required destination and achieve its purpose. The router that has been used is VPN
(Virtual Private Network) enabled router because the organization has implemented VPN in its
network. Hence, the data and information sent through the wire travels through VPN. By this we
can encapsulate and encrypt our data, so that no any unauthorized person can know what
information is being travelled through. The implementation of VPN provides very high security
of data of the organization. The router used in the main branch Singapore will be placed as VPN
server and router used in its other branches will be used as VPN clients. Likewise, all VPN
routers will be connected on core to core basis resulting in secure interconnection between all
branches. The tunneling protocols like IPSec would be used for encapsulating data travelling
through the network.

There are switches used in the LAN to connect various PCs with the router. Whenever any PCs
want to send the request outside the LAN, the connection request from the PCs first passes to the
switch and it further sends that packets to the Router, which will further take care of it. For
communication among the PCs in LAN, switches do these functions by checking the destination
address of the packet and searching its ARP (Address Resolution Protocol) table. If the
destination node is found in that same LAN it sends the packet to it but if not found it sends it to
the gateway of last resort i.e. router.
In above LAN diagrams, we see that the main branch and all of its branches is using fully
physical connection in its LAN, this is just because to reduce a part of overall cost. As we all
know wireless devices are much costlier than physical devices. Another reason behind using
physical connection is that we all know wireless connection is not reliable all the time, so there is
no point of using it in such critical environment where reliability is much more concerned. The
database server, printers all are using same physical connections.

As it is a warehouse company, the database server is required to keep records of the inventory
and movements of cargos, along with various clients PCs. At each site, clients PCs can access
the database server to input the information regarding inventory and cargos. For this, we can use
language like JAVA to build an application to provide a web based interface to the clients, from
where they can access the database server for information exchange. Various accounts can be
created and provide it to the clients so that clients having authority can only access the database
when required. By this, the organization can control the administrative operations and inventory
reports and control. The database architecture used is Distributed Database. Each branch will
have its own database to maintain which can be also accessed by clients of other branches. The
reason behind using distributed architecture is to achieve robustness like if any branch is having
problem it must not affect the other branch from working. When any branch tries to access other
branch, these data packets are also sent through VPN using encapsulation. Hence, these data
packets are also safe from the outside world.

The database is further backup on daily basis as huge numbers of cargos and inventory may
arrive in warehouse, so we can’t even lose data of even one single day incase of any natural
calamities or database crash. The backup of data and information with in database is done in
Tape Drives. Tape drives are cheap, on the other hand retrieving of data is bit slowly, but it is
durable, it can be used for very long time. There is need of printer in every organization for
printing purpose. The printer is directly connected to the switch rather than connected with PC
because it is network printer and also requires an individual IP (Internet Protocol) address. Other
peripheral components like Scanners and others can be placed, connected with any computer as
it can’t be connected with in the network.
2. NETWORK COMPONENTS

Following are the list of networking devices that have been used in NET Electrical Pvt. Ltd. in
its network. The devices used like Routers, Switches, NICs (Network Interface Cards) are listed
below along with its functionalities and appropriateness.

 Linksys RV082 10/100 8-Port VPN Router

The router that has been used in the organization is Linksys VPN router. Linksys is a
renounced and reliable company that makes networking devices. It is owned by CISCO,
so now we can understand why to use this router. Its price is also reasonable than that of
proprietary Cisco routers and other brands. It has overall the capabilities that are required
in our network.

Functionalities:

• Like other routers it allows various computers of the branches to get the internet
connection via its WAN port, but the good thing is that it has 2 WAN ports that can
be used by the organization to get second internet connection that can be used as
backup. The organization can also use both WAN ports incase to increase the
bandwidth efficiency.

• The router also contains 8 full duplex RJ-45 ports having capacity of 10/100 Ethernet
switch that could connect to other switches to extend the network or to the personal
computers directly. It also supports Auto-MDI/MDIX i.e. allows, per port, up to
200Mbps throughput.

• As discussed earlier the router has the capacity of creating VPN (Virtual Private
Network) that produces encrypted tunnels through the unsecured network i.e. internet.
It has the capability of connecting 50 users (i.e. creates 50 tunnels) from the off-site
to the branch office securely. This allows accessing of emails, files, intranets in a well
secured manner. It uses full IPSec protocols to interconnect all branches and creates
VPN tunnels using encryption algorithms like DES (Data Encryption Algorithms) and
3DES.
• The router has also capability of Firewall. It uses firewall protocols like NAT, HTTP,
DHCP, PPPoE, and PPPTP. The router comprises of features like NAT (Network
Address Translation), IP Filtering, MAC Filtering, DMZ and even Stateful Packet
Inspection. We can restrict network resources like Internet access and others using IP
filtering. The router provides maximum security using stateful packet inspection
firewall.

• For the management of router, it is provided with web based interface for simplicity
to the administrators. In addition, the management also can be done using SNMP,
Telnet and Setup Wizards.

• The router using SHA (Secure Hashing Algorithm) and MD5 (Message Digest 5)
authentication algorithms to authenticate clients.
Appropriateness:

Following are some of the reasons to specify why the used Linksys VPN Router is
appropriate for the organization.

• As we know, all the branches are interconnected with each other using unsecured
network, internet, and the company has created VPN for its remedy. The mentioned
Linksys Router does support VPN and also used IPSec tunneling protocol to create
tunnels for secure connection. The router also uses strong encryption algorithms like
DES and 3DES so that this router is best for the company.

• As from the above diagrams, we see that the company has not used Firewall devices
to rectify increasing cost; the router is there for firewall purposes. The router does
support firewall features like Stateful packet inspection, IP and MAC filtering, these
are enough for the company to maintain its data and information stored in its network
securely.

• The router also uses SHA and MD5, which are really strong authentication algorithms
so that only authorized VPN clients can bypass the router of the other branches to
access the data.

• The router has 8 Ethernet ports which can be used to connect to the switches that will
further connect PCs in company to the router. The router also support switch
functionality so that other workstations could be directly connected with it, if
required.

• The router also supports protocols such as NAT and DHCP that are indispensable for
any company to transit private IP address to public IP address, and auto assign IP
addresses to the PCs used in company’s LAN.

• The router also has a web based interface, and supports Telnet and SNMP for the
management of router, which makes easy for network administrator to operate.
Hence, this router is appropriate for the company.
 Linksys SR224 24-Port Switch

The switches that are used in the company network are also from the same vendor from
where the router has been used, Linksys. The reason behind using product of this vendor
is already justified above.

Functionality

• The functionality of typical switch is to store and forward data packets from one node
to another. Switches works on Data-Link Layer of the OSI model. Whenever any
node sends the data the switch receives it first, then it looks at the destination address
and determines if it is in that local area network, if it is found then switch sends to
that node then only, but if it didn’t find it then it sends it to the router that connects
with the other network. The Linksys SR224 switch has these all functionality.

• This switch includes even advanced switching technology, which would increase the
performance of the network apart from just dedicated bandwidth and full duplex data
transfer.

• It includes some features like wire-speed switching a non-blocking, which will


forward data packets sending from one node in really fast way that our network is
capable with.

• In order to prevent packet collisions, the switch consist Data Flow Control features
and to reduce data transfer errors it includes features like Aging and Address
Learning.

• The switch is made using the network standard like IEEE 802.3i and 802.3u.
Appropriateness

Following are the reasons why this switch is appropriate for the organization.

• This Linksys switch is 24 ports, so we can use two of them in each branch, getting the
capacity of 48 PCs to get interconnected, which are as according to the requirements
for the organization as there are approx. 41 PCs in each branch.

• The noticeable features such as wire-speed switching, non-blocking, aging, address


learning and data flow control and the benefit that these features provide, makes this
switch most appropriate for the organization.

• The switch is of compact size, and has wall mount slots and rack mount brackets so
that it could be easier during the installation like can be installed in wall or kept in
rack.

• The switch does support both CAT 5 and CAT 6 cable, and CAT 6 cable is the one
that would be used in the company’s LAN, so this is appropriate.
3. NETWORK MEDIA

The network media used in the company as the diagrams depicts is all physical media. There
hasn’t been used any kind of wireless techniques. As we all know that wireless devices are much
more expensive than that of physical and it is not even reliable too. The company has used CAT6
cables in its LAN and taking bandwidth and amount of incoming and outgoing data in concern it
has used Fiber Optic Cable to connect its LAN to the ISP.

 Fiber Optic Cable:

Fiber optic cable is the type of the data communication media that uses light as a medium
to travel data from one node to another. Its speed is tremendous, about 1-10 Gbps. There
are two types of fiber cable, Single Mode and Multi-mode. The company uses Single
mode cable because it provides much more benefits than that of multi-mode. In single
mode fiber, it consists of only single ray of light. The data are travelled using waves of
various frequencies that is received by the receiver end at destination node and convert
them into machine readable data. The connector used in single mode fiber is called LC,
which is called as Lucent Connector or Local connector. The fiber optic is almost not
affected by Electro Magnetic Interference or any cross-talk.

The architecture of single mode fiber optic cable consist of, a Core (8-10µm) which is
further covered by Cladding (125µm) and which is further covered by Buffer and Jacket.
It does consist of modal dispersion like that of Multi-mode fiber that results in various
spatial modes, nevertheless with narrow modal dispersion. Hence, it is far better than
multi-mode in aspect of holding the fidelity of each and every light pulse across long
distances. It is also better then multi-mode in aspect of bandwidth as it provides
comparatively higher. Though devices for single mode fiber will be costly but if we buy
it in bulk as required in the company it would be cheaper. Fiber optic cable can run up to
80km without the use of repeater.
 CAT (Category) 6 Cable:

It is the most common type of cable, also known as Gigabit Ethernet that is being used in
LAN is any organization now a day. It is a twisted pair cable which provides the data rate
speed of almost 10Gbps and bandwidth of 250MHz. it consist of four pairs of copper
wire that are twisted together to reduce the crosstalk.

The inner core consists of copper wire that is insulted by plastic cover. There are eight
wires like this, which are twisted in four pairs and bundled together in a jacket. It uses
RJ-45 as its connector. It is enhanced version of CAT5 cable that provides much more
bandwidth than that of it. It is appropriate for 10BASE-T to even 10GBASE-T.
Compared to its older version, it is far more robust against data loss, cross talk and EMI.

The maximum distance that CAT6 cable can cover without of use of repeaters is 100m.
The installation of CAT6 is a bit complex. It should be installed properly and should be
terminated well. If the cable is bended too tightly or curled tightly then we cannot achieve
perfect performance. For effectiveness and safety the shielded cable ought to be
grounded.
 SECURITY PLANS

Following are the security measures that has been implemented in the network
environment of the organization in order to ensure that the organization LAN and WAN
is secured thoroughly.

• The security plans implemented in the company is from scratch. Firstly, each PC
should have a unique login username and password dedicated to the user of that
computer only.

• In the router, we should define the scope of IP address in DHCP (Dynamic Host
Control Protocol). The scope should be limited to the amount of PCs that are being
used in each branch. By this, we can secure our network from unauthorized users
wanting to get access to our network.

• The firewall features of the router should be turned on and its capabilities like stateful
packet filtering, IP address filtering, MAC filtering and DMZ could be further utilized
to protect our network and resources from malicious users and malicious packets like
Ping of Death and DoS attack.

• The Virtual Private Network (VPN) that is being created will fully secure our
network and data and information that is travelling through the wire from outside
hackers, crackers and eaves droppers. The tunneling protocol used like IPSec and
encryption algorithm used will thoroughly secure our data and information.

• The main branch router will be designated as VPN server and all other branch routers
will be designated as clients. So the request coming from routers with in the VPN will
only be authorized to access the network and the data that are sent through it.

• Various accounts will be created for database access, and they are only given to the
users that need to access the database when required. This way, we can stop
unauthorized users from accessing the database.

• The USB connector in all PCs will be turned off or not to be placed, to reduce the
chances of Virus infection, or system misconfiguration by the users.
4. BUDGET DESCRIPTION

Before the budget description is mentioned, it should be clarify that the company has as a
whole of 165 members, from that we can assume that it must already have required amount
of computer presently, so the cost of these PCs are not listed in below budget description
rather the devices and media that are required for the implementation of Wide Area Network
is defined below.

Following are the list of devices and media required for the implementation of WAN.

• Linksys RV082 10/100 8-Port VPN Router:

The quantity of Linksys routers required for the implementation of WAN in the
company is four, single router in each branch. The price of Linksys router is $800.
So, the price of four routers is $3200.

• Linksys SR224 24-Port Switch:

The quantity of Linksys switch required in the network environment of the company
is 2 per branch. As the switch has the capability of 24 ports but each branch have
almost 42 PCs. so two switches would be required in each branch i.e. altogether of 8
Switches. The price of single Linksys switch is $75. So, price for 8 is $600.

• CAT6 Cable:

CAT6 cable is only used in Local Area Network of the company. Looking at the area
of each branch we can assume the length of cable required. 500m cable per branch
can be bought at present. It can be further added more if required. The price of CAT6
cable per meter is 0.34$. So, price of 2000m (4 x 500) is 700$.
• Fiber Optic Cable:

The company will use fiber optic to connect its branch to the local ISP. Though, it
would be installed by the ISP, they will charge for it. The distance between the
company and the PoP of the local ISP may vary accordingly. The approximate length
of fiber optic cable required may be 200m. The price of fiber optic per meter is 15$.
So, the price of 200m is 3000$.

• Internet Connection:

The price of internet connection from the local ISP may vary in all location but also
the network speed that would be taken can be specified. The speed of 4Mbps would
be much enough for the company’s network. The price of 4Mbps connection may be
approximately 150$. So, connection at all four branch costs 600$.

• Database Server:

The company would use a high end database server for database. It will use HP
(Hewlett-Packard) ProLiant - 2 x Xeon 3.4GHz - Tower. The DBMS (Database
Management System) software could be MySQL Server, which is open source and is
freely available. The price of the database server is 1000$. So, the price of 4 database
server is 4000$.
OVERALL BUDGET

S.NO. EQUIPMENTS RATE in US$ QTY REQ. PRICE in US$

Linksys RV082 10/100 8-Port


1. 800 4 3200
VPN Router

2. Linksys SR224 24-Port Switch 75 8 600

3. CAT6 Cable 0.35 2000m 700

4. Fiber Optic Cable 15 200m 3000

5. Internet Connection 150 4 600

6. Database Server 1000 4 4000

TOTAL PRICE 12100

The total budget required in the implementation of WAN in NET Electrical Pvt. Ltd. is,

US Dollars= 12100$

Singapore Dollars=15408.15$ (approx.)

Você também pode gostar