Você está na página 1de 68

ASIA PACIFIC INSTITUTE OF INFORMATION TECHNOLOGY APIIT Diploma Part II

INCOURSE ASSIGNMENT NETWORKS AND NETWORKING


Prepared By A.N.Ahamed Nishadh (CB004081) S.D.Ilangakoon (CB004041) M.J.Dilshan Zuhdi (CB004150) Module Code & Title AICT003-3-2 Networks and Networking Cohort DF10A1ICT Date of Submission 22nd August 2011 Instructor Mr.Udesh Amarasinghe

Submitted in partial fulfillment for the degree of Bachelor of Science (Hons) in Computing

Deshan Ilangakoon

Ahamed Nishadh

Dilshan Zuhdi

Assumptions (5) Report content (10)

GROUP COMPONENT

Diagrams and/or Figures (20) Analytical and Critical Thinking (20) Documentation (5)

i
Referencing (10) Group Total (70) Presentation (20) Progress Report (5) Workload Matrix (5) Individual Total (30) Grand Total (100)

INDIVIDUAL COMPONENT

WORKLOAD MATRIX
Name / CB No. Work Assigned Work Completed Comments & Signature Dilshan Introduction Objectives RequirementSpecifications Scope Assumptions Floor Description and designGround Floor Second Floor Security Options Limitations Floor Description and designFirst Floor Third Floor Fourth Floor Topologies Feasibility Study Conclusion Meeting Minutes Gantt Chart Backbone Network plan Floor Description and designFifth Floor Sixth Floor Seventh Floor Backup options Ahamed Deshan

Ahamed Nishadh (CB004081)

ALL COMPLETED

Deshan Ilangakoon (CB004041)

ALL COMPLETED

Dilshan Zuhdi (CB004150)

ALL COMPLETED

ii

PROJECT GNATT CHART

iii

ACKNOWLEDGEMENTS
Firstly we would like to thank our lecturer Mr.Udesha Amarasinghe for all the help and guidance given to us while doing this assignment. Especially for teaching us this module in such a way that we were able to learn this highly technical module very easily. Also we would like to thank Mr. Balachandran of the School of Computing of APIIT for all the assistance given in preparing this document. Also there are many individuals who have helped us in numerous ways directly and indirectly so that we were able to complete this assignment. APIIT Lanka for providing us with resources and the Tech Team at APIIT Lanka for their assistance at required times. And last but not least our friends, parents and the well-wishers without whose moral support and encouragement, we would not have been able to do a good job. Finally, if there are any shortcomings in this project, then we request to excuse us for all those and accept this documentation. Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi

iv

TABLE OF CONTENTS
1.0 INTRODUCTION ........................................................................................... 1 2.0 ANALYSIS ..................................................................................................... 2 3.0 OBJECTIVES .................................................................................................. 3 4.0 REQUIREMENT SPECIFICATIONS ............................................................. 4 5.0 SCOPE ............................................................................................................ 5 6.0 ASSUMPTIONS .............................................................................................. 6 7.0 FLOOR AND NETWORK PLANS ................................................................. 8 7.1 BACKBONE NETWORK PLAN................................................................ 8 7.1.1 DNS SERVER ...................................................................................... 8 7.1.2 DHCP SERVER.................................................................................... 8 7.1.3 SIP SERVER ........................................................................................ 8 7.1.4 BACKUP SERVER .............................................................................. 9 7.1.5 EMAIL SERVER .................................................................................. 9 7.1.6 PRINT SERVER ................................................................................... 9 7.1.7 ANTIVIRUS SERVER ......................................................................... 9 7.1.8 DATABASE SERVER ......................................................................... 9 7.1.9 FILE SERVER .....................................................................................10 7.1.10 PROXY SERVER ..............................................................................10 7.1.11 SWITCHES .......................................................................................10 7.1.12 WIRELESS ACCESS POINTS ..........................................................12

7.1.13 ROUTERS .........................................................................................13 7.1.14 FIREWALL .......................................................................................14 7.1.15 ADSL ................................................................................................14 7.2 GROUND FLOOR .....................................................................................15 7.2.1 FLOOR PLAN .....................................................................................16 7.2.2 NETWORK PLAN ..............................................................................16 7.3 FIRST FLOOR ...........................................................................................18 7.3.1 - FLOOR PLAN .....................................................................................19 7.3.2 - NETWORK PLAN ...............................................................................19 7.4 SECOND FLOOR ......................................................................................20 7.4.1 FLOOR PLAN .....................................................................................21 7.4.2 NETWORK PLAN ..............................................................................21 7.4.4 SERVER ROOM .................................................................................23 7.5 THIRD FLOOR..........................................................................................26 7.5.1 FLOOR PLAN .....................................................................................26 7.5.2 NETWORK PLAN ..............................................................................26 7.6 FOURTH FLOOR ......................................................................................29 7.6.1 FLOOR PLAN .....................................................................................29 7.6.2 NETWORK PLAN ..............................................................................29 7.7 FIFTH FLOOR ...........................................................................................32 7.7.1 FLOOR PLAN .....................................................................................32

vi

7.7.2 NETWORK PLAN ..............................................................................32 7.8 SIXTH FLOOR ..........................................................................................34 7.8.1 FLOOR PLAN .....................................................................................34 7.8.2 NETWORK PLAN ..............................................................................34 7.9 SEVENTH FLOOR ....................................................................................37 7.9.1 FLOOR PLAN .....................................................................................37 7.9.2 NETWORK PLAN ..............................................................................37 8.0 BACKUP OPTIONS ...................................................................................... 39 8.1 ONLINE BACKUP ....................................................................................39 8.2 BACKUP SERVER....................................................................................39 8.3 NETWORK HARDWARE FAILURE .......................................................40 9.0 TOPOLOGIES ............................................................................................... 41 9.1 TREE TOPOLOGY....................................................................................41 9.2 STAR TOPOLOGY ...................................................................................42 10.0 FEASIBILITY STUDY ............................................................................... 43 10.1 - TECHNICAL FEASIBILITY....................................................................43 10.2 - OPERATIONAL FEASIBILITY ..............................................................44 10.3 SCHEDULE FEASIBILITY.....................................................................45 10.4 ECONOMIC FEASIBILITY ....................................................................45 11.0 SECURITY .................................................................................................. 46 11.1 FIREWALL..............................................................................................46

vii

11.2 PROXY SERVER ....................................................................................46 11.3 VIRTUAL LAN .......................................................................................47 11.4 PASSWORD PROTECTED WI-FI ..........................................................47 11.5 ANTIVIRUS SERVER.............................................................................47 12.0 LIMITATIONS ............................................................................................ 48 13.0 CONCLUSION ............................................................................................ 49 BIBLIOGRAPHY .................................................................................................. 50 MEETING MINUTES ............................................................................................ 52 1st MEETING......................................................................................................52 2nd MEETING .....................................................................................................53 3rd MEETING .....................................................................................................54 4th MEETING .....................................................................................................55 5th MEETING .....................................................................................................56 6th MEETING .....................................................................................................57 7TH MEETING ....................................................................................................58

viii

TABLE OF FIGURES
Figure 1 - BACKBONE NETWORK DIAGRAM........................................................................ 15 Figure 2 - GROUND FLOOR DIAGRAM ................................................................................ 18 Figure 3 - FIRST FLOOR DIAGRAM ...................................................................................... 20 Figure 4 - SECOND FLOOR DIAGRAM ................................................................................. 23 Figure 5 - SERVER ROOM DIAGRAM ................................................................................... 25 Figure 6 - THIRD FLOOR NETWORK DIAGRAMV.................................................................. 28 Figure 7 - FOURTH FLOOR NETWOKR DIAGRAM ................................................................ 31 Figure 8 - FIFTH FLOOR NETWORK DIAGRAM .................................................................... 33 Figure 9 - SIXTH FLOOR NETWORK DIAGRAM..................................................................... 36 Figure 10 - SEVENTH FLOOR NETWORK DIAGRAM ............................................................. 38 Figure 11 - Tree Topology ................................................................................................. 41 Figure 12 - STAR TOPOLOGY ........................................................................................ 42

ix

1.0 INTRODUCTION
Seashells Colombo is a member of the internationally renowned Confifi Seashells Group of Hotel. The management of Seashells Group have decided to set up a new hotel in the Southern part of Sri Lanka with the tourism industry picking up. The new hotel is named Seashells Reef and is located near the sea and is considered a beach hotel. The hotel is a luxury and semi-luxury hotel and will be catering to the local as well as foreign tourists. The hotel consists of 100 rooms spread across 7 floors. The hotel also has 2 banquet halls, restaurants, coffee shops, sales outlets, recreational areas and a VIP business center. With the construction of the building started, the management of Seashells group has requested us to design a network plan for their hotel connecting all areas of the hotel to a centralized location so as to provide services to the customers as well as to provide a secure and efficient and fast connectivity for the management and the staff. Considering all these aspects we have come up with this documentation providing all the relevant plans to set up a fully secure and efficient network to the hotel. From the type of cables to be used to the method they are to be wired along, everything has been looked into in this documentation as well as the type of devices to be used, the security systems in place, methods the devices are connected are all addressed in this documentation. It should also be noted that while designing the network we have taken note of further upgrades in the future and allowed facilities to be easily upgraded with minimum difficulty.

2.0 ANALYSIS
Our group was assigned the task of creating a network plan for Seashells Colombo. As a part of this project that we are undertaking the first task at hand is to identify the problems. After this we had to do several researches into the best way to implement the solution that we had identified for solving the requirements of Seashell Colombo. We analyzed the problem that we were facing and developed solutions using the research that we had carried out. We identified after this the best and most suited way of laying the network and the most suited hardware that would help laid a network of the highest quality.

3.0 OBJECTIVES
The computers that the staff will be using and the computers that the guests will be using have been set up on two different networks. At places they have been physically separated using different hardware and at times have been virtually separated using virtualization of networks. This is to ensure that guests cannot access the staff network due to security issues. Wireless networks are placed in all the floors so that users with wireless network accessible devices can use connect to the network and use the services. The wireless networks are primarily intended to be used by the guests and no access is given to the staff network on the wireless networks. More than one external connectivity methods are used, such as 3 separate ADSL lines and 4 separate PSTN telephone lines so as to level off the load that is being put on the network due to the size of the network. This will ensure that external connectivity will remain smooth with less traffic interference. A firewall has been installed to monitor all incoming traffic through the internet while a proxy server has been installed in the network to monitor all outbound network traffic. This is done so as to secure the networks and the inbound and outbound traffic to provide a quality service to the guests. The network is being designed with the intention of future upgrades in mind.

4.0 REQUIREMENT SPECIFICATIONS


The hotel has 100 guest rooms. All the guest rooms need to be wired with a RJ45 port so that guests can connect their device to the network. Each room will also have a telephone that will be able to call any internal section of the hotel and take outside calls through an operator. All departments will also have computers that are also connected to the network. A wireless network is present in all the floors to provide secure wireless connectivity to users to access the network. Necessary departments and the VIP business center should have network printing facilities to be able to print from any computer in that sub network. Adequate security measures need to be taken for data protection. Unauthorized access to the network should be prevented.

5.0 SCOPE
To make this project of networking the hotel, there are certain aspects that we need to consider. They are: What kind of devices have to be used? What kind of network needs to be used? What are the services that will be provided in the network? What are the security measures and standards that need to be implemented for data protection? y y
y

y y y y

What is the budget of this project? The feasibility of this project. Where and how devices and are to be placed in the building for and efficient network.

6.0 ASSUMPTIONS
In this project, we have taken certain assumptions so as to make this assignment a success. They are as follows: y The network plan has been done according to a very average budget although the hotel had not specified a budget for us to work on. y Backups are taken on the backup server only and no offsite backups are taken. y y The best possible network solution is being submitted to Seashells Group. All the cabling and the installation will be either done by us or by certified professionals so that the network works flawlessly. y If one external connection line (ADSL or PSTN) is down due to malfunctioning, the rest of the lines will take over the job automatically while the faulty line is being repaired. y y The backup server will manage all the backup processes. In the case of guest rooms, the networking is shown for only one room in each floor. This is because all the other rooms will also have a similar networking process done except that the cabling will change depending on the availability at the time of cabling. y Although shown in the diagrams that there is a computer in every room, it is not the case. Only an RJ45 port is available in each room with a spare 1m cable in each room to connect the users personal devices. y The telephones shown in the diagrams are physically present in the rooms and the guests cannot connect any other devices to those connections. y All the cabling will be done along the ceiling since we assume that there will be a space between the concrete floors and the ceilings which allow wiring to be done along the ceilings. y Appropriate measures are being taken to protect the cabling and the devices and jacks so as to prevent corrosion or salt building up since the hotel is located near the sea. y Sufficient electrical power is available at the hotel to support the core of the network (servers and switches and other devices).

The wireless access point devices are able to support the entire floor with minimum signal drop.

y y

No dead zones are created due to two wireless networks clashing each other. The network plan submitted is able to meet all the requirements said by the management.

The cable duct houses not only the network cables but also other electric wiring of the hotel.

The devices such as switches and wireless access points are placed in safe and secure locations when they are exposed publicly.

The cables connected to the devices, are connected to the appropriate place of each device, and not as shown in the diagrams. (Ex. the network cable connected to the computer is connected to the NIC of the computer and not to the monitor or keyboard)

The Wireless networks are secured using network keys so that no user from outside can access the network. The password to be used is widely publicized inside the hotel so that guests can only access the network and are changed every 90 days to keep the network secured.

Adequate IP addresses are available for a considerable number of wireless devices to be connected.

7.0 FLOOR AND NETWORK PLANS


7.1 BACKBONE NETWORK PLAN
The diagram shown at the end of this section shows the main backbone network plan of the hotel. The network consists of the following devices and services used and provided in the network.

7.1.1 DNS SERVER


The Domain Name System (DNS) is a standard technology for managing the names of Web sites and other Internet domains. DNS technology allows you to type names into your Web browser and your computer to automatically find that address on the Internet. (Mitchell, n.d.) We use this server to manage our websites names and internet domains that goes out from our network and comes to our network.

7.1.2 DHCP SERVER


Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers configured for a given network. (University Information Technology Services, n.d.) The reason for using a DHCP server is to allocate a unique IP address for each device that will be connecting up to the hotels network. The DHCP sever will have to allocate a IP for all network ports in the guest rooms, administrative departments and also for the servers and the VoIP telephone lines.

7.1.3 SIP SERVER


Session Initiation Protocol (SIP) is a communications protocol used to create, modify, and terminate sessions with one or more users. SIP sessions can include voice communications, instant messaging, and multimedia applications. SIP is most widely used to initiate and terminate Voice over Internet Protocol (VOIP) calls. (WhatIsMyIPAddress, n.d.)
8

We mainly use this server for voice communication.

7.1.4 BACKUP SERVER


Sever that lets you to save your data in compressed file. From this we can relocate the data to another computer. This server will help to ensure the safety of the hotels valuable data in the case the original data is lost or gets corrupted. A backup server should be frequently updated and backups of files taken regularly We use this server to protect our data. And to ensure that the data is secured if anything goes wrong in the network.

7.1.5 EMAIL SERVER


Email Server provides the email facilities in your network. We use this Server to provide email addresses to the staffs to communicate through the network. From this the organizations data files and other important stuffs will be secured when sending to others and outsides cannot access.

7.1.6 PRINT SERVER


This Server can be a device or software that shows the print requests and print queues. We use this Server so any guest or staff can print their documents from a network printer. This way we do not need to install a printer to every computer.

7.1.7 ANTIVIRUS SERVER


We use this Server to provide the security of our network. We have used Bit Defender Virus Guard as it is more reliable and one of the leading virus guard in the world.

7.1.8 DATABASE SERVER


Database server is the term used to refer to the back-end system of a database application using client/server architecture. The back-end, sometimes called a

database server, performs tasks such as data analysis, storage, data manipulation, archiving, and other non-user specific tasks. (Webopedia, n.d.) We use this server to maintain our database system easily.

7.1.9 FILE SERVER


A file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. A file server allows users to share information over a network without having to physically transfer files by floppy diskette or some other external storage device. (SearchNetworking, n.d.) We use file Server to transfer information inside the network without an external device.

7.1.10 PROXY SERVER


A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server. (Webopedia, n.d.) We have used a proxy server to act as a gateway server to separate the network from outside networks and to filter out the unwanted sites.

7.1.11 SWITCHES
What is a Switch? Why do we use them? A Network Switch is a hardware appliance with a fixed number of Network Ports (RJ-45 Ports) that can connect multiple Network devices to the LAN (Local Area Network). They are mainly used for sharing Internet connectivity between multiple computers or sharing some network resource like Printer or NAS Box so that they can be accessed by all the users of the network. Layer 2 Switch and Standards we will be using:

10

The Layer 2 Switches are for all in to the 2nd Layer of the OSI Model and these switches are hardware based. It can also be called as Standard Switch and it required a Media Access Control Address (MAC) to identify the Source and the Destination of the Data Packet. Layer 2 Switch Standards 1. The 1st Standard that we use is the DES-3552 xStack it is a 48 port Layer 2 Switch. We use this switch in Several Floors they are: y Ground floor- we use a 48 port to this floor is to connect the guest computers, printer and the wireless access point. y 2nd Floor- we use this switch to connect all the staff network computers, the Wireless access point and the network printers. y 3rd Floor- we use this switch to connect all the network computers, the wireless access point and the network telephones. y 4th Floor- we use two 48 port switches in this floor we use one switch for the network computers and the wireless access point and the other is for the network telephones. y 5th Floor- we use this switch to connect all the network computers, wireless access point and network telephones. y 6th floor- we use this switch to connect all the network computers, wireless access point and network telephones. y 7th Floor- we use two Layer 2 Switches. We use one switch for the network computers and the wireless access point and the other is for the network telephones.

2. The 2nd Standard that we use is the DGS-3426P it is a 24 port Layer 2 Switch. We use this switch in Several Floors they are: y Ground floor- We use 2 switches one is to connect all the shop computers, Restaurant Computers and the kitchen computers. And the other switch is to the network telephones.

11

1st Floor- we use a switch here to connect all the network computers, network telephones and the wireless access point. 2nd Floor- we use 2 switches one is to connect all the servers and the other one is for the network telephones.

Layer 3 Switch and the Standards we will be using: Its a hardware device which operates in the network layer of the OSI Model. A layer 3 switch is separated from a router is that L3 switch contains hardware which have been optimized to pass data as fast any layer 2 switch and they have the ability to make decisions on how to transmit traffic and is the usual behavior of a router. A Layer 3 Switch is also faster than a Router because of its hardware switching capabilities. Layer 3 Switch Standards The standard we will be using is DGS-3650. Its a 48 port layer 3 switch and we use this switch as our backbone switch in our network.

7.1.12 WIRELESS ACCESS POINTS


Wireless access points (AP or WAP) are specially configured nodes on wireless local area networks (WLAN). Access points act as a central transmitter and receiver of WLAN radio signals. The standard that we have used for the wireless transmission media is DIR-330. (Mitchell, n.d.) 802.11b Standard: An extension to 802.11 that applies to wireless LANS and provides 11 Mbps transmission (with a fallback to 5.5, 2 and 1-Mbps) in the 2.4 GHz band. 802.11b uses only DSSS. 802.11b was 1999 ratification to the original 802.11 standard. 802.11a Standard: An extension to 802.11 that applies to wireless LANs and provides up to 54-Mbps in the 5GHz band. 802.11a uses an orthogonal frequency division multiplexing encoding scheme rather than FHSS or DSSS.
12

802.11g Standard: It applies to wireless LANs and is used for transmission over short distances at up to 54-Mbps in the 2.4 GHz bands. 802.11n Standard: 802.11n builds upon previous 802.11 standards by adding multiple-input multipleoutput (MIMO). The additional transmitter and receiver antennas allow for increased data throughput through spatial multiplexing and increased range by exploiting the spatial diversity through coding schemes like Altamonte coding. The real speed would be 100 Mbit/s (even 250 Mbit/s in PHY level), and so up to 4-5 times faster than 802.11g. From these Standards we use the 802.11.n because its the latest technology in wireless access point. (Webopedia, n.d.)

7.1.13 ROUTERS
It is a device that sends data packet along the network. Its used to connect two or more networks together. They are located at the gateways where two or more networks connected. And it keeps the critical devices data flowing between networks and keeps the networks connected to the internet. The main advantages of a router are: y y y y y It limits the collision domain. It can connect to different architectures and media. It can function on WAN and LAN. It can filter the broadcast. It can determine the best path for the data reach.

(AllInterview.com, n.d.) In our network we have 8 routers. Every floor we have put a router to access internet wirelessly. And we are having a ADSL router to get the internet connection.

13

7.1.14 FIREWALL
Its a system that is designed to prevent from unauthorized access to or from a private network. It can implement in both hardware or software or a combination of the both. It is usually used to prevent unauthorized internet users from private networks connected to the internet, especially intranets. (Webopedia, n.d.) What do firewalls do? y y y The most basic type firewall performs Packet Filtering. A second type of firewall, which provides additional security, is called Circuit Relay. Another and still more involved approach is the Application Level Gateway.

(PC-Help, n.d.)

7.1.15 ADSL
The definition of ADSL is Asymmetric Digital Subscriber Line. Its a type of a DSL communication technology used to connect internet. This allows more data to send over existing copper telephone lines (POTS) when we compared to the traditional modem lines. A special filter called microfilter in installed on a subscribers telephone line to allow both ADSL and regular voice services to be used at the same time. ADSL requires a special ADSL modem and subscribers must be in close geographical locations to the provider's central office to receive ADSL service. Typically this distance is within a radius of 2 to 2.5 miles. ADSL supports data rates of from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and from 16 to 640 Kbps when sending data (known as the upstream rate). (Webopedia, n.d.)

Advantages of ADSL y y y y y It can use higher data rate of 26mbps maximum wherever possible. It uses a normal telephone lines. And it is easy to start using ADSL. We can use modem and telephone simultaneously using the ADSL splitter. ADSL modems are cheap and anyone can afford it. Its always on connection.

(Tuning 2.0, n.d.)

14

BACKBONE DIAGRAM
Figure 1 - BACKBONE NETWORK DIAGRAM

15

7.2 GROUND FLOOR 7.2.1 FLOOR PLAN


The ground floor is one of the important floors of the hotel. This is because the floor will be one of the busiest floors in terms of guests. The floor consists of a lobby area, sales outlets, restaurant, reception plus the VIP business center. The ground floor is where most of the guests will be using the networks compared to the other floors. The cable duct is situated in the top left corner of the building and is in the same position in all the floors. The cable duct is used to send cables vertically along all the floors so that they are not seen outside to the visitors of the hotel.

7.2.2 NETWORK PLAN


As said in the floor plan description, this floor is the busiest floor in the hotel. So we have strategically networked this floor so that the different sections are separated. This floor has 2 separate network switches in place. One switch is for all the computers that the staff will be using. A 24 port Layer 2 switch is being used in this case. Only 15 machines are connected to this switch. The rest of the ports are kept so that they can be used if more computers are added to the network in the future as an upgrade option. A separate switch is being used in this case instead of using a large port number switch and connecting the other PCs also is to separate the staff network from the guest network due to security reasons. A Virtual LAN (VLAN) can also be used but was not used in this instance as the guest network in the ground floor is for the VIP center only and that has been put separately on a single switch. The second switch used in this floor is for the VIP Business Center and for the telephone network. A 48 port Layer 2 switch is being used in this case and is virtually broken into two networks using VLAN thereby separating the computer network and the VoIP Telephone network. The computer network from this switch is used by guests only and more exclusively by the VIP Business Club users. In addition to these, we also suggest that a wireless network access point be set up in this floor. Wireless network connectivity is a very necessary requirement in the
16

current era with almost every modern mobile communication device being able to connect to a wireless network. With the wireless access point, guests especially in the lobby area and the restaurant area plus any guest in the whole of the ground floor can connect to the wireless network of the hotel using a communication device and access the services provided by the hotel.

17

GROUND FLOOR DIAGRAM


Figure 2 - GROUND FLOOR DIAGRAM

18

7.3 FIRST FLOOR 7.3.1 - FLOOR PLAN


The first floor has four main rooms. These rooms are the diamond banquet hall, the Rainbow banquet hall, the banquet office and service department and the banquet kitchen.

7.3.2 - NETWORK PLAN


This floor consists of only six machines, three telephones and one wireless access point. The floor also has only one 12 port Layer 2 Switch since there are very few connections that are required. The ports in this switch have been separated into three Virtual Local Area Networks (VLAN). The VLAN has been divided in such a manner to accommodate the telephone network, the Wireless Access Point (WAP) network and the first floor computer responsible for the administrative work in that floor. The purpose of dividing the network in such a manner is so that the WAP which is accessible to the guests will not leave the administrative network vulnerable to any external party. The Banquet halls only means of access to the internet is via the WAP that is located in the center of the floor. This is to provide any guest who is in the either of the halls or the lobby to access to internet browsing using any device that has a wireless adapter. The banquet office and service department has five computers that will allow the employees in this department to maintain their databases and information files. These computers will be linked up to the Layer 2 switch that is in the floor to their corresponding VLAN. This room also has two (2) Voice over IP (VoIP) telephone links also connected to the floors switch. This will allow the persons in this department to communicate with other departments or to any other telephone line.

19

FIRST FLOOR DIAGRAM


Figure 3 - FIRST FLOOR DIAGRAM

20

7.4 SECOND FLOOR 7.4.1 FLOOR PLAN


The second floor of the building is the most important floor of the hotel in terms of administration since most of the administrative sections of the hotel are located in this floor. The floor is divided into different sections to house different departments and in some cases prominent individuals such as the Managing Director and the General Manager etc. The floor also is home to the Server Room which houses all the servers and other network equipment of the hotel. Along with the Server Room is the IT Department. Access to the Server Room is given through the IT Department only so that no unauthorized access is done to the Server Room. In addition to all the departments and offices in the floor, a small lobby area is also available in the middle of the floor for visitors of the offices.

7.4.2 NETWORK PLAN


As said above, this floor is the administrative capital of the hotel. Most of the hotels administration is done in this floor. This floor consists of 3 Layer 2 switches and 1 Layer 3 switch which will be the main backbone switch of the hotel. The first Layer 2 switch used in this floor is to connect all the computers used in the various departments of the floor. A 48 port Layer 2 switch is being used in this instance and is broken into several VLANs to accommodate the different departments in the floor. The reason why the different departments are separated into VLANs is because of data security so that one department cannot access the network of another department. One port in the switch has been made into a separate VLAN so as to accommodate the wireless access point that is available in this floor. The wireless access point is a public network so it is put into a separate network to isolate it from the other networks.

21

The second switch used in this floor is for the VoIP telephone network. Since all the telephones are connected to just one network, no separate sub networks are being made for this network and all telephone lines are connected to one switch. The other Layer 2 switch used in this floor is the switch for the server room to connect all the servers. More detailed description of the server room and the network of the server room are given below.

22

SECOND FLOOR DIAGRAM


Figure 4 - SECOND FLOOR DIAGRAM

23

7.4.4 SERVER ROOM


The Server Room is the most important section of the hotel when it comes to networking since it houses all the important networking equipment of the hotel. A detailed diagram of the server room is given below. The server room contains two main switches. One is a 24 Port Layer 3 switch which connects all the servers in the room together to form one sub network. Although only 10 different servers are available, a larger number port switch is being used so that if in the future for any upgrades, they can be done easily. The other switch in the Server Room is the 24 port Layer 3 Main Backbone Switch. This is the main switch of the hotel and all other small switches and external connection devices (Ex. ADSL Router) are connected to this switch. Only one Layer 3 switch is used in the hotel due to the cost involved and all other switches used in the system are layer 2 switches which will serve the purpose of networking the hotel. As shown in the diagram, 3 ADSL connections are to be taken. The 3 connections to be taken are the package named Web Master from Sri Lanka Telecom. Each package comes with a 4Mbps Download Speed and a 512Kbps Upload Speed with a 60 GB threshold Volume per month. A Static IP is also given to every connection that is obtained. The 3 ADSL connections are then connected to a Load Balancer. From the load balancer the connection is given to the Firewall which will filter the incoming and outgoing network traffic and then allow the connections to the pass through to the ADSL Router which is then connected to the Main Layer 3 Backbone Switch. Also as specified earlier, we suggest that a VoIP telephone network be used for the internal telephone network. For this, a Digital PABX Device is installed in the Server Room to which 4 Separate PSTN Telephone Connections are connected to. The PSTN Connections are obtained from Sri Lanka Telecom. From the Digital PABX Device the line is then connected the Main Layer 3 Backbone Switch which will then route connections as required.

24

SERVER ROOM DIAGRAM


Figure 5 - SERVER ROOM DIAGRAM

25

7.5 THIRD FLOOR 7.5.1 FLOOR PLAN


The third floor has eighteen bed rooms, a mini restaurant and a recreational area. This floor has a cable duct from which the network cables for the floor are pulled. This floors network utilization will be limited to the occasional use by a guest and the major contributor for network activity will be the restaurant and the recreational area.

7.5.2 NETWORK PLAN


This floor will have 20 network ports, 20 telephone lines and wireless access point. These devices will be connected to one 48 port Layer 2 switch to connect all the network cables. The floors switch will be broken in to three VLAN to help the hotel maintain security. The purpose of breaking the switch in this manner is to make the network traffic coming from the restaurant and the recreational area separate from the normal guest network. This will help in maintaining network security as one network cannot access the other network. Also a separate network is placed for the telephone lines. The wireless access point will be connected up to the VLAN separated for the guests. In this floor as mentioned above there are 18 guest rooms. In each of these rooms there will be placed a network port and a telephone line. Each of the rooms will be networked in the same manner and will use up 18 of the networks ports used in the floor and 18 of the telephone lines that are provided for the floor. These network ports will be connected to the VLAN allocated for the guests in the floors switch and the telephone lines will be connected to their respective VLAN ports. The wireless access point on this floor is places in the center of the floor to allow all the guests to access the internet with any device containing a wireless adapter. This will also be connected to the guest VLAN in the floors switch.

26

The mini restraint and recreational are of floor have each one network port and one telephone line. The network port will be used to maintain their records and inventory and therefore will be in a separate VLAN. This will allow for higher security for the administrative work of the hotel. All telephone networks will be using a VoIP to communicate internally and also with the any outside line via the VoIP server.

27

THIRD FLOOR DIAGRAM


Figure 6 - THIRD FLOOR NETWORK DIAGRAMV

28

7.6 FOURTH FLOOR 7.6.1 FLOOR PLAN


The fourth floor has twenty five bed and the Room Service Department. This floor has a cable duct from which the network cables for the floor are pulled. This floors network utilization will be limited to the occasional use by a guest and the major contributor for network activity will be the restaurant and the recreational area.

7.6.2 NETWORK PLAN


This floor will have 26 network ports, 26 telephone lines and wireless access point. These devices will be connected to two 48 port Layer 2 switches one for the VoIP telephone lines and one for the floors network ports. The floors switch for the network ports will be broken into two VLAN to ensure hotel security. The purpose of breaking the switch in this manner is to make the network traffic coming from the normal guest network and the traffic from the Room Service Department separate. This will help in maintaining network security as one network cannot access the other network. The wireless access point will be connected up to the VLAN separated for the guests in the in the switch used for the network ports. In this floor as mentioned above there are 25 guest rooms. In each of these rooms there will be placed a network port and a telephone line. Each of the rooms will be networked in the same manner and will use up 25 of the networks ports used in the floor and 25 of the telephone lines that are provided for the floor. These network ports will be connected to the VLAN allocated for the guests in the floors switch and the telephone lines will be connected to their respective switch. The wireless access point on this floor is places in the center of the floor to allow all the guests to access the internet with any device containing a wireless adapter. This will also be connected to the guest VLAN in the floors switch for the network ports. The Room Service Department will have one network port and one telephone line. The network port will be used to maintain their records and inventory and therefore
29

will be in a separate VLAN. This will allow for higher security for the administrative work of the hotel. All telephone networks will be using a VoIP to communicate internally and also with the any outside line via the VoIP server.

30

FOURTH FLOOR DIAGRAM


Figure 7 - FOURTH FLOOR NETWOKR DIAGRAM

31

7.7 FIFTH FLOOR 7.7.1 FLOOR PLAN


In this floor there are 18 guest rooms, one House keeping Department and a Laundry is available.

7.7.2 NETWORK PLAN


For each guest room there will be a network port that will allow the guest to access internet through the network and each guest room will be having a telephone to communicate with the reception or name a call to an outside telephone. There will be 2 network computers to the House keeping department to handle their file data and access to the internet. And also there will be 2 telephone connected to this department to call to other departments, reception or to call an outside telephone. There will be 1 network computer to the laundry to handle their file data and access to the internet. And also there will be a telephone connected to this department to call to other departments, reception or to call an outside telephone. There will be a wireless access point also in this floor. This wireless access point is in the center of the floor to get the whole floor covered from the wireless network. From this guests or the staffs can access internet from any device that can access internet wirelessly. For this floor we have put a 48 port layer 2 switches. In this we have divided this in to 3 VLAN. 1st VLAN is to the guest rooms Network ports and wireless access point.2nd VLAN is to the Housekeeping department and Laundry Network computers.3rd VLAN is to the guest room, Housekeeping department and laundry telephones. We divide guest rooms and wireless access point VLAN from Housekeeping department and Laundry VLAN because to keep the department files and data secured. And no one cannot access to the department network.

32

FIFTH FLOOR DIAGRAM


Figure 8 - FIFTH FLOOR NETWORK DIAGRAM

33

7.8 SIXTH FLOOR 7.8.1 FLOOR PLAN


In this floor there are 9 guest rooms, a purchasing department, Engineering department and stores are available.

7.8.2 NETWORK PLAN


For each guest room there will be a network port that will allow the guest to access internet through the network and each guest room will be having a telephone to communicate with the reception or name a call to an outside telephone. There will be 6 network computers to the purchasing department to handle their file data and access to the internet. And also there will be 2 telephone connected to this department to call to other departments, reception or to call an outside telephone. And there will be 4 network computers to the Stores to handle their file data and access to the internet. And also there will be 2 telephone connected to this department to call to other departments, reception or to call an outside telephone. And also there will be 2 network computers to the Engineering department to handle their file data and access to the internet. And also there will be 2 telephone connected to this department to call to other departments, reception or to call an outside telephone. And will be a wireless access point also in this floor. This wireless access point is in the center of the floor to get the whole floor covered from the wireless network. From this guests or the staffs can access internet from any device that can access internet wirelessly. In the lobby area there is no network computer available for the guests or staffs. So only way they can browse internet is through wireless access point. For this floor we have put a 48 port layer 2 switches. In this we have divided this in to 3 VLAN.

34

1st VLAN is to the guest rooms Network ports and wireless access point. 2nd VLAN is to the purchasing department, stores and Engineering department Network computers. 3rd VLAN is to the guest room, purchasing department, stores and Engineering department telephones. We divide guest rooms and wireless access point VLAN from department, stores and Engineering department VLAN because to keep the department files and data secured. And no one cannot access to the department network.

35

SIXTH FLOOR DIAGRAM


Figure 9 - SIXTH FLOOR NETWORK DIAGRAM

36

7.9 SEVENTH FLOOR 7.9.1 FLOOR PLAN


In this floor there are 30 guest rooms are available.

7.9.2 NETWORK PLAN


For each guest room there will be a network port that will allow the guest to access internet through the network and each guest room will be having a telephone to communicate with the reception or name a call to an outside telephone. There will be a wireless access point also in this floor. This wireless access point is in the center of the floor to get the whole floor covered from the wireless network. From this guests or the staffs can access internet from any device that can access internet wirelessly. For this floor we have put two 48 port layer 2 switches. The 1st layer 2 switch is for the guest rooms Network ports and wireless access point. The 2nd layer 2 switch is for the VoIP Telephone. We use 2 switches here because there are 30 computer network ports and 30 telephones so we cannot VLAN one switch in to two. Because our layer 2 switch have only 48 ports. So we need 2 layer 2 switches. One is for the guest rooms and wireless access point and the other one is for the VoIP telephones.

37

SEVENTH FLOOR DIAGRAM


Figure 10 - SEVENTH FLOOR NETWORK DIAGRAM

38

8.0 BACKUP OPTIONS


In a network, backup options are vital since during a network failure or during an unforeseen event the data is destroyed, the backups help in bringing the network back to the previous situation at the time the last backup was taken. In our network, there are two different backup options which are Online backup Backup server

8.1 ONLINE BACKUP


An online backup is where the data is backed up into an online location. And in the event of a disaster, can be easily retrieved by the system administrator and used to revive the network. Online backups are safe and reliable since they are hosted at an unknown location and offsite so any unauthorized personal intending to destroy the data in the network will find it hard to find the backups to destroy them. Another reason why online backups are being used is because its less work for the staff of the hotel. The staff would not need to constantly keep monitoring the backup process as it will be automatically done and be done all the time. Also the backups will be encrypted so that unless the decryption code is known, the backups cannot be accessed. Also the system administrator or the person who has the privileges to access the backups can access it from anywhere in the world with an internet connection if they need to.

8.2 BACKUP SERVER


The backup server is used for onsite backup purposes. The backup server will primarily backup all the data on the servers in the hotel on an hourly basis. Rules have been set in the server so as to delete backup files that are more than a few numbers of days old so that the latest backups are available and old backups are deleted as they are obsolete.
39

8.3 NETWORK HARDWARE FAILURE


In the event of a hardware failure in the network such as a switch or a router or cables, we have suggested that backup devices are kept on standby in the store room of the hotel so they can be used in the event of a need. It is recommended that 2 Layer 2 switches, 2 wireless routers, few meters of cables of the types used be kept and be used during an emergency situation while the faulty device can be repaired and or replaced. This way it is ensured that the network is alive all the time. Also network monitoring software installed in the system administrators computers will indicated as soon as a network device fails so that they can be replaced as soon as possible.

40

9.0 TOPOLOGIES
9.1 TREE TOPOLOGY
The network for Seashell-Reef has been laid using two distinct topologies. The first topology is a tree topology. This topology is a collection of both bus and star topologies. In a tree topology there is a main backbone cable which acts as the trunk of the tree and from this smaller networks go out to form the branches of the this tree topology. A drawback however with the tree topology is that the central backbone cable fails the entire network will fail along with it. Tree topology is illustrated further in the diagram given bellow. We have used the Tree topology to lay the switches going from the main Backbone switch to the separate switches in each floor. The main line runs form the ground floor all the way up to the top floor and in each floor a line is taped from the main line and then taken to the separate smaller sub networks which have been laid in the second topology that we have used which is Star topology. The telephone networks are also placed in the same topological order as the computer networks. There is a main line that goes to all the floors and it is from this main line that all the other branches are taken.

Figure 11 - Tree Topology

41

9.2 STAR TOPOLOGY


The way in which this topology is laid is that where all the computers are connected to one central hub. This method provides great advantages such that if a fault occurs in one area it is easy to identify it and repair the damaged area without disrupting the flow of information to the other networks. A disadvantage however is that if the central hub device fails then the entire network in that branch will fail. The star topology is explained further in the illustration given bellow.

Figure 12 - STAR TOPOLOGY Where the star topology is found in our network is where in each floor the network cables are drawn out from the central switch to the network ports. This is how the star topology has been implemented. This topology is executed in each of the floors with guest bed rooms and also in the VIP centre and the other administrative departments. In each floor the telephone lines also taken in a star topological manner. All the telephone lines are connected to one central switch and get distributed out over the floor from that point. (University of South Florida, n.d.)

42

10.0 FEASIBILITY STUDY


10.1 - TECHNICAL FEASIBILITY
Seashell Reef is a new hotel that is being built up and therefore does not already contain the required hardware to implement a communication network. Therefore the network will have to be laid from the beginning. The technical expertise needed for laying the network will be provided by our company. However after the network has been laid and the hotel is functioning on a daily basis, Seashell Reef will require a small team of trained professionals to maintain and operate the network system. This team can be provided by our company or can be hired from outside and will work under the management at Seashell Reef. The technology required for this network is readily available in the open market and can be purchased at any moment. The hardware that this network requires will be bought from D-Link Corporation.

43

10.2 - OPERATIONAL FEASIBILITY


The new network system that we have developed uses high quality and high end hardware devices that will allow for a faster and more efficient system. The cabling that will be user is Shielded Twisted Pair (STP) cables. This along with the high quality hardware devices will provide for a faster network system. This system will cost a fairly high amount as we shall be using high end products and will be focusing on quality rather than the price of the product. However the products will not be over priced and will not waste any of SeashellReefs monetary resources. In this network system to ensure the highest security for the company we have ensured that the administrative network will not be visible to the guests and they have been kept separate using a virtual Local Area Network (VLAN). This works in the manner that the ports have been internally configured in a way that guests ports cannot see the administrative ports or vice versa, in effect virtually breaking the switch into 2 separate switches. This will allow Seashell-Reef to maintain a very high level of security. This network also has been laid using several switches and a in every floor several ports in each switch have been left free to allow for the network to grow and expand. This way new switch can be added in and the floor will be able to accommodate more network cables.

44

10.3 SCHEDULE FEASIBILITY


The General Manager at Seashell-Reef has given our company a period or one year to complete the laying of the network for the hotel. This time period is more than adequate to complete the task that has been presented to us. Our team feels confident that we can accomplish the task at hand well within the given time duration.

10.4 ECONOMIC FEASIBILITY


For the purpose of laying the network for Seashell-Reef we have finalised that all required hardware products will be purchased from D-Link Corporation. D-Link is and internationally recognised company for its high quality products and services. This makes their products high priced but this is due to their products quality and durability. A list of some of the products that we will be obtaining is given bellow. The prices have been given in US Dollars and have been converted to Sri Lankan Rupees at a rate of 1$ = 110LKR.
Product The DGS-3650 48-port Managed Layer 3 switch DES-3552 xStack 48-port Managed Layer 2 switch DGS-3426P 24-port Managed Layer 2 switch DIR-330 WIRELESS G VPN ROUTER, 4-PORT 10/100 SWITCH Price LKR 342,973/= LKR 109,927/= LKR 102,232/= LKR 12,091/=

The above are the unit prices for several vital products that we would be using in the network for Seashell-Reef. We would be acquiring several of these above mentioned products along with more products also from d-Link Corporation. (NewEgg, n.d.) (D-Link, n.d.) (D-Link, n.d.) (D-Link, n.d.)

45

11.0 SECURITY
One of the main objectives while creating this network is the security. It was requested by the clients that the network should be secured so that their private data is not compromised and any unauthorized access is not allowed into the network. With these aspects in mind we have implemented the following security strategies in the network to make the network safe and secure. Firewall Proxy Server Virtual LAN Password protected Wi-Fi Antivirus Server

11.1 FIREWALL
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. (Webopedia, n.d.) In our network, we have implemented one hardware based firewall. The firewall is placed between the Load Balancer and the Router so that all incoming traffic from any one of the 3 ADSL lines are first filtered from unauthorized access before being allowed to the Router to be allowed into the private network of the hotel.

11.2 PROXY SERVER


A proxy server is being installed in our network so that the outbound traffic is filtered before it leaves the private network of the hotel. A hardware based proxy server is installed in the network whereas all outbound traffic is first routed to the proxy server and then if permitted will be allowed to leave the network. Description of the proxy server is given in the servers section.

46

11.3 VIRTUAL LAN


A network of computers that behave as if they are connected to the same wire even though they may actually be physically located on different segments of a LAN. VLANs are configured through software rather than hardware, which make them extremely flexible. One of the biggest advantages of VLANs is that when a computer is physically moved to another location, it can stay on the same VLAN without any hardware reconfiguration. (Webopedia, n.d.) In our network, we have extensively implemented VLANs so as to reduce the cost involved in having additional hardware. For this purpose, all the switches that we have used throughout the network are Managed Switches so that the ports can be Managed and broken into separate sub networks for VLANs to be created. Advantage of doing this is that one network cannot access the other network although they are in the same switch which makes it easier to separate the staff and the guest networks.

11.4 PASSWORD PROTECTED WI-FI


The hotel consists of 8 different Wireless network access points covering the whole building. Since wireless networks without passwords can be accessed by any one, we have decided to protect the networks using passwords. Any guest connecting to the wireless network of the hotel will have to enter a network key or password to connect to the network. It is also recommended that the password be changed by the system administrators every certain number of days so as to keep the network protected.

11.5 ANTIVIRUS SERVER


The antivirus server is installed for two purposes. One is to provide antivirus options to all the staff used computers in the network. The other is to protect the network from any viruss spreading by monitoring the network and eliminating such viruses so that they dont affect the network. A detailed description of the Antivirus Server is given in the Servers section.

47

12.0 LIMITATIONS
y Although provisions have been made for further upgrades in the future, extensive upgrades will require considerable investment as new equipment will have to be obtained. y Access to the network is available on two levels only. If more user access levels need to be added, the network will have to be reconfigured as a whole. y The staff and guest network are not physically separated in certain instances thereby posing a small security threat. If a very knowledgeable hacker gets into the network, he might be able to access the staff network from the guest network.

48

13.0 CONCLUSION
The task that was presented to us was to create a communication network for Seashell Colombos newest hotel Seashell-Reef. For this network the management of Seashell Colombo have required that the system be of the highest standards and have to be able to provide efficiency, security, speed and reliability. To ensure this our team has conducted extensive research into the products that are available in the market and have selected the most suitable of these products that comply with the requirements that have been specified by the client. Products have all been bought from D-Link Corporation to ensure that the products that are used in the network are fast, reliable and durable. For this we have not compromised on cost when it came to purchasing of the best quality products. Also the entire team performed professionally and contributed their fullest efforts into ensuring that the system was developed to the required standards.

49

BIBLIOGRAPHY
AllInterview.com, n.d. Networking All Other. [Online] Available at: http://www.allinterview.com/showanswers/60080.html [Accessed 21 Aug 2011]. D-Link, n.d. DES-3228PA. [Online] Available at: http://www.dlink.com/products/?pid=644 [Accessed 21 Aug 2011]. D-Link, n.d. DES-3552. [Online] Available at: http://www.dlink.com/products/?pid=800 [Accessed 21 Aug 2011]. D-Link, n.d. DIR-330. [Online] Available at: http://www.dlink.com/products/?pid=564 [Accessed 21 Aug 2011]. Mitchell, B., n.d. access point, wireless. [Online] Available at: http://compnetworking.about.com/cs/wireless/g/bldef_ap.htm [Accessed 21 Aug 2011]. Mitchell, B., n.d. What Is a DNS Server? [Online] Available at: http://compnetworking.about.com/od/dns_domainnamesystem/f/dns_servers.htm [Accessed 21 Aug 2011]. NewEgg, n.d. D-Link DGS-3650. [Online] Available at: http://www.newegg.com/product/product.aspx?Item=N82E16833127344&CMP=AFCC8Junction&nm_mc=AFC-C8Junction&cm_mmc=AFC-C8Junction-_-na-_-na-_na&AID=10440897&PID=1796839&SID=10204226 [Accessed 21 Aug 2011]. PC-Help, n.d. What is a firewall? [Online] Available at: http://www.pchelp.org/www.nwinternet.com/pchelp/security/firewalls.htm#proxy [Accessed 21 Aug 2011]. SearchNetworking, n.d. file server. [Online] Available at: http://searchnetworking.techtarget.com/definition/file-server [Accessed 21 Aug 2011]. Tuning 2.0, n.d. ADSL Technology for Faster Internet Speeds. [Online] Available at: http://www.tuning.co.in/adsl-technology-for-faster-internet-speeds/ [Accessed 21 Aug 2011]. University Information Technology Services, n.d. Indian University - University Information Technology Services. [Online] Available at: http://kb.iu.edu/data/adov.html [Accessed 21 Aug 2011]. University of South Florida, n.d. What is a Topology? [Online] Available at: http://fcit.usf.edu/network/chap5/chap5.htm [Accessed 21 Aug 2001]. Webopedia, n.d. 802.11. [Online] Available at: http://www.webopedia.com/TERM/8/802_11.html [Accessed 21 Aug 2011].

50

Webopedia, n.d. ADSL. [Online] Available at: http://www.webopedia.com/TERM/A/ADSL.html [Accessed 21 Aug 2011]. Webopedia, n.d. database server. [Online] Available at: http://www.webopedia.com/TERM/D/database_server.html [Accessed 21 Aug 2011]. Webopedia, n.d. firewall. [Online] Available at: http://www.webopedia.com/TERM/F/firewall.html [Accessed 21 Aug 2011]. Webopedia, n.d. firewall. [Online] Available at: http://www.webopedia.com/TERM/F/firewall.html [Accessed 21 Aug 2011]. Webopedia, n.d. proxy server. [Online] Available at: http://www.webopedia.com/TERM/P/proxy_server.html [Accessed 21 Aug 2011]. Webopedia, n.d. VLAN. [Online] Available at: http://www.webopedia.com/TERM/V/VLAN.html [Accessed 21 Aug 2011]. WhatIsMyIPAddress, n.d. What is IPv6? [Online] Available at: http://whatismyipaddress.com/sip [Accessed 21 Aug 2011].

51

MEETING MINUTES
1st MEETING
Meeting/Project Name: Meeting 1 Date of Meeting: 05th July 2011 Time: 03.30 pm Minutes Prepared By: Deshan Ilangakoon Location: APIIT Cafeteria 1. Meeting Objective To identify the requirement that has been specified by the client and assign initial work 2. Attendance at Meeting Present Absent Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Dilshan Zuhdi (CB004150) 3. Agenda and Notes, Decisions, Issues Topic Identify the problem that was presented to us and try to find suitable solution for prevailing problem. Handling the meeting minutes and the Gantt chart 4. Action Items Action Create Gantt chart Initial research Owner Deshan Ilangakoon Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi Due Date 07/07/2011 10/70/2011

Owner Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi Deshan Ilangakoon

Time 03.30pm 04.00pm

5. Next Meeting (if applicable) Date: 11/07/2011 Time: 03.30pm Objective: Planning requirement specification

Location:

APIIT Cafeteria

. Group Leader

. Lecturer

52

2nd MEETING
Meeting/Project Name: Meeting 2 Date of Meeting: 11th of July 2011 Minutes Prepared By: Deshan Ilangakoon 1. Meeting Objective Allocate task of requirement gathering 2. Attendance at Meeting Present Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Dilshan Zuhdi (CB004150) 3. Agenda and Notes, Decisions, Issues Topic All group members were assigned the task of gathering information for the planned solution Time: Location: 03.30 pm APIIT Cafeteria

Absent

Owner Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi

Time 03.30 pm

4. Action Items Action Find information regarding the requirements for the network to be designed. Owner Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi Due Date 15/07/2011

5. Next Meeting (if applicable) Date: 18/07/2011 Time: Objective: Start Research

05.00pm

Location:

APIIT Cafeteria

. Group Leader

. Lecturer

53

3rd MEETING
Meeting/Project Name: Meeting 3 Date of Meeting: 18th July 2011 Minutes Prepared By: Deshan Ilangakoon 1. Meeting Objective Start work on research 2. Attendance at Meeting Present Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Dilshan Zuhdi (CB004150) 3. Agenda and Notes, Decisions, Issues Topic Each member was to carry out research on a specific hardware that would be used in the network that was to be laid. Check on work allocated during previous meeting 4. Action Items Action Hardware research Owner Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi Due Date 15/07/2011 Time: Location: 05.00 pm APIIT Cafeteria

Absent

Owner Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi Ahamed Nishadh

Time 05.00 pm 05.15 pm

5. Next Meeting (if applicable) Date: 26/07/2011 Time: Objective: Network panning

03.30 pm

Location:

APIIT Cafeteria

. Group Leader

. Lecturer

54

4th MEETING
Meeting/Project Name: Meeting 4 Date of Meeting: 26th July 2011 Minutes Prepared By: Deshan Ilangakoon 1. Meeting Objective Start work on network plan 2. Attendance at Meeting Present Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Dilshan Zuhdi (CB004150) 3. Agenda and Notes, Decisions, Issues Topic Designing floor plan and network diagram for company. Check on work allocated during previous meeting. 4. Action Items Action Develop the floor plan and network diagram. Owner Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi Due Date 08/08/2011 Time: Location: 03.30 pm APIIT Cafeteria

Absent

Owner Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi Ahamed Nishadh

Time 03.30 pm 03.45 pm

5. Next Meeting (if applicable) Date: 08/08/2011 Time: 03.30 pm Objective: Start on documentation

Location:

APIIT Cafeteria

. Group Leader

. Lecturer

55

5th MEETING
Meeting/Project Name: Meeting 5 Date of Meeting: 08th August 2011 Minutes Prepared By: Deshan Ilangakoon 1. Meeting Objective Start documentation 2. Attendance at Meeting Present Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Dilshan Zuhdi (CB004150) 3. Agenda and Notes, Decisions, Issues Topic Start making the documentation for the final project document. Check on work allocated during previous meeting. 4. Action Items Action Documentation Owner Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi Due Date 17/08/2011 Time: Location: 03.30 pm APIIT Cafeteria

Absent

Owner Ahamed Nishadh Deshan Ilangakoon Dilshan Zuhdi Ahamed Nishadh

Time 03.30 pm 03.45 pm

5. Next Meeting (if applicable) Date: 18/08/2011 Time: Objective: Compiling document

05.00 pm

Location:

APIIT Cafeteria

. Group Leader

. Lecturer

56

6th MEETING
Meeting/Project Name: Meeting 6 Date of Meeting: 18th August 2011 Minutes Prepared By: Deshan Ilangakoon 1. Meeting Objective Compiling the document 2. Attendance at Meeting Present Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Dilshan Zuhdi (CB004150) 3. Agenda and Notes, Decisions, Issues Topic All documentation done so far was handed over so that it could be compiled and added into a single document with the proper formatting. Check on work allocated during previous meeting. 4. Action Items Action Compiling document Owner Ahamed Nishadh Due Date 21/08/2011 Time: Location: 05.00 pm APIIT Cafeteria

Absent

Owner Ahamed Nishadh

Time 05.00 pm

Ahamed Nishadh

05.15 pm

5. Next Meeting (if applicable) Date: 21/08/2011 Time:

10.00 am

Location:

Ahamed Nishadhs Residence

Objective:

Close of project meeting

. Group Leader

. Lecturer

57

7TH MEETING
Meeting/Project Name: Date of Meeting: Minutes Prepared By: 1. Meeting Objective Close of project meeting 2. Attendance at Meeting Present Ahamed Nishadh (CB004081) Deshan Ilangakoon (CB004041) Dilshan Zuhdi (CB004150) 3. Agenda and Notes, Decisions, Issues Topic Thanking all members for the hard work done and for completing the required work on time. Meeting 6 21st August 2011 Deshan Ilangakoon Time: Location: 10.00 am Ahamed Nishadhs Residence

Absent

Owner Ahamed Nishadh

Time 10.00

4. Action Items Action Owner Due Date

5. Next Meeting (if applicable) Date: Time: Objective:

Location:

. Group Leader

. Lecturer

58

Você também pode gostar