Отчет по практике в Netvalue Limited Company

Автор работы: Пользователь скрыл имя, 13 Февраля 2013 в 22:31, отчет по практике

Краткое описание

Netvalue Limited Company requested to SNC (Systematic Network Consultant) Team to create a proposal about the new design of LAN and WAN for their company. It consists of three parts. First part gives recommendation about LAN & WAN design, transmission medium, and protocols. Comparison of programming languages can be found in second part. This part also includes information about programming language translator software for the selected language. Last part consists of suggestions about multimedia hardware.

Содержание

1. Abstract 3
2. Gantt chart 4
3. Introduction 5
3.1 Company Background 6
3.2 Comapany Requests 6
3.3 Assumptions 7
3.4 Problem Identification 8
3.5 Solution 8
4. Network Design 9
4.1 LAN Design 9
4.1.1 Logical Design 9
4.1.2 Physical Design 10
4.1.3 Introduction of the LAN design 10
4.1.4 Network topology comparison 11
4.1.5 FDDI Backbone 12
4.2 Floors and Departments network Design 14
4.2.1 Server Room 14
4.2.2 First floor: Customer Service Department network 15
4.2.3 Second Floor: Marketing Department network 17
4.2.4 Third Floor: Human Resource Department 19
4.2.5 Fourth floor: Accounting Department & IT Department 20
4.3 WAN Design 22
4.3.1 Introduction of WAN design 22
4.4 Internet Technology 23
4.4.1 Integrated Services Digital Network 23
4.4.2 Frame relay 24
4.4.3 X.25 24
4.5 Evaluation and critical analysis for choosing ISDN link 25
4.6 Suitable Protocols 27
4.6.1 Internet Message Access Protocol (IMAP) 27
4.6.2 File Transfer Protocol (FTP) 27
4.6.3 Post Office Protocol 3 (POP3) 27
4.6.4 SSH (or Secure SHell) 28
4.6.5 Hyper Text Transfer Protocol (HTTP) 28
5. Security 29
5.1 Justification and critical analysis of using (VPNs) 29
6. Computer language 30
6.1 Comparison between Java, C++ and Visual Basic 30
6.2 Operation of java compiler 31
7. Conclusion 34
8. Minutes of the Meeting 34
9. Reference 36
10. Slides 38

Вложенные файлы: 1 файл

HSSN2 100%.docx

— 913.93 Кб (Скачать файл)

Figure 11

4.3.1 Introduction of WAN design

This new WAN design is formed in a star topology shape and used ISDN as network technology. Each of the branches and headquarter will be connected with circuit switching - crossbar switch through the router.

 

4.4 Internet Technology

      Today's companies and organizations are distributed and the ability to communicate and share information is very crucial and has direct impact on company's product and service. In order to have an effective real time communication, our team will establish a new network in the main building itself and among the main building and the five branches of Netvalue Company.

      The new network supposed to increase the quality of services in Netvalue Company and improve the daily operations such as send and receive reports, obtaining financial statements and secure. To design 24/7 available and secure network and as IT consultants our team decided to set up a link.

     Our team made a comparison among ISDN link, frame relay link, and X.25 link and from the comparison between them our team will decide which link is the most suitable for Netvalue Company.

4.4.1 Integrated Services Digital Network

   

      ISDN is a type of on demand circuit switched connection. ISDN is an end to end switched digital network. ISDN is typically deployed to provide remote access for small office or home office. ISDN providing data, voice, video, text, graphics, audio, and other source material to be transmitted over existing telephone wires. Not only is ISDN much faster than a standard analog telephone connection, but also its multiple channels allowing user to use several devices (such as a telephone, computer, and fax) simultaneously on the same line. (Cisco, 2005; Indiana University, 2009)

    ISDN is more efficient and economical. That is mean; ISDN brings increased capabilities, reduced costs and improved productivity to organizations both large and small. (Southwestern Bell Internet Service, 2005). Besides that, ISDN has fast access to information, and this feature will makes the connection among the headquarters and branches faster and that will save time. (Becker, R,2006)




4.4.2 Frame relay

    

     Frame relay is a technique used to transport data from locations to location, just like ISDN connections do. In frame relay, there are several locations on the network that can send and receive data. These connections are known as Ports. Each location that needs access to the frame system needs to have one of these ports. (Jonker N, n. d)

Frame relay is not suitable for sending sensitive data. (scribd.com, n. d)

     Moreover, Frame Relay is slow down to network congestion and difficulty ensuring quality of service, because all of a provider's Frame Relay customers use a common network there can be times when data transmission exceeds network capacity (Horton, D, WAN Design with Frame Relay)


4.4.3 X.25

 

      “X.25 is an International Telecommunication Union-Telecommunication

Standardization Sector (ITU-T) protocol standard for WAN communications that defines how connections between user devices and network devices are established and maintained.”  (cisco.com, n. d)

      X.25 is an older technology and it is not efficient. On the other hand, X.25 provides limited use connections (x.25 has low throughput, generally 64 kbps, and it has long and variable delays) and become very slow.

 (Telecommunications essentials,2002; integritycomputing.com, n. d)


 

 

4.5 Evaluation and critical analysis for choosing ISDN link

     As IT consultants our team decided ISDN will be the main connection link in Netvalue Company and it will be activated and connected inside headquarters (LAN) and from headquarters to branches and reverse (WAN), because it is the suitable link for Netvalue Company as it showed in the following.

     ISDN is economical and its cost is inexpensive. On the other side, ISDN is the high-speed (download and upload speed 128 kbps) (Gall R, unknown year) access technology of choice for home users to large businesses as Netvalue Company compared by x.25, because x.25 can be very slow (anotherurl.com, unknown year), and it provides generally 64 kbps. (integritycomputing.com, unknown year)

    Furthermore, ISDN has fast access to information, and this feature will makes the connection among the headquarters and branches faster and that will save time. Besides that, ISDN's multiple channels allowing user to gain access and  surf the internet and use several devices like a telephone (make and receive), computer, and fax (transmit/receive) and all these things at the same time and this will save time for users of Netvalue Company  (customers, admin, staff, and others).

 

     The following table is showing that why our team has chosen ISDN as a main connection link to use in Netvalue Company rather than other links such as Frame Relay, and X.25.

 

ISDN and Frame Relay

ISDN and  X.25

 

- ISDN is proven high quality and reliable service which is available in almost every part, while frame relay is not available in all geographic regions. (cisco.com, n. d; ibm.com, n. d)

 

- Frame relay is not suitable for sending sensitive data and ISDN's cost less than Frame Relay's cost. (scribd.com, n. d)

 

- Frame Relay is slow down to network congestion and difficulty ensuring quality of service comparing to ISDN, because all of a provider's Frame Relay customers use a common network there can be times when data transmission exceeds network capacity (Horton, D, WAN Design with Frame Relay)

 

- X.25 is an older technology and it is not efficient. (anotherurl.com, n. d)

 

 

 

 

- X.25 has limited use connections, and it is provide generally 64 kbps and it is very slow, while ISDN provide 128 kbps

(integritycomputing.com, n. d; Gall R, n. d)


 

 

4.6 Suitable Protocols

      There are exactly dozens of TCP/IP protocols and standards, but only few are commonly used by the systems on a TCP/IP network. As IT consultants, our team will choose only five suitable protocols to apply them in LAN and WAN connections.

4.6.1 Internet Message Access Protocol (IMAP)

 

     IMAP is a protocol which allows the user to access electronic mail messages that are kept on a mail server and it is more common in business environments. (vlaurie.com, unknown year) IMAP has the ability to access messages (mailboxes) from more than one computer. In other words, it permits the user to access remote message stores as if it was local. IMAP protocol includes operations for creating, deleting, renaming mailboxes checking for new messages, and searching. (IMAP Protocol, 2007)


 

4.6.2 File Transfer Protocol (FTP)

 

     FTP was one of the first Internet protocols. FTP is commonly used to transfer Web page files from their creator to the computer that acts as their server for everyone on the Internet. It's also commonly used to download and upload programs and other files to user computer from other servers.  And by using FTP, users can also update (delete, rename, move, and copy) files at a server. (techtarget.com, n. d; vlaurie.com, n. d)


4.6.3 Post Office Protocol 3 (POP3)

 

      The Post Office Protocol 3 is a standard protocol for retrieving e-mail. The POP3 protocol controls the connection between a POP3 e-mail user and a server where e-mail is stored. The "3" means it is the latest and the third revision of the standard. (Microsoft.com, 2005; tech-faq.com, n. d) The POP3 protocol has three processes for handling the connection between the mail server and the POP3 e-mail client/user and they are authentication, transaction, and update. (Microsoft.com, 2005)




 

 4.6.4 SSH (or Secure SHell)

 

      SSH is a protocol for remote login in a secure environment. SSH is a standard protocol for creating a secure connection between two systems. SSH is to establish an encrypted connection so that nobody in between can read the traffic, especially for sensitive items such as passwords. (redhat.com, n. d; ehow.com, n. d)


 

4.6.5 Hyper Text Transfer Protocol (HTTP)

 

     The aim of HTTP protocol is to allow exchange and transfer of files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web in HTML format between a browser (the client) and a Web server. HTTP is called as a stateless protocol because each command is request is executed independently, without any knowledge of the requests that were executed before it.

(roseindia.net, n. d; techtarget.com; n. d)


 

 

  1. Security

     In security case our team proposed to use VPN method for connecting LAN and WAN networks that use internet

       A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large or small corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network. (whatismyipaddress.com, n. d)

     A VPN can connect multiple sites over a large distance just like a Wide Area Network (WAN). VPNs are often used to extend intranets worldwide to disseminate information and news to a wide user base. Organizations use VPNs to connect their branches that can be distributed across the country or around the world. (whatismyipaddress.com, n. d)


5.1 Justification and critical analysis of using (VPNs)

     As IT consultation our team has decided to use VPNs as a security method in LAN and WAN networks for several reasons that showed in the following table.

-  VPN helps to protect data outside of local network as if it was still within that network, unlike firewall which helps to protect data inside of a local network. Besides that, VPN provides low cost, and high income on investment and this will be good for Netvalue Company to invest its money properly. While, firewall can be expensive for small and large businesses to purchase and maintain.VPN also, provides the chances of sharing secure data among multiple branches of the same company. (wirelesstek.com, 2003; referenceforbusiness.com, n. d)

-  VPN gives extremely secure connections between private networks linked through the Internet. Furthermore, VPN allows remote computers to act as though they were on the same secure, local network. Also, if user has VPN client software on his/her PC or laptop, VPN allows user to access company's computers from anywhere in the world in the same way as if the user was sitting at work. (netgear.com, 2009)


 

  1. Computer language

6.1 Comparison between Java, C++ and Visual Basic

The Netvalue is a supplier of business equipment and office supplies in South East Asia. It has own software to perform all the business transactions and activities. Current software is outdated and cannot satisfy growing needs of company. Old software was programmed using COBOL and FORTRAN. The Netvalue Company decided to change the programming language for developing custom software. They want to choose one language between C++, Java, and VB.Net.

As a consultant company we were asked to compare and select one programming language for their needs. To choose proper programming language it is important to identify for what purposes the software will be used. There is central office which has central server where all data is stored. Data should be transferred from other branches to central office, so future software needs networking capabilities. Also software should have good graphical user interface. It should be secure, robust, and portable. To choose best language which suites all the requirements consultants performed some research, results of which are combined in the table below.

Features

Java

C++

VB.Net

Paradigm

Object-oriented

Procedural,  Object-oriented

Component-oriented, event-driven

Design aims

Network computing, Web

Systems programming

Applications, Web

Operating System

Cross-platform

Cross-platform

Microsoft Windows

Memory management

Garbage collector

Manual

Garbage collector

IDE

Netbeans, Eclipse

Netbeans, Visual Studio

Visual studio


Figure 12

As mentioned before software will need to work over the network. Java is the first programming language designed from the ground up with networking in mind. As the global Internet continues to grow, Java is uniquely suited to build the next generation of network applications (Harold, 2000). Also software will have both server and client side. Usually client side OS is Windows and server side is UNIX based OS. Java is platform independent when VB.Net runs only on Windows. Furthermore, Java has a lot of free IDE’s. For VB.Net company will need to buy Visual Studio license which costs from 11 899 USD and renew from 3 799 USD. Moreover, sandbox model of Java Virtual Machine provides good level of security and stability. According to all these Java can be advised as the best programming language for the development of the custom software which meets all the requirements of Netvalue Company.

6.2 Operation of java compiler

High-level programming languages are designed to be ease for people to write and understand. However, computer hardware does not understand these languages. The translation of program code from a high-level language to machine language is done by a program called compiler.

The Java compiler translates program into a language called Byte code. Byte code is the machine language for a hypothetical computer called the Java Virtual Machine. The JVM is not exactly like any particular computer, but it is very similar to all typical computers. Thus, it is very easy to translate from a program written in byte code to a program in the machine language for a particular computer. The program that does this translation is called interpreter (Saritch, 1999).

 

   

A Java compiler converts the java source code into a binary program consisting of byte code. Byte code is a highly optimized set of instructions designed to be executed by the Java runtime system, which is called JVM.


Figure 13

 

 

Figure 14 

  1. Conclusion

The owners of Netvalue have decided to reinvest substantial sum of money in the company. Our IT Company was asked to provide some recommendations about LAN & WAN design, choose proper programming language for their custom software and advice some multimedia hardware to increase the efficiency of the business.

This report is the result of this work. It has detailed information about how Netvalue can improve their current system. Netvalue can become more competitive, increase number of customer and provide better service by implementing all the recommendations.

In conclusion, the Information technology has become important part of today’s business. And companies which properly use these systems can have a big handicap comparing to others. IT systems can help to easily perform all the business activities and provide the best service for customers. 

  1. Minutes of the Meeting

1st Meeting

Date: 3 August 2010

Time: 11.00 - 11.30

Place: ENT 2-6

Purpose of meeting: Discuss the assignment; divide parts of assignment to collect information.

 

2nd Meeting

Date: 10 August 2010

Time: 11.00 – 11.30

Place: ENT 2-6

Purpose of meeting: Discuss the collected information; divide the assignment into a parts.

 

3rd Meeting

Date: 17 August 2010

Time: 11.00 – 11.30

Place: ENT 2-6

Purpose of meeting: Discuss about technologies applied in the assignment. Check the progress of each group member.

 

4th Meeting

Date: 24 August 2010

Time: 11.00 – 11.30

Place: ENT 2-6

Purpose of meeting: Check the progress of each group member.

 

5th Meeting

Date: 7 September 2010

Time: 11.00 – 12.00

Place: ENT 2-6

Purpose of meeting: Review all parts of the assignment and make the final changes.

 

 

  1. Reference

Website:

    1. Unknown author, unknown year, File Transfer Protocol [online], Available from  http://searchenterprisewan.techtarget.com/definition/File-Transfer-Protocol [Accessed 10 August 2010]
    2. Unknown author, unknown year, File Transfer Protocol [online], Available from http://vlaurie.com/computers2/Articles/protocol.htm [Accessed 27 August 2010]
    3. Oppenheimer P, unknown year, File Transfer Protocol [online], Available from http://www.troubleshootingnetworks.com/ftpinfo.html [Accessed 13 August 2010]
    4. Unknown author, 2005, PoP3[online], Available from http://technet.microsoft.com/en-us/library/cc728365%28WS.10%29.aspx [Accessed 27 August 2010]
    5. Unknown author, unknown year, HTTP Protocol [online], Available from http://www.roseindia.net/jsp/jspsession/HttpProtocol.shtml [Accessed 20 August 2010]
    6. Unknown author, unknown year, HTTP Protocol [online], Available from http://en.kioskea.net/contents/internet/http.php3 [Accessed 23 August 2010]
    7. Unknown author, unknown year, HTTP Protocol [online], Available from http://searchwindevelopment.techtarget.com/sDefinition/0,,sid8_gci214004,00.html [Accessed 29 August 2010]
    8. Unknown author, unknown year, SSH Protocol [online], Available from http://www.redhat.com/docs/manuals/linux/RHL-7.3-Manual/ref-guide/ch-ssh.html [Accessed 18 August 2010]
    9. Wu J, unknown year, SSH Protocol [online], Available from  http://www.ehow.com/about_5037512_ssh-protocol.html [Accessed 27 August 2010]
    10. Unknown author, 2005, what is ISDN? [Online], Indian University, Available from  http://kb.iu.edu/data/ahpq.html [Accessed 30 August 2010]
    11. Unknown author, unknown year, ISDN overview [Online], Cisco, Available from http://www.cisco.com/en/US/docs/internetworking/technology/handbook/ISDN.html [Accessed 31 August 2010]
    12. Becker, R, 2006, Advantages of ISDN [online], Available from http://www.ralphb.net/ISDN/advs.html [Accessed 3 September 2010]
    13. Jonker N, unknown year, Cisco frame relay solutions guide [online], Available from http://books.google.com.my/books?id=GPuhnmjxLuQC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false [Accessed 13 September 2010]
    14. Unknown author, unknown year, Frame Relay [Online], Cisco, Available from http://www.scribd.com/doc/28124348/Frame-Relay [Accessed  15 September 2010]
    15. Horton, D, unknown year, WAN Design with Frame Relay[online], Available from http://www.happy-monkey.net/papers/frame-relay-paper.pdf [Accessed 11 September 2010]
    16. Unknown author, unknown year, X.25 [Online], Available from  https://www.cisco.com/en/US/docs/internetworking/technology/handbook/X25.html [Accessed 17 September 2010]
    17. Goleniewski,L, 2002, Telecommunications essentials, [Online], Available from http://books.google.com.my/books?id=BO5D2zVtMKUC&lpg=PP1&dq=Telecommunications%20essentials&pg=PR9#v=onepage&q&f=false [Accessed 16 September 2010]
    18. Unknown author, unknown year,X.25 disadvantages  [online], Available from http://www.integritycomputing.com/ppt7/sld004.htm [Accessed 15 September 2010]
    19. Gall, R, unknown year, Internet access via ISDN [online], Available from http://www.fim.uni-linz.ac.at/research/telework/seminar/T2/isdn.html [Accessed 3 September 2010]
    20. Unknown author, unknown year, Advantages of using ISDN [online], Available from http://publib.boulder.ibm.com/iseries/v5r1/ic2924/index.htm?info/rzaim/rzaimadvantagesofusingisdn.htm [Accessed 14 September 2010]
    21. Unknown author, unknown year, what is VPN[online], Available from http://whatismyipaddress.com/vpn [Accessed 16 September 2010]
    22. Unknown author, 2009, VPN[online], Available from http://kb.netgear.com/app/answers/detail/a_id/1128 [Accessed 19 September 2010]
    23. Unknown author, unknown year,  VPN security [online], Available from http://www.wirelesstek.com/VPN-Security.htm [Accessed 19 September 2010]
    24. Unknown author, unknown year,  disadvantages of firewall [online], Available from http://www.referenceforbusiness.com/small/Eq-Inc/Firewalls.html [Accessed 17 September 2010]

Информация о работе Отчет по практике в Netvalue Limited Company