You are on page 1of 13

22

PREPARED BY:
MICHAEL K. ASARE
(SYSTEM ENGNEERING)
Acknowledgment

My profound gratitude goes to the Almighty God for his guidance and strength for me to be
able to do this project. Also to my lovely Wife for his encouragement, to my lecturer Mr
Aziz, to Mr Francis and to all my course mate for their support. Also to the IPMC College and
the entire teaching staff, the administration staff and all workers at IPMC.
Thank you, and May God bless you all.
























Dedication

I dedicate this project work to the Almighty God, my lovely wife and son, to Mr Aziz
and to all my course mate.


























Declaration

I hereby declare that, this project work that I submit to the IPMC College was done
by me under the supervision of My Lecturer Mr. Aziz
Thank you
Michael K. Asare Date 22
nd
October 2013.























TABLE OF CONTENT

Chapter 1 Introduction

Chapter 2 Wired network media (cabled)
Recommendation
Security
Speed
Cost

Chapter 3. Network hardware needed for installation
Advantages and Disadvantages
Switches
Router
NIC (Network interface card)
Protocols used
DHCP, DNS, NTP, SIP, SMTP and TLS
Recommendation

Chapter 4 Commonly known security
Environments with children and the public
Protection from virus
Recommendations

Chapter 5 Testing plan








CHAPTER 1
Introduction:

The aim of this project is to provide a different way of establishing a library aside the normal
book stock. This project provides how computer network can be used to develop a public
library. And also as a teaching guide for up and coming network student.
.



































CHAPTER 2
Wired network media (cabled)

A. The most commonly used network media options in the country for a single building
is the wired media. (Cabled).
The cable used for this type of network is the cat5e UTP.
B. The connectors for the network installation are RJ45.
C. The cost of the cat5e UTP cable is =GH 720.00
D. The cost of the packet of the RJ45 connectors is =GH 150.00
E. The required data transfer rate will be 3.5mbps.

The recommendation of this network are as fellow,
1. The wired media should be opt for this type of network.
2. RJ45 connectors are used in addition of the cat5e UTP cable.

Security:
Wired network requires you to actually take your computer into the network and to access
it that way. Unlike the wireless network which are fairly easy for someone to intrude into or
to steal bandwidth.

Speed rate:
wired networks tends to be faster than wireless ,While you have to be physically wired into
a network, the cables can transmit signals much faster than the radio waves that wireless
use. (www.ehow.com/list 667724 wired net)








CHAPTER 3
Network hardware needed for installation

. The hardware needed for the network installations are;
1. Computers, modem /NIC.
2. Switches
3. Bridges
4. Cables (Ethernet UTP cable cat5e)
5. Routers, connector (RJ45), Wall jacks.
6. Servers , Network OS ( xp, servers)
7. Network services (DHCP , DNS , EMAIL) ,content delivery service
8. Printers
VITAL OF UTP CABLE CAT5E (UNSHIELDED TWISTED PAIR CABLE)
1. It is inexpensive
2. It is also easy to Install

CHALLENGES OF UTP CABLE CAT5E
1. They are susceptible to radio frequency interference and electromagnetic
interference (RFI, EMI). One of them is
2. More prone to electronic noise and interference than other forms of cable.
www.ehow .com/list 6876095.

SWITCHES; advantages
1. Multi-ported bridges.
2. Increase network performance
3. Used for bandwidth intensive applications.
4. Smaller collision domains.

Disadvantages;
1. Difficult to trace connectivity problems.
2. Does not filter broadcast traffic
3. More expensive


Routers;
1. Select the best path to route a message, based on the destination address and
origin.
2. Segment large network like bridges but more intelligent.

Advantages;
1. Typically connects LAN to WAN of different network paths.
2. Only work with routable protocols.
3. Routing table update consumes bandwidth.
4. NIC (network interface card); Provides the physical, electrical electronic connections
to the network media.

5. It is installed in computers to connect, or interface, computers to the network.

Disadvantages;
Lower speed, NIC offers a slower network delivery.

PROTOCOLS USED
DHCP - The dynamic configuration protocol is used for assigning dynamic IP address to
devices on a network. DHCP simplifies network administration by keeping tracks of IP
addresses in a database rather than an administrator having to manage and assign them
manually. It uses UDP ports 67 and 68.

DNS - The domain naming system is a standard name service that allows computers to
register and resolve domain names. It uses TCP port 53 for zone transfers and UDP port 53
for lookups.

NTP - The Network Time Protocol is used to provide accurate time synchronization by
synchronizing the time of a computer to reference time source, such as an NTP server, a
radio or a satellite receiver. It is capable of synchronizing distributed clocks to the
millisecond. NTP use UDP port 123.

SIP - The session initiation protocol can be establish, modify and terminate multimedia
sessions or calls. E.g. distance learning, internet telephone.

SMTP - Simple mail transfer protocol is used for sending emails to and between email
servers. It uses TCP ports 25.
TLS - Transport layer security is a protocol for establishing a secure connection between a
client and a server. It is capable on authenticating connection between the two.

Recommendation:
I recommend that you should use the following:
Computers =16, router (Cisco) =1, printer 1, switch (24 ports) =1, RJ45 connectors 2 boxes.






















CHAPTER 4
Commonly known security

Commonly known security issues relating to a library includes
1. Data integrity
2. Level of access to data or equipment and monitoring types of access.
3. Physical security plans.
4. Specific policies dealing with information privacy, equipment security and
computer security procedure.

With environment with children and the public.
1. Physical risk of theft or damage.
2. Possible misuses to library base computers.
3. Infections of malware, viruses and malicious.
4. Protection from viruses and Trojan horses.
5. Infections of viruses, alwares, Trojan horses and other malicious programs to the
computers and files as well as the systems.


RECOMMENDATIONS.
1. Ensure that people with access to potentially sensitive data or systems are known,
and that their access level will periodically be reviewed.
2. Specify a policy for the collection of data and possible misuses.
3. Make sure all computer softwares are refreshed from a LAN server at every reboot.
4. Configure automatic notification (e.g. a page message to the network administrator
in case of a network outage or serious break in attempt.
5. Via firewall, separate machines that are intended to be internet accessible from
those that are not.
6. Due to the availability of internet connection, collect logging data from the firewall
or router machines. And regularly examine the logs.
7. Install antivirus on each machine and ensure they are updated regularly to protect
the computers from viruses, malware and infections.
8. Configure the system for permissions and user verifications and authentications
(e.g.) user account and administrator policies.


CHAPTER 5
Testing plan

1. Test all devices to see that they are all working correctly as in physically
powering them on for specific period of time.
2. Test for compatibility issues.
3. Examine and test all programs to see if they are functioning correctly.
Use the various network devices such as cable testers/certifies, multi-meter, protocol
analyzer. TDR: Time domain reflectometer, Bandwidth shaper to test all the devices to get
the desired results and performance/functionality.

You might also like