Вы находитесь на странице: 1из 29

INTRODUCTION

Computers were originally developed for individual use only. Todays


IT industry has a great impact due to continue significance. Every day
more and more applications are being developed to provide a better, more
secure and fast communication medium over Internet technology also for
industrial users. The importance of sharing data forced manufacturers to
create techniques for connecting computers and this was the beginning of
computer networks.
In the world of computers, Networking is the practice of linking two
or more computing devices together for the purpose of sharing data and
resources. Networks are built with a mix of computer hardware and
computer software. Computer networks are built primarily from generalpurpose programmable hardware. It is able to carry many different types
of data, and they support a wide and ever growing range of applications.

The Internet, which may have millions of computers connected to it,


is also a network. The Internet revolution has diverted human thoughts
towards a new horizon of an extreme development. The last several years
have

shown

surge

in

the

popularity

of

high

speed

Internet

communication that has raised the growth of Internet users. According to


a survey 1.463 billion people are using the Internet services all
around the world in 2008, June 30th.
Soon the importance of networks was realized and the networking
field has become a core component for any company. All of the businesses
rely on the networking industry, due its vastness and significance. Every

day companies are planning and thinking to develop better strategies that
can offer efficient and reliable communication solutions between their
employees and customers for maximum revenue. The planning of a
companys network requires a lot of resources and aspects to study, and
to evaluate them carefully to build a comprehensive secure and reliable
platform. It is the job of a network administrator to take care of the
companys network infrastructure and upgrade or update the required
components and applications from time-to-time that can follow new
standards.
This case study is a practical work aimed to evaluate a company
network infrastructure in its real environment. The purpose of this study is
to evaluate different aspects of the network infrastructure used and give
recommendations to make their performance better and to offer more
advanced strategies. This study will also provide an inclusive observation
of the companys needs and their network infrastructure, and will provide
a concept how to evaluate and fix small mistakes, the kind of problems
that can occur in an evolving company network. Lastly, this research will
make recommendations and suggest a possible implementation on the
studied network infrastructure.

BACKGROUND OF THE STUDY


This section of the study presents readers with the following
information: (1) an overview of how this Case Study was designed and

undertaken; (2) an overview of the interviewee-released accounts


recorded through interviews in the computer shop selected.
Readers are asked to keep in mind that while this component of the study
records a depth of network setup, topologies and structures knowledge of
DOS Internet Workx. The researcher has made every effort to accurately
relay the informations, thoughts and studies of the people who shared
their personal knowledge in this study.
DOS Internet Workx is an internet shop located along Quirino
Highway, Foresthills Subdivision, Novaliches, Quezon City. It has started on
October 2004 with only 20 computers. The first branch was located in
mindanao avenue. After 2 years, they have extended their branches in
different locations here in manila. Currently they have 16 branches but
only two were owned by the owner and the rest were being franchised.
The main owner is not mentioned because of its confidentiality.
DOS Internet Workx was established and renders services such as
net surfing, gaming, chatting, data transfer, printing related services
(photos, calling cards, invitations and etc.), scanning, cell phone loading
services, computer maintenance, selling computer parts, and other.
DOS Internet Workx main problem is the viruses, viruses that came
from online sites and viruses came from USB flash disk, Cds, diskettes
and other devices. These viruses causes their Operating System to crash
down, make their computers log and may delete files in the system.
Secondly their problem is the network dropout of their internet service

because of their internet service provider (ISP) problems. Lastly, the short
circuit of their lines and hardware due to overheat/overuse of the
hardwares.
Aside

from

its

high

quality

services,

they

also

have

accommodating staffs, high-speed internet (via Digital Subscriber Line or


DSL), Wi-Fi (Wireless Fidelity) ready, school-friendly shops, seminars on
excel

for

teachers

and

tutorials

on

Information

Technology

and

Mathematics (Engineering and Accounting). As of now, the present times,


this establishment really served good services to its customers and all of
the employee really dedicate to their work.

STATEMENT OF THE PROBLEM


The problems of Internet Workx are commonly known in most
computer shops. Their main problem is the viruses, viruses that came
from online sites and viruses came from USB flash disk, Cds, diskettes
and other devices. These viruses cause their Operating System to crash
down, make their computers lag and may delete files in the system.
Secondly their problem is the network dropout of their internet service
because of their internet service provider (ISP) problems. Lastly, the short

circuit of their lines and hardware due to overheat/overuse of the


hardwares.

OBJECTIVES OF THE STUDY


General Objective:
1.) To study the network structure of DOS WORKX internet caf.

Specific Objectives:
1.) To know the operating system/software, network topology and
network devices used and its effectiveness.
2.) To know common networking problems and their solutions.

SCOPE AND DELIMITATION


Scope
The scope of this study is to gather information about the network
profile, setup and the company profile of the DOS Internet Workx.
Delimitation
The study does not cover the confidential information about their
company.

A. Network Profile
If you already have one or more computers that you plan to
use as workstations, you can start by checking the hardware parts
installed in the computer. The computer must meet the following
requirements:

Network Cables

Cable is used to connect computers. Although we are planning to


use as much wireless as

possible, you should always have one or

more cables around. In our network, we will use


45. The ends of the cable appear as follows:

They can be in different colors:

Category 5 cable RJ-

Wired Network Cards

In order to connect to a network, a computer must be equipped with


a device called a network card. A network card, or a network adapter, also
called a network interface card,

or NIC, allows a computer to connect

to the exterior. If you buy a computer from one of

those popular stores

or big companies on the Internet, most of their computers have a


network card tested and already. You can reliably use it. If you go to
a store that sells or

manufactures computers, you can ask them to

install or make sure that the computer has a network card.


If you have a computer that doesnt have a network card, you can
install one. If you have a computer that already has a network card, you
can still replace it.
When it comes to their installation, there are roughly two categories
of network cards: internal and external. An internal network card looks like
a printed circuit board with some objects "attached" or "glued" to it and it
appears as follows:
What this card looks like may not be particularly important and it
may depend on the manufacturer but some of its aspects particularly are.
To start, there are two types of cards and you should know which one is
suited (or which one you want to use) for your computer. One type of NICs
uses a peripheral component interconnect (PCI) connection. Another type
uses industry standard architecture (ISA).

There are two primary ways you replace a network card. In most
cases, you will remove the card your computer already has and install a
new one. In some other cases, you will only add a new card but you
cannot replace the existing one because it is part of the motherboard (I
have found that out lately when opening a few computers for my users (I
was not aware of that)). The area where you add a network card is called
a slot.
To proceed, you must find out what your computer has to offer when
it comes to network cards. To do this, you have three main alternatives.
You can open the computer and examine the available slots of your
computer. They are usually located inside of what would be considered as
the back (wall) of the computer (if you know where you connect the
monitor, you should be able to locate the area that has the slots.
Unfortunately, unless you have experience with this, simply looking at the
slots will not tell you what type of connection you are dealing with.
The second alternative is to open the manual that came with you
computer (provided you havent thrown it away). The manual usually lists
the (types of) slots that your computer provides and where they are
located.
The last alternative to knowing the types of slots that your computer
provides is to contact the company that sold you the computer. They
usually know, provided you can get a human being on the phone, as long
as you give them the model of the computer.

CPU Intel Celeron D inside

Table 1.0
Specification
sSpe Process

Processor

Bus

L2

Package

Core

Part

or

speed(GH

speed

cache

type

voltag

number

family
Celeron

z)

(MHz)

size(KB)

SL7

478-pin

e (V)
1.25 - RK80546RE

C4

2.4

FC-mPGA4

1.4

533

256

056256

LCD monitor (Samsung SyncMaster 740N 17" Black LCD Monitor


Specifications)

Table 1.1
Specification
Manufacturer

Samsung

Manufacturer Part #

740N-BLACK

Type

TFT /TN

Display
Diagonal: 17"
Area
Pixel Pitch

0.264mm

Resolution 1280 x 1024


Brightness 300 nits cd/m2 (typ)
LCD
Contrast
600:1 (typ)
Ratio
Viewing
160 horizontal, 160 vertical
Angle
Response
8ms (typ)
Time
Cabinet Color

Black

Signal Input Input Video


RGB Analog
Signal
Video Level Analog (75 ohms, 0.7 Vp-p)
Frequency Horizontal:
Vertical: 56~75Hz

30~81kHz

Sync Type

Separate H/V, Compositive H/V, sync-on-green

Bandwidth 135 Mhz


Input
15-pin mini D-sub
Connectors
Included
Signal

VGA Cable

Cable
Power

Voltage

Requiremen Consumpti
ts

AC 100240V, 50 60Hz
34W (max)

on

Dimensions Unit

14.9" x 14.4" x7.9"

(H x W x D) As Shipped 17.2" x 17.9" x 5.6"


Weight

Unit

7.5 lbs.

As Shipped 13.2 lbs.

Mouse (JCSM optical mouse (model-op-62ad))

Table 1.2
Specification
Manufacturer:
Logitech
Part Number

931352-0403

Device Type Mouse

GENERAL

INPUT DEVICE

Form Factor External

Connectivity Technology Wired

Interface USB

Movement

Detection

Technology Optical

Buttons Qty 8

Movement Resolution 1600 dpi

Features

Scrolling

Programmable

buttons

Sensitivity adjustment

AVR (Powerplus computer voltage regulator)

PRINTER (Stylus T10 inkjet printer (colored))

wheel

,
,

Table 1.3
Specification
Product name

Stylus T10 Inkjet Printer

Manufacturer

EPSON

Ink Palette

4-colour

Printing Technology

Inkjet

Connectivity

USB 2.0

Print Speed

22ppm/13 ppm (BK/Colour)


Win 98SE / ME / 2000 / XP / XP-64 Edition / Vista Mac OS

Operating System
10.2.8 or later with USB

HP Laserjet ID20 (Black and white)

Table 1.4
Printing specifications

Colour(s) of print cartridges - Black


Print

technology

Laser

Page yield (black and white) - 30,000


standard pages in accordance with
Dimensions/weight/warranty

ISO/IEC 19752
Package dimensions (W x D x H) 595

396

198

mm

Package weight - 5.64 kg


Router (Lynksys (cable dsl router) BEFJR41 R2)

Table 1.5
Product Dimensions
Shipping Weight

11.2 x 9.8 x 2.8 inches ; 2.7 pounds


2 pounds (View shipping rates and
policies)

Shipping

Currently, item can be shipped only

ASIN
Item model number

within the U.S.


B00004SB92
BEFSR41 R2

P-660H SERIES
ADSL 2+ 4 Port Router

Cost-effective Ultra-High-Speed ADSL 2+ Gateway for SOHO Networks


- ADSL2/ADSL2+ High-speed Internet Access
- Media Bandwidth Management (MBM.) Quality of Service (QoS) Prioritizes
Time-sensitive Traffics for Better Performance
- MAP Express Provides a Comprehensive and Quick Installation Demo
within 3 Steps
- Firewall with Stateful Packet Inspection (SPI) and Denial of Service (DoS)
Prevention
Table 2.0
Specifications
ADSL Compliance

ANSI
Issue 2

T1.413

ATM Support

8 PVCs Support

ITU

G.992.1

ATM Forum UNI 3.1/ 4.0

RFC 1483/2684 Multiple Protocol

G.dmt

ITU

G.992.2

over AAL5

G.lite

RFC 2364 PPP over AAL5

RFC 2516 PPP over Ethernet

VC and LLC Multiplexing

ATM QoS UBR,CBR,VBR

I.610 OAM F4/F5 Loop-back, AIS,

ITU G.994.1 G.hs

ITU

ADSL2

G.992.3,
G.992.4

ITU

ADSL2+

G.992.5

and RDI OAM Cells

Reach-Extended
ADSL (RE ADSL)

FIREWALL SECURITY

Stateful

Packet

ROUTING SUPPORT

IEEE 802.1d Transparent Bridging

IP Routing: TCP, UDP, ICMP, ARP

RIPv1 and RIPv2

IP Multicast IGMP v1/v2

Inspection

Prevent

DoS,

DDoS Attack

Policy-based

Access Control

Content Filtering

IP

&

IP Policy Route

Generic

Packet Filtering

Real-time Attack
Alert and Log

IP MANAGEMENT

SUA/Multi-NAT

NETWORK MANAGEMENT

Web-based Configuration

Telnet Remote Management

FTP/TFTP for Firmware Upgrade

Internet Sharing

Multimedia
Support

and Romfile Backup and Restore

SNMP Support

Built-in Diagnostic Tool

ADVANCED FEATURES

Zero

HARDWARE SPECIFICATIONS

ADSL: One RJ-11 or RJ-45 Port

LAN: 4-port Switch, 10/100M Auto

Configuration

Traffic Redirect

MDI/MDIX

Triple Play

Reset Button

Media

Status LEDs Indicator

Power 12V AC 1A

Bandwidth
Management
(MBM)

Multimedia Auto
Provisioner
(MAP)

PHYSICAL

ENVIRONMENTAL SPECIFICATIONS

SPECIFICATIONS

Dimensions:

Operating Environment:

180(W)x
o OperatingTemperature: 0C

127(D)x

~ 40C

36(H)mm

o Operating Humidity: 20% ~

Weight: 275 g

85% (non-condensing)

Storage Environment:

o Storage Temperature: -20C


~ 60C

o Storage Humidity: 20% ~


90% (non-condensing)
CERTIFICATION

FCC

CE

D-Link DES (Hub)

Table 2.1

Specifications

Ports

24-10/100Mbps RJ-45 Auto-sensing ports

IEEE 802.3 Ethernet

IEEE 802.3u Fast Ethernet

IEEE 802.3x Flow Control

IEEE 802.1p QoS Support (2 Queues)

RJ-45: 100ohm, UTP/STP cable

10/100Base EIA/TIA Categories 3 or

Standards

Network Interface

5 cable

B. Question on Networking Structure of DOS Internet Workx


1. What are the devices used in the network?
-

Router : Linksys BEFJR41Cable DSL Router


Hub: D-Link DES-10240
Modem : Zykel P-600 Series
UTP cable Cat 5e
26 computers
Network Interface Card
Printer:
o Epson Sylus T10
o HP Laser Jet IP 20
Fax Machine: Panasonic KX-FP342

2. What network topology is used in the network? Why?


DOS Internet Workx used Star topology in arranging their computer
network.

It is very effective and suitable in the usage of any internet

shop; it is very easy to manage because of its simplicity in functionality. In


a star topology, the problems can be easily located logically and therefore

is easy to troubleshoot also.

If one computer fails in the

network it does not affect any other computer in the network and the
tasks of this computer can be easily switched very to the

Next computer easily using

the hub controls.

Star topology

enables the network to expand easily because of its very simple format.

New devices or nodes can easily be added to the

just extending a cable from

network by

the hub. The central function is

cost effective and easier to maintain.


3. What problems occur in the network?
DOS Internet Workx encounters several problems. Viruses, spywares
and other harmful threats sometimes affect the efficiency and the
effectiveness of the network. Second, OS crash and short circuit also
make the network defective. And last, loosed cable and collision of
data packets made data transfer slow and at worst, losing of saved
or unsaved data.
4. What are the softwares used in the network?
-

Windows XP Professional

MS Office 2007

Mozilla Firefox 1.5

Yahoo Messenger

Adobe Photoshop CS3

Macromedia Flash Player

Total Video Converter

ESET NOD 32 Antivirus

A4 TECH PC Camera Installer

LAN Games (Warcraft III, Counter Strike, Left4Dead, NBA


Live 2008, etc.)

Online Games (Ran Online, CrazyCart, Cabal, Audition,


Special Force, etc.)

Automotive System Attendance

5. What Internet connection was used by the network?


The network is connected to the Internet through PLDT with
the speed of 2.5Mbps.
6. What network configuration used by DOS? And why?
They used server-based configuration. In the centralized or serverbased system the clients connect to the central computer for one or more
services. Almost all processing is done on the server. This helps in the
synchronizing the data as everyone accesses and manipulates the data
that is stored in a centralized location. Maintaining security is much easier
as the only system whose security matters is the server. You only need to
maintain the security of the data and other resources of the server.
Different rights are assigned to different users such as whether this
particular user has the right to print the data, whether some user has the

right to open some particular file etc. The management of such types of
rights is easy in centralized networks because the whole administration
revolves around the server.

C. NETWORK LAYOUT

D. BACKBONE

FINDINGS, CONCLUSION AND RECOMMENDATION


A. SUMMARY

The study aimed to analyze and evaluate the existing network


structure of Dos Internet Workx. The proponent used a descriptive
qualitative research design in order to achieve the aim of the study. The
study had two major participants, the manager and the technical staffs of
Dos Internet Workx. Data gathering was done during the mid-week until
the later week of September.
Unstructured interview

was

used

to

gather

data

from

the

participants. Data gathered was transferred and interpreted by the


proponents.
B. FINDINGS
After the data gathering, the proponents categorized, analyzed and
interpreted the data, which yield with the following results:
1. For Internet security, the network had also installed antivirus
software in the network to protect its system from attacks of
various viruses.
2. Some of the cables used to connect the LAN are loosed.

C. CONCLUSION
The existing network system is prone from different harmful softwares
such as viruses, worms and spywares due to low level of security because
they are not using dedicated security softwares against those malicious
programs and they do not update their security regularly.
The cause of the drop out of their internet service provider is due to loose
of cable connections and the weather conditions. They used old AVR and
power equipments that causes the power overloading.
D.RECOMMENDATION

1. Security: The researchers requires the owner to be updated in


anti-viruses
2. Replace the loose cables.
3. Replace the old AVR and other power equipments.

Reference:
https://www.scribd.com/uploaddocument?
archive_doc=28849309&escape=false&metadata=%7B%22context
%22%3A%22archive%22%2C%22page%22%3A%22read%22%2C
%22action%22%3A%22toolbar_download%22%2C%22logged_in
%22%3Atrue%2C%22platform%22%3A%22web%22%7D