Вы находитесь на странице: 1из 20

A Mini Project Report

On

Wireless Network Design for IT Department

Submitted in fulfilment of the requirement of


Network Design Lab
In
Information Technology
By
Akshata Chandure TU4F1617034
Arzoobanu Siddiquee TU4F1617043

Roshni Baviskar TU4F1617046

Under the Guidance of


Prof. Shyamsundar Magar

Department of Information Technology


Terna Engineering College, Nerul, Navi Mumbai
UNIVERSITY OF MUMBAI
2019-2020
CERTIFICATE

This is to certify that Network Design Lab (NDL) Mini Project entitled “Wireless Network
for IT Department” Submitted by “Akshata Chandure” (TU4F1617034), “Arzoobanu Siddiquee”
(TU4F1617043) “Roshni Baviskar” (TU4F1617046) for the partial fulfillment of the requirement
for Semester VII Subject of Network Design Lab in BE Information Technology to the University
of Mumbai, is a bonafide work carried out during Semester VII in Academic Year 2019-2020.

Prof. Shyamsundar Magar

Subject Incharge

Dr.Vaishali Khairnar Dr. L.K. Ragha

HOD Principal

External Examiner(s)
1.
DECLARATION

We declare that this written submission represents our ideas in our own words and where others’
ideas or words have been included, we have adequately cited and referenced the original sources.
We also declare that I have adhered to all principles of academic honesty and integrity and have
not misrepresented or fabricated or falsified any idea/data/fact/source in my submission. We
understand that any violation of the above will be cause for disciplinary action by the Institute and
can also evoke penal action from the sources which have thus not been properly cited or from
whom proper permission has not been taken when needed.

__________________________
Akshata Chandure (TU4F1617034)

__________________________
Arzoobanu Siddiquee (TU4F1617043)

___________________________
Roshni Baviskar (TU4F1617046)

Date:
TABLE OF CONTENT

Abstract

1. Introduction 1

2. Objectives 2

3. Network Requirements 3

4. Functional areas 4

5. Existing Infrastructure 7

6. Network Devices 8

7 IP Addressing Plan 9

8 Network Design 11

9 Cost-Benefit analysis. 12

10. Conclusion 14

References 15
Abstract
With the speedy social and economic development networks have been progressing rapidly. But the
current local area network couldn’t meet users demands to certain extent especially on department or
campus level. The project is to understand the advantages of using WLAN in a network.
Understand the configuration which is required to set up a WLAN based network using Cisco
routers, access points and switches. The main goal of this project is to get knowledge of WLANs
and the basic processes of designing a WLAN. The project also provides an insight into various
concepts such as topology design, IP address configuration and how to send information in the
form of packets in a single network.
Chapter-1

Introduction
Local area network, which is widely applied, plays a more and more important role in many
fields.With LANs, work and study efficiency is improved, but it also brings some problems.
Wired local area networks couldn’t work without the cable, which means that we couldn’t
change the structure of networks casually according to actual situations. Therefore, we cannot
implement mobile office and studies. Therefore, the current local area network couldn’t meet
users’ demands to certain extent. In order to make users access data at any place and at any
time, networks should develop from being wired and fixed to being wireless and mobile.
Compared with local area networks, wireless local area networks offer advantages at different
places. One of the advantage of a wireless local area network is that if there is coverage of
WLAN, users can move anywhere they want with their devices and transmit data at the same
time. Other advantages include easy installation, effective expansion, flexibility and cost
savings. In terms of campuses, most campuses now have their own wired local area network,
but teachers and students need a more convenient way to access the network. The aim of the
study is to get knowledge of the definition, background, characteristics and technical
standards of WLAN, to understand the advantages and limitations of WLAN and to get to
know the basic process of designing a campus WLAN. Networking devices are costly so it
is better to perform first on packet tracer to understand the concept and behavior of the
network.

1
Chapter- 2

Objectives

Increased mobility and collaboration

 Roam without losing your connection


 Work together more effectively

Improved responsiveness

 Connect to the information you need when you need it


 Provide better customer service

Better access to information

 Connect hard-to-reach areas


 Improve your processes

Easier network expansion

 Add users quickly


 Grow your network cost-effectively

Enhanced guest access

 Give secure network access to customers and business partners


 Offer a value-added service

2
Chapter-3
Network Requirements
Identifying Planned Infrastructure Services.

SERVICE COMMENTS

Mobility The uniqueness of wireless networks is their ability to provide dynamic


network connectivity for users, devices, services, and applications
without being tethered to any wired hardware.

Service area. A typical coverage area for a wireless LAN has a diameter of 500 to
600 m.

Transmission robustness and Unless properly designed, a wireless LAN may be interference-prone
security. and easily eavesdropped. The design of a wireless LAN must permit
reliable transmission even in a noisy environment and should provide
some level of security from eavesdropping.
Number of nodes. Wireless LANs may need to support hundreds of nodes across multiple
cells.

Network Management Use centralized management tools, better congestion control protocols,
and traffic management protocol.

High Availability Multi clustered infrastructure having hardware servers in high


availability mode. Eliminate single point failure.

Quality of Service.
Give priority to maintain a secure channel and provide better privacy
policies.

Easy setup. You don't have to string cables, so installation can be quick and cost-
effective.

Cost Because wireless networks eliminate or reduce wiring costs, they can
cost less to operate than wired networks.

3
Chapter-4

Major Design Areas and Functional Areas

The first level of division that was developed is high level and includes the following functional areas:

 Enterprise Campus Function Area


 Enterprise Edge Functional Area
 Service Provider Functional Area
 Remote Functional Area

Enterprise Campus Functional Area


The enterprise campus functional area is intended to be the center of the network design, located at
a single location where several different core elements are located and are accessed from all other
parts of the network. There are several different technologies and components located at this part of
the network, including routing, switching, firewalls, intrusion detection and prevention systems,
voice, video, access control, among others.

The second level of division within the enterprise campus functional area includes a couple of
different modules:

 Enterprise Campus Infrastructure— The enterprise campus module is separated out into a
number of different layers that include the different parts of the network:
 Campus Core—The campus core connects together other modules within the enterprise
campus as well as the Enterprise Edge functional area. The core focuses on the fast transport

4
of network traffic; as this is the main function of the core, it must have high levels of
redundancy and must be able to adapt to network changes quickly.
 Building Distribution—The building distribution aggregates the traffic from the access layer
and provides routing and packet manipulation. This is also the location within the network
where policies for QoS, security and traffic loading are implemented.
 Building Access—The building access is responsible for the connectivity of end devices on
the network.
 Enterprise Data Center—The enterprise data center module is responsible for the support of
management services, including monitoring, logging, troubleshooting, and other management
features.

Enterprise Edge Functional Area

The enterprise edge functional area is responsible for the aggregation of several different off-campus
elements as well as the routing of this traffic into the campus core module within the Enterprise
Campus Functional area.

The second level of division within the enterprise edge functional area includes different modules that
are used to connect different types of connection; these modules include:

 E-Commerce—The E-commerce module is responsible for the processing of all electronic


transactions. All of the network elements that are involved with forwarding and processing
these transactions are included within this module, such as web, application and database
servers, firewalls, and network intrusion detection and prevention systems.
 Internet Connectivity—The Internet connectivity module is responsible for all other public
connectivity that is not covered within the e-commerce module. The different network
elements in this module include web (not e-commerce), DNS, and FTP servers, firewalls,
network intrusion detection and prevention systems and edge routers.
 Remote Access and VPN—The Remote Access and VPN module is responsible for initiating
and terminating remote access connections including VPN traffic coming from offsite users
connecting through the Internet connectivity module. The different network elements in the
module include Cisco ASA security appliances (VPN termination), firewalls, network
intrusion detection and prevention systems and dial-in concentrators (when still used).
 WAN and MAN and Site-to-Site VPN—The WAN and MAN and Site-to-Site VPN module
is responsible for the routing of traffic from remote sites back into the central campus location.
This includes the use of technologies such as leased lines, frame relay, ATM, SONET and
MPLS, as well as site-to-site VPN technologies.

Service Provider Functional Area

The service provider functional area is responsible for connectivity into Service Provider networks.
This includes a number of different connectivity options, from Internet access through Public
Switched Telephone Network (PSTN) access.

The second level of division within the service provider functional area includes different modes that
are used to connect these different service options:

5
 ISP—The ISP module is responsible for connecting the networking to the Internet; this
includes access for Enterprise remote locations.
 Public Switched Telephone Network (PSTN) —The PSTN module is responsible for
connecting network elements using analog, ISDN, and wireless technologies (cellular). Often
this connectivity is used for Out-of-Band (OOB) management and backup purposes.
 Frame Relay and ATM Module—The Frame Relay and ATM module is used to connect
remote locations via a number of different permanent technologies, including Frame Relay
and ATM. This module also includes connectivity using a number of different technologies
that are more modern, including Digital Subscriber Lines (DSL), Cable, Wireless (bridging),
and Multiprotocol Label Switching (MPLS).

Remote Functional Area

The remote functional area is responsible for connectivity of a number of different remote functional
elements, including enterprise branches (connecting through a service provider), enterprise data
centers, and enterprise teleworkers.

The second level of division within the remote functional area includes different models that represent
the different remote connectivity options:

 Enterprise Branch—The enterprise branch module includes remote branches that allow
employees to work at non-campus locations. These locations are typically responsible for
providing security, telephony, and mobility options to these employees, as well as general
connectivity into the campus and the different components located inside the enterprise
campus.
 Enterprise Data Center—The enterprise data center module includes a data center that includes
all of the same functionality options as the campus data center, but existing at a remote
location. This provides an added layer of security when done correctly, as this remote location
can provide backup options should something happen to the campus data center location.
 Enterprise Teleworker—The enterprise teleworker module is responsible for the connectivity
of providing connectivity for workers who operate out of different geographically dispersed
locations, including home offices, hotels or customer/client sites. Cisco Virtual Office is used
to support these workers; Virtual Office provides an ability to provide productivity, security
and business resiliency. This solution requires a remote and central equipment presence that
is used to provide connectivity back into the central campus location.

6
Chapter-5

Existing Infrastructure

Existing network:

Fig 1: Wired Network

A wired network is a common type of wired configuration. Most wired networks use Ethernet cables
to transfer data between connected PCs. In a small wired network, a single router may be used to
connect all the computers. Fig shows an existing wired network. It consists of four wired computers
connected to a switch, which is connected to a router

Upgradations to Existing infrastructure:

Fig 2: Wireless Network.


A Wireless Access Point (WAP) is a networking device that allows wireless-capable devices to
connect to a wired network. Adding a WAP to your existing wired network is useful to
accommodate those devices that are only capable of wireless connection.In the network diagram
above. In the right portion, a wireless network shows two wireless computers connected to a
WAP.
7
Chapter- 6

Network Devices

Router (1841):
The Cisco 1841 router features secure, fast, and high-quality delivery of multiple, concurrent
services for small-to-medium-sized businesses and small enterprise branch offices. The Cisco 1841
router offers embedded hardware-based encryption enabled by an optional Cisco IOS Software
security image; further enhancement of VPN performance with an optional VPN acceleration
module; an intrusion prevention system (IPS) and firewall functions; interfaces for a wide range of
connectivity requirements, including support for optional integrated switch ports; plus sufficient
performance and slot density for future network expansion and advanced applications as well as an
integrated real-time clock.
Switch (2950-24):
Catalyst 2950-24 switch—24 10/100 Ethernet ports
The 10/100 ports use RJ-45 connectors and twisted-pair cabling. The ports can connect to these
devices:10BASE-T devices, such as workstations and hubs, through standard RJ-45 connectors and
two twisted-pair cabling. end-user can use Category 3, 4, or 5 cabling.
100BASE-TX devices, such as high-speed workstations, servers, hubs, routers, and other switches,
through standard RJ-45 connectors and two or four twisted-pair, Category 5 cabling.

Access point:
A wireless access point (wireless AP) is a network device that transmits and receives data over a
wireless local area network (WLAN). The wireless access point serves as the interconnection point
between the WLAN and a fixed wire network.
DNS Server:
A DNS server is a computer server that contains a database of public IP addresses and their
associated hostnames, and in most cases serves to resolve, or translate, those names to IP addresses
as requested. DNS servers run special software and communicate with each other using special
protocols.
HTTP Server:
HTTP is the abbreviation of "HyperText Transfer Protocol". A protocol is like a language with a
simple grammar. The HTTP Server is the implementation of that protocol in a piece of Software.
The protocol specifies how the information must be requested and how the responses are formed, so
we have two important actors here: the HTTP Client (well known as Browser) and the HTTP Server.
As HTTP Clients we have Firefox, Safari, Opera and Explorer within others. At Server side we have
Apache, Nginx, Monkey, Lighttpd, etc.

8
Chapter- 7

IP addressing Plan
An Internet Protocol address is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. An IP address serves
two main functions: host or network interface identification and location addressing.

Subnet:A subnetwork or subnet is a logical subdivision of an IP network. The practice of


dividing a network into two or more networks is called subnetting. Computers that belong to
a subnet are addressed with an identical most-significant bit-group in their IP addresses.

9
IP Addressing Plan for Our Network:

WLAN IP Addressing
WLAN Name IP

Lab 1 192.168.1.5/24-192.168.1.7/24 and


192.168.1.12/24-192.168.1.18/24
Lab 2 192.168.1.2/24-192.168.1.4/24 and
192.168.1.19/24-192.168.1.24/24
Lab 3 192.168.1.29/24-192.168.1.34/24 and
192.168.1.100/24-192.168.1.110/24
Lab 4 192.168.1.29/24-192.168.1.34/24 and
192.168.1.10/24-192.168.1.11/24

Lab 5 192.168.1.25/24-192.168.1.28/24 and


192.168.1.8/24-192.168.1.9/24

Router:
FastEthernet0/0 -----Ip Address: 192.168.1.1/24
FastEthernet0/1 -----Ip Address: 10.0.0.1/8

10
Chapter-8

Network Design

Fig 3 : Network Design

Above Fig 3 shows the wireless network design for IT department, there are 5 lab in this network
in each lab there are numbers of personal computer which access internet using access points.
There are 5 access points for each lab .These access points are connected to one switch and switch
is connected router. Similarly there are Dns server and http server which are connected to switch
and switch is connected router. There is only one router for one department and similar network
can be used for other department of college.

11
Chapter- 9

Cost-Benefit Analysis

Cost Analysis

Product Price Quantity Total

Cisco 1841 Integrated Services Router


18,928 1 18,928

Cisco SF95-24-AS 24-Port 10/100 Switch


5,200 2 10,400

RJ45 Plugs (Packs of 100) 369 6 2,214

CAT 5 Cable (1,000 feet) 6,500 4 26,000

Desktop (end device) 20,000 40 8,00,000

Access Point 19,000 5 95,000

DHCP,DNS Server 8,400 1 8,400

HTTP Server 212,000 1 212000

Total 1,149,542

Recurring Annual Cost

Product Cost

Labour (Maintaining the System) 360,000

Leased line 20 MBPS (TATA teleservices) 390,000

Annualized Cost 750,000

Total 3-year Cost Analysis 10,355,124

Total Annualized Cost 3,451,708

12
Benefit Analysis

Product Price

Increased Productivity 2,625,000

Decreased Anxiety(from increased reliability) 420,000

Less Training Time 630,000

Increased Connectivity between labs of department 1,050,000

Ease of Record Keeping(i.e., fewer lost files and faster availability) 2,625,000

Increased Security 3,150,000

Total Benefit 10,500,000

13
Chapter- 10

Conclusion

In this project, the design and implementation of a WLAN are carried out. The WLAN is the product
that combine computer technology and wireless communication technology. It brings a lot of
convenience to people's lives. The aim of the project was to create a WLAN for department and
implement the features of WLANs, including the advantages and limitations of WLANs, technical
standards of WLANs, security and authentications of WLANs, components of WLANs and different
kind topologies of WLANs.

14
References
[1]Bradley, M. 2017. Wireless Standards 802.11a, 802.11b/g/n, and 802.11ac. WWW document.
Available at: https://www.lifewire.com/wireless-standards802-11a-802-11b-g-n-and-802-11ac-
816553[Accessed 01 April 2017].

[2]Bradley, M. 2017. What Hardware Is Required to Build a Wireless Network? WWW document.
Available at: https://www.lifewire.com/required-to-build-wireless-networks-816542 [Accessed 01
April 2017].

[3]Karen, S and Derrick, D. 2007. Wireless Network Security for IEEE 802.11a/b/g and Bluetooth.
PDF document. Available at:
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.109.6200&rep=rep1&type=pdf [Accessed
01 April 2017].

[4]Abdelkarim, R. 2006. Security in Wireless Data Networks: A Survey Paper. WWW document.
Available at http://www.cs.wustl.edu/~jain/cse57406/ftp/wireless_security/index.html[Accessed 20
April 2017].

[5]Stefan, P and Vladimir, W. 2012. Wireless Mesh Networks - Efficient Link Scheduling, Channel
Assignment and Network Planning Strategies. WWW Document. Available at
:http://www.intechopen.com/books/wirelessmesh-networks-efficient-link-scheduling-channel-
assignment-and-networkplanning-strategies/channel-assignment-schemes-optimization-for-multi-
interface-wireless-mesh-networks-based-on-link-loa [Accessed 08 March 2017].

[6]Cisco. 2008. Authentication Types for Wireless Devices. WWW document.


Availableat:http://www.cisco.com/c/en/us/td/docs/routers/access/wireless/software/guid
e/SecurityAuthenticationTypes.html [Accessed 25 April 2017].

[7]Alexandra, G. 2015. Getting Familiar with Wi-Fi Channels? WLAN Back to Basics. WWW
document. Available at :http://boundless.aerohive.com/experts/WLAN-
ChannelsExplained.html[Accessed 26 March 2017].

[8]Cisco. 2011. Wireless LAN Controller Web Authentication Configuration Example. WWW
document. Available at :http://www.cisco.com/c/en/us/support/docs/wireless-
mobility/wlansecurity/69340-web-auth-config.html [Accessed 20 April 2017].

[9]H3C. Portal Authentication Technology White Paper.


WWW document. Available at :http://www.h3c.com.hk/Products___Technology/Technology/Secu-
rity_and_VPN/Technology_White_Paper/200809/617218_57_0.htm[Accessed 08 March 2017].

15

Вам также может понравиться