Featured

About Me

I done my Bachelor of Technology in Computer Science and Engineering. I have studied network related subjects like Computer Network and Computer System Architecture during my degree. I would like to have more knowledge in networking theory as well as practicals. I did not have any hands on experience in networking field but I have got some practical sessions in my previous course.

As we know that a well established network is an important factor in every field and it is necessary to get a deep knowledge about networking. In this blog, I am trying to share some ideas and key points in networking like about routers, protocols, switches, firewalls and other Data Networking infrastructure.

NETWORK INFRASTRUCTURE AND ARCHITECTURE OF THERE4TRAVEL                                                  

COMPONENTSCONFIGURATION/NUMBERSDEVICE BRAND/SPECIFICATIONCOST
Main ServerWindows server 2016 with Domain Controller and Additional Domain Controller, DNS, DHCP, FTP and PROXY configurationHP ProLiant ML30 Gen10 Business ERP Server for Finance and Operations with Operating System, Intel Xeon 4-Core 3.5GHz, 64GB DDR4 RAM, 8TB SSD, RAID, Windows Server 20165000$
Mail Server Microsoft exchange server 2016Intel core i3 processor, 4GB ram,256GB SSD450$
IP Phones20 numbers Cisco CP-7821-K920×95$=1900$
Network printer and scanner 2 numbersHp Laserjet Pro289$
Switch 2 numbersCisco SF220-24-K92×422$=844$
Router 2 numbersCisco 2901/k92×1200$=2400$
Firewall 2 numbersCisco ASA5506-K92X420$=840$
IP Cameras
16 numbersLorex 8-Channel 4K UHD NVR with 2TB HDD and 6 4K Night Vision Network Bullet Cameras2×680$=1360$
Clint PC 20 numbers
HP 22-Inch All-in-One Computer, Intel Core i3-8130U, 4GB RAM, 1TB Hard Drive20×650$=13000$
Bio-metric 2 numbers
Professional biometric face recognition attendance machine2×120$=240$
Internet Service Provider 2 connectionUnlimited plan with 50MBps speed150$
Cloud services Cloud backupAmazon web services100$
Cat6 Ethernet cables 305 metersDynamix 305 meters205$
Rj45 Connector 150 numbersRS pro50$

Done by : Asha, Vishnupriya, Mariya, Suhaib

USER PROFILE

1.CEO/Manager Christchurch: he is connected with managers and assistant managers in nelson and Christchurch. 

    * Access to the All Company Report 

    *Access to the Reports for the group(s) they manage 

2. Assistant Manager Christchurch: he is connected with CEO and Christchurch Office Agents, 

    *Send reminders to Inactive Users  

    *Review and reply to employee Feedback 

    *Receive a weekly Engagement Report for the group(s) they manage 

    *Invite existing employees to the group 

3.Travel agents Christchurch: they are work in Christchurch office and only access to company’s application. 

    *access to company’s application  

    *access to their own feedback 

4.Manager Nelson: connected with CEO and assistant manager in nelson 

    * Access to the All Company Report 

    *Access to the Reports for the group(s) they manage 

5.Assistant Manager Nelson: connected with manager and agents in nelson 

    *Send reminders to Inactive Users  

    *Review and reply to employee Feedback 

    *Receive a weekly Engagement Report for the group(s) they manage 

    *Invite existing employees to the group 

6.Travel agents Nelson: they are work in nelson office and only access in company’s application. 

    *access to company’s application  

    *access to their own feedback 

7.Mobile Travel Agents: they are remotely connected with company’s main server 

    *access to company’s application  

    *access to their own feedback 

    *access to the suggestion box 

Done by : Asha, Vishnupriya, Mariya, Suhaib

Home Work

A company has a 190.240.0.0/16 block. They now want to re-organise it into large blocks. They wish to have subnets that can handle at least 1000 hosts each.

You can substitute into the formulae 2S >= subnets required and 2H-2 >= hosts required – to determine the number of bits required.

Please calculate:

  • S = bits used for subnetting
  • H= bits used for the number of hosts in each subnet

Also, please calculate the following for the second subnet:

  • subnet mask
  • subnet address
  • first usable address in that subnet
  • last usable address in that subnet
  • broadcast address of that subnet

Answer:

190.240.0.0./16

It is a class B network: 10111110.11110000.000000/00.00000000

                                                     Network ID                                Host ID

  • S = bits used for sub netting =6
  • H= bits used for the number of hosts in each sub net =10
  • Sub nets=2*6=64
  • Hosts=(2*H)-2=1022

Second Subnet:

  • sub net mask 255.255.252.0(11111111.11111111.11111100.00000000)
  • sub net address :190.240.4.0/22 (10111110.11110000.00000100.00000000)
  • first usable address in that subnet:190.240.4.1 (10111110.11110000.00000100.00000001)
  • last usable address in that subnet:190.240.7.254
  • broadcast address of that subnet:190.240.7.255 (10111110.11110000.00000111.11111111)

Done by : Asha, Vishnupriya, Mariya, Suhaib

Top Down Network Design

GROUP: Vishnupriya, Asha, Mariya, Suhaib

Introduction

The aim of the project is to provide network infrastructure for a travel agency named “there4travel”. there4travel is a new travel agency located at Christchurch airport which has got branch in Nelson. They provide both domestic as well as international travel bookings and tour packages. The aim of the project is to provide a network design for the travel company.

What services or applications they need ?

  • Web Server
  • Mail Server
  • File Server
  • Windows Core Server 2016
  • Print Server
  • Antivirus Server Software
  • Domain Name System (DNS)
  • Dynamic Host Configuration Protocol (DHCP)
  • Virtual Private Network (VPN)
  • Active Directory
  • Network Monitoring System
  • Firewall
  • Cloud Server
  • Secure Sockets Layer (SSL) 

Design ideas in a brief overview

  • It could be better to add VPN for accessing network from any part of the world
  • It could be a good idea to implement Network Monitoring System tools such as LogicMonitor, Kaseya VSA and ManageEngine OpManager. Network Monitoring tools will find availability and functions of computers and network services.
  • It is necessary to install antivirus software or a spyware protection program to prevent unauthorized access from external resources.
  • Encryption should be done to make data more secure to provide privacy and integrity for data communication between networks.

How do you initially think that you would design and build this?

The Organization is relatively small and is based in Christ church with a branch at Nelson. It would be enough to utilize the private IP range 192.168.0.0 – 192.168.255.255. This would ensure security of the network as it includes the network from outside access. The branch at Christ church has departments such as Sales, Marketing, HR and Management. The devices such as Computers, Printers, Scanners and other equipment utilized in one department need to be segregated from the devices in the other departments by the practice of subnetting. The network is segmented into 8 subnets for utilization in the organization.

In addition to this, the servers utilized in the Organization such as the Web server, Mail server, File server and DNS server are placed in a separate subnet to enhance security. The servers need to be accessed from the outside network and the branch at Nelson. This is achieved by utilizing NAT (Network Address Translation). The servers utilize static IP address and the systems are assigned IP addresses by utilizing DHCP.  An internal and external firewall is utilized to secure the network. A proxy server is utilized to secure the Web server as it is accessible from the internet.

The management of features of the network such as permissions and access are done by the use of Active Directory. The network is monitored by the use of a Network monitoring system. This helps to prevent and fix outages and other network issues. A similar network implementation is created for the branch at Nelson. The private IP range 172.16.0.0 – 172.16.255.255 is utilized in the Nelson branch.

About Me

Networking is all about acquiring information and sharing it throughout the same network so as to solve the problems . Though I have not got heaps of knowledge in Networking I keep on researching and keeps myself updated. So as I move further I will try to update my findings in networking to increases the knowledge in the same .

About Me

I am Asha George. I don’t have any expertise level of knowledge in the field of networking. But during my bachelor degree program, I went through basic concepts of networking like OSI model, topology, sub-netting etc. Through pursuing this course I would like to deeply understand emerging technologies as well as methodologies in networking and its industrial level applications.

In future,I am confident that the course would make me efficient in shouldering the responsibilities of network administrator as installing network and computer systems, maintaining, repairing and upgrading network and computer systems.

Design a site like this with WordPress.com
Get started