Network Design for a company

13
1. Introduction to ABC Company. The ABC Computer Company was started in the mid 2008 with the aim of developing software for the PC users. The company developed the first professional word-processing package for the DOS environment, called ABC zoom (version 4). The company has now developed a group of products for the Windows environment. Although the company makes software for the use of all, its specific aim is to provide the software and fonts. To that end, the company provides its software and expertise to the various groups doing that work. The founder of Tibetan Computer Company, Mr. Tony Duff, is a translator who directs the company The ABC Computer Company effectively became a part of the Australian Heritage Project and continued to develop its software in the context of a aboriginal text preservation project. As a result of the two projects working together, several fine fonts were developed. These typefaces are considered by Australians to be the best available. Another outcome was the word processor called zoom (version 4) . It was based in WordPerfect for DOS and, because of its many features, became regarded as the only software suitable for serious publishing. It is still used by most people in Australia. With the decline of DOS, the company stopped developing the DOS-based program and turned its attention to developing a set of standalone programs for Windows that could do all of the things needed for publishing. Three stand-alone programs for Windows have been produced and are being actively developed. In 2009, a Macintosh version of PDF Reader was made available. Three Translation software (dictionaries) are available for the Macintosh in that format. We hope in the future to make their texts and other reference works available in the Macintosh, too.

description

Network Design for a company

Transcript of Network Design for a company

Page 1: Network Design for a company

1. Introduction to ABC Company.

The ABC Computer Company was started in the mid 2008 with the aim of developing software for the PC users. The company developed the first professional word-processing package for the DOS environment, called ABC zoom (version 4). The company has now developed a group of products for the Windows environment. Although the company makes software for the use of all, its specific aim is to provide the software and fonts. To that end, the company provides its software and expertise to the various groups doing that work.

   The founder of Tibetan Computer Company, Mr. Tony Duff, is a translator who directs the company

The ABC Computer Company effectively became a part of the Australian Heritage Project and continued to develop its software in the context of a aboriginal text preservation project. As a result of the two projects working together, several fine fonts were developed. These typefaces are considered by Australians to be the best available.

   Another outcome was the word processor called zoom (version 4).  It was based in WordPerfect for DOS and, because of its many features, became regarded as the only software suitable for serious publishing.  It is still used by most people in Australia.

   With the decline of DOS, the company stopped developing the DOS-based program and turned its attention to developing a set of standalone programs for Windows that could do all of the things needed for publishing. 

Three stand-alone programs for Windows have been produced and are being actively developed.

   In 2009, a Macintosh version of PDF Reader was made available.  Three Translation software (dictionaries) are available for the Macintosh in that format.  We hope in the future to make their texts and other reference works available in the Macintosh, too.

   The products of ABC Computer Company can be purchased through a number of distributors around the world.  However, the company focuses on electronic sales and delivery of its products.

Role as IT Consultant /Support Person

There are different roles that can be played as an IT consultant: the advisory role and action role.Determining which one to play will depend upon the client's style, how you work together and the nature of the project.

Advisory Role

The most common role we will play as an IT consultant is that of an advisor to the client. We will need to research and investigate, then review the information that is

Page 2: Network Design for a company

collected. After everything has been evaluated, one has to present a report and recommendations for the next steps to the client, and client is responsible for carrying out these steps.

Action

Sometimes a client will have a project planned and evaluated , and they simply need an IT consultant to complete it for them. We have the skills to complete the job, this can be an easy task because we have the guidelines already set for them.

Regardless of what role we take, we are responsible for completing the job assigned by your clients in a way that best meets their needs. Our role will most likely change depending upon the project, and we should gauge it by the method that will be best for your client.

2.

Page 3: Network Design for a company

3.

In the case where super high speed Internet access is provided to a business, the high-speed connection would be brought all the way up to the different department premises using the Ethernet (Optical Fiber). Typically the carrier would bring fibre to the building and would use the Demarcation device as a port extension to the core router at the customer premise. Using this setup and equipment, wire speed service is brought all the way to all the departments.

In the growing environment of carrier-grade Ethernet networks and IP-services such as VoIP and IPTV, ensuring Service Level Agreements and assuring the best Quality of Service possible evolved from being a competitive advantage to an absolute necessity. In order to achieve the expected performance, all the departments need enhanced equipments and capabilities, as well as devices used to actually measure performance of their own network as well as end-to-end links while disregarding.

4. Physical network of each department.

Page 4: Network Design for a company

All the departments are connected with the switch which is finally connected with the Router.The internal Network is protected.In between the internal network and the external network i.e the internet there is a protection wall Firewall.Firewall blocks all the external and unauthorised users from logging into the ABC network.

5.

User/ Device/ Network Requirements.

Page 5: Network Design for a company

With current Ethernet solutions, a service provider cannot test or diagnose the entire link, or ensure its SLA end-to-end. The Last Mile is invisible to operators’ testing equipments, or will include the customer’s network which can in turn affect the results.

The EDD creates a clear demarcation point between carrier’s and the customer’s networks and provides visibility all the way to the various departments.

This solution allows the operator to effectively isolate the departments network when testing and monitoring the end-to-end link, and thus eliminate diagnostic errors due to end-customer activities.

Because an Ethernet Demarcation Device is always in the data path, it should be able to sustain wire speed rates and introduce no significant delay or jitter while sporting a bullet-proof reliability in order to avoid any impact on network performance. Furthermore, to be Per-Flow Statistics effective and fulfill its core tasks, the Demarcation device should also feature intelligent loopbacks, and allow tracking of bandwidth utilization of every stream delivered.

The Ethernet Demarcation Device (EDD), using a high-performance architecture, minimizes intrinsic packet-jitter and latency, and offers the solution to these challenges by implementing standards-based OAM, loop-back capabilities. Providing per-flow statistics,

The Ethernet Demarcation Device (EDD

6.

Upgrading Device:

Page 6: Network Design for a company

The ABC Company is still using the same old networks with all the hub’s and cables which makes a hard configuration for all the users and system administration to configure the network.

As an IT Consultant we can suggest them to go with the secured Wireless networks.

Connecting all the departments by access points and secured networks protecting using WEP technology and encrypted password..

All the departments can communicate internally but for the external network to communicate needs authorised access.It can be further protected using Firewall.

Internal network can be fully secured using Firewall so that external unauthorised users and intrusions can be monitored.

7.Easy steps to test the network and device:

Steps

1. Open a command prompt.

1. Click on the "Start" button.

2. Select "Run". A window will open with a text box.

Page 7: Network Design for a company

3. Type cmd

in the text box.

1.

1. Click "Ok" or press [Enter]. The command prompt will then appear. This is the default command-line interface for Windows.

2. Test the loop-back address. Type ping 127.0.0.1

. It is the same for every computer, so you do not need to change this. This will test your computer's network chip, not your modem, router, or Internet connection.

1.

1. You can continuously test a connection using the command ping 64.233.161.99 -t

1.

1. Place -n 20

at the end of the command to send 20 pings. Replace the number 20 with any value (the value will be limited to a 32-bit or 64-bit integer).

1. Look at the output.

1. If everything is correct, you will see:

Reply from 127.0.0.1: bytes...Reply from 127.0.0.1: bytes...

Reply from 127.0.0.1: bytes...Reply from 127.0.0.1: bytes...

2. Then it will tell you the ping statistics. This should say 0% loss.

3. Keep an eye on the response time, as it represents the connection's latency between you and the server. Double digit values, such as 50ms, is very good. This varies drastically depending upon where the server is in relation to your computer. Generally, most connections should have latency less than a few hundred milliseconds. If there is no network connection, you will see the output "Request timed out" repeated four times.

2. Test your local Gateway. Find your Default Gateway's IP address:

1. Click on the "Start" button.

2. Select "Run". A window will open with a text box.

3. Type ipconfig in the text box.

Page 8: Network Design for a company

1.

1. Click "Ok" or press [Enter]. The command prompt will then appear with output from the ipconfig command.

2. Find the listing for "Default Gateway". This is the IP you can use in a ping to test the connection between your computer and your router or ISP.

2. Test beyond your local network. Test the connectivity of your modem, router, network, or Internet connection by using an IP address on the Internet.

3. Check Domain Name Resolution. Instead of an IP address, type in a site's domain name, such as www.google.com. Pining a domain name tests your computer and network's ability to resolve network names (translating them to IP addresses).

4. Measure network and Internet performance (Windows NT, 2000, XP, and Vista only). Use the tracert

command to measure the response of each hop in a network path. Your connection to any one server will require multiple "hops" between other servers and networking components. The fewer number of hops, the better. Most connections to a server on the Internet will include at least a dozen hops. To test:

1. With the command prompt open, type tracert xxx.xxx.xxx.xxx

, replacing xxx.xxx.xxx.xxx with an IP address on the Internet.

1.

1. Press [Enter] and watch as each hop is 'pinged' and logged. The first ping should be your computer, modem, or router, and the last ping should be your target address.

2. Notice that the response time for points farther away from you will be greater than those closer to you.

You can also use commands such as "ipconfig" to find out your IP address.

If you use a dial-up connection, then you may see higher latencies, or even lost packets (% loss).

An alternative method to start a ping:

1. Click on the "Start" button.

2. Select "Programs" or "All Programs".

3. Select "Accessories".

Page 9: Network Design for a company

4. Select "Command Prompt".

5. Type in ping

1. Press [Space].

2. Type in a website address.

3. It will return a set of numbers, separated by periods.

Type those numbers into the address bar of you Internet browser

8.

Peripheral installation on a Network.

Designing Network

Settle on a peer-to-peer network or a client/server network. Pick you network system software. Pick a network language. Figure out what hardware you need. Decide on what degree of information security you need. Choose software and hardware solutions to handle day-to-day management

chores.

Rolling Out Your Network

Rolling out your network requires the following steps:

Run and test network cables. Install the server or servers if you’re setting up a client/server network. (If you

are setting up a peer-to-peer network, you typically don’t have to worry about any dedicated servers.)

Set up the workstation hardware. Plug in and cable the Network Interface Cards (NICs – these connect the

network to the LAN). Install the hub or hubs (if you are using twisted-pair cable). Install printers. Load up the server software (the NOS, or Network Operating System) if your

network is a client/server type. Install the workstation software. Install modem hardware for remote dail-up (if you want the users to be able to

dial into the network). Install the programs you want to run (application software). 

Managing Network(Printer):

Page 10: Network Design for a company

Printer can be added to any department and further it can be shared to all the department as shown in the figure.

Print Inspector can be used for further easy accessibility. Print Inspector immediately starts monitoring any printer added to the list of monitored printers. The program captures all jobs sent to the printer by computers in the network. When a job is done, the program writes information about it to the database.

Submitted by Roshan Basnet

306939