Chat with us, powered by LiveChat Chapter 3 Design And Implementation Of Network Analysis Help | All Paper

Add Analysis into my project:Chapter 3 Analysis of:-The goal of this chapter.-3.1 Interview.-3.1.1 Summary of the interview.-3.2 Questionnaire.(“at least 8 questions with charts)-3.3 Requirements Specifications.-3.3.1 Functional requirement.-3.3.2 non-functional requirements.-3.4 cost analysis you can see the sample for better understanding.(((No plagiarism please!!!!!))The Sample of analysis Below!!and MY project Below!!((1500-2000 words))


Unformatted Attachment Preview

Chapter 3
The goal from this chapter is what product is need for the company. This analysis and
interview done by people they work in IT department to know the requirement. And is
some discussion with the staff to take advantage of their expertise to know the material
for the network.
3.1 Interview
To get the direct information will use the interview method. And is some discussion with the
staff to take advantage of their expertise to know the material used for the network. The
interview was conducted with the department head information system and network engineering
at Saud Bahwan Group. Interview focused on the technical aspects of the networks. And after the
interview was taken conclusions, suggestions and analysis.
What is the style communication between the branches at this moment?
The communication between branches is by email and phone and fax. For all branch there are
internet to connection together by ADSL for business presented by local ISP to send and receive
email. In all branches there have fixed phones and connected to servers and fax machines.
Majority of employees have cell phones to communicate with each other.
What problems you may encounter?
There are many problems which that faced of communication used:
• Company will spend money for internet and line phone and mobiles. That is big
part of the company budget.
• There is another problem that method of communication is ineffective.
• The company has another problem faced with the Department of Information
Section. That does not have a centralized system.
When making a new network what requirements will need?
• Develop the management information .Company look for the centralized servers
and system to have improved access to all data and programs and application.
• They liked to be the system more highly security and can reliable it.
• There is another important factor which is the cost. The new network most help the
company to decreasing cost for long time
• Should use the Security and IP technology and security with VPN.
Page 1
What you are building over implementation on network?
To build you most plan such as:• To store all date file should have centralized server.
• For email and website must have web server.
• If you have something in messages and communication must know the solutions.
• In future those plan to implant management application server.
3.1.1 Summery of the interview
We understand from the interview the requirements technical for the company most have
a high security network it use VPN. Improve the information management. For each
branch need ADSL to connection together. And centralized severs for head office to
access to network.
3.2 Questionnaire.
1. What is the way you use your computer?
PC Use
Mostly Offline
Mostly Online
Don’t use the PC
Remote user
We find that a large number of those who use the computer on the Internet. And a small
number use it without internet
Page 2
2. What is the method of communication between you and your office?
Instant Messeging
There are a large number of users are communicating with each other through the
contact, but this is costly and others through e-mail messages
Page 3
3. A number of the most important issues in information technology?
Axis Title
No Company Email
No centralized
No intranet
Bad tech support
We find that users here differed greatly choices and everyone has chosen best
4. How would you like to be a process to connect to the network?
Connect to office
Outside Office
Page 4
Don’t use netowrk
The graph shows the majority favored that uses the network from the office, many of
whom they said want to be contacted from remote locations either remaining little not
like in the use of the network.
5. How do you see yourself in the IT?
IT Skills
Don’t use PC
We believe that a very large percentage of users have skills in it and some computer users
do not have the skills and a few very not know how to use computer.
6. Do you have security password in your company when you login to your computer?
Login Password
Page 5
The graph show how many persons have login password, there are 85% told we have
password, and 15 % they doesn’t use password in them computer.
Page 6
3.3 Requirements Specifications
After we finish the analysis of interview and questionnaire will we know about
requirement for the system? The requirements are divided to two parts. First one is
functional and second non functional.
3.3.1 Functional requirement.
The functional requirement specifies what actions are required in order to operate their
work and provide the user demands. Maybe cannot work the system. Maybe unusable
without this. The functional requirement for system is:• The network should connect to head office and branches.
• LAN should able to access the new server. That will be able for users.
• Should be implemented a centralized management of the network.
3.3.2 Non-Functional requirements
Non-functional requirements are the characteristics of the system that need to be fulfilled
to have a successful solution of the company. These are not wanted for the system to
function, but adds a value to the solution and makes it best. Non-functional requirements
of the system are:
• Reliability: You must be trusted network to make sure that users are able to access
the network when the requires, which is designed to work.
• Usability:-Should the network be easy to use, that will allow limit configuration
by users. And make it easier for connect them to network and access all the needed
• Security: – Should network be secure. By using the encryption and credibility.
3.4 Cost Analysis
There are many costs for the items in the project. That cost is show in the table.
Page 7
R.O. 800
R.O. 280
R.O. 4
R O 1200
Router cost for 1 PC
Switch cost for 1 PC
Wire cost for 1 meter
Server cost for 1 PC
Page 8
Design and Implementation of
Network between Al-Ahli L.L.C
main branch and Workshop
branch of it and its security.
Chapter 1: Introduction of the Project
1.1 Background
Alahli LLC is a company that is renting and selling light equipment for oil
companies and other companies that are working at night. They also
manufacture traffic lights and radars. The company offers very good services
for clients and their products are on high demand especially in the desert where
oil companies have to work night shifts. The company has two buildings, one is
the main building in Muscat and the other is the workshop in Alwadi Alkabeer.
Main building has four departments: Human resources, Sales and Marketing,
Engineering and Accounting.
1.2 Problem Description
The main problems in this company are difficulties in communication between
the two branches and also there are difficulties in communication between the
employees from different departments. The design is neither flexible nor
reliable. In addition, there is no wireless connection in the current network.
Moreover, the exiting security mechanism in the network is very low and there
are no redundant links for backup.
1.3 Problem Statement:
Existing problems in the Existing network:
• No internet for branch-to-branch communication, so this implies that
either the two branches will be unable to reach each other.
• The existing network has many problems due poor design.
• Extension of the network is one of the main problems for the branches.
• Poor, peak-hour network performance.
• Currently, because of the distance between the branches and the cost of
calls between them, the company is facing many costs.
• The company faces many external and internal security threats, which
are a major concern for safety.
1.4 Limitations
The current network system often loses the service, which will lead to loss some
of data.
So, we have to improve network availability and provide high
performance. Also, the design of the network wiring is very complex. Therefore,
we must improve the connecting wires smoothly and make them more
To design this network there are some limitations to be considered:

Technical constraints:
o The network design should support the applications and services
that are used in the company.

Budget constraints:
o The company has limited budget, so we have to manage the cost
of equipment’s as much as possible without compromising the
network reliability and flexibility.

Organizational constraints:
o The company does not have an IT department, so we should
train employees to deal with the network and maintain it.
1.5 Purpose & Objectives
1.5.1 General / Business Goals

To upgrade the existing network for Main Office.

To design a new network for the workshop.

To integrate the network for the given company by connecting the
main office and workshop.

To design a scalable network that can handle more numbers of users
(growth rate = 100% in next 5 years).

To build a reliable & flexible network by providing redundant paths &
devices, so that it will be available for the users all the time.

To implement the security mechanisms to secure the data and

To provide a secured wireless connection in main office as well as in

To provide different network services and applications to the users.
1.5.2 Specific Objectives

To use VLAN’s in the Main office to improve the network

To Design a new LAN for workshop.

To connect between the main office and the workshop by using WAN PPP

To use redundant links between the network devices and use STP Protocol to
eliminate loops.

To configure Port-Security, SSH, NAT, ACL and to improve security of the

To use encrypted password for wireless in the main office and the

To use file server, web server and DHCP server.

To use IPv4 addressing scheme.
1.6 Scope of the project

The network currently used for installation of the server must be upgraded.

The work of a network connecting the main branch to the workshop.

Simulation of an environment by testing and working experience network and
ensuring its function.
Chapter 2: Literature Review
There has been massive growth in cloud computing, internetworking
technologies and social networking technologies (Forouzan and Fegan, 2007). As a
result, the need is regularly increasing that the Network Engineers across the world
update their connections. Network performance is a critical factor in the productivity
of any organization. One of the technologies popular today in the improvement of
network performance is separating big broadcast domains to smaller ones. Network
Engineers intends to lower the need for utilizing expensive routers. Moreover, when
dealing with networking, they prefer data transmissions that are more secure in
minimizing traffic. Networks have been perceived to be critical when connecting
organizations together in addressing meta-problems, advantages such as competencies,
improved communication and innovation potential.
Communication being a universal currency that connects businesses and ensures
effective operation in companies, computer networks has become appropriate among
all businesses (Forouzan and Fegan, 2007). The mainstream of networking technology
has proven to exist as a necessary means of enhancing proficient, streamlined and
flexible communication while maximizing productivity and resources. The desire to
leverage the strength, spread risks, learn and increase recognition is among the internal
reason that companies require computer networks. In showing how different computer
systems works, I will provide various network technology. This paper will provide
knowledge on the operation of various networking technologies currently available in
the market.
2.1 Wide Area Network (WAN)
WAN is perceived as a communication network whereby devices span over a
geographical area (Cooperman 1999). This kind of network involves an
interconnection across geographic areas having multiple Local Area Networks. This
form of network is typically presented as a spider web. This kind of network is
established with leased telecommunication paths.
WAN allows businesses to function notwithstanding of the location effectively.
This kind of Network connects LAN as well as other networks to allow computers
located in one place to be used to communicate with computer found in other areas
(Cooperman 1999). WANs are typically created using leased lines whereby at each
end a router is connected to LAN on one side and another router with the other end of
LAN. Since leased lines are expensive, network engineers can use packet switching or
circuit switching. In this form of connection, network protocols such as TCP are used
to address and transport functions. Moreover, protocols such as framework relay,
Multiprotocol Label Switching, Packet over SDH and Asynchronous Transfer mode are
mostly utilized when delivering links used in WANS. Various technologies use WANS;
for instance, the radio wave transition, and circuit-switched telephone lines as well as
optical fiber are among the application of this form of networking.
The private and the public cloud are presented as the biggest game-changer in
WAN (Cooperman 1999). Because of the great utility of services by public cloud,
service demands the shifting of the conventional WAN that Involves hub -and -spoke
scheme to the model of distribution whereby services get distributed over an internet
connection in every location. This helps in the reduction of load above the corporate
backbone. In contrast, the private cloud pays attention to the hub-and-spoke, a model
that affords the control of IT over latency, circuit quality, overall performance and
service quality. Therefore, it is essential for the organizations that prefer WAN to
understand the kind of cloud strategies not to mention the expected performance level
of the business and the income they are willing to spend. Proper architected services of
a private cloud are superior as compared to the public cloud based on the internet,
although it is expensive.
2.2 Site to Site VPN
This kind of Network allows offices found in multiple locations to establish
with each a secure connection over a secure network such as the internet (Deal, 2006).
Moreover, this kind of a system is used by companies to extend their Network by using
a computer resource from one point that can be accessed by the employer in other
different locations. Site-to-site VPN is used by an organization that has many branch
offices across the globe. Site-to-site VPNs exist in two types, namely the Intranet and
the Extranet-based. The internet-based is used in a scenario where an organization has
either one or many remote locations that they want to connect in a single private
network. In that way, the can make an intranet VPN to join each other LAN separately
to one WAN.
On the other hand, Extranet based is used when a business is partnering with
another organization. In this kind of a scenario, an extranet VPN is used to link the
LAN of those companies (Nnadi, 2013). This VPN permits the two companies to
function collectively in a shared and secure network environment as they prevent
interference of their separate intranets. Even if the function of the site to site VPN is
distinct from the remote access VPN, it can function under the same equipment and
software. Almost all VPNs depend on tunneling when creating a private network
reaching through the internet. Tunneling refers to the process where the entire packet
is placed within another packet before it is elated over the internet. The outer packet
protects the content from being viewed by the public (Nnadi, 2013). Additionally, the
outer packet confirms that the packet travels with a virtual tunnel. The function of the
tunneling protocol is adding a layer of security protecting each packet on its
transportation over the internet
2.2.1 Dynamic Multipoint VPN
According to Alchaal and Duda, 2005, Dynamic Multipoint VPN (DMVPN)
can be used in creating a VPN network without statistically configuring all devices in
multiple sites .This form of routing technique allows spokes to the communication
directly with each other without going through the hub. When encrypted through IPsec,
it can connect various sites through a regular internet connection. This form of
connection is mostly used as a backup or even a supplement to networks such as VPN
and MPLS (Alchaal and Duda, 2005).
When using this kind of network, people can exchange data in various locations
without passing through the VPN server in the organizational headquarter. The
distribution of Dynamic Multipoint VPN is used in the mechanism; for instance, the
IPsec encryption and GRE tunnelling through the NHRP routing designed to lower the
administrative burden and offer reliable dynamic connectivity between sites (Alchaal
and Duda, 2005). The utilization of DMVPN helps to reduce the cost of WAN and helps
to increase the reliability and bandwidth. The figure above illustrates two spoke routers
that create a tunnel in the direction of the hub router (Alchaal and Duda, 2005). In the
configuration, the IP address destination in the hub router is supposed to configure
statistically on the spoke routers. The routers that are used utilize the request message
sent through NHRP registration when registering the IP address in the hub. The
importance of this connection is that it lowers the operational and capital expenses.
Moreover, it reduces the deployment complexity as well as improving the resilience of
the business.
2.2.2 Easy VPN
According to the Cisco framework, the Easy VPN solution unifies the
management of VPN across the VPN devices (Nnadi, 2013). The Cisco solution
provided by the Easy VPN integrates the remote tools of the VPN in a single positioning
and with a critical management method and consistent policy that streamlines the
remote site administration. The Easy VPN is made up of two components, which
include the Easy VPN Secluded feature that minimizes the configuration requirements
in a remote location. It allows the Cisco IOS routers, Adaptive security appliances,
Cisco ASA 5505, Cisco PIX security Appliances not to mention the Cisco VPN client
who receives security policies when a VPN tunnel is connected from an Easy VPN
server. This acts as an ideal solution for the offices in secluded areas where there is
little IT support. This makes the configuration of the VPN to easy hence minimizing
the local support of it, as well as reducing costs and increasing productivity.
The second component involves the feature of a VPN server that allows the
Security Appliances, Cisco IOS routers and the Cisco adaptive appliances (Nnadi,
2013). This type of characteristics compels the security politics at the central site in the
direction of the remote devices so that it has renewed policies before the establishment
of the connection. This kind of network has a feature that eliminates tedious work
configuration through the use of utility client protocol which permits the majority of
the VPN that includes internal subnet masks, internal IP addresses, DHCP server
addresses, split tunneling flags and WINS server addresses. The Easy VPN has a feature
that only supports configuration of one destination. Therefore, if your application
requires the development of many VPN tunnels, ones are supposed to configure the
Network Address and IPSec VPN manually.
2.3 Other Hardware’s required in a networking
Accor …
Purchase answer to see full