Chat with us, powered by LiveChat Literature Review: Design and Implementation of Network between main branch and Workshop branch of it and its security project.(2500-2800 words) | All Paper
+1(978)310-4246 credencewriters@gmail.com
  

Add Literature Review into my project:Chapter 2 Literature Review of:-Introduction in the Literature Review 2.1 Wide area network..2.2-Site to site VPNs.2.2.1 Dynamic Multi point VPN.2.2.2 Easy VPN.2.3 Other hardware’s2.4 Ethernet2.5 Network Interface Card (NIC).2.6 Role Hub distributor and Operator Switch.2.7 VOIP2.8 Summary-References:you can see the sample for better understanding. (((Please include figures!!!!!!)))(((2500-2800 Words)))((((Same structure as the sample please))))(((No Similarity please!!!!!))The Sample is Below!!and MY project Below!!
sample.docx

my_project.docx

Unformatted Attachment Preview

Majan College (University College)
Department of Information Technology
Design and Implementation of
Network between Bhawan Group
head office and the branches of it and
it security.
Student ID: – 27015
Page 1
Contents
Chapter 1 …………………………………………………………………………………………………………………………4
Introduction……………………………………………………………………………………………………………………..4
1.1-Project Background. ………………………………………………………………………………………………. 4
1.2 Motivation. ……………………………………………………………………………………………………………. 5
1.3 Aim. …………………………………………………………………………………………………………………….. 5
1.4 Objectives …………………………………………………………………………………………………………….. 5
1.5 Scope of the project:- ……………………………………………………………………………………………… 5
1.6 Problem Statement: ………………………………………………………………………………………………… 6
Chapter 2 …………………………………………………………………………………………………………………………7
Literature Review …………………………………………………………………………………………………………….7
Introduction ………………………………………………………………………………………………………………… 7
2.1 Wide Area Network ……………………………………………………………………………………………….. 7
2.2 Site-to-site VPNs …………………………………………………………………………………………………… 8
2.2.1 Dynamic Multipoint VPN…………………………………………………………………………………11
2.2.2 Easy VPN
………………………………………………………………………………………..13
2.3 Other hardware do I need ………………………………………………………………………………………. 15
2.4 Ethernet ………………………………………………………………………………………………………………. 15
2.5 (Network Interface Card NIC) ……………………………………………………………………………….. 15
2.6 Role Hub distributor and Operator Switch:- …………………………………………………………….. 16
2.7 VOIP:- ………………………………………………………………………………………………………………… 16
2.8 Summery …………………………………………………………………………………………………………….. 17
Chapter 3 ……………………………………………………………………………. Error! Bookmark not defined.
Analysis …………………………………………………………………………….. Error! Bookmark not defined.
3.1 Interview ……………………………………………………………………Error! Bookmark not defined.
3.1.1 Summery of the interview …………………………………….. Error! Bookmark not defined.
3.2 Questionnaire. …………………………………………………………….Error! Bookmark not defined.
3.3 Requirements Specifications …………………………………………Error! Bookmark not defined.
3.3.1 Functional requirement. ………………………………………… Error! Bookmark not defined.
3.3.2 Non-Functional requirements ………………………………… Error! Bookmark not defined.
3.4 Cost Analysis ……………………………………………………………..Error! Bookmark not defined.
Chapter 4 ……………………………………………………………………………. Error! Bookmark not defined.
Design ……………………………………………………………………………….. Error! Bookmark not defined.
4.1 Changes the LAN (Local Area Network):- ……………………..Error! Bookmark not defined.
4.2 LAN (Local Area Network) at the remote sites:- …………….Error! Bookmark not defined.
Page 2
4.3 WAN (Wide Area Network):- ………………………………………Error! Bookmark not defined.
4.4 IP address Table:- ……………………………………………………….Error! Bookmark not defined.
4.5 Test Plan:- ………………………………………………………………….Error! Bookmark not defined.
Chapter 5 ……………………………………………………………………………. Error! Bookmark not defined.
Implementation …………………………………………………………………… Error! Bookmark not defined.
1. Route:-………………………………………………………………………Error! Bookmark not defined.
2. Switch:- …………………………………………………………………….Error! Bookmark not defined.
3. PC:- ………………………………………………………………………….Error! Bookmark not defined.
.4 VOIP: ……………………………………………………………………….Error! Bookmark not defined.
Chapter 6 ……………………………………………………………………………. Error! Bookmark not defined.
Testing ………………………………………………………………………………. Error! Bookmark not defined.
➢ PC 1 (192.168.5.10) can access to FTP & WEB. ……………Error! Bookmark not defined.
➢ PC 2 (192.168.5.20) can access to EXCH & data & DNS. Error! Bookmark not defined.
➢ 192.168.2.0 Network can access to all servers. ………………Error! Bookmark not defined.
➢ PC 7 (192.168.3.10) can access to all servers. ………………..Error! Bookmark not defined.
➢ PC 8(192.168.3.20) can’t access to all servers. ……………….Error! Bookmark not defined.
Chapter 7 ……………………………………………………………………………. Error! Bookmark not defined.
Project Management ……………………………………………………………. Error! Bookmark not defined.
7.1 Outline:- …………………………………………………………………….Error! Bookmark not defined.
7.2 Project Gant Chart:- …………………………………………………….Error! Bookmark not defined.
7.3 Project Milestone:- ………………………………………………………Error! Bookmark not defined.
Chapter 8 ……………………………………………………………………………. Error! Bookmark not defined.
Evaluation and conclusion and references ………………………………. Error! Bookmark not defined.
8.1 Evaluation:- ………………………………………………………………..Error! Bookmark not defined.
8.2 Conclusion …………………………………………………………………Error! Bookmark not defined.
8.3 References ………………………………………………………………….Error! Bookmark not defined.
Page 3
Chapter 1
Introduction
1.1-Project Background.
This project about Bahwan Group Company & connectivity between their branches.
This group specializes in most of the sectors of vital and important in the country
the auto trade is one of the largest and richest sectors of the company.1975 is the birth of
the company since then, The Company has shown strong growth and progress since its
inception.
Currently the company after its creation, evolution and strong growth over decades
involve improving and strengthening the country economy. And have huge number of
employees in many branches around Oman.
Include all areas engineers and other professionals in all departments that connected with
the company head office directly. Company Head office located in Muscat. Due to the
company’s development in Auto Marketing /sales, auto spare parts must be available in
other branches away from Muscat. The company owns four other branches as follows:
Sohar, Sur, Nizwa and Salalah. Head office in Muscat has the data base, to be shared to
all these location; there is team of staff working on some different projects. The head
office in Muscat
We believe that at the current time has been growing a large number of projects in which
the company operates. For this reason, it is great to participate in how to work on the
project management of all the effort and work with high efficiency. And we all know that
the main problem is a vital network connection. Since Muscat head office in Muscat has
local network with which the main building only, problem however no network between
other branches, we find great difficulty in communication between these are branches.
The company Headquarter management has to take a step further to increase the
capability for their existing network, by upgrading the network to centralized framework.
So they decided to install new and powerful devices in term to boost connectivity and
security, which will connect the branch offices to the head office in Muscat so
eliminating segregation between branches so to be able to reach the information stored
with, and communicate them in a way that directly and easier and more efficient at the
moment.
I will work on this project to develop a simple network that is currently in the main office
so that we can install servers. We will design a network so that we can connect the main
office to other offices .This will facilitate the network to all staff.
Page 4
1.2 Motivation.
Bahwan Group the Company operates in order to increase demand in the connection that
you use the company. This requirement may help the administration to take action change
on the system, and help to develop and make the process easy and without any problems
and cheaper in the long run. Because I am newly working with the company, I have been
qualified to take on sorting various of important points to start with. This is a great
opportunity for me to use my experience in helping to solve this problem, and will help
my company to develop and expand in the future.
1.3 Aim.
The aim in this project is the work of the design help resolve network requirements in
Bahwan Group Company, and is working to help all staff their communication process
between the branches and to implement all security measures in order to make the
network reliable.
.
1.4 Objectives
The main objectives that I have worked on this project are:
• Action Plan suitable for network and the company’s needs.
• Improving the existing local area networks of five branches by redesigning
• Design and for current local head office in order to be allowed to install additional
servers.
• Design and Implementation of the suitable Wide area network technology.
• Provide security between the branches and within the individual networks.
1.5 Scope of the project:• Upgrade must be done in the network currently being used in order to be allowed to
install the server.
• The work of a network connecting four branches of the main branch in Muscat.
• Test and work experience network by simulating the environment and ensure that its
functions.
Page 5
1.6 Problem Statement:
Problems that exist and facing in the current network:
• No internet for communication between branches, and this means that the four
branches would be unable to reach the resources that are found in the main
branch.
• There are many problems in the existing network due to poor design.
• Network extension is one of the main issues in all four branches.
• Poor network performance at peak hours.
• The company is currently facing many costs because of the current system
because of the distance between the branches in order to navigate and the cost of
calls made between them.
• The company is also facing many security issues from external and internal
threats due to which security is a major concern.
Page 6
Chapter 2
Literature Review
Introduction
The goal is important that I work in the current section is how to collect points and task
information in many types and range in different network technology available in the
region and the way your sales operation through configuration. The research will lead to
understanding more different types of these technologies and process of the
configuration.
2.1 Wide Area Network
To connect deferent buildings or locations ,Wide Area Network(WAN) only can provide
that kind of communication ,in the same area or town ,cities ,countries ,continents, to
achieve that goal ,perfect setting will keep the world connected to your PC all time any
place. Various types of protocols and ways can be used lead the project successfully
accomplished. I will work to communicate between branches through WAN. Many
different organizations use this type of network.
From the authors (Grevers & Christner-Jan, 10- 2012), we can comprehend that,
plurality of the remote locations depend on a network connection. Various mediums are
used in these remote locations to carry the data using elements Using fiber optic, ISDN,
Through Ethernet. These types carriers in WAN contacts exchange The many kinds of
datum It is possible that the process of data transfer and e-mail messages is done by end
users, media streaming, Way information transfer application of these types of sharing
being carried and Therefore transmitted through the use of communication WAN. By the
innovation & increase in different Therefore we see the multiplicity in traffic huge
demands on the network, which needs to transmit and share great amounts of data traffic.
The planning of the company network is being designed by their need and requirements,
Ordinary concepts in resent time are fast moving away from been used, Shifting to new
powerful. This companies going forward to to customer service it is a sign extra data and
then increasing traffic in the network.
In this project Bahwan company is likewise touching forward in the server and clients.
For that reason a Wide Area Network We believe that this is of great importance for
everyone to benefit from it these. Therefore we required to find best settlings. The
resolution is sometimes called “Solutions in Higher Space Dimensions”. We find there
several potential resolve in issue, to successfully connecting two points; communication
between each other will be more efficiency. This settlement can be done after accurate
considerations of the requirements.
Page 7
2.2 Site-to-site VPNs
Figure 1 (Myself drawing)
“Virtual Private Network (VPN) it is a private network is generated within the
infrastructure of a public network, such as the World Wide Web. Companies can use a
VPN to create a secure connection remote offices and remote users with access to the
Internet through a third party at a reasonable cost, instead of creating a WAN links and
costly custom or remote dial-up links that extend over long distances.”
And institutions can use the VPN network to reduce the cost of bandwidth wide area
network (WAN), with connection speeds increase at the same time depending on your
Internet connection with high bandwidth, such as digital subscriber line (DSL), Internet
or cable.
And provide virtual private network with the maximum possible level of the security by
authentication techniques and network paths based VPN Internet Protocol security
(IPSec) encrypted or Secure Sockets Layer (SSL). Each of these techniques used to
protect data transmitted over networks VPN from unauthorized access. Companies can
make use of the Internet infrastructure easy savings for VPN networks in adding sites or
new users at a fast pace. In addition, they can also increase access to VPN networks
without the need for substantial investment in infrastructure expansion
Page 8
Figure 2
http://www.interpeak.com/products/ipsec.html
“IPSec
Web definitions
Internet Protocol Security (IPSec) is a protocol suite for securing Internet Protocol (IP)
communications by authenticating and encrypti…”
Became both networks, virtual private based on the Secure Sockets Layer ( VPN) and
private networks default based on the Internet Protocol security encrypted (IPsec VPN) as
a major solution to networks VPN dealing that are linking all far offices and all far users
and business partners; because they:
• The communicaatin is governed by the by the allocated access rights that were
asigned to eache user, Ex. Emoplyes, contractors and business partners.
• Encrease productivity through the expansion of the network and applications for
your organization.

Page 9
reduce communication costs and increase flexibility.
There are two types of encrypted VPN networks namely:
• Virtual Private Network based IPsec encrypted (IPsec VPN) from site to site:
represent alternative networks wide (WAN) based on leased lines or Frame
Relay, that make it posable fo the company to extends all network resources to
their brahches, emploies home and all busines partners sites.
• Virtual Private Network (VPN) for remote access: you connect any application
data, audio or video to the remote desktop, including comparable desktop at
headquarters. The network can be deployed VPN for remote access using SSL or
IPsec VPN or both according to the requirements of publishing.
Original
IP
Header
TCP
header
Data
IP
IPSec
header
TCP
header
Data
IPSec
header
IP
header
TCP
header
IP packet
Transport mode header
protection
packet
Tunnel mode
IP
header
Data
Protected packet
Figure 3: Difference between the different modes
Now we become to know that there are other parts of the architecture from the same
author (Doraswamy & Harkins, 2003).
They are:
• In the VPN peers are exchanging the keys and security services through the
security assembly.
• The data traffic is controlled by policies. The policies work through recognizing
the traffic and then set the policies according to the traffic type. These policies
contain the different types of security for multiple traffic (e.g. 3DES and HMACSHA for telnet and AES and HMAC-MD5 for subnet).
Page 10
• “(IKE) Internet Key Exchange let the actual security association and detects the
security parameters for the certified keys between the peers. In different way by
using (IKE) the peers share the security information.
There are many ways to perform VPNs that has capabilities from the basic IPSec
VPNs. by relaying on the basic architecture of the IPSec VPN after all they add
extra capabilities.”
2.2.1 Dynamic Multipoint VPN
Figure 3(Myself drawing)
From the author (Chris Lewis and Steve Pickavance, 2006) we become to know that
“(DMVPN) Dynamic Multipoint Virtual Private Network, used for managing high tally
IPSec networks. It works based on the IPSec hub and spoke architecture, to allow for
extension to a complete dynamic and meshed VPN.”
“The interest of accomplishment (DMVPN) is to fit scalability, like the protocol will let
for the addition for new sites with fewer configurations. (DMVPN) will allow for IPSec
to organize on any point-to-any as-required basis. The configuration of (DMVPN) needs
the use to find peer and mapping dynamic authentication with security codes.”
Page 11
There are two ways to implement it which are
– “The (TED) Tunnel Endpoint Discovery”.
– “The (NHRP Clint) Next-Hop Resolution Protocol along with Multipoint (mGRE
interface) for encapsulation.”
“In short, the way (DMVPN) works is by usi …
Purchase answer to see full
attachment