Vous êtes sur la page 1sur 9

Information on VoIP Business Solutions

VoIP-Business-Solutions.org
VoIP Business Solutions
Top of Form

Search Go

Bottom of Form
January 30, 2011

Thesis Feasibility Study And Proposal


Structured Cabling Plan For Sonic Computer
Shop
University of the EastCollege of Computer Studies and System
STRUCTURED CABLING Thought FOR SONIC COMPUTER SHOP#633-A Gastambide,
Sampaloc, Metro Manila
TABLE OF CONTENT
Dedication ——————————————————— i
Acknowledgment ——————————————————— ii
Group pictures ——————————————————— iii
SECTION I —- NETWORK DESIGN
Introduction ——————————————————— 1
Business background ——————————————————— 1
Proposed logo ——————————————————— 1
General objective ——————————————————— 2
Specific objectives ——————————————————— 2
Expectations ——————————————————— 2
Possible expansion ——————————————————— 2
Hosts specifications ——————————————————— 2
Physical design
• Existing ——————————————————— 3
• Proposed ——————————————————— 4
• Legend ——————————————————— 5
Logical design
• Existing ——————————————————— 6
• Proposed ——————————————————— 6
• Legend ——————————————————— 6
DEVICES
Cable Specifications ——————————————————— 8 Networking
Equipments ——————————————————— 9 Contingency Planning
——————————————————— 12
SECTON III —- INTERNET CONNECTIVITY/NETWORK MANAGEMENT
Lan / Wan Connectivity ——————————————————— 14
IP distribution ——————————————————— 17
SECTION IV —- SECURITY
Restrictions and Privileges——————————————————- 18
Contingency planning ——————————————————— 19
SECTION V —– RECOMMENDATIONS
Recommendations ——————————————————— 21
References ——————————————————— 22
Curriculum Vitae ——————————————————— 23
CABLE SPECIFICATION
The Sonic Computer Shop uses UTP (Unshielded Twisted Pair) Cable Category 5 with a race of
100 mbps that uses 100BaseT Ethernet and has a length of 100m. Most cables are unshielded,
relying on the twisted pair design for noise rejection, and some are shielded. The computer shop
uses 568 A standards in their UTP cable color coding. They also obsolete a cable type of straight
through.
GIGABIT ETHERNET (GbE or 1 GigE)
Is a term describing various technologies for transmitting Ethernet frames at a rate of a gigabit
per second, as defined by the IEEE 802.3-2008 standard. Half-duplex gigabit links connected
through hubs are allowed by the specification but in the marketplace full-duplex with switches
are normal. NAMEMEDIUMSPECIFIED DISTANCE 1000BASE-CX Balanced copper
cabling 25 meters 1000BASE-SX Multi-mode fiber 220 to 550 meters dependent on fiber
diameter and bandwidth 1000BASE-LX Multi-mode fiber 550 meter 1000BASE-LX Single-
mode fiber 5 km 1000BASE-LX10 Single-mode fiber using 1310 nm wavelength 10 km
1000BASE-ZX Single-mode fiber at 1550 nm wavelength 70 km 1000BASE-BX10 Single-mode
fiber, over single-strand fiber: 1490 nm downstream 1310 nm upstream 10 km 1000BASE-T
Twisted-pair cabling (CAT-5, CAT-5e, CAT-6, or CAT-7) 100 meters
NETWORKING EQUIPMENTS
Network switch is a computer networking device that connects network segments. The term
commonly refers to a network bridge that processes and routes data at the data link layer (layer
2) of the OSI model. Switches that additionally process data at the network layer (layer 3 and
above) are often referred to as Layer 3 switches or multilayer switches.
The term network switch does not generally encompass unintelligent or passive network devices
such as hubs and repeaters. The first Ethernet switch was introduced by Kalpana in 1990. The
network switch, packet switch (or just switch) plays an integral part in most Ethernetlocal area
networks or LANs. Mid-to-large sized LANs have a number of linked managed switches.
A router is an electronic device that is used to forward data between computer networks. The
company uses 1 Dlink router and 2 Edimax switches. The router has 4 ports while the switch has
32 ports.
Technical Specifications
Standards

IEEE 802.3 10Base-T Ethernet

IEEE 802.3u 100Base-TX Fast Ethernet

IEEE 802.3 NWay Auto-Negotiation
Advanced Firewall Features

Network Address Translation (NAT)

MAC Filtering

Website Filtering

Scheduling
Device Management

Internet Explorer v6 or later; or other Java-enabled Browsers
Certifications

FCC
Led

Power

WAN

Local Network—10/100Mbps
Operating Temperature

32°F to 131°F (0°C to 55°C)
Operating Humidity

90% Maximum (Non-condensing)
Dimensions

Item (WxDxH): 4.5″ x 5.9″ x 1.4″

Packaging (WxDxH): 8.3″ x 10.9″ x 2.7″
Weight

Item: 0.5 lbs

Packaging: 1.6 lbs
Warranty

1 Year*
Minimum System Requirements

Cable or DSL Modem

Computer with:

Windows® XP SP2 or Windows 2000 SP4**

Internet Explorer 6

CD-ROM Drive

Network Interface Card
Package Contents

Ethernet Broadband Router

CAT5 Ethernet Cable

Power Adapter

CD-ROM*** with:

Installation Wizard

Product Documentation
The network switch, packet switch (or just switch) plays an integral fragment in most
Ethernetlocal region networks or LANs. Mid-to-large sized LANs contain a number of linked
managed switches. Small office/home office (SOHO) applications typically use a single switch,
or an all-purpose converged device such as gateway access to small office/home broadband
services such as DSL router or cableWi-Fi router. In most of these cases, the waste user device
contains a router and components that interface to the particular physical broadband technology,
as in the Linksys 8-port and 48-port devices. User devices may also include a telephone interface
to VoIP.
In the context of a standard 10/100 Ethernet switch, a switch operates at the data-link layer of the
OSI model to get a different collision domain per switch port. If you have 4 computers A/B/C/D
on 4 switch ports, then A and B can transfer data between them as well as C and D at the same
time, and they will never interfere with each others’ conversations.
In the case of a “hub” then they would all have to share the bandwidth and run in Half duplex.
The result is that there would be collisions and retransmissions. Using a switch is called micro-
segmentation. It allows you to have dedicated bandwidth on point to point connections with
every computer and to therefore run in Full duplex with no collisions.Manufacturer: Edimax
Product MPN
MPN ES-3124RL
Key Features
Type Ethernet Switch
OSI Layer Layer 2
Interfaces
Ports 24 x 10Base-T/100Base-TX (RJ-45)
Performance
MAC Address Entries 8000
Standards and Protocols
LAN Standards IEEE 802.3 CSMA/CD or Ethernet • IEEE 802.3u 100 Mbps (Fast Ethernet) •
IEEE 802.3x Flow Control
Switching / Forwarding Method Store-and-forward
Dimensions
Height 4.5 cm
Width 44.5 cm
Depth 12 cm
Weight 1.8 kg
Miscellaneous
UPC 4710700920046
CONTIGENCY PLANNING
If there are problems or failure in internet connection they must confirm first the numbers of
users that are connected in one server, to verify if it is one of the causes to comprise a downtime.
The company may have an option to replace computer components, such as hard disks and
network adapters, to continue the connections if they have available or extra networking
equipments, and to let their customer change the terminal they use to another for the mean time.
They also must have reserved other internet line.
INTERNET CONNECTIVITY OR NETWORK MANAGEMENT
LAN AND WAN CONNECTIVITY
Local area network (LAN) is a computer network covering a small physical area like a
computer shop; it is connect the entire pc terminal to make use for games and to share
information to one another. It is very important to the costumers especially the gamers to connect
to their virtual game. Wide area network (WAN) is a computer network that covers a broad
position. They are not unlike a huge company that require a WAN but in comes to connectivity
in the procure.
Using the internet the costumer are using so for they can explore and manage to surf to the
network Dedicated dial-up uses a standard phone connection between your computer network
and our POP. The data rate is up to 56 kbps and is venerable primarily by individuals and
companies in a transitional plot between needing full-time connectivity to the internet and having
the resources to commit to frame relay or point to point. Due to the nature of dial-up lines, this
option has much lower reliability and throughput than ISDN, frame relay or point to point
connectivity. Dedicated dial-up is best suited for a growing internet access needs that are not
dependent upon high reliability or committed data rates.
Frame Relay is the most cost-effective full-time connection for medium to high rush Internet
access. In almost all cases, your costs will be less than veteran leased-line connections and even
ISDN. You can easily increase the bandwidth of your Internet connection as your needs grow.
Compared to aged leased line access, with frame relay you only pay the phone company for the
bandwidth you need and there is no mileage charge. In most cases, ISDN calls from a business
location are ‘metered’ and can result in unexpectedly high monthly charges by the phone
company if you maintain a full-time connection. Frame relay access to the Internet consist of two
determined components. In addition to the Internet access fees, you will also need the frame
relay circuit from your facility to the phone company’s local central office. The rest of the circuit
costs are paid by Minnesota OnLine and are included in your monthly access fees.
Please call Minnesota OnLine for an estimate or quote of your circuit costs. Minnesota OnLine
will order and coordinate the install and testing of your circuit with your local phone company.
Point-to-point high-speed digital dedicated service gives you complete access to the Internet
including e-mail, the World Wide Web, Gopher, file transfer, and Usenet newsgroups with
enhanced bandwidth for faster response. This service is provided over dedicated circuits from
your station directly to our network hub.
Access speed (bandwidth) is available at various levels: 33 kbps, 56 kbps, 128 kbps, 256 kbps,
1.54 Mbps, and transparent LAN connections at 10 Mbps. Pricing for Dedicated Services
consists of a one-time setup fee, monthly service fee, and telecommunications costs (where
applicable). Additional equipment may be needed for your network to take advantage of this
increased bandwidth. A dedicated high-speed connection can greatly reduce multiple individual
connectivity costs and allow greater ability to manage data that traverses your network. Some of
the benefits of Dedicated Service are:
• Costs are contained for additional users
• Security is enhanced with a single point of entry
• Internet accessibility for all users can be easily managed
• Increased bandwidth for all users
• Increased rush of data transmission
• Full time connectivity
• Transparent use for end-users
• No additional telco charges
IP DISTRIBUTIONPC NO.IP ADDRESSSUBNET MASKNETWORK
ADDRESSDEFAULT GATEWAY1192.168.0.1 255.255.255.0 192.168.0.0 192.168.0.1
2192.168.0.2 255.255.255.0 192.168.0.0 192.168.0.1 3192.168.0.3 255.255.255.0 192.168.0.0
192.168.0.1 4192.168.0.4 255.255.255.0 192.168.0.0 192.168.0.1 5192.168.0.5 255.255.255.0
192.168.0.0 192.168.0.1 6192.168.0.6 255.255.255.0 192.168.0.0 192.168.0.1 7192.168.0.7
255.255.255.0 192.168.0.0 192.168.0.1 8192.168.0.8 255.255.255.0 192.168.0.0 192.168.0.1
9192.168.0.9 255.255.255.0 192.168.0.0 192.168.0.1 10192.168.0.10 255.255.255.0 192.168.0.0
192.168.0.1 11192.168.0.11 255.255.255.0 192.168.0.0 192.168.0.1 12192.168.0.12
255.255.255.0 192.168.0.0 192.168.0.1 13192.168.0.13 255.255.255.0 192.168.0.0 192.168.0.1
14192.168.0.14 255.255.255.0 192.168.0.0 192.168.0.1 15192.168.0.15 255.255.255.0
192.168.0.0 192.168.0.1 16 192.168.0.16 255.255.255.0 192.168.0.0 192.168.0.1 17
192.168.0.17 255.255.255.0 192.168.0.0 192.168.0.1 18 192.168.0.18 255.255.255.0
192.168.0.0 192.168.0.1 19 192.168.0.19 255.255.255.0 192.168.0.0 192.168.0.1 20
192.168.0.20 255.255.255.0 192.168.0.0 192.168.0.1 21 192.168.0.21 255.255.255.0
192.168.0.0 192.168.0.1 22 192.168.0.22 255.255.255.0 192.168.0.0 192.168.0.1 23
192.168.0.23 255.255.255.0 192.168.0.0 192.168.0.1 24 192.168.0.24 255.255.255.0
192.168.0.0 192.168.0.1 25 192.168.0.25 255.255.255.0 192.168.0.0 192.168.0.1 26
192.168.0.26 255.255.255.0 192.168.0.0 192.168.0.1 27 192.168.0.27 255.255.255.0
192.168.0.0 192.168.0.1 28 192.168.0.28 255.255.255.0 192.168.0.0 192.168.0.1 29
192.168.0.29 255.255.255.0 192.168.0.0 192.168.0.1 30 192.168.0.30 255.255.255.0
192.168.0.0 192.168.0.1 31 192.168.0.31 255.255.255.0 192.168.0.0 192.168.0.1 32
192.168.0.32 255.255.255.0 192.168.0.0 192.168.0.1
SECURITY
RESTRICTION AND PRIVILEGES
The Sonic Computer Shop uses I-Cyber Café Software. It has its Print Monitoring that
automatically charged customers for printing, uses distinct rates for monochrome and color
printing. It also automatically locks each terminal to prevent an unauthorized use of a computer.
Protect it from logging in via Ctrl-Alt-Del, etc. Point To a customer session time or money left
after login. It also has a message box that a client can employ to send message to the server if
they need to say something. It also keeps track of the Internet websites and pages which a
customer opens while they are surfing the internet. Using Cyber Cafe Software the Sonic
Computer Shop has the privileges to restrict a sure web site that they want to block like adult
websites. With these privileges the viruses or any malicious programs can be prevented. And this
is more favorable if they have minor customers. With this software it can secure that all
terminals is automatically being monitored that no one can easily access or utilize the computers
without the authority from the server.

FIREWALL, ANTI VIRUS AND DEEPFREEZE APPLICATION


Sonic Computer Shop uses AVG Anti Virus Free Edition, Avast Free Edition and Comodo
Firewall. They consume two Anti Virus to filter all the files that may have viruses in computers.
AVG is an umbrella term for a range of anti-virus and Internet security software for the
Microsoft Windows, Linux, and FreeBSD computing platforms, developed by AVG
Technologies, a privately heldCzech company formerly known as Grisoft. Avast Antivirus is an
antivirusprogram developed by ALWIL Software as, a company based in Prague, Czech
Republic.
It is a multiple recipient of the Virus Bulletin VB100 Award, for detection of 100% of “in-the-
wild” viruses, and is a past winner of the Secure Computing Readers Trust Award Comodo
Firewall Pro (CFP; previously COMODO Firewall) is a freewarefirewall developed by Comodo
Group that provides protection on a Microsoft Windows operating system from both inbound
and outbound attacks. Comodo also has an open source firewall for Linux based systems called
Trustix. In an independent review consisting of leak tests in 2009, the freeware software Comodo
Firewall Pro version 3 received 100% on all tests.[3] Version 3.0 includes HIPS (Host Intrusion
Prevention System) technology called Defense+, to protect a computer from unknown attacks.
Comodo Firewall Pro has been integrated into Comodo Internet Security.
CONTINGENCY PLANNING
If their AVG Anti-Virus or Avast Anti Virus Free Edtion has been expired or malfunctioned,
they can download another anti virus like AOL Active Virus Shield, Avast Professional Edition,
Avira Professional Edition or Free Edtion and many more. There are many anti virus that are
downloadable from www.google.com and www.yahoo.com that they can use, and most of them
has a free edition and easily to update from the internet. For the security of their computer shop
they must have at least a hidden camera that can help them to monitor their customers while
using their computers. It is very useful because if there are times that their authorized personnel
left for just a moment and somebody theft some stuff or even went to their server and do
something unethically they can easily recover to that scenario to study who is responsible for that
incident.
RECOMMENDATION
The proponents of the seek recommends to the owner of the computer shop to at least have a
renovation inside their computer shop. This is to removal a small wall divider beside their
comfort room, for a bigger space. The proponents also recommend adding one air conditioner in
their second floor and if they have extra budget, they may change the location of their air
conditioner in their first floor in their ceiling for a cooler space. The proponents also recommend
Mr. Andres to have a surveillance camera for their security purposes.
REFERENCES:
http://www.computing.net/answers/netware/help-with-network-restriction/4310.html
http://en.wikipedia.org/wiki/Computer_networking_device
http://www.informit.com/articles/article.aspx? p=30191
http://en.wikipedia.org/wiki/Local_area_network
http://en.wikipedia.org/wiki/Wide_area_network
http://www.securityideas.com/caspgu.html
http://www.wifi-forum.com/wf/showthread.php? t=274197
http://www.interhack.net/pubs/network-security/
http://en.wikipedia.org/wiki/Network_security
http://www.networkworld.com/topics/security.html
http://www.edimax.com/en/index.php
http://en.wikipedia.org/wiki/Router
http://www.techwatch.co.uk/forums/9520-need-help-and-recommendation-on-networking-2-
computers.html
http://www.camiresearch.com/Data_Com_Basics/data_com_tutorial.html
http://en.wikipedia.org/wiki/Network_switch
http://www.cisco.com/en/US/docs/routers/access/hardware/notes/marcabl.html
http://www.docstoc.com/docs/11638701/Linksys-WRT54G3G-Router-Specification-Sheet

Vous aimerez peut-être aussi