Design , implementation and management of secured lan( Télécharger le fichier original )par Eliud Ir. Eliud Aganze Jomokenyatta university of agriculture and technology - B.sc information technology 2014 |
1. AbstractThis is a network based system on LAN security whose main aim is to upgrade the existing network, handle traffic, provide reliable, fast connection and available anytime and ensure security of users and the system. Through this system, network will provide more services and good connection to reduce the current problem of non-reliability, non-availability and other problem. The network devices are accessible remotely in a secure place away from the actual physical universitycampus where they are prone to various types of damages. From this remote location, network administrator is able to make configuration and they have been authenticated by the system and they have the required authorization. DedicationI hereby dedicate this report to my parent Mrs. Jean P. Muluka, my mother Josephine Munyeruka, all my brothers John HabaMungu, Issa Murhabazi, Destin Murhabazi,Vctor Bwanangela,Big Fidel,Patrick Blaise M and caracholini regular Monitor friends have guided and supported me throughout my education and for providing me with everything I need. AcknowledgementI hereby thank the staff at the JKUAT Karen Campus networking session (Nerve center) especially a Mr. Antony for the insight he gave me on how their current manual system works and other related document to the current network. He gave me a first-hand experience in the activities involved in the university and the processes carried out. I would also like to thank my lecturers for teaching me how to come up with meaningful solutions to problems we face, my fellow classmates for the constructive criticism, my parents for giving me a good education and sound advice, and most importantly God for the strength, wisdom and understanding He gave me to carry out this project. Table of Contents 1.2 Organization structure of JKUAT Karen Campus 1 Figure 1.1: Organization structure of JKUAT Karen 1 1.3 Main objectives of project 1 1.4 General description of the project process 2 1.4.1 The statement of problem 2 2.4 Research Techniques/ methods used 4 2.5.1 System Development Life Cycle approach Methodology 9 2.5.2 Top-Down Network Design Methodology 10 2.5.3 Plan, Design, Implement, Operate, and Optimize (PPDIOO) methodology 10 2.5 Project Requirement specification 13 CHAPTER THREE: LITERATURE REVIEW 15 3.2 LAN (local area network) 15 3.2.1. Peer-to-Peer Networks 15 3.2.2 Server-Based Networks 16 CHAPTER FOUR: SYSTEM ANALYSIS 18 4.2 System analysis activities 18 4.2.0 The importance of system analysis: 18 4.3.0 Identification of LAN design requirement 19 4.4.1 Current Network equipment 19 4.4.2 Physical configuration state 19 4.4.3 Network design topology 21 4.4.4 Current network design problem 24 4.4.5. Network addressing Schema and Naming 25 4.4.6 System analysis of the current Network Management 27 4.4.7.2 Proposed Management strategies 34 4.4.7.4 ProposedAddress schema 35 4.4.7.5 General Merits of proposed system 36 CHAPTER FIVE: NETWORK DESIGN 37 5.2 logical network topology 38 5.2.1 Flat versus Hierarchical Topologies 39 5.3.0 Spanning Tree Protocol (STP) 43 5.3.1 VLAN (Virtual Local Area Network) 44 5.3.2 Designing Models for Addressing and Numbering 45 5.3.3 Network security and management design 48 5.4.0 System design of Jkuat network management online 48 5.4.0.2.1 Activity diagrams 53 5.4.0.2.2 Sequence diagrams 55 5.4.0.2 Database Schema Tables 61 5.4.0.3 Entity relationship diagram (ERD) 62 5.4.1 Good interface design 64 CHAPTER SIX: SYSTEM TESTING AND IMPLEMENTATION 69 6.2.1 Methods / Types of Testing 76 6.5 Changeover Technique Used 83 CHAPTER SEVEN: PROJECT APPRAISAL 84 7.2 Limitations/ shortcomings encountered. 85 |
|