WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

Design , implementation and management of secured lan

( Télécharger le fichier original )
par Eliud Ir. Eliud Aganze
Jomokenyatta university of agriculture and technology - B.sc information technology 2014
  

précédent sommaire suivant

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

1. Abstract

This is a network based system on LAN security whose main aim is to upgrade the existing network, handle traffic, provide reliable, fast connection and available anytime and ensure security of users and the system.

Through this system, network will provide more services and good connection to reduce the current problem of non-reliability, non-availability and other problem.

The network devices are accessible remotely in a secure place away from the actual physical universitycampus where they are prone to various types of damages. From this remote location, network administrator is able to make configuration and they have been authenticated by the system and they have the required authorization.

Dedication

I hereby dedicate this report to my parent Mrs. Jean P. Muluka, my mother Josephine Munyeruka, all my brothers John HabaMungu, Issa Murhabazi, Destin Murhabazi,Vctor Bwanangela,Big Fidel,Patrick Blaise M and caracholini regular Monitor friends have guided and supported me throughout my education and for providing me with everything I need.

Acknowledgement

I hereby thank the staff at the JKUAT Karen Campus networking session (Nerve center) especially a Mr. Antony for the insight he gave me on how their current manual system works and other related document to the current network. He gave me a first-hand experience in the activities involved in the university and the processes carried out. I would also like to thank my lecturers for teaching me how to come up with meaningful solutions to problems we face, my fellow classmates for the constructive criticism, my parents for giving me a good education and sound advice, and most importantly God for the strength, wisdom and understanding He gave me to carry out this project.

Table of Contents

Copyright i

Abstract iii

Dedication iv

Acknowledgement v

List of figures x

List of tables x

List of Abbreviations x

CHAPTER ONE: INTRODUCTION 1

1.1. Project Overview 1

1.2 Organization structure of JKUAT Karen Campus 1

Figure 1.1: Organization structure of JKUAT Karen 1

1.3 Main objectives of project 1

1.4 General description of the project process 2

1.4.1 The statement of problem 2

1.4.2 Proposed solution 2

1.5 Project Schedule 3

CHAPTER TWO: METHODOLOGY 4

2.0 Methodology 4

2.1 Research Methodology 4

2.2 Research Questions 4

2.3 Purpose of the Research 4

2.4 Research Techniques/ methods used 4

2.5 Research Technique used 8

2.5 Project methodology 8

2.5.1 System Development Life Cycle approach Methodology 9

2.5.2 Top-Down Network Design Methodology 10

2.5.3 Plan, Design, Implement, Operate, and Optimize (PPDIOO) methodology 10

2.5 Project Requirement specification 13

2.5.1 Software requirement 13

2.5.2 Hardware requirement 13

CHAPTER THREE: LITERATURE REVIEW 15

3.1 Introduction 15

3.2 LAN (local area network) 15

3.2.1. Peer-to-Peer Networks 15

3.2.2 Server-Based Networks 16

3.3 LAN Design 16

3.4 LAN Installation 17

3.5 LAN Security 17

CHAPTER FOUR: SYSTEM ANALYSIS 18

4.1 Introduction 18

4.2 System analysis activities 18

4.2.0 The importance of system analysis: 18

4.3 Requirement analysis 19

4.3.0 Identification of LAN design requirement 19

4.3.1 Equipment features 19

4.3.2 Design Redundancy 19

4.4 Existing Network 19

4.4.1 Current Network equipment 19

4.4.2 Physical configuration state 19

4.4.3 Network design topology 21

4.4.4 Current network design problem 24

4.4.5. Network addressing Schema and Naming 25

4.4.6 System analysis of the current Network Management 27

4.4.7 Proposed system 32

4.4.7.0 Physical design 32

4.4.7.1Logical design 33

4.4.7.2 Proposed Management strategies 34

4.4.7.3 Proposed WAN 34

4.4.7.4 ProposedAddress schema 35

4.4.7.5 General Merits of proposed system 36

CHAPTER FIVE: NETWORK DESIGN 37

5.0. Definition 37

5.1. Design principals 37

5.2 logical network topology 38

5.2.1 Flat versus Hierarchical Topologies 39

5.3 Switching technologies 43

5.3.0 Spanning Tree Protocol (STP) 43

5.3.1 VLAN (Virtual Local Area Network) 44

5.3.2 Designing Models for Addressing and Numbering 45

5.3.3 Network security and management design 48

5.4.0 System design of Jkuat network management online 48

5.4.0.1 Introduction 48

5.4.0.2 UML Diagrams 50

5.4.0.2.1 Activity diagrams 53

5.4.0.2.2 Sequence diagrams 55

5.4.0.2.3 Class Diagrams 56

5.4.0.3 Database design 57

5.4.0.2 Database Schema Tables 61

5.4.0.3 Entity relationship diagram (ERD) 62

5.4.0.4 Interface design 64

5.4.1 Good interface design 64

CHAPTER SIX: SYSTEM TESTING AND IMPLEMENTATION 69

6.1 Coding 69

6.2 User Interface 69

6.3 System testing 76

6.2.1 Methods / Types of Testing 76

6.2.1.2 White Box Testing 77

6.2.2 The Testing Process 77

6.4 System implementation 80

6.4.1 System change over 80

6.4.1.2 Direct changeover 81

6.5 Changeover Technique Used 83

6.6 Chosen strategy 83

CHAPTER SEVEN: PROJECT APPRAISAL 84

7.1 Objectives met 84

7.2 Achievements 84

7.1.1 System Achievement 84

7.1.2 Personal Achievement 85

7.2 Limitations/ shortcomings encountered. 85

7.3 Conclusion 85

7.4 Recommendations 86

References 87

Appendix 88

1. Interview Questions 88

2. Source codes 89

2.1. Login. Php 89

2.2. Db.php 89

précédent sommaire suivant






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Il faudrait pour le bonheur des états que les philosophes fussent roi ou que les rois fussent philosophes"   Platon