Date post: | 15-Jul-2015 |
Category: |
Presentations & Public Speaking |
Upload: | de-ther-htun |
View: | 150 times |
Download: | 0 times |
NATIONAL MANAGEMENT COLLEGE
WAN Design Project
For
Myanmar Brewery Ltd,
Project submitted in partial fulfillment of the requirement for the
Diploma in Network Engineering
Presented by
DNE BATCH (25)
DNE - 17,Mg De Thar Htun
ACKNOWLEDGEMENT
First of all, I would like to thank Principal of National Management College
for giving opportunities to attend this course loading to the Diploma in Network Engineering.
I would like to greatly thank to Sayar U Myo Aung Lat , U Myo Thant , Daw Thida Khaing
and all teachers from Winner Computer Group. I also thank to all of my teachers for teaching
me patiently and guiding me to learn Computer Network Technology. Finally, I also like to
say thank to Ko Thet Aung who allow making my project and helping to finish my project.
1.1 Background History
Myanmar Brewery Limited (MBL) was established on March 29, 1995 as one of the earliest major joint-venture
projects in Myanmar with the Union of Myanmar Economic Holding Ltd (UMEHL) to build a green field brewery in
Yangon with a total invested capital of US$ 50 million. The joint venture company of Myanmar Brewery is Fraser & Neave
Group of company (F & N) has invested 55% and Union of Myanmar Holding Ltd 45%. Myanmar Brewery was officially
opened on 7th May 1997.
The brewery is located on a 13.6 hectare site in Pyinmabin Industrial Complex, Mingaladon Township, Yangon.
MBL is a medium sized company with about 600 employees. MBL is the secondary and tertiary sectors. It imports the raw
material from foreign countries. MBL uses the finest raw materials and produces the best products to maximize
economics principle. MBL owns 82% for market power. So MBL is a monopoly market power.
MBL is considered as one of the best-run foreign-invested companies in Myanmar. The company is known not
only as a company which produces consistently high quality products but also as a leader in environmental protection with
its investment in a modern waste water treatment plant costing over US$ 1 million.
MBL is one of the first companies in Myanmar to send its staff abroad and locally for training programmers in
various fields; from brewing & packaging to marketing, sales and administration skills.
1.6 Manpower of Myanmar Brewery Ltd,
No Rank No of Persons
1. Managing Director 1
2. Director 1
3. General Manager 8
4. Sale and Marketing 15
5. Account 10
6. Finance 5
7. Technician 15
8. Other Staff 15
9. Driver 5
Total 75
1.7 ICT Skilled Persons (Overall)
No ICT Skilled Persons Percentage
1. Expert Level 8 22%
2. Advance Level 12 28%
3. Basic Level 30 43%
4. Non-ICT Skill 25 34%
Total 75 100%
ICT Skilled Persons Table
ICT Skilled Persons Pie Chart
1.16 Current Hardware List
Current Hardware List (Head Office)
Description Type of Description Quantity
Desktop Computer Dell 23
Laptop Computer Dell 10
Switch WS-C3750X-48P-E(POE+ Support ) 6
Monitor View Sonic 23
Printer Epson 5
Scanner Epson 5
Projector Sony 2
Phone Panasonic 2
1.17 Current Software List
Current Software List (Overall)
No Type
2. Windows 8 Professional(32-Bit)(Service Pack1)
3. Windows 7 Ultimate(32-Bit)(Service Pack 1)
4. Windows XP 2008 (32-Bit) (Service Pack 3)
5. Microsoft Office Enterprise 2007/2010(32-Bit) & (64-Bit)
6. Adobe Creative Suite CS3 (Photo Shop and More)
7. Adobe Page Maker 7.0
8. Edraw Max
9. Nero 10
10. G-talk, VZO Chat, Skype
11. Cyber Link Power DVD 10 & Other Player
12. Mozilla Firefox, Internet Explorer, Chrome
13. USB Disk Security 6.0, Auto run Virus Remover
14. AVG Free Edition 2012, A vast Free Antivirus 2011
15. United ERP System (Accounting Software)
1.18 Current System Problems
•No security system
•No backup system
•No server
•No server room
•Defense anti-virus is using free-version. Some are out of date.
•Secured connection between head office and branch offices
•No Wireless Access Point.
1.19 Current System Requirements
•Add firewall system
•Create backup system
•Create server
•Create server room
•Need permanent network admin.
•Need more servers. (Database, Proxy, Web, Email, DHCP)
•Need powerful anti-virus defense.
•Add VPN Service and add Wireless Access Point.
2.1 Benchmark Design
A DMZ, or De Militarized Zone, is a physical or logical sub network that contains and exposes an
organization’s external services to a larger untrusted network, usually the Internet. The term is normally
referred to as a DMZ by information technology professionals. It is sometimes referred to as a perimeter
network. The purpose of a DMZ is to add an additional layer of security to an organization’s local area
network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part
of the network.
De Militarized Zone
VPNA virtual private network (VPN) is a network that uses primarily public telecommunication
infrastructure, such as the internet, to provide remote offices or traveling user’s access to a central
organizational network. Data with encryption technologies to prevent disclosure of private
information to unauthorized parties.
VPN Functions – through the user of tunneling protocols. Authentication: to prevent
unauthorized users from accessing the VPN. Data Confidentiality: make user of encryption techniques
to protect data Message Integrity: to detect any instances of transmitted messages having been
tampered with. Anti-replay: to avoid attackers injecting or making changes in packets that travel from
a source to a destination.
SSH is a cryptographic protocol. It has Host authentication and User authentication.
-Known host
•Server on the list of trusted host on client machine
•Danger of spoofing
-Password based
•Users enter a username and password
•Sent encrypted with Server’s public key
•Server maintains copy of user’s public key
In Dynamic Tunnel, It creates SOCKS Proxy in Client side. All client application are
configured to SOCKS proxy settings. What are the contents sent to that port is transparently
redirect, encrypt and sent to remote machine. Response From remote machine is received in
some way.
Eg. ssh -D 8080 user hostname
2.2 Planning Policies for Proposed Network Design
Problem Solution
No security system Add firewall system
No backup plan Add backup software
No servers and server room
(Mail, Web, DHCP)
Add a server room and create
servers
Backup Internet connection
system bandwidth is not
enough
Using high bandwidth from
MPT or other local ISP
No virtual private network
between head office and branch
office
Using virtual private network
between head office and branch
office
No server rooms Add server room and create
2.2 Planning Policies for Proposed Network Design
Problem Solution
No security system Add firewall system
No backup plan Add backup software
No servers and server room
(Mail, Web, DHCP)
Add a server room and create
servers
Backup Internet connection
system bandwidth is not
enough
Using high bandwidth from
MPT or other local ISP
No virtual private network
between head office and branch
office
Using virtual private network
between head office and branch
office
No server rooms Add server room and create
2.4 Master Plan
Aug Study the current network design and system
Survey user's Information
Analysis the current system problems
Sep Measure building structure
Draw network design
Estimate cost and time
Define network design
Oct Buy software requirement
Buy hardware requirement
Buy internet line from ISP
Nov Install cables
Install Hardware Devices
Install Software
Dec Setup Servers
Define system administration
Define the management security
Jan Testing
Training
Final Testing
3.7 Backup System
Bacula is a set of computer programs that permits
the system administrator to manage backup, recovery, and
verification of computer data across a network of
computers of different kinds. Bacula can also run entirely
upon a single computer and can backup to various types of
media, including tape and disk.
In technical terms, it is a network Client/Server
based backup program. Bacula is relatively easy to use and
efficient, while offering many advanced storage
management features that make it easy to find and recover
lost or damaged files. Due to its modular design, Bacula is
scalable from small single computer systems to systems
consisting of hundreds of computers located over a large
network.
Conclusion
After implementing the whole project, this project is costly
but quickly communication and can get exact and safety information.
Moreover, information can be shared safety and easily in the office. Our
company can give not only better service but also better experience. By
using this proposed Network Development system, up to date
information can be distributed each department in offices. So the data
communication media never lost and terminated.