+ All Categories

WAN Design Project

Date post: 15-Jul-2015
Category:
Upload: de-ther-htun
View: 150 times
Download: 0 times
Share this document with a friend
Popular Tags:
39
NATIONAL MANAGEMENT COLLEGE WAN Design Project For Myanmar Brewery Ltd, Project submitted in partial fulfillment of the requirement for the Diploma in Network Engineering Presented by DNE BATCH (25) DNE - 17,Mg De Thar Htun
Transcript

NATIONAL MANAGEMENT COLLEGE

WAN Design Project

For

Myanmar Brewery Ltd,

Project submitted in partial fulfillment of the requirement for the

Diploma in Network Engineering

Presented by

DNE BATCH (25)

DNE - 17,Mg De Thar Htun

ACKNOWLEDGEMENT

First of all, I would like to thank Principal of National Management College

for giving opportunities to attend this course loading to the Diploma in Network Engineering.

I would like to greatly thank to Sayar U Myo Aung Lat , U Myo Thant , Daw Thida Khaing

and all teachers from Winner Computer Group. I also thank to all of my teachers for teaching

me patiently and guiding me to learn Computer Network Technology. Finally, I also like to

say thank to Ko Thet Aung who allow making my project and helping to finish my project.

CHAPTER ( 1 )

INITIAL STUDY AND CURRENT SYSTEM

ANALYSIS

1.1 Background History

Myanmar Brewery Limited (MBL) was established on March 29, 1995 as one of the earliest major joint-venture

projects in Myanmar with the Union of Myanmar Economic Holding Ltd (UMEHL) to build a green field brewery in

Yangon with a total invested capital of US$ 50 million. The joint venture company of Myanmar Brewery is Fraser & Neave

Group of company (F & N) has invested 55% and Union of Myanmar Holding Ltd 45%. Myanmar Brewery was officially

opened on 7th May 1997.

The brewery is located on a 13.6 hectare site in Pyinmabin Industrial Complex, Mingaladon Township, Yangon.

MBL is a medium sized company with about 600 employees. MBL is the secondary and tertiary sectors. It imports the raw

material from foreign countries. MBL uses the finest raw materials and produces the best products to maximize

economics principle. MBL owns 82% for market power. So MBL is a monopoly market power.

MBL is considered as one of the best-run foreign-invested companies in Myanmar. The company is known not

only as a company which produces consistently high quality products but also as a leader in environmental protection with

its investment in a modern waste water treatment plant costing over US$ 1 million.

MBL is one of the first companies in Myanmar to send its staff abroad and locally for training programmers in

various fields; from brewing & packaging to marketing, sales and administration skills.

1. 2 Photo of Myanmar Brewery Ltd.

1.3 Location Map

1.4 Organization Chart

1.6 Manpower of Myanmar Brewery Ltd,

No Rank No of Persons

1. Managing Director 1

2. Director 1

3. General Manager 8

4. Sale and Marketing 15

5. Account 10

6. Finance 5

7. Technician 15

8. Other Staff 15

9. Driver 5

Total 75

1.7 ICT Skilled Persons (Overall)

No ICT Skilled Persons Percentage

1. Expert Level 8 22%

2. Advance Level 12 28%

3. Basic Level 30 43%

4. Non-ICT Skill 25 34%

Total 75 100%

ICT Skilled Persons Table

ICT Skilled Persons Pie Chart

1. 8 PC and Staff Ratio

Total Number of PC 40

Total Number of Staff 75

Ratio 1:2

PC and Staff Table

1. 9 Physical Layout Diagram

1.10 Cloud Type Network Diagram (Overall)

1.11 Physical Network Diagram (Head Office)

1.12 Logical Network Diagram (Head Office)

1.13 Logical Network Diagram (Yangon Office)

1.14 Logical Network Diagram (Mandalay Office)

1.16 Current Hardware List

Current Hardware List (Head Office)

Description Type of Description Quantity

Desktop Computer Dell 23

Laptop Computer Dell 10

Switch WS-C3750X-48P-E(POE+ Support ) 6

Monitor View Sonic 23

Printer Epson 5

Scanner Epson 5

Projector Sony 2

Phone Panasonic 2

1.17 Current Software List

Current Software List (Overall)

No Type

2. Windows 8 Professional(32-Bit)(Service Pack1)

3. Windows 7 Ultimate(32-Bit)(Service Pack 1)

4. Windows XP 2008 (32-Bit) (Service Pack 3)

5. Microsoft Office Enterprise 2007/2010(32-Bit) & (64-Bit)

6. Adobe Creative Suite CS3 (Photo Shop and More)

7. Adobe Page Maker 7.0

8. Edraw Max

9. Nero 10

10. G-talk, VZO Chat, Skype

11. Cyber Link Power DVD 10 & Other Player

12. Mozilla Firefox, Internet Explorer, Chrome

13. USB Disk Security 6.0, Auto run Virus Remover

14. AVG Free Edition 2012, A vast Free Antivirus 2011

15. United ERP System (Accounting Software)

1.18 Current System Problems

•No security system

•No backup system

•No server

•No server room

•Defense anti-virus is using free-version. Some are out of date.

•Secured connection between head office and branch offices

•No Wireless Access Point.

1.19 Current System Requirements

•Add firewall system

•Create backup system

•Create server

•Create server room

•Need permanent network admin.

•Need more servers. (Database, Proxy, Web, Email, DHCP)

•Need powerful anti-virus defense.

•Add VPN Service and add Wireless Access Point.

CHAPTER (2)

NETWORK DEVELOPMENT PLAN

2.1 Benchmark Design

A DMZ, or De Militarized Zone, is a physical or logical sub network that contains and exposes an

organization’s external services to a larger untrusted network, usually the Internet. The term is normally

referred to as a DMZ by information technology professionals. It is sometimes referred to as a perimeter

network. The purpose of a DMZ is to add an additional layer of security to an organization’s local area

network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part

of the network.

De Militarized Zone

VPNA virtual private network (VPN) is a network that uses primarily public telecommunication

infrastructure, such as the internet, to provide remote offices or traveling user’s access to a central

organizational network. Data with encryption technologies to prevent disclosure of private

information to unauthorized parties.

VPN Functions – through the user of tunneling protocols. Authentication: to prevent

unauthorized users from accessing the VPN. Data Confidentiality: make user of encryption techniques

to protect data Message Integrity: to detect any instances of transmitted messages having been

tampered with. Anti-replay: to avoid attackers injecting or making changes in packets that travel from

a source to a destination.

SSH Tunnel

SSH is a cryptographic protocol. It has Host authentication and User authentication.

-Known host

•Server on the list of trusted host on client machine

•Danger of spoofing

-Password based

•Users enter a username and password

•Sent encrypted with Server’s public key

•Server maintains copy of user’s public key

In Dynamic Tunnel, It creates SOCKS Proxy in Client side. All client application are

configured to SOCKS proxy settings. What are the contents sent to that port is transparently

redirect, encrypt and sent to remote machine. Response From remote machine is received in

some way.

Eg. ssh -D 8080 user hostname

2.2 Planning Policies for Proposed Network Design

Problem Solution

No security system Add firewall system

No backup plan Add backup software

No servers and server room

(Mail, Web, DHCP)

Add a server room and create

servers

Backup Internet connection

system bandwidth is not

enough

Using high bandwidth from

MPT or other local ISP

No virtual private network

between head office and branch

office

Using virtual private network

between head office and branch

office

No server rooms Add server room and create

2.2 Planning Policies for Proposed Network Design

Problem Solution

No security system Add firewall system

No backup plan Add backup software

No servers and server room

(Mail, Web, DHCP)

Add a server room and create

servers

Backup Internet connection

system bandwidth is not

enough

Using high bandwidth from

MPT or other local ISP

No virtual private network

between head office and branch

office

Using virtual private network

between head office and branch

office

No server rooms Add server room and create

2.3 Network Development Architecture

2.4 Master Plan

Aug Study the current network design and system

Survey user's Information

Analysis the current system problems

Sep Measure building structure

Draw network design

Estimate cost and time

Define network design

Oct Buy software requirement

Buy hardware requirement

Buy internet line from ISP

Nov Install cables

Install Hardware Devices

Install Software

Dec Setup Servers

Define system administration

Define the management security

Jan Testing

Training

Final Testing

CHAPTER ( 3 )

PROPOSED INTRANET DESIGN

3.1 Cloud Type Network Diagram (Overall)

3.2 Cloud Type VPN Network Diagram (Overall)

3.3 Logical Network Diagram (Head Office)

3.4 Logical Network Diagram (Yangon Office)

3.5 Logical Network Diagram (Mandalay Office)

3.6 SSH Tunnel Local Port Forwarding With MySql Database Server from Head

3.7 Physical Network Diagram (Head Office)

3.7 Backup System

Bacula is a set of computer programs that permits

the system administrator to manage backup, recovery, and

verification of computer data across a network of

computers of different kinds. Bacula can also run entirely

upon a single computer and can backup to various types of

media, including tape and disk.

In technical terms, it is a network Client/Server

based backup program. Bacula is relatively easy to use and

efficient, while offering many advanced storage

management features that make it easy to find and recover

lost or damaged files. Due to its modular design, Bacula is

scalable from small single computer systems to systems

consisting of hundreds of computers located over a large

network.

Conclusion

After implementing the whole project, this project is costly

but quickly communication and can get exact and safety information.

Moreover, information can be shared safety and easily in the office. Our

company can give not only better service but also better experience. By

using this proposed Network Development system, up to date

information can be distributed each department in offices. So the data

communication media never lost and terminated.


Recommended