0% found this document useful (0 votes)
38 views29 pages

L5 LAN Module - 05

The document discusses creating a proposal for a LAN network. It includes sections on cost estimates, time schedules and responsibilities, maintenance plans, data security, network proposals, current network overviews, hardware and software requirements, disaster recovery plans, and proposed network designs. Developing accurate cost estimates, timelines, and maintenance plans are essential parts of a strong network proposal.

Uploaded by

pcs prasanna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views29 pages

L5 LAN Module - 05

The document discusses creating a proposal for a LAN network. It includes sections on cost estimates, time schedules and responsibilities, maintenance plans, data security, network proposals, current network overviews, hardware and software requirements, disaster recovery plans, and proposed network designs. Developing accurate cost estimates, timelines, and maintenance plans are essential parts of a strong network proposal.

Uploaded by

pcs prasanna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

Crate a Final proposal for a LAN

01.Cost estimate prepared according to the identified hardware and


software requirements.

02.Time schedules and responsibilities.

03. Maintenance plan

04. Data security system, Backup system.


Network Proposal

• a plan or suggestion, specially a formal or written one, put


forward for consideration by others.
Including of Network proposal
1. Introduction
2. Current network overview
3. Network Planning
4. Inventory of Hardware & Network Devices
5. Software Requirement
6. Disaster Recovery & Cost Analysis
7. Proposed Network Design
8. Implementing New Network
9. Staff Training
10. Maintenance
Network Planning and Design Overview

All network design projects are normally divided into three distinct steps:

Step 1: Identify the network requirements.

Step 2: Characterize the existing network.

Step 3: Design the network topology and solutions


Identifying Network Requirements

The network designer works closely with the customer to document the
goals of the project. Goals are usually separated into two categories:

Business goals - Focus on how the network can make the business more successful.

Technical requirements - Focus on how the technology is implemented within the


network.
Characterizing the Existing Network

Information about the current network and services is gathered and


analyzed. It is necessary to compare the functionality of the existing network with
the defined goals of the new project.
The designer determines whether any existing equipment, infrastructure,
and protocols can be re-used, and what new equipment and protocols are needed
to complete the design.

Designing the Network Topology

A common strategy for network design is to take a top-down approach. In


this approach, the network applications and service requirements are identified,
and then the network is designed to support them.
When the design is complete, a prototype or proof-of-concept test is
performed. This approach ensures that the new design functions as expected
before it is implemented.
Determining the Scope of the Project

A common mistake made by network designers is the failure to correctly


determine the scope of the network design project.

While gathering requirements, the designer identifies the issues that affect the
entire network and those that affect only specific portions.

Failure to understand the impact of a particular requirement often causes a project


scope to expand beyond the original estimate.

This oversight can greatly increase the cost and time required to implement the
new design.
Impacting the Entire Network

Network requirements that impact the entire network include:

• Adding new network applications and making major changes to existing applications,
such as database or DNS structure changes

• Improving the efficiency of network addressing or routing protocol changes

• Integrating new security measures

• Adding new network services, such as voice traffic, content networking, and storage
networking

• Relocating servers to a data center server farm


Impacting a Portion of the Network

Requirements that may only affect a portion of the network include:

• Improving Internet connectivity and adding bandwidth.

• Updating Access Layer LAN cabling.

• Providing redundancy for key services.

• Supporting wireless access in defined areas.

• Upgrading WAN bandwidth.


Fundamental Design Goals

When examined carefully, these requirements translate into four fundamental


network design goals:

Scalability
Scalable network designs are able to grow to include new user groups and
remote sites and can support new applications without impacting the level of
service delivered to existing users.

Availability
A network designed for availability is one that delivers consistent, reliable
performance, 24 hours a day, 7 days a week. Additionally, the failure of a single link
or piece of equipment should not significantly impact network performance.
Security
Security is a feature that must be designed into the network, not added on after the
network is complete. Planning the location of security devices, filters, and firewall features is
critical to safeguarding network resources.

Manageability
No matter how good the initial network design is, the available network staff must be
able to manage and support the network. A network that is too complex or difficult to maintain
cannot function effectively and efficiently.
Inventory of Hardware & Network Devices

• Understanding what hardware and software are installed


across an organization is the most basic step to effective
systems management, and often one of the most difficult to
complete accurately without major investments in time and
resource.
Disaster recovery plan

• A disaster recovery plan (DRP) –


sometimes referred to as a business continuity plan (BCP)
or business process contingency plan (BPCP) - describes how an
organization is to deal with potential disasters.
How to Estimate Project Costs

In a world of limited funds, as a project manage you're constantly deciding how to get the
most return for your investment. The more accurate your estimate of project cost is, the
better able you will be to manage your project’s budget. Therefore, estimating a project’s
costs is important for several reasons:

- It enables you to weigh anticipated benefits against anticipated costs to see whether the
project makes sense.

- It allows you to see whether the necessary funds are available to support the project.

- It serves as a guideline to help ensure that you have sufficient funds to complete the
project.
Although you may not develop and monitor detailed budgets for all your projects, knowing
how to work with project costs can make you a better project manager and increase your
chances of project success.

A project budget is a detailed, time-phased estimate of all resource costs for your project.
You typically develop a budget in stages — from an initial rough estimate to a detailed
estimate to a completed, approved project budget. On occasion, you may even revise your
approved budget while your project is in progress.

Project’s budget includes both direct and indirect costs.

Direct costs include the following:

Salaries for team members on your project

Specific materials, supplies, and equipment for your project

Travel to perform work on your project

Subcontracts that provide support exclusively to your project


Indirect costs for this project may include the following:

Employee benefits: Benefits (such as annual, sick, and holiday leave; health and life
insurance; and retirement plan contributions) in addition to salary while you and the
other team members are working on the brochure.

Rent: The cost of the office space you use when you’re developing the copy for the
brochure
Equipment: The computer you use to compose the copy for the brochure

Management and administrative salaries: A portion of the salaries of upper managers


and staff who perform the administrative duties necessary to keep your organization
functioning
Indirect costs fall into the following two categories:

Overhead costs: Costs for products and services for your project that are difficult
to subdivide and allocate directly. Examples include employee benefits, office space
rent, general supplies, and the costs of furniture, fixtures, and equipment.

General and administrative costs: Expenditures that keep your organization


operational (if your organization doesn’t exist, you can’t perform your project).
Examples include salaries of your contracts department, finance department, and
top management as well as fees for general accounting and legal services.
Identify the basic equipment and Material in using Network

• Routers switches and other network devices.


• Cable (UTP / STP / Fiber optic).
• Switch rack (Wall Mounting Enclosure).
• RJ 45 Connectors and Keystone jack.
• Face Plate and Adaptor plate
• Sunk box and nails.
• Casing (plastic or metal).
• Flexible hose.
• Double Tape and Cable Tie.
• Wall plug and Screw nails.
Time schedules and Responsibilities

This unit is concerned with projects which are too complex for a “back of the envelope”
schedule and for which we need.

• Resource Scheduling
Control criteria for the evaluation of work progress are established and the
most economical means for correcting delays are diagnosed.

• Network Scheduling
- A network depicts the sequence of activities necessary to complete a
project.
- Segments of a project are represented by lines connected together to show
the interrelationship of operations and resources.
Network Maintenance
• There are common preventive maintenance techniques that should
continually be performed for a network to operate properly. In an
organization, if one computer is malfunctioning, generally only that user is
affected. But if the network is malfunctioning, many or all users are unable to
work.

• Preventive maintenance is just as important for the network as it is for the


computers on a network. You must check the condition of cables, network
devices, servers, and computers to make sure that they are kept clean and
are in good working order.

• One of the biggest problems with network devices, specially in the server
room, is heat. Network devices do not perform well when overheated. When
dust gathers in and on network devices, it impedes the proper flow of cool air
and sometimes even clogs the fans. It is important to keep network rooms
clean and change air filters often.
Maintenance Plan
Should develop a plan to perform scheduled maintenance and cleaning at
regular intervals. A maintenance program helps prevent network downtime and
equipment failures.
Data security system, Backup system.

• Organizations need secure, reliable, and cost-effective ways to interconnect


multiple networks, such as allowing branch offices and suppliers to connect to a
corporation’s headquarter network.

• Additionally, with the growing number of teleworkers, enterprises have an


increasing need for secure, reliable, and cost-effective ways to connect employees
working in small office/home office (SOHO) and other remote locations, with
resources on corporate sites.
How ways we can Protects our data

VPN Technology
• Organizations use VPNs to create an end-to-end private network connection over third-
party networks such as the Internet or extranets.

• The tunnel eliminates the distance barrier and enables remote users to access central
site network resources.

• A VPN is a private network created via tunneling over a public network, usually the
Internet.

• A VPN is a communications environment in which access is strictly controlled to permit


peer connections within a defined community of interest.
Implement firewall

• A firewall is a system designed to prevent unauthorized access to or from a


private network.

• Firewalls can be implemented in both hardware and software, or a


combination of both. Firewalls are frequently used to prevent unauthorized
Internet users from accessing private networks connected to the Internet,
specially intranets.

• All messages entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified
security criteria.
Backups System

Backups are used to ensure data which is lost can be recovered and nowadays it's very
important to keep a backup of any data.
Refer

http://en.wikipedia.org/wiki/Backup

You might also like