Top Special Offer! Check discount
Get 13% off your first order - useTopStart13discount code now!
For WWTC’s growth into North America, this research study is primarily focused on describing the design and installation of LAN networks with the introduction of WLAN and VoIP capabilities. This document’s network designs and equipment list fulfill the business design needs identified from the analysis of the World Wide Trading Company. This document describes the network’s logical layout as well as the many pieces of equipment that must be bought. This will comprise all the tools necessary for the job, as well as wireless and VoIP locations, connections, and naming conventions. The expanding development of remote voice-over-IP (VoIP) communication brings about more 802.11 Wi-Fi remote systems being approached to bolster remote voice telephone calls. Versatile handsets, and outstandingly items like the iPhone, have moved the endeavor into a remote VoIP world. The Cisco Unified Wireless Network consolidates propelled highlights that lift a remote sending from a mean of productive information availability to a stable, met interchanges organize for voice and data applications. The Cisco Unified Wireless Network is an extensive arrangement enveloping both customers and foundation, settling the confinements of conventional WLANs while empowering administration abilities to manage issues without overburdening corporate IT assets productively.
Classified network
Equipment
Quantity
Model
Remarks
Distribution Switch
1
Catalyst 6504E w/ 720-10G Sup
4RU
Servers
2
HP ProLiant DL360 Gen9
1RU
Core router
1
Cisco ASR 1001-X
1RU
Access Switch
1
1RU
Security Cameras
2
IP Camera Cisco 3520
PoE
Security Entry System
1
Card Reader: Honeywell
ACS-Access Control System
Uninterrupted Power Supply
1
APC Smart-UPS SRT 5000VA 230V
Uptime=40 minutes
Network Encryption
1
IP Encryption ViaSat KG0250X
Network Encryption
Server Racks / Cabinets
1
KH-3106-3-001-22
22U Enclosure
Cooling System
1
Mitsubishi MSZ-FH06NA
Mountable on the wall
Unclassified Network
Equipment
Qty.
Model
Remarks
Distribution Switch
2
Catalyst 6504E w/ 720-10G Sup
4RU
Core Router
2
Cisco ASR 1001-X
1RU
Storage Area Network
1
HPE Store Virtual 3200 (N9X19A)
2RU
Firewall
2
Cisco ASA 5555-X
1RU
UPS
2
APC Smart-UPS 5000VA 230V
Uptime = 40 minutes
Servers
7
HP ProLiant DL360 Gen9
1RU
IPS
2
FP7020-K9
1RU
Patch panels
4
Tripp-Lite N252-048
2 RU CAT 6 48 ports
Security cameras
2
IP Camera Cisco 3520
PoE
Cooling system
1
Mitsubishi MSZ-FH06NA
Mountable on the wall
Security Entry system
1
Card Reader: Honeywell
Access control system
Server Racks / cabinets
2
RS-4POSTRACK-24U
4Racks (Post open)
Access switch
6
WS-3750V2-48PS-E
1RU per switch
Wireless
Equipment
Qty.
Model
Remarks
Wireless Controller
2
AIR-CAP3602I-A-K9
Supports 25 WAPs
Wireless Access Point
5
AIR-CT2504-25-K9
802.11n Dual Band
Working Area
Equipment
Quantity
Model
Remarks
Workstations
87
HP Elite Desk 800 USDT
Windows 10
Printers
20
HP M575dm
LaserJet
PC Monitors
87
HP L2445w
24-inch Widescreen
HD Television
2
65 inches TV Wall Mounted
Conference Rooms
Video Conference
2
Polycom Real Presence Group 500
Conference Rooms
Security cameras
6
IP Camera: Cisco 3520
PoE
Security entry system
1
Card Reader: Honeywell
Access Control System
VoIP
Equipment
Qty.
Model
Remarks
Call Manager System
1
Cisco ISR 3945
Working sections
IP Phone
94
Cisco CP-7975G
Voice Gateway
1
Cisco ISR 3945
Equipment Naming Connections and Convention
Unclassified Vacant Room 1
Device
Connection
Name
Remarks
Cisco ASR 1001-X
NY-DSW1/NY-DSW2
NY-CR1
Core
Catalyst 6504E w/ 720-10G Sup
NY-CR1, NY-CR2, NY-ASW1 NY-ASW2
NY-DSW1
Distribution
Cisco ASR 1001-X
NY-DSW1/NY-DSW2
NY-CR2
Core
WS-3750V2-48PS-E
NY-DSW1, NY-DSW2
NY-ASW1
Access
Catalyst 6504E w/ 720-10G Sup
NY-CR1, NY-CR2, NY-ASW1 NY-ASW2
NY-DSW2
Distribution
Cisco ASA 5555-X
ISP1, ISP2
NY-FW1
Firewall
WS-3750V2-48PS-E
NY-DSW1, NY-DSW2
NY-ASW2
Access
AIR-CT2504-25-K9
NY-DSW1, NY-DSW2
NY-WLC
Wireless Controller
Cisco ASA 5555-X
NY-CR1, NY-CR2
NY-FW2
Firewall
Cisco ISR 3945
NY-DSW1, NY-DSW2
NY-VG
Voice Gateway
FP7020-K9
NY-FW1, NY-CR1, NY-CR2
NY-IPS
IPS
Cisco 3520 IP Camera
NY-ASW1, NY-ASW2
NY-CAM1 NY CAM2
Security Cameras
HPE Store Virtual 3200 (N9X19A)
NY-CR1, NY-CR2
NY-SAN
SAN
Vacant Room 2 (Classified)
Device
Connection
Name
Comments
Cisco ASR 1001-X
NY-DSW1/NY-DSW2
NY-CR3
Core
WS-3750V2-48PS-E
NY-DSW3
NY-ASW3
Access
Catalyst 6504E w/ 720-10G Sup
NY-CR3, NY-ASW2
NY-DSW3
Distribution
Cisco 3520 IP Camera
NY- ASW3
NY-CAM3 NY CAM4
Security Cameras
ViaSat KG0250X IP Encryption
NY-CR3
NY-NET
IPS
Work Area
Device
Connection
Name
Remarks
Cisco 3520 IP Camera
NY- ASW1, NY-ASW2
NY-CAM5 - CAM10
Secondary. Cameras
Cisco CP-7975G
NY- ASW1, NY-ASW2
IP Phones
AIR-CAP3602I-A-K9
NY- ASW1, NY-ASW2
NY-WAP1 -WAP4
Access Points
Hierarchical VLAN and IP Scheme
For the purpose of this study we need to create an IP address Scheme to be implemented for the New York office network infrastructure addressing in relation to the WWTC network infrastructure. We have been assigned an IP address of 172.0.0/20 in the requirements and this should allow for the accommodating for all devices 100%. For starters, we first differentiate the subnets based on the job title division because policies and resources are shared among these jobs i.e. the type of policies that are applicable to the brokers may not be applicable to the other staff. Next we need to identify the total number of devices available for the office. For this issue I assumed that a maximum of 14 devices can be held in each of the four reception offices taking into considerations both the wired and wireless connections. This will enable for multiple devices for every individual requesting for access privileges to the supposedly guest network. This requests total to 56 connections and in order for the network to have 100% growth room the subnet needs to be created with an assumed capacity of 112 devices. Therefore in order for this subnet to be created we have to go to the octet’s 128th place.
Linking of IP Addresses
For the linking of IP addresses section of address for network connections. We will list the IP addresses to their corresponding area in the network diagram.
The Classified Network Diagram
The Unclassified Network Diagram
Equipment Subnets and IP Addresses
Equipment
Section
Device
Qty.
VLAN
ID
100% Growth featured IP addresses
Host Devices Qty.
Subnet
Host IP address Range
Servers
47
100
94
126
172.16.12.0/25
172.16.12.0 – 172.16.12.127
Reception/Guest
56
110
112
126
172.16.0.0/25
172.16.0.0 – 172.16.0.127
VoIP
94
101
188
254
172.16.13.0/24
172.16.13.0 – 172.16.13.255
Printers
20
102
40
62
172.16.0.192/26
172.16.0.192 – 172.16.0.255
Conference Rooms
20
120
40
62
172.16.0.128/26
172.16.0.128 – 172.16.0.191
Managers
20
140
40
62
172.16.1.64/26
172.16.1.64 – 172.16.1.127
Executive Offices
26
130
52
62
172.16.1.0/26
172.16.1.0 – 172.16.1.63
Brokers
28
160
56
62
172.16.2.0/26
172.16.2.0 – 172.16.2.63
Staff
48
150
96
126
172.16.1.128/25
172.16.1.128 – 172.16.1.255
Wireless and VoIP Design
For this part, the network design diagrams that show the wireless and VoIP segments are implemented. As indicated by the detail in the WWTC Business and Technical requirements, the outline of the remote system ought to provide a fast and secure wireless connection in the hall and the two expansive gathering rooms.
VoIP Design
The design of the VoIP design of the network should provide for 100% connectivity, future growth requirements and reductions in the outside lines. In order for the implementation of a call manager, Voice Gateway and IP phones, the VoIP network design will be implemented by Cisco designs.
Outside phone lines will be utilized through open exchanged phone organize (PSTN) channels. WWTC’s official staff and merchants will be making business calls outside of the association and will require PSTN telephone lines. Because of the quantity of clients (around 28) and the normal substantial call volumes to be made, it is assessed that official staff and merchants will require around six PSTN channels at a 5:1 man for each channel proportion. For excess, voice-organize dial companions can be built up to keep up 100% network.
For the VoIP call the G.720 codec will be used whereas on the other hand the outside lines will be derived from the use of the Public switch telephone network. The VoIP network designs abd the voice bandwidth calculations are outlined in the table below.
Formula: Overhead + Packetization Size x Packet Rate = BW
OH
BW
PS
PR
BW
Total OH+PR
Peak %
Total BW
10 bytes
12 Kbps
20 bytes
50 pps
1.5 Kbps
30 bytes
70%
840 Kbps
Packetization Size
BW – Bandwidth
PR – Packet Rate
Kbps – Kilobytes per second
OH – Overhead PS
Office Layout
Wireless Design
Above is an excerpt of the network design for the wireless network requirements preceding the office layout diagram with the location of card readers, Security camera provisions and WAPs. The design of the wireless network should provide for the Cisco equipment including the wireless access points and wireless controllers. For the purpose of ensuring that there are maximum coverage provisions, the access points will be mounted on the ceilings of the reception areas and conference rooms. Constraining the scope of the wireless propagated coverage area can be overseen by modifying the antenna of the routers and furthermore the capacity to change the total number of the transmitting antennas.
WWTC will receive the most recent wireless standard, 802.11ac. Advantages to receiving the most up to date standard are speed and an expanded range of data without requiring extra allocation of the radio wave assignment, where a similar radio wave is utilized to make various streams which anticipate impacts on the system thereby preventing network collisions from occurring.
The security of wireless connection can be enhanced utilizing various encryptions to ensure that the wireless devices signals are validated from the access point end for integrity. The wireless signal needs to be scrambled for prevention of unauthorized client devices access or “sniffing” network data streams activity. A combination of PSK and WPA2 can be used to confirm the remote devices requesting accessibility. A fundamental advantage of WPA2 encryptions lies in its utilization of AES that scrambles 128-bits of data at once with a 128-bit encryption key.
For extra safety precaution effort, SSID name propagation needs to be incapacitated to prevent the discovery of the remote system identities by remote gadgets. Although this may not prove to be a fool proof strategy for security, it will make unapproved device connection more troublesome. Approved guests will be given system association subtle elements by system network administrators as required. Further protection to the wired and wireless networks will be achieved through use of separate VLANs and strict coverage area control of the wireless signals.
Wireless Access Point Configuration and Installation
Access Point Location
Access Points Naming
Summary of the Access Point Configuration
First Conference Room
WWTC_Conf1.1,
The wireless access point needs to be installed 8ft above the floor at the lobby and at both ends of the first conference room. To minimize channel interference, every access points will adopt its unique channels. In addition to this, a frequency of 2.4 GHz and 802.11g for bandwidth will be utilized.
Lobby
WWTC_Lobby1.1
The wireless access point needs to be installed 8ft above the floor at the lobby. For adequate coverage support for the users the antenna will be directional. A frequency of 2.4 GHz and 802.11g for bandwidth will be utilized. To minimize channel interference, every access points will adopt its unique channels.
Second Conference Room
WWTC_Conf2.1,
The wireless access point needs to be installed 8ft above the floor at the lobby and at both ends of the second conference room. To minimize channel interference, every access points will adopt its unique channels. In addition to this, a frequency of 2.4 GHz and 802.11g for bandwidth will be utilized.
Conclusion
The above designs and equipment will shape the logical and physical establishment of the WWTC New York voice and data systems. VoIP and services of the wireless network administrations will be actualized utilizing the most secure, progressive, and adaptable devices which exceed operational and budgetary goals. The subsequent stage for the network design plan is focused on creating carefully designed procedures, policies and security strategies via the Active Directory framework of the organization.
Voice administrations put stringent execution necessities on the whole system. Since digitized voice is an examining of a simple flag (verbal correspondence), its transmission is exceptionally delicate to delays amid travel. Truth be told, with the goal for voice to work accurately over any foundation, the end-to-end travel time (total time encoding the bundle, leaving the sending customer, navigating the system, and after that being decoded at the accepting customer) must be under 150 ms. Issues experienced amid travel result in blemishes in the reconstituted flag; otherwise called jitter. The jitter is fundamentally the variety in postponing that the framework is encountering.
While once voice and information were overseen as isolated innovations, the meeting of communication and Datacom is a reality in the remote venture today. Connect802 has been giving remote VoIP plan and counseling administrations for a long time, and we’ve viewed the business develop in the triple-play (voice-video-information) commercial center. We’ve likewise observed the sensational issues that happen when an 802.11 Wi-Fi remote LAN that is intended to bolster Web perusing, record exchange and email is utilized to bolster remote Voice-over-IP without the appropriate pre-sending appraisal.
Voice-over-Wireless-LAN (VoWLAN) requires a more high amount of flag power than does information exchange and Web perusing. VoIP requires that the got flag be all the more incredibly isolated from natural commotion (Signal-to-Noise Ratio SNR) and close-by meddling 802.11 transmitters (Carrier-to-Interference Ratio CIR). Connect802 can make an 802.11 Wi-Fi remote system outline that will appropriately bolster remote VoIP/Voice-over-Wireless-LAN (VoWLAN).
Dissimilar to some easygoing web surfing or checking email, your system foundation will need to give an abnormal state of unwavering quality and execution to give you fresh, clear, and NOT DROPPED remote IP telephone calls.Plus, in today’s meeting remote LAN condition, Triple Play (voice video information together) is another key motivation to ensure the Wi-Fi VoIP framework is prepared to bolster something beyond VoIP. 802.11 radio chipsets utilized as a part of remote information gadgets (journal PCs and PDAs), handheld stock scanners, and remote VoIP handsets are basically the same. They can all make associations with low flag qualities and moderately low flag to-clamor proportions (i.e. loud situations can bolster network). The issue comes when information associations (for record exchange, email, web perusing, and comparative exercises) are contrasted with the prerequisites for remote VoIP.
A remote VoIP call requires fundamentally higher detection quality, and a considerably more altogether high flag to-clamor proportions. An average “stroll around” on location review for a Wi-Fi organize does not survey 100% of a building’s floor space on the grounds that an architect can’t stroll around to each corner and all aspects of each room. Not at all like remote note pad PCs, which are regularly utilized as a part of a settled or roaming area (on a desktop, for instance), remote VoIP handsets are commonly utilized while a man is strolling. These requests an appraisal of reliable, adjoining scope that is unrealistic with an outline that is construct exclusively in light of a stroll through of a site.
RF CAD can be used in demonstrating and reproduction to increase the outline procedure, and as a rule to totally dispose of the requirement for an on location engagement. You get the correct plan the first run through, without stressing over backpedaling to right dead spots or feeble ranges in your scope. This quick reaction from the companion conveyance switch does not guarantee a quick union time, in any case, EIGRP recuperation is limited by the longest question reaction time. The EIGRP procedure needs to sit tight for answers from all questions to guarantee that it computes the ideal circle freeway. Reactions to the two questions sent towards the center should be gotten before EIGRP can finish the course recalculation. To guarantee that the center switches create a prompt reaction to the question, it is important to condense the square of dispersion courses into a solitary synopsis course publicized towards the center. At the point when a remote IP telephone controls on, it looks for and moves toward becoming related with an AP. As clients move starting with one area then onto the next, the remote IP telephone meanders out-of-scope of one AP into the scope of another AP. The remote IP telephone fabricates and keeps up a rundown of qualified APs and reconnects to an AP in that rundown.
A great assault on an exchanged system is a MAC content-addressable memory (CAM) flooding assault. This sort of assault surges the switch with such a variety of MAC addresses that the switch does not know which port an end station or gadget is joined to. At the point when the switch does not know which port a gadget is connected to, it communicates the movement bound for that gadget to the whole VLAN. Along these lines, the assailant can see all activity that is going to every one of the clients in a VLAN.
References
Cisco. (2011). Wireless LAN Design Guide for High Density Client Environments in HigherEducation. Retrieved June 9, 2016, from Cisco:http://www.cisco.com/c/dam/en_us/solutions/industries/docs/education/cisco_wlan_design_guie.pdf
Cisco Unified IP Phone 7942G Data Sheet. (n.d.). Retrieved June 3, 2016, from http://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/unified-ip-phone-7942g/product_data_sheet0900aecd8069bb68.html
Cisco Wireless LAN Controllers. (n.d.). Retrieved June 2, 2016, from http://www.cisco.com/c/en/us/products/collateral/wireless/4100-series-wireless-lan-controllers/product_data_sheet0900aecd802570b0.htm
Rife, B., 2012. How many calls can I make over my T1 with hosted voice? Retrieved 9 JUN 17 from http://www.invoip.com/blog/bid/103477/How-many-calls-can-I-make-over-my-T1-with-hosted-voice
Voice Design and Implementation Guide. (n.d.). Retrieved June 11, 2017, from http://www.cisco.com/c/en/us/support/docs/voice/h323/5756-7.html
Wireless_LAN_Design_Guide.pdf. (n.d.). Retrieved June 11, 2017, from http://www.cisco.com/c/dam/en_us/about/ciscoitatwork/downloads/ciscoitatwork/pdf/Cisco_IT_Wireless_LAN_Design_Guide.pdf
Hire one of our experts to create a completely original paper even in 3 hours!