Keyless System

Published:

Introduction

We are commended to do the Enterprise Networking assignment for taking exam in coming June, 2010. The name of the assignment is WEB DESIGN AGENCY.

We have to implement the network in an office. Our company named Top Web is going to move into new office to be the sole location of the company. It has altogether 15 staffs, 2 project managers, 2 graphic designers, 3 web designers, 3 web programmers, 4 sales assistants and 1 clerical assistant. So we have to implement a perfect office for our company.

In Task1, the company requires a telephone system to communicate with customers together with features such as direct dialing, call waiting, conference calls and so on.

In Task2, we are asked to implement an office layout with appropriate topology with suitable cables.

In Task3, the intranet is needed to be set up and also extranet to get access with other partners or customers from other places or countries. And also need to decide where we will store a large amount of images and videos of our customers.

Lady using a tablet
Lady using a tablet

Professional

Essay Writers

Lady Using Tablet

Get your grade
or your money back

using our Essay Writing Service!

Essay Writing Service

In Task4, we need to choose for internet access from one of our ISPs according to our requirements.

In Task5, we have to write a report for overall review for the assignment. The advantages and disadvantages of our system should be included. In addition, we have to describe the effective and weakness of our system. Costs for implementation of our system should be included.

Task - 1

There are four major types of telephone system. They are :

1. Keyless System or KSU-less System

2. Key System or Key Telephone System(KTS) or Key System Unit(KSU)

3. PBX System

4. VOIP System

(a) The main equipment that would be installed

a.1) Keyless System or KSU-less System

KSU-less phone systems do not require a central cabinet. This system also does not require the costly wiring of more advanced phone systems. It can be simply installed by plugging the phones into existing phone jacks. We only need to purchase the phone themselves. Such KSU-less telephone contains the circuitry necessary to offer various features. These phones can easily be unplugged and moved to a new location, or sold.

The main equipments are :

§ KSU-less Phones themselves

a.2) Key System or Key Telephone System(KTS) or Key System Unit(KSU)

Key systems have a “Phone Cabinet” that houses routing software, and use the public switched telephone network (PTSN) or landline system to route calls. After the main cabinet has been mounted on a wall, it has to be programmed in order to get the features the business needs. Then every telephone in the system can access lines or features with the press of the correct button.

The main equipments are :

§ Key Service Unit(KSU), also called the central service unit, which acts as switching center between incoming central office lines and system telephones

§ Station Cabling, to connect each telephone to the KSU

§ Multi-button Telephone Sets or Key Telephones, on which separate buttons provide access to the central office lines, intercom and special features

§ Power Supply, which converts electrical power to the specifications required by the Key Telephone System

a.3) PBX System

The private switch device(PBX) or Centex business phone system or central control is a hardware that hangs on a wall or mounts in a rack. Its function is to route incoming calls to the appropriate extension in an office, and to share phone lines between extensions. The call from outside is routed through the Public Switched Telephone Network (PSTN) to company-specific lines. The PBX system answers the call with a recorded greeting, plays a menu of connection options to the caller, and then routes the call to the appropriate employee extension or to a holding queue (ACD queue or hunt group) for a department. Some companies want calls answered by a person instead of a machine, then the calls are first routed to an operator or receptionist who then forwards the call to the proper extension or department.

The main equipments are :

§ The PBX's internal switching network

§ Microcontroller or microcomputer for data processing, control and logic

Lady using a tablet
Lady using a tablet

Comprehensive

Writing Services

Lady Using Tablet

Plagiarism-free
Always on Time

Marked to Standard

Order Now

§ Stations or telephone sets

§ Console or Switchboard allows the operator to control incoming calls

§ Outside trunks that deliver signals to and from the PBX

§ Interconnecting wiring, between lines and PBX

§ Logic cards, switching and control cards, power cards and related devices that facilitate PBX operation

§ Cabinets, closets, vaults and other housings

a.4) VOIP System

This is the system which makes and receives telephone calls using a broadband internet connection. Even though a VoIP phone system uses internet, most systems can connect directly to the Publicly Switched Telephone Network (PSTN). For being connected to PSTN, the system can also make calls even if the network goes down. There are three different ways to use the VOIP technology :

Ø The first common way is through a device called an ATA (analog telephone adapter), which allows you to connect a standard telephone line into your computer or Internet connection for use with a VoIP. The ATA is an analog to digital converter which takes the analog signal from your traditional phone and converts it into digital data passed through the Internet.

The main equipments are :

§ Broadband internet connection

§ Regular Telephone with Adapter

§ ATA adapter

Ø The next way to make a VoIP call is through an Internet protocol (IP) phone; these phones look just like regular phones with a handset, cradle, and buttons. Instead of having standard phone connectors, IP phones use an Ethernet connection. IP phones connect directly into a router and have all the hardware and software necessary right onboard to handle the IP call.

The main equipments are :

§ VOIP Telephone

§ Broadband internet connection

§ VOIP Router

Ø The last way to use a VoIP phone is computer to computer. We don't even have to pay for long distance calls.

The main equipments are :

§ Microphone

§ Sound card

§ Broadband internet connection

§ Phone software

§ Headset or speaker

(b) The features available with each system

b.1) Keyless System or KSU-less System

The major limitation of KSU-less systems is capacity. Most KSU-less systems cannot expand beyond about four lines and eight telephones. The advantage of KSU-less systems is reduced vulnerability to equipment problems. This system is cheap and simple to set-up. The features that the system supports are quite similar as a full Key System without a lot of the expensive technology.

§ Auto-attendant messaging, a recorded message that instructs the caller how to get to the department that they are looking for

§ Intercom calls

§ System-wide pages

§ Extension lines are also kept private from each other while avoiding accidental call intrusions or eavesdropping

§ Avoid the hassle of customers' calls being redirected to the wrong personnel

§ Multi-pint communications, reducing the installation process to just plugging the phones into phone jacks

b.2) Key System or Key Telephone System(KTS) or Key System Unit(KSU)

§ Conference Calls

§ Music-on-hold

§ Data gathering programs

§ Caller-ID display

§ Speed dialing

§ Answering machine functions, allowed messages to be left on phones that were not answered

§ Call transfer

§ Remote supervision of the entire system

§ Automatic call accounting

The system can be upgraded for more features by adding key components such as ACD, CID and CSTA. The ACD routes incoming and outgoing telephone calls to the next available operator.

b.3) PBX System

§ Call conferencing

§ Call waiting

§ Call cascades

§ Call accounting

§ Call transfer

§ Call waiting

§ Call forwarding

§ Speed dialing

§ Automatic call distribution

§ Ring groups

§ Voicemail

§ Dial-by-name

§ Automated greetings for callers using recorded messages, dialing menus

§ Teleconferencing

§ Route incoming calls to the appropriate extension

§ Music-on-hold

§ Voice paging

§ Provide a directory of employee extensions accessible by inputting digits corresponding to employee first or last names

b.4) VOIP System

§ Video Conferencing

§ Auto attendant

§ Fax mail

§ Call conferencing

§ Music-on-hold

§ Speed dial

§ Voicemail

§ Caller ID with name

§ Three-way calling

§ Call waiting

§ Call forwarding

§ Call blocking

§ Last number re-dial

§ Direct Inward Dialing(DID)

Lady using a tablet
Lady using a tablet

This Essay is

a Student's Work

Lady Using Tablet

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Examples of our work

§ Ability to utilize VOIP and PSTN calling methods

§ Call Park, call pick-up

§ Application integration

§ Call reporting

§ Call Monitoring and call recording

§ Call queues and call routing

§ Analytics and monitoring tools

(c) The cost of equipment and installation

The system will cost more according to your features offered. The more features the system wants, the more money will be cost.

c.1) Keyless System or KSU-less System

The savings taken from a KSU system comes from less phone wires required to install a phone system. The installation of this system is easy enough to set up so that we can set up on our own.

NO.

Equipments

(8 users system)

Equipment Cost

Installation Cost

(8 users maximum)

Minimum

Maximum

1.

KSU-less Phone

$100

$250

$300

2.

Cable

$4

$10

c.2) Key System or Key Telephone System(KTS) or Key System Unit(KSU)

NO.

Up-front Cost

Minimum

Maximum

1.

System & Installation

$6,000

$40,000

2.

Key Service Unit

$1,000

$10,000

3.

Cable

$4

$10

4.

Power Supply

$150

$300

5.

Key Telephone

$100

$300

c.3) PBX System

NO.

Up-front Cost

Minimum

Maximum

1.

System & Installation

$6,000

$50,000

2.

PBX switch

$3,000

$20,000

3.

Cable

$4

$10

4.

PBX Telephone

$200

$300

5.

Other peripheral equipments

$300

$500

c.4) VOIP System

NO.

Up-front Cost

Minimum

Maximum

1.

System & Installation

$200

$300

2.

VOIP Telephone

$100

$300

3.

VOIP Router

$300

$500

4.

ATA adapter

$200

$300

5.

Microphone

$4

$10

6.

Headset

$3

$10

7.

Web cam

$8

$15

(d) The cost of operating the system

d.1) Keyless System or KSU-less System

Key System does not need for special maintenance. In our country, the phone bill charges $0.25 per minute. So, it will cost about $120 per user per month.

d.2) Key System or Key Telephone System(KTS) or Key System Unit(KSU)

Monthly Cost

Minimum

Maximum

Maintenance

$50

$400

Per-minute charges

$0.25 per user per minute

$75(300min)

$125(500min)

Operator(optional)

$30

$50

d.3) PBX System

Monthly Cost

Minimum

Maximum

Maintenance

$63

$700

Per-minute charges

$0.25 per user per minute

$75(300min)

$125(500min)

d.4) VOIP System

This system also does not need for maintenance. And the system is run over the internet so the cost will be savings for communications.

Recommendation for choosing Key Telephone System

According to the needs for our company, we will set up 8 lines and 15 phones system of Key Telephone System.

The main benefits for us to choose KTS System are :

§ Flexibility - the number of lines, telephones sets, and features can be customized and re-customized as our company want to expand.

§ Reliability - the system is inspected and tested.

§ Ease of Operation - offers one-button access to any number of features.

§ Expandability - common components allow any Key System to be easily upgraded or enhanced with minimal expense.

§ Scalability - It is easy to add additional extensions just by purchasing new KTS phones.

§ Programmable Features - many of the newer key systems are highly programmable, and without professional intervention. Many of them are programmable from a connected PC, programmable features often include the following:

1. Call Accounting

2. Least Cost Routing(LCR)

3. Flexible Call Direction

4. Hunt Groups

5. Attendant and Auto Attendant

6. Call Blocking

7. Computer Telephony

8. Fax Detection

9. Station Identification and Messaging

§ Provides fully hybrid ports for the combination of multi types of terminals.

§ Supports the integration of vice and data, through supplementary services from the local service provider.

§ This system has intercom build-in on each phone sets.

Task - 2

Network Topologies (how they operate)

As we are commanded to create the in-house network (LAN) in this task 3, we have to investigate the possible network topologies and media that could be used. The topology of a network consists of two parts, the physical topology and the logical topology. The physical topology is concerned with the ways of wires or some other medium are used to connect pieces of equipment together. The logical topology is concerned with the underlying model of connectivity that the LAN is designed to support. The physical topology and the logical topology may not have the same configuration. For example, twisted pair Ethernet is a logical bus topology in a physical star topology layout. While IBM's Token Ring is a logical ring topology, it is physically set up in a star topology.

There are three main types of topologies for LANs :

1. Star Topology

Each node is connected to a central computer in a star-shaped configuration; commonly, a network consisting of a central computer (the hub) surrounded by terminals. In a star network, messages pass directly from a node to the central computer, which handles any further routing (as to another node) that might be necessary. A star network is reliable in the sense that a node can fail without affecting any other node on the network.

2. Ring Topology

Nodes are connected in a closed loop, or ring. Messages in a ring network pass in one direction, from node to node. As a message travels around the ring, each node examines the destination address attached to the message. If the address is the same as the address assigned to the node, the node accepts the message; otherwise, it regenerates the signal and passes the message along to the next node in the circle. Such regeneration allows a ring network to cover larger distances than star and bus networks. It can also be designed to bypass any malfunctioning or failed node. Because of the closed loop, new nodes can be difficult to add.

2.1 Dual Ring Topology

The same as the Ring Topology, but Dual Ring Topology can send data in two opposite directions. It has two paths for data to be sent. So, if one path is broken down, data can be sent through another path.

3. Bus Topology

It is commonly called a linear bus because all nodes are connected to a main communications line. On a bus network, each node monitors activity on the line. Messages are detected by all nodes but are accepted only by the nodes to which they are addressed. Because a bus network relies on a common data “highway,” a malfunctioning node simply ceases to communicate; it doesn't disrupt operation as it might on a ring network, in which messages are passed from one node to the next. To avoid collisions that occur when two or more nodes try to use the line at the same time, bus networks commonly rely on collision detection or Token Passing to regulate traffic.

Media for LANs

The most common forms of LAN media are twisted-pair, coaxial and fiber-optic cable.

1. Twisted-pair Cables

There are two kinds of twisted-pair cables, Shielded Twisted-Pair (STP) and Unshielded Twisted-Pair (UTP).

1.1 Advantages

n Cheap

n Easy to implement

n Easy to manage

n Lots of different applications

1.2 Disadvantages

n Susceptible to Electromotive Force (EMF), Radio Frequency (RF) interference

n Limited distance - 100 meters

2. Coaxial Cables

Thinnet (10base2) - 200 meters Thicknet (10base5) - 500 meters

2.1 Advantages

n Highly shielded from EMF,RF interference

n Signals propagate much farther than twisted-pair cables

n Allows for longer distances

n More channels than twisted-pair cables

2.2 Disadvantages

n One cable for all computers

n To add additional computers, network must be taken down

n Must properly terminate

n Expensive

n Low channel count compared to fiber

3. Fiber-optic Cables

There are two kinds of fiber-optic cables, monomode and multimode.

- Monomode Fiber-optic Cables_ a “clear channel” circuit and one carrier frequency - Multimode Fiber-optic Cables_ a channelized fiber-optic circuit and multiple carrier frequencies

3.1 Advantages

n Very fast

n Handles lots of simultaneous B channels.

n Very reliable.

Recommendation and reasons for using Star Topology implemented with optical fiber cable The advantage of the star topology is that no cable segment is a single point of failure impacting the entire network. This allows for better management of the LAN. If one of the cables develops a problem, only that LAN-attached station is affected; all other stations remain operational.

We've decided to choose the extended star topology also called Tree Topology. When used with network devices that filter frames or packets, like bridges, switches, and routers, this topology significantly reduces the traffic on the wires by sending packets only to the wires of the destination host. By choosing star topology, we can get

- Better Performance

- Isolation of devices

- Benefits from centralization

- Simplicity.

We've decided to choose fiber-optic cables because these cables consist of one or more thin filaments of glass fiber wrapped in a protective layer. It transmits light which can travel over long distance and higher bandwidths. Fiber-optic cables are not affected by electromagnetic radiation. Transmission speed could go up to as high as trillions of bits per second. The speed of fiber optics is hundreds of times faster than coaxial cables and thousands of times faster than twisted-pair wire. Transmission occurs at light-wave frequencies that allow a much greater amount of information to be carried.

Among two of these, we would like to use monomode fiber-optic cables because its transmission speeds is faster than that of multimode cables as the light waves goes faster in Monomode than that of in Multimode. Because monomode is made up of glass and multimode is made up of plastic. In addition, the distances of Monomode is between 80km to 140km but the multimode is just between 2.5km to 50km.

It is true that fiber-optic cables are quite expensive but it is worthy. If we could implement those of star topology with fiber-optic cables, our company will improve our quality system. If it is run well, our company will become one of the most famous company in our country. Our company incomes will be increased year by year.

Task - 3

(a) Options for hardware to host the intranet, including costs of purchase, running and maintaining the hardware

A client/server network is the first component needed in hosting an intranet. The clients are computers that connected with high-speed cables in LAN. The server is a high-speed computer with a large hard disk capacity. A minimum of three server-machines(one for the web, one for email and one for file) should be installed in hosting an intranet. In order to protect unauthorized access from outside the company we need firewall for security.

All servers must have :

§ DVD-ROM optical drive

§ Two network(Gigabit Ethernet) ports

§ To be connected to IP KVM(or use a remote access card) and remote power switch

§ RAID which must be write cache enabled

§ CPUs which must be of the server type with 64bit support

§ Network adapter which must be the “server” model

No

Hardware

Cost

(Minimum)

Cost

(Maximum)

1

CPUs(quad-core)

$200

$400

2

RAM (4GB)

$100

$200

3

Intel PRO/100 adapters or PRO/1000 adapters

$80

$100

4

Disk space 500GB

$150

$250

5

DVD-ROM

$40

$80

6

Network adapters

$50

$80

7

Cache

$100

$300

Other costs

1

Installation

$300

$500

2

Maintenance and upgrade

(per month)

$300

$500

3

Software

$400

$700

4

Firewall(hardware & software)

$200

$400

(b) Options for extending an intranet to an extranet to allow for home working and access by staff whilst at clients' premises

In order to allow the users who either work from home or who are outside the organizations such suppliers, partners, customers, employees from other countries or other places, we have to extend the intranet to extranet. Extranet needs to be connected with internet so that all the public personnel can access our system without noticing. So it needs more security to prevent unwanted viewers from clicking through to our private data. While extending intranet to extranet, there are only three important things to ponder, Connectivity, Security(firewall is needed) and a Private Network.

There are three options to choose while extending to extranet :

1. Dial-up Extranet

2. Virtual Private Networks(VPNs)

Dial-up Extranet is a private network that we can dial into for internet. We can access the Dial-up Extranet by dialing a national rate number using their own PSTN or ISDN telecoms line. It offers speeds of up to 100kbps. Because of the limited bandwidth of dial-up connections, it is not a good choice for choosing this as we have large amount of images or video have to be transferred.

Some of the security methods that can protect the unauthorized access include the use of virtual private networks(VPNs), user authentication, firewalls or encryption. Using a VPN involves encrypting data before sending it through the public network and decrypting it at the receiving end.

There are four main components of VPNs: the internet, security gateways, security policy servers, and certificate authorities. The internet is the WAN backbone. Security gateways sit between public and private networks to block intruders. They create tunneling and provide encryption capabilities. It uses the security policy servers to determine which traffic is authorized. Certification authorities verify the security keys shared between sites.

VPNs can be implemented in three ways :

Firewall-based VPNs_____ they focus on the security of Firewalls. In general, firewalls provide filters to block certain network traffic from entering an intranet. In addition, it also provides the security of the VPN servers. Furthermore, this is a cost-effective solution since there is no need for a separate, stand-alone router.

This system offer the most functionality.

Hardware-based VPNs____ they are encryption routers, encrypt outgoing routers and Decrypt incoming data. This system offer the highest efficiency.

Software-based VPNs_____ it is suitable for environments in which the two end points of the VPN communications are not controlled by the same organization. This system offers the most flexibility and lowest cost.

(c) Options for storage of electronic files(a large amount of storage for images and video that is used on clients' websites

There are only three options for storage for large amount of electronic files.

1. Self-storage

2. On-line storage

3. ISP storage

1. Self-storage

It means that we store data in our private internal company. It needs server to be set-up like Database Server. It can be more convenient for us to have our own server to store data. We have completely control of the server.

Maintenance can be done more quickly and easily. And when it comes to say security, it is the best way to have a server on our own.

2. On-line storage

On-line storage means we store data in external servers which are outside of our organization such as private data center. But we have to pay monthly fees for storing in their servers. There are two types of on-line storage, free on-line storages and paid on-line storages.

3. ISP Storage

It means that we have to store at the server of our Internet Service Provider. We also have to pay monthly fees according to our the storage sizes that offers. $5 will be charged per user per month if the storage size is between 2GB and 3GB. They charge at the range from $10 to $20 per user per month up to size 50GB or 100GB.

Recommendation for how the intranet/extranet and storage should be set up and run

As the needs for our company, we need to build a file server, mail server and backup server and proxy server for our company intranet. We will use Linux 7.2 for mail server, Windows 2000 server for file server, Windows 2000 professional for backup server, and Linux 7.2 for proxy server for our intranet.

As for the extranet, we choose to use VPNs for our security. When it comes to ensure security, there are four functions that the VPNs do.

Authentication - validates that data is sent from the sender

Access control - prevents unauthorized users from accessing the network

Confidentiality - prevents the data to be read or copied as the data is being transported

Data integrity - ensures that the data has not been altered

VPNs use two techniques through these functions, tunneling and encryption.

We can have the following benefits for choosing VPNs :

§ Reduces the cost and complexity of the remote connection

§ VPNs do not require similar hardware at both ends of the connection

§ Unauthorized personnel cannot access directly into the server

§ Provides the highest level of security using advanced encryption and authentication protocols

§ Share certain resources with partners

§ VPNs can be expanded their capacity and reach of their network by simply opening more accounts with the ISP

For storage of large file, we are going to build a database server on internal company as we can have a complete control on the server. We can easily maintain the server as in private compass. No need to pay extra money for storage. There will be more flexibility for our data to be sent to users, customers or partners. There will be cost-effective for long-term plan. And we can upgrade the server as it is needed to do so.

Task - 4

(a) The Internet Services that may be required

a.1) The World Wide Web (www)

This is in need as browsers or customers can browse our web pages for further information about our company, and the services that we offer. And we can also send messages to particular person via e-mail by using links on the web pages.

a.2) FTP (File Transfer Protocol)

We need this because we have to send large files to users or customers and also downloading or uploading files. FTP is the essential for the company like ours because a user visiting a web page can download files via FTP.

a.3) E-mail

We need this for our company because we have to exchange data, text files, digital photos, or audio and video files from one computer to another over an intranet or internet so that we cannot be out of touch with our users or customers. If it is necessary, we will use extended e-mail, known as mail gateway or list server that can automatically propagate to multiple recipients a message sent to a single address which is also used to create lists of individuals who will receive announcements about something or to create online discussion groups.

a.4) Video Conferencing

We need this because we need to collaborate the customers electronically with the main office to discuss ideas in real-time for artwork or web designs in urgency.

a.5) VoIP (Voice over IP)

We can make phone calls to our customers or users or individuals or businesses over the internet when it is required. It can be saved money for our company via VoIP when we have to connect the customers when he or she is outside.

(b) The connection speeds that are suitable for these requirements

As according to internet services that provided in task-4(a), the speeds that are suitable for them are:

min

128kbps

256kbps

512kbps

1024kbps

1536kbps

2048kbps

Max

As our company has only 15 staffs, it will be suitable for us to use the bandwidth between 256kbps and 512kbps. But there will be more staffs in the future so the maximum bandwidth will be needed in future.

(c) Examples of Internet Service Providers(ISPs) that can be meet these requirements in our country

There are two main ISP in our country, Ministry of Post & Telecommunications (MPT) and Myanmar Teleport (formally Bagan CyberTech). Another ISP named “RedLink” is only offers Broadband Wi-Max. MPT is connected to the SEA-ME-WE-3 undersea cable and is estimated to have about 45mbps in bandwidth that it shares with Myanmar Teleport.

They offer a range of access services from dial-up connection (low speed, low cost) like Internet Dial-Up Account or Pre-paid Access Kit to different kind of Broadband Services (high speed, additional voice options) like Broadband Wireless, ADSL or IPSTAR.

c.1) Access Services

c.1.1) VSAT Network

§ IPSTAR Broadband Satellite Service (or) Satellite Terminal

§ Broadband ADSL Service

§ Broadband Wireless Service

§ MDU/MTU Broadband Service

c.1.3) Wi-Max

(d) Recommendation to use one particular ISP based upon the services offered and price charged

Among the access services that we provided in ‘(c)', we would like to choose MPT as ISP which offers Wi-Max. It is one of the most popular access methods in our country. And there are also many advantages and it is suitable for our requirements, Top Web Agency. MPT offers services for Wi-Max as following :

1. E-mail Services

2. IDC Services

2.1 Web Hosting

2.2 Co-Location

2.3 Domain Name Services

2.4 IP Address

2.5 Port Request

2.6 FTP Access Service

2.7 Video Conferencing

We have decided to choose Wi-Max to access WAN for our company. The price charged for Wi-Max(512kbps) from MPT is about US dollar $2,500 including all equipments for installation fees and about $75 for monthly fees, no services fees are included.

Task - 5

Our company, Top Web, is moving into new office to be the sole location of the company.

At First, we have to think about our office layout for how to set up our computer system. As the recommendation provided in Task2, we choose fiber optic cables implemented with star topology because setting computers in star topology can easily maintain computers when they are necessary to do so and we can easily what part is going in troubles. System cannot break down even a computer goes wrong.

The advantage of the star topology is that no cable segment is a single point of failure impacting the entire network. This allows for better management of the LAN. If one of the cables develops a problem, only that LAN-attached station is affected; all other stations remain operational.

We've decided to choose the extended star topology also called Tree Topology. When used with network devices that filter frames or packets, like bridges, switches, and routers, this topology significantly reduces the traffic on the wires by sending packets only to the wires of the destination host. By choosing star topology, we can get

- Better Performance

- Isolation of devices

- Benefits from centralization

- Simplicity.

We've decided to choose fiber-optic cables because these cables consist of one or more thin filaments of glass fiber wrapped in a protective layer. It transmits light which can travel over long distance and higher bandwidths. Fiber-optic cables are not affected by electromagnetic radiation. Transmission speed could go up to as high as trillions of bits per second. The speed of fiber optics is hundreds of times faster than coaxial cables and thousands of times faster than twisted-pair wire. Transmission occurs at light-wave frequencies that allow a much greater amount of information to be carried.

Among two of these, we would like to use monomode fiber-optic cables because its transmission speeds is faster than that of multimode cables as the light waves goes faster in Monomode than that of in Multimode. Because monomode is made up of glass and multimode is made up of plastic. In addition, the distances of Monomode is between 80km to 140km but the multimode is just between 2.5km to 50km.

It is true that fiber-optic cables are quite expensive but it is worthy. If we could implement those of star topology with fiber-optic cables, our company will improve our quality system. If it is run well, our company will become one of the most famous company in our country. Our company incomes will be increased year by year.

Secondly, we have to set up an intranet to get a control on our staffs. Being have an intranet, we can also save our time on searching for data we need and also have easy maintenance. When we have to get access to our customers and partners, we have to get WAN so that an extranet is needed. For this reason, VPNs is required for extranet for our company security when we have to get access from our partners from other places or country. Our company is a web design agency so we will have to store a large amount of images and video for our customers so that we have to set up a server on our own.

As the needs for our company, we need to build a file server, mail server and backup server and proxy server for our company intranet. We will use Linux 7.2 for mail server, Windows 2000 server for file server, Windows 2000 professional for backup server, and Linux 7.2 for proxy server for our intranet.

As for the extranet, we choose to use VPNs for our security. When it comes to ensure security, there are four functions that the VPNs do.

For storage of large file, we are going to build a database server on internal company as we can have a complete control on the server. We can easily maintain the server as in private compass. No need to pay extra money for storage. There will be more flexibility for our data to be sent to users, customers or partners. There will be cost-effective for long-term plan. And we can upgrade the server as it is needed to do so.

Thirdly importance comes internet access to get connection with our customers and partners. A good connection speed is necessary for uploading or downloading data. So we have to choose a ISP which can fulfill our needs.

We have decided to choose Wi-Max to access WAN for our company. The price charged for Wi-Max(512kbps) from MPT is about US dollar $2,500 including all equipments for installation fees and about $75 for monthly fees, no services fees are included.

At last, we need a phone system as customers will inquire for information they want in details. We need phone system because it is easier to communicate with us for customers rather than chatting online.

According to the needs for our company, we will set up 8 lines and 15 phones system of Key Telephone System.

The main benefits for us to choose KTS System are :

§ Flexibility - the number of lines, telephones sets, and features can be customized and re-customized as our company want to expand.

§ Reliability - the system is inspected and tested.

§ Ease of Operation - offers one-button access to any number of features.

§ Expandability - common components allow any Key System to be easily upgraded or enhanced with minimal expense.

§ Scalability - It is easy to add additional extensions just by purchasing new KTS phones.

§ Programmable Features - many of the newer key systems are highly programmable, and without professional intervention. Many of them are programmable from a connected PC, programmable features often include the following:

10. Call Accounting

11. Least Cost Routing(LCR)

12. Flexible Call Direction

13. Hunt Groups

14. Attendant and Auto Attendant

15. Call Blocking

16. Computer Telephony

17. Fax Detection

18. Station Identification and Messaging

§ Provides fully hybrid ports for the combination of multi types of terminals.

§ Supports the integration of vice and data, through supplementary services from the local service provider.

§ This system has intercom build-in on each phone sets.

References

Web Reference

1. http://uwadmnweb.uwyo.edusbdcpages_mediaarticlesarticles/200209.pdf

2. http://telephone-systems.com.au/chris-lynch-how-to-select-a-phone-system/types-of-commercial-phone-sy.html

3. http://telephone-systems.com.au/chris-lynch-how-to-select-a-phone-system/basic-telephone-system-fea.html

4. http://www.approvedindex.co.uk/quotes/PBXTelephoneSystems/default.aspx

5. http://www.approvedindex.co.uk/quotes/TelephoneSwitchboards/default.aspx

6. http://www.approvedindex.co.uk/indexes/telephonesystems/articles/telephone-system-installation.aspx

7. http://www.approvedindex.co.uk/indexes/telephonesystems/articles/phonesystembuyersguide.aspx

8. http://guides.wkbw.com/KSU_less_Systems-a855414.html#8067877

9. http://guides.wkbw.com/Key_Telephone_Systems-a855409.html

10. http://www.answers.com/topic/key-system.html

11. http://guides.wkbw.com/KSU_less_Systems_New_York-r855414-New_York.html

12. http://www.electronics-manufacturers.com/info/communication-equipment/voip-phone-system.html

13. http://www.onguardonline.gov/topics/voip.aspx

14. http://www.bizjournals.com/cincinnati/stories/1996/07/29/smallb4.html

15. http://en.wikipedia.org/wiki/Private_branch_exchange

16. http://www.virtualpbx.com/support/education/#stdpbx-costs

17. http://www.dakotapro.biz/pbx-keysystem.html

18. http://www.alibaba.com/product/ph106054355-250155151-0/Key_Telephone_Systems_KTS_.html

19. www.wikipedia.com

20. http://www.libsci.sc.edu/bob/class/clis724/SpecialLibrariesHandbook/intranet.html

21. http://www.heyrick.co.uk/mynet/hw.html

22. http://www.vmware.com/support/esx21/doc/esx21install_requirements2.html

23. http://www.portaone.com/support/faq/hardware-requirements/hardware-requirements/

24. http://publiespe.espe.edu.ec/articulos/sistemas/extranet/extranet.htm

25. http://news.cnet.com/8301-27076_3-20000133-248.html

26. http://electronicportfolios.com/web2/index.html

27. http://en.wikipedia.org/wiki/File_hosting_service

28. http://www.bacstelipzone.com/connection_types.html

29. http://www.bacs.co.uk/Bacs/SiteCollectionDocuments/BIP38_100129b_0206_Conn_meth_v2.pdf

30. http://cba.unomaha.edu/faculty/garfathr/web/vpn_pros_cons.html

31. http://www.opennetinitiative.net/burma

32. http://www.dof.or.krpdfMyanmar%5BWD%5D.pdf

33. http://opennet.net/sites/opennet.net/files/ONI_Burma_Country_Study.pdf

34. www.redlink.net.mm

35. www.globalnet.com.mm

Book Reference

1. Microsoft ® Encarta ® 2009. © 1993-2008 Microsoft Corporation. All rights reserved.

2. NCC-Enterprise Networking (IADCS) 2008, Chapter-11,13,14

3. Lecture-5(Media, LAN Technologies, and Network Topologies), Author by Eric N Wages from Verio Company

4. Pamphlets of MPT, Myanmar Teleport and RedLink

5. Myanmar Teleport