

Online Ordering System Capstone Project Document
Introduction.
Internet also known as World Wide Web is amazing and great innovation in human life. The internet is known for its one of a kind tool for communication all over the world. One of the things that the internet is useful to human is the trend nowadays, the Online Shopping. This is where the customers can choose products and services they want by visiting a certain website. This kind of trend in shopping has more advantages both customers and the sellers. For clients, the online purchases will save them from time, money and effort to visit the store to have an actual checking of items. By browsing the website of a seller, the clients will right away view the available sizes, colors, prices, discounts and the availability of the items needed.
Wrinkles Balloons and Party Needs is an online web based ordering system. The trends of online shopping where people are busy and they find it hard to have an extra time to look for the right items they really wanted for the party. Celebrant or the party organizer will prefer to check online the things they needed for the party. They can see a lot of items online and they can make good comparison from the internet. They can order at the comfort of their own home by just one click of a mouse. No need for the customers to visit the store to check the items and compare prices.
The primary goal of the company is to maintain good relationship to the customers by providing quality products and services. The company will offer wide variety of quality party needs for customers. Unique designs to choose from to fit the preferred theme of the celebrant. Also the company will let the customer choose the items they want to include in the package, like the piñata for the party. The system will also provide product catalog with product details and prices. In relation to this, the researchers will develop an online ordering system for a hassle-free shopping transaction, not only for the customers but also for the company as well.
Background of the Study
Wrinkles Balloons and Party Needs have been operating for more than twenty eight (28) years in 19 th St., Lacson, Bacolod City. It is owned and managed by Mr. Joemarie Georfo.The business lasted for more than a decade because of the quality of the products and services where the clients are expected to have. The business have been accepting reservations and orders manually.The orders and reservations are only recorded in a log book to keep track of the dates of when will the reservation and exact date that the items will be picked up by the customers or to be delivered.
Objectives of the Study
The main objective of this study is to provide Wrinkles Balloons and Party Needs a system for online-based ordering and transactions.
- This study will design and develop an Online Ordering System for Wrinkles Balloons and Party Needs that will:
- provide an online ordering system for registered users;
- manage party reservation and orders;
- provide payment facility through payment gateway;
- assess the acceptability of the entire system to the end-users in terms of; (a) effectiveness, (b) efficiency, (c) quality, (d) timeliness;
- make a website for easier purchasing process and reservations;
- part of the service is the tracking system to monitor their orders for delivery.
2 Evaluate the system using 9126 standard.
Conceptual Framework
Scope and delimitation of the study.
The study covers the online ordering and reservation process of Wrinkles Balloons and Party Needs. People are now busy to visit the stores and shop for their party needs like balloons, tarpaulin, table and chairs for visitors, foods, goodies, give away, invitations, souvenirs to complete their party bash. The company will provide service to make customers shop convenient at their own time anytime, anywhere. The customers can choose from the wide variety of items for the party. The item details, availability of the items is posted in the web page of Wrinkles Balloons and Party Needs. The customers can purchase right away by online banking debit or money transfer to secure their orders and deliver the items in 1-2 days. The customers can also check the status of their orders and delivery by visiting the website and log in on their account.
Delimitation
The company will not allow customer to request for a refund if the items were delivered in good condition.
The items posted on the web page do not include the delivery cost.
The system will limit ordering internationally and outside the Bacolod city.
Significance of the Study
This system will be beneficial to the following identified groups:
For the company
- Manage Admin and User accounts
- To help the company to increase more customers
- Maintain shop reports
- To make the procedure of ordering online much easier
For the Customer
- They can easily to visit and see the product using the internet
- Easy to register to the website
- Provide an easy access of customers in getting their orders
- Easy to pay by using online payment process
Future Researchers. This study will be effective tool to serve as a reference to the future researcher and they can also use this study to widen and enlighten them for the research.
Definition of Terms
World Wide Web
- Conceptually, the term is basically a system of internet servers that support specially formatted documents. The documents are formatted in a markup language called HTML (Hyper Text Markup Language) that supports links to other documents, as well as graphics, audio, and video files. Operationally, World Wide Web is a major factor in operating an online reservation and purchases of Wrinkles Balloons and Party Needs. This study of upgrading the system of the business to go online is with the help of World Wide Web.
Online Shopping
- The term is conceptually used in this work to refer to the action or activity of buying goods or services via the Internet. Operationally, refers of making shopping easier by using internet access anytime, anywhere without any hassle.
- The term means a location connected to the Internet that maintains one or more pages on the World Wide Web. As used in the study, “website” is where the customers of Wrinkles Balloons and Party Needs do their reservation and to confirm orders and to monitor or trace the delivery. The order is basically done with the help of internet access.
Online Payment
- Conceptually, allowing money transfer to be made only through internet. It functions as a fast and secure electronic alternatives to traditional methods as cheque, money orders or bank transfers. The term is operationally use to this research as the system to perform the payment processing not only for the business but between their customers. The process helps a faster payment method for the business.
Money Transfer
- The act of transferring money from one place to another place. This may occur electronically or physically. Operationally, the term “money transfer” refers to one of the payment options of the customers who will do the online reservation for their party needs. After the items have been confirmed, the customer needs to process the payment through money transfer. They can send money thru online banking or to the companies facilitate money transfer like Western Union and many other local money transfer companies.
Credit Card
- The term conceptually means is a small plastic card issued by a bank, business, etc., allowing the holder to purchase goods or services on credit. This study used the term to define one of payment options to confirm the purchase, by using the credit card. Once the customers have decided to purchase the items, they can use their credit card to process the payment. The bank is in-charge of posting the customers payment online and charge it automatically the amount to customers account. This method of payment is one of much easier and faster.
- A social gathering especially for pleasure or amusement or a group of people who have gathered to celebrate. Operationally, the term is used to this study as the main purpose of the business. The business provides materials needed to prepare a party. The host is basically look for materials to design a venue to make the party more colorful and fun.
- Conceptually, it is a transaction of buying or selling online. Electronic commerce draws on technologies such as mobile commerce , electronic funds transfer , supply chain management , Internet marketing , online transaction processing , electronic data interchange (EDI), inventory management systems , and automated data collection Modern electronic commerce typically uses the World Wide Web for at least one part of the transaction’s life cycle although it may also use other technologies such as e-mail.
Review of Related Literature
This chapter discusses concepts and conducted studies related to the phenomenon of online shopping. The literature reviewed here provided the researcher insights into the subject matter of the present study. It also provided the researcher information and materials needed in the formulation and development of the data-gathering instrument. This review consists of books, articles, documents that focus on the same subject matter or other concepts of the study.
Local Studies
Geancyfood Online Reservation System
Geancyfood Online Reservation System is an online web-based system wherein clients can make catering reservations through online. The system can help the catering administration manage their filter, monitor, and store and secure of all the reservations records. The system will help the administration in making their work easy and fast such as updating, adding new menu, and printing of records since all the files will be stored in the database. It is more secure in an automated online system and it is more reliable in processing reports and records of the reservation than using manual based. The system allows clients to check their reservations and availability whenever they are online and can make catering reservations right away. Only the authorized personnel can access the system with the use of its username and password for the security purposes.
Author: Nico A. Brigula. (October 2016)
BR Chua Enterprises Inc. Online Shopping Cart
Shopping is very important in our daily life, especially to those who love to shop some furniture, Whenever we need, we usually move to shopping complex. Day by day, a large amount of consumers increased in shopping area. As a result, to provide a better consumer services and satisfaction. Thus, consumers are not required to physically visits to shops to make a purchase including spend to find out specific products, wait for a long queue for payment.The purpose of this research is to design an interactive online shopping system that can satisfy consumers to buy products and which system will save cost, fewer employees, reduce administration work and less time.The system online shopping cart made for BR Chua Enterprises Inc. was one way of enhancing the business competitively. Though the only problem was their usage of manual inventory system, it was decided to make a system that can really help it compete globally. Since BR Chua Enterprises Inc. produces high quality and low-price kind of made-to-order furniture. It helps customers to shop conveniently and accessibly. It helps customers to choose items they desire to buy. It could also generate bills and update records automatically. It was also capable of maintaining various records and storing all day-to-day transactions.
Author: Julie O. Baritos (March 2012)
Foreign Studies
Online Shopping
According to Naresh Prajapati,(March 22, 2012) An online shopping system that permits a customer to submit online orders for items and/or services from a store that serves both walk-in customers and online customers. The online shopping system presents an online display of an order cut off time and an associated delivery window for items selected by the customer. The system accepts the customer’s submission of a purchase order for the item in response to a time of submission being before the order cut off time. The online shopping system does not settle with a credit supplier of the customer until the item selected by the customer is picked from inventory but before it is delivered. Therefore, the customer can go online and make changes to the order. In addition, available service windows are presented to the customer as a function of customer selected order and service types and further, the order picking is assigned in accordance with a picker’s preference. When ordering goods, many shopping systems provide a virtual shopping cart for holding items selected for purchase. Successive items selected for purchase are placed into the virtual shopping cart until a customer completes their shopping trip. Virtual shopping carts may be examined at any time, and their contents can be edited or deleted at the option of the customer. Once the customer decides to submit a purchase order, the customer may print the contents of the virtual shopping basket in order to obtain a hard copy record of the transaction.
Online Ordering System of LIDO Enterprise
Online Ordering System of LIDO Enterprise is an web-based system that helps LIDO Enterprise to manage their business digitally, and allow customer to make order online. As a fast growing company, online enterprise system becoming a need compared to manual method. Therefore, this system has been developed to helps LIDO Enterprise to manage their sales and services online .It is a better approach to optimize the relationship between LIDO Enterprise and customers. There are two target users in this system, admin staff and the customers of LIDO Enterprise. The system consists of ten modules: login and registration, customize stock specification, manage order and profile, search product, manage stock and specification, approve order, advisory administration for admin side function and Live Chat. Rapid Application Development (RAD) model has been used in this project. The four phases are requirements planning, user design, construction and cutover. The implementation of interface and coding to each module in the system has been completed. The testing shows that the acceptance criteria of the system has achieve the objectives of this project.
Author: Shamsor Masra Othman(Mar 03, 2015)
Table 1: Related System
The system we are making has many similarities to the ones on the local and foreign studies.. Both local and foreign has many features similar to our system because all the system that we include in this synthesis aims to help save lives. The same practice is is being observed by both Local and Foreign studies. Compared to manual processing of transactions and records of online ordering can be a hassle and time consuming.
In connection to the proposed system, the system will be used by the Wrinkles Balloons and Party Needs System. This related system will be the basis of the proponents to develop this Wrinkles Balloons and Party Needs System.
Methodology
This chapter explains the methods and procedures being followed in the research project. This chapter reviews the research approach used to carry out the study, the research respondents, and the research methods to be used for conducting the study. It also includes an overview of how to treat research data gathered by the researchers.
SDLC Planning Phase

Research Design
This research study aims to determine the online reservation for party needs and a hassle-free ordering and reservation of party needs for customers; the online ordering system will save customer’s time and faster shopping of the items needed for the party; actual picture and details of items without visiting the store; to help customers choose the right items they wanted because of wide variety of products on the website; to help customers through suggestions of related theme they wanted for the party; to increase productivity of the business through visiting the website because of easier purchasing process and reservations; to make the business available anytime, anywhere for customers even holidays and weekends; part of the service is the tracking system to monitor their orders for delivery; and for easy payment process of the customers. The market research method is used for this study.
Market research is used to identify potential markets, the needs and wants of each, how those needs and wants can be met, how products and services could be packaged to be most accessible to customers and clients, the best pricing for those products and services, who the competitors are and how best to compete against each,potential collaborators and how to collaborate with each — and many other applications of research. Organizations can conduct this research without having to have advanced skills. This topic aims to explain the most important practices in research that provide the most useful results.
Planning Phase

This phase requires study and analysis culminating in the full project management plan and that may lead to system development activities. This is where the business starts, planning is to aim the target of the business which is the online ordering system of party needs. The system includes the hassle-free shopping, to provide wide variety of items for customers and to increase productivity and profit to the business. In the planning phase, sufficient requirement detail is required to support development of the project’s management plan and permit outside validation of this deliverable.
Analysis Phase

The Analysis Phase is where the project lifecycle begins. The Analysis Phase is where the company break down the deliverable in the high-level Project Charter into the more detailed business requirements. The Analysis Phase is also the part of the project where it will identify the overall direction that the project will take through the creation of the project strategy documents. Gathering requirements is the main attraction of the Analysis Phase. The process of gathering requirements is usually more than simply asking the users what they need and writing their answers down. Depending on the complexity of the application, the process for gathering requirements has a clearly defined process of its own. This process consists of a group of repeatable processes that utilize certain techniques to capture, document, communicate, and manage requirements.
Design Phase

The Design phase is when it will build the plan for how you will take your project through the rest of the SDL process—from implementation, to verification, to release. During the Design phase it will establish best practices to follow for this phase by way of functional and design specifications, and it will perform risk analysis to identify threats and vulnerabilities in your software.
Development Phase

Development
During the development phase, the system developer take the detailed logical information documented in the previous phase and transforms it into machine- executable form, and ensures that all of the individual components of the automated system/application function correctly and interface properly with other components within the system/application.
Testing Phase

Testing is a vital part of software development, and it is important to start it as early as possible, and to make testing a part of the process of deciding requirements. To get the most useful perspective on your development project, it is worthwhile devoting some thought to the entire lifecycle including how feedback from users will influence the future of the application.
Implementation Phase
The Implementation Phase has one key activity: deploying the new system in its target environment. Supporting actions include training end-users and preparing to turn the system over to maintenance personnel. After this phase, the system enters the Operations and Maintenance Phase for the remainder of the system’s operational life. Multiple-release projects require multiple iterations of the Implementation Phase – one for each release.
Maintenance Phase
During the Operations and Maintenance Phase, the information system’s availability and performance in executing the work for which it was designed is maintained. The State realizes the largest value for the system during this phase. System operations continue until the system’s termination date, when the next phase, Disposition, begins.
User’s Acceptance Survey
The most common descriptive methodology is the survey, as when researchers summarize the characteristics (abilities, preferences, behaviors, and so on) of customers.
This online ordering system is created for the benefit of the company also the possible customers, as this system will also serve as a promotion for them because of its easy access in the web.
Operational Feasibility
The researchers will use PHP as the front-end and MySQL as the back-end because they run on any platform, are open source, and free to download. The proponents will enhance and upgrade the current manual system of the company.
Program Environment
CSS is the language for describing the presentation of Web pages, including colors, layout, and fonts. It allows one to adapt the presentation to different types of devices, such as large screens, small screens, or printers. CSS is independent of HTML and can be used with any XML-based markup language. The separation of HTML from CSS makes it easier to maintain sites, share style sheets across pages, and tailor pages to different environments. This is referred to as the separation if structure (or: content) from presentation.
HTML is the language for describing the structure of Web pages. HTML gives authors the means to:
- Publish online documents with headings, text, tables , lists, photos, etc.
- Retrieve online information via hypertext links, at the click of a button.
- Design forms for conducting transactions with remote services, for use in searching for information, making reservations, ordering products, etc.
- Include spread-sheets, video clips, sound clips, and other applications directly in their documents.
Back End
MySQL is an open source relational database management system. Information in a MySQL database is stored in the form of related tables. MySQL databases are typically used for web application development.
PHP is a script language and interpreter that is a freely available and used primarily on Linux Web servers. PHP, originally derived from Personal Home Page Tools, now stands for PHP: Hypertext Preprocessor, which the PHP FAQ describes as a “recursive acronym”.
TECHNICAL FEASIBILITY
The proponents decided to use the following hardware for they meet the requirements for the Wrinkles Balloons and Party Needs Online Ordering System.
- Seagate 500GB 7200rpm SATA
- SONY DRU-870/880S 22X SATA
- KINGSTON 2GB 1333 DDR3
- Inno3d G210 1GB DDR3 64bit
- Intel Dual Core E6600 3.06Ghz 2MB 1066Mhz
- 6″Orion L156NW Led Monitor
- Keyboard and Mouse
- HP Officejet 3608 All-in-One
The proponents decided to use the following software for they met the requirements for the Wrinkles Balloons and Party Needs Online Ordering System.
- Windows 7 Starter Edition 32 bit (OEM)
Cost Benefit Analysis
Development Cost
Total = Php 44,990
This table shows the developmental cost of the researched system. The developmental cost includes the programmer’s salary and the total expenditures in developing the system.
Operational Cost
Total =Php 23,148
The tables show the operational cost of the researched system. The operational cost covers the maintenance cost and expenditures in implementing the researched system.
The table shows the total expenditures of the development and operation of the proposed system.
The Benefit shows the probable amount that the company may achieve if the system is going to be implemented. The proponents have researched on what are the presumed amounts or value of each item that will benefit the ordering administration over it`s traditional method per year.

Data Flow Diagram

ORDERS ITEM
Use Case Diagram

Activity Diagram

Presentation, Analysis and Interpretation of Data
This chapter presents the tabular results of the User’s Survey and the corresponding interpretations conducted for the system.
Figure 8 shows the result from the user’s acceptance survey where in thirty respondents have been tested. Each of the categories was computed. Each computed arranged were created tables below precisely showcase each categories mean.

Respondents Survey
Table 18: Survey Result – Effectiveness
Table 18 shows that the survey result for the effectiveness of the system’s gathered with a total mean of 4.22 which is interpreted that the user were very satisfied with the system’s, effectiveness after testing it.
Table 19: Survey Result – Efficiency
Table 19 shows that the user survey result for the system’s gathered a total mean of 4.32 which is interpreted that the user was very satisfied with the system’s efficiency after testing it.
Table 20: Survey Result – Quality
Table 20 shows that the user survey result for the system gathered a total mean of 4.283 which is interpreted that the user was very satisfied with the system’s quality after testing it.
Table 21: Survey Result – Timeliness
Table 21 shows that the user survey result for the system gathered a total mean of 4.22 which is interpreted that the user was very satisfied with the system’s timeliness after testing it.
Table 22: Survey Result – Productivity
Table 22 shows that the user survey result for the system gathered a total mean of 4.32 which is interpreted that the user was very satisfied with the system’s productivity after testing it.
The overall system acceptance result, gathering a mean score of 4.31, it suggest that the users were very highly satisfied with its performance in all its aspects.
Summary of the Findings, Conclusions and Recommendations
This chapter presents the summary of the research work undertaken, the conclusions and recommendation
Summary of the Findings
Wrinkles balloons and party needs online ordering system is developed to provide solution to concern the shop. The person who manage or runs the system should have the idea or knowledge about the system. the employees should also have an idea about the system and how it works. The wrinkles balloons and party needs online ordering system needs a browser, xampp application to run the system. The system also needs Internet connection.
The system is very useful to the company and employees. It provides efficiency of generating and updating sales report. It will lessen the employees manual works.
Recommendations
The system, must have a reservation list, and must have packages for the customers who wants to buy package like birthday celebrations, and the most important, the system must have a paypal in order to secure the payment of the customer.
Share This Post!
- Capstone Project
Recent Posts
Boarding house management system: simplify your life as a landlord, revolutionizing the hospitality industry: top 50 it projects for hotel and tourism, inn management and reservation system capstone project document.
- Student Academic Discipline System Capstone Project Document
- Events Tabulation System Capstone Project Document
- November 2022
- February 2022
- September 2020
- August 2020
Share This Event!
About the author: capstoneguide.
Related Posts

Leave A Comment Cancel reply
You must be logged in to post a comment.
- Upload File
- Most Popular
- Art & Photos
CCNA1 Capstone Project..pdf
Author mosong-manje
Embed Size (px) 344 x 292 429 x 357 514 x 422 599 x 487
Text of CCNA1 Capstone Project..pdf

Capstone Project 2015
By Cronicle Nambahin

Table of Contents
Abstract ........................................................................................................................................... 3
Keywords ......................................................................................................................................... 3
Introduction .................................................................................................................................... 3
Data Center ..................................................................................................................................... 4
DWU Campus Structure .................................................................................................................. 5
LAN Network ................................................................................................................................... 6
Small Business Network .................................................................................................................. 8
Conclusion ....................................................................................................................................... 9
Acknowledgement .......................................................................................................................... 9
References .................................................................................................................................... 10
Author ........................................................................................................................................... 11
Glossary ......................................................................................................................................... 11
Appendix 1 .................................................................................................................................... 11
Appendix 2 .................................................................................................................................... 16
Note from the Author ................................................................................................................... 18
Table of Figures
Figure 1………………………………………………………………………………………………………………………………………5
Figure 2………………………………………………………………………………………………………………………………………6
Figure 3………………………………………………………………………………………………………………………………………7
Figure 4………………………………………………………………………………………………………………………………………8
Figure 5……………………………………………………………………………………………………………………………………16
Figure 6……………………………………………………………………………………………………………………………………17
Figure 7……………………………………………………………………………………………………………………………………17
Figure 8……………………………………………………………………………………………………………………………………18

Documenting, designing, configuring, verifying and securing different types of networks from a small network to an enterprise network are a major technology development. Documentation enhances and validates security by documenting the configuration details and procedures that support a security policy. Documentation also serves as an important part of backup and disaster recovery documentation. Good documentation must be thorough and must be kept current. Thus, updating documentation is a part of change management and many daily administration activities. This paper is all about the documentation of certain aspects of DWU network. A small network is designed, configured, verified and secured to visualize the documentation.
Data Center, Local Area Network, Storage Area Network, Wide Area Network, Network
Documentation, Network Configuration, Pinging and Dial Peer Mapping.
Introduction
The objective of this project is to understand how to document existing data and communications network and to be familiar with the various methods that may be used to design a basic network. It helps us to identify network components and structures and to produce a formal report for such a project in the near future. Furthermore, it helps us to choose the appropriate configurations and security measures for a given network installation.
The first task in understanding how to design and build a computer network is to defining what
a network is and how it is designed and implemented. Understanding how it is used to help
business organizations, institutions and etc. meet their networking needs. In this paper,
network is understood as a connection of network devices and end devices via network media.
For example, computers and servers that can communicate with each other.
This paper will demonstrate the knowledge and skills of designing, configuring, verifying, securing
and documenting a SOHO network. It will also demonstrate the knowledge and skills of
documenting an existing network. There are two parts to this paper. Firstly, it will discuss the
DWU campus network documentation.

Part 1: Campus Network Documentation
Data Center
Data center is vital in all networks. There is no network without a data center or in other words,
every network has a data center where they use to store and retrieve data. Data center is
where all the data in a network are stored. It is physical or virtual infrastructure used by
organization to house computer, server and networking systems and components for the
organization networking needs, which typically involve storing, processing and serving large
amounts of data to clients in client server architecture.
A data center often requires extensive redundant or backup power supply systems, cooling systems, redundant networking connections and policy-based security systems for running the enterprise's core applications.
Data center management involves ensuring the reliability of both the connections to the data center as well as the mission-critical information contained within the data center's storage. It also entails efficiently placing application workloads on the most cost-effective compute resource available.
Overall Data Center structure of DWU network is shown below (Figure 1). In the data center we have a Storage Area Network (SAN) where data are stored, Bank of Switches (Core and Distribution Switches, Equipment Rack, Routers and Servers. There are 40 virtual servers (some shown within the cloud graphic) each on its own VM, with the VMs located on 4 physical servers thereby constituting a server cloud. The cloud symbol is used as a metaphor for the Internet as well as an abstraction of the complex infrastructure it represents. It is used to indicate a service when details of its functioning are not relevant to the context under present focus.

Figure 1. DWU Data Center structure showing the fiber optic connection from the equipment
rack, SAN network, servers and network from Telikom to the bank of switches and out to the
Overall DWU Campus Structure DWU receives internet service through Satellite and from Telikom via a fiber optic cable. The
network from the Internet Service Provider (ISP) through Satellite and satellite dish is a backup
internet service. The Satellite gets the signal from the ISP and transmits it to the satellite dish at
the back of the FR Sirio’s house. The satellite dish then receives the signal and sends it through
fiber optics cable to the Fiber Optics Switch Port where it distributes to the whole campus.
DWU receives internet service via a Fiber Optic cable from Telikom. Telikom provides the main
internet service to DWU. The fiber optic cable travels undersea from Sydney through Guam and
comes up out from the sea near the Kalibobo Light House and Coast Watches and to Telikom.
The fiber optic cable that comes from Telikom also connects to the Fiber Optics Switch Port
where it distributes to the whole campus.
From the main fiber optic switch port, it branches out to different distribution switches within
the campus as shown below in Figure 3.

Figure 2. Overall DWU Network Structure showing the logical connection of network devices
and end devices via different network media.
LAN Network
A Local Area Network (LAN) is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building, using network media. Network media are twisted-pair cable, coaxial cable, fiber-optic cable, and wireless and etc. Figure 3 shows detailed LAN network topology of Lab 101. It is connected to DWU network via fiber optic cable as shown in the figure below. The cloud symbol is used as a metaphor for the Internet as well as an abstraction of the complex infrastructure it represents. It is used to indicate a service when details of its functioning are not relevant to the context under present focus. The fiber optic cable is connected to the distribution switch in the Printing Room. It branches out from the junction box beside the THM Building and comes up out of the ground to the

building and follows the building down to the IS Lab. From IS Lab it runs over a cable tray across to the CIC building and again runs over another cable tray across to the Radio Diwai Building and to the Printing Room. The purpose of a Distribution Layer Switch is to provide a point of connection for the building's Access Layer switches. UTP Cat-6 cable connects the distribution switch in the printing room to the access layer switch in the Lab 101 and also to other access layer switches within the building. The Lab 101 network consists of an Access Layer Switch (Catalyst 2950 Series), a Wireless Access Point, Desktop PCs and Laptops. The PCs are connected to the switch via Cat-5 cables (Category 5). Laptops can either be connected wirelessly via Wireless Access Point or by Cat-5 cable.
Figure 3. Detailed LAN Network for Lab101. It shows how the network is designed and what network media are used for the connections. Part 2: Basic Router & Switch Configuration Small Business Network Generally, the first task in understanding how to build a computer network is to define what a network is and understanding how it is used and what it is used for. A network is consisting of devices and end systems, such as computers and servers that communicate with each other.

Here is a small network topology designed using Packet Tracer. It is fully configured and verified and secured. IPv4 and Class C address are used in this network. Subnetting is included as part of the addressing scheme for future expansion. Networks are separated by routers. In this small business network topology, there are three networks altogether. Two LAN network (Local Area Network) are connected via a serial connection over a WAN (Wide Area Network). WAN connection is established between the two routers by defining static route. The two LAN networks are Madang Network which is the Head Office and the Lae Network which is the branch (Lae Branch). Each LAN network consists of one 2811 series router, one 1960 series switch, two IP phones and two desktop PC. These two networks have only one main server located in Madang where their data are stored. The devices in each network are connected via a straight through cables. Addresses are assigned to each network devices as shown in the logical topology below.
Figure 4. Logical diagram of a small business network. It shows connection of the Head Quarter
in Madang and the Lae branch via a serial connection over WAN.
The two routers in each network are configured with DHCP to provide addressing for each IP phone to be connected and to handle voice packets. The connectivity between all phone devices within the two Local Area Networks is established by configuring Dial Peer Mapping. Dial Peer Mapping is specifically configured to make a call from one LAN across to the other LAN. Here the four IP phones are able to call one another within and across the WAN to the other network. The routers and switches configuration and the screenshots of pinging are shown in the Appendixes. Appendix 1 shows the routers and switches configuration and Appendix 2 shows the screenshots of pinging and IP phone calling each other.

Conclusion This paper has described a documentation of a certain aspects of DWU network. Documentation is vital in all aspects of networking. It enhances and validates security by documenting the configuration details and procedures that support a security policy.
Furthermore, documentation serves as an important part of backup and disaster recovery documentation. Good documentation must be thorough and must be kept current. Thus, updating documentation is a part of change management and many daily administration activities.
The paper has also discussed how to designing, configuring, verifying and securing a network. A small network has been designed in packet tracer to show how to configured, verified and secured a network. Acknowledgements
I am very grateful to my instructors Prof. Peter K. Anderson and Mr. Cyril Sarsoruo for their
technical guidance and instruction for writing this paper. I would also like to thank my fellow
classmate Mr. Ryan David for his support in contributing ideas to successfully configured and
verified the small business network designed in packet tracer. However, any errors of fact or
omission rest entirely with the author.
Furthermore, I wish to take this opportunity to thank the Head of Department Prof. Peter K.
Anderson and the Department Coordinator Mr. Cyril Sarsoruo for their concern in helping me to
be competitive and a team player in the near future.
I would like to thank my wife Maryanne Idawa for her inspiration, in spite of being far away
Finally, I want to thank God for giving me the wisdom, knowledge and understanding and His
many blessings upon my life.

Cisco Networking Academy. (2014). Cisco Networking Academy’s Introduction to Routing
Concepts. Retrieved May 13th, 2015 from
http://www.ciscopress.com/articles/article.asp?p=2180208&seqNum=6
Peter, K., Anderson. (2013). Visualization for local cloud computing: DWU Data Center.
Contemporary PNG Studies: DWU Research, 18.
Orbit-Computer Solution.Com. (2013). How to Configure Static Routes. Retrieved May 13th,
2015 from http://orbit-computer-solutions.com/How-to-Configure-Static-Routes.php
Peter, K., Anderson. (2009). Satellite Communication for PNG Universities and Research
Institutes: A New Design. Contemporary PNG Studies: DWU Research, 11.
Teresa, C., Piliouras. (2005).Network Design: Management and Technical Perspectives, (2nd.Ed).
United State of America: CRC Press LLC. ISBN: 0-8493-1608-1.

Cronicle Nambahin is a Third Year Mathematics and Computing Science student at Divine Word
University. He will be graduating with a Bachelor Degree on March, 2017. His interests include
programming computer program solution of a given problem and network configuration.
Mobile Phone: (+675) 73 435 313 or Email: [email protected] /
[email protected]
WAN Wide Area Network
LAN Land Area Network
SAN Storage Area Network
F/O Fiber Optic
Cat -5 Category 5
IP Internet Protocol
DHCP Dynamic Host Configuration Protocol
IPv4 Internet Protocol Version 4
UTP Unshielded Twisted Pair
VM Virtual Machine
Madang Router Configuration
Router>enable Router#configure terminal Router(config)#hostname Madang_Router Madang_Router(config)#no ip domain-lookup Madang_Router(config)#enable password capstone Madang_Router(config)#line console 0 Madang_Router(config-line)#password project Madang_Router(config-line)#login Madang_Router(config-line)#exit Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#line vty 0 4 Madang_Router(config-line)#password project Madang_Router(config-line)#login Madang_Router(config-line)#exit Madang_Router(config)# Madang_Router(config)#

Madang_Router(config)#service password-encryption Madang_Router(config)#banner motd # AUTHORIZED ACCESS ONLY...! # Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#interface f0/0 Madang_Router(config-if)#description Link to Madang_Router Madang_Router(config-if)#ip address 192.168.2.1 255.255.255.0 Madang_Router(config-if)#no shutdown Madang_Router(config-if)#exit Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#interface s0/0/1 Madang_Router(config-if)#description Link to Lae_Router Madang_Router(config-if)#ip address 10.2.1.1 255.255.255.252 Madang_Router(config-if)#no shutdown Madang_Router(config-if)#exit Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#ip route 192.168.3.0 255.255.255.0 10.2.1.2 Madang_Router(config)#interface s0/0/1 Madang_Router(config-if)#clock rate 64000 Madang_Router(config-if)#exit Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#ip dhcp pool PHONE Madang_Router(dhcp-config)#network 192.168.2.0 255.255.255.0 Madang_Router(dhcp-config)#default-router 192.168.2.1 Madang_Router(dhcp-config)#option 150 ip 192.168.2.1 Madang_Router(dhcp-config)#exit Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#telephony-service Madang_Router(config-telephony)#max-ephones 5 Madang_Router(config-telephony)#max-dn 5 Madang_Router(config-telephony)#ip source-address 192.168.2.1 port 2000 Madang_Router(config-telephony)#auto assign 4 to 6 Madang_Router(config-telephony)#auto assign 1 to 5 Madang_Router(config-telephony)#exit Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#ephone-dn 1 Madang_Router(config-ephone-dn)#number 6401 Madang_Router(config-ephone-dn)#ephone-dn 2 Madang_Router(config-ephone-dn)#number 6402

Madang_Router(config-ephone-dn)#exit Madang_Router(config)# Madang_Router(config)# Madang_Router(config)#dial-peer voice 1 voip Madang_Router(config-dial-peer)#destination-pattern 64.. Madang_Router(config-dial-peer)#session target ipv4:192.168.3.1 Madang_Router(config-dial-peer)#end Madang_Router#copy running-config startup-config Madang_Router#exit
Madang Switch Configuration
Switch>enable Switch#configure terminal Switch(config)#hostname Madang_Switch Madang_Switch(config)#no ip domain-lookup Madang_Switch(config)#enable password capstone Madang_Switch(config)#line console 0 Madang_Switch(config-line)#password project Madang_Switch(config-line)#login Madang_Switch(config-line)#exit Madang_Switch(config)# Madang_Switch(config)# Madang_Switch(config)#line vty 0 4 Madang_Switch(config-line)#password project Madang_Switch(config-line)#login Madang_Switch(config-line)#exit Madang_Switch(config)# Madang_Switch(config)# Madang_Switch(config)#service password-encryption Madang_Switch(config)#banner motd # AUTHORIZED ACCESS ONLY...! # Madang_Switch(config)# Madang_Switch(config)# Madang_Switch(config)#interface range f0/1 - 24 Madang_Switch(config-if-range)#switch mode access Madang_Switch(config-if-range)#switch voice vlan 1 Madang_Switch(config-if-range)#end Madang_Switch# Madang_Switch#copy running-config startup-config Madang_Switch#exit
Lae Router Configuration
Router>enable
Router#configure terminal

Router(config)#hostname Lae_Router
Lae_Router(config)#no ip domain-lookup
Lae_Router(config)#enable password capstone
Lae_Router(config)#line console 0
Lae_Router(config-line)#password project
Lae_Router(config-line)#login
Lae_Router(config-line)#exit
Lae_Router(config)#
Lae_Router(config)#line vty 0 4
Lae_Router(config)#service password-encryption
Lae_Router(config)#banner motd # AUTHORIZED ACCESS ONLY...! #
Lae_Router(config)#interface f0/0
Lae_Router(config-if)#description Link to Lae_Switch
Lae_Router(config-if)#ip address 192.168.3.1 255.255.255.0
Lae_Router(config-if)#no shutdown
Lae_Router(config-if)#exit
Lae_Router(config)#interface s0/0/0
Lae_Router(config-if)#description Link to Madang_Router
Lae_Router(config-if)#ip address 10.2.1.2 255.255.255.252
Lae_Router(config)#exit
Lae_Router(config)#ip route 192.168.2.0 255.255.255.0 10.2.1.1
Lae_Router(config)#ip dhcp pool PHONE

Lae_Router(dhcp-config)#network 192.168.3.0 255.255.255.0
Lae_Router(dhcp-config)#default-router 192.168.3.1
Lae_Router(dhcp-config)#option 150 ip 192.168.3.1
Lae_Router(dhcp-config)#exit
Lae_Router(config)#telephony-service
Lae_Router(config-telephony)#max-ephones 5
Lae_Router(config-telephony)#max-dn 5
Lae_Router(config-telephony)#ip source-address 192.168.3.1 port 2000
Lae_Router(config-telephony)#auto assign 4 to 6
Lae_Router(config-telephony)#auto assign 1 to 5
Lae_Router(config-telephony)#exit
Lae_Router(config)#ephone-dn 3
Lae_Router(config-ephone-dn)#number 6403
Lae_Router(config-ephone-dn)#ephone-dn 4
Lae_Router(config-ephone-dn)#number 6404
Lae_Router(config-ephone-dn)#exit
Lae_Router(config)#dial-peer voice 1 voip
Lae_Router(config-dial-peer)#destination-pattern 64..
Lae_Router(config-dial-peer)#session target ipv4:192.168.2.1
Lae_Router(config-dial-peer)#end
Lae_Router#
Lae_Router#copy running-config startup-config
Lae_Router#exit
Lae Switch Configuration
Switch>enable Switch#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#hostname Lae_Switch Lae_Switch(config)#no ip domain-lookup Lae_Switch(config)#enable password capstone Lae_Switch(config)#line console 0 Lae_Switch(config-line)#password project

Lae_Switch(config-line)#login Lae_Switch(config-line)#exit Lae_Switch(config)# Lae_Switch(config)# Lae_Switch(config)#line vty 0 4 Lae_Switch(config-line)#password project Lae_Switch(config-line)#login Lae_Switch(config-line)#exit Lae_Switch(config)# Lae_Switch(config)# Lae_Switch(config)#service password-encryption Lae_Switch(config)#banner motd # AUTHORIZED ACCESS ONLY...! # Lae_Switch(config)# Lae_Switch(config)# Lae_Switch(config)#interface range f0/1 - 24 Lae_Switch(config-if-range)#switch mode access Lae_Switch(config-if-range)#switch voice vlan 1 Lae_Switch(config-if-range)#end Lae_Switch# Lae_Switch#copy running-config startup-config Lae_Switch#exit
Figure 5. Pinging from Madang PC 1 to Lae router. It shows that the ping is successful because
there is 0% loss.

Figure 6. Pinging from Lae PC 1 to Madang router. It shows that the ping is successful because
Figure 7. Pinging Madang PC2 from Lae PC 2. It shows that the ping is successful because there
is 0% loss.

Figure 8. Madang Phone1 calling the Lae Phone2. The two phones are connected as shown
Note from the Author
This paper can be used as instructions for students to write a research paper.
![inventory management system capstone project pdf IT331 Network Development Capstone Project [Onsite]thespringergroup.yolasite.com/resources/IT331_Appendix_A.pdf · Network Development Capstone Project Appendix A—Capstone Project](https://img.pdfslide.us/doc/110x75/5aa073e07f8b9a62178e2123/it331-network-development-capstone-project-onsite-development-capstone-project.jpg?t=1684997139)
IT331 Network Development Capstone Project [Onsite]thespringergroup.yolasite.com/resources/IT331_Appendix_A.pdf · Network Development Capstone Project Appendix A—Capstone Project

Capstone Project EAD 861 1 Running Head: Capstone Project

MPO CAPSTONE PROJECT MANUAL - NUPOC - … CAPSTONE PROJECT MANUAL . ... CAPSTONE PROJECT MANUAL 1 . ... implementation and completion of the student’s Capstone Project requirement

Capstone Project Manual - careerhighschool.org · Capstone Project Manual 2017- 2018 . 2 ... Final Presentation Rubric 16 ... Why Capstone? The Capstone project is an opportunity

Capstone Project

Capstone 2 Project: Superior Family Medical Clinic 2 Capstone 2 Project Superior Family Medical Clinic ... Clinic Capstone 2 Project CAP2 5 Capstone ... 6 Capstone 2 Project Superior

Ccna1 Review.ppt Ccna1 Review

Capstone Project!
- Exemple de sous-page
- asus m70sa sale
- subway truck parts inc sacramento ca
- water quality lab report
- 100 interesting facts about harry styles
- child molestation statistics
- frugality tips from amish
- quality outdoor furniture clearance
- magnetostriction nickel ferrite
- magnet schools in ct new haven
inventory management system project in java
- freecom dvb-t usb stick software
- liar liar burn hell lyrics az
- volleyball shoes for women cheap
- severe back pain kidney disease
- royal caribbean oasis cruise line
- i2 technologies dallas
- csula get account disabled
- shockwave flash chrome plugin download
- coding sheet movie content analysis
- boyhood and beyond reviews
- the hangover part 2 quotes imdb
- a killer movie cast
- ij network tool windows 7
- how to make buttercream frosting without powdered sugar
- themselves lyrics hat in the wind
- configure nps radius server 2008
- mucoadhesive polymers pdf
- welsh names for girls and boys
- ozzie guillen marlins manager
- xbox 360 wireless controller charger cable pc
- saturated fat is actually good for you
- all maplestory classes korea
- beacon hill athletic club wellesley ma
- 3d puzzle building toy
- cubicle door dilbert
- the best exotic marigold hotel trailer apple
- manifesto city harmonic chords
- virtualbox no usb windows 7
- ignou online exam form for mba
- meryl streep oscar acceptance speech youtube
- abc carpet cleaning ny
- ideal wedding dresses for petite women
- champions league final 2012 tickets price
- logo creator software free download full
- former soviet union map geography
- uchappy games online
- where does liar liar pants on fire originated
- samsung tocco lite 2 specs
- performance letter of credit definition
- map japan world war 2
- mobile tech review ipad 3
- floaters float on blogspot
- inflammatory bowel disease in cats food
- rally car for sale north america
- looping over dict python
- define checks and balances for kids
- delivery food near me online
- flagstaff medical center education
- basic instinct 2 chair scene
- sisterhood traveling pants ending quote
- iona college tuition fees 2010
- andrews computer services ltd
- sputum test procedure
- healthy cold lunch ideas for work
- bbc world news live radio
- canary islands airport news
- intermediate advanced supplementary results 2012
- the bachelor 2012 episodes 5
- boxing equipment houston
- westpac personal loan repayment calculator
- nice quality standards programme
- hdmi cable power surge
- cpu and memory stress test software
- google sites seo search engine optimization guide
- innovation cell therapy shampoo
- nba cba biannual exception
- north korean army starving video
- 1 2 drive 1-1 4 deep socket
- nortel ipsecshm adapter download
- 24 hour fitness denver hampden
- wlan0 not configured ubuntu
- signs symptoms peripartum cardiomyopathy
- fisher price power wheels accessories
- kingdom hearts phone
- art and craft classes for kids in bangalore
- chase bank chase bank login
- animal shelters in ct volunteer
- nominal level variable definition
- savannah state university football schedule 2012
- Aujourd'hui sont déjà 0 visiteurs (0 hits) Ici!

- Registration
Capstone Database Management
- Anthony Hood
- 5 years ago