SlideShare a Scribd company logo
NATIONAL MANAGEMENT COLLEGE
WAN Design Project
For
Myanmar Brewery Ltd,
Project submitted in partial fulfillment of the requirement for the
Diploma in Network Engineering
Presented by
DNE BATCH (25)
DNE - 17,Mg De Thar Htun
ACKNOWLEDGEMENT
First of all, I would like to thank Principal of National Management College
for giving opportunities to attend this course loading to the Diploma in Network Engineering.
I would like to greatly thank to Sayar U Myo Aung Lat , U Myo Thant , Daw Thida Khaing
and all teachers from Winner Computer Group. I also thank to all of my teachers for teaching
me patiently and guiding me to learn Computer Network Technology. Finally, I also like to
say thank to Ko Thet Aung who allow making my project and helping to finish my project.
CHAPTER ( 1 )
INITIAL STUDYAND CURRENT SYSTEM
ANALYSIS
1.1 Background History
Myanmar Brewery Limited (MBL) was established on March 29, 1995 as one of the earliest major joint-venture
projects in Myanmar with the Union of Myanmar Economic Holding Ltd (UMEHL) to build a green field brewery in
Yangon with a total invested capital of US$ 50 million. The joint venture company of Myanmar Brewery is Fraser & Neave
Group of company (F & N) has invested 55% and Union of Myanmar Holding Ltd 45%. Myanmar Brewery was officially
opened on 7th May 1997.
The brewery is located on a 13.6 hectare site in Pyinmabin Industrial Complex, Mingaladon Township, Yangon.
MBL is a medium sized company with about 600 employees. MBL is the secondary and tertiary sectors. It imports the raw
material from foreign countries. MBL uses the finest raw materials and produces the best products to maximize
economics principle. MBL owns 82% for market power. So MBL is a monopoly market power.
MBL is considered as one of the best-run foreign-invested companies in Myanmar. The company is known not
only as a company which produces consistently high quality products but also as a leader in environmental protection with
its investment in a modern waste water treatment plant costing over US$ 1 million.
MBL is one of the first companies in Myanmar to send its staff abroad and locally for training programmers in
various fields; from brewing & packaging to marketing, sales and administration skills.
1. 2 Photo of Myanmar Brewery Ltd.
1.3 Location Map
1.4 Organization Chart
1.6 Manpower of Myanmar Brewery Ltd,
No Rank No of Persons
1. Managing Director 1
2. Director 1
3. General Manager 8
4. Sale and Marketing 15
5. Account 10
6. Finance 5
7. Technician 15
8. Other Staff 15
9. Driver 5
Total 75
1.7 ICT Skilled Persons (Overall)
No ICT Skilled Persons Percentage
1. Expert Level 8 22%
2. Advance Level 12 28%
3. Basic Level 30 43%
4. Non-ICT Skill 25 34%
Total 75 100%
ICT Skilled Persons Table
ICT Skilled Persons Pie Chart
1. 8 PC and Staff Ratio
Total Number of PC 40
Total Number of Staff 75
Ratio 1:2
PC and Staff Table
1. 9 Physical Layout Diagram
1.10 Cloud Type Network Diagram (Overall)
1.11 Physical Network Diagram (Head Office)
1.12 Logical Network Diagram (Head Office)
1.13 Logical Network Diagram (Yangon Office)
1.14 Logical Network Diagram (Mandalay Office)
1.16 Current Hardware List
Current Hardware List (Head Office)
Description Type of Description Quantity
Desktop Computer Dell 23
Laptop Computer Dell 10
Switch WS-C3750X-48P-E(POE+ Support ) 6
Monitor View Sonic 23
Printer Epson 5
Scanner Epson 5
Projector Sony 2
Phone Panasonic 2
1.17 Current Software List
Current Software List (Overall)
No Type
2. Windows 8 Professional(32-Bit)(Service Pack1)
3. Windows 7 Ultimate(32-Bit)(Service Pack 1)
4. Windows XP 2008 (32-Bit) (Service Pack 3)
5. Microsoft Office Enterprise 2007/2010(32-Bit) & (64-Bit)
6. Adobe Creative Suite CS3 (Photo Shop and More)
7. Adobe Page Maker 7.0
8. Edraw Max
9. Nero 10
10. G-talk, VZO Chat, Skype
11. Cyber Link Power DVD 10 & Other Player
12. Mozilla Firefox, Internet Explorer, Chrome
13. USB Disk Security 6.0, Auto run Virus Remover
14. AVG Free Edition 2012, A vast Free Antivirus 2011
15. United ERP System (Accounting Software)
1.18 Current System Problems
•No security system
•No backup system
•No server
•No server room
•Defense anti-virus is using free-version. Some are out of date.
•Secured connection between head office and branch offices
•No Wireless Access Point.
1.19 Current System Requirements
•Add firewall system
•Create backup system
•Create server
•Create server room
•Need permanent network admin.
•Need more servers. (Database, Proxy, Web, Email, DHCP)
•Need powerful anti-virus defense.
•Add VPN Service and add Wireless Access Point.
CHAPTER (2)
NETWORK DEVELOPMENT PLAN
2.1 Benchmark Design
A DMZ, or De Militarized Zone, is a physical or logical sub network that contains and exposes an
organization’s external services to a larger untrusted network, usually the Internet. The term is normally
referred to as a DMZ by information technology professionals. It is sometimes referred to as a perimeter
network. The purpose of a DMZ is to add an additional layer of security to an organization’s local area
network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part
of the network.
De Militarized Zone
VPN
A virtual private network (VPN) is a network that uses primarily public telecommunication
infrastructure, such as the internet, to provide remote offices or traveling user’s access to a central
organizational network. Data with encryption technologies to prevent disclosure of private
information to unauthorized parties.
VPN Functions – through the user of tunneling protocols. Authentication: to prevent
unauthorized users from accessing the VPN. Data Confidentiality: make user of encryption techniques
to protect data Message Integrity: to detect any instances of transmitted messages having been
tampered with. Anti-replay: to avoid attackers injecting or making changes in packets that travel from
a source to a destination.
SSH Tunnel
SSH is a cryptographic protocol. It has Host authentication and User authentication.
-Known host
•Server on the list of trusted host on client machine
•Danger of spoofing
-Password based
•Users enter a username and password
•Sent encrypted with Server’s public key
•Server maintains copy of user’s public key
In Dynamic Tunnel, It creates SOCKS Proxy in Client side. All client application are
configured to SOCKS proxy settings. What are the contents sent to that port is transparently
redirect, encrypt and sent to remote machine. Response From remote machine is received in
some way.
Eg. ssh -D 8080 user hostname
2.2 Planning Policies for Proposed Network Design
Problem Solution
No security system Add firewall system
No backup plan Add backup software
No servers and server room
(Mail, Web, DHCP)
Add a server room and create
servers
Backup Internet connection
system bandwidth is not
enough
Using high bandwidth from
MPT or other local ISP
No virtual private network
between head office and branch
office
Using virtual private network
between head office and branch
office
No server rooms Add server room and create
2.2 Planning Policies for Proposed Network Design
Problem Solution
No security system Add firewall system
No backup plan Add backup software
No servers and server room
(Mail, Web, DHCP)
Add a server room and create
servers
Backup Internet connection
system bandwidth is not
enough
Using high bandwidth from
MPT or other local ISP
No virtual private network
between head office and branch
office
Using virtual private network
between head office and branch
office
No server rooms Add server room and create
2.3 Network Development Architecture
2.4 Master Plan
Aug  Study the current network design and system
 Survey user's Information
 Analysis the current system problems
Sep  Measure building structure
 Draw network design
 Estimate cost and time
 Define network design
Oct  Buy software requirement
 Buy hardware requirement
 Buy internet line from ISP
Nov  Install cables
 Install Hardware Devices
 Install Software
Dec  Setup Servers
 Define system administration
 Define the management security
Jan  Testing
 Training
 Final Testing
CHAPTER ( 3 )
PROPOSED INTRANET DESIGN
3.1 Cloud Type Network Diagram (Overall)
3.2 Cloud Type VPN Network Diagram (Overall)
3.3 Logical Network Diagram (Head Office)
3.4 Logical Network Diagram (Yangon Office)
3.5 Logical Network Diagram (Mandalay Office)
3.6 SSH Tunnel Local Port Forwarding With MySql Database Server from Head
WAN Design Project
3.7 Physical Network Diagram (Head Office)
3.7 Backup System
Bacula is a set of computer programs that permits
the system administrator to manage backup, recovery, and
verification of computer data across a network of
computers of different kinds. Bacula can also run entirely
upon a single computer and can backup to various types of
media, including tape and disk.
In technical terms, it is a network Client/Server
based backup program. Bacula is relatively easy to use and
efficient, while offering many advanced storage
management features that make it easy to find and recover
lost or damaged files. Due to its modular design, Bacula is
scalable from small single computer systems to systems
consisting of hundreds of computers located over a large
network.
Conclusion
After implementing the whole project, this project is costly
but quickly communication and can get exact and safety information.
Moreover, information can be shared safety and easily in the office. Our
company can give not only better service but also better experience. By
using this proposed Network Development system, up to date
information can be distributed each department in offices. So the data
communication media never lost and terminated.

More Related Content

PPT
WAN Technologies slide show
PDF
Cisco CCNA Data Center Networking Fundamentals
PDF
CN project 713711699701-5.pdf
PDF
Top Down Network Design - ebrahma.com
PPTX
PDF
Instalación y Configuración Firewall ENDIAN
PPTX
Introducción a Firepower
PPTX
MPLS - Multiprotocol Label Switching v1.3
WAN Technologies slide show
Cisco CCNA Data Center Networking Fundamentals
CN project 713711699701-5.pdf
Top Down Network Design - ebrahma.com
Instalación y Configuración Firewall ENDIAN
Introducción a Firepower
MPLS - Multiprotocol Label Switching v1.3

What's hot (20)

PDF
Real-time reporting – The SOVOS solution to SII
PPT
Chapter12 -- troubleshooting networking problems
PDF
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
PPTX
PPTX
CCNA Course Training Presentation
PPT
CCNA
PPTX
Cisco Networking (Routing and Switching)
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 1
PDF
19 high availability
PPTX
CCNA v6.0 ITN - Chapter 01
PPTX
enterprise network design architecture
PDF
200 301-ccna
PPTX
Introduction of firewall slides
PPT
Red Hat Certified engineer course
PPTX
Subnet Mask
PPT
network fundamentals
PPTX
The Bluetooth technology
PDF
4 palo alto licenses
PPTX
Introduction to computer networks
PPTX
Computer networking ppt
Real-time reporting – The SOVOS solution to SII
Chapter12 -- troubleshooting networking problems
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
CCNA Course Training Presentation
CCNA
Cisco Networking (Routing and Switching)
CCNA 1 Routing and Switching v5.0 Chapter 1
19 high availability
CCNA v6.0 ITN - Chapter 01
enterprise network design architecture
200 301-ccna
Introduction of firewall slides
Red Hat Certified engineer course
Subnet Mask
network fundamentals
The Bluetooth technology
4 palo alto licenses
Introduction to computer networks
Computer networking ppt
Ad

Similar to WAN Design Project (20)

PDF
Coolie @ call
PDF
Ch18 Internet Security
PDF
Rugged DevOps Will help you build ur cloudz
PDF
A study on practical uses of common Network protocols
PPT
Network Capability Profile
DOCX
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
DOCX
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
DOCX
IT327-1404A-01 Implementing, Managing and Mainta.docx
DOC
Resume for James McGarity
PDF
Architecting Secure Web Systems
DOCX
Final2[1]
PPTX
Cincinnati window shade technology overview
PDF
Plugging Network Security Holes Using NetFlow
PDF
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
DOCX
Van-Huynh_Resume_WithSummary
PDF
MPLS IP VPNs: Are You Ready to Migrate?
PPS
Developing an Effective
DOCX
The Corporation Techs' current network consists of 1 web server (acces.docx
PDF
Alfresco - Floating on the cloud
PDF
Floating on the Alfresco Cloud
Coolie @ call
Ch18 Internet Security
Rugged DevOps Will help you build ur cloudz
A study on practical uses of common Network protocols
Network Capability Profile
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
IT327-1404A-01 Implementing, Managing and Mainta.docx
Resume for James McGarity
Architecting Secure Web Systems
Final2[1]
Cincinnati window shade technology overview
Plugging Network Security Holes Using NetFlow
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Van-Huynh_Resume_WithSummary
MPLS IP VPNs: Are You Ready to Migrate?
Developing an Effective
The Corporation Techs' current network consists of 1 web server (acces.docx
Alfresco - Floating on the cloud
Floating on the Alfresco Cloud
Ad

Recently uploaded (20)

PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PPTX
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
PDF
Instagram's Product Secrets Unveiled with this PPT
PPTX
S. Anis Al Habsyi & Nada Shobah - Klasifikasi Hambatan Depresi.pptx
PDF
oil_refinery_presentation_v1 sllfmfls.pdf
PPTX
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
PPTX
Impressionism_PostImpressionism_Presentation.pptx
PPTX
Relationship Management Presentation In Banking.pptx
DOCX
"Project Management: Ultimate Guide to Tools, Techniques, and Strategies (2025)"
PPT
The Effect of Human Resource Management Practice on Organizational Performanc...
PPTX
Project and change Managment: short video sequences for IBA
PPTX
2025-08-10 Joseph 02 (shared slides).pptx
PDF
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
PPTX
Tour Presentation Educational Activity.pptx
PPTX
Learning-Plan-5-Policies-and-Practices.pptx
PPTX
Intro to ISO 9001 2015.pptx wareness raising
PDF
Swiggy’s Playbook: UX, Logistics & Monetization
PPTX
lesson6-211001025531lesson plan ppt.pptx
PPTX
Introduction-to-Food-Packaging-and-packaging -materials.pptx
PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
Emphasizing It's Not The End 08 06 2025.pptx
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
Instagram's Product Secrets Unveiled with this PPT
S. Anis Al Habsyi & Nada Shobah - Klasifikasi Hambatan Depresi.pptx
oil_refinery_presentation_v1 sllfmfls.pdf
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
Impressionism_PostImpressionism_Presentation.pptx
Relationship Management Presentation In Banking.pptx
"Project Management: Ultimate Guide to Tools, Techniques, and Strategies (2025)"
The Effect of Human Resource Management Practice on Organizational Performanc...
Project and change Managment: short video sequences for IBA
2025-08-10 Joseph 02 (shared slides).pptx
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
Tour Presentation Educational Activity.pptx
Learning-Plan-5-Policies-and-Practices.pptx
Intro to ISO 9001 2015.pptx wareness raising
Swiggy’s Playbook: UX, Logistics & Monetization
lesson6-211001025531lesson plan ppt.pptx
Introduction-to-Food-Packaging-and-packaging -materials.pptx
_ISO_Presentation_ISO 9001 and 45001.pptx

WAN Design Project

  • 1. NATIONAL MANAGEMENT COLLEGE WAN Design Project For Myanmar Brewery Ltd, Project submitted in partial fulfillment of the requirement for the Diploma in Network Engineering Presented by DNE BATCH (25) DNE - 17,Mg De Thar Htun
  • 2. ACKNOWLEDGEMENT First of all, I would like to thank Principal of National Management College for giving opportunities to attend this course loading to the Diploma in Network Engineering. I would like to greatly thank to Sayar U Myo Aung Lat , U Myo Thant , Daw Thida Khaing and all teachers from Winner Computer Group. I also thank to all of my teachers for teaching me patiently and guiding me to learn Computer Network Technology. Finally, I also like to say thank to Ko Thet Aung who allow making my project and helping to finish my project.
  • 3. CHAPTER ( 1 ) INITIAL STUDYAND CURRENT SYSTEM ANALYSIS
  • 4. 1.1 Background History Myanmar Brewery Limited (MBL) was established on March 29, 1995 as one of the earliest major joint-venture projects in Myanmar with the Union of Myanmar Economic Holding Ltd (UMEHL) to build a green field brewery in Yangon with a total invested capital of US$ 50 million. The joint venture company of Myanmar Brewery is Fraser & Neave Group of company (F & N) has invested 55% and Union of Myanmar Holding Ltd 45%. Myanmar Brewery was officially opened on 7th May 1997. The brewery is located on a 13.6 hectare site in Pyinmabin Industrial Complex, Mingaladon Township, Yangon. MBL is a medium sized company with about 600 employees. MBL is the secondary and tertiary sectors. It imports the raw material from foreign countries. MBL uses the finest raw materials and produces the best products to maximize economics principle. MBL owns 82% for market power. So MBL is a monopoly market power. MBL is considered as one of the best-run foreign-invested companies in Myanmar. The company is known not only as a company which produces consistently high quality products but also as a leader in environmental protection with its investment in a modern waste water treatment plant costing over US$ 1 million. MBL is one of the first companies in Myanmar to send its staff abroad and locally for training programmers in various fields; from brewing & packaging to marketing, sales and administration skills.
  • 5. 1. 2 Photo of Myanmar Brewery Ltd.
  • 8. 1.6 Manpower of Myanmar Brewery Ltd, No Rank No of Persons 1. Managing Director 1 2. Director 1 3. General Manager 8 4. Sale and Marketing 15 5. Account 10 6. Finance 5 7. Technician 15 8. Other Staff 15 9. Driver 5 Total 75
  • 9. 1.7 ICT Skilled Persons (Overall) No ICT Skilled Persons Percentage 1. Expert Level 8 22% 2. Advance Level 12 28% 3. Basic Level 30 43% 4. Non-ICT Skill 25 34% Total 75 100% ICT Skilled Persons Table ICT Skilled Persons Pie Chart
  • 10. 1. 8 PC and Staff Ratio Total Number of PC 40 Total Number of Staff 75 Ratio 1:2 PC and Staff Table
  • 11. 1. 9 Physical Layout Diagram
  • 12. 1.10 Cloud Type Network Diagram (Overall)
  • 13. 1.11 Physical Network Diagram (Head Office)
  • 14. 1.12 Logical Network Diagram (Head Office)
  • 15. 1.13 Logical Network Diagram (Yangon Office)
  • 16. 1.14 Logical Network Diagram (Mandalay Office)
  • 17. 1.16 Current Hardware List Current Hardware List (Head Office) Description Type of Description Quantity Desktop Computer Dell 23 Laptop Computer Dell 10 Switch WS-C3750X-48P-E(POE+ Support ) 6 Monitor View Sonic 23 Printer Epson 5 Scanner Epson 5 Projector Sony 2 Phone Panasonic 2
  • 18. 1.17 Current Software List Current Software List (Overall) No Type 2. Windows 8 Professional(32-Bit)(Service Pack1) 3. Windows 7 Ultimate(32-Bit)(Service Pack 1) 4. Windows XP 2008 (32-Bit) (Service Pack 3) 5. Microsoft Office Enterprise 2007/2010(32-Bit) & (64-Bit) 6. Adobe Creative Suite CS3 (Photo Shop and More) 7. Adobe Page Maker 7.0 8. Edraw Max 9. Nero 10 10. G-talk, VZO Chat, Skype 11. Cyber Link Power DVD 10 & Other Player 12. Mozilla Firefox, Internet Explorer, Chrome 13. USB Disk Security 6.0, Auto run Virus Remover 14. AVG Free Edition 2012, A vast Free Antivirus 2011 15. United ERP System (Accounting Software)
  • 19. 1.18 Current System Problems •No security system •No backup system •No server •No server room •Defense anti-virus is using free-version. Some are out of date. •Secured connection between head office and branch offices •No Wireless Access Point. 1.19 Current System Requirements •Add firewall system •Create backup system •Create server •Create server room •Need permanent network admin. •Need more servers. (Database, Proxy, Web, Email, DHCP) •Need powerful anti-virus defense. •Add VPN Service and add Wireless Access Point.
  • 21. 2.1 Benchmark Design A DMZ, or De Militarized Zone, is a physical or logical sub network that contains and exposes an organization’s external services to a larger untrusted network, usually the Internet. The term is normally referred to as a DMZ by information technology professionals. It is sometimes referred to as a perimeter network. The purpose of a DMZ is to add an additional layer of security to an organization’s local area network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part of the network.
  • 22. De Militarized Zone VPN A virtual private network (VPN) is a network that uses primarily public telecommunication infrastructure, such as the internet, to provide remote offices or traveling user’s access to a central organizational network. Data with encryption technologies to prevent disclosure of private information to unauthorized parties. VPN Functions – through the user of tunneling protocols. Authentication: to prevent unauthorized users from accessing the VPN. Data Confidentiality: make user of encryption techniques to protect data Message Integrity: to detect any instances of transmitted messages having been tampered with. Anti-replay: to avoid attackers injecting or making changes in packets that travel from a source to a destination.
  • 24. SSH is a cryptographic protocol. It has Host authentication and User authentication. -Known host •Server on the list of trusted host on client machine •Danger of spoofing -Password based •Users enter a username and password •Sent encrypted with Server’s public key •Server maintains copy of user’s public key In Dynamic Tunnel, It creates SOCKS Proxy in Client side. All client application are configured to SOCKS proxy settings. What are the contents sent to that port is transparently redirect, encrypt and sent to remote machine. Response From remote machine is received in some way. Eg. ssh -D 8080 user hostname
  • 25. 2.2 Planning Policies for Proposed Network Design Problem Solution No security system Add firewall system No backup plan Add backup software No servers and server room (Mail, Web, DHCP) Add a server room and create servers Backup Internet connection system bandwidth is not enough Using high bandwidth from MPT or other local ISP No virtual private network between head office and branch office Using virtual private network between head office and branch office No server rooms Add server room and create
  • 26. 2.2 Planning Policies for Proposed Network Design Problem Solution No security system Add firewall system No backup plan Add backup software No servers and server room (Mail, Web, DHCP) Add a server room and create servers Backup Internet connection system bandwidth is not enough Using high bandwidth from MPT or other local ISP No virtual private network between head office and branch office Using virtual private network between head office and branch office No server rooms Add server room and create
  • 27. 2.3 Network Development Architecture
  • 28. 2.4 Master Plan Aug  Study the current network design and system  Survey user's Information  Analysis the current system problems Sep  Measure building structure  Draw network design  Estimate cost and time  Define network design Oct  Buy software requirement  Buy hardware requirement  Buy internet line from ISP Nov  Install cables  Install Hardware Devices  Install Software Dec  Setup Servers  Define system administration  Define the management security Jan  Testing  Training  Final Testing
  • 29. CHAPTER ( 3 ) PROPOSED INTRANET DESIGN
  • 30. 3.1 Cloud Type Network Diagram (Overall)
  • 31. 3.2 Cloud Type VPN Network Diagram (Overall)
  • 32. 3.3 Logical Network Diagram (Head Office)
  • 33. 3.4 Logical Network Diagram (Yangon Office)
  • 34. 3.5 Logical Network Diagram (Mandalay Office)
  • 35. 3.6 SSH Tunnel Local Port Forwarding With MySql Database Server from Head
  • 37. 3.7 Physical Network Diagram (Head Office)
  • 38. 3.7 Backup System Bacula is a set of computer programs that permits the system administrator to manage backup, recovery, and verification of computer data across a network of computers of different kinds. Bacula can also run entirely upon a single computer and can backup to various types of media, including tape and disk. In technical terms, it is a network Client/Server based backup program. Bacula is relatively easy to use and efficient, while offering many advanced storage management features that make it easy to find and recover lost or damaged files. Due to its modular design, Bacula is scalable from small single computer systems to systems consisting of hundreds of computers located over a large network.
  • 39. Conclusion After implementing the whole project, this project is costly but quickly communication and can get exact and safety information. Moreover, information can be shared safety and easily in the office. Our company can give not only better service but also better experience. By using this proposed Network Development system, up to date information can be distributed each department in offices. So the data communication media never lost and terminated.