Introduction
Hello everyone, I am Brother Xue. Recently, readers in the VIP member group have been asking about the construction process plan for computer network systems. Today, I am sharing a very comprehensive construction and debugging plan for computer network systems, including the construction process flow. I suggest saving it for future reference.
This complete Word material can be downloaded directly by VIP members who need it, just message me!
Non-members can also enter my “Knowledge Planet” to download it; just scan the code to enter.
If you want to download premium low-voltage materials, you can join by scanning the code!
Ultimately, we will cross the sea of growth
01
Main Text
1.Construction Process Flow
1)Equipment Installation Preparation
1)Keep the chassis clean and dust-free.
2)When installing and maintaining, do not wear loose clothing, jewelry (including rings and necklaces), or anything else that may get caught in the chassis.
3)Carefully check for potential hazards in the work area, such as ungrounded power sources, unreliable grounding, or damp floors.
4)Before installation, know the location of the emergency power switch in the room where the switch is located, and cut off the power switch first in case of an accident.
5)Be sure to unplug all power cords and external cables before moving the chassis.
6)Do not place the switch in damp areas, and do not let liquids enter the switch.
7)When transporting the switch, do not grab the power handle or the chassis ventilation holes.
8)When installing various components of the switch, especially circuit boards, an anti-static wrist strap must be worn.
9)When holding the circuit board, it is best to hold the edges of the circuit board and avoid touching components and printed circuits.
10)Try to install the switch in an open cabinet. If installed in a closed cabinet, ensure the cabinet has a good ventilation and heat dissipation system.
11)Ensure the cabinet is strong enough to support the weight of the switch and its installation accessories.
12)Ensure the size of the cabinet is suitable for the installation of the switch. There should be some space on the left and right panels of the switch for heat dissipation.
2)Cable Tying
1)The cables in the cabinet should be tied neatly and straight after bundling, without any entanglement or bending.
2)The bending radius of the cable in the middle should not be less than twice the diameter of the cable, and at the connector, it should not be less than five times its diameter.
3)Different types of cables (power cables, signal cables, ground wires, etc.) should be routed and tied separately in the cabinet. They should not be mixed together. When close together, cross-wiring can be used. When running parallel, the distance between power cables and signal wires should be no less than 30mm.
4)Wire racks and wiring ducts inside and outside the cabinet should be smooth and free of sharp edges.
5)Metal holes through which cables pass should have smooth, well-rounded surfaces or be fitted with insulation sleeves.
6)When tying cables, choose appropriate specifications for the cable ties, and do not use two or more cable ties connected together to tie the cables. The existing specifications for cable ties in the company are as follows: 100×2.5mm, 150×3.6mm, 300×3.6mm, 530×9mm, 580×13mm.
7)After tying the cables with cable ties, cut off the excess part, and the cut should be smooth and neat, leaving no sharp edges.
8)When the cable needs to be bent, it should be tied before bending. However, the cable ties should not be tied in the bending area to avoid generating excessive stress in the cable, which may cause the cable core to break.
9)For cables that do not need to be assembled, or for excess cable lengths, they should be folded and tied at appropriate locations on the cabinet or duct. The appropriate location means that it will not affect equipment operation during debugging, will not cause damage to equipment, and will not cause damage to cables.
10)220V power cables and -48V power cables must not be tied to the guide rails of moving parts.
11)For power cables connecting moving parts, such as door grounding wires, leave some slack after assembly to avoid stress on the cables; when the moving part reaches the installation position, ensure that the excess cable does not touch heat sources, sharp corners, or edges. If it is unavoidable to be near a heat source, the cable should be a high-temperature cable.
12)For cable connection terminals fixed with screws, the screws or nuts should be securely fastened and measures should be taken to prevent loosening.
13)For harder power cables, they should be fixed near the termination to prevent stress at the termination and on the cable.
14)Do not use self-tapping screws to fasten terminal blocks.
15)Power cables of the same type and direction should be bundled together, and the cables within the bundle should be clean and straight.
16)No cable routing or bundling should be knotted.
17)For crimped cold-pressed terminal blocks (such as air switches), the metal parts of the cold-pressed terminals should not be exposed outside the terminal block during assembly.
2.Cabinet Installation
The installation process is as follows:
1)The cabinet should be arranged according to the drawings and site conditions, with equipment numbers and positions pre-assigned, and the cabinet should be placed on the equipment foundation in order;
2)Individually align the verticality of the front panel and both ends of the side of the cabinet. Once the cabinets are positioned in order, first align both ends, then use a small line to align each cabinet individually, using the cabinet face as the reference. When aligning, use a 0.5mm iron sheet for adjustment, with a maximum of 3 spacers at each location;
3)Once the cabinets are aligned and leveled, the cabinet body should be fixed to the foundation, and the cabinet body should be connected to each other and to the side panels with galvanized bolts.
4)Adjust the vertical deviation of the cabinet and the spacing deviation between cabinets, with the horizontal and vertical deviations not exceeding 1.5‰.
3.Switch Installation
1)First step: Before installation, confirm that the switch cabinet has been fixed, the installation position of the switch inside the cabinet has been arranged, and there are no obstacles affecting the installation of the switch inside and around the cabinet. The switch to be installed is ready and has been moved to a position close to the cabinet for easy transportation.
2)Second step: Install the baffle on the switch cabinet according to the installation position of the switch.
3)Third step: Install the built-in wiring rack and ears on the switch.
4)Fourth step: Two people should lift the switch from both sides and slowly move it to the front of the installation cabinet.
5)Fifth step: Lift the switch to a position slightly higher than the baffle of the cabinet, place the switch on the installation baffle, and adjust its front and rear position.
6)Sixth step: Use fixed screws to secure the ears of the chassis to the square holes of the switch cabinet’s vertical columns, fixing the switch to the cabinet.
1)Switch Testing
1)All boards are installed correctly;
2)All communication cables, optical fibers, power cables, and ground wires are connected correctly;
3)The supply voltage matches the requirements of the equipment;
4)Configuration cable connections are correct, and the configuration environment is built through the Console port or Telnet;
5)Set the IP of each LAN port and divide VLANs;
6)Check if the device operates normally after powering on;
7)Check if the ventilation system works normally;
8)Check if the system indicator lights are normal.
2)Router Testing
1)Connect the WAN port to the port provided by the operator;
2)Connect any LAN port to the terminal;
3)Build the configuration environment through the Console port or Telnet;
4)Check if the power line and ground line connections are correct, and if the supply voltage is normal;
5)After powering on, observe if the power, WAN, and LAN indicator lights of the router are normal;
6)Establish a normal connection with the switch.
3)Firewall Testing
1)Connect to terminal devices through cables to build the configuration environment;
2)Set the serial port parameters and configure terminal attributes;
3)Check if the power line and ground line connections are correct, if the voltage is normal, and if the configuration cable connections are accurate;
4)After powering on, observe if the panel indicator lights are normal and if the self-starting is normal;
4.Network Connectivity Testing
1)Use TCP/IP protocol for network connectivity testing methods
2)Use the ping command for testing. The specific testing method is to enter the ping command in the DOS command window, formatted as “ping x.x.x.x”, with “x.x.x.x” being the network address of the machine or device in the network. If the response is “Reply from x.x.x.x: bytes= m time
3)Use the TCP/IP protocol for routing testing methods
4)Use the traceroute command for testing. The specific testing method is to enter “tracert x.x.x.x” in the DOS command window, with the output being the routes taken to reach the “x.x.x.x” node. If the returned information matches the defined routing table, the routing settings are correct.
5.Software Testing
1)Correctly install network management and service software on the server side and client side;
2)Check if the network management framework configuration data is accurate;
3)Check if the server side can generate the entire network framework and download configuration data;
4)Test if the software can provide basic functions such as topology management, user management, performance management, alarm management, operation logs, and device log management;
6.Network Security Testing
1)Physical layer security includes control and management of the physical environment in which the information network operates (such as machine rooms, wiring rooms, etc.), as well as prevention of security risks caused by physical media, signal radiation, etc.
2)Network layer security mainly ensures the stability and reliability of network communication, and performs access control and security checks at the network layer to resist attacks and destruction at the network layer. Network layer security includes defense against attacks, Internet access control and management, security isolation, etc., involving technologies or products such as secure network topology, firewalls, intrusion detection systems, and content filtering.
3)System layer security mainly protects various network devices, servers, desktop hosts, etc., ensuring the security of operating systems and network service platforms, and preventing data damage from system attacks.
4)Application layer security mainly addresses the security of various network application systems.
1)Network Layer Security Testing
1)Check the network topology diagram to ensure that all servers and office terminals are protected by the corresponding firewall;
2)Scan the firewall to ensure that the firewall itself has no external service ports (except for services on the internal network or DMZ);
3)The internal network should use private IP addresses;
4)Scan the servers in the DMZ network, ensuring that only the ports that should provide services are scanned.
2)System Layer Security Testing
1)Use system input as a breakthrough point to conduct direct attacks utilizing the fault tolerance of the input;
2)Request and occupy excessive resources to overwhelm the system and breach security measures, thereby entering the system;
3)Deliberately cause system errors, using the system recovery process to steal user passwords and other useful information;
4)Utilize garbage information from various resources in the computer (useless information) to obtain important information such as passwords, security codes, and decryption keys;
5)Browse global data, hoping to find key words to enter the system;
6)Browse various records and resources that logically do not exist but physically still exist, searching for breakthroughs.
7)It is recommended that user passwords be at least 6 characters (at least 8 characters for administrator accounts), consisting of a combination of letters, numbers, and special symbols, and that users must change their passwords regularly (at most every three months).
8)Confirm that the authenticated user is a legitimate user and clarify the roles that the user possesses.
9)When users access information resources (including network resources and application resources), control the process of user access to resources based on pre-determined permissions.
3)Application Layer Security Testing
1)Use various security services provided by application development platforms such as database servers, web servers, operating systems, etc.;
2)Use various security services provided by developers when developing application systems;
3)Use various security services provided by second-party application security platforms. Application security platforms are software products provided by third-party information security vendors that can seamlessly integrate with application systems, providing reliable and consistently strong security services (including identity verification, authorization management, transmission encryption, security auditing, etc.), and providing centralized and unified security management.
Latest Premium Material Introduction
Recently released the public account articles for the second half of 2023 (up to December 31st). It includes plans, images, and basically covers articles on various systems in the intelligent low-voltage industry, and also offers 20 sets of premium materials, each with titles for easy searching of relevant content. This material is very suitable for beginners to learn, especially for those with no time and who do not know how to search for information, with a total of over 5000. It is recommended to get a set; it will definitely be helpful!
All PPT plans in the article are given away, totaling 400 PPTs, 6 complete drawings, 316 industry standards and construction drawing collections,60 Word plans, 20 construction organization designs, 20 bill of quantities (with reference prices), drawings and materials 162 pieces,120 Visio blocks and topology diagrams, project management and construction plans, practical excel forms 68 pieces, bidding plans and construction organization designsetc.
Related content can be viewed by clicking the link below
Release of low-voltage materials in the second half of 2023, with a large update, offering various intelligent premium materials
Brother Xue’s Summary:
If you need articles from the first half of 2023, you can check the link below:
Release of low-voltage materials in the first half of 2023, with a large update, offering various intelligent materials
If you need articles from the second half of 2022, you can check the link below:
Release of low-voltage materials in the second half of 2022, with a large update, offering a wealth of intelligent premium materials
Low-voltage materials are offered for free; if needed, click the link below
Latest free low-voltage materials, download methods attached
All-inclusive low-voltage system materials (free)
Some video tutorials on intelligent low-voltage systems (free)
Offering 90 intelligent low-voltage industry standard specifications
Good articles should be shared; sharing is a virtue, helping others is helping yourself.
If you encounter problems while learning about the low-voltage industry knowledge that you cannot solve, you can consult me! I am willing to provide some help to those who are just starting out. Welcome everyone to add my QQ number 81113907 or WeChat 81113907
Low-voltage Growth Club (VIP group) is recruiting members, with 3000 elite members already joined!
Our aim is to share knowledge, share resources, cooperate and win-win, and grow together!
For specific details, click the link below:
Low-voltage Growth Club (VIP) group 7 established, high-end networking circle, increased benefits!

Scan the QR code | Follow us
WeChat ID | ruodianxuege, kkiiss
Brother Xue,一级建造师, founder of the Low-voltage Growth Club, proficient in the entire process of intelligentization, looking forward to cooperating with you!
Brother Xue updates intelligent low-voltage knowledge every day; everyone is welcome to communicate.
Looking forward to your
Share
Like
Looking
Postscript: Due to WeChat modifying its push rules, those who do not frequently leave messages or click“Looking” will gradually stop receiving pushes! If you still want to see our pushes every day, please add “Brother Xue’s public account” as a star or click on the bottom of the page after reading each time“Like” “Looking”, thank you!