Network Design For TechTrainers: Growth Projections, Queuing Constraints, And Security Protocols

Overview of TechTrainers and Its Network Requirements

  1. The description of the requirement of the business are given below:

Growth projections and capacity planning – The campus network is designed for the accommodation of the future growth of the TechTrainers, more numbers are servers are installed in the campus for balancing the load and reducing the waiting time of the students. Each of the rooms of TechTrainers should be allocated a separate switch and it should be connected with the core switch installed in the core layer of the network. For connecting the branches of TechTrainers a VPN connection should be established and the organizational resources should be shared for allowing the remote users to access the resources of the organization.     

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Costs and queuing constraints – The network is designed such that cost of the network should not increase with the installation of the second server in the network and the redundancy is maintained. The return of investment should be high and the hardware and software required for the development of the network solution should be listed for the estimation of the budget for the development of the network.

High and low Speed links – The links should be divided into high speed and low speed links for allocating the links to the different types of users such as for accessing the multimedia files the high speed link should be allocated and the low speed links are allocated for the normal usage. The multimedia computers should be connected with the high speed links and the other computers can be connected with the low speed links for reducing the management cost of the network solution.

Redundancy paths – The network should be redundant such that the student and the staff can reach the server or the destination link via different paths in the network. If one link fails the data packets can reach the destination node using the redundant link. Each of the rooms must be connected with all the switches installed in the network and the switch ports must be configured for allowing the VLAN access to the links for increasing the redundancy of the network. The network must be segmented according to the usage and separate VLAN must be created on the switch for the accommodation of the departments and the multimedia computers for reducing the congestion in the network.

Response time and reliability requirements – The network should be responsive and never get down due to congestion of link failure. The hardware and the devices should be protected with the application of security mechanism for reducing the risk of illegal access of the network components.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Growth Projections and Capacity Planning

Scope of Operation – The network traffic load should be controlled for identification of the source of unusual traffic and reduce the risk of DoS attack. All the departments should be connected using different VLAN for removing congestion in the network. The computers installed in the multimedia lab must have authentication for allowing the student and staffs to access the system.

Traffic Flow Pattern – Traffic management is necessary and network protocol analyzer is used for monitoring the activity of the network and block the unknown sources for increasing the security of the network. The file servers must be shared such that the users must be able to use by the student.

Application requirements of users – The network should respond to the request of the students and connect each of the department for sharing the files. The network of the student and the staffs should be separated for increasing the security of the network.

  1. The description of the software and programing required for the development of the network infrastructure re given below:

o Security protocols – The network needs to be secured with the application of the security protocols and the servers used for sharing the resources for the student network should be secured using cryptographic functionality for increases the security of the network. Different algorithms are used for the authentication of the students and the staffs and enabling them sharing information and files in the network.

o Transmission control protocol or internet protocol (TCP/IP) – Used for establishment of end to end connection between the student and the server and include different steps such as addressing, mapping and acknowledgement of the data packet. Moreover for the establishment of the remote connection between the network VPN connections must be used for increasing the security of the network.

  1. Provide an outline of the installation requirements for local area networks including:

Cabling – To use proper cabling plan for connecting the device in the network and avail sufficient bandwidth for the transmission of data, multimedia packets in the network. Cat 6 cable is used for interconnecting the network components. Fiber optics cable is used as the backbone of the network is used for supporting higher bandwidth.

Characteristics and relative strength and weakness of LAN topologies – The bus topology is not selected because it is not suitable for network where the traffic is more because single channel is used for sending and receiving the data packets in the network and can cause congestion in the network. The mesh topology required extra wiring and it increases the cabling cost and thus it is not selected.

Features and capability of current industry accepted hardware and software products – The selected hardware installed for the development of the network solution should meet the compliance standards and the energy ratings such that no legal issues occurs. The current problem in the campus network should be resolved with the application of the hardware and the software and feedback from the user should be taken for the development of the network infrastructure. The application of the industry accepted hardware and software would reduce the error in the network and increase the security of the network.

Costs and Queuing Constraints

Features of line sharing protocols – The server should be configured with the sharing protocol and allow the user to access the files with secure login into the server. The file sharing and printer sharing for the student and the staffs are important for the management of the campus network. Server Message Block (SMB) service are used for sharing of the files in the network, authentication and enabling network printing for the staffs.

  1. List of the different segments required to meet the identified business network requirements are given below:
  • Core network
  • Distribution layer, and
  • Access layer

o Data type- the core layer is responsible for processing the different types of data and distributing to the different sources in the network. The main router of TechTrainer are installed in the core layer for connecting the different branches and enabling sharing of files between each other.

o Data sources – the sources of data are connected with the access layer and sends and receives the data packets in the network.

o Number of network users – the number of user should be known for the calculation of the IP address. Static IP address is used for the hosts connected in the network such that the activity of the host can be monitored with the use of network protocol analyzer.

o Security requirements – A dmz zone is created for the installation of the servers and protecting them from any physical access for increasing the security of the network. The switches are configured with VLAN for segmentation of the network and configuring the router with ace control list. QoS is also implemented in the network such that the users of the network does not face any lag and the packets does not gets lost in the network. A secure connection should be set between the sender and the receiver for the successful delivery of the network packets.

o Storage requirements – The database servers should be configured or cloud servers can be used for storing the organizational data. A router and a layer 2 switch is used for the segmentation of the campus network connecting ach of the departments with different VLAN.

The total bandwidth consumption for the month is calculated and shown in the above graph and it has been found that an average of 74.94 gb is consumed.

Proposed network infrastructure for TechTrainers

Structure of the matrix

Formal Network

Organizing principles

The works are organized by the higher level authority

The interest of the employees and the users are considered for the development of the network

Influence

Management hierarchy

Leadership and collaboration

Selection of the device

Depends on the selection of the network topology

Normal networking devices are used for deigning the network

Implications

· Networking model is used for the development of the network

· Interaction should be made with the users for finding the requirement

· The users should be categorized according to their requirement

· Different VLANs are created

· Firewall is configured  

· The hierarchical structure is kept simple

· A simple network topology is selected for interconnecting the nodes

· The departments are separated using different switches

  1. The typical network topologies for the following network are given below:

o Large and small LANs – Star topology

o Wide area networks (WANs) – Flat, Star, Full mesh and partial mesh

o VPNs – Hub and spoke, partial mesh, full mesh, hybrid topology

o Virtual local area networks (VLANs) – The VLAN work with the same physical network topology applied for the development of network infrastructure

High and Low Speed Links

o WLANs. – Ad hoc networks

The topologies are described below: 

Bus topology – a single cat 6 cable is used for connecting the hosts in the network and in bus topology the cost of the wiring is minimum when compared with the other network topologies. It is not suitable for large network because all the node are connected in series and if a node fails the rest of the nodes becomes unreachable. The speed of communication also decreases with the increase in traffic in the network.

Ring topology – For ring topology the PCs are associated in the network as a ring. The PCs are associated in a series connection and each of the computers have two neighboring computers. Repeaters are used for the network in light of the fact that the cutoff of the ring system is upto 100 computers and the repeaters are introduced in the system for maintaining a strategic distance from the danger of information misfortune. The transmission of the information parcels can be bi directional and the system model can be effectively extended however the significant weakness of the system is that of a PC comes up short the entire system would fall.

Star topology – it is utilized for associating the hubs utilizing a solitary gadget and it might be a center point or switch introduced in the essential issue of the system. The center or the switch is utilized as the repeater and cat 5e links are utilized for interconnecting the hubs with the center point or switch. The fundamental favorable position of this sort of system demonstrate is that it can be effortlessly investigated and more number of hubs can be included without influencing the entire system. The execution of the system relies upon the switch or the center point introduced in the essential issue of the system and if the gadget comes up short the entire system would fall. 

Mesh topology ¬ it is utilized for the foundation of point to point association with the hubs associated in the system and directing and flooding is utilized for transmission of the information over the work arrange. There are two types of mesh topology such as partial mesh and full mesh network. For the partial mesh network the nodes installed in the network are connected with most of the devices but for full mesh network all the nodes are connected with each other. It becomes complex task for the network administrator to add a new node in the full mesh network.

Redundancy Paths

Tree topology – It takes after a chain of command for interfacing each of the hubs in the system and it have distinctive levels. The tree topology is for the most part utilized for interfacing the gathering of workstations in the system and identification of the mistake and expansion of new hubs in the system is a simple undertaking.

Hybrid topology – it is a combination of the above two or more topology and is used according to the requirement of the network for saving the cost of the network and increasing the efficiency. The hybrid topology is used for increasing the reliability of the network and increase the flexibility of the network solution.

  1. Description of two network topology options to meet client business requirements.

Simplified topology without core

It is similar to the mesh topology and each of the device installed in the campus of TechTrainers are interconnected with each other. If one of the link fails the student and the staffs can reach the destination address utilizing the redundant link in the network. The switch installed in the access layer are configured with VLAN for different department and a loop is created and a spanning the protocol should be used for the configuration of the switch and blocking a particular link and breaking the loop. It is a fault tolerance network and supports redundancy for the transmission of the data packet. The different department of the TechTrainers can communicate using different channels and thus congestion can be avoided.

Simplified topology with core

The core is used for communicating with the different departments of the campus and it act as the bridge of the network and it increases the scalability of the campus network for the accommodation of the new devices without compromising the whole network infrastructure.

A list of the resource requirements for each network segment identified in the network proposal for each of the network topology options are given below:

Hardware

Cisco Catalyst 2800 24 Port Layer 3 switch.

Acer Altos R720 Rackmount Servers

Cisco Catalyst 2800 Router

Lacie 2 TB 10/100/1000 Back-up Device

APC Back UPS RS

Netgear WG302 Managed Wireless Access Point

Netgear GS108 Switch 8-port

Purchase order with estimated resource costing are given below:

Hardware

Price

Qty

Total

Cisco Catalyst 2800 24 Port Layer 3 switch.

 $   8,333.00

4

 $              33,332.00

Acer Altos R720 Rackmount Servers

 $   5,000.00

5

 $              25,000.00

Cisco Catalyst 2800 Router

$10,000

1

 $              10,000.00

Lacie 2 TB 10/100/1000 Back-up Device

657

2

 $                1,314.00

APC Back UPS RS

495

2

 $                   990.00

Netgear WG302 Managed Wireless Access Point

331

4

 $                1,324.00

Netgear GS108 Switch 8-port

159

36

 $                5,724.00

For increasing the efficiency of the proposed network solution the following recommendations are made.

Business requirement – The business requirement should be followed and no requirements should be missed and the errors in the network should be eliminated such that it cannot be accessed by external agents

Functional analysis – A functional analysis should be made for analysis of the proper working of the devices and estimation of the requirement of the network solution

Cost – The cost of the networking device required should be listed and a budget should be prepared such that it should be meet.

Application of other topologies – The different topologies available should be analyzed and the right methodology should be adopted aligning the requirement of the organization for increasing the functionality of the network.

Agyapong, P.K., Iwamura, M., Staehle, D., Kiess, W. and Benjebbour, A., 2014. Design considerations for a 5G network architecture. IEEE Communications Magazine, 52(11), pp.65-75.

Babazadeh, R., Razmi, J., Pishvaee, M.S. and Rabbani, M., 2017. A sustainable second-generation biodiesel supply chain network design problem under risk. Omega, 66, pp.258-277.

Baghalian, A., Rezapour, S. and Farahani, R.Z., 2013. Robust supply chain network design with service level against disruptions and demand uncertainties: A real-life case. European Journal of Operational Research, 227(1), pp.199-215.

Berman, M., Chase, J.S., Landweber, L., Nakao, A., Ott, M., Raychaudhuri, D., Ricci, R. and Seskar, I., 2014. GENI: A federated testbed for innovative network experiments. Computer Networks, 61, pp.5-23.

Cisco. (2017). Routers. [online] Available at: https://www.cisco.com/c/en_in/products/routers/index.html [Accessed 16 Dec. 2017].

Diebold, F.X. and Y?lmaz, K., 2014. On the network topology of variance decompositions: Measuring the connectedness of financial firms. Journal of Econometrics, 182(1), pp.119-134.

González, A.D., Dueñas?Osorio, L., Sánchez?Silva, M. and Medaglia, A.L., 2016. The interdependent network design problem for optimal infrastructure system restoration. Computer?Aided Civil and Infrastructure Engineering, 31(5), pp.334-350.

Herzberg, A. and Shulman, H., 2014. Retrofitting security into network protocols: The case of dnssec. IEEE Internet Computing, 18(1), pp.66-71.

Hu, V.C., Ferraiolo, D., Kuhn, R., Friedman, A.R., Lang, A.J., Cogdell, M.M., Schnitzer, A., Sandlin, K., Miller, R. and Scarfone, K., 2013. Guide to attribute based access control (ABAC) definition and considerations (draft). NIST special publication, 800(162).

Mahgoub, I. and Ilyas, M., 2016. Sensor network protocols. CRC press.

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.