Network Design Report: Top Class Networks - Module: Networking
VerifiedAdded on 2022/10/10
|12
|1664
|474
Report
AI Summary
This report outlines a network design for Top Class Networks, a Sydney-based networking firm occupying a five-floor building with five departments: Administration, Customer Support, Hardware, HR, and Sales. The report begins with an introduction that analyzes networking requirements, followed by a detailed Local Area Network (LAN) design for all departments, including IP addressing and subnetting schemes to ensure efficient resource access and inter-departmental data transfer. The design incorporates point-to-point topology and considers the physical layout, including switch placement and firewall configuration. The report also provides a complete IP addressing scheme for all computers and printers in each department. The report concludes with a discussion of network topology, IP addressing, and subnetting, along with recommendations to enhance communication and promote Top Class Networks' business outcomes.

1
Network Design for Top Class Networks
Student’s Name:
Institution Affiliation:
Network Design for Top Class Networks
Student’s Name:
Institution Affiliation:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2
Introduction
Top Class Networks is a small networking firm in Sydney. The office occupies a five floor
building. The company has five main departments: Administration, Customer Support,
Hardware, HR and Sales. Administration is on the first floor, Customer Support is on the second
floor, Hardware is on third floor, HR is on fourth floor and Sales is on the fifth floor.
Administration has 42 workstations, Customer Support has 62 workstations, Hardware has 57
workstations, HR has 67 workstations and Sales has 72 workstations.
Requirements
All the computers must have latest Windows 10 operating system updates
Top Class Networks must have good physical and layout set up
Upgrading of printers and computers in all the departments
All departments must access resources from one common place.
Design and implementation
Network Topology
Point to point topology
A point-to-point system is perhaps the most straightforward system since it just includes two
hubs. Every hub is associated with the other with one association line. This is one of the least
expensive and best arrange models since it doesn't include the expense of redundancies and it
doesn't include the unpredictability of requiring a few hubs working to make an
association(Bordin, Gordini, and Vigo, 2016).
Introduction
Top Class Networks is a small networking firm in Sydney. The office occupies a five floor
building. The company has five main departments: Administration, Customer Support,
Hardware, HR and Sales. Administration is on the first floor, Customer Support is on the second
floor, Hardware is on third floor, HR is on fourth floor and Sales is on the fifth floor.
Administration has 42 workstations, Customer Support has 62 workstations, Hardware has 57
workstations, HR has 67 workstations and Sales has 72 workstations.
Requirements
All the computers must have latest Windows 10 operating system updates
Top Class Networks must have good physical and layout set up
Upgrading of printers and computers in all the departments
All departments must access resources from one common place.
Design and implementation
Network Topology
Point to point topology
A point-to-point system is perhaps the most straightforward system since it just includes two
hubs. Every hub is associated with the other with one association line. This is one of the least
expensive and best arrange models since it doesn't include the expense of redundancies and it
doesn't include the unpredictability of requiring a few hubs working to make an
association(Bordin, Gordini, and Vigo, 2016).

3
Be that as it may, the point-point system is illogical from a systems administration viewpoint
because once in a while is just a single association between two hubs sufficient. The point-to-
point mode can be contrasted with two soup jars associated by a string. Even though there is
nothing to interfere with the association, the system cannot branch out and make more
associations(Ceselli, Premoli, and Secci, 2015, May).
A genuine case of a point-to-point system is a PC that is associated with a nearby printer by a
USB link. Albeit exceptionally solid, there is no chance to get for either hub to associate with
whatever else utilizing that one USB association. Likewise, with no repetition, the whole
association is reliant on the USB link also(Eskandarpour et al., 2015).
Advantages
a) Most noteworthy Bandwidth because just two hubs are having a whole
transmission capacity of a connection
b) Extremely quick contrasted with other system topologies since it can get to just
two hubs(Rezapour, Farahani, and Pourakbar, 2017).
c) Fundamental availability
d) It gives low Latency.
c) Straightforward to deal with and keep up
d) Hub Can be Replaced in a couple of moments seconds(Govindan, Paam, and
Abtahi, 2016).
Local Area Network (LAN) Design
Be that as it may, the point-point system is illogical from a systems administration viewpoint
because once in a while is just a single association between two hubs sufficient. The point-to-
point mode can be contrasted with two soup jars associated by a string. Even though there is
nothing to interfere with the association, the system cannot branch out and make more
associations(Ceselli, Premoli, and Secci, 2015, May).
A genuine case of a point-to-point system is a PC that is associated with a nearby printer by a
USB link. Albeit exceptionally solid, there is no chance to get for either hub to associate with
whatever else utilizing that one USB association. Likewise, with no repetition, the whole
association is reliant on the USB link also(Eskandarpour et al., 2015).
Advantages
a) Most noteworthy Bandwidth because just two hubs are having a whole
transmission capacity of a connection
b) Extremely quick contrasted with other system topologies since it can get to just
two hubs(Rezapour, Farahani, and Pourakbar, 2017).
c) Fundamental availability
d) It gives low Latency.
c) Straightforward to deal with and keep up
d) Hub Can be Replaced in a couple of moments seconds(Govindan, Paam, and
Abtahi, 2016).
Local Area Network (LAN) Design
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4
Administration - 1st floor
Customer support - 2nd floor
Hardware - 3rd floor
Administration - 1st floor
Customer support - 2nd floor
Hardware - 3rd floor
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5
HR - 4th Floor
Sales - 5th Floor
IP addresses
Subnetting
Given the private address network of Top Class Networks as 10.0.0.0/8
Subnet Network address Slash First Usable Last Usable Broadcast
HR - 4th Floor
Sales - 5th Floor
IP addresses
Subnetting
Given the private address network of Top Class Networks as 10.0.0.0/8
Subnet Network address Slash First Usable Last Usable Broadcast

6
notation IP address IP address Address
1 10.0.0.0.0 /8 10.0.0.0.1 10.0.0.0.14 10.0.0.0.15
2 10.0.0.0.16 /8 10.0.0.0.17 10.0.0.0.30 10.0.0.0.31
3 10.0.0.0.32 /8 10.0.0.0.33 10.0.0.0.46 10.0.0.0.47
4 10.0.0.0.48 /8 10.0.0.0.49 10.0.0.0.62 10.0.0.0.63
5 10.0.0.0.64 /8 10.0.0.0.65 10.0.0.0.78 10.0.0.0.79
6 10.0.0.0.80 /8 10.0.0.0.81 10.0.0.0.94 10.0.0.0.95
7 10.0.0.0.96 /6 10.0.0.0 .97 10.0.0.0.110 10.0.0.0.111
8 10.0.0.0.112 /6 10.0.0.0.113 10.0.0.0.126 10.0.0.0.127
9 10.0.0.0.128 /6 10.0.0.0.129 10.0.0.0.142 10.0.0.0.143
10 10.0.0.0.144 /6 10.0.0.0.145 10.0.0.0.158 10.0.0.0.159
11 10.0.0.0.160 /6 10.0.0.0.161 10.0.0.0.174 10.0.0.0.175
12 10.0.0.0.176 /6 10.0.0.0.177 10.0.0.0.190 10.0.0.0.191
13 10.0.0.0.192 /6 10.0.0.0.193 10.0.0.0.206 10.0.0.0.207
14 10.0.0.0.208 /6 10.0.0.0.209 10.0.0.0.222 10.0.0.0.223
15 10.0.0.0.224 /6 10.0.0.0.225 10.0.0.0.238 10.0.0.0.239
16 10.0.0.0.240 /6 10.0.0.0.241 10.0.0.0.254 10.0.0.0.255
IP Addressing
notation IP address IP address Address
1 10.0.0.0.0 /8 10.0.0.0.1 10.0.0.0.14 10.0.0.0.15
2 10.0.0.0.16 /8 10.0.0.0.17 10.0.0.0.30 10.0.0.0.31
3 10.0.0.0.32 /8 10.0.0.0.33 10.0.0.0.46 10.0.0.0.47
4 10.0.0.0.48 /8 10.0.0.0.49 10.0.0.0.62 10.0.0.0.63
5 10.0.0.0.64 /8 10.0.0.0.65 10.0.0.0.78 10.0.0.0.79
6 10.0.0.0.80 /8 10.0.0.0.81 10.0.0.0.94 10.0.0.0.95
7 10.0.0.0.96 /6 10.0.0.0 .97 10.0.0.0.110 10.0.0.0.111
8 10.0.0.0.112 /6 10.0.0.0.113 10.0.0.0.126 10.0.0.0.127
9 10.0.0.0.128 /6 10.0.0.0.129 10.0.0.0.142 10.0.0.0.143
10 10.0.0.0.144 /6 10.0.0.0.145 10.0.0.0.158 10.0.0.0.159
11 10.0.0.0.160 /6 10.0.0.0.161 10.0.0.0.174 10.0.0.0.175
12 10.0.0.0.176 /6 10.0.0.0.177 10.0.0.0.190 10.0.0.0.191
13 10.0.0.0.192 /6 10.0.0.0.193 10.0.0.0.206 10.0.0.0.207
14 10.0.0.0.208 /6 10.0.0.0.209 10.0.0.0.222 10.0.0.0.223
15 10.0.0.0.224 /6 10.0.0.0.225 10.0.0.0.238 10.0.0.0.239
16 10.0.0.0.240 /6 10.0.0.0.241 10.0.0.0.254 10.0.0.0.255
IP Addressing
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

7
Each computer and printers should be assigned an IP address. The table below illustrates IP
addresses in different departments(Green et al., 2015).
Department and
place
Device Interface IP address Subnet mask Default
gateway
Administration Computers and
VoIP Devices
-printer
Ethernet and
wi-fi
192.168.1.9-
192.168.1.29
-192.168.1.33
255.255.0.0 192.168.1.30-
192.168.1.32
-192.168.1.34
Customer
Support
Computers and
VoIP devices
-printer
Ethernet and
wi-fi
192.168.1.35-
192.168.1.55
-192.168.1.59
255.255.0.0 192.168.1.56-
192.168.1.58
-192.168.1.60
Hardware Computers and
VoIP devices
-printer
Ethernet and
wi-fi
192.168.1.60-
192.168.1.80
-192.168.1.85
255.255.0.0 192.168.1.81-
192.168.1.84
-192.168.1.86
HR Computers and
VoIP devices
Ethernet and
wi-fi
192.168.1.87-
192.168.1.97
255.255.0.0 192.168.1.98-
Each computer and printers should be assigned an IP address. The table below illustrates IP
addresses in different departments(Green et al., 2015).
Department and
place
Device Interface IP address Subnet mask Default
gateway
Administration Computers and
VoIP Devices
-printer
Ethernet and
wi-fi
192.168.1.9-
192.168.1.29
-192.168.1.33
255.255.0.0 192.168.1.30-
192.168.1.32
-192.168.1.34
Customer
Support
Computers and
VoIP devices
-printer
Ethernet and
wi-fi
192.168.1.35-
192.168.1.55
-192.168.1.59
255.255.0.0 192.168.1.56-
192.168.1.58
-192.168.1.60
Hardware Computers and
VoIP devices
-printer
Ethernet and
wi-fi
192.168.1.60-
192.168.1.80
-192.168.1.85
255.255.0.0 192.168.1.81-
192.168.1.84
-192.168.1.86
HR Computers and
VoIP devices
Ethernet and
wi-fi
192.168.1.87-
192.168.1.97
255.255.0.0 192.168.1.98-
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8
-printer -192.168.1.101 192.168.1.100
-192.168.1.102
Sales Computers and
VoIP devices
-printer
Ethernet and
wi-fi
192.168.1.111-
192.168.1.120
255.255.0.0 192.168.1.121-
192.168.1.124
All in one
printer
Printer (printer,
scanner, photo
copy)
Ethernet and
wi-fi
192.168.1.125 255.255.0.0 192.168.1.126
Hardware
The second floor comprises of 2 center switches, two center switches, firewall, entryway switch,
server room and a peaceful area (DMZ) which hosts web server for Inside access just as for
outside access. The motivation to utilize two center switches is to give excess and to keep away
from a sole purpose of disappointment (SPOF). Fiber optic links turning out from the switch case
in each floor and the switch inside the server room is ending in every one of these center
switches independently(Soleimani et al., 2017). These center switches are likewise
interconnected between them. Center switch is utilized to course traffic inside the structure
(among VLANs) and to course traffic outside of the structure (To Internet and other branch
workplaces). The motivation to utilize two center switches is to give repetition and to keep away
from a sole purpose of disappointment. 2 center switches likewise interconnected among them
and associated with two center switches utilizing rapid links independently. DMZ (to isolate it
from within the system) is made to have the webserver because it is thought to be gotten to by
-printer -192.168.1.101 192.168.1.100
-192.168.1.102
Sales Computers and
VoIP devices
-printer
Ethernet and
wi-fi
192.168.1.111-
192.168.1.120
255.255.0.0 192.168.1.121-
192.168.1.124
All in one
printer
Printer (printer,
scanner, photo
copy)
Ethernet and
wi-fi
192.168.1.125 255.255.0.0 192.168.1.126
Hardware
The second floor comprises of 2 center switches, two center switches, firewall, entryway switch,
server room and a peaceful area (DMZ) which hosts web server for Inside access just as for
outside access. The motivation to utilize two center switches is to give excess and to keep away
from a sole purpose of disappointment (SPOF). Fiber optic links turning out from the switch case
in each floor and the switch inside the server room is ending in every one of these center
switches independently(Soleimani et al., 2017). These center switches are likewise
interconnected between them. Center switch is utilized to course traffic inside the structure
(among VLANs) and to course traffic outside of the structure (To Internet and other branch
workplaces). The motivation to utilize two center switches is to give repetition and to keep away
from a sole purpose of disappointment. 2 center switches likewise interconnected among them
and associated with two center switches utilizing rapid links independently. DMZ (to isolate it
from within the system) is made to have the webserver because it is thought to be gotten to by

9
insiders just as untouchables. Along these lines, on the off chance that any gatecrashers attempt
to assault the webserver, at that point, harm to the entire system (framework) will be limited. The
web server in DMZ is legitimately associated with the firewall utilizing a fast link. A firewall is
used to channel traffic that is coming toward within system. This is accomplished using the
entrance control list (ACL) arranged inside the firewall. A firewall is associated with center
switches and web server the inside way and associated with the door switch and Internet in its
outside ways.
The door switch is utilized to advance/course the traffic to other legitimately associated branch
workplaces through the rented lines (Assuming branch workplaces are associated with the
leading site through the occupied lines as they are arranged near one another and requires
enormous information move to the leading site)(Szeto et al., 2015).
insiders just as untouchables. Along these lines, on the off chance that any gatecrashers attempt
to assault the webserver, at that point, harm to the entire system (framework) will be limited. The
web server in DMZ is legitimately associated with the firewall utilizing a fast link. A firewall is
used to channel traffic that is coming toward within system. This is accomplished using the
entrance control list (ACL) arranged inside the firewall. A firewall is associated with center
switches and web server the inside way and associated with the door switch and Internet in its
outside ways.
The door switch is utilized to advance/course the traffic to other legitimately associated branch
workplaces through the rented lines (Assuming branch workplaces are associated with the
leading site through the occupied lines as they are arranged near one another and requires
enormous information move to the leading site)(Szeto et al., 2015).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

10
Conclusion and recommendations
In business, the network is significant for correspondence among client and customer, so IP must
assign to every gadget associated in the system to convey. An open IP address is paid and given
by ISP which is interesting and doles out to the switch, and distinctive server and every PC,
versatile and different gadgets associate with switch allot private IP address through DHCP
convention. A Public IP address appoint gadget can access over the web, yet private IP address
relegates gadget can access over the web through open IP address by system address interpreter,
so every association needs remarkable IP address which is secure to access and move record and
asset.
Top Class Networks is little organization, that division prerequisite must satisfy, and
arrangement PC arrange that guarantee all representative must access all record and asset of the
organization as per the organization strategy. The consistent and physical format must be
actualized alongside arranging and structure that improve communication between various
offices that helps to advance Top Class Networks results.
Conclusion and recommendations
In business, the network is significant for correspondence among client and customer, so IP must
assign to every gadget associated in the system to convey. An open IP address is paid and given
by ISP which is interesting and doles out to the switch, and distinctive server and every PC,
versatile and different gadgets associate with switch allot private IP address through DHCP
convention. A Public IP address appoint gadget can access over the web, yet private IP address
relegates gadget can access over the web through open IP address by system address interpreter,
so every association needs remarkable IP address which is secure to access and move record and
asset.
Top Class Networks is little organization, that division prerequisite must satisfy, and
arrangement PC arrange that guarantee all representative must access all record and asset of the
organization as per the organization strategy. The consistent and physical format must be
actualized alongside arranging and structure that improve communication between various
offices that helps to advance Top Class Networks results.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

11
Reference
Bordin, C., Gordini, A. and Vigo, D., 2016. An optimization approach for district heating
strategic network design. European Journal of Operational Research, 252(1), pp.296-307.
Ceselli, A., Premoli, M. and Secci, S., 2015, May. Cloudlet network design optimization.
In 2015 IFIP Networking Conference (IFIP Networking) (pp. 1-9). IEEE.
Eskandarpour, M., Dejax, P., Miemczyk, J. and Péton, O., 2015. Sustainable supply chain
network design: An optimization-oriented review. Omega, 54, pp.11-32.
Govindan, K., Paam, P. and Abtahi, A.R., 2016. A fuzzy multi-objective optimization model for
sustainable reverse logistics network design. Ecological indicators, 67, pp.753-768.
Reference
Bordin, C., Gordini, A. and Vigo, D., 2016. An optimization approach for district heating
strategic network design. European Journal of Operational Research, 252(1), pp.296-307.
Ceselli, A., Premoli, M. and Secci, S., 2015, May. Cloudlet network design optimization.
In 2015 IFIP Networking Conference (IFIP Networking) (pp. 1-9). IEEE.
Eskandarpour, M., Dejax, P., Miemczyk, J. and Péton, O., 2015. Sustainable supply chain
network design: An optimization-oriented review. Omega, 54, pp.11-32.
Govindan, K., Paam, P. and Abtahi, A.R., 2016. A fuzzy multi-objective optimization model for
sustainable reverse logistics network design. Ecological indicators, 67, pp.753-768.

12
Green, A.L., Maypa, A.P., Almany, G.R., Rhodes, K.L., Weeks, R., Abesamis, R.A., Gleason,
M.G., Mumby, P.J. and White, A.T., 2015. Larval dispersal and movement patterns of coral reef
fishes, and implications for marine reserve network design. Biological Reviews, 90(4), pp.1215-
1247.
Rezapour, S., Farahani, R.Z. and Pourakbar, M., 2017. Resilient supply chain network design
under competition: a case study. European Journal of Operational Research, 259(3), pp.1017-
1035.
Soleimani, H., Govindan, K., Saghafi, H. and Jafari, H., 2017. Fuzzy multi-objective sustainable
and green closed-loop supply chain network design. Computers & Industrial Engineering, 109,
pp.191-203.
Szeto, W.Y., Jiang, Y., Wang, D.Z.W. and Sumalee, A., 2015. A sustainable road network
design problem with land use transportation interaction over time. Networks and Spatial
Economics, 15(3), pp.791-822.
Green, A.L., Maypa, A.P., Almany, G.R., Rhodes, K.L., Weeks, R., Abesamis, R.A., Gleason,
M.G., Mumby, P.J. and White, A.T., 2015. Larval dispersal and movement patterns of coral reef
fishes, and implications for marine reserve network design. Biological Reviews, 90(4), pp.1215-
1247.
Rezapour, S., Farahani, R.Z. and Pourakbar, M., 2017. Resilient supply chain network design
under competition: a case study. European Journal of Operational Research, 259(3), pp.1017-
1035.
Soleimani, H., Govindan, K., Saghafi, H. and Jafari, H., 2017. Fuzzy multi-objective sustainable
and green closed-loop supply chain network design. Computers & Industrial Engineering, 109,
pp.191-203.
Szeto, W.Y., Jiang, Y., Wang, D.Z.W. and Sumalee, A., 2015. A sustainable road network
design problem with land use transportation interaction over time. Networks and Spatial
Economics, 15(3), pp.791-822.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





