BN321 Advanced Network Design: Human Factors in Network Designing
VerifiedAdded on  2023/06/03
|11
|2358
|493
Report
AI Summary
This report provides a comprehensive analysis of human factors in network design for Excelfior Ltd., a digital communication company. It details the user, application, device, and network requirements, emphasizing timeliness, interactivity, reliability, and security. The report includes a network design diagram and discusses key performance metrics such as bandwidth, delay, jitter, and error rate. It also examines the interplay of these factors in determining network performance and utility. The analysis covers the roles of various departments within Excelfior Ltd. and how the network design facilitates their communication and efficiency. This document is available on Desklib, a platform offering a wealth of study resources for students.

Unit Advanced Network
Design
Unit code BN321
Assignment 2
Human Factor in Network Designing
and Analysis
SCHOOL OF INFORMATION SCIENCE AND ENGINEERING
Design
Unit code BN321
Assignment 2
Human Factor in Network Designing
and Analysis
SCHOOL OF INFORMATION SCIENCE AND ENGINEERING
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
Advanced Network Design
Table of Contents
Introduction...............................................................................................................................................2
Task 1.........................................................................................................................................................3
requirement Gathering.........................................................................................................................3
User Requirements............................................................................................................................3
Timeliness...........................................................................................................................................4
Interactivity........................................................................................................................................4
Reliability...........................................................................................................................................4
Task 2.........................................................................................................................................................5
Network Design......................................................................................................................................5
Application Requirements................................................................................................................5
Application system.................................................................................................................................5
Level 1: Web server...........................................................................................................................5
Level 2: Application server...............................................................................................................5
Level 3: Database server...................................................................................................................5
Device Requirements.............................................................................................................................6
Requirements of the Network...............................................................................................................6
Network Design Diagram......................................................................................................................7
Network Performance Metrics.............................................................................................................8
Bandwidth..........................................................................................................................................8
Delay...................................................................................................................................................8
Jitter...................................................................................................................................................8
Error rate...........................................................................................................................................9
Interplay of factors............................................................................................................................9
Conclusion..................................................................................................................................................9
References................................................................................................................................................10
Introduction
Excelfior Ltd. is a Melbourne based Digital Communication Company that specializes in
designing, hosting and managing corporate websites. It has the department which help in each
Cybersecurity
Advanced Network Design
Table of Contents
Introduction...............................................................................................................................................2
Task 1.........................................................................................................................................................3
requirement Gathering.........................................................................................................................3
User Requirements............................................................................................................................3
Timeliness...........................................................................................................................................4
Interactivity........................................................................................................................................4
Reliability...........................................................................................................................................4
Task 2.........................................................................................................................................................5
Network Design......................................................................................................................................5
Application Requirements................................................................................................................5
Application system.................................................................................................................................5
Level 1: Web server...........................................................................................................................5
Level 2: Application server...............................................................................................................5
Level 3: Database server...................................................................................................................5
Device Requirements.............................................................................................................................6
Requirements of the Network...............................................................................................................6
Network Design Diagram......................................................................................................................7
Network Performance Metrics.............................................................................................................8
Bandwidth..........................................................................................................................................8
Delay...................................................................................................................................................8
Jitter...................................................................................................................................................8
Error rate...........................................................................................................................................9
Interplay of factors............................................................................................................................9
Conclusion..................................................................................................................................................9
References................................................................................................................................................10
Introduction
Excelfior Ltd. is a Melbourne based Digital Communication Company that specializes in
designing, hosting and managing corporate websites. It has the department which help in each
Cybersecurity

2
Advanced Network Design
day activities of the company. Each department performs it duties and is independent to each
other, this is meet by the network design which is established in the modules of each department.
The department include the Admin, Accounts, finance, marketing department, front and backend
developers and the flash designers. The admin is the overall administrator of the company. The
roles of the admin are to ensure that each department is satisfied with the company network and
that they run efficiently. The accounts department keeps truck of records of the cash flow of the
company which must run hand on hand with the admin to run efficiently – this is enabled by a
network design which allows the two departments to communicate. The finance also works with
the accounts department through the network to ensure that all finance related data is well stored
and maintained. The marketing department uses the network to facilitate its adverts and that they
can reach more people audience in the globe, thus the expectance of the customers increases. The
company also has the developers who help in the company’s IT growth, the develop the
companies front and backend systems which allows the company run well and smoothly [1].
Flash designer department also work in this Digital Company to ensure that the company’s
designs are well organized, the network enable their smooth transition and communication thus
efficiency.
The Network design is a key requirement in the Excelfior Ltd. Company. It ensures all
departments can easily communicate and perform their duties efficiently. This paper explains the
whole network design to be implemented in the Excelfior Ltd. Company.
Cybersecurity
Advanced Network Design
day activities of the company. Each department performs it duties and is independent to each
other, this is meet by the network design which is established in the modules of each department.
The department include the Admin, Accounts, finance, marketing department, front and backend
developers and the flash designers. The admin is the overall administrator of the company. The
roles of the admin are to ensure that each department is satisfied with the company network and
that they run efficiently. The accounts department keeps truck of records of the cash flow of the
company which must run hand on hand with the admin to run efficiently – this is enabled by a
network design which allows the two departments to communicate. The finance also works with
the accounts department through the network to ensure that all finance related data is well stored
and maintained. The marketing department uses the network to facilitate its adverts and that they
can reach more people audience in the globe, thus the expectance of the customers increases. The
company also has the developers who help in the company’s IT growth, the develop the
companies front and backend systems which allows the company run well and smoothly [1].
Flash designer department also work in this Digital Company to ensure that the company’s
designs are well organized, the network enable their smooth transition and communication thus
efficiency.
The Network design is a key requirement in the Excelfior Ltd. Company. It ensures all
departments can easily communicate and perform their duties efficiently. This paper explains the
whole network design to be implemented in the Excelfior Ltd. Company.
Cybersecurity
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
Advanced Network Design
Task 1
Requirement Gathering
The requirement gathering refers to collecting all the gadgets, information, user requirements,
devices and the network requirements.
User Requirements
From the model of system portions in our nonexclusive structure, the customer section is at the
most lifted layer. The term customer addresses in a general sense the end customers of the
structure, anyway it might be reached out to consolidate everyone drew in with the system, for
instance, framework and system administrators and organization [2]. Customer essentials is the
plan of necessities gathered or got from customer input and is what is required by customers to
successfully accomplish their endeavors on the structure. Ordinarily, when gathering necessities,
everyone required with that framework is seen as a potential customer.
The below diagram show the users in the system and the requirements of the users
User Requirements
Timeliness
Interactivity
Reliability
Security
Adaptability
Cybersecurity
USER
APPLICATION
DEVICE
NETWORK
Advanced Network Design
Task 1
Requirement Gathering
The requirement gathering refers to collecting all the gadgets, information, user requirements,
devices and the network requirements.
User Requirements
From the model of system portions in our nonexclusive structure, the customer section is at the
most lifted layer. The term customer addresses in a general sense the end customers of the
structure, anyway it might be reached out to consolidate everyone drew in with the system, for
instance, framework and system administrators and organization [2]. Customer essentials is the
plan of necessities gathered or got from customer input and is what is required by customers to
successfully accomplish their endeavors on the structure. Ordinarily, when gathering necessities,
everyone required with that framework is seen as a potential customer.
The below diagram show the users in the system and the requirements of the users
User Requirements
Timeliness
Interactivity
Reliability
Security
Adaptability
Cybersecurity
USER
APPLICATION
DEVICE
NETWORK
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
Advanced Network Design
Generally, the framework should adjust to clients and their surroundings, give fast and
dependable data access and exchange, and offer quality support of the client. This shows the
accompanying general prerequisites [3]:
Timeliness
A user can access information within the shortest time. For instance, when the client needs to
send a record to another office or he needs to download a 20mb document.
Interactivity
This resembles accommodation anyway revolves around a response time from the structure and
also the framework that is on the demand of the response times of customers.
Reliability
This is the openness from the customer's perspective, is an essential for dependably available
organization. Not solely should the customer have the ability to approach structure resources an
abnormal state of the time, yet the level of organization to the customer, to the extent application
usage or information transport, must be unfaltering.
Cybersecurity
Advanced Network Design
Generally, the framework should adjust to clients and their surroundings, give fast and
dependable data access and exchange, and offer quality support of the client. This shows the
accompanying general prerequisites [3]:
Timeliness
A user can access information within the shortest time. For instance, when the client needs to
send a record to another office or he needs to download a 20mb document.
Interactivity
This resembles accommodation anyway revolves around a response time from the structure and
also the framework that is on the demand of the response times of customers.
Reliability
This is the openness from the customer's perspective, is an essential for dependably available
organization. Not solely should the customer have the ability to approach structure resources an
abnormal state of the time, yet the level of organization to the customer, to the extent application
usage or information transport, must be unfaltering.
Cybersecurity

5
Advanced Network Design
Task 2
Network Design
Application Requirements
Application Requirements will be essentials that are settled from application information,
experience, or testing, and address what is required by applications. Application essentials are
more specific than customer necessities anyway may at present be passionate.
Application essential are course of action of uses in light of human factors and development
characteristics. The fundamental term, human parts, addresses human impression of different
kinds of media, for instance, conventional substance, sound and video [4]. The second term,
advancement characteristics, addresses the particular mechanical parts of these framework
applications, for instance, data dealing with applications, web applications, structure
applications.
Application asks for incorporate website page demands, Database exchanges – information
questions or updates, Messaging conventions – putting a message on the line. Verification
benefit – encryption, unscrambling, login reason and the API calls – peaceful interface calls.
Application system
Level 1: Web server
The web server is utilized to convey solicitations to at least one application servers. This web
server has stack adjusting abilities and establishes the web level.
Level 2: Application server
Application server is utilized to have the e-fund and e-accounts application. These servers
comprise the application level.
Level 3: Database server
The Database server is utilized to store the application's information. This server lives at the
database level
Kinds of utilization prerequisites depend on administration and execution necessities,
applications were type as: mission-basic, RMA rate-basic, CAPACITY, or ongoing/intuitive and
DELAY. These application composes are depicted by their prerequisites and administration
measurements.
The Delay: It can set aside quite a while for a parcel to be conveyed over the systems.
Application Locations are utilized to figure out where application applies in the organization.
This will help in mapping activity streams amid the stream examination process.
Device Requirements
Gadget alludes to a bit of hardware that has been made for some uncommon reason.
Cybersecurity
Advanced Network Design
Task 2
Network Design
Application Requirements
Application Requirements will be essentials that are settled from application information,
experience, or testing, and address what is required by applications. Application essentials are
more specific than customer necessities anyway may at present be passionate.
Application essential are course of action of uses in light of human factors and development
characteristics. The fundamental term, human parts, addresses human impression of different
kinds of media, for instance, conventional substance, sound and video [4]. The second term,
advancement characteristics, addresses the particular mechanical parts of these framework
applications, for instance, data dealing with applications, web applications, structure
applications.
Application asks for incorporate website page demands, Database exchanges – information
questions or updates, Messaging conventions – putting a message on the line. Verification
benefit – encryption, unscrambling, login reason and the API calls – peaceful interface calls.
Application system
Level 1: Web server
The web server is utilized to convey solicitations to at least one application servers. This web
server has stack adjusting abilities and establishes the web level.
Level 2: Application server
Application server is utilized to have the e-fund and e-accounts application. These servers
comprise the application level.
Level 3: Database server
The Database server is utilized to store the application's information. This server lives at the
database level
Kinds of utilization prerequisites depend on administration and execution necessities,
applications were type as: mission-basic, RMA rate-basic, CAPACITY, or ongoing/intuitive and
DELAY. These application composes are depicted by their prerequisites and administration
measurements.
The Delay: It can set aside quite a while for a parcel to be conveyed over the systems.
Application Locations are utilized to figure out where application applies in the organization.
This will help in mapping activity streams amid the stream examination process.
Device Requirements
Gadget alludes to a bit of hardware that has been made for some uncommon reason.
Cybersecurity
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
Advanced Network Design
Gadgets can be gathered into three classes: nonexclusive figuring gadgets: (PC, cell phone-cell
phones), their prerequisites are essential from a conclusion to-end point of view, they give the
interface among applications and the system. Servers - windows/Unix, cloud servers, affect the
activity streams inside the framework. particular gadgets remote: (blue-tooth) are gadgets that
give particular capacities to their clients [5].
Gadget issues oftentimes are misjudged as system issues. Understanding at the gadget part level
can enable you to perceive such bottlenecks issues from the get-go in the examination procedure.
Gadget Locations data decides the connections among segments of the framework.
Requirements of the Network
System necessities alludes to interconnected frameworks. Segments of a PC organize
incorporates: Hosts - PCs, workstations, handheld
The switches and routers - IP switch, Ethernet switch
The connections - wired, remote
Conventions - IP, TCP, CSMA/CD, CSMA/CA
Applications - organize administrations and
People who are the administration operators
Movement to the new system models and plans need to fuse existing systems. This incorporates
framework redesigns, relocating and moving starting with one a player in something then onto
the next part and to another or distinctive innovation or convention, or overhauling system
foundation.
The new system will oblige any conditions and imperatives forced by old system, the system will
change the size and the extent of the old framework. The change will be inside the
LAN/MAN/and WAN limits of the old system [6].
System administration necessities is additionally playing out a security hazard examination for
both the current system and arranged system. Security necessities and the consequences of the
hazard examination are utilized to build up a security plan and characterize security approaches
for the system.
Cybersecurity
Advanced Network Design
Gadgets can be gathered into three classes: nonexclusive figuring gadgets: (PC, cell phone-cell
phones), their prerequisites are essential from a conclusion to-end point of view, they give the
interface among applications and the system. Servers - windows/Unix, cloud servers, affect the
activity streams inside the framework. particular gadgets remote: (blue-tooth) are gadgets that
give particular capacities to their clients [5].
Gadget issues oftentimes are misjudged as system issues. Understanding at the gadget part level
can enable you to perceive such bottlenecks issues from the get-go in the examination procedure.
Gadget Locations data decides the connections among segments of the framework.
Requirements of the Network
System necessities alludes to interconnected frameworks. Segments of a PC organize
incorporates: Hosts - PCs, workstations, handheld
The switches and routers - IP switch, Ethernet switch
The connections - wired, remote
Conventions - IP, TCP, CSMA/CD, CSMA/CA
Applications - organize administrations and
People who are the administration operators
Movement to the new system models and plans need to fuse existing systems. This incorporates
framework redesigns, relocating and moving starting with one a player in something then onto
the next part and to another or distinctive innovation or convention, or overhauling system
foundation.
The new system will oblige any conditions and imperatives forced by old system, the system will
change the size and the extent of the old framework. The change will be inside the
LAN/MAN/and WAN limits of the old system [6].
System administration necessities is additionally playing out a security hazard examination for
both the current system and arranged system. Security necessities and the consequences of the
hazard examination are utilized to build up a security plan and characterize security approaches
for the system.
Cybersecurity
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
Advanced Network Design
Network Design Diagram
Network Performance Metrics
System execution is the proportion of nature of administration of a system which addresses the
client's issues [7].
System execution can be measure from various perspectives, as each system is distinctive in
nature and outline. Execution can likewise be displayed and fortified rather than estimated; one
Cybersecurity
Internet
ADMIN
ACCOUNTS
DEPARTMENT
FIREWALL
MARKETING
DEPARTMENT
FINANCE
DEPARTMENT
100mbs
Flash
Designers
Front and Back-end
Developers
Advanced Network Design
Network Design Diagram
Network Performance Metrics
System execution is the proportion of nature of administration of a system which addresses the
client's issues [7].
System execution can be measure from various perspectives, as each system is distinctive in
nature and outline. Execution can likewise be displayed and fortified rather than estimated; one
Cybersecurity
Internet
ADMIN
ACCOUNTS
DEPARTMENT
FIREWALL
MARKETING
DEPARTMENT
FINANCE
DEPARTMENT
100mbs
Flash
Designers
Front and Back-end
Developers

8
Advanced Network Design
case of this is utilizing state progress charts to demonstrate lining execution or to utilize a
Network Stimulator. The accompanying measurements clarifies the system execution in the new
system:
Bandwidth
The accessible channel data transfer capacity and achievable flag to-clamor proportion decide the
most extreme conceivable throughput. It isn't for the most part conceivable to send a bigger
number of information than directed by the Shannon-Hartley Theorem [7].
Delay
The acceleration of light forces a base engendering period on every single electromagnetic flag.
It isn't conceivable to decrease the dormancy beneath
{\display style t=s/c_{m}}
s is the separation while cm refers to the medium light speed. This around implies 1 additional
millisecond roundtrip time (RTT) for 100 km/62miles of separation between has.
Different deferrals additionally happen in transitional hubs. In parcel exchanged systems
deferrals can happen because of queueing.
Jitter
Jitter is the undesired deviation from honest to goodness periodicity of a normal discontinuous
banner in equipment and communicate correspondences, as often as possible in association with
a reference clock source. Jitter may be found in properties, for instance, the repeat of dynamic
pulses, the banner adequacy, or time of irregular signs. Jitter is a basic, and regularly undesired,
factor in the diagram of all exchanges joins [8].
Error rate
In advanced transmission, the quantity of bit blunders is the quantity of got bits of an information
stream over a correspondence channel that have been changed because of commotion,
obstruction, mutilation or bit synchronization errors.
The bit botch rate or bit screw up extent is the amount of bit botches apportioned by the total
number of traded bits in the midst of an examined time between time. Bit mistake extent is a
unitless execution measure, consistently conveyed as a rate [9].
Cybersecurity
Advanced Network Design
case of this is utilizing state progress charts to demonstrate lining execution or to utilize a
Network Stimulator. The accompanying measurements clarifies the system execution in the new
system:
Bandwidth
The accessible channel data transfer capacity and achievable flag to-clamor proportion decide the
most extreme conceivable throughput. It isn't for the most part conceivable to send a bigger
number of information than directed by the Shannon-Hartley Theorem [7].
Delay
The acceleration of light forces a base engendering period on every single electromagnetic flag.
It isn't conceivable to decrease the dormancy beneath
{\display style t=s/c_{m}}
s is the separation while cm refers to the medium light speed. This around implies 1 additional
millisecond roundtrip time (RTT) for 100 km/62miles of separation between has.
Different deferrals additionally happen in transitional hubs. In parcel exchanged systems
deferrals can happen because of queueing.
Jitter
Jitter is the undesired deviation from honest to goodness periodicity of a normal discontinuous
banner in equipment and communicate correspondences, as often as possible in association with
a reference clock source. Jitter may be found in properties, for instance, the repeat of dynamic
pulses, the banner adequacy, or time of irregular signs. Jitter is a basic, and regularly undesired,
factor in the diagram of all exchanges joins [8].
Error rate
In advanced transmission, the quantity of bit blunders is the quantity of got bits of an information
stream over a correspondence channel that have been changed because of commotion,
obstruction, mutilation or bit synchronization errors.
The bit botch rate or bit screw up extent is the amount of bit botches apportioned by the total
number of traded bits in the midst of an examined time between time. Bit mistake extent is a
unitless execution measure, consistently conveyed as a rate [9].
Cybersecurity
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
Advanced Network Design
The bit mistake probability pe is the longing estimation of the bit screw up extent. The bit
blunder extent can be considered as a construed measure of the bit botch probability. This
measure is correct for a long time interval and a high number of bit botches.
Interplay of factors
The metrics above, combined with client prerequisites and client recognitions, assume a job in
deciding the apparent 'quickness' or utility, of a system association.
Conclusion
System design out is one of the crucial occupations in guaranteeing that it needs the objective of
the association. Framework is a related assembling of contraptions and end systems, for instance,
PCs and servers, which can talk with each other. The physical parts are the gear devices that are
interconnected to shape a PC sort out. Programming and firewalls accept an important activity in
guaranteeing that data is anchored. Beside the physical contraptions, picking programming
things for presenting in the framework is a trying endeavor.
References
[1] D. Tonelli . U.S. Patent No. 5,821,937. Washington, DC: U.S, Patent and Trademark Office,
2009.
[2] F. Travostino, J. Mambretti, & G. Karmous-Edwards, G. (Eds.). Grid networks: enabling
grids with advanced communication technology, John Wiley & Sons,2009
[3] M. Hagan, H. Demuth & O. De Jesús. Neural network design (Vol. 20), Boston: Pws
Pub,2012
[4] A. Kershenbaum. Telecommunications network design algorithms, McGraw-Hill, Inc,2009
Cybersecurity
Advanced Network Design
The bit mistake probability pe is the longing estimation of the bit screw up extent. The bit
blunder extent can be considered as a construed measure of the bit botch probability. This
measure is correct for a long time interval and a high number of bit botches.
Interplay of factors
The metrics above, combined with client prerequisites and client recognitions, assume a job in
deciding the apparent 'quickness' or utility, of a system association.
Conclusion
System design out is one of the crucial occupations in guaranteeing that it needs the objective of
the association. Framework is a related assembling of contraptions and end systems, for instance,
PCs and servers, which can talk with each other. The physical parts are the gear devices that are
interconnected to shape a PC sort out. Programming and firewalls accept an important activity in
guaranteeing that data is anchored. Beside the physical contraptions, picking programming
things for presenting in the framework is a trying endeavor.
References
[1] D. Tonelli . U.S. Patent No. 5,821,937. Washington, DC: U.S, Patent and Trademark Office,
2009.
[2] F. Travostino, J. Mambretti, & G. Karmous-Edwards, G. (Eds.). Grid networks: enabling
grids with advanced communication technology, John Wiley & Sons,2009
[3] M. Hagan, H. Demuth & O. De Jesús. Neural network design (Vol. 20), Boston: Pws
Pub,2012
[4] A. Kershenbaum. Telecommunications network design algorithms, McGraw-Hill, Inc,2009
Cybersecurity
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10
Advanced Network Design
[5] A. Ceder & N. Wilson. Bus network design. Transportation Research Part B:
Methodological, 20(4), 331-344,2010.
[6] M. Conti, G. Maselli, G. Turi & S. Giordano. Cross-layering in mobile ad hoc network
design, Computer, 37(2), 48-51,2011.
[7] T. Magnanti, & R. Wong. Network design and transportation planning: Models and
algorithms, Transportation science, 18(1), 1-55,2014.
[8] C. Juang. A hybrid of genetic algorithm and particle swarm optimization for recurrent
network design. IEEE Transactions on Systems, Man, and Cybernetics, Part B
(Cybernetics), 34(2), 997-1006, 2008.
[9] C. Lin, & A. Metters. Hydrogels in controlled release formulations: network design and
mathematical modeling. Advanced drug delivery reviews, 58(12-13), 1379-1408, 2015
Cybersecurity
Advanced Network Design
[5] A. Ceder & N. Wilson. Bus network design. Transportation Research Part B:
Methodological, 20(4), 331-344,2010.
[6] M. Conti, G. Maselli, G. Turi & S. Giordano. Cross-layering in mobile ad hoc network
design, Computer, 37(2), 48-51,2011.
[7] T. Magnanti, & R. Wong. Network design and transportation planning: Models and
algorithms, Transportation science, 18(1), 1-55,2014.
[8] C. Juang. A hybrid of genetic algorithm and particle swarm optimization for recurrent
network design. IEEE Transactions on Systems, Man, and Cybernetics, Part B
(Cybernetics), 34(2), 997-1006, 2008.
[9] C. Lin, & A. Metters. Hydrogels in controlled release formulations: network design and
mathematical modeling. Advanced drug delivery reviews, 58(12-13), 1379-1408, 2015
Cybersecurity
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



