Computer Dynamic Network Design Report - Desklib
VerifiedAdded on 2023/06/15
|22
|4008
|134
AI Summary
This report evaluates the existing network infrastructure of Computer Dynamics and proposes a solution to overcome the critical problem of an overloaded and congested network. It includes an analysis of user requirements, capacity estimation, description and analysis of the current network setup, and a proposed network description.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COMPUTER DYNAMIC NETWORK DESIGN REPORT
PREPARED BY:
XXXXXXXX
2ND February,2018
1
PREPARED BY:
XXXXXXXX
2ND February,2018
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Executive Summary
Computer Dynamics currently uses a network that does not have a physical connection between
the two buildings that the company uses and the network is also overloaded, this creates the basis
of the report which includes assessing the existing network infrastructure, where the
management and the users of the network being interviewed and offer the solution that is recent
enough and can overcome this critical problem hence meeting the company’s needs.
It was found that, the existing network is overloaded and congested, slow and therefore cannot
support the growth of the business with relation to increased number of projects that are being
created . Physical connection between the two buildings occupied by the organization is not their
hence the two are sharing information across VPN site to site tunnel which is not efficient.
It was therefore recommended that a physical connection is required to connect between the two
buildings; this can use fiber optic cable for connection. Three layer switching is applied to this
because enhances high speed in data transfer between the components in the network. The usage
of fiber optic cable between buildings enhances high data communications between the
buildings and transfer of information.
2
Computer Dynamics currently uses a network that does not have a physical connection between
the two buildings that the company uses and the network is also overloaded, this creates the basis
of the report which includes assessing the existing network infrastructure, where the
management and the users of the network being interviewed and offer the solution that is recent
enough and can overcome this critical problem hence meeting the company’s needs.
It was found that, the existing network is overloaded and congested, slow and therefore cannot
support the growth of the business with relation to increased number of projects that are being
created . Physical connection between the two buildings occupied by the organization is not their
hence the two are sharing information across VPN site to site tunnel which is not efficient.
It was therefore recommended that a physical connection is required to connect between the two
buildings; this can use fiber optic cable for connection. Three layer switching is applied to this
because enhances high speed in data transfer between the components in the network. The usage
of fiber optic cable between buildings enhances high data communications between the
buildings and transfer of information.
2
Contents
1.0 INTRODUCTION.................................................................................................................................5
1.1 PURPOSE.........................................................................................................................................5
1.2Background........................................................................................................................................5
1.3Scope of the report..............................................................................................................................6
2.0ANALYSIS OF USER REQUIREMENTS............................................................................................6
2.1Network users-Analysis......................................................................................................................6
2.2Managers and Working staff (pc USERS)........................................................................................6
2.3 FINANCE DEPARTMENT..................................................................................................................7
2.4 MARKETING DEPARTMENT........................................................................................................7
2.5 IMPLEMENTATION........................................................................................................................7
2.6 SALES DEPARTMENT...................................................................................................................8
2.7 LEGAL DEPARTMENT..................................................................................................................8
2.8 QUALITY ASSURANCE GROUP...................................................................................................8
2.9 ADMINISTRATION.........................................................................................................................9
2.9.1 INFORMATION TECHNOLOGY DEPARTMENT..................................................................9
2.9.2 GRAPHICS INTERFACE..............................................................................................................9
2.9.3 PROJECT TEAMS 1-3................................................................................................................10
2.9.4 PROJECT SUPPORT..................................................................................................................10
2.9.5 PROJECT TEAMS 4-9.................................................................................................................10
2.9.6 PROJECT SUPPORT..................................................................................................................11
2.9.7 HEAD OF SOFTWARE DEVELOPMENT & 2 ANALYSTS + SUPPORTSTAFF..................11
2.9.8 INFORMATION TECHNOLOGY (ITS) GROUP 2 (LAPTOP USERS)...................................11
2.9.9 HUMAN RESOURCES..............................................................................................................12
3.1.0 PROJECT SUPPORT.................................................................................................................12
3.1.1 PROJECT TEAMS 10-14...........................................................................................................12
3.1.2 PROJECT TEAMS 15-20...........................................................................................................12
3.1.3 PROJECT SUPPORT..................................................................................................................13
3.1.4 PROJECT TEAMS......................................................................................................................13
3.1.5 PROJECT PROVIDERS............................................................................................................13
3.0 CAPACITY ESTIMATION...............................................................................................................13
4.0 Description and analysis of the current network setup........................................................................14
5.0 Proposed Network description...........................................................................................................15
3
1.0 INTRODUCTION.................................................................................................................................5
1.1 PURPOSE.........................................................................................................................................5
1.2Background........................................................................................................................................5
1.3Scope of the report..............................................................................................................................6
2.0ANALYSIS OF USER REQUIREMENTS............................................................................................6
2.1Network users-Analysis......................................................................................................................6
2.2Managers and Working staff (pc USERS)........................................................................................6
2.3 FINANCE DEPARTMENT..................................................................................................................7
2.4 MARKETING DEPARTMENT........................................................................................................7
2.5 IMPLEMENTATION........................................................................................................................7
2.6 SALES DEPARTMENT...................................................................................................................8
2.7 LEGAL DEPARTMENT..................................................................................................................8
2.8 QUALITY ASSURANCE GROUP...................................................................................................8
2.9 ADMINISTRATION.........................................................................................................................9
2.9.1 INFORMATION TECHNOLOGY DEPARTMENT..................................................................9
2.9.2 GRAPHICS INTERFACE..............................................................................................................9
2.9.3 PROJECT TEAMS 1-3................................................................................................................10
2.9.4 PROJECT SUPPORT..................................................................................................................10
2.9.5 PROJECT TEAMS 4-9.................................................................................................................10
2.9.6 PROJECT SUPPORT..................................................................................................................11
2.9.7 HEAD OF SOFTWARE DEVELOPMENT & 2 ANALYSTS + SUPPORTSTAFF..................11
2.9.8 INFORMATION TECHNOLOGY (ITS) GROUP 2 (LAPTOP USERS)...................................11
2.9.9 HUMAN RESOURCES..............................................................................................................12
3.1.0 PROJECT SUPPORT.................................................................................................................12
3.1.1 PROJECT TEAMS 10-14...........................................................................................................12
3.1.2 PROJECT TEAMS 15-20...........................................................................................................12
3.1.3 PROJECT SUPPORT..................................................................................................................13
3.1.4 PROJECT TEAMS......................................................................................................................13
3.1.5 PROJECT PROVIDERS............................................................................................................13
3.0 CAPACITY ESTIMATION...............................................................................................................13
4.0 Description and analysis of the current network setup........................................................................14
5.0 Proposed Network description...........................................................................................................15
3
5.1 Circuits............................................................................................................................................15
5.2 Hardware........................................................................................................................................15
5.3 hp 15 pc..........................................................................................................................................15
5.4 Software..........................................................................................................................................16
5.5 Server Softwares..............................................................................................................................16
5.6 Proposed network layout.................................................................................................................16
6.0 COST ESTIMATION.........................................................................................................................18
7.0 CONCLUSION AND RECOMMENTATIONS.................................................................................19
8.0 References...........................................................................................................................................20
9.0 Appendi A...........................................................................................................................................21
10.0 Appendix B........................................................................................................................................22
4
5.2 Hardware........................................................................................................................................15
5.3 hp 15 pc..........................................................................................................................................15
5.4 Software..........................................................................................................................................16
5.5 Server Softwares..............................................................................................................................16
5.6 Proposed network layout.................................................................................................................16
6.0 COST ESTIMATION.........................................................................................................................18
7.0 CONCLUSION AND RECOMMENTATIONS.................................................................................19
8.0 References...........................................................................................................................................20
9.0 Appendi A...........................................................................................................................................21
10.0 Appendix B........................................................................................................................................22
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1.0 INTRODUCTION
1.1 PURPOSE
The core purpose of this report is to evaluate the nature of the network infrastructure that
existed before at Computer Dynamics in relation to the objectives of the organization and put
down necessary strategies to improve the network infrastructure in order to achieve the
maximum functioning of the system.
1.2Background
Computer Dynamics is a well based software company . the company has a network that existed
before and the network is currently housing three hundred computers in two different buildings.
Though the network was upgraded to a latter network infrastructure, the company as now grown
because of good marketing of the company.
In the previous network, there was no network connection between the two buildings, also the
current network has problems due to high rates of overloading of data caused by a higher
number of users and many other reasons of overloading. In any case this network is not upgraded
to a better and latest network technologies, the problem might persist because more projects are
expected in the coming days.
From the problems that the association phases it has decided to change the layout of the
network structure. Cisco has been given the task to investigate and come up with a network
layout that will be used to upgrade the network structure in the company.
5
1.1 PURPOSE
The core purpose of this report is to evaluate the nature of the network infrastructure that
existed before at Computer Dynamics in relation to the objectives of the organization and put
down necessary strategies to improve the network infrastructure in order to achieve the
maximum functioning of the system.
1.2Background
Computer Dynamics is a well based software company . the company has a network that existed
before and the network is currently housing three hundred computers in two different buildings.
Though the network was upgraded to a latter network infrastructure, the company as now grown
because of good marketing of the company.
In the previous network, there was no network connection between the two buildings, also the
current network has problems due to high rates of overloading of data caused by a higher
number of users and many other reasons of overloading. In any case this network is not upgraded
to a better and latest network technologies, the problem might persist because more projects are
expected in the coming days.
From the problems that the association phases it has decided to change the layout of the
network structure. Cisco has been given the task to investigate and come up with a network
layout that will be used to upgrade the network structure in the company.
5
1.3 Scope of the report
In generally the structure of the network in the company is mentioned in relation to the goal of
the business for the network. In addition, an analysis regarding the user requirements and the
network that is currently existing in the organization is critically performed . the main areas that
are covered in this report includes according to Agata(2012):
i. The requirement of the user and capacity level.
ii. The existing network infrastructure that includes diagrams.
iii. The hardware
iv. The software that is being utilized including the client, network, operating system and
importantly the server.
v. The whole network layout, they are logical and physical network topologies.
vi. The performance of the existing network.
The layout of the proposed network is stated within the report and is aimed at serving the
company for 3-5 years maintaining its high capacity. Circuitry includes connection of
infrastructure, Hardware/Devices , Software ,Network Architecture.
2.0ANALYSIS OF USER REQUIREMENTS Laner( 2010)
2.1Network users-Analysis
This part explains the users has part of the networking plan. This are the clients and
administration managers who will be using and controlling the network . It also explains the
type of applications that the user will use to access the network and make any father changes in
the network. The user type using the network can be called network traffic level which can be
either high or standard.
Building A category 1
2.2Managers and Working staff (pc USERS)
6
In generally the structure of the network in the company is mentioned in relation to the goal of
the business for the network. In addition, an analysis regarding the user requirements and the
network that is currently existing in the organization is critically performed . the main areas that
are covered in this report includes according to Agata(2012):
i. The requirement of the user and capacity level.
ii. The existing network infrastructure that includes diagrams.
iii. The hardware
iv. The software that is being utilized including the client, network, operating system and
importantly the server.
v. The whole network layout, they are logical and physical network topologies.
vi. The performance of the existing network.
The layout of the proposed network is stated within the report and is aimed at serving the
company for 3-5 years maintaining its high capacity. Circuitry includes connection of
infrastructure, Hardware/Devices , Software ,Network Architecture.
2.0ANALYSIS OF USER REQUIREMENTS Laner( 2010)
2.1Network users-Analysis
This part explains the users has part of the networking plan. This are the clients and
administration managers who will be using and controlling the network . It also explains the
type of applications that the user will use to access the network and make any father changes in
the network. The user type using the network can be called network traffic level which can be
either high or standard.
Building A category 1
2.2Managers and Working staff (pc USERS)
6
Found in Building B, category 1
User type: Standard
Connected users: 2
Programs used: Emailing, Web services, Audio Conferencing, Resource sharing and general in
“office”., and malware protection .
Any file within the network should be highly secured.
2.3 FINANCE DEPARTMENT
Found in Building A, category 1
user type: High
Connected users; 8
Programs used: Emailing, Web-services, in Payrolls, sharing of files, Internet, general “office”
applications, malicious code protection and printer access.
Files that are produced by the finance group should always be secured.
2.4 MARKETING DEPARTMENT
found in Building B, category 1
User type: High
Connected members: 4
software’s used: Emailing, Web-forums, Publishing, Graphics Database, sharing of files and
Intranet
files produced are average in size hence in need of space for storage.
2.5 IMPLEMENTATION
Found in Building B, category 1
User type;High
7
User type: Standard
Connected users: 2
Programs used: Emailing, Web services, Audio Conferencing, Resource sharing and general in
“office”., and malware protection .
Any file within the network should be highly secured.
2.3 FINANCE DEPARTMENT
Found in Building A, category 1
user type: High
Connected users; 8
Programs used: Emailing, Web-services, in Payrolls, sharing of files, Internet, general “office”
applications, malicious code protection and printer access.
Files that are produced by the finance group should always be secured.
2.4 MARKETING DEPARTMENT
found in Building B, category 1
User type: High
Connected members: 4
software’s used: Emailing, Web-forums, Publishing, Graphics Database, sharing of files and
Intranet
files produced are average in size hence in need of space for storage.
2.5 IMPLEMENTATION
Found in Building B, category 1
User type;High
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Connected users: 11
used applications: Emailing, Web-filing, File transfer, Intranet, environmental access sharing of
software, training people, (vpn) in general “office”
applications, malware protection and printer access.
Files produced should have access restriction because the group is a mobility group and it can
create interference with the files.
2.6 SALES DEPARTMENT
Found in Building B, category 1
use type:medium
Connected users: 9
Types of services provided : Emailing, Web-forums, internet customer relationship and
Managing of software;
sharing of files, Intranet, malicious code protection and access to printers
Files produced should be highly be protected to avoid interference from other personel.
2.7 LEGAL DEPARTMENT
found in Building 2,category 1
user type ;Standard
connected users: 2
Applications being used: Emailing, Web-forums, sharing of files, Intranet, general “office”
applications, protection of virus and hardware access like printers. The documents and files that
are produced should have a high access restriction.
2.8 QUALITY ASSURANCE GROUP
Building A, category 1
user type: high
8
used applications: Emailing, Web-filing, File transfer, Intranet, environmental access sharing of
software, training people, (vpn) in general “office”
applications, malware protection and printer access.
Files produced should have access restriction because the group is a mobility group and it can
create interference with the files.
2.6 SALES DEPARTMENT
Found in Building B, category 1
use type:medium
Connected users: 9
Types of services provided : Emailing, Web-forums, internet customer relationship and
Managing of software;
sharing of files, Intranet, malicious code protection and access to printers
Files produced should be highly be protected to avoid interference from other personel.
2.7 LEGAL DEPARTMENT
found in Building 2,category 1
user type ;Standard
connected users: 2
Applications being used: Emailing, Web-forums, sharing of files, Intranet, general “office”
applications, protection of virus and hardware access like printers. The documents and files that
are produced should have a high access restriction.
2.8 QUALITY ASSURANCE GROUP
Building A, category 1
user type: high
8
connected users: 2
Applications being used: Emailing, Web-forums, sharing of files, Intranet, general “office”
applications, protection of virus and hardware access like printers. The documents and files that
are produced should have a high access restriction.
2.9 ADMINISTRATION
Found Building B, category 1
user type: medium
connected users: 2
used applications: Emailing, Web-filing, File transfer, Intranet, environmental access sharing of
software, training people, (vpn) in general “office”
applications, malware protection and printer access.
Managing and controlling the all network.
2.9.1 INFORMATION TECHNOLOGY DEPARTMENT
Found in Building B, category 1
User type: High
users connected: 3
This the core layer of the network a user requirement. It utilizes the following applications in the
network file sharing ,web services ,communicating and transfer of digital data across multiple
devices. It also promotes storage of information for future use and easy retrieval in time of use.
2.9.2 GRAPHICS INTERFACE
found Building B, category 2
user type : High
user connected : 25
This is the group which is priority groups. It promotes the usage of the following applications
9
Applications being used: Emailing, Web-forums, sharing of files, Intranet, general “office”
applications, protection of virus and hardware access like printers. The documents and files that
are produced should have a high access restriction.
2.9 ADMINISTRATION
Found Building B, category 1
user type: medium
connected users: 2
used applications: Emailing, Web-filing, File transfer, Intranet, environmental access sharing of
software, training people, (vpn) in general “office”
applications, malware protection and printer access.
Managing and controlling the all network.
2.9.1 INFORMATION TECHNOLOGY DEPARTMENT
Found in Building B, category 1
User type: High
users connected: 3
This the core layer of the network a user requirement. It utilizes the following applications in the
network file sharing ,web services ,communicating and transfer of digital data across multiple
devices. It also promotes storage of information for future use and easy retrieval in time of use.
2.9.2 GRAPHICS INTERFACE
found Building B, category 2
user type : High
user connected : 25
This is the group which is priority groups. It promotes the usage of the following applications
9
sharing of files ,resource sharing ,multimedia and .web services. It enhances a good layout of
the multimedia devices in the network.
2.9.3 PROJECT TEAMS 1-3
Found in Building B, category 2
user type: High
maximum number of users to connect: 8 per team (24 users in total)
user connected : 25
This is the group which is priority groups. It promotes the usage of the following applications
sharing of files and resource sharing ,multimedia and .web services. It enhances a good layout
of the multimedia devices in the network.
2.9.4 PROJECT SUPPORT
it belongs Building 2, category 2
Type of user: Standard
Number of users: 1
Applications used: Email, Web, File sharing, Intranet, general “office” applications, virus
protection
and access to printers
Building 2 level 3
2.9.5 PROJECT TEAMS 4-9
found in Building 2, category 3
Type of user: High
Number of users: 8 per team (48 users in total)
This are the teams that .manages look after the project they use software such has files sharing
and resource management.
10
the multimedia devices in the network.
2.9.3 PROJECT TEAMS 1-3
Found in Building B, category 2
user type: High
maximum number of users to connect: 8 per team (24 users in total)
user connected : 25
This is the group which is priority groups. It promotes the usage of the following applications
sharing of files and resource sharing ,multimedia and .web services. It enhances a good layout
of the multimedia devices in the network.
2.9.4 PROJECT SUPPORT
it belongs Building 2, category 2
Type of user: Standard
Number of users: 1
Applications used: Email, Web, File sharing, Intranet, general “office” applications, virus
protection
and access to printers
Building 2 level 3
2.9.5 PROJECT TEAMS 4-9
found in Building 2, category 3
Type of user: High
Number of users: 8 per team (48 users in total)
This are the teams that .manages look after the project they use software such has files sharing
and resource management.
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2.9.6 PROJECT SUPPORT
Belongs to Building 2, Level 3
user type: Standard
connected users: 2
user connected : 25
This is the group which is priority groups. It promotes the usage of the following applications
sharing of files ,resource sharing ,multimedia and .web services. It enhances a good layout of
the multimedia devices in the network.
Building 1 level 1
2.9.7 HEAD OF SOFTWARE DEVELOPMENT & 2 ANALYSTS + SUPPORTSTAFF
Belongs to Building 1, category 1
user: Standard
Number of users: 2
Heads networker designers in designing.
2.9.8 INFORMATION TECHNOLOGY (ITS) GROUP 2 (LAPTOP USERS)
Belongs to Building 1, Level 1
Type of user: High
Number of users: 3
user connected : 25
This is the group which is priority groups. It promotes the usage of the following applications
sharing of files ,resource sharing ,multimedia and .web services. It enhances a good layout of
the multimedia devices in the network.
11
Belongs to Building 2, Level 3
user type: Standard
connected users: 2
user connected : 25
This is the group which is priority groups. It promotes the usage of the following applications
sharing of files ,resource sharing ,multimedia and .web services. It enhances a good layout of
the multimedia devices in the network.
Building 1 level 1
2.9.7 HEAD OF SOFTWARE DEVELOPMENT & 2 ANALYSTS + SUPPORTSTAFF
Belongs to Building 1, category 1
user: Standard
Number of users: 2
Heads networker designers in designing.
2.9.8 INFORMATION TECHNOLOGY (ITS) GROUP 2 (LAPTOP USERS)
Belongs to Building 1, Level 1
Type of user: High
Number of users: 3
user connected : 25
This is the group which is priority groups. It promotes the usage of the following applications
sharing of files ,resource sharing ,multimedia and .web services. It enhances a good layout of
the multimedia devices in the network.
11
2.9.9 HUMAN RESOURCES
Belongs to Building 1, category 5
user type: Standard
connected users: 2
3.1.0 PROJECT SUPPORT
The applications involved are just the same as others and are used to manage to manage several
activities in the company.
Belongs Building 2, category 1
user type: Standard
Number of users: 1
There are many applications that are used in this part they include file sharing ,emailing ,testing
of software and many others. The file projects produced by this team require high data backup
and security.
3.1.1 PROJECT TEAMS 10-14
Belong s to Building 1,categoryl 1
user type: High
Number of users: 8 per team (40 users in total)
There are many applications that are used in this part they include file sharing ,emailing ,testing
of software and many others. The file projects produced by this team require high data backup
and security.
Block a, category 2
3.1.2 PROJECT TEAMS 15-20
Belongs to Building A, category 2
Type of user: Standard
maximum number of users: 8 per team (48 users in total)
12
Belongs to Building 1, category 5
user type: Standard
connected users: 2
3.1.0 PROJECT SUPPORT
The applications involved are just the same as others and are used to manage to manage several
activities in the company.
Belongs Building 2, category 1
user type: Standard
Number of users: 1
There are many applications that are used in this part they include file sharing ,emailing ,testing
of software and many others. The file projects produced by this team require high data backup
and security.
3.1.1 PROJECT TEAMS 10-14
Belong s to Building 1,categoryl 1
user type: High
Number of users: 8 per team (40 users in total)
There are many applications that are used in this part they include file sharing ,emailing ,testing
of software and many others. The file projects produced by this team require high data backup
and security.
Block a, category 2
3.1.2 PROJECT TEAMS 15-20
Belongs to Building A, category 2
Type of user: Standard
maximum number of users: 8 per team (48 users in total)
12
There are many applications that are used in this part they include file sharing ,emailing ,testing
of software and many others. The file projects produced by this team require high data backup
and security.
3.1.3 PROJECT SUPPORT
This are the ones who finance the project up to the end to make sure it doesn’t fail before it
comes into a completion.
3.1.4 PROJECT TEAMS
This are the network engineers and stake holders that will help the process become successfully.
3.1.5 PROJECT PROVIDERS
Building A, category 3
user type : Standard
user connected: 2
This are the user requirements which will help the network installation process to be
successfully.
3.0 CAPACITY ESTIMATION according Kitano(2009)
The organization has standard business hours 8.30am to 5.30pm with substantial and standard
clients.
Client people group
Group 1: venture groups with 208 representatives who are additionally PC clients.
Group 2: Information Technology Services (6 representatives), Laptop clients.
Group 3: Finance Group (9 representatives), PC clients
Group 4: Implementation Consultants (10 representatives), Laptop Users
Group 5: Marketing (4 representatives), PC Users
Group 6: Graphics Specialists (25 representatives), PC Users
13
of software and many others. The file projects produced by this team require high data backup
and security.
3.1.3 PROJECT SUPPORT
This are the ones who finance the project up to the end to make sure it doesn’t fail before it
comes into a completion.
3.1.4 PROJECT TEAMS
This are the network engineers and stake holders that will help the process become successfully.
3.1.5 PROJECT PROVIDERS
Building A, category 3
user type : Standard
user connected: 2
This are the user requirements which will help the network installation process to be
successfully.
3.0 CAPACITY ESTIMATION according Kitano(2009)
The organization has standard business hours 8.30am to 5.30pm with substantial and standard
clients.
Client people group
Group 1: venture groups with 208 representatives who are additionally PC clients.
Group 2: Information Technology Services (6 representatives), Laptop clients.
Group 3: Finance Group (9 representatives), PC clients
Group 4: Implementation Consultants (10 representatives), Laptop Users
Group 5: Marketing (4 representatives), PC Users
Group 6: Graphics Specialists (25 representatives), PC Users
13
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4.0 Description and analysis of the current network setup Eussff(2009)
In both buildings the presence of the of layer 2 switch simply show the impacts on the user
especially in building two I causes slowness in communication and performance among the
users. This because more of the users compete for the bandwidth from the server making it have
a slow response. Users in building two requiring the service of building one have to wait for the
response due to slow response from the servers from the building. This may be due limited
bandwidth or low communication of the devices in the network. Many computer in the network
causes high utilization .
In terms of operating system windows 2003 and 2004 have been superseded by the current
operating system due to compatibility issue in which the programs need new versions of the
operating system.
As from the diagram the network is out of date. The amount of heavy applications used by
programmers, graphics designers and web developers is straining the entire network. The
joining of the roles of the servers in building one was all meant save space and minimizing the
cost of installing the networks by purchasing many servers. However has network is growing the
compatibility is the issue in the network where is experiencing slowness in performance.
Star topology is implemented in the system in the network at each c connecting centre i. e three
computers are connected to the switch layer. Switch layer are connected to each other and then
finally connected to the data centre which provides or serves information to the switches which
in turn distributes to the computers. The data centers are connect together to each other. Meaning
any failure of one data centre or switch layer may lead to total failure of the all system since one
depends on the other .The connection also leads to delay in data transfer since no routing hence
there is only one way of data to be transferred from one point to another hence low rate of data
transfer due to colliding in the cables.
14
In both buildings the presence of the of layer 2 switch simply show the impacts on the user
especially in building two I causes slowness in communication and performance among the
users. This because more of the users compete for the bandwidth from the server making it have
a slow response. Users in building two requiring the service of building one have to wait for the
response due to slow response from the servers from the building. This may be due limited
bandwidth or low communication of the devices in the network. Many computer in the network
causes high utilization .
In terms of operating system windows 2003 and 2004 have been superseded by the current
operating system due to compatibility issue in which the programs need new versions of the
operating system.
As from the diagram the network is out of date. The amount of heavy applications used by
programmers, graphics designers and web developers is straining the entire network. The
joining of the roles of the servers in building one was all meant save space and minimizing the
cost of installing the networks by purchasing many servers. However has network is growing the
compatibility is the issue in the network where is experiencing slowness in performance.
Star topology is implemented in the system in the network at each c connecting centre i. e three
computers are connected to the switch layer. Switch layer are connected to each other and then
finally connected to the data centre which provides or serves information to the switches which
in turn distributes to the computers. The data centers are connect together to each other. Meaning
any failure of one data centre or switch layer may lead to total failure of the all system since one
depends on the other .The connection also leads to delay in data transfer since no routing hence
there is only one way of data to be transferred from one point to another hence low rate of data
transfer due to colliding in the cables.
14
5.0 Proposed Network description
Since the existing network of the Computer Dynamics company is not working full to their
required standards .The company needs a network design that is faster ,secure and efficient in
distribution of information around the company.
A layer of a network which is physical is required to interconnect the networks between the
buildings .This promotes resource sharing and data communication between the buildings
Opennhammer(2009) .
5.1 Circuits
The network will run in Cat 6 cable has in the current network. The two buildings will be
connected with optic fiber cable since the buildings are 40 meters apart cable of 50 meters is
required. The optic fiber cable will enable network resource sharing between the two buildings
is increased high speed.
5.2 Hardware
The current layer 2 of the existing network will be replaced with layer 3 both in accessed layer
and distribution network.
Layer 3 switches with 24 and more ports will be used. The cable will be used in communication
among the switches since they a have great speed in transfer of data. Two end servers will be
required in server virtualization and data recovery. An additional server required in transfer of
data and more switches specified ones are.
5.3 hp 15 pc
memory size will be 500 GB Storage capacity: 64 Bit Operating System .For each server in the
network.
Introduction of layer three will improve high rate of transfer of data and e many switches will
enable more users to connect to the network.
15
Since the existing network of the Computer Dynamics company is not working full to their
required standards .The company needs a network design that is faster ,secure and efficient in
distribution of information around the company.
A layer of a network which is physical is required to interconnect the networks between the
buildings .This promotes resource sharing and data communication between the buildings
Opennhammer(2009) .
5.1 Circuits
The network will run in Cat 6 cable has in the current network. The two buildings will be
connected with optic fiber cable since the buildings are 40 meters apart cable of 50 meters is
required. The optic fiber cable will enable network resource sharing between the two buildings
is increased high speed.
5.2 Hardware
The current layer 2 of the existing network will be replaced with layer 3 both in accessed layer
and distribution network.
Layer 3 switches with 24 and more ports will be used. The cable will be used in communication
among the switches since they a have great speed in transfer of data. Two end servers will be
required in server virtualization and data recovery. An additional server required in transfer of
data and more switches specified ones are.
5.3 hp 15 pc
memory size will be 500 GB Storage capacity: 64 Bit Operating System .For each server in the
network.
Introduction of layer three will improve high rate of transfer of data and e many switches will
enable more users to connect to the network.
15
5.4 Software
The clients applications that are up to date will not be changed. However other software that are
inadequate can be can be replaced with cloud based software best is cheap and easily available.
The license fee implementation cost.
Due to high cost of licensing the softwares, the softwares between the two buildings will be
integrated together to reduce the total expenditure.
5.5 Server Softwares
Windows XPO
Linux operating system.
5.6 Proposed network layout
16
The clients applications that are up to date will not be changed. However other software that are
inadequate can be can be replaced with cloud based software best is cheap and easily available.
The license fee implementation cost.
Due to high cost of licensing the softwares, the softwares between the two buildings will be
integrated together to reduce the total expenditure.
5.5 Server Softwares
Windows XPO
Linux operating system.
5.6 Proposed network layout
16
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The network will use the 3 layer switch structure which it will be connected with many other
devices to promote interconnections between the buildings. The following is an example of the
proposed network layout of the two buildings Yoshida (2009) .
17
devices to promote interconnections between the buildings. The following is an example of the
proposed network layout of the two buildings Yoshida (2009) .
17
6.0 COST ESTIMATION
Hardware
i. 2 Cisco catalyst 3750 24 port layer 3 switch 2*$ 8333=$ 16,666
ii. 2 Server cabinet 2* $1481=$ 2962
iii. Cabling = $ 2000
iv. Furniture = $15,000
v. 2 UPS RS 2*$ 495 =$ 990
vi. 20 Netgear WG302 Managed Wireless Access Point 20*$ 331=$6,620
vii. 2 2TB back up device 2*$ 657=$ 1314
viii. 200 17” LCD monitors 200*$886=$177200
ix. 36 Netgear switch 8 ports 36*$159 =$ 5724
Sub total $267,643
Software
1 Microsoft server 2007 1*$ 1650=$ 1650
200 Microsoft office Enterprise 2017 200* $51=$ 10200
35 Turbo card deluxe 35*$ 58=$ 2030
1 Corel premium collection 1*$ 1795=$1795
200 Nero 200*$ 14=$ 2800
8 Symantec end user protection 8*$ 1109=$ 8872
1 Internet plan 1*$ 3720=$3720
Sub total $31,067
Implementation
Installation and configuration $16250
Consultancy and maintenance $10000
Sub total $26250
Grand total $324,960
18
Hardware
i. 2 Cisco catalyst 3750 24 port layer 3 switch 2*$ 8333=$ 16,666
ii. 2 Server cabinet 2* $1481=$ 2962
iii. Cabling = $ 2000
iv. Furniture = $15,000
v. 2 UPS RS 2*$ 495 =$ 990
vi. 20 Netgear WG302 Managed Wireless Access Point 20*$ 331=$6,620
vii. 2 2TB back up device 2*$ 657=$ 1314
viii. 200 17” LCD monitors 200*$886=$177200
ix. 36 Netgear switch 8 ports 36*$159 =$ 5724
Sub total $267,643
Software
1 Microsoft server 2007 1*$ 1650=$ 1650
200 Microsoft office Enterprise 2017 200* $51=$ 10200
35 Turbo card deluxe 35*$ 58=$ 2030
1 Corel premium collection 1*$ 1795=$1795
200 Nero 200*$ 14=$ 2800
8 Symantec end user protection 8*$ 1109=$ 8872
1 Internet plan 1*$ 3720=$3720
Sub total $31,067
Implementation
Installation and configuration $16250
Consultancy and maintenance $10000
Sub total $26250
Grand total $324,960
18
7.0 CONCLUSION AND RECOMMENTATIONS
From the above research, the following are the findings;
The overall performance of the network is very poor, this is because the utilization of this
particular network is actually very high which in turn causes errors in application. Since the
company is using applications that are so heavy, this cannot be suited in a network with poor
performance which might hinder the growth of the company.
From the background, it is noted that there is no network connection in between the two
buildings that the company is using. This has forced the company to share data through VPN
which is a site to site tunnel. This tunnel is not sufficient because effort is replicated and data too
in every building. This same tunnel gives out limited bandwidth. The compatibility of some
software in the company are problematic.
The following measures therefore are recommended that the company should embrace;
i. Substitution of the current VPN burrow structure with an interest in a Fiber Optic
center layer between structures one and two. Lessen existing idleness and transfer speed
forced confinements to enhance add up to arrange execution
i. Substitute the layers2 with 3 of switch in the network infrastructure. This will in turn
provide Gigabit Ethernet that is on the segment of the network. This will add the growth
capacity, will promote network traffic and control. Gadgets are overseen and empower
the presentation of VLAN division, organizing movement as required.
ii. Supplant numerous servers with two top of the line servers (one in each building).
Diminish capacity issues, diminish programming similarity issues. Give debacle
recuperation system.
iii. VPN network for representatives requiring versatility is kept up as VPN association
through Sonic WALL switch/firewall and web association will proceed
iv. Put resources into cloud based Finance and Sales programming to give a coordinated
answer for. the two divisions while reducing stockpiling and programming administration
troubles on ITS
19
From the above research, the following are the findings;
The overall performance of the network is very poor, this is because the utilization of this
particular network is actually very high which in turn causes errors in application. Since the
company is using applications that are so heavy, this cannot be suited in a network with poor
performance which might hinder the growth of the company.
From the background, it is noted that there is no network connection in between the two
buildings that the company is using. This has forced the company to share data through VPN
which is a site to site tunnel. This tunnel is not sufficient because effort is replicated and data too
in every building. This same tunnel gives out limited bandwidth. The compatibility of some
software in the company are problematic.
The following measures therefore are recommended that the company should embrace;
i. Substitution of the current VPN burrow structure with an interest in a Fiber Optic
center layer between structures one and two. Lessen existing idleness and transfer speed
forced confinements to enhance add up to arrange execution
i. Substitute the layers2 with 3 of switch in the network infrastructure. This will in turn
provide Gigabit Ethernet that is on the segment of the network. This will add the growth
capacity, will promote network traffic and control. Gadgets are overseen and empower
the presentation of VLAN division, organizing movement as required.
ii. Supplant numerous servers with two top of the line servers (one in each building).
Diminish capacity issues, diminish programming similarity issues. Give debacle
recuperation system.
iii. VPN network for representatives requiring versatility is kept up as VPN association
through Sonic WALL switch/firewall and web association will proceed
iv. Put resources into cloud based Finance and Sales programming to give a coordinated
answer for. the two divisions while reducing stockpiling and programming administration
troubles on ITS
19
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
8.0 References
Eusuff, M.M. and Lansey, K.E., 2009. Optimization of water distribution network design using
the shuffled frog leaping algorithm. Journal of Water Resources planning and
management, 129(3), pp.210-225.
Conti, M., Maselli, G., Turi, G. and Giordano, S., 2007. Cross-layering in mobile ad hoc network
design. Computer, 37(2), pp.48-51.
Bagajewicz, M. and Cabrera, E., 2008. New MILP formulation for instrumentation network
design and upgrade. AIChE Journal, 48(10), pp.2271-2282.
Minoux, M., 20013. Networks synthesis and optimum network design problems: Models,
solution methods and applications. Networks, 19(3), pp.313-360.
Oppenheimer, P., 2009. Top-down network design. Cisco Press.
Leiner, B.M., Nielson, D.L. and Tobagi, F.A., 2010. Issues in packet radio network
design. Proceedings of the IEEE, 75(1), pp.6-20.
Kitano, H., 2009. Designing neural networks using genetic algorithms with graph generation
system. Complex systems, 4(4), pp.461-476.
Yoshida, M., NEC Corp, 2009 Network management system with network designing function.
U.S. Patent 6,510,139.
Li, Y., ZHU, S., CHEN, X., HAN, Z. and SUN, Z., 1999. A Rough Set Approach to BP Neural
Network Designing [J]. Systems Engineering-Theory & Practice, 4.
Agata, A. and Nishimura, K., 2012, April. Suboptimal PON network designing algorithm for
minimizing deployment cost of optical fiber cables. In Optical Network Design and Modeling
(ONDM), 2012 16th International Conference on (pp. 1-6). IEEE.
20
Eusuff, M.M. and Lansey, K.E., 2009. Optimization of water distribution network design using
the shuffled frog leaping algorithm. Journal of Water Resources planning and
management, 129(3), pp.210-225.
Conti, M., Maselli, G., Turi, G. and Giordano, S., 2007. Cross-layering in mobile ad hoc network
design. Computer, 37(2), pp.48-51.
Bagajewicz, M. and Cabrera, E., 2008. New MILP formulation for instrumentation network
design and upgrade. AIChE Journal, 48(10), pp.2271-2282.
Minoux, M., 20013. Networks synthesis and optimum network design problems: Models,
solution methods and applications. Networks, 19(3), pp.313-360.
Oppenheimer, P., 2009. Top-down network design. Cisco Press.
Leiner, B.M., Nielson, D.L. and Tobagi, F.A., 2010. Issues in packet radio network
design. Proceedings of the IEEE, 75(1), pp.6-20.
Kitano, H., 2009. Designing neural networks using genetic algorithms with graph generation
system. Complex systems, 4(4), pp.461-476.
Yoshida, M., NEC Corp, 2009 Network management system with network designing function.
U.S. Patent 6,510,139.
Li, Y., ZHU, S., CHEN, X., HAN, Z. and SUN, Z., 1999. A Rough Set Approach to BP Neural
Network Designing [J]. Systems Engineering-Theory & Practice, 4.
Agata, A. and Nishimura, K., 2012, April. Suboptimal PON network designing algorithm for
minimizing deployment cost of optical fiber cables. In Optical Network Design and Modeling
(ONDM), 2012 16th International Conference on (pp. 1-6). IEEE.
20
9.0 Appendi A
21
21
10.0 Appendix B
22
22
1 out of 22
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.