This study material provides an in-depth analysis of IT network designing, including LAN design, network security, VOIP, and more. It offers recommendations for changes in the LAN and an analysis of the local area network design. Suitable for college and university students.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: IT NETWORK DESIGNING IT Network Designing Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 IT NETWORK DESIGNING Table of Contents 1. Local Area Network Design Diagram....................................................................................2 2. Revised LAN Design Diagram..............................................................................................2 2.1. Rationale for the network Design...................................................................................3 3. Recommendations for the changes in the LAN.....................................................................3 4. Analysis of the local area network design..............................................................................4 Bibliography...............................................................................................................................6
2 IT NETWORK DESIGNING 1. Local Area Network Design Diagram 2. Revised LAN Design Diagram
3 IT NETWORK DESIGNING 2.1. Rationale for the network Design The flow of the data packets in the network should be identified for the management of the network traffic and management of the service offered to the users connected in the network. The client server model is used for separating the hosts and increase the scalability of the network. The networking protocols that should be used for the configuration of the router is analysed depending on the service and the type of server proposed for the retail store network. There is need for the installation of wireless access point and secure it with the application of encryption algorithm. The wireless intrusion detection system is used for the management of the network resources and enforcement of the security policies for reducing the risk associated with the access of the wireless network platform. The telephony service should be enabled and the location of the installation of the IP phones should be identified for configuring the network with IP telephony service. The routerscanbeconfiguredwithDHCPaddresspoolsuchthatthecomplexityand manageability of the network is reduced. The hubs used in the current design is replaced with switches such that the traffic can be managed efficiently and the risk of narrow bandwidth is eliminated in the proposed network framework. The network is tested using the HTTP protocol and it is tested for management of the network policy. Active directory configuration should be used for the management of the identity of the users and management of the authentication of the user for the management of the inventory. The use of the redundant link reduces the chances of network downtime and increases the availability of the resources. 3. Recommendations for the changes in the LAN The current network diagram created for the retail store lacks in security since there are no network firewall used. Firewall should be used for the network for blocking the unknown IP address to access the internal resources of the network. A RADIUS server is also
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 IT NETWORK DESIGNING implemented in the network for the management of the remote connection for the five sales representatives and enable them to access the files residing in the file server for increasing the efficiency of the workplace. The current framework of the network should maintain the quality of service and have the option for expansion of the network for management of the future growth of the retail store. Moreover in the current network there is no option for connecting VOIP device and the changes is made and for the network and should be configured with VLAN such that there is no congestion in the network. It helps in reducing the cost of telecommunication and the service levels should be created for the management of the network framework. The local area network is divided into smaller segments such that it can be managed easily and the errors can be identified for troubleshooting the network. There is also need for wireless connectivity for connecting the wireless device in the network and serve the needs of the customer. The area covered by the retails store should be analysed for implementation of the wireless access point in the network and provide service to the sales representatives to serve the needs of the customer visiting the retail store. The servers connected in the network should be installed separately from the network such that the access of the network is prevented for the unknown users and the security of the network is maintained. 4. Analysis of the local area network design The local area network design is created for the management of the different operations of the small to medium sized retail store. The success of the network dependents on the alignment of the needs of the retails store with the developed network. The network is developed such that there is no performance issues and no problem rises during the development of the network framework. The current needs of the organization that is the
5 IT NETWORK DESIGNING number of users is analysed with the increase in the customer base for the expansion of the network. The phone bills are also audited for the analysis of the implementation of the VOIP system in the current network for reducing the telecommunication cost and get the maximum benefit from the developed network. The needs of the server for recording the details and implementation of the different technology for maintaining the security of the network is also evaluated for the development of the network proposal. The current issues faced by the retail store is eliminated for increasing the efficiency of the network and increasing the reliability of the network.
6 IT NETWORK DESIGNING Bibliography Chen, X., Zhong, C., Yuen, C., & Chen, H. H. (2015). Multi-antenna relay aided wireless physical layer security.IEEE Communications Magazine,53(12), 40-46. Ferreira, D., Kostakos, V., & Dey, A. K. (2015). AWARE: mobile context instrumentation framework.Frontiers in ICT,2, 6. Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditionalprivacy-preservationandnon-repudiationforVANETs.IEEE Transactions on Parallel and Distributed Systems,26(4), 938-948. Maslov, A. E., Katuntsev, S. L., & Maliavko, A. A. (2017, June). Study and implementation of authenticationmechanismbyRADIUS-server inswitchesandroutersusing NETCONF protocol. InMicro/Nanotechnologies and Electron Devices (EDM), 2017 18th International Conference of Young Specialists on(pp. 111-114). IEEE. Sedjelmaci, H., & Senouci, S. M. (2015). An accurate and efficient collaborative intrusion detectionframeworktosecurevehicularnetworks.Computers&Electrical Engineering,43, 33-47. Winter,S.,&McCauley,M.(2015).DynamicPeerDiscoveryforRADIUS/TLSand RADIUS/DTLS Based on the Network Access Identifier (NAI)(No. RFC 7585).