COIT20264 Network Design (HT2, 2019) - Logical Network Design Report

Verified

Added on  2022/11/09

|6
|270
|54
Report
AI Summary
This report presents a logical network design, addressing the requirements of a small organization's network. The design process begins with an analysis of service needs and potential network topologies. The report emphasizes the implementation of TCP and HTTP protocols, along with strategies for handling potential bottlenecks. It highlights the use of multiple paths to resources and servers, incorporating load balancing to ensure data availability. The network is designed for ease of administration, with a focus on node connectivity and gateway functionality. Network security is addressed through the use of low-end firewalls and antivirus software. The design follows a top-down network design methodology, covering cabling, device selection, network management, and security strategies. The report references key concepts like remote access technologies, network management processes, and network security design principles.
Document Page
LOGICAL
NETWORK
DESIGN
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Explanation of
the Logical
Network
Design
When a logical network design is planned, it
can be started from any one of the two
places.
New network can be designed and installed
from the scratch or an existing network can
be mod
The network is designed depending on
services which is provided to the users, the
possible networking patterns are analysed for
designing the network.
Document Page
Explanation of
the Logical
Network
Design
(Continued)
Potential bottlenecks are located and
multiple paths are provided to resources and
servers are set which provide copies of
essential data as load balancing is provided.
TCP and HTTP protocols are implemented in
this network.
Document Page
Justification of
the Logical
Network
Design
This network is typical network for small
organizations. Users can access the network
at any time.
These networks are simplest to administrator,
as every nodes of the network are connected
and gateway device’s functionality is proper.
Network security is completed by low-end
firewall present at antivirus software and the
gateway.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Baghalian, A., Rezapour, S. and Farahani, R.Z.,
2013. Robust supply chain network design
with service level against disruptions and
demand uncertainties: A real-life case.
European Journal of Operational Research,
227(1), pp.199-215.
Farahani, R.Z., Rezapour, S., Drezner, T. and
Fallah, S., 2014. Competitive supply chain
network design: An overview of
classifications, models, solution techniques
and applications. Omega, 45, pp.92-118.
Document Page
Thank you
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]