Network Design and Troubleshooting
VerifiedAdded on 2022/11/14
|16
|3783
|190
AI Summary
This report discusses the development of a network infrastructure for a client named alm.co.uk that have four departments. It includes functional and non-functional requirements, analysis of different network components, evaluation of different technology and protocols, network subnet plan, network diagram, security precautions and configuration, and testing of the network.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/9ae275d8-c440-4626-8f98-88ad2b8c9400-page-1.webp)
Running head: NETWORK DESIGN AND TROUBLESHOOTING
Network Design and Troubleshooting
Name of the Student
Name of the University
Author’s Note
Network Design and Troubleshooting
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/ac6092c5-f800-4504-84cb-57101cbb973d-page-2.webp)
1
NETWORK DESIGN AND TROUBLESHOOTING
Table of Contents
Introduction......................................................................................................................................2
Functional and Non Functional Requirement..................................................................................2
Examination and Analysis of different network Components.........................................................3
Reason for selection of device and components..............................................................................4
Current problems in the network.....................................................................................................5
Evaluation of different technology and protocols...........................................................................5
Network Subnet Plan.......................................................................................................................7
Network Diagram............................................................................................................................9
Justification......................................................................................................................................9
Security precaution and Configuration..........................................................................................10
Testing of the network...................................................................................................................11
Conclusion.....................................................................................................................................12
References......................................................................................................................................13
NETWORK DESIGN AND TROUBLESHOOTING
Table of Contents
Introduction......................................................................................................................................2
Functional and Non Functional Requirement..................................................................................2
Examination and Analysis of different network Components.........................................................3
Reason for selection of device and components..............................................................................4
Current problems in the network.....................................................................................................5
Evaluation of different technology and protocols...........................................................................5
Network Subnet Plan.......................................................................................................................7
Network Diagram............................................................................................................................9
Justification......................................................................................................................................9
Security precaution and Configuration..........................................................................................10
Testing of the network...................................................................................................................11
Conclusion.....................................................................................................................................12
References......................................................................................................................................13
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/7270461a-53c8-41a5-b8e9-83f37cd25d22-page-3.webp)
2
NETWORK DESIGN AND TROUBLESHOOTING
Introduction
The process of evaluating, understanding and scoping the network which is to be
implemented is known as network designing. It is generally performed by the engineers who
represents the network design as the network diagram. The network design includes several other
things like the logical map of the desired network, the cabling structure, quantity, location and
the type of the network devices like the routers, servers and the switches (Govindan et al. 2016).
IP addressing structures are also among the prime requirements along with the architecture for
network as well as overall security. The purpose of the report is the development of a network
infrastructure for a client named alm.co.uk that have four departments. An analysis is made on
the number of users and their requirement for the development of the network. The network
model that can be implemented for development of the network is evaluated and discussed in the
report for improving the scalability and security of the network.
Functional and Non Functional Requirement
The functional requirement identified for developing the network solution for alm.co.uk.
are stated below:
To allow users to connect their wireless devices with the developed network
To restrict the access of the users for a department to connect with the other
department subnet
To use redundant link such that the data packet can flow between the different
host with minimum delay and packet loss
To reduce congestion in the network and allow users to connect with the network
from remote location
NETWORK DESIGN AND TROUBLESHOOTING
Introduction
The process of evaluating, understanding and scoping the network which is to be
implemented is known as network designing. It is generally performed by the engineers who
represents the network design as the network diagram. The network design includes several other
things like the logical map of the desired network, the cabling structure, quantity, location and
the type of the network devices like the routers, servers and the switches (Govindan et al. 2016).
IP addressing structures are also among the prime requirements along with the architecture for
network as well as overall security. The purpose of the report is the development of a network
infrastructure for a client named alm.co.uk that have four departments. An analysis is made on
the number of users and their requirement for the development of the network. The network
model that can be implemented for development of the network is evaluated and discussed in the
report for improving the scalability and security of the network.
Functional and Non Functional Requirement
The functional requirement identified for developing the network solution for alm.co.uk.
are stated below:
To allow users to connect their wireless devices with the developed network
To restrict the access of the users for a department to connect with the other
department subnet
To use redundant link such that the data packet can flow between the different
host with minimum delay and packet loss
To reduce congestion in the network and allow users to connect with the network
from remote location
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/e142b87f-6474-4192-a1e2-f23822c58252-page-4.webp)
3
NETWORK DESIGN AND TROUBLESHOOTING
To host an internal website and configure a Web server and dns server
To configure an email server and allow the user to send and receive mail between
each of the department.
To restrict the unauthorized users to access the sensitive data and resources of the
organization
To use separate IP address for the wireless network and restrict the wireless users
to access the internal network
To use secure encryption algorithm to restrict the unknown users to access the
wireless network
The non-functional requirements includes scalability, reliability, availability, regulatory,
recoverability, capacity, maintainability, serviceability, security, regulatory, manageability,
environmental, data integrity, interoperability and usability (Xiaogang and Quan 2018). The
functional requirement includes every technical details, calculations, processing, data
manipulation and every other specification that a particular system is desired to achieve.
The desired network must be scalable as mentioned. A system is termed as scalable when
it can handle changes within itself, especially the growing ones. The system must be capable of
adding more resources to its existing framework.
Examination and Analysis of different network Components
An analysis is needed to be made on the data flow in the network by capturing the
network traffic from different network equipment’s. Different components of the wireless
networks are as follows: Switches, routers, network hubs, wireless access points, network
servers, network cables, and Network Interface Cards (NIC). Since the organization has a private
IP address for the LAN, one of the interface is needed to be subnetted for allocating different
NETWORK DESIGN AND TROUBLESHOOTING
To host an internal website and configure a Web server and dns server
To configure an email server and allow the user to send and receive mail between
each of the department.
To restrict the unauthorized users to access the sensitive data and resources of the
organization
To use separate IP address for the wireless network and restrict the wireless users
to access the internal network
To use secure encryption algorithm to restrict the unknown users to access the
wireless network
The non-functional requirements includes scalability, reliability, availability, regulatory,
recoverability, capacity, maintainability, serviceability, security, regulatory, manageability,
environmental, data integrity, interoperability and usability (Xiaogang and Quan 2018). The
functional requirement includes every technical details, calculations, processing, data
manipulation and every other specification that a particular system is desired to achieve.
The desired network must be scalable as mentioned. A system is termed as scalable when
it can handle changes within itself, especially the growing ones. The system must be capable of
adding more resources to its existing framework.
Examination and Analysis of different network Components
An analysis is needed to be made on the data flow in the network by capturing the
network traffic from different network equipment’s. Different components of the wireless
networks are as follows: Switches, routers, network hubs, wireless access points, network
servers, network cables, and Network Interface Cards (NIC). Since the organization has a private
IP address for the LAN, one of the interface is needed to be subnetted for allocating different
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/edb32835-4b76-447c-a4a0-c22ec6d63bbd-page-5.webp)
4
NETWORK DESIGN AND TROUBLESHOOTING
range of IP address for the four departments (Betzel et al. 2016). Another interface is needed for
the wireless network and connect the wireless access point for providing wireless service to the
users. Routers are responsible for transferring data from one device to the other. The data are
sent in the form of packets. The determination of the destination of the packet delivery is done by
the router, which reads the packets to route the information to a specific destination. The network
is also provided with switches which ensures the proper flow of information within the network.
Network hubs are present to connect numerous networks and make them act as a one (Gal et al.
2017). Network hub, like the switches and the routers, broadcasts information throughout the
connection instead of a particular device. Apart from these, there are wireless access points.
These points helps in routing data like routers with the help of wireless frequencies. IEEE 802.11
is the most frequently used protocol. This protocol braces the wireless networking applications.
Reason for selection of device and components
The main reason for the selection of the device and the components is to allow the user to
share files and information between the different user. The NIC card of the computer is used for
connecting the Ethernet cable and it has a unique hardware address for identifying the computer.
The speed of the interface card is needed to be 1000 Mbps such that it can meet the future needs
of the user. Router is used for connecting the internal network of the organization with the
internet service provider (Salmond 2019). Layer 3 switch are used for the management of the
distribution of the network and it is configured as VTP server such that the VLAN information
are automatically distributed with the VTP client. The wireless access point is of 300N such that
it has a wider coverage area and better performance.
NETWORK DESIGN AND TROUBLESHOOTING
range of IP address for the four departments (Betzel et al. 2016). Another interface is needed for
the wireless network and connect the wireless access point for providing wireless service to the
users. Routers are responsible for transferring data from one device to the other. The data are
sent in the form of packets. The determination of the destination of the packet delivery is done by
the router, which reads the packets to route the information to a specific destination. The network
is also provided with switches which ensures the proper flow of information within the network.
Network hubs are present to connect numerous networks and make them act as a one (Gal et al.
2017). Network hub, like the switches and the routers, broadcasts information throughout the
connection instead of a particular device. Apart from these, there are wireless access points.
These points helps in routing data like routers with the help of wireless frequencies. IEEE 802.11
is the most frequently used protocol. This protocol braces the wireless networking applications.
Reason for selection of device and components
The main reason for the selection of the device and the components is to allow the user to
share files and information between the different user. The NIC card of the computer is used for
connecting the Ethernet cable and it has a unique hardware address for identifying the computer.
The speed of the interface card is needed to be 1000 Mbps such that it can meet the future needs
of the user. Router is used for connecting the internal network of the organization with the
internet service provider (Salmond 2019). Layer 3 switch are used for the management of the
distribution of the network and it is configured as VTP server such that the VLAN information
are automatically distributed with the VTP client. The wireless access point is of 300N such that
it has a wider coverage area and better performance.
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/fca3c8dc-1e6c-4ed7-893f-ccbfeb517a06-page-6.webp)
5
NETWORK DESIGN AND TROUBLESHOOTING
Current problems in the network
The existing wired network connection had few disadvantages. Firstly, the wired
connections has to be fixed. Relocating is very inconvenient as this include extension of the wire,
requirement of new ports, and many other stuffs. Thus designing of a wireless network will
result in easy relocation of the student. Installation process for a wired network system can be
complex as it needs several components to be set up first. The installation process of the network
can be lengthy depending upon the requirements of the infrastructure (Vriend et al. 2019.).
Maintenance of the network can be expensive. Smaller networks does not require any server. As
the network grows, it adds more system to it, and it needs a proper server to keep a track of the
activity. The maintenance is expensive as an IT professional may be needed for the controlling
the process. Moreover, the wires are the main disadvantage of the wired network. With the
increase in systems in a network, the connectivity has to be increased, with more LAN cables it
becomes very difficult to maintain them and they look clumsy (Margi, Alves and Sepulveda
2017). A wireless network can be a very helpful in this scenario, as the students may access the
network with every possible convenient way.
Evaluation of different technology and protocols
The most common internet protocol in use is the TCP/IP. It stands for Transmission
Control Protocol/ Internet Protocol. It is a stream protocol. The client and the server negotiated.
The data transfer occurs between these two end points, without a failure. The protocol is thus
known as the lossless protocol. It is also known as peer to peer protocol. The TCP/IP layer is
utilized for sending emails. The application layer firstly collects the email and built a connection
with the server (Morales et al. 2017). The hostname is resolved by the DNS and the packets from
NETWORK DESIGN AND TROUBLESHOOTING
Current problems in the network
The existing wired network connection had few disadvantages. Firstly, the wired
connections has to be fixed. Relocating is very inconvenient as this include extension of the wire,
requirement of new ports, and many other stuffs. Thus designing of a wireless network will
result in easy relocation of the student. Installation process for a wired network system can be
complex as it needs several components to be set up first. The installation process of the network
can be lengthy depending upon the requirements of the infrastructure (Vriend et al. 2019.).
Maintenance of the network can be expensive. Smaller networks does not require any server. As
the network grows, it adds more system to it, and it needs a proper server to keep a track of the
activity. The maintenance is expensive as an IT professional may be needed for the controlling
the process. Moreover, the wires are the main disadvantage of the wired network. With the
increase in systems in a network, the connectivity has to be increased, with more LAN cables it
becomes very difficult to maintain them and they look clumsy (Margi, Alves and Sepulveda
2017). A wireless network can be a very helpful in this scenario, as the students may access the
network with every possible convenient way.
Evaluation of different technology and protocols
The most common internet protocol in use is the TCP/IP. It stands for Transmission
Control Protocol/ Internet Protocol. It is a stream protocol. The client and the server negotiated.
The data transfer occurs between these two end points, without a failure. The protocol is thus
known as the lossless protocol. It is also known as peer to peer protocol. The TCP/IP layer is
utilized for sending emails. The application layer firstly collects the email and built a connection
with the server (Morales et al. 2017). The hostname is resolved by the DNS and the packets from
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/f212b4c0-43e5-499a-926f-f4e89be12879-page-7.webp)
6
NETWORK DESIGN AND TROUBLESHOOTING
the transport layer is forwarded by the network layer. The data link layer allows communication
to one another. The bits are moved back to the destination by the physical layer.
Presentation layer is used for the conversion of the incoming and the outgoing messages.
Conversion of encrypted text to clear text and vice versa takes place in this layer.
The session layer is used for the packaging of the data and the error checking before
packaging of data. For most of the application TCP and UDP is used (Vangulick et al. 2017).
The layer used for the packaging of data is the transport layer. Delivering the package for
checking the error is also done in this layer.
The layer responsible for handling the routing and addressing of the data to the correct
address is the network layer. Internet Protocol is used in the network layer.
The data link layer establishes the physical link and framing the packets properly inside a
network (Robson 2018).
The second most used protocol is the HTTP. This protocol is used for transmitting data
from the World Wide Web. The Hyper Text Transfer Protocol is the protocol to transmit HTML.
Thirdly, the File Transfer protocol is mostly used protocol. The computers that are
connected in the TCP/IP network can transmit files among them. The technologies used in the
network designing are wireless LAN, Wireless Access points, cloud based control and one
premise control. The wireless LAN makes use of the radio frequency technology (Nedić,
Olshevsky and Rabbat 2018). This is a technology which includes a frequency that is within the
electromagnetic spectrum. This electromagnetic spectrum is associated with the radio wave
propagation. The WLAN (Wireless LAN) allows the users to connect with the network under a
particular coverage area. The wireless access points are integrated into the routers. Ethernet
connection is used to connect a standalone wireless access point to the router so that it can get
NETWORK DESIGN AND TROUBLESHOOTING
the transport layer is forwarded by the network layer. The data link layer allows communication
to one another. The bits are moved back to the destination by the physical layer.
Presentation layer is used for the conversion of the incoming and the outgoing messages.
Conversion of encrypted text to clear text and vice versa takes place in this layer.
The session layer is used for the packaging of the data and the error checking before
packaging of data. For most of the application TCP and UDP is used (Vangulick et al. 2017).
The layer used for the packaging of data is the transport layer. Delivering the package for
checking the error is also done in this layer.
The layer responsible for handling the routing and addressing of the data to the correct
address is the network layer. Internet Protocol is used in the network layer.
The data link layer establishes the physical link and framing the packets properly inside a
network (Robson 2018).
The second most used protocol is the HTTP. This protocol is used for transmitting data
from the World Wide Web. The Hyper Text Transfer Protocol is the protocol to transmit HTML.
Thirdly, the File Transfer protocol is mostly used protocol. The computers that are
connected in the TCP/IP network can transmit files among them. The technologies used in the
network designing are wireless LAN, Wireless Access points, cloud based control and one
premise control. The wireless LAN makes use of the radio frequency technology (Nedić,
Olshevsky and Rabbat 2018). This is a technology which includes a frequency that is within the
electromagnetic spectrum. This electromagnetic spectrum is associated with the radio wave
propagation. The WLAN (Wireless LAN) allows the users to connect with the network under a
particular coverage area. The wireless access points are integrated into the routers. Ethernet
connection is used to connect a standalone wireless access point to the router so that it can get
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/6be07560-0f8c-4a07-ad0a-723ade2a42f8-page-8.webp)
7
NETWORK DESIGN AND TROUBLESHOOTING
connected to the network system. The other devices are can access to this network with the help
of the radio frequency method itself (Quevedo et al. 2017). The cloud allows the users to
download and install files in the chosen device with the help of internet. The user can later access
them from any other device as and when required with the help of internet. The files can be
edited later on in the cloud.
Network Subnet Plan
Major Network: 192.168.168.0/24
Available IP addresses in major network: 254
Number of IP addresses needed: 140
Available IP addresses in allocated subnets: 170
About 70% of available major network address space is used
About 82% of subnetted network address space is used
Subnet
Name
Need
ed
Size
Allocat
ed Size
Address Ma
sk
Dec Mask Assignable
Range
Broadcast
Departm
ent 1
49 62 192.168.168
.64
/26 255.255.255
.192
192.168.168
.65 -
192.168.168
.126
192.168.168
.127
Departm
ent 2
19 30 192.168.168
.128
/27 255.255.255
.224
192.168.168
.129 -
192.168.168
192.168.168
.159
NETWORK DESIGN AND TROUBLESHOOTING
connected to the network system. The other devices are can access to this network with the help
of the radio frequency method itself (Quevedo et al. 2017). The cloud allows the users to
download and install files in the chosen device with the help of internet. The user can later access
them from any other device as and when required with the help of internet. The files can be
edited later on in the cloud.
Network Subnet Plan
Major Network: 192.168.168.0/24
Available IP addresses in major network: 254
Number of IP addresses needed: 140
Available IP addresses in allocated subnets: 170
About 70% of available major network address space is used
About 82% of subnetted network address space is used
Subnet
Name
Need
ed
Size
Allocat
ed Size
Address Ma
sk
Dec Mask Assignable
Range
Broadcast
Departm
ent 1
49 62 192.168.168
.64
/26 255.255.255
.192
192.168.168
.65 -
192.168.168
.126
192.168.168
.127
Departm
ent 2
19 30 192.168.168
.128
/27 255.255.255
.224
192.168.168
.129 -
192.168.168
192.168.168
.159
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/ec0f6e48-f115-4d44-87c0-3bb57397a5be-page-9.webp)
8
NETWORK DESIGN AND TROUBLESHOOTING
.158
Departm
ent 3
12 14 192.168.168
.160
/28 255.255.255
.240
192.168.168
.161 -
192.168.168
.174
192.168.168
.175
Departm
ent 4
59 62 192.168.168
.0
/26 255.255.255
.192
192.168.168
.1 -
192.168.168
.62
192.168.168
.63
Wireless 100 126 10.11.12.0 /25 255.255.255
.128
10.11.12.1 -
10.11.12.12
6
10.11.12.12
7
NETWORK DESIGN AND TROUBLESHOOTING
.158
Departm
ent 3
12 14 192.168.168
.160
/28 255.255.255
.240
192.168.168
.161 -
192.168.168
.174
192.168.168
.175
Departm
ent 4
59 62 192.168.168
.0
/26 255.255.255
.192
192.168.168
.1 -
192.168.168
.62
192.168.168
.63
Wireless 100 126 10.11.12.0 /25 255.255.255
.128
10.11.12.1 -
10.11.12.12
6
10.11.12.12
7
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/19c25d25-0767-494e-a651-5bdb1108a82e-page-10.webp)
9
NETWORK DESIGN AND TROUBLESHOOTING
Network Diagram
Justification
The above network design is proposed and for the development three layer hierarchical
model is used. The core layer consists of the high speed network devices such as the router and
the layer three switch. It plays the role of forwarding the data packets and the access layer is used
for connecting the end stations. The devices used in the access layer are the switches and it plays
the role of reducing the cost per port and it focuses on connecting the workstations with the
network. The distribution layer is used for filtering, routing and managing the QoS policies in
distribution layer (Bhardwaj et al. 2016). For each of the department a separate VLAN is used
such that it can be managed centrally for restriction of the access of the users. The server is
connected with the core switch such that the availability can be increased. Redundant links are
NETWORK DESIGN AND TROUBLESHOOTING
Network Diagram
Justification
The above network design is proposed and for the development three layer hierarchical
model is used. The core layer consists of the high speed network devices such as the router and
the layer three switch. It plays the role of forwarding the data packets and the access layer is used
for connecting the end stations. The devices used in the access layer are the switches and it plays
the role of reducing the cost per port and it focuses on connecting the workstations with the
network. The distribution layer is used for filtering, routing and managing the QoS policies in
distribution layer (Bhardwaj et al. 2016). For each of the department a separate VLAN is used
such that it can be managed centrally for restriction of the access of the users. The server is
connected with the core switch such that the availability can be increased. Redundant links are
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/66e2d06a-d40e-43c1-9ad6-4ac7811efbc0-page-11.webp)
10
NETWORK DESIGN AND TROUBLESHOOTING
used for management of the access and eliminate congestion, packet loss and jitter in the
network.
Security precaution and Configuration
Before focusing on the technical part, taking physical precautions are essential. The
Server should be located in a safe place, where it can be locked securely. Generally, most
hardware firewalls are located in the broadband router and can prevent the invading threats such
as downloading any corrupt file from the internet (Han et al. 2015). But they are less productive
at preventing outgoing threats. Installed software should be updated, after installation, updates
for protecting against the computer viruses be it latest or usual is received periodically. Sharing
passwords should be avoided until it’s a need-to-know case, and changing them every two
months is an efficient way to prevent getting their way into the wrong hands (Stergiopoulos et
al. 2018). The settings of default log-in should be changed by making it disabled for default log-
in.
Wireless Network have greater convenience but also prone to risks. Here, risk means
easy access of hackers into the system network. Hence, for protecting the network, best
encryption system should be owned such as, WPA2 (Chin et al. 2015). A security professional
can inform about the latest unified threat management and can also spot the threats that might
have got overlooked hence, consulting a security professional is an effective option.
Basically, to fix or repair any sort of failed product the process of troubleshooting is used.
To make the process or the system fully functional or operational, troubleshooting is used as it is
a logical and systematic search process. It does elimination of potential causes of any problem.
In general, identifying and diagnosing of the problem is known as troubleshooting (Samdanis,
Costa-Perez and Sciancalepore 2016). It identifies the symptoms of malfunction and provide
NETWORK DESIGN AND TROUBLESHOOTING
used for management of the access and eliminate congestion, packet loss and jitter in the
network.
Security precaution and Configuration
Before focusing on the technical part, taking physical precautions are essential. The
Server should be located in a safe place, where it can be locked securely. Generally, most
hardware firewalls are located in the broadband router and can prevent the invading threats such
as downloading any corrupt file from the internet (Han et al. 2015). But they are less productive
at preventing outgoing threats. Installed software should be updated, after installation, updates
for protecting against the computer viruses be it latest or usual is received periodically. Sharing
passwords should be avoided until it’s a need-to-know case, and changing them every two
months is an efficient way to prevent getting their way into the wrong hands (Stergiopoulos et
al. 2018). The settings of default log-in should be changed by making it disabled for default log-
in.
Wireless Network have greater convenience but also prone to risks. Here, risk means
easy access of hackers into the system network. Hence, for protecting the network, best
encryption system should be owned such as, WPA2 (Chin et al. 2015). A security professional
can inform about the latest unified threat management and can also spot the threats that might
have got overlooked hence, consulting a security professional is an effective option.
Basically, to fix or repair any sort of failed product the process of troubleshooting is used.
To make the process or the system fully functional or operational, troubleshooting is used as it is
a logical and systematic search process. It does elimination of potential causes of any problem.
In general, identifying and diagnosing of the problem is known as troubleshooting (Samdanis,
Costa-Perez and Sciancalepore 2016). It identifies the symptoms of malfunction and provide
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/64e6ac32-db6d-41a4-8aef-752f686dfa46-page-12.webp)
11
NETWORK DESIGN AND TROUBLESHOOTING
remedy to these symptoms. Troubleshooting primarily focuses on the changes that are very
recent to the system or the surrounding in which it is existing.
Testing of the network
The security configuration and the protocols are needed to be tested such that an
unknown user cannot have access of the network. Network monitoring tool can be used for
gathering data regarding the network and the network is needed to be pinged from different
location for getting the network response. The available bandwidth is also needed to be identified
a penetration testing can be made in the network for gathering data and vulnerability of the
network devices (Kwasinski and Kwasinski 2015). The parameters of QoS are needed to be used
for measuring the packet loss, latency and jitter. Network performance monitoring tool can be
used for automating the network testing and eliminate the issues with the current network.
Computerized troubleshooting cables can be used for efficient services to the users, there
are a few computerized troubleshooting services such as Mac’s server which was previously
known as prim FAQs, shows the top 10 solutions with the highest probability of fixing the
problem immediately. The additional questions can be answered by the qualified technicians to
advance through the troubleshooting procedure with each step narrowing the list of probable
solutions to fix the problem (Sousa et al. 2016). Network troubleshooting involves, determining
the problems for resolving, establishing the internet connection of a computer. Configuring a
router, its switch or any device for network management is important. Updating the firmware
devices or router switches after the installation of Wi-Fi devices then removing the viruses is
also involved. The entire work of Network troubleshooting can be automated or can be done
manually and for automated task network diagnostic software is needed for network
management.
NETWORK DESIGN AND TROUBLESHOOTING
remedy to these symptoms. Troubleshooting primarily focuses on the changes that are very
recent to the system or the surrounding in which it is existing.
Testing of the network
The security configuration and the protocols are needed to be tested such that an
unknown user cannot have access of the network. Network monitoring tool can be used for
gathering data regarding the network and the network is needed to be pinged from different
location for getting the network response. The available bandwidth is also needed to be identified
a penetration testing can be made in the network for gathering data and vulnerability of the
network devices (Kwasinski and Kwasinski 2015). The parameters of QoS are needed to be used
for measuring the packet loss, latency and jitter. Network performance monitoring tool can be
used for automating the network testing and eliminate the issues with the current network.
Computerized troubleshooting cables can be used for efficient services to the users, there
are a few computerized troubleshooting services such as Mac’s server which was previously
known as prim FAQs, shows the top 10 solutions with the highest probability of fixing the
problem immediately. The additional questions can be answered by the qualified technicians to
advance through the troubleshooting procedure with each step narrowing the list of probable
solutions to fix the problem (Sousa et al. 2016). Network troubleshooting involves, determining
the problems for resolving, establishing the internet connection of a computer. Configuring a
router, its switch or any device for network management is important. Updating the firmware
devices or router switches after the installation of Wi-Fi devices then removing the viruses is
also involved. The entire work of Network troubleshooting can be automated or can be done
manually and for automated task network diagnostic software is needed for network
management.
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/fc8c33ec-c4fc-4ef2-95fd-c91c0b9c084d-page-13.webp)
12
NETWORK DESIGN AND TROUBLESHOOTING
Conclusion
Hence, it can be concluded from the above report that for the developing a network
solution it is essential to prepare a network design following the current organizational structure.
The functional and nonfunctional requirement is analyzed for the selection of an appropriate
network topology and designing the network. An analysis is made on the different network
components that is needed to be used for the development of the network and the reason for the
selecting the device is mentioned in the report. The current problems for the development of the
network is identified such that the new design can be used for eliminating the problem and
increasing the efficiency of the current organization. A network subnet plan is created by
estimating the future growth and current number of user for configuring the network interface
and VLAN. The security precaution and the configuration that is needed to be followed for the
development of the network is evaluated and documented. In the last stage the steps needed to be
followed for testing the network is identified and documented.
NETWORK DESIGN AND TROUBLESHOOTING
Conclusion
Hence, it can be concluded from the above report that for the developing a network
solution it is essential to prepare a network design following the current organizational structure.
The functional and nonfunctional requirement is analyzed for the selection of an appropriate
network topology and designing the network. An analysis is made on the different network
components that is needed to be used for the development of the network and the reason for the
selecting the device is mentioned in the report. The current problems for the development of the
network is identified such that the new design can be used for eliminating the problem and
increasing the efficiency of the current organization. A network subnet plan is created by
estimating the future growth and current number of user for configuring the network interface
and VLAN. The security precaution and the configuration that is needed to be followed for the
development of the network is evaluated and documented. In the last stage the steps needed to be
followed for testing the network is identified and documented.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/3c0c95f0-9a01-4bdb-8e0b-ffbbaba2d596-page-14.webp)
13
NETWORK DESIGN AND TROUBLESHOOTING
References
Betzel, R.F., Gu, S., Medaglia, J.D., Pasqualetti, F. and Bassett, D.S., 2016. Optimally
controlling the human connectome: the role of network topology. Scientific reports, 6, p.30770.
Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V. and Sastry, H., 2016. Design a Resilient
Network Infrastructure Security Policy Framework. Indian Journal of Science and
Technology, 9(19), pp.1-8.
Chin, W.S., Kim, H.S., Heo, Y.J. and Jang, J.W., 2015. A context-based future network
infrastructure for IoT services. Procedia Computer Science, 56, pp.266-270.
Gal, E., London, M., Globerson, A., Ramaswamy, S., Reimann, M.W., Muller, E., Markram, H.
and Segev, I., 2017. Rich cell-type-specific network topology in neocortical
microcircuitry. Nature neuroscience, 20(7), p.1004.
Govindan, R., Minei, I., Kallahalla, M., Koley, B. and Vahdat, A., 2016, August. Evolve or die:
High-availability design principles drawn from googles network infrastructure. In Proceedings
of the 2016 ACM SIGCOMM Conference (pp. 58-72). ACM.
Han, B., Gopalakrishnan, V., Ji, L. and Lee, S., 2015. Network function virtualization:
Challenges and opportunities for innovations. IEEE Communications Magazine, 53(2), pp.90-97.
Kwasinski, A. and Kwasinski, A., 2015. Increasing sustainability and resiliency of cellular
network infrastructure by harvesting renewable energy. IEEE Communications Magazine, 53(4),
pp.110-116.
Margi, C.B., Alves, R.C. and Sepulveda, J., 2017. Sensing as a service: secure wireless sensor
network infrastructure sharing for the internet of things. Open Journal of Internet Of Things
(OJIOT), 3(1), pp.91-102.
NETWORK DESIGN AND TROUBLESHOOTING
References
Betzel, R.F., Gu, S., Medaglia, J.D., Pasqualetti, F. and Bassett, D.S., 2016. Optimally
controlling the human connectome: the role of network topology. Scientific reports, 6, p.30770.
Bhardwaj, A., Subrahmanyam, G.V.B., Avasthi, V. and Sastry, H., 2016. Design a Resilient
Network Infrastructure Security Policy Framework. Indian Journal of Science and
Technology, 9(19), pp.1-8.
Chin, W.S., Kim, H.S., Heo, Y.J. and Jang, J.W., 2015. A context-based future network
infrastructure for IoT services. Procedia Computer Science, 56, pp.266-270.
Gal, E., London, M., Globerson, A., Ramaswamy, S., Reimann, M.W., Muller, E., Markram, H.
and Segev, I., 2017. Rich cell-type-specific network topology in neocortical
microcircuitry. Nature neuroscience, 20(7), p.1004.
Govindan, R., Minei, I., Kallahalla, M., Koley, B. and Vahdat, A., 2016, August. Evolve or die:
High-availability design principles drawn from googles network infrastructure. In Proceedings
of the 2016 ACM SIGCOMM Conference (pp. 58-72). ACM.
Han, B., Gopalakrishnan, V., Ji, L. and Lee, S., 2015. Network function virtualization:
Challenges and opportunities for innovations. IEEE Communications Magazine, 53(2), pp.90-97.
Kwasinski, A. and Kwasinski, A., 2015. Increasing sustainability and resiliency of cellular
network infrastructure by harvesting renewable energy. IEEE Communications Magazine, 53(4),
pp.110-116.
Margi, C.B., Alves, R.C. and Sepulveda, J., 2017. Sensing as a service: secure wireless sensor
network infrastructure sharing for the internet of things. Open Journal of Internet Of Things
(OJIOT), 3(1), pp.91-102.
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/fe791ec5-b8a1-4a20-abff-d1b457774bdc-page-15.webp)
14
NETWORK DESIGN AND TROUBLESHOOTING
Morales, F., Ruiz, M., Gifre, L., Contreras, L.M., López, V. and Velasco, L., 2017. Virtual
network topology adaptability based on data analytics for traffic prediction. IEEE/OSA Journal
of Optical Communications and Networking, 9(1), pp.A35-A45.
Nedić, A., Olshevsky, A. and Rabbat, M.G., 2018. Network topology and communication-
computation tradeoffs in decentralized optimization. Proceedings of the IEEE, 106(5), pp.953-
976.
Quevedo, J., Guimarães, C., Ferreira, R., Corujo, D. and Aguiar, R.L., 2017. Icn as network
infrastructure for multi-sensory devices: Local domain service discovery for icn-based iot
environments. Wireless Personal Communications, 95(1), pp.7-26.
Robson, A., 2018. Is pricing road transport significantly different to pricing other network
infrastructure?. ROAD PRICING AND PROVISION, p.89.
Salmond, D., 2019, March. Blind estimation of wireless network topology and throughput.
In 2019 53rd Annual Conference on Information Sciences and Systems (CISS) (pp. 1-6). IEEE.
Samdanis, K., Costa-Perez, X. and Sciancalepore, V., 2016. From network sharing to multi-
tenancy: The 5G network slice broker. IEEE Communications Magazine, 54(7), pp.32-39.
Sousa, B., Cordeiro, L., Simoes, P., Edmonds, A., Ruiz, S., Carella, G.A., Corici, M., Nikaein,
N., Gomes, A.S., Schiller, E. and Braun, T., 2016. Toward a fully cloudified mobile network
infrastructure. IEEE Transactions on Network and Service Management, 13(3), pp.547-563.
Stergiopoulos, G., Valvis, E., Mitrodimas, D., Lekkas, D. and Gritzalis, D., 2018. Analyzing
Congestion Interdependencies of Ports and Container Ship Routes in the Maritime Network
Infrastructure. IEEE Access, 6, pp.63823-63832.
Summers, T., Shames, I., Lygeros, J. and Dörfler, F., 2015, July. Topology design for optimal
network coherence. In 2015 European Control Conference (ECC) (pp. 575-580). IEEE.
NETWORK DESIGN AND TROUBLESHOOTING
Morales, F., Ruiz, M., Gifre, L., Contreras, L.M., López, V. and Velasco, L., 2017. Virtual
network topology adaptability based on data analytics for traffic prediction. IEEE/OSA Journal
of Optical Communications and Networking, 9(1), pp.A35-A45.
Nedić, A., Olshevsky, A. and Rabbat, M.G., 2018. Network topology and communication-
computation tradeoffs in decentralized optimization. Proceedings of the IEEE, 106(5), pp.953-
976.
Quevedo, J., Guimarães, C., Ferreira, R., Corujo, D. and Aguiar, R.L., 2017. Icn as network
infrastructure for multi-sensory devices: Local domain service discovery for icn-based iot
environments. Wireless Personal Communications, 95(1), pp.7-26.
Robson, A., 2018. Is pricing road transport significantly different to pricing other network
infrastructure?. ROAD PRICING AND PROVISION, p.89.
Salmond, D., 2019, March. Blind estimation of wireless network topology and throughput.
In 2019 53rd Annual Conference on Information Sciences and Systems (CISS) (pp. 1-6). IEEE.
Samdanis, K., Costa-Perez, X. and Sciancalepore, V., 2016. From network sharing to multi-
tenancy: The 5G network slice broker. IEEE Communications Magazine, 54(7), pp.32-39.
Sousa, B., Cordeiro, L., Simoes, P., Edmonds, A., Ruiz, S., Carella, G.A., Corici, M., Nikaein,
N., Gomes, A.S., Schiller, E. and Braun, T., 2016. Toward a fully cloudified mobile network
infrastructure. IEEE Transactions on Network and Service Management, 13(3), pp.547-563.
Stergiopoulos, G., Valvis, E., Mitrodimas, D., Lekkas, D. and Gritzalis, D., 2018. Analyzing
Congestion Interdependencies of Ports and Container Ship Routes in the Maritime Network
Infrastructure. IEEE Access, 6, pp.63823-63832.
Summers, T., Shames, I., Lygeros, J. and Dörfler, F., 2015, July. Topology design for optimal
network coherence. In 2015 European Control Conference (ECC) (pp. 575-580). IEEE.
![Document Page](https://desklib.com/media/document/docfile/pages/network-design-and-troubleshooting-gc2d/2024/09/27/a740bb2c-57b3-4e6b-8689-4b550e470ef2-page-16.webp)
15
NETWORK DESIGN AND TROUBLESHOOTING
Vangulick, D., Cornélusse, B., Vanherck, T., Devolder, O. and Lachi, S., 2017. E-CLOUD, the
open microgrid in existing network infrastructure. CIRED-Open Access Proceedings
Journal, 2017(1), pp.2703-2706.
Vriend, C., Wagenmakers, M., van den Heuvel, O.A. and van der Werf, Y.D., 2019. Resting-
state network topology and planning ability in healthy adults. bioRxiv, p.696856.
Xiaogang, Q. and Quan, Z., 2018. The topology control based on the primary user activity
prediction in cognitive radio network. Journal of Nanjing University (Natural Science), (4), p.21.
NETWORK DESIGN AND TROUBLESHOOTING
Vangulick, D., Cornélusse, B., Vanherck, T., Devolder, O. and Lachi, S., 2017. E-CLOUD, the
open microgrid in existing network infrastructure. CIRED-Open Access Proceedings
Journal, 2017(1), pp.2703-2706.
Vriend, C., Wagenmakers, M., van den Heuvel, O.A. and van der Werf, Y.D., 2019. Resting-
state network topology and planning ability in healthy adults. bioRxiv, p.696856.
Xiaogang, Q. and Quan, Z., 2018. The topology control based on the primary user activity
prediction in cognitive radio network. Journal of Nanjing University (Natural Science), (4), p.21.
1 out of 16
Related Documents
![[object Object]](/_next/image/?url=%2F_next%2Fstatic%2Fmedia%2Flogo.6d15ce61.png&w=640&q=75)
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.