Network Design for Cosmos Online Newspapers
VerifiedAdded on 2023/06/12
|19
|1171
|181
AI Summary
This presentation outlines the network design for Cosmos Online Newspapers, including logical and physical security measures, business and technical goals, and tradeoffs. It also includes tables for user community, data stores, traffic flow, and network application traffic characteristics.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT20264 NETWORK
DESIGN
Name of the Student
Name of the University
DESIGN
Name of the Student
Name of the University
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENT
Introduction
Aims and Objectives
Business goals
Technical goals
Constraints
Topology
Tradeoffs
User Community Table
Data Store Table
Traffic Flow table for every node
Network application traffic
characteristics table
Logical network design
Physical Security
Physical Security (Contd.)
Conclusion
Bibliography
Thank You
Introduction
Aims and Objectives
Business goals
Technical goals
Constraints
Topology
Tradeoffs
User Community Table
Data Store Table
Traffic Flow table for every node
Network application traffic
characteristics table
Logical network design
Physical Security
Physical Security (Contd.)
Conclusion
Bibliography
Thank You
INTRODUCTION
The following presentation is prepared for Cosmos
Online newspapers for demonstration of the network
solution prepared for the organization. The network is
prepared for establishment of remote connection
between the freelancing news reporters and securely
upload files and information in the data centre of the
organization.
The following presentation is prepared for Cosmos
Online newspapers for demonstration of the network
solution prepared for the organization. The network is
prepared for establishment of remote connection
between the freelancing news reporters and securely
upload files and information in the data centre of the
organization.
AIMS AND OBJECTIVES
The following are the aims and objectives followed for the
development of the network solution
To allow the freelancing news reporters to access the file.
Web and the web servers from remote locations
To analyze the data flow in the current network for
monitoring the network activity
To connect the network device following the IP addressing
and cabling plan.
The following are the aims and objectives followed for the
development of the network solution
To allow the freelancing news reporters to access the file.
Web and the web servers from remote locations
To analyze the data flow in the current network for
monitoring the network activity
To connect the network device following the IP addressing
and cabling plan.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
BUSINESS GOALS
The followings are the list of business goals identified for the
development of the network.
To utilize the resources efficiently for the configuration of the
network and reduce the errors.
To configure the database of the servers and use higher
bandwidth for enabling real time updating of the database
and reducing the waiting time of the users.
The followings are the list of business goals identified for the
development of the network.
To utilize the resources efficiently for the configuration of the
network and reduce the errors.
To configure the database of the servers and use higher
bandwidth for enabling real time updating of the database
and reducing the waiting time of the users.
TECHNICAL GOALS
The following are the identified technical goals used for the
configuration of the network solution
To analyze the business rules for configuring the routers and the
switches with the appropriate networking protocols to meet the
requirement.
To develop a user interface for the users for connecting with the
information system and use authentication for securing the
resources of the network.
The following are the identified technical goals used for the
configuration of the network solution
To analyze the business rules for configuring the routers and the
switches with the appropriate networking protocols to meet the
requirement.
To develop a user interface for the users for connecting with the
information system and use authentication for securing the
resources of the network.
CONSTRAINTS
The following are the constraints identified for the development
of the network solution:
Identification of the requirement of the users using the network
and resources residing the data center network
The technical skills of the network developer for configuring the
routers and the other network devices according to the
business rules.
The following are the constraints identified for the development
of the network solution:
Identification of the requirement of the users using the network
and resources residing the data center network
The technical skills of the network developer for configuring the
routers and the other network devices according to the
business rules.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TOPOLOGY
Mesh topology is followed for the development of the network for
increasing the redundancy of the network and creation of
duplicate link such that if one of the link fails then the user can
reach the network devices.
Mesh topology is followed for the development of the network for
increasing the redundancy of the network and creation of
duplicate link such that if one of the link fails then the user can
reach the network devices.
TRADEOFFS
The following are thee identified tradeoffs that are used for the achievement
of the goals and objectives of the organization and are given below:
To create a virtual server for balancing the loads and utilize the resources
of the physical servers
To configure the router with MPL for enabling transferring of VOIP data
packets in the network and reduce the cost of the network.
The following are thee identified tradeoffs that are used for the achievement
of the goals and objectives of the organization and are given below:
To create a virtual server for balancing the loads and utilize the resources
of the physical servers
To configure the router with MPL for enabling transferring of VOIP data
packets in the network and reduce the cost of the network.
USER COMMUNITY TABLE
User community
name
Size of community
(Number of users)
Location(s) of the
community
Applications used
by the community
Online Users 1500 AU Android Service
Admin 3 AU EMail
Regular Users 1000 Au Web
Social News
Subscriber
500 Au Web and Android
Service
Sports News
Subscriber
500 Au Web and Android
Service
Entertainment News
Subscribers
500 AU Web and Android
Service
User community
name
Size of community
(Number of users)
Location(s) of the
community
Applications used
by the community
Online Users 1500 AU Android Service
Admin 3 AU EMail
Regular Users 1000 Au Web
Social News
Subscriber
500 Au Web and Android
Service
Sports News
Subscriber
500 Au Web and Android
Service
Entertainment News
Subscribers
500 AU Web and Android
Service
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
DATA STORES TABLE
Data Store Location Application Used by user
community
Emails Darwin SMTP 350
Simple Files Darwin Storage 250
Requisition Darwin Storage 350
Media Darwin Media streaming 350
Invoices Darwin Cluster 150
Data Store Location Application Used by user
community
Emails Darwin SMTP 350
Simple Files Darwin Storage 250
Requisition Darwin Storage 350
Media Darwin Media streaming 350
Invoices Darwin Cluster 150
TRAFFIC FLOW TABLE FOR
EVERY NODE
Parameters Values
No. of traffic sources 3
Type of Traffic CBR
Mobility Pattern Random
Size of the packet 512 bytes
Time of Simulation 30 Seconds
Size of the topology 1500m * 1500m
Number of hosts 10, 15, 25, 50, 75
Routing protocol EIGRP
Data rate 1 packet per second
EVERY NODE
Parameters Values
No. of traffic sources 3
Type of Traffic CBR
Mobility Pattern Random
Size of the packet 512 bytes
Time of Simulation 30 Seconds
Size of the topology 1500m * 1500m
Number of hosts 10, 15, 25, 50, 75
Routing protocol EIGRP
Data rate 1 packet per second
NETWORK APPLICATION TRAFFIC
CHARACTERISTICS TABLE
CHARACTERISTICS TABLE
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
LOGICAL NETWORK DESIGN
PHYSICAL SECURITY
Components Type Security Control
Cisco Catalyst Switch Logical, Preventive VOIP and Data VLAN segregation
Logical, Preventive Port Security
Logical, Preventive Dynamic ARP inspection
Logical, Preventive DHCP Snooping
Logical, Preventive VLAN pruning
Logical, Preventive AAA radius server implementation for management of the access
Logical, Preventive NAC (802.1x)
Logical, Preventive SSH, HTTPS for management access
Logical, Preventive SNMP Traps and Syslog
Logical, Preventive Secure NTP
Components Type Security Control
Cisco Catalyst Switch Logical, Preventive VOIP and Data VLAN segregation
Logical, Preventive Port Security
Logical, Preventive Dynamic ARP inspection
Logical, Preventive DHCP Snooping
Logical, Preventive VLAN pruning
Logical, Preventive AAA radius server implementation for management of the access
Logical, Preventive NAC (802.1x)
Logical, Preventive SSH, HTTPS for management access
Logical, Preventive SNMP Traps and Syslog
Logical, Preventive Secure NTP
PHYSICAL SECURITY
(CONTD.)Components Type Security Control
Cisco IOS router Logical, Preventive SSH, HTTPS for management access
Logical, Preventive Routing protocol authentication
Logical, Preventive Disabling unnecessary services
Logical, Preventive Secure NTP
Logical, Preventive Encrypted password
Logical, Preventive/ Corrective Layer 3 access control list
Logical, Preventive Secure NTP
Logical, Detective Syslog, SNMP Traps
Cisco wireless LAN controller Logical, Preventive SSID isolation
Logical, Preventive NAC (802.1x)
Logical, Preventive Wireless Encryption
Logical, Detective SNMP Traps, Syslog
(CONTD.)Components Type Security Control
Cisco IOS router Logical, Preventive SSH, HTTPS for management access
Logical, Preventive Routing protocol authentication
Logical, Preventive Disabling unnecessary services
Logical, Preventive Secure NTP
Logical, Preventive Encrypted password
Logical, Preventive/ Corrective Layer 3 access control list
Logical, Preventive Secure NTP
Logical, Detective Syslog, SNMP Traps
Cisco wireless LAN controller Logical, Preventive SSID isolation
Logical, Preventive NAC (802.1x)
Logical, Preventive Wireless Encryption
Logical, Detective SNMP Traps, Syslog
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CONCLUSION
From the presentation it can be concluded that with for the development of
the network solution research is made on the different networking
technologies and the best topology is selected by following the business
rules of the organization. For the development of the network design the
main focus is given on the security and the availability of the resources of
the network. Different precautions are applied for securing the network
from external agents and secure the organizational data.
From the presentation it can be concluded that with for the development of
the network solution research is made on the different networking
technologies and the best topology is selected by following the business
rules of the organization. For the development of the network design the
main focus is given on the security and the availability of the resources of
the network. Different precautions are applied for securing the network
from external agents and secure the organizational data.
BIBLIOGRAPHY
Ceselli, A., Premoli, M. and Secci, S., 2015, May. Cloudlet network design optimization. In IFIP
Networking Conference (IFIP Networking), 2015 (pp. 1-9). IEEE.
Elshqeirat, B., Soh, S., Rai, S. and Lazarescu, M., 2015. Topology design with minimal cost subject to
network reliability constraint. IEEE Transactions on Reliability, 64(1), pp.118-131.
Fleischmann, B. and Koberstein, A., 2015. Strategic network design. In Supply chain management and
advanced planning(pp. 107-123). Springer, Berlin, Heidelberg.
Foust, J., 2017. Online journalism: principles and practices of news for the Web. Taylor & Francis.
Ghane-Ezabadi, M. and Vergara, H.A., 2016. Decomposition approach for integrated intermodal logistics
network design. Transportation Research Part E: Logistics and Transportation Review, 89, pp.53-69.
Hewson, C. and Stewart, D.W., 2016. Internet research methods. John Wiley & Sons, Ltd.
Korte, B. and Vygen, J., 2018. Network design problems. In Combinatorial Optimization (pp. 543-590).
Springer, Berlin, Heidelberg.
Morales, F., Ruiz, M. and Velasco, L., 2017. Virtual Network Topology Design and
Reconfiguration. Provisioning, Recovery, and In‐operation Planning in Elastic Optical Networks, pp.255-
278.
Ceselli, A., Premoli, M. and Secci, S., 2015, May. Cloudlet network design optimization. In IFIP
Networking Conference (IFIP Networking), 2015 (pp. 1-9). IEEE.
Elshqeirat, B., Soh, S., Rai, S. and Lazarescu, M., 2015. Topology design with minimal cost subject to
network reliability constraint. IEEE Transactions on Reliability, 64(1), pp.118-131.
Fleischmann, B. and Koberstein, A., 2015. Strategic network design. In Supply chain management and
advanced planning(pp. 107-123). Springer, Berlin, Heidelberg.
Foust, J., 2017. Online journalism: principles and practices of news for the Web. Taylor & Francis.
Ghane-Ezabadi, M. and Vergara, H.A., 2016. Decomposition approach for integrated intermodal logistics
network design. Transportation Research Part E: Logistics and Transportation Review, 89, pp.53-69.
Hewson, C. and Stewart, D.W., 2016. Internet research methods. John Wiley & Sons, Ltd.
Korte, B. and Vygen, J., 2018. Network design problems. In Combinatorial Optimization (pp. 543-590).
Springer, Berlin, Heidelberg.
Morales, F., Ruiz, M. and Velasco, L., 2017. Virtual Network Topology Design and
Reconfiguration. Provisioning, Recovery, and In‐operation Planning in Elastic Optical Networks, pp.255-
278.
1 out of 19
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.