This document provides an overview of network design, including business goals, technical goals, user communities, data stores, network applications, traffic flows, addressing and naming, logical network design, routing and switching protocols, and security mechanisms.
Contribute Materials
Your contribution can guide someoneās learning journey. Share your
documents today.
Running head: NETWORK DESIGN Network Design Name of the Student: Name of the University: Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 NETWORK DESIGN Table of Contents List of Business Goals and constraints.......................................................................................2 List of technical goals and trade-off...........................................................................................2 Table of User Communities, Data Stores, Network Applications and Traffic Flows................2 Model for addressing and naming..............................................................................................3 Explanation and justification of the logical network design......................................................3 Logical network diagram(s) including addressing and naming.................................................3 Discussion of routing and switching protocols..........................................................................9 Discussion of the security mechanism.......................................................................................9 Bibliography.............................................................................................................................11
2 NETWORK DESIGN List of Business Goals and constraints The business goals for the OZ Dispatch organizations have been described below: ļ·The customers of the organization would be able to make online orders in the system. ļ·The order collection are done in the collection and distribution centres of the organization. ļ·The dispatch centre of the organization would be dispatching the orders made by the customers in the organization. List of technical goals and trade-off The technical goals for the organization are: ļ·Providing efficient communication by mailing and data transfer facilities in the network. ļ·Providing excellent security and access control features within the network. Table of User Communities, Data Stores, Network Applications and Traffic Flows The details of the user communities, data stores, network application and traffic flows are described in the table provided below: User CommunitiesData StoresNetwork Application Traffic Flows Customers, Managers, Managing Director Data centre serversDMZ web serverHigh EmployeesEmail ServerMail ServerLow
3 NETWORK DESIGN EmployeesDNS ServerFTP ServerLow data analyst, sales & marketing executive, accountant RoutersDHCP serverMedium Model for addressing and naming For the addressing of the system the sub netting concepts would be used and hence the manually allocation of the addresses to the network end users would be done. The DHCP server addressing is used which would be assigning automatic addresses to the network end devices and the after the addresses are allocated dynamically the separation of the sub networks would be done. Hence, each of the router would be allocated separately to the DHCP server so that the dynamic addressing is done within a certain range only. Explanation and justification of the logical network design The network design for the OZ organization involves a topology, which uses a ring topology and a hybrid network topology within network design. The network has also be secured with a firewall. In addition to this all the centre of the organization in the network would have wireless routers installed in the network which would be providing wireless access to the users in the network. In addition to this the servers installed in the network would be helping the network to allocate facility for their users in the network. Logical network diagram(s) including addressing and naming The networking diagram for the Parramatta office has been described below:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 NETWORK DESIGN The network has been designed keeping in mind that all the major functioning in the network would be performed in the Parramatta office and hence the allocation of the servers have been included in the design. The network is located centrally and would be having a higher level of access control in the network. In addition to this, the network design for the CDC centres have been described below:
5 NETWORK DESIGN The network design includes the workstation for the staffs and the manager in each of the CDC departments for the organization. It is to be noted that there is dispatch centre for the organization and additionally 20 CDCs. It has been assumed that 30 machines are to be allocated in the dispatch centre and 20 CDC would be having 20 machines each include one for the manager. The addressing solution has been developed for the network of the organization to allocated IP addresses to the machines of the network has been done using the 192.168.0.0/21 subnet-addressing scheme. The addressing solution for the organization is provided below: Subnet Name Neede d Size Allocate d Size Address Mas k Dec Mask Assignable Range Broadcast Dispatch3030192.168.0.0/27255.255.255.22192.168.0.1 -192.168.0.31
9 NETWORK DESIGN 6 CDC92030 192.168.2.12 8 /27 255.255.255.22 4 192.168.2.12 9- 192.168.2.15 8 192.168.2.15 9 Discussion of routing and switching protocols The switching protocolsare mainly used for maintaining automatic connection control. The different types of switching protocols that are used by the network of OZ dispatch organization are RSTP, PortFast, UplinkFast and dynamic trunk protocol. Routing protocol helps in processing a packet successfully from one device to another device. This packet transmission takes place with different networks. The main benefit that is offered with the routing protocols is that it offers an easy configuration and using methods. The different types of routing protocols that are used by the organization are Open shortest path first (OSPF), border gateway protocol (BGP) and the routing information protocols (RIP). Discussion of the security mechanism Network security mechanism is being is developed based on limiting operations from remote systems. Security mechanisms are referred to the technical tools and techniques that are used for the purpose of implementing proper security services. The mechanism is used for the purpose of operating the networks effectively without any problems. The security mechanism is used for the purpose of providing better safety towards the network. The security mechanisms that are used include authorization, accounting, and packet filters, firewalls and data encryption. Security mechanism ensures that proper security is provided
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 NETWORK DESIGN towards the network so that it can ensure proper sharing of the resources without impacting the system. Security mechanism ensures that every data shared within the network are safe.