Network Design
VerifiedAdded on 2023/01/17
|13
|1620
|30
AI Summary
This document provides an overview of network design, including business goals, technical goals, user communities, data stores, network applications, traffic flows, addressing and naming, logical network design, routing and switching protocols, and security mechanisms.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORK DESIGN
Network Design
Name of the Student:
Name of the University:
Author Note
Network Design
Name of the Student:
Name of the University:
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
NETWORK DESIGN
Table of Contents
List of Business Goals and constraints.......................................................................................2
List of technical goals and trade-off...........................................................................................2
Table of User Communities, Data Stores, Network Applications and Traffic Flows................2
Model for addressing and naming..............................................................................................3
Explanation and justification of the logical network design......................................................3
Logical network diagram(s) including addressing and naming.................................................3
Discussion of routing and switching protocols..........................................................................9
Discussion of the security mechanism.......................................................................................9
Bibliography.............................................................................................................................11
NETWORK DESIGN
Table of Contents
List of Business Goals and constraints.......................................................................................2
List of technical goals and trade-off...........................................................................................2
Table of User Communities, Data Stores, Network Applications and Traffic Flows................2
Model for addressing and naming..............................................................................................3
Explanation and justification of the logical network design......................................................3
Logical network diagram(s) including addressing and naming.................................................3
Discussion of routing and switching protocols..........................................................................9
Discussion of the security mechanism.......................................................................................9
Bibliography.............................................................................................................................11
2
NETWORK DESIGN
List of Business Goals and constraints
The business goals for the OZ Dispatch organizations have been described below:
The customers of the organization would be able to make online orders in the system.
The order collection are done in the collection and distribution centres of the
organization.
The dispatch centre of the organization would be dispatching the orders made by the
customers in the organization.
List of technical goals and trade-off
The technical goals for the organization are:
Providing efficient communication by mailing and data transfer facilities in the
network.
Providing excellent security and access control features within the network.
Table of User Communities, Data Stores, Network Applications
and Traffic Flows
The details of the user communities, data stores, network application and traffic flows
are described in the table provided below:
User Communities Data Stores Network
Application
Traffic Flows
Customers,
Managers,
Managing Director
Data centre servers DMZ web server High
Employees Email Server Mail Server Low
NETWORK DESIGN
List of Business Goals and constraints
The business goals for the OZ Dispatch organizations have been described below:
The customers of the organization would be able to make online orders in the system.
The order collection are done in the collection and distribution centres of the
organization.
The dispatch centre of the organization would be dispatching the orders made by the
customers in the organization.
List of technical goals and trade-off
The technical goals for the organization are:
Providing efficient communication by mailing and data transfer facilities in the
network.
Providing excellent security and access control features within the network.
Table of User Communities, Data Stores, Network Applications
and Traffic Flows
The details of the user communities, data stores, network application and traffic flows
are described in the table provided below:
User Communities Data Stores Network
Application
Traffic Flows
Customers,
Managers,
Managing Director
Data centre servers DMZ web server High
Employees Email Server Mail Server Low
3
NETWORK DESIGN
Employees DNS Server FTP Server Low
data analyst, sales &
marketing executive,
accountant
Routers DHCP server Medium
Model for addressing and naming
For the addressing of the system the sub netting concepts would be used and hence
the manually allocation of the addresses to the network end users would be done. The DHCP
server addressing is used which would be assigning automatic addresses to the network end
devices and the after the addresses are allocated dynamically the separation of the sub
networks would be done. Hence, each of the router would be allocated separately to the
DHCP server so that the dynamic addressing is done within a certain range only.
Explanation and justification of the logical network design
The network design for the OZ organization involves a topology, which uses a ring
topology and a hybrid network topology within network design. The network has also be
secured with a firewall. In addition to this all the centre of the organization in the network
would have wireless routers installed in the network which would be providing wireless
access to the users in the network. In addition to this the servers installed in the network
would be helping the network to allocate facility for their users in the network.
Logical network diagram(s) including addressing and naming
The networking diagram for the Parramatta office has been described below:
NETWORK DESIGN
Employees DNS Server FTP Server Low
data analyst, sales &
marketing executive,
accountant
Routers DHCP server Medium
Model for addressing and naming
For the addressing of the system the sub netting concepts would be used and hence
the manually allocation of the addresses to the network end users would be done. The DHCP
server addressing is used which would be assigning automatic addresses to the network end
devices and the after the addresses are allocated dynamically the separation of the sub
networks would be done. Hence, each of the router would be allocated separately to the
DHCP server so that the dynamic addressing is done within a certain range only.
Explanation and justification of the logical network design
The network design for the OZ organization involves a topology, which uses a ring
topology and a hybrid network topology within network design. The network has also be
secured with a firewall. In addition to this all the centre of the organization in the network
would have wireless routers installed in the network which would be providing wireless
access to the users in the network. In addition to this the servers installed in the network
would be helping the network to allocate facility for their users in the network.
Logical network diagram(s) including addressing and naming
The networking diagram for the Parramatta office has been described below:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4
NETWORK DESIGN
The network has been designed keeping in mind that all the major functioning in the
network would be performed in the Parramatta office and hence the allocation of the servers
have been included in the design. The network is located centrally and would be having a
higher level of access control in the network. In addition to this, the network design for the
CDC centres have been described below:
NETWORK DESIGN
The network has been designed keeping in mind that all the major functioning in the
network would be performed in the Parramatta office and hence the allocation of the servers
have been included in the design. The network is located centrally and would be having a
higher level of access control in the network. In addition to this, the network design for the
CDC centres have been described below:
5
NETWORK DESIGN
The network design includes the workstation for the staffs and the manager in each of
the CDC departments for the organization. It is to be noted that there is dispatch centre for the
organization and additionally 20 CDCs. It has been assumed that 30 machines are to be
allocated in the dispatch centre and 20 CDC would be having 20 machines each include one
for the manager. The addressing solution has been developed for the network of the
organization to allocated IP addresses to the machines of the network has been done using the
192.168.0.0/21 subnet-addressing scheme. The addressing solution for the organization is
provided below:
Subnet
Name
Neede
d Size
Allocate
d Size
Address
Mas
k
Dec Mask
Assignable
Range
Broadcast
Dispatch 30 30 192.168.0.0 /27 255.255.255.22 192.168.0.1 - 192.168.0.31
NETWORK DESIGN
The network design includes the workstation for the staffs and the manager in each of
the CDC departments for the organization. It is to be noted that there is dispatch centre for the
organization and additionally 20 CDCs. It has been assumed that 30 machines are to be
allocated in the dispatch centre and 20 CDC would be having 20 machines each include one
for the manager. The addressing solution has been developed for the network of the
organization to allocated IP addresses to the machines of the network has been done using the
192.168.0.0/21 subnet-addressing scheme. The addressing solution for the organization is
provided below:
Subnet
Name
Neede
d Size
Allocate
d Size
Address
Mas
k
Dec Mask
Assignable
Range
Broadcast
Dispatch 30 30 192.168.0.0 /27 255.255.255.22 192.168.0.1 - 192.168.0.31
6
NETWORK DESIGN
4 192.168.0.30
CDC1 20 30 192.168.0.32 /27
255.255.255.22
4
192.168.0.33
-
192.168.0.62
192.168.0.63
CDC10 20 30 192.168.0.64 /27
255.255.255.22
4
192.168.0.65
-
192.168.0.94
192.168.0.95
CDC11 20 30 192.168.0.96 /27
255.255.255.22
4
192.168.0.97
-
192.168.0.12
6
192.168.0.12
7
CDC12 20 30
192.168.0.12
8
/27
255.255.255.22
4
192.168.0.12
9 -
192.168.0.15
8
192.168.0.15
9
CDC13 20 30
192.168.0.16
0
/27
255.255.255.22
4
192.168.0.16
1 -
192.168.0.19
0
192.168.0.19
1
CDC14 20 30 192.168.0.19
2
/27 255.255.255.22
4
192.168.0.19
3 -
192.168.0.22
192.168.0.22
3
NETWORK DESIGN
4 192.168.0.30
CDC1 20 30 192.168.0.32 /27
255.255.255.22
4
192.168.0.33
-
192.168.0.62
192.168.0.63
CDC10 20 30 192.168.0.64 /27
255.255.255.22
4
192.168.0.65
-
192.168.0.94
192.168.0.95
CDC11 20 30 192.168.0.96 /27
255.255.255.22
4
192.168.0.97
-
192.168.0.12
6
192.168.0.12
7
CDC12 20 30
192.168.0.12
8
/27
255.255.255.22
4
192.168.0.12
9 -
192.168.0.15
8
192.168.0.15
9
CDC13 20 30
192.168.0.16
0
/27
255.255.255.22
4
192.168.0.16
1 -
192.168.0.19
0
192.168.0.19
1
CDC14 20 30 192.168.0.19
2
/27 255.255.255.22
4
192.168.0.19
3 -
192.168.0.22
192.168.0.22
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7
NETWORK DESIGN
2
CDC15 20 30
192.168.0.22
4
/27
255.255.255.22
4
192.168.0.22
5 -
192.168.0.25
4
192.168.0.25
5
CDC16 20 30 192.168.1.0 /27
255.255.255.22
4
192.168.1.1 -
192.168.1.30
192.168.1.31
CDC17 20 30 192.168.1.32 /27
255.255.255.22
4
192.168.1.33
-
192.168.1.62
192.168.1.63
CDC18 20 30 192.168.1.64 /27
255.255.255.22
4
192.168.1.65
-
192.168.1.94
192.168.1.95
CDC19 20 30 192.168.1.96 /27
255.255.255.22
4
192.168.1.97
-
192.168.1.12
6
192.168.1.12
7
CDC2 20 30
192.168.1.12
8
/27
255.255.255.22
4
192.168.1.12
9 -
192.168.1.15
8
192.168.1.15
9
CDC20 20 30 192.168.1.16 /27 255.255.255.22 192.168.1.16 192.168.1.19
NETWORK DESIGN
2
CDC15 20 30
192.168.0.22
4
/27
255.255.255.22
4
192.168.0.22
5 -
192.168.0.25
4
192.168.0.25
5
CDC16 20 30 192.168.1.0 /27
255.255.255.22
4
192.168.1.1 -
192.168.1.30
192.168.1.31
CDC17 20 30 192.168.1.32 /27
255.255.255.22
4
192.168.1.33
-
192.168.1.62
192.168.1.63
CDC18 20 30 192.168.1.64 /27
255.255.255.22
4
192.168.1.65
-
192.168.1.94
192.168.1.95
CDC19 20 30 192.168.1.96 /27
255.255.255.22
4
192.168.1.97
-
192.168.1.12
6
192.168.1.12
7
CDC2 20 30
192.168.1.12
8
/27
255.255.255.22
4
192.168.1.12
9 -
192.168.1.15
8
192.168.1.15
9
CDC20 20 30 192.168.1.16 /27 255.255.255.22 192.168.1.16 192.168.1.19
8
NETWORK DESIGN
0 4
1 -
192.168.1.19
0
1
CDC3 20 30
192.168.1.19
2
/27
255.255.255.22
4
192.168.1.19
3 -
192.168.1.22
2
192.168.1.22
3
CDC4 20 30
192.168.1.22
4
/27
255.255.255.22
4
192.168.1.22
5 -
192.168.1.25
4
192.168.1.25
5
CDC5 20 30 192.168.2.0 /27
255.255.255.22
4
192.168.2.1 -
192.168.2.30
192.168.2.31
CDC6 20 30 192.168.2.32 /27
255.255.255.22
4
192.168.2.33
-
192.168.2.62
192.168.2.63
CDC7 20 30 192.168.2.64 /27
255.255.255.22
4
192.168.2.65
-
192.168.2.94
192.168.2.95
CDC8 20 30 192.168.2.96 /27 255.255.255.22
4
192.168.2.97
-
192.168.2.12
192.168.2.12
7
NETWORK DESIGN
0 4
1 -
192.168.1.19
0
1
CDC3 20 30
192.168.1.19
2
/27
255.255.255.22
4
192.168.1.19
3 -
192.168.1.22
2
192.168.1.22
3
CDC4 20 30
192.168.1.22
4
/27
255.255.255.22
4
192.168.1.22
5 -
192.168.1.25
4
192.168.1.25
5
CDC5 20 30 192.168.2.0 /27
255.255.255.22
4
192.168.2.1 -
192.168.2.30
192.168.2.31
CDC6 20 30 192.168.2.32 /27
255.255.255.22
4
192.168.2.33
-
192.168.2.62
192.168.2.63
CDC7 20 30 192.168.2.64 /27
255.255.255.22
4
192.168.2.65
-
192.168.2.94
192.168.2.95
CDC8 20 30 192.168.2.96 /27 255.255.255.22
4
192.168.2.97
-
192.168.2.12
192.168.2.12
7
9
NETWORK DESIGN
6
CDC9 20 30
192.168.2.12
8
/27
255.255.255.22
4
192.168.2.12
9 -
192.168.2.15
8
192.168.2.15
9
Discussion of routing and switching protocols
The switching protocols are mainly used for maintaining automatic connection
control. The different types of switching protocols that are used by the network of OZ
dispatch organization are RSTP, PortFast, UplinkFast and dynamic trunk protocol. Routing
protocol helps in processing a packet successfully from one device to another device. This
packet transmission takes place with different networks. The main benefit that is offered with
the routing protocols is that it offers an easy configuration and using methods. The different
types of routing protocols that are used by the organization are Open shortest path first
(OSPF), border gateway protocol (BGP) and the routing information protocols (RIP).
Discussion of the security mechanism
Network security mechanism is being is developed based on limiting operations from
remote systems. Security mechanisms are referred to the technical tools and techniques that
are used for the purpose of implementing proper security services. The mechanism is used for
the purpose of operating the networks effectively without any problems. The security
mechanism is used for the purpose of providing better safety towards the network. The
security mechanisms that are used include authorization, accounting, and packet filters,
firewalls and data encryption. Security mechanism ensures that proper security is provided
NETWORK DESIGN
6
CDC9 20 30
192.168.2.12
8
/27
255.255.255.22
4
192.168.2.12
9 -
192.168.2.15
8
192.168.2.15
9
Discussion of routing and switching protocols
The switching protocols are mainly used for maintaining automatic connection
control. The different types of switching protocols that are used by the network of OZ
dispatch organization are RSTP, PortFast, UplinkFast and dynamic trunk protocol. Routing
protocol helps in processing a packet successfully from one device to another device. This
packet transmission takes place with different networks. The main benefit that is offered with
the routing protocols is that it offers an easy configuration and using methods. The different
types of routing protocols that are used by the organization are Open shortest path first
(OSPF), border gateway protocol (BGP) and the routing information protocols (RIP).
Discussion of the security mechanism
Network security mechanism is being is developed based on limiting operations from
remote systems. Security mechanisms are referred to the technical tools and techniques that
are used for the purpose of implementing proper security services. The mechanism is used for
the purpose of operating the networks effectively without any problems. The security
mechanism is used for the purpose of providing better safety towards the network. The
security mechanisms that are used include authorization, accounting, and packet filters,
firewalls and data encryption. Security mechanism ensures that proper security is provided
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10
NETWORK DESIGN
towards the network so that it can ensure proper sharing of the resources without impacting
the system. Security mechanism ensures that every data shared within the network are safe.
NETWORK DESIGN
towards the network so that it can ensure proper sharing of the resources without impacting
the system. Security mechanism ensures that every data shared within the network are safe.
11
NETWORK DESIGN
Bibliography
Alumur, S. A., Nickel, S., Saldanha-da-Gama, F., & Seçerdin, Y. (2016). Multi-period hub
network design problems with modular capacities. Annals of Operations Research,
246(1-2), 289-312.
Duan, S., Hu, X., Dong, Z., Wang, L., & Mazumder, P. (2015). Memristor-based cellular
nonlinear/neural network: design, analysis, and applications. IEEE transactions on
neural networks and learning systems, 26(6), 1202-1213.
Eskandarpour, M., Dejax, P., Miemczyk, J., & Péton, O. (2015). Sustainable supply chain
network design: an optimization-oriented review. Omega, 54, 11-32.
Green, A. L., Maypa, A. P., Almany, G. R., Rhodes, K. L., Weeks, R., Abesamis, R. A., ... &
White, A. T. (2015). Larval dispersal and movement patterns of coral reef fishes, and
implications for marine reserve network design. Biological Reviews, 90(4), 1215-
1247.
Rezapour, S., Farahani, R. Z., & Pourakbar, M. (2017). Resilient supply chain network
design under competition: A case study. European Journal of Operational Research,
259(3), 1017-1035.
Talaei, M., Moghaddam, B. F., Pishvaee, M. S., Bozorgi-Amiri, A., & Gholamnejad, S.
(2016). A robust fuzzy optimization model for carbon-efficient closed-loop supply
chain network design problem: a numerical illustration in electronics industry.
Journal of Cleaner Production, 113, 662-673.
Yu, B., Kong, L., Sun, Y., Yao, B., & Gao, Z. (2015). A bi-level programming for bus lane
network design. Transportation Research Part C: Emerging Technologies, 55, 310-
327.
NETWORK DESIGN
Bibliography
Alumur, S. A., Nickel, S., Saldanha-da-Gama, F., & Seçerdin, Y. (2016). Multi-period hub
network design problems with modular capacities. Annals of Operations Research,
246(1-2), 289-312.
Duan, S., Hu, X., Dong, Z., Wang, L., & Mazumder, P. (2015). Memristor-based cellular
nonlinear/neural network: design, analysis, and applications. IEEE transactions on
neural networks and learning systems, 26(6), 1202-1213.
Eskandarpour, M., Dejax, P., Miemczyk, J., & Péton, O. (2015). Sustainable supply chain
network design: an optimization-oriented review. Omega, 54, 11-32.
Green, A. L., Maypa, A. P., Almany, G. R., Rhodes, K. L., Weeks, R., Abesamis, R. A., ... &
White, A. T. (2015). Larval dispersal and movement patterns of coral reef fishes, and
implications for marine reserve network design. Biological Reviews, 90(4), 1215-
1247.
Rezapour, S., Farahani, R. Z., & Pourakbar, M. (2017). Resilient supply chain network
design under competition: A case study. European Journal of Operational Research,
259(3), 1017-1035.
Talaei, M., Moghaddam, B. F., Pishvaee, M. S., Bozorgi-Amiri, A., & Gholamnejad, S.
(2016). A robust fuzzy optimization model for carbon-efficient closed-loop supply
chain network design problem: a numerical illustration in electronics industry.
Journal of Cleaner Production, 113, 662-673.
Yu, B., Kong, L., Sun, Y., Yao, B., & Gao, Z. (2015). A bi-level programming for bus lane
network design. Transportation Research Part C: Emerging Technologies, 55, 310-
327.
12
NETWORK DESIGN
NETWORK DESIGN
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.