Network Design for ABC Enterprise Branch in Sydney
Verified
Added on  2023/02/01
|15
|3526
|60
AI Summary
This report proposes a network design for the branch of ABC enterprise located in Sydney. It includes logical diagrams, IP addressing plans, and geographical scope.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NETWORKING
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents Report..............................................................................................................................................2 Introduction......................................................................................................................................2 Geographical Scope.........................................................................................................................3 Assumptions.................................................................................................................................4 Existing Network.........................................................................................................................5 Logical Design.................................................................................................................................5 Requirements...............................................................................................................................6 Network design scenario..............................................................................................................6 Configurations..............................................................................................................................7 Three-layers hierarchal model.....................................................................................................8 1.Core Layer.........................................................................................................................8 2.Distribution Layer.............................................................................................................8 3.Access Layer.....................................................................................................................8 The IP address and subnet mask......................................................................................................8 Virtual Local Area Network (VLAN).............................................................................................9 Cloud Providers.............................................................................................................................10 1.Google cloud.......................................................................................................................10 2.Microsoft Azure..................................................................................................................11 Service Virtualization technique....................................................................................................11 Dynamic scaling using Cloud computing......................................................................................12 Summary........................................................................................................................................14 Referencess....................................................................................................................................15 1
Introduction In every organization, there is a desire for efficient and effective communication, data transfer and better resources accessibility. All these desires are made to be true when the network within the organization is well designed according to the established rules. ABC an enterprise wants to open a another branch in a newly acquired building at Sydney.This report proposes a network design for the branch that is located in an 8 floor building. Each floor containing 30 rooms each with five workstations. Design of the network should be scalable and efficient in order to fulfil the requirements of the organization. The logical diagrams, IP addressing plans and geographical scopes of the network are well explained in this report. Geographical Scope The proposed network is designed to serve the new branch of ABC enterprise organization at Sydeney.The building has 8 floors with 30 rooms every on every floor where there will be 5 network points for connecting staff PCs.These floors have different requirements. Every floor will have the same number of computers and access points for wireless connection apart from the 2ndfloor where the server room with a file, print, DHCP and DNS servers together with a Firewall system providing the edge for the internet and branch offices. The network designed is expected to achieve some objectives (Montreuil, B. and Poulin *, 2015): ď‚·To provide secure services within the organization and this is done so by isolating it physically and functionally from being accessed by people who are not employees hence minimizing cases of unauthorized access. ď‚·To provide a room for future expansion when there is need to scale up the network either by adding more devices, cables, network peripherals. ď‚·To process information effectively that is the user is able to store, retrieve, or process data regarding the ABC organization. 2
Figure 1.2 Headquarter to old branch and new branch connection ď‚·A point to point leased connection is implemented from the headquarter to the old branch and new branch which is fiber optics that is very secure. ď‚·Frame relay Connection is used to connect Old Branch and new Branch while the mobile workers use VPN to access the headquarter network. Assumptions Some assumptions are made on the headquarter and branches connection as follows: 1.Therewillbesignificantdatatransferbetweenthebranchofficesandthe headquarter all the time, 2.Headquarter is located very close to the branches; thus having leased connection will cost the organization less. 3.Less data transfer between the branches hence frames relay connection is used. 4.Due to the way, headquarter and the branches are closely situated, 2 interfaces will beimplementedinthegatewayrouterinconnectionofbranchesandthe headquarter. 3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Existing Network By the assumptions made, there is an existing network that used in the headquarter and the old branch using leased line. The headquarter uses a single interface on its gateway router to connect to the old branch gateway interface. The proposed network design of the new branch will connect to the existing network with the help of point to point leased lines to the headquarter network and to the old branch using frame relay. A new interface in the headquarter network gateway router is configured to connect to the new branch network. Also, in the old branch network gateway router another interface is configured to connect with the new branch network. Logical Design The following logical Network design outlines how the network of the new branch can be laid. In this design, it majorly concentrates on how a single room in every floor should be whereby each Floor has a significant switch and sub switch for every room. Figure 1.1 New branch logical network design .(Ramaswami and Sivarajan, 2010) In the figure above: Server0 – File server Server1 – Print server Server2 – DHCP server Server3 – DNS server 4
Multilayer switch1 – core switch 2 Multilayer switch0 – core switch 1 Requirements 1.Servers (DHCP server, file server, DNS server, print server, web server,) 2.Firewall 3.Routers 4.Access points 5.2 multilayer switches 6.Switches 7.Connecting cables 8.Internet service provider 9.Computers Network design scenario •The new branch consists of 8 floors which have different requirements. •Everywhere in the building is supposed to have wireless internet connection through the help of the installed access points in different rooms (Carolan, Oracle America, 2010). •The server room will be housed on the 2ndfloor and IT Offices. This floor has a gateway router that will assist in communication with the head offices remotely. •A firewall is still installed to ensure security in the internal and to provide an edge for the offices in the branch and internet. •The first floor is for all customers and customer care services. •The chief technical officers, chief executive officer's offices and significant seniors will be located on the Third floor. •The fourth floor will house all finance offices, fifth floor - Human resource offices, Sixth floor - Marketing, seventh floor - workplace, and Eighth floor – Research and extension offices. 5
•Each room has a switch which helps in network extension and expansion. Configurations Structured cabling is always an efficient approach while designing a network. There are subsystems in the network which are: the internet service provider network ends at the entrance of the facilityandthen connect to the devices of the customer, server or the equipment room where network parts that serve the users in the building ,interconnection horizontal cabling for connecting network components in the same floor, backbone cabling (connecting different floors inthebuilding),telecommunicationclosewherebackboneandhorizontalcablingare interconnected and End usersequipment area (Enns, Bjorklund, Schoenwaelder and Bierman, 2011). So, in this design, structured cabling is implemented. In every room, there are several ends users’ devices (PCs) that uses RJ45 ethernet cables to connect to a wall socket for internet access, and also access points (AP) are installed for wireless connection. The core switches in the second floor have backbone links that connect to the main switch in every floor where 2 core switches are used to provide connection redundancy whenever a failure occurs and to eliminate single point of failure. The web server should be situated in a DMZ (demilitarized zone) because of internal and external access to prevent malicious people from getting into the branch network. It is assigned a static IP address to avoid downtime when IP addresses are being renewed. Web server is connected to the firewall which is used for traffic filtering that is getting into the internal network using ACL (Access Control List) that is already configured inside the firewall. Routing traffic within the building (that is among the VLANs) and outside the branch is done by core router whereby two core routers are used for the same reason of having two core switches, providing redundancy and single point of failure avoidance (Yoon, Yang and Lee, 2019). Every core router is connected to each core switch cables of very high speed. A gateway router is connected to the firewall. It is implemented to route or forwards traffic to the other branch, and the headquarter using leased lines. 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
In the second floor, there are different servers which are connected to a single switch that is connected to both core switches.DNS server is used in translating a domain name to specific IP addresses, and the DHCP server is used in assigning IP addresses dynamically in the network (Woundy and Kinnear, 2016). Internet Service Provider is part of the entrance facility subsystem where it is demonstrated by the connection between the firewall and the internet cloud. ISP provides internet connection to the network in ABC organization. Three-layers hierarchal model Every network infrastructure has 3 layers: 1.Core Layer It ensures that there is a high-speed connection in the distribution layer, access layer, data center(serverroom)andedgedistribution.Inthislayer,theimplementationof redundancy is highly considered to ensure there are availability and reliability (Fu, Bi, Gao, Chen, Z., Wu, and Hao, 2014). 2.Distribution Layer It is well configured to ensure access between the core layer and the workstations or work groups. It ensures there is control on services access and also switches and links redundancy are implemented (Ausiello, Apicella and Davidson, 2012). 3.Access Layer It is situated within the building. Different end users and workgroups fall under this layer which provides a link to the distribution layer. All the devices that allow users who are authorized, access the network (Pfaff, Pettit,Amidon, Casado, Koponen and Shenker, 2009). 7
172.20.5.126 Table 1.1 IP address and subnet mask Virtual Local Area Network (VLAN) In this network, 8 VLANs are created where every VLAN is configured for each floor, and every VLAN is given an IP address subnet. This helps to curb the uncontrolled broadcasting of traffic.VLANsarealsoknownforprovidinganetworksecuritylayer(Homchaudhuri, Arunacahalam, Narayanaswamy, Vavilala and Gupta, 2010). VLANs are maintained by VLAN Trunking protocol by either adding, renaming, deleting of VLANs with no manual intervention from central point hence reducing network administration overhead. The DHCP server assigns VLAN addresses to the hosts (Baykal, Butler, Conner and Missett, Catix, 2014). Cloud Providers Most of the organization are preferring cloud platform in their activities like web hosting and email services. 1.Google cloud The following are some of the services that are provided by Google Cloud that fits organization requirements (Sultan, 2010): i.Google Cloud Security Scanner is a web application security scanner which helps in checking vulnerabilities in websites hosted through Google cloud. ii.Phishing protection through mails Assist in detecting attacks through the mail(phishing). iii.VPN services VPN will allow secure connection of the mobile worker to the organization network and secure sending of emails between headquarter and branches. 2.Microsoft Azure 9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
i.Azureprovidesemailservicesthroughacloud-basedemailservicecalled SendGrid which ensures there is reliable delivery of emails, real-time analytics and scalability (Wilder, 2012). ii.It also provides a platform as a service environment where the organization is able to monitor and manage their website. iii.It also offers storage services which may also act as backup storage for the organization. Service Virtualization technique Enablesimulationofservicesinthecloudwhichareveryexpensive.Complex applicationsmay rely highly on many services which organization cannot host or own. So, it helps the organization to easily and quickly create an environment for production hence ensuring proper functioning of the applications for the end devices or users (Kertesz, Kecskemeti, and Brandic, 2009,). Service Virtualization simulates components behaviors hard to access during testing. These components can be APIs, networks, devices, storage, and many more. There are reasons why such components or resources are unavailable or hard to access: ď‚·They may be under development, ď‚·On maintenance, ď‚·Hard to set up ď‚·Very expensive ď‚·Requires expert supervision Through service virtualization, developers are able to test their software at any stage of software development cycle where in this case, the organization is able to utilize virtualization in different activities e.g. the organization can deploy their website and keep on updating whenever there is a change quickly at any point while testing how it looks, the organization may also be in need of extra storage services, and they can purchase a storage at the moment (Kertesz, Kecskemeti and Brandic, 2011,). 10
Dynamic scaling using Cloud computing Scalability in cloud computing is essential in the ABC organization because it measures application ability and capacity to expand. Generally, applications can be scaled up by adding more resources (storage, processors, network bandwidth) whenever there is need. So, the applications which are scalable can perform their operations typically as they continue to grow while more resources are still added to cope with the customers' demands at any time (Buyya, Ranjan. and Calheiros 2010). Figure 1.3 Demonstration of dynamic scaling Applications in the cloud Whenever there is a web request, the load balancer takes the request and routes it to the web servers that are hosting such web application (Malhotra, Agarwal and Jaiswal, 2014). The servers are installed in the virtual machines. These virtual machines are started by the provisioning subsystem. A dynamic scaling algorithm is used to control virtual machine provisioning and de- provisioning as per the scaling indicator (number of sessions which are active in a web application) threshold of the web application (Chieu, Mohindra,, Karve. and Segal, 2009). 11
Service Monitor sub-system implements scaling algorithm, which is in charge of controlling and triggering the scaling of provisioning sub-system based in scaling indicator statistics. (Vaquero, Rodero-Merino, and Buyya., 2011). The scaling pointer that we select here is the quantity of dynamic sessions or login sessions in each web application. Summary The proposed network ensures they are implemented: security in the Internet where firewall is installed, availability-this is ensured by the level of redundancy within the network, for instance, there are two core switches and core routers that are installed, also wireless connection is ensured in the whole building through installation of access points in every floor thus any employee who wants to use his smartphone or laptop and there isn't wall socket for Ethernet he or she can use wireless connection. In the network architecture, there is 3 hierarchical models' network for every efficient network: core layer, distribution layer and access layer. They have to rely on each other. VLANs provide a mother layer of network security where in our case every floor is given its VLAN. 12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Referencess Ausiello, P., Apicella, A. and Davidson, C.L., 2012. Effect of adhesive layer properties on stress distribution in composite restorations—a 3D finite element analysis.Dental Materials,18(4), pp.295-303. Baykal, B., Butler, D.M., Conner, M.W. and Missett, S.N., Catix, Inc., 2014.Isolation VLAN for layer two access networks. U.S. Patent 8,875,233. Buyya, R., Ranjan, R. and Calheiros, R.N., 2010, May. Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services. InInternational Conference on Algorithms and Architectures for Parallel Processing(pp. 13-31). Springer, Berlin, Heidelberg. Carolan, J.T., Oracle America Inc, 2010.Logical service domains for enabling network mobility. U.S. Patent 7,751,409. Chieu, T.C., Mohindra, A., Karve, A.A. and Segal, A., 2009, October. Dynamic scaling of web applications in a virtualized cloud computing environment. In2009 IEEE International Conference on e-Business Engineering(pp. 281-286). IEEE. Enns, R., Bjorklund, M., Schoenwaelder, J. and Bierman, A., 2011.Network configuration protocol (NETCONF)(No. RFC 6241). Fu, Y., Bi, J., Gao, K., Chen, Z., Wu, J. and Hao, B., 2014, October. Orion: A hybrid hierarchical control plane of software-defined networking for large-scale networks. In2014 IEEE 22nd International Conference on Network Protocols(pp. 569-576). IEEE. Homchaudhuri, S., Arunacahalam, S., Narayanaswamy, S., Vavilala, K.K. and Gupta, A., Cisco Technology Inc, 2010.Platform independent implementation of private VLANS. U.S. Patent 7,808,992. Kertesz, A., Kecskemeti, G. and Brandic, I., 2009, June. An SLA-based resource virtualization approach for on-demand service provision. InProceedings of the 3rd international workshop on Virtualization technologies in distributed computing(pp. 27-34). ACM. Kertesz, A., Kecskemeti, G. and Brandic, I., 2011, February. Autonomic sla-aware service virtualization for distributed systems. In2011 19th international Euromicro conference on parallel, distributed and network-based processing(pp. 503-510). IEEE. Malhotra, L.A.K.S.H.A.Y., Agarwal, D. and Jaiswal, A., 2014. Virtualization in cloud computing.J Inform Tech Softw Eng,4(2), p.136. Montreuil, B. and Poulin *, M. (2015). Demand and supply network design scope for personalized manufacturing.Production Planning & Control, 16(5), pp.454-469. Pfaff, B., Pettit, J., Amidon, K., Casado, M., Koponen, T. and Shenker, S., 2009, October. Extending networking into the virtualization layer. InHotnets. 13
Ramaswami, R. and Sivarajan, K.N., 2010. Design of logical topologies for wavelength-routed optical networks.IEEE Journal on Selected areas in communications,14(5), pp.840-851. Sultan, N., 2010. Cloud computing for education: A new dawn?.International Journal of Information Management,30(2), pp.109-116. Vaquero, L.M., Rodero-Merino, L. and Buyya, R., 2011. Dynamically scaling applications in the cloud.ACM SIGCOMM Computer Communication Review,41(1), pp.45-52. Wilder, B., 2012.Cloud architecture patterns: using microsoft azure. " O'Reilly Media, Inc.". Woundy, R. and Kinnear, K., 2016.Dynamic host configuration protocol (DHCP) leasequery(No. RFC 4388). Yoon, H.S., Yang, S.H. and Lee, J.H., Electronics and Telecommunications Research Institute, 2009.System and method for VLAN configuration of E-PON, and recording medium with stored program thereof. U.S. Patent 7,492,768. 14