OZ Dispatch Network Study
VerifiedAdded on 2023/03/17
|14
|2719
|35
AI Summary
This report analyzes the business and technical goals of OZ Dispatch, the communities of users, the logical network design, IP addressing and subnet calculation, and the routing and switching protocols used in the network.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: OZ DISPATCH NETWORK STUDY
OZ Dispatch Network Study
Name of the Student
Name of the University
Author Note
OZ Dispatch Network Study
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1OZ DISPATCH NETWORK STUDY
Summary
The purpose of this report is to identify and list the various business and technical goals of
the company OZ Dispatch based on which the trade-offs are provided. The report also
analyses the communities of users and the way they access the network or utilize the
resources while also touching briefly on each type of user. Then the report enters the network
design section where the logical network design of OZ Dispatch is explained in detail with
the help of a diagram. In doing so, the report proceeds further to provide the subnetting
details used to specify the networks addresses for the respective parts. Then the report briefly
describes the method of IP allocation before going on to explain about routing and switching
activities. Thereafter the report talks about the security mechanisms put in place within the
network using the firewall router and ends with observations in concluding notes.
Summary
The purpose of this report is to identify and list the various business and technical goals of
the company OZ Dispatch based on which the trade-offs are provided. The report also
analyses the communities of users and the way they access the network or utilize the
resources while also touching briefly on each type of user. Then the report enters the network
design section where the logical network design of OZ Dispatch is explained in detail with
the help of a diagram. In doing so, the report proceeds further to provide the subnetting
details used to specify the networks addresses for the respective parts. Then the report briefly
describes the method of IP allocation before going on to explain about routing and switching
activities. Thereafter the report talks about the security mechanisms put in place within the
network using the firewall router and ends with observations in concluding notes.
2OZ DISPATCH NETWORK STUDY
Table of Contents
Introduction................................................................................................................................3
OZ Dispatch Network Analysis.................................................................................................3
Scope......................................................................................................................................3
Business oriented goals......................................................................................................3
Technical setup goals.........................................................................................................3
Constraints from business goals.........................................................................................4
Trade-offs from technical goals.........................................................................................4
Community of Users..........................................................................................................5
Logical Network Design........................................................................................................6
IP Addressing and Subnet Calculation...............................................................................7
IP Addressing - CIDR............................................................................................................7
Routing and Switching Protocols...........................................................................................7
Security Mechanism...............................................................................................................8
Conclusion..................................................................................................................................8
References..................................................................................................................................9
Table of Contents
Introduction................................................................................................................................3
OZ Dispatch Network Analysis.................................................................................................3
Scope......................................................................................................................................3
Business oriented goals......................................................................................................3
Technical setup goals.........................................................................................................3
Constraints from business goals.........................................................................................4
Trade-offs from technical goals.........................................................................................4
Community of Users..........................................................................................................5
Logical Network Design........................................................................................................6
IP Addressing and Subnet Calculation...............................................................................7
IP Addressing - CIDR............................................................................................................7
Routing and Switching Protocols...........................................................................................7
Security Mechanism...............................................................................................................8
Conclusion..................................................................................................................................8
References..................................................................................................................................9
3OZ DISPATCH NETWORK STUDY
Introduction
The following report identifies and lists the various business and technical goals of
the company OZ Dispatch and based on which provides the trade-offs. The report then begins
to analyse the communities of users and the way they access the network or utilize the
resources while also touching briefly on each type of user. Then the report enters the network
design section where the logical network design of OZ Dispatch is explained in detail with
the help of a diagram. In doing so, the report proceeds further to provide the subnetting
details used to specify the networks addresses for the respective parts. Then the report briefly
describes the method of IP allocation before going on to explain about routing and switching
activities. Thereafter the report talks about the security mechanisms put in place within the
network using the firewall router and ends with observations in concluding notes.
OZ Dispatch Network Analysis
Scope
Business oriented goals
OZ Dispatch through the proposed network wants to expand their business so as to
increase the revenue generation. The expansion plan is to include setting up more CDCs.
The company is willing to depend on advanced networking to reduce operating costs.
Unnecessary physical hardware to be cut to reduce expenses and maintenance costs.
Enhanced user experience by improving communication channels better co-ordination
among organizational staff is required. Extra features like live meetings and A/V sessions to
be made available from company web portal.
User mobility within the network must be supported for keeping the delivery staff in
constant touch with the company and for updating orders to them on the go.
Introduction
The following report identifies and lists the various business and technical goals of
the company OZ Dispatch and based on which provides the trade-offs. The report then begins
to analyse the communities of users and the way they access the network or utilize the
resources while also touching briefly on each type of user. Then the report enters the network
design section where the logical network design of OZ Dispatch is explained in detail with
the help of a diagram. In doing so, the report proceeds further to provide the subnetting
details used to specify the networks addresses for the respective parts. Then the report briefly
describes the method of IP allocation before going on to explain about routing and switching
activities. Thereafter the report talks about the security mechanisms put in place within the
network using the firewall router and ends with observations in concluding notes.
OZ Dispatch Network Analysis
Scope
Business oriented goals
OZ Dispatch through the proposed network wants to expand their business so as to
increase the revenue generation. The expansion plan is to include setting up more CDCs.
The company is willing to depend on advanced networking to reduce operating costs.
Unnecessary physical hardware to be cut to reduce expenses and maintenance costs.
Enhanced user experience by improving communication channels better co-ordination
among organizational staff is required. Extra features like live meetings and A/V sessions to
be made available from company web portal.
User mobility within the network must be supported for keeping the delivery staff in
constant touch with the company and for updating orders to them on the go.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4OZ DISPATCH NETWORK STUDY
Constraints from business goals
Heavy reliance on wireless connectivity comes some benefits as well as limitations.
Network bandwidth as well as response times for wireless connections is always slightly
inferior to direct wired connections and usually expensive to implement.
In serving more customers the company requires comprehensive estimation. This is
because miscalculated expansions might result in catastrophic loss of the company.
Technical setup goals
For supporting the continuous expansion of the OZ Dispatch network, it should be
sufficiently scalable for having abilities of supporting newer branches whenever required.
The network is to remain available for all branches of the network and support future
expansions. Adequate major network address space to be made available.
Performance of company network is dependent on the traffic that persists in the network.
Ensuring lower traffic levels to translate to achieving reduced response times and consistent
bandwidth levels.
Securing the network is extremely important and the best way of getting it done is by
installing standalone firewall devices or even firewall router.
Trade-offs from technical goals
Operating with large IP address spaces in smaller networks gets complicated and
expensive to maintain resulting in IP addresses wastage. Yet larger address spaces were used
to improve overall network performance.
Hardware firewalls like standalone firewall device or firewall routers are expensive to
get. They also need recruitment of additional staff - network administrators for managing and
Constraints from business goals
Heavy reliance on wireless connectivity comes some benefits as well as limitations.
Network bandwidth as well as response times for wireless connections is always slightly
inferior to direct wired connections and usually expensive to implement.
In serving more customers the company requires comprehensive estimation. This is
because miscalculated expansions might result in catastrophic loss of the company.
Technical setup goals
For supporting the continuous expansion of the OZ Dispatch network, it should be
sufficiently scalable for having abilities of supporting newer branches whenever required.
The network is to remain available for all branches of the network and support future
expansions. Adequate major network address space to be made available.
Performance of company network is dependent on the traffic that persists in the network.
Ensuring lower traffic levels to translate to achieving reduced response times and consistent
bandwidth levels.
Securing the network is extremely important and the best way of getting it done is by
installing standalone firewall devices or even firewall router.
Trade-offs from technical goals
Operating with large IP address spaces in smaller networks gets complicated and
expensive to maintain resulting in IP addresses wastage. Yet larger address spaces were used
to improve overall network performance.
Hardware firewalls like standalone firewall device or firewall routers are expensive to
get. They also need recruitment of additional staff - network administrators for managing and
5OZ DISPATCH NETWORK STUDY
diagnosing them. As a result, the company required to invest additional expenses in hiring the
concerned users
Community of Users
User Type Data Stores Networking
Applications
Traffic Flow (per
day)
Managing Director Web Server, Mail
Server, Database
Server.
Web portal, Chrome,
Cisco WebEx
Connect
5000 MBs
Managing staff Web Server, Mail
Server, Database
Server.
Web portal, Chrome,
Cisco WebEx
Connect
1000 MBs
Operational staff Web Server, Mail
Server,
Authentication
Server, Database
Server.
Web portal, Chrome,
Cisco WebEx
Connect, Wireshark,
Google Analytics
15000 MBs
Delivery Staff Web Server, Mail
Server, Database
Server.
Web Portal 7500 MBs
The different user communities include – managing director, managing staff of
different Collection Distribution Centres CDCs), the operational members and the delivery
level staff (Zhou, Chen and Shao 2017). The operational staff involve the data analyst, the
marketing and sales executive, the accountant as also the network administrators responsible
for maintaining the up time of company networks (Morris, Fustos and Haga 2018). Directors,
diagnosing them. As a result, the company required to invest additional expenses in hiring the
concerned users
Community of Users
User Type Data Stores Networking
Applications
Traffic Flow (per
day)
Managing Director Web Server, Mail
Server, Database
Server.
Web portal, Chrome,
Cisco WebEx
Connect
5000 MBs
Managing staff Web Server, Mail
Server, Database
Server.
Web portal, Chrome,
Cisco WebEx
Connect
1000 MBs
Operational staff Web Server, Mail
Server,
Authentication
Server, Database
Server.
Web portal, Chrome,
Cisco WebEx
Connect, Wireshark,
Google Analytics
15000 MBs
Delivery Staff Web Server, Mail
Server, Database
Server.
Web Portal 7500 MBs
The different user communities include – managing director, managing staff of
different Collection Distribution Centres CDCs), the operational members and the delivery
level staff (Zhou, Chen and Shao 2017). The operational staff involve the data analyst, the
marketing and sales executive, the accountant as also the network administrators responsible
for maintaining the up time of company networks (Morris, Fustos and Haga 2018). Directors,
6OZ DISPATCH NETWORK STUDY
network administrators and managers carry personal laptops for work and hence require
additional IP addresses (Eja, Idaka and John 2018). The Operational staff are assigned to
work with servers and workstations. All members as well as delivery staff are assigned
smartphones for communication on the go.
IP Addressing and Subnet Calculation
Sub
network
IP
Require
ment
IP
Allocat
ed
Net
Address
CIDR_
Val
Subnet
Mask
Assignable
IP Ranges
Broadcast
Address
Parrama
tta 20 30 172.16.122
.128 /27 255.255.255
.224
172.16.122
.129 -
172.16.122
.158
172.16.122
.159
CDC1 22 30 172.16.120
.0 /27 255.255.255
.224
172.16.120
.1 -
172.16.120
.30
172.16.120
.31
CDC2 22 30 172.16.121
.96 /27 255.255.255
.224
172.16.121
.97 -
172.16.121
.126
172.16.121
.127
CDC3 22 30 172.16.121
.160 /27 255.255.255
.224
172.16.121
.161 -
172.16.121
.190
172.16.121
.191
CDC4 22 30 172.16.121
.192 /27 255.255.255
.224
172.16.121
.193 -
172.16.121
.222
172.16.121
.223
CDC5 22 30 172.16.121
.224 /27 255.255.255
.224
172.16.121
.225 -
172.16.121
.254
172.16.121
.255
CDC6 22 30 172.16.122
.0 /27 255.255.255
.224
172.16.122
.1 -
172.16.122
.30
172.16.122
.31
network administrators and managers carry personal laptops for work and hence require
additional IP addresses (Eja, Idaka and John 2018). The Operational staff are assigned to
work with servers and workstations. All members as well as delivery staff are assigned
smartphones for communication on the go.
IP Addressing and Subnet Calculation
Sub
network
IP
Require
ment
IP
Allocat
ed
Net
Address
CIDR_
Val
Subnet
Mask
Assignable
IP Ranges
Broadcast
Address
Parrama
tta 20 30 172.16.122
.128 /27 255.255.255
.224
172.16.122
.129 -
172.16.122
.158
172.16.122
.159
CDC1 22 30 172.16.120
.0 /27 255.255.255
.224
172.16.120
.1 -
172.16.120
.30
172.16.120
.31
CDC2 22 30 172.16.121
.96 /27 255.255.255
.224
172.16.121
.97 -
172.16.121
.126
172.16.121
.127
CDC3 22 30 172.16.121
.160 /27 255.255.255
.224
172.16.121
.161 -
172.16.121
.190
172.16.121
.191
CDC4 22 30 172.16.121
.192 /27 255.255.255
.224
172.16.121
.193 -
172.16.121
.222
172.16.121
.223
CDC5 22 30 172.16.121
.224 /27 255.255.255
.224
172.16.121
.225 -
172.16.121
.254
172.16.121
.255
CDC6 22 30 172.16.122
.0 /27 255.255.255
.224
172.16.122
.1 -
172.16.122
.30
172.16.122
.31
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7OZ DISPATCH NETWORK STUDY
CDC7 22 30 172.16.122
.32 /27 255.255.255
.224
172.16.122
.33 -
172.16.122
.62
172.16.122
.63
CDC8 22 30 172.16.122
.64 /27 255.255.255
.224
172.16.122
.65 -
172.16.122
.94
172.16.122
.95
CDC9 22 30 172.16.122
.96 /27 255.255.255
.224
172.16.122
.97 -
172.16.122
.126
172.16.122
.127
CDC10 22 30 172.16.120
.32 /27 255.255.255
.224
172.16.120
.33 -
172.16.120
.62
172.16.120
.63
CDC11 22 30 172.16.120
.64 /27 255.255.255
.224
172.16.120
.65 -
172.16.120
.94
172.16.120
.95
CDC12 22 30 172.16.120
.96 /27 255.255.255
.224
172.16.120
.97 -
172.16.120
.126
172.16.120
.127
CDC13 22 30 172.16.120
.128 /27 255.255.255
.224
172.16.120
.129 -
172.16.120
.158
172.16.120
.159
CDC14 22 30 172.16.120
.160 /27 255.255.255
.224
172.16.120
.161 -
172.16.120
.190
172.16.120
.191
CDC15 22 30 172.16.120
.192 /27 255.255.255
.224
172.16.120
.193 -
172.16.120
.222
172.16.120
.223
CDC16 22 30 172.16.120
.224 /27 255.255.255
.224
172.16.120
.225 -
172.16.120
.254
172.16.120
.255
CDC17 22 30 172.16.121
.0 /27 255.255.255
.224
172.16.121
.1 -
172.16.121
.30
172.16.121
.31
CDC18 22 30 172.16.121
.32
/27 255.255.255
.224
172.16.121
.33 -
172.16.121
172.16.121
.63
CDC7 22 30 172.16.122
.32 /27 255.255.255
.224
172.16.122
.33 -
172.16.122
.62
172.16.122
.63
CDC8 22 30 172.16.122
.64 /27 255.255.255
.224
172.16.122
.65 -
172.16.122
.94
172.16.122
.95
CDC9 22 30 172.16.122
.96 /27 255.255.255
.224
172.16.122
.97 -
172.16.122
.126
172.16.122
.127
CDC10 22 30 172.16.120
.32 /27 255.255.255
.224
172.16.120
.33 -
172.16.120
.62
172.16.120
.63
CDC11 22 30 172.16.120
.64 /27 255.255.255
.224
172.16.120
.65 -
172.16.120
.94
172.16.120
.95
CDC12 22 30 172.16.120
.96 /27 255.255.255
.224
172.16.120
.97 -
172.16.120
.126
172.16.120
.127
CDC13 22 30 172.16.120
.128 /27 255.255.255
.224
172.16.120
.129 -
172.16.120
.158
172.16.120
.159
CDC14 22 30 172.16.120
.160 /27 255.255.255
.224
172.16.120
.161 -
172.16.120
.190
172.16.120
.191
CDC15 22 30 172.16.120
.192 /27 255.255.255
.224
172.16.120
.193 -
172.16.120
.222
172.16.120
.223
CDC16 22 30 172.16.120
.224 /27 255.255.255
.224
172.16.120
.225 -
172.16.120
.254
172.16.120
.255
CDC17 22 30 172.16.121
.0 /27 255.255.255
.224
172.16.121
.1 -
172.16.121
.30
172.16.121
.31
CDC18 22 30 172.16.121
.32
/27 255.255.255
.224
172.16.121
.33 -
172.16.121
172.16.121
.63
8OZ DISPATCH NETWORK STUDY
.62
CDC19 22 30 172.16.121
.64 /27 255.255.255
.224
172.16.121
.65 -
172.16.121
.94
172.16.121
.95
CDC20 22 30 172.16.121
.128 /27 255.255.255
.224
172.16.121
.129 -
172.16.121
.158
172.16.121
.159
Logical Network Design
Logical design of OZ Dispatch network is based upon top down hierarchical
networking approach in which the core router receives internet from one of the ISPs (Internet
Service Provider) which remains connected to the servers of the internet (Tzou 2016). Top
down hierarchical models in this case a 3 layered hierarchical network model is used with the
help of core, distribution and access level networking equipment. The router sits at the core
layer, the multilayer switch occupying the distribution layer and the switches of each CDC
serving as access layer switches. This router then routes the network access to the two
multilayer switches, one of which is distributing the connection to the access layer switches
of the Parramatta office while the other distributes the connection to the access layer switches
of the 20 CDCs present (Gifre et al. 2018). These access layer switches deal with giving
network accesses to the wired and wireless devices of the CDCs and the Parramatta office.
Wired connections are achieved using ethernet cables while wireless devices are connected
using WLAN controllers via DHCP protocol (Morales et al. 2017).
.62
CDC19 22 30 172.16.121
.64 /27 255.255.255
.224
172.16.121
.65 -
172.16.121
.94
172.16.121
.95
CDC20 22 30 172.16.121
.128 /27 255.255.255
.224
172.16.121
.129 -
172.16.121
.158
172.16.121
.159
Logical Network Design
Logical design of OZ Dispatch network is based upon top down hierarchical
networking approach in which the core router receives internet from one of the ISPs (Internet
Service Provider) which remains connected to the servers of the internet (Tzou 2016). Top
down hierarchical models in this case a 3 layered hierarchical network model is used with the
help of core, distribution and access level networking equipment. The router sits at the core
layer, the multilayer switch occupying the distribution layer and the switches of each CDC
serving as access layer switches. This router then routes the network access to the two
multilayer switches, one of which is distributing the connection to the access layer switches
of the Parramatta office while the other distributes the connection to the access layer switches
of the 20 CDCs present (Gifre et al. 2018). These access layer switches deal with giving
network accesses to the wired and wireless devices of the CDCs and the Parramatta office.
Wired connections are achieved using ethernet cables while wireless devices are connected
using WLAN controllers via DHCP protocol (Morales et al. 2017).
9OZ DISPATCH NETWORK STUDY
Figure 1: Logical network design
IP Addressing - CIDR
CIDR (Classless Interdomain Routing) refers to IP addressing mechanism which
replaces the ageing classful IP Addressing that turned inefficient and expensive to implement
in most businesses (Diekmann, Michaelis and Hupel 2016). The different IP address classes
are A, B, C, D and E. In classful, differences IP addresses held by the respective classes was
huge. CIDR allows business entities make smoother changes that is more specific to their IP
requirements (Han et al. 2015). This can be done by simply changing the CIDR value by a
factor or two.
Routing and Switching Protocols
Network of OZ Dispatch undertakes top down hierarchical networking approach and
makes use of routers, multilayer switches to implement the network. The core section
Figure 1: Logical network design
IP Addressing - CIDR
CIDR (Classless Interdomain Routing) refers to IP addressing mechanism which
replaces the ageing classful IP Addressing that turned inefficient and expensive to implement
in most businesses (Diekmann, Michaelis and Hupel 2016). The different IP address classes
are A, B, C, D and E. In classful, differences IP addresses held by the respective classes was
huge. CIDR allows business entities make smoother changes that is more specific to their IP
requirements (Han et al. 2015). This can be done by simply changing the CIDR value by a
factor or two.
Routing and Switching Protocols
Network of OZ Dispatch undertakes top down hierarchical networking approach and
makes use of routers, multilayer switches to implement the network. The core section
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10OZ DISPATCH NETWORK STUDY
involves internet access getting obtained by the router of OZ Dispatch from the router of an
ISP that is connected to servers of the physical interconnect of the World Wide Web. After
the multilayer switch receives network connection from company router, it distributes the
same to the respective access layer switches residing in Parramatta office and each of the 20
CDCs. These 23 access layer switches provide network access to individual devices (Morales
et al. 2017). Wireless devices like laptops and smartphones automatically get their IP address
assigned with DHCP protocol and this is facilitated by the WLAN (Wireless Local Area
Network) controllers (Sequeira et al. 2017). IP is manually assigned in the router interfaces.
Flood, filter and forwarding techniques get used by switches for deciding adding of frames in
switch tables to ensure delivery to respective recipient.
Security Mechanism
A wide range of security threats is faced by the OZ Dispatch network that can
seriously compromise business operations and get networking devices hacked through
intercepting of networks, file tampering, stolen credentials or even sabotaging the device
configuration (Yang et al. 2018). Apart from these, denial of service attacks can be another
alarming threat that can cause network outages as well as some security risks that spy on
business networks (Yan and Yu 2015). Separate VPN tunnels are configured between core
router and distribution switches of Prramatta office and CDCs .Aside from acting as a
firewall, the firewall router can even conduct authentication of critical sections of the network
and be used to grant or revoke network connections at certain terminals and nodes
(Agbenyegah and Asante 2018). Thus the hardware firewall secure the physical and data link
layers. Also Antivirus software applications ensure security in the application layer. The
software side firewall enable security at various other layers like TCP/IP, Presentation,
Session and Transport layers.
involves internet access getting obtained by the router of OZ Dispatch from the router of an
ISP that is connected to servers of the physical interconnect of the World Wide Web. After
the multilayer switch receives network connection from company router, it distributes the
same to the respective access layer switches residing in Parramatta office and each of the 20
CDCs. These 23 access layer switches provide network access to individual devices (Morales
et al. 2017). Wireless devices like laptops and smartphones automatically get their IP address
assigned with DHCP protocol and this is facilitated by the WLAN (Wireless Local Area
Network) controllers (Sequeira et al. 2017). IP is manually assigned in the router interfaces.
Flood, filter and forwarding techniques get used by switches for deciding adding of frames in
switch tables to ensure delivery to respective recipient.
Security Mechanism
A wide range of security threats is faced by the OZ Dispatch network that can
seriously compromise business operations and get networking devices hacked through
intercepting of networks, file tampering, stolen credentials or even sabotaging the device
configuration (Yang et al. 2018). Apart from these, denial of service attacks can be another
alarming threat that can cause network outages as well as some security risks that spy on
business networks (Yan and Yu 2015). Separate VPN tunnels are configured between core
router and distribution switches of Prramatta office and CDCs .Aside from acting as a
firewall, the firewall router can even conduct authentication of critical sections of the network
and be used to grant or revoke network connections at certain terminals and nodes
(Agbenyegah and Asante 2018). Thus the hardware firewall secure the physical and data link
layers. Also Antivirus software applications ensure security in the application layer. The
software side firewall enable security at various other layers like TCP/IP, Presentation,
Session and Transport layers.
11OZ DISPATCH NETWORK STUDY
Conclusion
To conclude, this report succeeds in identifying and listing the various business and
technical goals of the company OZ Dispatch and based on which provides the trade-offs. The
report then begins to analyse the communities of users and the way they access the network
or utilize the resources while also touching briefly on each type of user. Then the report
enters the network design section where the logical network design of OZ Dispatch is
explained in detail with the help of a diagram. In doing so, the report proceeds further to
provide the subnetting details used to specify the networks addresses for the respective parts.
Then the report briefly describes the method of IP allocation before going on to explain about
routing and switching activities. Thereafter the report talks about the security mechanisms put
in place within the network using the firewall router and ends with observations in
concluding notes.
Conclusion
To conclude, this report succeeds in identifying and listing the various business and
technical goals of the company OZ Dispatch and based on which provides the trade-offs. The
report then begins to analyse the communities of users and the way they access the network
or utilize the resources while also touching briefly on each type of user. Then the report
enters the network design section where the logical network design of OZ Dispatch is
explained in detail with the help of a diagram. In doing so, the report proceeds further to
provide the subnetting details used to specify the networks addresses for the respective parts.
Then the report briefly describes the method of IP allocation before going on to explain about
routing and switching activities. Thereafter the report talks about the security mechanisms put
in place within the network using the firewall router and ends with observations in
concluding notes.
12OZ DISPATCH NETWORK STUDY
References
Agbenyegah, F.K. and Asante, M., 2018. Impact Of Firewall On Network Performance.
Diekmann, C., Michaelis, J. and Hupel, L., 2016. IP Addresses. Archive of Formal Proofs,
Jun.
Eja, B.R., Idaka, S.E. and John, O.A., 2018. Inhibiting factors to tax revenue generation in
Cross River State, Nigeria. Global Journal of Social Sciences, 17(1), pp.11-19.
Gifre, L., Izquierdo-Zaragoza, J.L., Ruiz, M. and Velasco, L., 2018. Autonomic
disaggregated multilayer networking. Journal of Optical Communications and Networking,
10(5), pp.482-492.
Han, B., Gopalakrishnan, V., Ji, L. and Lee, S., 2015. Network function virtualization:
Challenges and opportunities for innovations. IEEE Communications Magazine, 53(2),
pp.90-97.
Morales, F., Ruiz, M., Gifre, L., Contreras, L.M., López, V. and Velasco, L., 2017. Virtual
network topology adaptability based on data analytics for traffic prediction. IEEE/OSA
Journal of Optical Communications and Networking, 9(1), pp.A35-A45.
Morris, G.J., Fustos, J.T. and Haga, W., 2018. Connecting the Dots and Nodes: A Survey of
Skills Requested by Employers for Network Administrators. Information Systems Education
Journal, 16(1), p.4.
Sequeira, L., de la Cruz, J.L., Ruiz-Mas, J., Saldana, J., Fernandez-Navajas, J. and
Almodovar, J., 2017. Building an SDN enterprise WLAN based on virtual APs. IEEE
Communications Letters, 21(2), pp.374-377.
References
Agbenyegah, F.K. and Asante, M., 2018. Impact Of Firewall On Network Performance.
Diekmann, C., Michaelis, J. and Hupel, L., 2016. IP Addresses. Archive of Formal Proofs,
Jun.
Eja, B.R., Idaka, S.E. and John, O.A., 2018. Inhibiting factors to tax revenue generation in
Cross River State, Nigeria. Global Journal of Social Sciences, 17(1), pp.11-19.
Gifre, L., Izquierdo-Zaragoza, J.L., Ruiz, M. and Velasco, L., 2018. Autonomic
disaggregated multilayer networking. Journal of Optical Communications and Networking,
10(5), pp.482-492.
Han, B., Gopalakrishnan, V., Ji, L. and Lee, S., 2015. Network function virtualization:
Challenges and opportunities for innovations. IEEE Communications Magazine, 53(2),
pp.90-97.
Morales, F., Ruiz, M., Gifre, L., Contreras, L.M., López, V. and Velasco, L., 2017. Virtual
network topology adaptability based on data analytics for traffic prediction. IEEE/OSA
Journal of Optical Communications and Networking, 9(1), pp.A35-A45.
Morris, G.J., Fustos, J.T. and Haga, W., 2018. Connecting the Dots and Nodes: A Survey of
Skills Requested by Employers for Network Administrators. Information Systems Education
Journal, 16(1), p.4.
Sequeira, L., de la Cruz, J.L., Ruiz-Mas, J., Saldana, J., Fernandez-Navajas, J. and
Almodovar, J., 2017. Building an SDN enterprise WLAN based on virtual APs. IEEE
Communications Letters, 21(2), pp.374-377.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13OZ DISPATCH NETWORK STUDY
Tzou, D., 2016. Liability of Internet Service Providers under Section 337: Why Digital
Models Will Open the Door for ISP Liability on Imports that Infringe a US Patent. IDEA, 56,
p.163.
Yan, Q. and Yu, F.R., 2015. Distributed denial of service attacks in software-defined
networking with cloud computing. IEEE Communications Magazine, 53(4), pp.52-59.
Yang, X., Zhou, S., Ren, G. and Liu, Y., 2018. Computer network attack and defense
technology. Information and Computer Security, 1(1).
Zhou, X., Chen, X. and Shao, L., 2017. Study on the optimization of collection and
distribution system of freight hub ports: Illustrated by the case of Shanghai international
shipping center, China. Transportation research procedia, 25, pp.1126-1136.
Tzou, D., 2016. Liability of Internet Service Providers under Section 337: Why Digital
Models Will Open the Door for ISP Liability on Imports that Infringe a US Patent. IDEA, 56,
p.163.
Yan, Q. and Yu, F.R., 2015. Distributed denial of service attacks in software-defined
networking with cloud computing. IEEE Communications Magazine, 53(4), pp.52-59.
Yang, X., Zhou, S., Ren, G. and Liu, Y., 2018. Computer network attack and defense
technology. Information and Computer Security, 1(1).
Zhou, X., Chen, X. and Shao, L., 2017. Study on the optimization of collection and
distribution system of freight hub ports: Illustrated by the case of Shanghai international
shipping center, China. Transportation research procedia, 25, pp.1126-1136.
1 out of 14
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.