ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

PLANNING AND IMPLEMENTING.

Verified

Added on  2023/04/03

|11
|438
|208
Presentation
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
PLANNING AND IMPLEMENTING

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Purpose of the project
Control the operational cost: Reduces the
overall cost for Adatum.
Issue prevention and active network
maintenance: Fix any issue immediately
Security: provides security to the
organization by securing the sensitive
data
High network availability: enhance the
business operation
Document Page
Project Requirements
Faster speed
Pre define the countermeasures of the network
infrastructure
Secured
Should be easily modified according to the
updates
Should have an ability to fix normal errors
Document Page
Proposed
solution
Hierarchical
Network: Core
layer, distribution
layer and access
layer

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Proposed solution
(contd.)
Core layer: The switches and the
routers in this layer give high speed
connectivity. In an organization the
core layer can connect multiple
buildings and also give connectivity
to server farm. The core layer
consists of VPN, extranet, WAN. It
enhances the network development
(Li & Pan, 2013). The technologies in
the core layer are high speed,
aggregate links, enhancing routing
protocols and load balancing.
Document Page
Proposed solution
(contd.)
Distribution layer: This layer deals
with filtering, communication point
and filtering between the access
layer and the core layer. The main
functions of this layer are filtering
as well as handling the traffic flows,
summarizing the routes before the
advertisement of the routes to Core,
Enforcing the access control policy
and isolating core from the access
layer disruptions (Liu et al., 2017).
Document Page
Proposed solution
(contd.)
Access layer: It is utilized to
handle user access regarding
the internetwork resources.
Network designer facilitate
traffic that is produced from
access layer. The end devices
are connected here. The access
layer resides in the campus
building, server farm and at the
edge of the company (Du, Wang
& Wang, 2015).

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cisco Enterprise
Architectures
Three-layer hierarchical design will
be further divided in modules. Each
module defines various logical or
physical connectivity
Three areas of the modular network
design are:
Enterprise Campus, Enterprise Edge and
Server farm.
Document Page
Methodology
The project will be completed
in five different phases
Project initiation
Project planning
Project Execution
Project Testing
Project Closure
Document Page
References
Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2015, August). A sybil attack
detection scheme for a centralized clustering-based hierarchical network.
In 2015 IEEE Trustcom/BigDataSE/ISPA (Vol. 1, pp. 318-325). IEEE.
Liu, X. K., Wang, Y. W., Xiao, J. W., & Yang, W. (2017). Distributed
hierarchical control design of coupled heterogeneous linear systems under
switching networks. International Journal of Robust and Nonlinear Control,
27(8), 1242-1259.
Du, Y., Wang, W., & Wang, L. (2015). Hierarchical recurrent neural network
for skeleton based action recognition. In Proceedings of the IEEE
conference on computer vision and pattern recognition (pp. 1110-1118).

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1 out of 11
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]