logo

Unit 24: Networking Technologies

   

Added on  2023-03-30

16 Pages2830 Words225 Views
Networking Technologies 1
Networking Technologies
Student's Name:
Instructor's Name:
Date:

Networking Technologies 2
Task 3
A primitive LAN layout for Beta Communications network requirement would be as follows:
With the help of this network architecture, Beta Communication will not have any problems
expanding to remote locations too. The Building backbone can be broken into smaller
segments. According to current business functionalities, Beta Communications has broken
down tasks to three different buildings. It would be ideal to carry all important resources in a
single building and channel to the other buildings. Ideally, the building (C) with the network
infrastructure manager and technical teams should act as the central block. Servers, hardware
resources and software solutions must be deployed at this building (C). Employees located in
the other buildings can accept data from building (C). Such an architecture will make sure
Beta Communication performs all its operations in a secure and resilient manner.
Building (C) that acts as the core should be further broken into several segments. With proper
branching, individual modules can be accessed and maintained without compromising on the

Networking Technologies 3
overall quality of the network. The network at building C should have multiple distribution
switches.
Connection between building A, B and C can be established using access layer switches.
These switches can be spread across different buildings, irrespective of their location. The
switches are connected using Ethernet cables. The Ethernet cables are responsible for
transferring data from one location to another. Ethernet cabling will be useful when Beta
Communication wants to expand. The cables are known for its high performance and reliable
nature. They can handle huge performance goals without any problems. That means, Beta
Communication can attach many more nodes and not worry about speed, response rate,
turnaround time or safety. Ethernet cabling promises high bandwidth for Beta
Communication. There are special, fine-tuned protocols at Ethernet cabling level to ensure
data communication happens without any compromises. For instance, Beta Communication
can use 10-Gigabit uplink connectivity. This technique makes sure performance and
flexibility is achieved. Ethernet cabling and protocols form a part of Layer 2.
Benefits of using this multiple distribution layer architecture:
1) Nodes will be connected in a structured fashion.
2) It will be easier to find and remove faulty nodes.
3) It will be easier to maintain the overall network, without compromising on
performance.
4) It will be easier to add new nodes to the overall system.
Designing the Distribution Layer

Networking Technologies 4
The distribution layer is responsible for aggregating all the access layer switches. It is
necessary to design the overall architecture of the distribution layer, before developing the
access layer. The distribution layer works across the three buildings. It is a medium to
connect the access layer switches. According to the proposed problem statement, Beta
Communication functions across three different buildings. The distribution layer is
responsible for connecting all access layer switches that are present in a particular building.
Later, the distribution layers can be connected together. The distribution layer plays an
integral role in this design. It acts as a boundary between layer 2 and 3 protocols.
Layer 2 is responsible for handling the spanning tree protocols. These protocols are necessary
to identify the route each packet in the network would take. The spanning tree protocols make
sure packets take the shortest and best possible route. There are several different types of
spanning tree protocols. Beta Communication has a network that is restricted to three
buildings that are closely located. A simple spanning tree protocol will be sufficient to ensure
quick and reliable communication. Moving on, the spanning tree protocolhandles all faults in
layer 2.
Layer 3 is responsible for holding information about the IP routing tables. The proposed
network design needs very few IP routing tables. These tables make sure packets are sent to
the right network gateway. With fewer number of routing tables, the process of
troubleshooting errors and recovering from faults becomes easier. The IP tables carry
information about sources and potential destinations. Packets transferred from one building to
another should go through the routing tables in Layer 3.
Designing the Access Layer

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Technology Network Design
|6
|780
|27

Networks
|26
|6691
|99

Network Design Assignment (Doc)
|20
|5604
|583

Networking Set Up and Communications
|31
|1967
|114

Network Security for Ethernet Switching
|23
|2840
|398

Riordan Network Security Recommendations Assignment
|5
|923
|161