logo

Network Security and Routing Protocols

   

Added on  2020-03-16

26 Pages3940 Words111 Views
 | 
 | 
 | 
Network Security and Routing Protocols_1

Executive SummaryThe A4A organization interest to design a comprehensive network to provide the wireless connection for an organization. It has the two branches such as head office and branch offices. The head office is located at Sydney and branch office is located at Singapore.The A4A organization funds all of its activities and projects from the public donations. It has 10 employees. The six members are located in Sydney office and four members are located inSingapore office. It was stablished to help small private and public colleges and universities in southeast Asia and Australia. It creates the proposed network to universities and colleges are register the online by using wireless connection. The proposed wireless connection easily communicates the two offices. It provides the secure wireless connection between the head office and branch office. It meets the various requirements like security, user and business requirements. It delivers the secure network services for an organization. It easily enable the student to apply for recruitment to be volunteers in institutions.1
Network Security and Routing Protocols_2

Table of ContentsExecutive Summary...............................................................................................................................1Project Goal and Scope..........................................................................................................................2Design Requirements.............................................................................................................................31.Business Goals and Constraints.................................................................................................32.Technical Goals and Trade-offs.................................................................................................43.User Communities and Network Applications...........................................................................44.Assumptions..............................................................................................................................4Logical Design......................................................................................................................................45.Network Design.........................................................................................................................46.IP addressing and Naming.........................................................................................................57.Network Devices.....................................................................................................................118.Justification of Logical Design................................................................................................129.List of Routing and Switching Protocols.................................................................................1210.Security Mechanisms...........................................................................................................13Physical Network Design....................................................................................................................1311.Network Diagram and Justification.....................................................................................1312.IP addresses.........................................................................................................................1413.Network components...........................................................................................................1714.Total Cost Estimation..........................................................................................................1915.Test plan and Test Script......................................................................................................19Reflection............................................................................................................................................2116.User, business and Security Requirements...........................................................................2117.Analyse the user, business and security Requirements........................................................2218.Compare and Contrast the possible alternative network design...........................................2219.Top down network design methodology..............................................................................2220.Final Documentation............................................................................................................2221.Designed Network Requirement..........................................................................................2322.Unit......................................................................................................................................2323.Suggestion...........................................................................................................................23References...........................................................................................................................................232
Network Security and Routing Protocols_3

Project Goal and ScopeMain Goal of the project is to design a comprehensive network for Academics foracademics (A4A) organization. The A4A organization has two offices like head office andbranch office. The A4A head office is located at Sydney and branch office is Singapore. TheA4A funds the overall of project and activities for public donations. The A4A organizationhas the one team to provide the funds for public donations. It has a team of 10 members. Thesix members are located in Sydney office and four members are located in Singapore office.The A4A organization was helps to small private and small colleges and universities insoutheast Asia and Australia. The A4A head office and branch office are have the localnetwork. The A4A organization needs to creates the wireless connection by design the newnetwork design. The current A4A network does not allow the institutions such as universitiesand colleges registrations. So, the proposed network meets the various requirements afteranalysis of the A4A current network. It allows the online registration by using the wirelessconnections. It easily enables the student to apply the recruitment to be volunteers in theinstitutions. The proposed network provides the security and productivity and it keeps themember information securely. The Proposed network design will be identified the designrequirements. It identified the technical goal and trade-offs for A4A organization. The logicaland physical network design will be created. The network component and IP addressing willbe identified. Design Requirements1.Business Goals and ConstraintsThe A4A organization analyse the business goals and constraints by using the top downmethodology network design. The Business constraints and goals are used to gathering thebelow information for an organization. They are,It provides the high securityIt improves the communications between the client and server.It increases the revenue.It offers the better customer support and services.It reduces the operational and maintenance costs.3
Network Security and Routing Protocols_4

2.Technical Goals and Trade-offsThe A4A organization technical goals and trade-offs are analysed by using the top downnetwork design. The Technical trade-offs provides the following information like responseand delay time requirement, jitter requirements, packet loss requirement and bandwidthrequirement. The identification of technical goals is including the network adaptability,availability, performance, affordability, scalability, usability and manageability.3.User Communities and Network ApplicationsThe A4A organization user communities are support the proposed network design. Itprovides the end to end network solution and high network performance. The usercommunities are including the group of users to sharing the best network practices on highperformance networking to raise the end to end network performance. The user communitiesare identifying the set of users and their network performance by requiring the networkapplications and resources (Jisc, 2017). The network applications are used to find the networkrequirement to design a proposed network.4.AssumptionsVarious assumptions are applied during the network design to increase the networkdesign performance. They are listed below.CompatibilityReliabilityAvailabilityStabilityScalabilityIntegrityLogical Design5.Network DesignLogical network design for Singapore branch office is shown in below.4
Network Security and Routing Protocols_5

Logical network design for Sydney Head office is shown in below.6.IP addressing and NamingIP addressing for Sydney Head Office is shown in below.Router5
Network Security and Routing Protocols_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Computing Security Risks and Mitigation
|17
|4474
|196

Network Design for Organization
|27
|5640
|218

Information Security Management : Assignment
|17
|4332
|251

Network Requirement Analysis and Plan BN202 Contents
|31
|1715
|402

Understanding Network Concepts
|66
|9319
|59

Information Security Management Assignment (Doc)
|18
|4225
|129