Data Communications and Networks: A Network Solution for uSoft.com
VerifiedAdded on 2023/04/25
|14
|1533
|476
Report
AI Summary
This report provides a comprehensive network solution for uSoft.com, a private biomedical software development company, focusing on the redesign of its existing LAN to meet specific business and technical goals. The report details the process of requirement engineering, including the analysis of user needs and security considerations. It includes an IP addressing plan to support scalability and remote access. The network design incorporates both physical and logical diagrams, utilizing a three-layered hierarchical framework for improved security and management. The solution aims to enhance communication, protect company information, and ensure high network performance. The report concludes by emphasizing the effectiveness of the proposed network design in meeting the organization's requirements.

Running head: DATA COMMUNICATIONS AND NETWORK
DATA COMMUNICATIONS AND NETWORK
Name of student
Name of university
Author’s note:
DATA COMMUNICATIONS AND NETWORK
Name of student
Name of university
Author’s note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
DATA COMMUNICATIONS AND NETWORK
Table of Contents
Introduction....................................................................................................................2
Requirement engineering...............................................................................................2
IP addressing plan..........................................................................................................4
Network diagram............................................................................................................6
Conclusion......................................................................................................................8
Bibliography...................................................................................................................9
DATA COMMUNICATIONS AND NETWORK
Table of Contents
Introduction....................................................................................................................2
Requirement engineering...............................................................................................2
IP addressing plan..........................................................................................................4
Network diagram............................................................................................................6
Conclusion......................................................................................................................8
Bibliography...................................................................................................................9

2
DATA COMMUNICATIONS AND NETWORK
Introduction
The aim of this report is to provide the company uSoft.com with a network solution
for private development company of biomedical software. A research has been conducted on
all the requirement of uSoft.com and the evaluation of the structure of uSoft.com to properly
manage the framework of the network for developing the network of the private biomedical
company. An appropriate topology of the network has been selected to develop the network
and fulfil all the requirements of the company. The evaluation of the security mechanisms for
the network has been done for ensuring the efficient protection of the network of the
organisation.
Requirement engineering
The analysis of the system requirement has been done to develop the LAN of the
headquarter of company. Using the method of requirement analysis, the expectation of the
user can be identified and resolve any conflict among the users and the team of the network
development. The availability of the network to all the users is required to be ensured in a
manner where it fulfils all the requirement of the user and the wireless devices of the users
could be able to connect with that network to access the resources. The proper security
mechanisms must be implemented for the network development and it should protect the
network from any unauthorised users who are trying to access the network without any
authentication. The internal resources of the company are also required to be protected and
access would be provided to the authenticated users only.
For the development of the subnet plan and the division of the network into several
VLAN in a manner that the efficient controlling of the access of the users can be guaranteed.
There is a requirement of reduction of the complexity of network management with the
proper configuration of the switch and several VLAN and then the development of the LAN
DATA COMMUNICATIONS AND NETWORK
Introduction
The aim of this report is to provide the company uSoft.com with a network solution
for private development company of biomedical software. A research has been conducted on
all the requirement of uSoft.com and the evaluation of the structure of uSoft.com to properly
manage the framework of the network for developing the network of the private biomedical
company. An appropriate topology of the network has been selected to develop the network
and fulfil all the requirements of the company. The evaluation of the security mechanisms for
the network has been done for ensuring the efficient protection of the network of the
organisation.
Requirement engineering
The analysis of the system requirement has been done to develop the LAN of the
headquarter of company. Using the method of requirement analysis, the expectation of the
user can be identified and resolve any conflict among the users and the team of the network
development. The availability of the network to all the users is required to be ensured in a
manner where it fulfils all the requirement of the user and the wireless devices of the users
could be able to connect with that network to access the resources. The proper security
mechanisms must be implemented for the network development and it should protect the
network from any unauthorised users who are trying to access the network without any
authentication. The internal resources of the company are also required to be protected and
access would be provided to the authenticated users only.
For the development of the subnet plan and the division of the network into several
VLAN in a manner that the efficient controlling of the access of the users can be guaranteed.
There is a requirement of reduction of the complexity of network management with the
proper configuration of the switch and several VLAN and then the development of the LAN
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
DATA COMMUNICATIONS AND NETWORK
is executed for the headquarter of the organisation. There is requirement of the effective
management of the network flexibility and the evaluation of the floor plan is required to be
done for the all the 6 stories of the headquarter building of the organisation and place of
department on distinct floors.
This is the following structure of HQ that is established for identifying the
requirement of the number of IP address required for every department to develop the LAN
of headquarter.
Customer Support
Total employees 62
Overall department consists 1 Server
Every employee possess 1 IP Phone + 1 PC
Software Development
Total employees 102
Overall department consists 3 Servers
Every employee possess 1 IP Phone + 1 PC
Sales
Total employees 52
Overall department consists 1 Server
Every employee possess 1 IP Phone +1 PC
Finance
Total employees 32
Every employee possess 1 IP Phone +1 PC
Overall department consists 1 Server
Human Resource
DATA COMMUNICATIONS AND NETWORK
is executed for the headquarter of the organisation. There is requirement of the effective
management of the network flexibility and the evaluation of the floor plan is required to be
done for the all the 6 stories of the headquarter building of the organisation and place of
department on distinct floors.
This is the following structure of HQ that is established for identifying the
requirement of the number of IP address required for every department to develop the LAN
of headquarter.
Customer Support
Total employees 62
Overall department consists 1 Server
Every employee possess 1 IP Phone + 1 PC
Software Development
Total employees 102
Overall department consists 3 Servers
Every employee possess 1 IP Phone + 1 PC
Sales
Total employees 52
Overall department consists 1 Server
Every employee possess 1 IP Phone +1 PC
Finance
Total employees 32
Every employee possess 1 IP Phone +1 PC
Overall department consists 1 Server
Human Resource
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
DATA COMMUNICATIONS AND NETWORK
Total employees 22
Overall department consists 1 Server
Every employee possess 1 IP Phone+1 PC
Solution Design
Total employees 92
Overall department consists 2 Servers
Every employee possess 1 IP Phone+ 1 PC
IP addressing plan
The IP address that is used by the company headquarter is 172.16.123.0/22 and the IP
address plan for the network solution configuration is:
Subnet
Name
Alloca
ted
Size
Needed Size Address Dec Mask Mask Assignable Range Broadcast
solution
design
254 186 172.16.121.0 255.255.255.0 224
172.16.121.1-
172.16.121.254
172.16.121.255
customer
support
126 125 172.16.122.0 255.255.255.128 /25
172.16.122.1-
172.16.122.126
172.16.122.127
software
evelopmen
t
254 207 172.16.120.0 255.255.255.0 224
172.16.120.1-
172.16.120.254
172.16.120.255
sales 126 105 172.16.122.128 255.255.255.128 /25 172.16.122.129- 172.16.122.255
DATA COMMUNICATIONS AND NETWORK
Total employees 22
Overall department consists 1 Server
Every employee possess 1 IP Phone+1 PC
Solution Design
Total employees 92
Overall department consists 2 Servers
Every employee possess 1 IP Phone+ 1 PC
IP addressing plan
The IP address that is used by the company headquarter is 172.16.123.0/22 and the IP
address plan for the network solution configuration is:
Subnet
Name
Alloca
ted
Size
Needed Size Address Dec Mask Mask Assignable Range Broadcast
solution
design
254 186 172.16.121.0 255.255.255.0 224
172.16.121.1-
172.16.121.254
172.16.121.255
customer
support
126 125 172.16.122.0 255.255.255.128 /25
172.16.122.1-
172.16.122.126
172.16.122.127
software
evelopmen
t
254 207 172.16.120.0 255.255.255.0 224
172.16.120.1-
172.16.120.254
172.16.120.255
sales 126 105 172.16.122.128 255.255.255.128 /25 172.16.122.129- 172.16.122.255

5
DATA COMMUNICATIONS AND NETWORK
172.16.122.254
Finance 126 65 172.16.123.0 255.255.255.128 /25
172.16.123.1-
172.16.123.126
172.16.123.127
Human 62 45 172.16.123.128 255.255.255.192 /26
172.16.123.129-
172.16.123.190
172.16.123.191
DATA COMMUNICATIONS AND NETWORK
172.16.122.254
Finance 126 65 172.16.123.0 255.255.255.128 /25
172.16.123.1-
172.16.123.126
172.16.123.127
Human 62 45 172.16.123.128 255.255.255.192 /26
172.16.123.129-
172.16.123.190
172.16.123.191
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
DATA COMMUNICATIONS AND NETWORK
Network diagram
Physical network diagram
The software that has been used for creating the network diagram is Microsoft Visio to
demonstrate the network topology. The creation of the diagram is done after a comprehensive
analysis of the floor plan of the building and distinct switches are used for each floor. The
connection of access level switch has been done with distribution switch to manage the
communication among various VLAN. The designing of physical network has done by using
a design that is rack oriented and this denotes to the authentic layout, which must be utilised
for the improvement of the network structure. The topology that is utilised for creation of this
design of the network is the three layered hierarchical framework, which assists in the
DATA COMMUNICATIONS AND NETWORK
Network diagram
Physical network diagram
The software that has been used for creating the network diagram is Microsoft Visio to
demonstrate the network topology. The creation of the diagram is done after a comprehensive
analysis of the floor plan of the building and distinct switches are used for each floor. The
connection of access level switch has been done with distribution switch to manage the
communication among various VLAN. The designing of physical network has done by using
a design that is rack oriented and this denotes to the authentic layout, which must be utilised
for the improvement of the network structure. The topology that is utilised for creation of this
design of the network is the three layered hierarchical framework, which assists in the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
DATA COMMUNICATIONS AND NETWORK
division of the network in three sections, which are core, distribution, and access. The core
network devices are restricted to use for the users for improving the security of the network.
Logical network diagram
The logical network diagram creation has been done with focussing on flow of the data
traffic residing in this network along with the points of control, the domains of routing for
every subnet. The use of layer 3 switch has been for distribution and the core level of network
to enable the consolidated administration and configure the network in relation to the
necessity of organisation. The use of the two distribution layer switches has been done for the
network for improving the uptime of the network and in the situation when there is any
failure in the network, then the network will not be hampered and all the data would be
transmitted to destination using any supplementary link that is available in this network.
DATA COMMUNICATIONS AND NETWORK
division of the network in three sections, which are core, distribution, and access. The core
network devices are restricted to use for the users for improving the security of the network.
Logical network diagram
The logical network diagram creation has been done with focussing on flow of the data
traffic residing in this network along with the points of control, the domains of routing for
every subnet. The use of layer 3 switch has been for distribution and the core level of network
to enable the consolidated administration and configure the network in relation to the
necessity of organisation. The use of the two distribution layer switches has been done for the
network for improving the uptime of the network and in the situation when there is any
failure in the network, then the network will not be hampered and all the data would be
transmitted to destination using any supplementary link that is available in this network.

8
DATA COMMUNICATIONS AND NETWORK
Conclusion
Therefore, it can be concluded that the network design can be utilised by the
organisation for improving the security of the network. An appropriate topology of the
network has been selected to develop the network and fulfil all the requirements of the
company. The evaluation of the security mechanisms for the network has been done for
ensuring the efficient protection of the network of the organisation. The analysis of the
system requirement has been done to develop the LAN of the headquarter of company. Using
the method of requirement analysis, the expectation of the user can be identified and resolve
any conflict among the users and the team of the network development. The software that has
been used for creating the network diagram is Microsoft Visio to demonstrate the network
topology.
DATA COMMUNICATIONS AND NETWORK
Conclusion
Therefore, it can be concluded that the network design can be utilised by the
organisation for improving the security of the network. An appropriate topology of the
network has been selected to develop the network and fulfil all the requirements of the
company. The evaluation of the security mechanisms for the network has been done for
ensuring the efficient protection of the network of the organisation. The analysis of the
system requirement has been done to develop the LAN of the headquarter of company. Using
the method of requirement analysis, the expectation of the user can be identified and resolve
any conflict among the users and the team of the network development. The software that has
been used for creating the network diagram is Microsoft Visio to demonstrate the network
topology.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
DATA COMMUNICATIONS AND NETWORK
Bibliography
Ahuja, R.K., 2017. Network flows: theory, algorithms, and applications. Pearson Education.
Barabási, A.L., 2016. Network science. Cambridge university press.
Burt, R.S., 2017. Structural holes versus network closure as social capital. In Social
capital (pp. 31-56). Routledge.
De Nooy, W., Mrvar, A. and Batagelj, V., 2018. Exploratory social network analysis with
Pajek. Cambridge University Press.
Ellison, N.B. and Boyd, D.M., 2013. Sociality through social network sites. In The Oxford
handbook of internet studies.
Hakansson, H., 2015. Industrial Technological Development (Routledge Revivals): A
Network Approach. Routledge.
Haldane, A.G., 2013. Rethinking the financial network. In Fragile stabilität–stabile
fragilität (pp. 243-278). Springer VS, Wiesbaden.
Ioffe, S. and Szegedy, C., 2015. Batch normalization: Accelerating deep network training by
reducing internal covariate shift. arXiv preprint arXiv:1502.03167.
Johanson, J. and Mattsson, L.G., 2015. Internationalisation in industrial systems—a network
approach. In Knowledge, networks and power (pp. 111-132). Palgrave Macmillan, London.
Lin, M., Chen, Q. and Yan, S., 2013. Network in network. arXiv preprint arXiv:1312.4400.
Lin, N., 2017. Building a network theory of social capital. In Social capital (pp. 3-28).
Routledge.
DATA COMMUNICATIONS AND NETWORK
Bibliography
Ahuja, R.K., 2017. Network flows: theory, algorithms, and applications. Pearson Education.
Barabási, A.L., 2016. Network science. Cambridge university press.
Burt, R.S., 2017. Structural holes versus network closure as social capital. In Social
capital (pp. 31-56). Routledge.
De Nooy, W., Mrvar, A. and Batagelj, V., 2018. Exploratory social network analysis with
Pajek. Cambridge University Press.
Ellison, N.B. and Boyd, D.M., 2013. Sociality through social network sites. In The Oxford
handbook of internet studies.
Hakansson, H., 2015. Industrial Technological Development (Routledge Revivals): A
Network Approach. Routledge.
Haldane, A.G., 2013. Rethinking the financial network. In Fragile stabilität–stabile
fragilität (pp. 243-278). Springer VS, Wiesbaden.
Ioffe, S. and Szegedy, C., 2015. Batch normalization: Accelerating deep network training by
reducing internal covariate shift. arXiv preprint arXiv:1502.03167.
Johanson, J. and Mattsson, L.G., 2015. Internationalisation in industrial systems—a network
approach. In Knowledge, networks and power (pp. 111-132). Palgrave Macmillan, London.
Lin, M., Chen, Q. and Yan, S., 2013. Network in network. arXiv preprint arXiv:1312.4400.
Lin, N., 2017. Building a network theory of social capital. In Social capital (pp. 3-28).
Routledge.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10
DATA COMMUNICATIONS AND NETWORK
Nagurney, A., 2013. Network economics: A variational inequality approach (Vol. 10).
Springer Science & Business Media.
Scott, J., 2017. Social network analysis. Sage.
Spillius, E. and Bott, E., 2014. Family and social network: Roles, norms and external
relationships in ordinary urban families. Routledge.
Taylor, P.J. and Derudder, B., 2015. World city network: a global urban analysis. Routledge.
Zaremba, W., Sutskever, I. and Vinyals, O., 2014. Recurrent neural network
regularization. arXiv preprint arXiv:1409.2329.
DATA COMMUNICATIONS AND NETWORK
Nagurney, A., 2013. Network economics: A variational inequality approach (Vol. 10).
Springer Science & Business Media.
Scott, J., 2017. Social network analysis. Sage.
Spillius, E. and Bott, E., 2014. Family and social network: Roles, norms and external
relationships in ordinary urban families. Routledge.
Taylor, P.J. and Derudder, B., 2015. World city network: a global urban analysis. Routledge.
Zaremba, W., Sutskever, I. and Vinyals, O., 2014. Recurrent neural network
regularization. arXiv preprint arXiv:1409.2329.

11
DATA COMMUNICATIONS AND NETWORK
DATA COMMUNICATIONS AND NETWORK
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 14
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.