ICT120 Assignment 2: EZY-Books Network Design Report
VerifiedAdded on 2023/06/04
|9
|1754
|289
Report
AI Summary
This report details the network design for EZY-Books, a customized book publisher with branches in Brisbane and Sydney. The assignment covers key aspects of network infrastructure, including structured cabling (specifically Ethernet cables), IP addressing and planning (including IP address tables and subnetting), essential network services (such as dial-up, DSL, cable internet, and wireless broadband), and network security measures (access control, antivirus software, and firewalls). The report aims to establish a secure and scalable communication channel for employees, partners, and customers. It addresses the company's needs for data retrieval, processing, and storage, while also considering the geographic and functional isolation of the network to prevent unauthorized access. The design includes the allocation of IP addresses, subnet masks, and default gateways for various devices within the network, along with a discussion of different internet access technologies and security protocols.

10/23/2018
EZY-Books
Network Design
EZY-Books
Network Design
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

EZY Books Network Design
Summary
EZY Books is a publishing company that is dedicated and specialized in making of customized
books. There are main agendas to come up with networking system that will enable the
employees to communicate easily, freely and defiantly within the network and even with the
constituent branches located at Sydney. They hope to have a future proof network
infrastructure deployed into their organization with the aim of easy and efficient connection of
all devices, office staff, partners and customers within the same communication channel.
Page | 1
Summary
EZY Books is a publishing company that is dedicated and specialized in making of customized
books. There are main agendas to come up with networking system that will enable the
employees to communicate easily, freely and defiantly within the network and even with the
constituent branches located at Sydney. They hope to have a future proof network
infrastructure deployed into their organization with the aim of easy and efficient connection of
all devices, office staff, partners and customers within the same communication channel.
Page | 1

EZY Books Network Design
Contents
Introduction..............................................................................................................................................3
Topic 1: The Structured Cabling.....................................................................................................3
Topic 2: IP addressing and planning.............................................................................................4
Topic 3: Essential Network Services.............................................................................................6
Topic 4: Network Security................................................................................................................7
Conclusion...............................................................................................................................................7
References...............................................................................................................................................8
Page | 2
Contents
Introduction..............................................................................................................................................3
Topic 1: The Structured Cabling.....................................................................................................3
Topic 2: IP addressing and planning.............................................................................................4
Topic 3: Essential Network Services.............................................................................................6
Topic 4: Network Security................................................................................................................7
Conclusion...............................................................................................................................................7
References...............................................................................................................................................8
Page | 2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

EZY Books Network Design
Introduction
Planning a network mainly focuses on the topology and arrangement in which they are
arranged. It is immersivelty referred to as complex since we limit ourselves to designing small
and medium size network. The information networks of the computers are a main reason that
leads to successful sharing of resources as well as communication. It links people, supports
services and applications. In this assignment, we are going to focus mainly on the significant
issues faced when planning and designing an internetwork infrastructure.
EZY Books is a specialized publisher for customized books services based in Brisbane. They have
recently opened up a constituent branch that has the marketing team, Human Resource and
other managerial duties. These offices comprise of 20 computers that are available and 2
servers. The first floor has the Editorial, Design and Photography team with 20 computers and 1
allocated server. EZY Books has also settled business in Sydney team with a marketing team of 8
employees and they are allocated 10 computers on a leased office.
The main aim of the network is to set up a communication channel that enables one to interact
freely within the network. The interactions include file sharing and use of resources such as
printers and the webmail for intranet communication within the organization. The branch
network simply interlinks the connectivity of various networking segments in the topology
without the devices and communication around the area. Then, the branch will be rendered
functional since there is no way it can access data information and services while the isp is
down or one of the distributors have spoilt it in one way or another. Here, the designed
network is supposed to meet and attain certain operational and business objectives that are
functional. They include:
1. The network should provide secure services to the organization. It should be
geographically and functionally isolated to deny access to unregistered people to reduce
the danger of unauthorized users.
2. The development of the network structure is with exterior walls. The equipment and
network introduced in the market will be new. Design used will be IPS.
3. The network ought to enable its users to retrieve, process and store data entailing the
company’s operations, billing, accounting as well as tracking.
4. The network plan must be scalable so that incase additional network cables are
required, they can be introduced easily without redoing the whole network installation
process.
5. The users intended to use the network will be two, that is, the administrators or the
owners and the full time employees. (Browne, Valente & Hariri, 2009)
Page | 3
Introduction
Planning a network mainly focuses on the topology and arrangement in which they are
arranged. It is immersivelty referred to as complex since we limit ourselves to designing small
and medium size network. The information networks of the computers are a main reason that
leads to successful sharing of resources as well as communication. It links people, supports
services and applications. In this assignment, we are going to focus mainly on the significant
issues faced when planning and designing an internetwork infrastructure.
EZY Books is a specialized publisher for customized books services based in Brisbane. They have
recently opened up a constituent branch that has the marketing team, Human Resource and
other managerial duties. These offices comprise of 20 computers that are available and 2
servers. The first floor has the Editorial, Design and Photography team with 20 computers and 1
allocated server. EZY Books has also settled business in Sydney team with a marketing team of 8
employees and they are allocated 10 computers on a leased office.
The main aim of the network is to set up a communication channel that enables one to interact
freely within the network. The interactions include file sharing and use of resources such as
printers and the webmail for intranet communication within the organization. The branch
network simply interlinks the connectivity of various networking segments in the topology
without the devices and communication around the area. Then, the branch will be rendered
functional since there is no way it can access data information and services while the isp is
down or one of the distributors have spoilt it in one way or another. Here, the designed
network is supposed to meet and attain certain operational and business objectives that are
functional. They include:
1. The network should provide secure services to the organization. It should be
geographically and functionally isolated to deny access to unregistered people to reduce
the danger of unauthorized users.
2. The development of the network structure is with exterior walls. The equipment and
network introduced in the market will be new. Design used will be IPS.
3. The network ought to enable its users to retrieve, process and store data entailing the
company’s operations, billing, accounting as well as tracking.
4. The network plan must be scalable so that incase additional network cables are
required, they can be introduced easily without redoing the whole network installation
process.
5. The users intended to use the network will be two, that is, the administrators or the
owners and the full time employees. (Browne, Valente & Hariri, 2009)
Page | 3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

EZY Books Network Design
Topic 1: The Structured Cabling
Ethernet cables are the most preferable cables that are mostly relied in setting up a network.
They are cables that are connected to the device interface to facilitate communication between
two or more devices. Ethernet are simple divide in the way they can work and there duplex
mode.
There is the Gigabit Ethernet with a speed of up to 1000 mbps. They work in half duplex
through hubs and are not typical. In general, all applications are full duplex through the switch,
half-duplex operation on the stop and wait command.
Full Duplex communication operates on simultaneous communication. There are also fast
Ethernet cables used in the same network access method (CSMA/CD) since it provides a
transmission speed of up to 10Mbps. Sometimes it can reach up to 100Mbps. On setting up a
NIC card, one must consider some certain factors for efficient and effective communication in
the network. (Trulove, 2015)
Topic 2: IP addressing and planning
The Internet Service Providers will dedicate a public ip4 address of 120.154.191.2 with a subnet
mask of 255.255.255.0 and a gateway of 120.154.19.1 that will show the interface of between
the internet service providers and the EZY Router R1
Upon the entry of the network provided by the ISP to the internal network of the branch, the
network will be separated into subnet that ideally means that the network will be segmented
into separate sections of 3. The ip address will be of class c and the address will 192.168.1.0/24,
192.168.2.0/24, 192.168.3.0/24. On every subnet, a computer will be assigned and will be
configured to the available ip address in regard to the subnets respectively. (Comer & Droms,
2013)
Page | 4
Topic 1: The Structured Cabling
Ethernet cables are the most preferable cables that are mostly relied in setting up a network.
They are cables that are connected to the device interface to facilitate communication between
two or more devices. Ethernet are simple divide in the way they can work and there duplex
mode.
There is the Gigabit Ethernet with a speed of up to 1000 mbps. They work in half duplex
through hubs and are not typical. In general, all applications are full duplex through the switch,
half-duplex operation on the stop and wait command.
Full Duplex communication operates on simultaneous communication. There are also fast
Ethernet cables used in the same network access method (CSMA/CD) since it provides a
transmission speed of up to 10Mbps. Sometimes it can reach up to 100Mbps. On setting up a
NIC card, one must consider some certain factors for efficient and effective communication in
the network. (Trulove, 2015)
Topic 2: IP addressing and planning
The Internet Service Providers will dedicate a public ip4 address of 120.154.191.2 with a subnet
mask of 255.255.255.0 and a gateway of 120.154.19.1 that will show the interface of between
the internet service providers and the EZY Router R1
Upon the entry of the network provided by the ISP to the internal network of the branch, the
network will be separated into subnet that ideally means that the network will be segmented
into separate sections of 3. The ip address will be of class c and the address will 192.168.1.0/24,
192.168.2.0/24, 192.168.3.0/24. On every subnet, a computer will be assigned and will be
configured to the available ip address in regard to the subnets respectively. (Comer & Droms,
2013)
Page | 4

EZY Books Network Design
The ip addressing table is based on the network that is layed down and the configuration across
the network.
Device Interface IP Address Subnet Mask Default
Gateway
ISP Se2/0 120.154.191.1 255.255.255.0 N/A
R1 Se2/0(DCE) 120.154.191.2 255.255.255.0 N/A
Se3/0 192.168.0.1 255.255.255.0 N/A
Fa0/0 192.168.1.1 255.255.255.0 N/A
R2 Se2/0(DCE) 192.168.0.2 255.255.255.0 N/A
Fa0/0 192.168.2.1 255.255.255.0 N/A
Fa1/0 192.168.3.1 255.255.255.0 N/A
PC1 NIC 192.168.1.2 255.255.255.0 192.168.1.1
PC2 NIC 192.168.2.2 255.255.255.0 192.168.2.1
PC3 NIC 192.168.3.2 255.255.255.0 192.168.3.1
Page | 5
The ip addressing table is based on the network that is layed down and the configuration across
the network.
Device Interface IP Address Subnet Mask Default
Gateway
ISP Se2/0 120.154.191.1 255.255.255.0 N/A
R1 Se2/0(DCE) 120.154.191.2 255.255.255.0 N/A
Se3/0 192.168.0.1 255.255.255.0 N/A
Fa0/0 192.168.1.1 255.255.255.0 N/A
R2 Se2/0(DCE) 192.168.0.2 255.255.255.0 N/A
Fa0/0 192.168.2.1 255.255.255.0 N/A
Fa1/0 192.168.3.1 255.255.255.0 N/A
PC1 NIC 192.168.1.2 255.255.255.0 192.168.1.1
PC2 NIC 192.168.2.2 255.255.255.0 192.168.2.1
PC3 NIC 192.168.3.2 255.255.255.0 192.168.3.1
Page | 5
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

EZY Books Network Design
Topic 3: Essential Network Services
Internet Access Technologies enable the exchange of information and data through the
protocol suite. The intercommunication of the internet enabled devices and the internet is
initiated/triggered through the technology of data transmission communication. They majorly
focus on the automatic ip assignment being dedicated across the network and the private
network conversion. (Guttman, 2009)
Dial up Internet Access. It uses the modulation and demodulation technology of telephone
lines. This on the other had is regarded to as old fashion technology (Analog). This is due to
slow and unreliable connectivity speed. It is on the other hand least expensive if one is working
on limited funds.
DSL (Digital Subscribed Loops). This is more similar to the Dial up technology only that this
ensures Asymmetric Digital Subscriber Line (ADSL). This allows the conveyance of internet and
telephone on massed on the same line.
Cable Internet. It provides a high bandwidth cable to transmit internet to residential area. This
is among the most preferred in the context.
Wireless Broadband (WiBB). This is the modest internet access technology allowing the
conveyance of high-speed internet within a large range area. It uses the microwave technology
where there is the transmitter and the receiver on the other end. The waves are then
demodulated and behold you have internet.
Integrated Service Digital Network (ISDN). It ensures the conveyance of better communication
and data transmission along a telephone line reducing information lost along the way.
Ethernet. This is the most widely distributed local area network since it provides a transmission
speed of up to 10Mbps. Sometimes it reaches up to 100Mbps. (Stockebrand, 2011)
Page | 6
Topic 3: Essential Network Services
Internet Access Technologies enable the exchange of information and data through the
protocol suite. The intercommunication of the internet enabled devices and the internet is
initiated/triggered through the technology of data transmission communication. They majorly
focus on the automatic ip assignment being dedicated across the network and the private
network conversion. (Guttman, 2009)
Dial up Internet Access. It uses the modulation and demodulation technology of telephone
lines. This on the other had is regarded to as old fashion technology (Analog). This is due to
slow and unreliable connectivity speed. It is on the other hand least expensive if one is working
on limited funds.
DSL (Digital Subscribed Loops). This is more similar to the Dial up technology only that this
ensures Asymmetric Digital Subscriber Line (ADSL). This allows the conveyance of internet and
telephone on massed on the same line.
Cable Internet. It provides a high bandwidth cable to transmit internet to residential area. This
is among the most preferred in the context.
Wireless Broadband (WiBB). This is the modest internet access technology allowing the
conveyance of high-speed internet within a large range area. It uses the microwave technology
where there is the transmitter and the receiver on the other end. The waves are then
demodulated and behold you have internet.
Integrated Service Digital Network (ISDN). It ensures the conveyance of better communication
and data transmission along a telephone line reducing information lost along the way.
Ethernet. This is the most widely distributed local area network since it provides a transmission
speed of up to 10Mbps. Sometimes it reaches up to 100Mbps. (Stockebrand, 2011)
Page | 6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

EZY Books Network Design
Topic 4: Network Security
Access control- by simply setting up a login and passphrase key keeps hackers and attackers
away. One needs to be aware of the security feature and level being laid up. Also by enforcing
security policies, one can keep out the non-compliant away from the endpoint by laying up the
limited access
Antivirus software- Malicious software such as viruses and worm can crawl into the network,
tap a machine and cripple it. At given times malware may also cripple the network and render it
useless for several days.
Firewalls – this simply a setup barrier between trusted internal network and others by simply
setting up rules and regulations that govern the network. It can either be software based or
even hardware. They set defined rules to control the traffic flow within the network. (Brunetti
et al., 2011)
Conclusion
In conclusion, we finally see that the network is successfully setup with consideration of the
service they provide and focusing on the objectives that were set before starting the project. I
can herby say that the network is functional.
Page | 7
Topic 4: Network Security
Access control- by simply setting up a login and passphrase key keeps hackers and attackers
away. One needs to be aware of the security feature and level being laid up. Also by enforcing
security policies, one can keep out the non-compliant away from the endpoint by laying up the
limited access
Antivirus software- Malicious software such as viruses and worm can crawl into the network,
tap a machine and cripple it. At given times malware may also cripple the network and render it
useless for several days.
Firewalls – this simply a setup barrier between trusted internal network and others by simply
setting up rules and regulations that govern the network. It can either be software based or
even hardware. They set defined rules to control the traffic flow within the network. (Brunetti
et al., 2011)
Conclusion
In conclusion, we finally see that the network is successfully setup with consideration of the
service they provide and focusing on the objectives that were set before starting the project. I
can herby say that the network is functional.
Page | 7

EZY Books Network Design
References
Browne, R., Valente, J. and Hariri, S., 2009. An advanced middleware architecture for secure
and survivable mobile C4I systems. In Military Communications Conference Proceedings, 2009.
MILCOM 2009. IEEE (Vol. 1, pp. 506-513). IEEE.
Brunetti, J.A., Chakrabarti, K., Ionescu-Graff, A.M., Nagarajan, R. and Sun, D., 2011. Open
network quality of service and bandwidth control: Use cases, technical architecture, and
business models. Bell Labs technical journal, 16(2), pp.133-152.
Comer, D.E. and Droms, R.E., 2013. Computer networks and internets. Prentice-Hall, Inc..
Guttman, E., 2009. Service location protocol: Automatic discovery of IP network services. IEEE
Internet Computing, 3(4), pp.71-80.
Stockebrand, B., 2011. Essential Network Services. IPv6 in Practice: A Unixer’s Guide to the Next
Generation Internet, pp.81-102.
Trulove, J., 2015. LAN wiring. McGraw-Hill, Inc..
Page | 8
References
Browne, R., Valente, J. and Hariri, S., 2009. An advanced middleware architecture for secure
and survivable mobile C4I systems. In Military Communications Conference Proceedings, 2009.
MILCOM 2009. IEEE (Vol. 1, pp. 506-513). IEEE.
Brunetti, J.A., Chakrabarti, K., Ionescu-Graff, A.M., Nagarajan, R. and Sun, D., 2011. Open
network quality of service and bandwidth control: Use cases, technical architecture, and
business models. Bell Labs technical journal, 16(2), pp.133-152.
Comer, D.E. and Droms, R.E., 2013. Computer networks and internets. Prentice-Hall, Inc..
Guttman, E., 2009. Service location protocol: Automatic discovery of IP network services. IEEE
Internet Computing, 3(4), pp.71-80.
Stockebrand, B., 2011. Essential Network Services. IPv6 in Practice: A Unixer’s Guide to the Next
Generation Internet, pp.81-102.
Trulove, J., 2015. LAN wiring. McGraw-Hill, Inc..
Page | 8
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.