ITC306 Project: Globex Corporation Network Design Document

Verified

Added on  2022/08/18

|16
|2400
|15
Report
AI Summary
This document presents a network design for Globex Corporation, a company offering tools and agricultural services. The project aims to implement a cloud-based system to enhance remote access and data centralization across multiple branches. The report details the project goals, which include improved customer access and flexibility, leveraging modern technologies. The logical design includes a network diagram, addressing and naming structure, routing protocols (OSPF), and security measures such as firewalls (Cisco) and VPNs. The physical design outlines network topology (mesh), LAN and WAN technologies, and server/PC requirements for each branch. The report addresses Virtual LANs (VLANs), Wireless Networks, QoS Design and Network Management. The document also includes references to relevant research papers and technologies to support the proposed network design. The design focuses on mitigating risks, enhancing security, and ensuring efficient data access for employees and customers. The implementation includes Cisco firewalls, VPNs, VLANs, and QoS to optimize network performance and security.
Document Page
Network Design Document
Project Client Organisation:
Contact:
System Name <<To be created by team and client>>
Date of Design
Document
<<Date of this version>>
Document Status Draft / Approved <<delete one>>
Document
Reference
<<FileName.doc>>
Version Number Version 1<<update as necessary, in whole
numbers>>
Prepared by <<Technical Writer>>
Team Members << Names of other team members>>
4622157372739179733.docx 1 of 16
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1. Change History
All changes to the Design Document must be recorded in the Change History.
Date Description of
Change
Reason for
Change
Author of
Change
Version No.
dd/mm/yyyy Initial draft N/A Version 1
4622157372739179733.docx 2 of 16
Document Page
2. Table of Contents
1. CHANGE HISTORY..............................................................................................................................2
2. TABLE OF CONTENTS........................................................................................................................3
3. EXECUTIVE SUMMARY.....................................................................................................................4
4. PROJECT GOALS..................................................................................................................................4
5. LOGICAL DESIGN................................................................................................................................4
5.1. LOGICAL NETWORK DIAGRAM.........................................................................................................4
5.2. ADDRESSING AND NAMING STRUCTURE..........................................................................................4
5.3. ROUTING AND SWITCHING PROTOCOLS...........................................................................................4
5.4. SECURITY..........................................................................................................................................4
5.5. VIRTUAL LANS................................................................................................................................4
5.6. WIRELESS NETWORKS......................................................................................................................5
5.7. QOS DESIGN.....................................................................................................................................5
5.8. NETWORK MANAGEMENT................................................................................................................5
6. PHYSICAL DESIGN..............................................................................................................................5
6.1. NETWORK TOPOLOGY.......................................................................................................................5
6.2. LAN TECHNOLOGIES........................................................................................................................5
6.3. WAN TECHNOLOGIES.......................................................................................................................5
6.4. PHYSICAL NETWORK DIAGRAM.......................................................................................................5
6.5. MINIMAL SERVER AND PC REQUIREMENTS......................................................................................5
6.6. WIRELESS TECHNOLOGIES................................................................................................................5
7. References..................................................................................................................................................5
4622157372739179733.docx 3 of 16
Document Page
3. Executive Summary
Use of modern computing technology is getting more sophisticated. So companies
and customers dream about new and high expectations. That changes the working of old
file system. Advancement of technology allows impact on company and customers. There
are number of companies in market and there are different types of completion between
them. Rapid access to critical information and the ability to get quick result will help
company to grow up in the market. This also helps company a competitive advantage in
different fields like accounting and service environment.
This project is about Globex that offers various types of tools and agriculture services
to clients and farmers. Globex requires a cloud based system that helps their employees to
access data from any location using sensor and devices. Now Globex has various branches
in different areas. So according to employees and customers of Globex, they waste time to
visit each other. So the organization requires a system based on cloud.
Network design involves an upgrade to existing network. The design must consist of
mitigation of risk and less risk of data loss. The old system of Globex can support many
users at a time and the users are vulnerable to attacks and the data is not secure.
4. Project Goals
The Customers need greater admittance and more flexibility and with the help of new
cloud system, Globex can offer better services to their customers. Globex is aware of new
technologies and they know that customer need more services. Internet technology
maximizes competition between various companies. So according to Globex, their Project
goals will be:
Remote access to accounts: remote terminal at customer site connect to servers utilising
internet that enable clients to make enquiries online without visiting offices.
Anytime access: by using new network, the employees of the company can access data
or questions from any location.
As data is centralized, so updates will be easily available which minimizes wastage of
time.
5. Logical Design
4622157372739179733.docx 4 of 16
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5.1. Logical Network Diagram
5.2. Addressing and naming structure
The main Network is: 172.18.8.0/22
The IP addresses those are available in the major network include: 1022
Number of IP addresses that are required: 1008
IP addresses those are available in assigned subnets: 1016
About 100% of major network address space those are available is utilised
About 99% of sub netted network space of address is utilized
Subnet
Name
Needed
Size
Allocated
Size
Address Mask Dec Mask Assignable
Range
Broadcast
Albury 252 254 172.18.8.0 /24 255.255.255.0 172.18.8.1 -
172.18.8.254
172.18.8.255
Griffith 252 254 172.18.9.0 /24 255.255.255.0 172.18.9.1 -
172.18.9.254
172.18.9.255
Orange 252 254 172.18.10.0 /24 255.255.255.0 172.18.10.1 -
172.18.10.254
172.18.10.255
Wagga
Wagga
252 254 172.18.11.0 /24 255.255.255.0 172.18.11.1 -
172.18.11.254
172.18.11.255
5.3. Routing and Switching Protocols
It is main part of project and following are various areas that are to be considered:
In our project we are going to use a system that is based on cloud (Hasan, Al-Rizzo & Al-
Turjman, 2017). The four routers are connected using OSPF that is the popular protocols of
routing that are based on standards. The advantage of OSPF is that if any changes happens
in the routers then it can automatically adapt to the changes. There are two types of routing
protocols. These include classless routing protocols and classful routing protocols. All the
devices or computers are connected to cloud system using internet.
4622157372739179733.docx 5 of 16
Document Page
5.4. Security
Networking field in computer involves securing a network. It is handled by a network
administrator and a system administrator (Fisch, White & Pooch, 2017). They help to save
network from unauthorized access and also ensure that employees have their access to
network.
Common network security threats are
Spyware
Adware
Virus
Worms
Hacker attack
Identity theft
Denial of services attack
Network security refers to safeguard data from outer attack so that data is not
misused. Security depends on various layers of protection that include security in both
hardware and software (Acemoglu, Malekian & Ozdaglar, 2016). Different security
measures that can be used are:
Firewall: Firewall help to secure network against attacks on application layer including
browser. There are different types of firewall available that help to secure application
layer.
Cisco firewall: CISCO firewall is a good solution that is certifies by EAL4.
It safeguards network resources by using routing capabilities that provides threat
mitigation of worms and viruses
These devices use less power and reduce power consumption.
These firewall offer different options and can be used in WAN, LAN, VLAN. They
also provide policy based access control.
A key feature of Cisco includes:
Integrated ports
High speed WAN interface
DSP slots
Internal service module
Benefits of using Cisco
Cisco provides increased level of service integration with voice, video and security.
They provide greater efficiency and are cost saving
4622157372739179733.docx 6 of 16
Document Page
Larger memory of devices helps to support new capabilities in system.
It enables new operational models that allow reducing capital expenditure.
Devices are designed to address customer business requirements.
Architectural benefits and features
Cisco provide different type of slots to add connectivity that can be used in different
branch offices
Cisco series are powered by high speed processors to support high speed network
USB ports allow connectivity of different devices that does not have serial ports.
VPN
A virtual private network is a network that is created utilising wires of public usually
the internet in order to connect users those are remote or regional offices to a private or
internet network of a company (Cho et al., 2019). Larger corporation like Globex use VPN
technology to provide remote access to clients and employees. VPN connects different
WAN and creates a single network. VPN uses authentication to gain access to network
VPN can be used in order to access region websites those are restricted; protect activity of
browsing from snooping on public Wi-Fi.
5.5. Virtual LANs
VLAN allow network administrator to group host when they are not connected to same
network As VLAN can be configured through network software so it helps to simplify
network design and it will be easy to deploy network (Abdullah, 2016). As Globex has
three offices that are located at Albury, Wagga Wagga and Griffith. So they need a Virtual
LAN. Without using a Virtual LAN they require different network management team at
various offices that maximizes number of employees and labour. VLAN also offers better
security and minimizes need of hardware. Griffith has a VLAN which are utilised by their
main department.
4622157372739179733.docx 7 of 16
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5.6. Wireless Networks
Wireless network permits devices to connect with network, for example mobile
devices connected to wifi. In many cases it is seen that wifi minimizes the security and
maximizes risk of data breaching (Sarkar, Basavaraju & Puttamadappa, 2016). Mobile
devices or smart devices are not secured. So there are number of risks in using wireless
networks. So Globex has not installed wireless network.
5.7. QoS Design
QoS or Quality of Service prioritizes traffic in a network so that traffic with high
priority can pass first through network. Globex want to use QoS service at their Griffith
office (Ahson & Ilyas, 2018). It makes sure that efficiency of network that ensures that
critical application has always good assets and help to minimize cost and upgrade
experience of user.
5.8. Network Management
Network management is the procedure of administrating computer assets so that
they are used efficiently. It includes fault analysis, quality of service, performance
management and many more. Objectives of network management include network
availability and security. Network management is required in traffic management and
traffic measurement. It also helps to detect violations of network security.
6. Physical Design
6.1. Network Topology
The network structure of Globex is easy and simple to establish. They use LAN
technology to connect their office devices and uses WAN to connect with cloud (Tedik
Basaran et al., 2019). So they use mesh topology in network. Mesh technology is easy to
setup and is less costly as compared to other technologies.
6.2. LAN technologies
LAN is used in order to connect computer or devices in an area. Globex uses LAN at
their three offices (Gaj et al., 2016). All of their devices in offices like printers and
computers are connected using LAN.
4622157372739179733.docx 8 of 16
Document Page
6.3. WAN technologies
Globex has three offices that are connected to cloud server using WAN. A Wide Area
Network is a geographically private network those are distributed that connects more than
one local area networks (Mermer & Zeydan, 2017). In a business, a WAN includes
connections to a headquarters, branch offices, and cloud services of a Company.
6.4. Physical Network Diagram
6.5. Minimal server and PC requirements
Albury
dedicated machine running hyperv/esxi (Core i3/5/7 + 8GB) or 2 dedicated machines
(corei3 +2/4GB) or non dedicated machine (Corei7 + 16GB)
dedicated machine
running hyperv/esxi (Core i3/5/7 + 8GB) or 2 dedicated machines (corei3 +2/4GB) or non
dedicated machine (Corei7 + 16GB)
Griffith
2 machines (corei5 + 4GB) One for each host non dedicated machine (Corei7 + 16GB)
4622157372739179733.docx 9 of 16
Document Page
7. Windows Server 2012 Installation
4622157372739179733.docx 10 of 16
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4622157372739179733.docx 11 of 16
Document Page
4622157372739179733.docx 12 of 16
Document Page
4622157372739179733.docx 13 of 16
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4622157372739179733.docx 14 of 16
Document Page
4622157372739179733.docx 15 of 16
Document Page
8. References
Abdullah, S. A. (2016). Simulation of Virtual LANs (VLANs) Using OPNET. IOSR
Journal of Electronics and Communication Engineering (IOSR-JECE), 11(6), 67-80.
Acemoglu, D., Malekian, A., & Ozdaglar, A. (2016). Network security and
contagion. Journal of Economic Theory, 166, 536-585.
Ahson, S. A., & Ilyas, M. (Eds.). (2018). WiMAX: technologies, performance analysis,
and QoS. CRC press.
Cho, J., Gazdag, S. L., von Gernler, A., Grießer, H., Grundner-Culemann, S., Guggemos,
T., ... & Loebenberger, D. (2019). Towards Quantum-resistant Virtual Private
Networks. crypto day matters 31.
Fisch, E. A., White, G. B., & Pooch, U. W. (2017). Computer system and network security.
CRC press.
Gaj, T., Sirk, S. J., Shui, S. L., & Liu, J. (2016). Genome-editing technologies: principles
and applications. Cold Spring Harbor perspectives in biology, 8(12), a023754.
Hasan, M. Z., Al-Rizzo, H., & Al-Turjman, F. (2017). A survey on multipath routing
protocols for QoS assurances in real-time wireless multimedia sensor networks. IEEE
Communications Surveys & Tutorials, 19(3), 1424-1456.
Mermer, G. B., & Zeydan, E. (2017, May). A comparison of LP-WAN technologies: An
overview from a mobile operators' perspective. In 2017 25th Signal Processing and
Communications Applications Conference (SIU) (pp. 1-4). IEEE.
Sarkar, S. K., Basavaraju, T. G., & Puttamadappa, C. (2016). Ad hoc mobile wireless
networks: principles, protocols, and applications. CRC Press.
Tedik Basaran, S., Karabulut Kurt, G., & Kschischang, F. R. (2019). Wireless Network
Reliability Analysis for Arbitrary Network Topologies. arXiv preprint
arXiv:1904.12736.
4622157372739179733.docx 16 of 16
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]