Data Networks: Design, Implementation, and Security

Verified

Added on  2025/08/25

|3
|714
|484
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
Network Design
Assessment item 3
In this assignment we will get to know about networks and the requirements of setting up a
network which consist of Pcs, switches, servers and the routers using dynamic protocols, it is
consist of different steps to be followed in order to setup the network first does the
configuration management with the help of a centralized GUI, after which it secures the system
from any outsider by maintaining a real time change management which tell about the any
unauthorized changes after which a compliances auditing is done which any shortcoming of the
device is analyzed and recovered which is followed by configuration of tasks automatically and
tracking of users activity while supporting from multi vendors is done (Higgins,2019).
(Davis, 2019) Requirements of IP addressing is analyzed which involves making it core to the
design of network providing base for all other networks services provided to users without
which it wouldn’t be possible to interact with them while avoiding overlapped, duplicate subnet
as well as managing pointless convolutions, then we will be able to determine the necessities
of IP routing which not only involves knowing the IP address but requires a proper steps to be
followed to do a proper routing in order to fulfill all the needs and requirements after which it is
determined how network configurations is determined through internetworking devices which
provides a connection between two totally different segments or nodes through some specific
devices which are similar to routers or gateways. Enabling communication is done through
designing a phase with similar logic for communication or similar protocol which is TCP (Tranfer
Control protocol) or an Internet protocol (IP) (Dunbar, 2015).
Flowing of data through internet will also be analyzed which is done by packets, making small
small data packets and then sending them to their respective destinations ,these packets when
made will include a wrapper with a proper header as well as a footer explaining everything
about the packet and the information contained in it, while also explaining about how it will fit
with other data packets, what its source was and what it destination will be everything is
explained and written on the wrapper itself. This principle is followed by all the data that is
being transferred from one place to other which also help data to be managed effectively as if
one path gets choked due to heavy traffic then other path could be taken it is completely
different from the conventional method which only had one path, and if it gets choked then
entire system will be blocked and no communication and transferring of data from one place
to other could be done, not only the packets content are determines but also it could be
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
analyzed which packet is missing in the order referencing from other packets which are
obtained while giving message to the machine about the missing data packet and requesting
them to send again over the network( Raza,2017).
At the end we would be able to estimate the selection of application and protocols which can
be used to tranfer data across the internet quickly as possible which depends on some question
and then jumping to conclusion which would be determine the selection of protocol.
(Zhang,2017).
Document Page
Referencing
Higgins, C. W., Davis, M. E., Martinez, R., O'Sullivan, J. J., Athsani, A., Kalaboukis, C., & Paretti, C.
T. (2019). U.S. Patent Application No. 10/230,803.
Dunbar, L., Xiong, Y., & Yin, G. (2015). U.S. Patent No. 8,937,950. Washington, DC: U.S. Patent
and Trademark Office.
Wang, Y., Zhang, W., Li, X., & Ling, F. (2016). Performance Analysis and Implementation of a
PMIPv6-Based Partially Distributed Mobility Management. International Journal of Multimedia
and Ubiquitous Engineering, 11(7), 69-78.
Bogers, M., Zobel, A. K., Afuah, A., Almirall, E., Brunswicker, S., Dahlander, L., ... & Hagedoorn, J.
(2017). The open innovation research landscape: Established perspectives and emerging
themes across different levels of analysis. Industry and Innovation, 24(1), 8-40.
Raza, M. H., Patel, K. G., Anderson, J. P., Coffey, J. C., Day, M., Day, B. D., ... & Stone, D.
(2017). U.S. Patent Application No. 15/673,050.
Li, R., Zhao, Z., Zhou, X., Ding, G., Chen, Y., Wang, Z., & Zhang, H. (2017). Intelligent 5G: When
cellular networks meet artificial intelligence. IEEE Wireless communications, 24(5), 175-183.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]