University IT Network Design and Implementation Report: Security

Verified

Added on  2020/03/13

|7
|1420
|74
Report
AI Summary
This report delves into the critical aspects of network design and implementation, focusing on creating a secure and efficient corporate network. It emphasizes three core principles: modularity, hierarchy, and resiliency. The report breaks down the hierarchical structure into three layers: access, distribution, and core, detailing their respective functions and importance. It also discusses the significance of modularity for network flexibility and scalability. Furthermore, the assignment explores the concept of resiliency, highlighting its role in ensuring network stability under both normal and abnormal conditions, including hardware failures and security threats. The report concludes by providing practical steps for successful network design and implementation, with a strong emphasis on security measures such as firewalls and strategic routing. The report also highlights how these principles contribute to building a robust and adaptable network infrastructure capable of supporting business productivity and competitiveness.
Document Page
Running head: IT
IT
Name of Student
Name of University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1IT
Introduction
The following assignment discusses the topic Network design and Implementation of a
secure corporate network. The assignment focuses on the three principles for successful
architecture of network that is modularity, hierarchy, and resiliency. The assignment further
discusses the hierarchy and its three layers. Those are the access layer, distribution layer and the
core layer respectively. The assignment finally discusses ways for the successful network design
and implantation that includes security.
Discussion
The network technology has helped the business to increase their productivity and helped
to gain the competitive advantage in the market. Since the time the internet has been invented the
network system had evolved and become the key element in business network infrastructure [1].
There are three categories of the network known as the LAN(local area network) used in a
premises or a organization, MAN(metropolitan area network) used in geographic area mainly a
city, WAN(wide area network) used to various LANs if they are in different cities. The
organization generally prefers LAN over others.
For the efficient and continuous exchange of data between the departments of the
company it requires a design a successful architecture of the network, to obtain a successful
architecture it requires a perfect design theory and related principles [2]. The architecture design
overview and the related principles depend on the four engineering and architectural principles,
which are: modularity, hierarchy, and resiliency.
Document Page
2IT
Hierarchy
Hierarchy is the principle key for the successful architecture of a company network.
Hierarchy means to rank the particular set of the systems according to its rank or authority.
Through hierarchy the complex design models of the network is fragmented into the simpler and
the more efficient network into different levels [3]. Each level is then assigned for specific
function. The benefit of this process is it allows network designers flexibility in the network
system and allows to select the right equipment be it a hardware or software that has the ability
performing specific tasks in each of the network layers. The fundamental network design that is
the hierarchical design is made of three layers. These are: access layer, distribution layer and the
core layer respectively.
Core layer
It is the critical layer of the hierarchical model as it is concerned with the high speed and
effective redundant forwarding of the data so that the data packets can move fast and efficiently
between the distribution layers. The example of the core layer is the “10 Gigabit Ethernet”.
Distribution layer
The distribution layer of the hierarchical model is considered to be the smart layer as it is
concerns with filtering, routing and the “Quality of the services” policies [4]. The other function
of the distribution layer is that it manages the WAN connection of the different branch of the
organization.
Access layer
Document Page
3IT
The access layer of the hierarchical model connects the companies through their servers
and the end stations. The main focus of the access layer is to minimize the investment that the
company takes for each provisioned Ethernet port which is known as "cost-per-port", it connects
the client nodes and therefore it is also called the desktop layer.
Modularity
After applying the hierarchical model to build network architecture the next principle is
modularity. Modularity means to apply a module on the basis of design. Huge network
architecture projects are made of various modules and fileds [8]. All the individual areas requires
to be planned in a top-down manner following the redundancy and hierarchy in a systematic
manner. Using modular design architecture it provides the option of network flexibility that
provides more options for the changing business needs [5]. The result of the network flexibility
in the modular layer provides modification and up gradations that will be applied in a more
organised way.
Resiliency
The last principle of efficient network design is the resiliency. Resiliency means to
recover quickly from the difficulty. The two principles modularity, hierarchy are the important
part of the successful network design but these two principles are still not enough to provide the
flexibility and scalability to the network. Hence to complete the requirement resiliency is also
needed in network architecture. A fundamental feature of the resiliency principle is the ability to
perform in both normal and abnormal conditions [6]. The abnormal conditions may include the
failure of hardware and software, huge traffic loads, unusual traffic problems, denial-of-service
(Does) or any such events whether done intentional or unintentional or any unplanned event.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4IT
Ways for the successful network design and implantation
Following are the simple steps which can be implemented to make the network stable, secure and
last enough to implement the new services [7].
Security
The foremost and important factor of establishing a better network is the best security for
its data. The company should install a powerful firewall for it network in order to protect its
confidential data [8].
Routing where Needed
Router is an important part of the network design where it helps to solve the connectivity
problems. However, it may increase the problems than its reduction. In addition, the way it
increases the network speed that is not measurable at many times. This complex distribution of
routing leads towards the problems regarding its security and the way it is managed.
Conclusion
From this assignment it can be concluded that to design an efficient architecture of the
network of the company for continuous exchange of data between the departments of the
company, three principles must be followed which are modularity, resiliency and hierarchy. The
modularity and hierarchy are concerned with fragmenting of the network into the simpler and the
more efficient form and providing these network flexibility and scalability. The resilience part of
the network is concerned with functionality of the network in both normal and abnormal
condition. The assignment further concludes that for the network to be last long and function
successfully it should also focus on the network security.
Document Page
5IT
Document Page
6IT
References
1. Ramamurthy B. Design of optical WDM networks: LAN, MAN and WAN architectures.
Springer Science & Business Media; 2012 Dec 6.
2. Reymann AC, Boujemaa-Paterski R, Martiel JL, Guérin C, Cao W, Chin HF, Enrique M,
Théry M, Blanchoin L. Actin network architecture can determine myosin motor activity.
Science. 2012 Jun 8;336(6086):1310-4.
3. Wolf T, Griffioen J, Calvert KL, Dutta R, Rouskas GN, Baldine I, Nagurney A. Choice
as a principle in network architecture. ACM SIGCOMM Computer Communication
Review. 2012 Sep 24;42(4):105-6.
4. Jin J, Gubbi J, Luo T, Palaniswami M. Network architecture and QoS issues in the
internet of things for a smart city. InCommunications and Information Technologies
(ISCIT), 2012 International Symposium on 2012 Oct 2 (pp. 956-961). IEEE.
5. Luo J, Baldwin CY, Whitney DE, Magee CL. The architecture of transaction networks: a
comparative analysis of hierarchy in two sectors. Industrial and Corporate Change. 2012
Mar 15;21(6):1307-35.
6. Sterbenz JP, Çetinkaya EK, Hameed MA, Jabbar A, Qian S, Rohrer JP. Evaluation of
network resilience, survivability, and disruption tolerance: analysis, topology generation,
simulation, and experimentation. Telecommunication systems. 2013 Feb 1;52(2):705-36.
7. Mincher RW, Butler DG, Young RD, Mader TB, inventors; Amazon Technologies, Inc.,
assignee. Secure wireless network credential sharing. United States patent US 9,301,141.
2016 Mar 29.
8. John P, inventor; VMware, Inc., assignee. Secure enterprise network. United States
patent US 8,166,554. 2012 Apr 24.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]