High-Level Network Design Report for SME: Addressing and Security
VerifiedAdded on 2021/06/17
|13
|4278
|224
Report
AI Summary
This report presents a high-level network design for a Small to Medium Enterprise (SME), addressing the need to connect multiple geographically dispersed branches to a central headquarters. The report begins with an introduction outlining the project's scope, limitations, and business requirements, including goals such as connecting to universities and ensuring data security. It details the business's goals, constraints, and associated tradeoffs, like maintaining data confidentiality and integrity. The design section includes the logical and physical network designs, network topologies, and the protocols and technologies employed, such as HDLC, PPP, DHCP, NAT, and Ethernet. IP addressing schemes, including IPv4, are provided. Security features, including VPN, and redundancy plans are also discussed. The report concludes with a summary of the findings and a reflection on the technology used.

Running head: NETWORKING SYSTEM
Assignment 1 - High-level design for an SME network
Name of the Student
Name of the University
Author’s Note
Assignment 1 - High-level design for an SME network
Name of the Student
Name of the University
Author’s Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
NETWORKING SYSTEM
Table of Contents
Introduction:...............................................................................................................................................2
Scopes and Limitation of the Project:..........................................................................................................2
Business requirements:...............................................................................................................................3
Goals of the Business and the various constraints:.................................................................................3
Goals and Tradeoffs of the business:.......................................................................................................3
Community of the Users and the applications of the Network:..............................................................4
List of assumptions:.................................................................................................................................4
Solution Design............................................................................................................................................5
Logical Design..........................................................................................................................................5
Physical Design........................................................................................................................................5
Network Topologies................................................................................................................................5
Protocols and Technologies.....................................................................................................................5
IP addressing...............................................................................................................................................7
IPv4......................................................................................................................................................7
IPv6......................................................................................................................................................8
Security and the privacy features:...............................................................................................................9
Redundancy or failover plan:.......................................................................................................................9
Conclusion:................................................................................................................................................10
Referencing:..............................................................................................................................................11
NETWORKING SYSTEM
Table of Contents
Introduction:...............................................................................................................................................2
Scopes and Limitation of the Project:..........................................................................................................2
Business requirements:...............................................................................................................................3
Goals of the Business and the various constraints:.................................................................................3
Goals and Tradeoffs of the business:.......................................................................................................3
Community of the Users and the applications of the Network:..............................................................4
List of assumptions:.................................................................................................................................4
Solution Design............................................................................................................................................5
Logical Design..........................................................................................................................................5
Physical Design........................................................................................................................................5
Network Topologies................................................................................................................................5
Protocols and Technologies.....................................................................................................................5
IP addressing...............................................................................................................................................7
IPv4......................................................................................................................................................7
IPv6......................................................................................................................................................8
Security and the privacy features:...............................................................................................................9
Redundancy or failover plan:.......................................................................................................................9
Conclusion:................................................................................................................................................10
Referencing:..............................................................................................................................................11

2
NETWORKING SYSTEM
Introduction:
The main reason for the preparation of this report by the SME is for creating a connection between
several branches which are located at different geographical locations, with the headquarter. The report
has been prepared after considering the various scopes and goals that the project is having. There exists
various types of requirements for the purpose of meeting with the demands of the organization. The
needs might include the analysis of the different voluntary services of a University. The later section of
the report consist of the proposal in order to obtain solutions which would be very much helpful for
organization to increase its efficiency. The adaptation of a methodology has been done in order to frame
the network infrastructure. The network infrastructure for this particular case is the Top down Network
Design Methodology [1]. The report has also been associated with providing the logical and the physical
model. The report is also associated with providing a detailed information about the cost which is
needed for the purpose of deploying the new solution for the network. After the completion of all this a
test plan has also been proposed which has been provided for eth purpose of analyzing the working
process of the network. Along with this the test plan also helps in analyzing the security aspects which
are associated with the network. The last section of the report consist of the self-reflection about the
technology.
Scopes and Limitation of the Project:
The major scope of the project is the development of the network along with the different network
constraints. Besides all this the scope also includes the increasing of the efficiency of the different
processes which the business conducts. There exists different types of new technologies which are
responsible for making the processes much easier. But selection of the right technology is needed in
order to align the technology with the different requirements of the organizations. By selection of the
right technology development of the efficient network design of the organization is possible [2]. Besides
all this the network solution which would be provided would also be associated with working for the
improvement of the communication which exists between the various branches of the offices that are
situated in different geographical locations. The use of the VPN would also be associated with favoring
the remote access of the various resources of the organization which would be initially responsible for
the increase in the efficiency of the organization [24].
NETWORKING SYSTEM
Introduction:
The main reason for the preparation of this report by the SME is for creating a connection between
several branches which are located at different geographical locations, with the headquarter. The report
has been prepared after considering the various scopes and goals that the project is having. There exists
various types of requirements for the purpose of meeting with the demands of the organization. The
needs might include the analysis of the different voluntary services of a University. The later section of
the report consist of the proposal in order to obtain solutions which would be very much helpful for
organization to increase its efficiency. The adaptation of a methodology has been done in order to frame
the network infrastructure. The network infrastructure for this particular case is the Top down Network
Design Methodology [1]. The report has also been associated with providing the logical and the physical
model. The report is also associated with providing a detailed information about the cost which is
needed for the purpose of deploying the new solution for the network. After the completion of all this a
test plan has also been proposed which has been provided for eth purpose of analyzing the working
process of the network. Along with this the test plan also helps in analyzing the security aspects which
are associated with the network. The last section of the report consist of the self-reflection about the
technology.
Scopes and Limitation of the Project:
The major scope of the project is the development of the network along with the different network
constraints. Besides all this the scope also includes the increasing of the efficiency of the different
processes which the business conducts. There exists different types of new technologies which are
responsible for making the processes much easier. But selection of the right technology is needed in
order to align the technology with the different requirements of the organizations. By selection of the
right technology development of the efficient network design of the organization is possible [2]. Besides
all this the network solution which would be provided would also be associated with working for the
improvement of the communication which exists between the various branches of the offices that are
situated in different geographical locations. The use of the VPN would also be associated with favoring
the remote access of the various resources of the organization which would be initially responsible for
the increase in the efficiency of the organization [24].
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
NETWORKING SYSTEM
Business requirements:
Goals of the Business and the various constraints:
The goals of the business along with the various constraints have been identified in order to develop an
appropriate solution for the SME and all this constraints and goals have been listed below:
Creation of connection with the various universities is considered as one of the main goals of the
organization and besides this the providing of services which are related to the academics of the
university is also included in the list of major goals of the organization. This is done generally for
the purpose of improving the efficiency of the processes related to teaching. Despite of all this
there also exists the need of permission in order to create a connection between the several
branches and the server of the branches [3].
Another major goal includes the providing of safety for the information of the customers along
with maximum amount of security. This is to be also done for the information of the University
as well. The process by which the security and safety can be provided is encryption of the
various communication channels and the database. This is mainly done for the purpose of
avoiding various types of risks and this risks might include theft of the data or the manipulation
of the data. There is a need of selecting a proper encryption algorithm which would be mainly
responsible for working as a major constraint of the encryption [23].
Besides all this the organizations should also have an entire access of the network along with the
network. Additionally there is also a need of limiting the user accessibility for the members of
the organization for the purpose of ensuring the security of the network [4].
Goals and Tradeoffs of the business:
The identified tradeoffs has been listed below which are responsible for the purpose of achieving the
various goals of the business:
Maintenance of the confidentiality of the solutions for the network is needed and for doing this
there is a need of providing access only to the authorized personnel’s and this would be initially
helping in the preservation of the security of the different information which are sensitive in
nature [5].
There is also a need of maintaining the integrity of the data which is mainly needed for the
purpose of making sure that only the authorized personnel’s have the capability of making
NETWORKING SYSTEM
Business requirements:
Goals of the Business and the various constraints:
The goals of the business along with the various constraints have been identified in order to develop an
appropriate solution for the SME and all this constraints and goals have been listed below:
Creation of connection with the various universities is considered as one of the main goals of the
organization and besides this the providing of services which are related to the academics of the
university is also included in the list of major goals of the organization. This is done generally for
the purpose of improving the efficiency of the processes related to teaching. Despite of all this
there also exists the need of permission in order to create a connection between the several
branches and the server of the branches [3].
Another major goal includes the providing of safety for the information of the customers along
with maximum amount of security. This is to be also done for the information of the University
as well. The process by which the security and safety can be provided is encryption of the
various communication channels and the database. This is mainly done for the purpose of
avoiding various types of risks and this risks might include theft of the data or the manipulation
of the data. There is a need of selecting a proper encryption algorithm which would be mainly
responsible for working as a major constraint of the encryption [23].
Besides all this the organizations should also have an entire access of the network along with the
network. Additionally there is also a need of limiting the user accessibility for the members of
the organization for the purpose of ensuring the security of the network [4].
Goals and Tradeoffs of the business:
The identified tradeoffs has been listed below which are responsible for the purpose of achieving the
various goals of the business:
Maintenance of the confidentiality of the solutions for the network is needed and for doing this
there is a need of providing access only to the authorized personnel’s and this would be initially
helping in the preservation of the security of the different information which are sensitive in
nature [5].
There is also a need of maintaining the integrity of the data which is mainly needed for the
purpose of making sure that only the authorized personnel’s have the capability of making
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
NETWORKING SYSTEM
changes in the network information and also for the purpose of preventing any type of
unauthorized access [22].
Development of a security plan for the purpose of making sure that the various requirements
regarding the security of eth organization is met. Besides this there is also a need of listening to
the service network which would be very much helpful in the management of the organization
[6].
Community of the Users and the applications of the Network:
Making of an analysis ID is needed on the groups of the users. This is to be done by making use of the
network. Besides this different services and the VLAN are also required. This would also be configured
according to the various groups of peoples in order to secure the network from any type of
unauthorized access. Small sized public and private universities or the collages are the major users of the
infrastructure. The collages or the universities are associated with providing various types of services.
Different methods have been adopted by them for the purpose of reducing the cost and this includes
the supervising of the research projects for the students and teaching of different subjects [7]. In this
way the students would be capable of availing eth various types of services by following simple steps.
The steps includes the registration on the information system of the system. This is the initial step which
needs to be done in order to use the various services. Once the shortlisting is completed by means of an
interview which are generally conducted by the staffs of the university then they move on to the next
step [8]. This initially give rise to the need of connecting to the network with the portal of the university
besides the need of a registration model which would be followed by merging of this two and would
help the students in getting the information they need.
List of assumptions:
The following assumptions has been made in order to design the network:
Development of a central database for eth purpose of connecting with the various branch
offices and manage the whole network from a single central point.
The organization must have the capability of increasing along with the capability of including
more number of users to the network as time passes by [21].
Need of proper availability of the funding while the development of the network is taking place.
There must exist a proper knowledge about the network amongst the users so as to use the
network efficiently.
NETWORKING SYSTEM
changes in the network information and also for the purpose of preventing any type of
unauthorized access [22].
Development of a security plan for the purpose of making sure that the various requirements
regarding the security of eth organization is met. Besides this there is also a need of listening to
the service network which would be very much helpful in the management of the organization
[6].
Community of the Users and the applications of the Network:
Making of an analysis ID is needed on the groups of the users. This is to be done by making use of the
network. Besides this different services and the VLAN are also required. This would also be configured
according to the various groups of peoples in order to secure the network from any type of
unauthorized access. Small sized public and private universities or the collages are the major users of the
infrastructure. The collages or the universities are associated with providing various types of services.
Different methods have been adopted by them for the purpose of reducing the cost and this includes
the supervising of the research projects for the students and teaching of different subjects [7]. In this
way the students would be capable of availing eth various types of services by following simple steps.
The steps includes the registration on the information system of the system. This is the initial step which
needs to be done in order to use the various services. Once the shortlisting is completed by means of an
interview which are generally conducted by the staffs of the university then they move on to the next
step [8]. This initially give rise to the need of connecting to the network with the portal of the university
besides the need of a registration model which would be followed by merging of this two and would
help the students in getting the information they need.
List of assumptions:
The following assumptions has been made in order to design the network:
Development of a central database for eth purpose of connecting with the various branch
offices and manage the whole network from a single central point.
The organization must have the capability of increasing along with the capability of including
more number of users to the network as time passes by [21].
Need of proper availability of the funding while the development of the network is taking place.
There must exist a proper knowledge about the network amongst the users so as to use the
network efficiently.

5
NETWORKING SYSTEM
The servers are to be locked which would be used by the server and this is to be done in order
to ensure the security of the network.
Solution Design
Logical Design
Physical Design
Network Topologies
Protocols and Technologies
The routing protocols which are to be used in the network has been listed below:
NETWORKING SYSTEM
The servers are to be locked which would be used by the server and this is to be done in order
to ensure the security of the network.
Solution Design
Logical Design
Physical Design
Network Topologies
Protocols and Technologies
The routing protocols which are to be used in the network has been listed below:
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
NETWORKING SYSTEM
HDLC-This is the group of protocol which would be used for the purpose of transmission of the
packet data amongst various nodes which are connected to the network. The data are mainly
combined in order to form the frame which is generally sent over the network for the purpose
of verifying the data [9].
PPP- This is mainly associated with the establishment of the direct contact between the network
and the admin PC for the purpose of accessing the servers without any existence of the delay.
This would be used in order to maintain the servers.
Frame Relay- This is mainly used for the purpose of packet switching and are mainly designed
for the purpose of transmitting the voice by making use of the same channels in a network.
Reduction of the cost for telecommunication is possible by configuring the network channels
with the frame relay protocol [10].
DHCP- when the routers or the servers are configured with the DHCP then the allocation of the
IP address to the nodes is possible and this would be done automatically [20]. The nodes are
mainly connected to the network and for this reason creation of different types of pools of
address happens for the different VLAN. In order to make the process of management much
easier the networks can be segmented into several smaller sub parts.
NAT-This is mainly used for the purpose of increasing the network’s security by means of
mapping of the port number with the IP address in an ambiguous way. The HSRP protocol is
mainly sued for the purpose of configuring the routers with the NAT. along with this it is also
associated with decreasing the number of IP addresses which are required [11].
PAT- This is mainly associated with working as an extension of the NAT protocol which is
generally applied in the LAN in order to permit multiple number of devices in the LAN which
needs to eb mapped with a single IP address.
Ethernet-The LANs are mainly associated with using the Ethernet for the purpose of
communicating with each other and this also acts as one of the link layer protocol which is
mainly used for the purpose of describing the format which has been maintained by the devices
of the network while sending and receiving the data [12].
L2/L3 Protocol: The layer 2 protocol mainly includes the ATM, ARP, CDP and many more. This
layer is mainly used for the WAN in order to manage the transmission and the creating the link
between more than one LAN. The layer 3 mainly includes the EGP, IGRP, IPv4, IPv6 and many
more and they are mostly used in the local routers for the purpose of communicating with the
networks present outside the network [19].
NETWORKING SYSTEM
HDLC-This is the group of protocol which would be used for the purpose of transmission of the
packet data amongst various nodes which are connected to the network. The data are mainly
combined in order to form the frame which is generally sent over the network for the purpose
of verifying the data [9].
PPP- This is mainly associated with the establishment of the direct contact between the network
and the admin PC for the purpose of accessing the servers without any existence of the delay.
This would be used in order to maintain the servers.
Frame Relay- This is mainly used for the purpose of packet switching and are mainly designed
for the purpose of transmitting the voice by making use of the same channels in a network.
Reduction of the cost for telecommunication is possible by configuring the network channels
with the frame relay protocol [10].
DHCP- when the routers or the servers are configured with the DHCP then the allocation of the
IP address to the nodes is possible and this would be done automatically [20]. The nodes are
mainly connected to the network and for this reason creation of different types of pools of
address happens for the different VLAN. In order to make the process of management much
easier the networks can be segmented into several smaller sub parts.
NAT-This is mainly used for the purpose of increasing the network’s security by means of
mapping of the port number with the IP address in an ambiguous way. The HSRP protocol is
mainly sued for the purpose of configuring the routers with the NAT. along with this it is also
associated with decreasing the number of IP addresses which are required [11].
PAT- This is mainly associated with working as an extension of the NAT protocol which is
generally applied in the LAN in order to permit multiple number of devices in the LAN which
needs to eb mapped with a single IP address.
Ethernet-The LANs are mainly associated with using the Ethernet for the purpose of
communicating with each other and this also acts as one of the link layer protocol which is
mainly used for the purpose of describing the format which has been maintained by the devices
of the network while sending and receiving the data [12].
L2/L3 Protocol: The layer 2 protocol mainly includes the ATM, ARP, CDP and many more. This
layer is mainly used for the WAN in order to manage the transmission and the creating the link
between more than one LAN. The layer 3 mainly includes the EGP, IGRP, IPv4, IPv6 and many
more and they are mostly used in the local routers for the purpose of communicating with the
networks present outside the network [19].
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
NETWORKING SYSTEM
IP addressing
IPv4
Subnet - 1
Network Address 172.18.55.0
Subnet Mask 255.255.255.224
Broadcast Address 172.18.55.31
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
172.18.55.1 - 172.18.55.30
Subnet - 2
Network Address 172.18.55.32
Subnet Mask 255.255.255.224
Broadcast Address 172.18.55.63
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
172.18.55.33 - 172.18.55.62
Subnet - 3
Network Address 172.18.55.64
Subnet Mask 255.255.255.224
Broadcast Address 172.18.55.95
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
172.18.55.65 - 172.18.55.94
Subnet - 4
Network Address 172.18.55.96
Subnet Mask 255.255.255.224
Broadcast Address 172.18.55.127
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
172.18.55.97 - 172.18.55.126
Subnet - 5
Network Address 172.18.55.128
Subnet Mask 255.255.255.248
Broadcast Address 172.18.55.135
Valid host address range (can be used to assign 172.18.55.129 - 172.18.55.134
NETWORKING SYSTEM
IP addressing
IPv4
Subnet - 1
Network Address 172.18.55.0
Subnet Mask 255.255.255.224
Broadcast Address 172.18.55.31
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
172.18.55.1 - 172.18.55.30
Subnet - 2
Network Address 172.18.55.32
Subnet Mask 255.255.255.224
Broadcast Address 172.18.55.63
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
172.18.55.33 - 172.18.55.62
Subnet - 3
Network Address 172.18.55.64
Subnet Mask 255.255.255.224
Broadcast Address 172.18.55.95
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
172.18.55.65 - 172.18.55.94
Subnet - 4
Network Address 172.18.55.96
Subnet Mask 255.255.255.224
Broadcast Address 172.18.55.127
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
172.18.55.97 - 172.18.55.126
Subnet - 5
Network Address 172.18.55.128
Subnet Mask 255.255.255.248
Broadcast Address 172.18.55.135
Valid host address range (can be used to assign 172.18.55.129 - 172.18.55.134

8
NETWORKING SYSTEM
to PCs, servers, IP phones, etc.)
IPv6
Subnet - 1
Network Address 0:0:0:0:0:ffff:ac12:3700
Subnet Mask 0:0:0:0:0:ffff:ffff:ffe0
Broadcast Address 0:0:0:0:0:ffff:ac12:371f
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
0:0:0:0:0:ffff:ac12:3701 -
0:0:0:0:0:ffff:ac12:371e
Subnet - 2
Network Address 0:0:0:0:0:ffff:ac12:3720
Subnet Mask 0:0:0:0:0:ffff:ffff:ffe0
Broadcast Address 0:0:0:0:0:ffff:ac12:373f
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
0:0:0:0:0:ffff:ac12:3721 - 0:0:0:0:0:ffff:ac12:373e
Subnet - 3
Network Address 0:0:0:0:0:ffff:ac12:3740
Subnet Mask 0:0:0:0:0:ffff:ffff:ffe0
Broadcast Address 0:0:0:0:0:ffff:ac12:375f
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
0:0:0:0:0:ffff:ac12:3741 - 0:0:0:0:0:ffff:ac12:375e
Subnet - 4
Network Address 0:0:0:0:0:ffff:ac12:3760
Subnet Mask 0:0:0:0:0:ffff:ffff:ffe0
Broadcast Address 0:0:0:0:0:ffff:ac12:377f
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
0:0:0:0:0:ffff:ac12:3761 - 0:0:0:0:0:ffff:ac12:377e
Subnet - 5
Network Address 0:0:0:0:0:ffff:ac12:3780
Subnet Mask 0:0:0:0:0:ffff:ffff:fff8
Broadcast Address 0:0:0:0:0:ffff:ac12:3787
NETWORKING SYSTEM
to PCs, servers, IP phones, etc.)
IPv6
Subnet - 1
Network Address 0:0:0:0:0:ffff:ac12:3700
Subnet Mask 0:0:0:0:0:ffff:ffff:ffe0
Broadcast Address 0:0:0:0:0:ffff:ac12:371f
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
0:0:0:0:0:ffff:ac12:3701 -
0:0:0:0:0:ffff:ac12:371e
Subnet - 2
Network Address 0:0:0:0:0:ffff:ac12:3720
Subnet Mask 0:0:0:0:0:ffff:ffff:ffe0
Broadcast Address 0:0:0:0:0:ffff:ac12:373f
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
0:0:0:0:0:ffff:ac12:3721 - 0:0:0:0:0:ffff:ac12:373e
Subnet - 3
Network Address 0:0:0:0:0:ffff:ac12:3740
Subnet Mask 0:0:0:0:0:ffff:ffff:ffe0
Broadcast Address 0:0:0:0:0:ffff:ac12:375f
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
0:0:0:0:0:ffff:ac12:3741 - 0:0:0:0:0:ffff:ac12:375e
Subnet - 4
Network Address 0:0:0:0:0:ffff:ac12:3760
Subnet Mask 0:0:0:0:0:ffff:ffff:ffe0
Broadcast Address 0:0:0:0:0:ffff:ac12:377f
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
0:0:0:0:0:ffff:ac12:3761 - 0:0:0:0:0:ffff:ac12:377e
Subnet - 5
Network Address 0:0:0:0:0:ffff:ac12:3780
Subnet Mask 0:0:0:0:0:ffff:ffff:fff8
Broadcast Address 0:0:0:0:0:ffff:ac12:3787
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
NETWORKING SYSTEM
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
0:0:0:0:0:ffff:ac12:3781 - 0:0:0:0:0:ffff:ac12:3786
Security and the privacy features:
The communication between two networks or two systems by making use of the basic form of network
like the LAN. The construction of LAN is very easy with or without including the servers and this is also
restricted by the physical location of the system. A system which has been taking part in the LAN
requires a network adapter which needs to be installed in a proper way [13]. A WAN is mainly associated
with covering a larger area and along with this the system in the WAN network is capable of saving data
on a real time basis. After this it is also possible to sends the inputs in an easy way as an input for the
central computers [14]. There exists four types of network communication and this includes the leased
line connection, circuit-switching packet, packet switching or relay of the cell. The IS system is associated
with providing a large range of the wireless communication in public domain and this is done by making
use different resources along with the priorities. The population density which is related to the public
services are mainly visited by numerous users and this is considered that it is in the top of the priority
list.
Redundancy or failover plan:
One of the good security process includes the separation of the management and the traffic of the
users. The VLAM management is mainly done by changing the default VLAN1 and distinction the VLA.
For the purpose of contacting with the switch in a remotely manner, there must exist an IP address
which is to be configured with the VLAN management [15]. This would initially lead to providing of
restriction regarding the establishment of any kind of remote access to the sessions by any unauthorized
user. This should done till they are routed to the VLAN management. This would help in providing an
additional layer of security for the VLAN. Besides all this the switches are also to be configured in order
to accept various SSH sessions which are encrypted [16].
LAN and WAN services design and analysis
The following services should be includes in the network solution for increasing the efficiency and
scalability of the SME network.
Multi location support for the business
VOIP
NETWORKING SYSTEM
Valid host address range (can be used to assign
to PCs, servers, IP phones, etc.)
0:0:0:0:0:ffff:ac12:3781 - 0:0:0:0:0:ffff:ac12:3786
Security and the privacy features:
The communication between two networks or two systems by making use of the basic form of network
like the LAN. The construction of LAN is very easy with or without including the servers and this is also
restricted by the physical location of the system. A system which has been taking part in the LAN
requires a network adapter which needs to be installed in a proper way [13]. A WAN is mainly associated
with covering a larger area and along with this the system in the WAN network is capable of saving data
on a real time basis. After this it is also possible to sends the inputs in an easy way as an input for the
central computers [14]. There exists four types of network communication and this includes the leased
line connection, circuit-switching packet, packet switching or relay of the cell. The IS system is associated
with providing a large range of the wireless communication in public domain and this is done by making
use different resources along with the priorities. The population density which is related to the public
services are mainly visited by numerous users and this is considered that it is in the top of the priority
list.
Redundancy or failover plan:
One of the good security process includes the separation of the management and the traffic of the
users. The VLAM management is mainly done by changing the default VLAN1 and distinction the VLA.
For the purpose of contacting with the switch in a remotely manner, there must exist an IP address
which is to be configured with the VLAN management [15]. This would initially lead to providing of
restriction regarding the establishment of any kind of remote access to the sessions by any unauthorized
user. This should done till they are routed to the VLAN management. This would help in providing an
additional layer of security for the VLAN. Besides all this the switches are also to be configured in order
to accept various SSH sessions which are encrypted [16].
LAN and WAN services design and analysis
The following services should be includes in the network solution for increasing the efficiency and
scalability of the SME network.
Multi location support for the business
VOIP
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10
NETWORKING SYSTEM
Video surveillance
VPN SSL
MPLS
Teleconferencing solutions
QoS
SOHO
BYOD
Data backup
Virtualization of the servers
The implementation of the LAN and WAN service is possible only by analyzing and designing the
network infrastructure which is existing. Along with this there is also a need of analyzing the
requirements of the infrastructure [17]. This would help in finding the new requirements of the current
system and would also help in the designing of the new system. There is also a need of restricting the
normal users and provide levels of authentication this would be initially responsible for increasing the
security of the network. Different networking technologies should be evaluated for designing a
successful local or wide area network and enabling voice and data communication for reducing the
telecommunication cost of the network [18]. The risk of security threats arising from different points in
the network should be eliminated. The network should be backed up for handling the emergency
conditions and a risk response plan should be created for responding against any attacks.
Conclusion:
The above discussed report helps in concluding to the fact that there is a need of designing a high level
network architecture for the SME. For this there is need of identifying the scopes and limitations of the
project. There is also a need of analyzing the requirements of the business in order to design the total
network. The report has also documented the user community and the network application which
would be supported by the system. The security features and policies that should be followed for
securing the network from external entities are discussed in the report. Besides this the failover and the
redundancy plan has also been provided in this report for the purpose of avoiding the risk of link failure
and responding during emergency conditions. A logical and a physical design has also been created in
NETWORKING SYSTEM
Video surveillance
VPN SSL
MPLS
Teleconferencing solutions
QoS
SOHO
BYOD
Data backup
Virtualization of the servers
The implementation of the LAN and WAN service is possible only by analyzing and designing the
network infrastructure which is existing. Along with this there is also a need of analyzing the
requirements of the infrastructure [17]. This would help in finding the new requirements of the current
system and would also help in the designing of the new system. There is also a need of restricting the
normal users and provide levels of authentication this would be initially responsible for increasing the
security of the network. Different networking technologies should be evaluated for designing a
successful local or wide area network and enabling voice and data communication for reducing the
telecommunication cost of the network [18]. The risk of security threats arising from different points in
the network should be eliminated. The network should be backed up for handling the emergency
conditions and a risk response plan should be created for responding against any attacks.
Conclusion:
The above discussed report helps in concluding to the fact that there is a need of designing a high level
network architecture for the SME. For this there is need of identifying the scopes and limitations of the
project. There is also a need of analyzing the requirements of the business in order to design the total
network. The report has also documented the user community and the network application which
would be supported by the system. The security features and policies that should be followed for
securing the network from external entities are discussed in the report. Besides this the failover and the
redundancy plan has also been provided in this report for the purpose of avoiding the risk of link failure
and responding during emergency conditions. A logical and a physical design has also been created in

11
NETWORKING SYSTEM
this report for the organization and different network topologies have been discussed for the purpose of
development of the network.
Referencing:
[1]. Wang Y, Chi N, Wang Y, Tao L, Shi J. Network architecture of a high-speed visible light
communication local area network. IEEE Photonics Technology Letters. 2015 Jan 15;27(2):197-
200.
[2]. Wang Y, Chi N, Wang Y, Tao L, Shi J. Network architecture of a high-speed visible light
communication local area network. IEEE Photonics Technology Letters. 2015 Jan 15;27(2):197-
200.
[3]. Sikdar B. A study of the environmental impact of wired and wireless local area network access.
IEEE Transactions on Consumer Electronics. 2013 Feb;59(1):85-92.
[4]. Ghosh A, Thomas TA, Cudak MC, Ratasuk R, Moorut P, Vook FW, Rappaport TS, MacCartney
GR, Sun S, Nie S. Millimeter-wave enhanced local area systems: A high-data-rate approach for
future wireless networks. IEEE Journal on Selected Areas in Communications. 2014
Jun;32(6):1152-63.
[5]. Pang L, Li H, Pei Q. Improved multicast key management of Chinese wireless local area network
security standard. IET communications. 2012 Jun 14;6(9):1126-30.
[6]. Kazemian P, Varghese G, McKeown N. Header Space Analysis: Static Checking for Networks.
InNSDI 2012 Apr 25 (Vol. 12, pp. 113-126).
[7]. He K, Wang Y, Wang X, Meng W, Liu B. GreenVLAN: An energy-efficient approach for VLAN
design. InComputing, Networking and Communications (ICNC), 2012 International Conference on
2012 Jan 30 (pp. 522-526). IEEE.
[8]. Rafel A, Parkin N, Farrow K, Wright P, Nesset D. Automatic restoration over a type B dual
parented PON using VLAN switching. InOptical Communication (ECOC 2013), 39th European
Conference and Exhibition on 2013 Sep 22 (pp. 1-3). IET.
[9]. Kim H, Feamster N. Improving network management with software defined networking. IEEE
Communications Magazine. 2013 Feb;51(2):114-9.
[10]. Alimi IA, Mufutau AO. Enhancement of network performance of an enterprises network
with VLAN. American Journal of Mobile Systems, Applications and Services. 2015 Jul;1(2):82-93.
[11]. Kim H, Schlansker M, Santos JR, Tourrilhes J, Turner Y, Feamster N. Coronet: Fault
tolerance for software defined networks. InNetwork Protocols (ICNP), 2012 20th IEEE
International Conference on 2012 Oct 30 (pp. 1-2). IEEE.
[12]. Nolan KE, Guibene W, Kelly MY. An evaluation of low power wide area network
technologies for the Internet of Things. InWireless Communications and Mobile Computing
Conference (IWCMC), 2016 International 2016 Sep 5 (pp. 439-444). IEEE.
NETWORKING SYSTEM
this report for the organization and different network topologies have been discussed for the purpose of
development of the network.
Referencing:
[1]. Wang Y, Chi N, Wang Y, Tao L, Shi J. Network architecture of a high-speed visible light
communication local area network. IEEE Photonics Technology Letters. 2015 Jan 15;27(2):197-
200.
[2]. Wang Y, Chi N, Wang Y, Tao L, Shi J. Network architecture of a high-speed visible light
communication local area network. IEEE Photonics Technology Letters. 2015 Jan 15;27(2):197-
200.
[3]. Sikdar B. A study of the environmental impact of wired and wireless local area network access.
IEEE Transactions on Consumer Electronics. 2013 Feb;59(1):85-92.
[4]. Ghosh A, Thomas TA, Cudak MC, Ratasuk R, Moorut P, Vook FW, Rappaport TS, MacCartney
GR, Sun S, Nie S. Millimeter-wave enhanced local area systems: A high-data-rate approach for
future wireless networks. IEEE Journal on Selected Areas in Communications. 2014
Jun;32(6):1152-63.
[5]. Pang L, Li H, Pei Q. Improved multicast key management of Chinese wireless local area network
security standard. IET communications. 2012 Jun 14;6(9):1126-30.
[6]. Kazemian P, Varghese G, McKeown N. Header Space Analysis: Static Checking for Networks.
InNSDI 2012 Apr 25 (Vol. 12, pp. 113-126).
[7]. He K, Wang Y, Wang X, Meng W, Liu B. GreenVLAN: An energy-efficient approach for VLAN
design. InComputing, Networking and Communications (ICNC), 2012 International Conference on
2012 Jan 30 (pp. 522-526). IEEE.
[8]. Rafel A, Parkin N, Farrow K, Wright P, Nesset D. Automatic restoration over a type B dual
parented PON using VLAN switching. InOptical Communication (ECOC 2013), 39th European
Conference and Exhibition on 2013 Sep 22 (pp. 1-3). IET.
[9]. Kim H, Feamster N. Improving network management with software defined networking. IEEE
Communications Magazine. 2013 Feb;51(2):114-9.
[10]. Alimi IA, Mufutau AO. Enhancement of network performance of an enterprises network
with VLAN. American Journal of Mobile Systems, Applications and Services. 2015 Jul;1(2):82-93.
[11]. Kim H, Schlansker M, Santos JR, Tourrilhes J, Turner Y, Feamster N. Coronet: Fault
tolerance for software defined networks. InNetwork Protocols (ICNP), 2012 20th IEEE
International Conference on 2012 Oct 30 (pp. 1-2). IEEE.
[12]. Nolan KE, Guibene W, Kelly MY. An evaluation of low power wide area network
technologies for the Internet of Things. InWireless Communications and Mobile Computing
Conference (IWCMC), 2016 International 2016 Sep 5 (pp. 439-444). IEEE.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





