COIT20264 Network Design: Logical Design for Utopimed

Verified

Added on  2022/11/09

|9
|1738
|432
Report
AI Summary
This report presents a comprehensive logical network design for Utopimed, a medical organization aiming to enhance patient services through a robust network infrastructure. The business goals include enabling patients to use mobile internet, request medical certificates, and save doctors' time. Technical goals involve designing a network connecting medical chambers with enterprise networks, facilitating data transmission from medical devices, and enabling quick report sharing. The report details user communities, data stores, network applications (FTP, TELNET, STTP), and traffic flows, alongside bandwidth and QoS requirements. It discusses addressing and naming conventions, explaining the logical network design process, and implementing TCP and HTTP protocols. The design incorporates routing and switching protocols, emphasizing their role in communication and traffic direction. Security mechanisms are also addressed, highlighting the importance of protecting data transmission through multiple layers of security components. The report concludes with a list of references supporting the design and implementation of the network.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: LOGICAL NETWORK DESIGN
LOGICAL NETWORK DESIGN
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1LOGICAL NETWORK DESIGN
List of Business Goals and Constraints
The business goal of this organization is providing better services to the patients. The
patients could be able in using their mobiles for connecting to internet provided by the Wi-Fi
network of Utopimed and in requesting and receiving medical certificates from doctors. Time
can be saved for the doctor as the medical certificates will be signed by the system and not by
the doctors. All the medical chambers should be equipped with enterprise networks, so
doctors can see more patients than before and better and quick services are provided to the
patients.
List of Technical Goals and Tradeoffs
The technical goal of this organization is designing a network which will be
connected in medical centres of Utopimed. All medical chambers should have computer
connected with the network of the enterprise. Blood sugar monitors, ICU bedside monitors,
blood pressure monitors and exercise treadmills will be present for wirelessly sending data of
patients through the network. Laboratory staffs can quickly send reports to the doctor
immediately. All past and current data can be analysed by the intelligent software and will
help doctors in treating their patients better and faster.
Table of User Communities, Data Stores, Network Applications and Traffic
Flows
User Communities
User Community
Name
Size of Community
(Number of Users)
Location(s) of
Community
Application(s) Used
by Community
Patient 60 Melbourne FTP
User 20 Melbourne FTP, STTP
Document Page
2LOGICAL NETWORK DESIGN
Administrator 3 Melbourne TELNET, STTP,
FTP
Hospital 20 Melbourne STTP, FTP
Data Stores
Data Store Location Application(s) Used by User
Community (or
communities)
Central Melbourne TELNET, FTP,STTP Administrator
User Melbourne FTP,STTP Hospital, User
Administrator Melbourne TELNET, FTP,STTP Administrator
Hospital Melbourne TELNET, FTP,STTP Administrator, User
Patient Melbourne FTP User, Hospital
Network Applications
Name of
Application
Type of
Traffic Flow
Protocol(s)
Used by
Applicatio
n
User
Communities
That Use the
Application
Data
Stores
(Servers,
Hosts and
so on)
Approximate
Bandwidth
Requirements
QoS
Requirements
File Transfer
Protocol (FTP)
Client/Server TCP Patient, User,
Hospital,
Administrator
Hosts 16 Mbps Response time
about 2-5
seconds
Document Page
3LOGICAL NETWORK DESIGN
Terminal
Emulation
(TELNET)
Server/Server TCP,HTTP Administrator Servers 20 Mbps Response time
less than 2
seconds
Secure Token
Transfer
Protocol
(STTP)
Client/Server HTTP Administrator,
Hospital, User
Hosts 10Mbps Response time
about 5-8
seconds
Traffic Flow
Destination 1
MB/sec
Destination 2
MB/sec
Destination 3
MB/sec
Destination 4
MB/sec
Source 1 16 Mbps 14 Mbps 12Mbps 9Mbps
Source 2 20 Mbps 19 Mbps 17Mbps 15Mbps
Source 3 10Mbps 9Mbps 8.5Mbps 8Mbps
Source n 15Mbps 13Mbps 12.5Mbps 11.5Mbps
All
Model for addressing and naming
All entities present in network of data communications must be identified for allowing
data to intended recipient. Every node have one address at least. These addresses are quoted
normally in numeric format, which can be encoded easily into binary for data transmission
within the network. Network provides connection among two nodes in network. Network’s
neighbouring nodes are connected through links in network. Route it he neighbour node’s
address which is link used for transmitting specific message to its destination. Using
sequence of routes among intermediate systems, a path is found by the network between
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4LOGICAL NETWORK DESIGN
source end system and destination end system. Selection of appropriate range of routes
among intermediate systems is termed as routing. Major distinction among addresses and
names is if they are deliberated to be machine readable or human readable. Simple names for
local applicability is ranged in names. Team port is the identifier number which specifies user
program or individual process that is running on destination system. Several names are
hardware addresses of hierarchical format. Universal name is the classic hierarchical address.
Such names forms sequence of fields which jointly helps in identifying the entity.
Explanation and justification of the logical network design
When a logical network design is planned, it can be started from any one of the two
places. New network can be designed and installed from the scratch or an existing network
can be modified. The network is designed depending on services which is provided to the
users, the possible networking patterns are analysed for designing the network. Potential
bottlenecks are located and multiple paths are provided to resources and servers are set which
provide copies of essential data as load balancing is provided. TCP and HTTP protocols are
implemented in this network.
This network is typical network for small organizations. Users can access the network
at any time. These networks are simplest to administrator, as every nodes of the network are
connected and gateway device’s functionality is proper. Network security is completed by
low-end firewall present at antivirus software and the gateway.
Document Page
5LOGICAL NETWORK DESIGN
Logical network diagram(s) including addressing and naming
Discussion of routing and switching protocols
Routing protocol identifies how communication is made between routers, sharing
information which enables them for selecting routes among any tow computer network or
nodes. Routers perform functions of “traffic directing” on internet, one router passes data
packets to another router through network until the destination computer is reached. The
specific route choice is determined by routing algorithms. Every router possesses prior
knowledge of networks attached directly to it. This information is shared by the routing
protocol among neighbours and through the network then. This way, knowledge about the
network’s topology is gained by the routers. The routing protocol’s ability in dynamically
adjusting to change conditions is what provides reliability and survivability to the internet.
As data traffic outpaces voice traffic, data-centric architectures will be converted from
carrier networks, changing the course of performance of switch in transport network. Packet
switching needs to be added to the network and transport network should be optimized at
same time, for meeting the packet switching’s requirements. Packet networks were used,
Document Page
6LOGICAL NETWORK DESIGN
however transport networks are being used as they have their own value-added features.
Carrier networks have switching for providing universal connectivity while using network
resources efficiently. In data traffic case, several users could share same bandwidth with each
other at same time for accessing network’s entire bandwidth.
Discussion of security mechanisms
Network security is used for protecting data transmission within the network. A
networking security system depends on protection layers and have multiple components
which includes security software and networking monitoring along with hardware
components. Each of these components provides overall security of computer network. All
the policies and provisions are included in the network security by network administrator for
preventing and monitoring unauthorized access, modification, denial or misuse of network-
accessible resources and computer network. Network security includes both private and
public networks which are used daily among government agencies, individuals and
businesses.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7LOGICAL NETWORK DESIGN
References
Baghalian, A., Rezapour, S. and Farahani, R.Z., 2013. Robust supply chain network design
with service level against disruptions and demand uncertainties: A real-life case. European
Journal of Operational Research, 227(1), pp.199-215.
Bonetto, E., Chiaraviglio, L., Idzikowski, F. and Le Rouzic, E., 2013. Algorithms for the
multi-period power-aware logical topology design with reconfiguration costs. Journal of
Optical Communications and Networking, 5(5), pp.394-410.
Farahani, R.Z., Rezapour, S., Drezner, T. and Fallah, S., 2014. Competitive supply chain
network design: An overview of classifications, models, solution techniques and applications.
Omega, 45, pp.92-118.
González, A.D., Dueñas‐Osorio, L., Sánchez‐Silva, M. and Medaglia, A.L., 2016. The
interdependent network design problem for optimal infrastructure system restoration.
Computer‐Aided Civil and Infrastructure Engineering, 31(5), pp.334-350.
Koponen, T., Amidon, K., Balland, P., Casado, M., Chanda, A., Fulton, B., Ganichev, I.,
Gross, J., Ingram, P., Jackson, E. and Lambeth, A., 2014. Network virtualization in multi-
tenant datacenters. In 11th {USENIX} Symposium on Networked Systems Design and
Implementation ({NSDI} 14) (pp. 203-216).
Parter, M., 2016. Fault-tolerant logical network structures. Bulletin of EATCS, 1(118).
Pfaff, B., Pettit, J., Koponen, T., Jackson, E., Zhou, A., Rajahalme, J., Gross, J., Wang, A.,
Stringer, J., Shelar, P. and Amidon, K., 2015. The design and implementation of open
vswitch. In 12th {USENIX} Symposium on Networked Systems Design and Implementation
({NSDI} 15) (pp. 117-130).
Document Page
8LOGICAL NETWORK DESIGN
Pishvaee, M.S., Razmi, J. and Torabi, S.A., 2014. An accelerated Benders decomposition
algorithm for sustainable supply chain network design under uncertainty: A case study of
medical needle and syringe supply chain. Transportation Research Part E: Logistics and
Transportation Review, 67, pp.14-38.
Yeniçeri, R., Abtioğlu, E., Gövem, B. and Yalçın, M.E., 2014, July. A 16× 16 Cellular
Logical Network with partial reconfiguration feature. In 2014 14th International Workshop
on Cellular Nanoscale Networks and their Applications (CNNA) (pp. 1-2). IEEE.
Zhou, X., Li, R., Chen, T. and Zhang, H., 2016. Network slicing as a service: enabling
enterprises' own software-defined cellular networks. IEEE Communications Magazine, 54(7),
pp.146-153.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]