MIS102 Essay: Data and Networking for Xerlasian University Expansion
VerifiedAdded on 2022/08/22
|7
|1719
|49
Essay
AI Summary
This essay addresses the network design for Xerlasian University's expansion to a second campus in Australia, as outlined in the MIS102 Data and Networking assignment. It begins with an overview of the university's needs, including the requirement for a new network and secure data exchange between campuses. The essay analyzes the architecture and distribution of data, network topologies (LAN and WAN), and communication protocol stacks. It explores the use of routers, switches, and proxy servers for network connectivity and security, including access rights and VLAN configuration. The essay also covers the importance of load balancing, proactive routing, and port binding for optimal network performance. It further examines the need for appropriate cabling, server deployment (Email, DNS, File, Web, and proxy servers), and network security measures. The essay concludes with a discussion of test plans, test cases, and the OSI model's layers. The document also references relevant research papers to support the network design recommendations.

Running head: MIS102 DATA AND NETWORKING
MIS102 Data and Networking
Name of the Student
Name of the University
Author’s Note
MIS102 Data and Networking
Name of the Student
Name of the University
Author’s Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
MIS102 DATA AND NETWORKING
Xerlasian university have the requirement to develop a new university network for the
expansion and setting up a second campus in Australia. A router is needed to be used for
connecting the second university network and enabling the users to exchange data. For
maintaining security a proxy server is needed to be used for establishing connection with the
main campus and access rights are needed to be defined to the users for accessing the network.
The access rights are defined by categorizing the user and identification of the usability needs
while accessing the network. A research is done on the available LAN technology for connecting
the new campus with the existing network of Xerlasian university. The network solution is
developed with the application of new technology and application of a proper addressing is used
for configuring the network device (Jiang et al., 2016). An examination is made on the available
network protocols and principles for maintaining access rights and connecting the users of the
university. A three tier architecture is used for the development of the network and an analysis is
made on the data distribution and architecture for its application and develop the network
solution. The existing topology of the network is evaluated and recommendation are provided for
the use of appropriate network device and develop the network.
MIS102 DATA AND NETWORKING
Xerlasian university have the requirement to develop a new university network for the
expansion and setting up a second campus in Australia. A router is needed to be used for
connecting the second university network and enabling the users to exchange data. For
maintaining security a proxy server is needed to be used for establishing connection with the
main campus and access rights are needed to be defined to the users for accessing the network.
The access rights are defined by categorizing the user and identification of the usability needs
while accessing the network. A research is done on the available LAN technology for connecting
the new campus with the existing network of Xerlasian university. The network solution is
developed with the application of new technology and application of a proper addressing is used
for configuring the network device (Jiang et al., 2016). An examination is made on the available
network protocols and principles for maintaining access rights and connecting the users of the
university. A three tier architecture is used for the development of the network and an analysis is
made on the data distribution and architecture for its application and develop the network
solution. The existing topology of the network is evaluated and recommendation are provided for
the use of appropriate network device and develop the network.

2
MIS102 DATA AND NETWORKING
The routers and the switches are needed to be configured with load balance for handling
the incoming request from different address and eliminate congestion and delay in the network.
The network topology had an impact on the communication and bandwidth needs and it is
essential to select the appropriate topology for expansion of network and improve proficiency
between the inter connected devices. An analysis is also needed to be made for the use of
appropriate cables for connecting the devices and have high availability of bandwidth such that
bottleneck situation can be avoided (Yu et al., 2017). The network is developed for connecting
the classroom, library, study hall and the network is developed in small manageable sub parts
such that the errors in the network can be easily troubleshoot and the whole network does not
faced downtime. The interface of the router is divided into sub interface according to the number
of VLAN and the departments for the development of the logical framework of the network. For
connecting the new campus with the existing network and analysis is made on the WAN
protocols and topology and WAN link is used for connecting the remote campus. Different
technology such as frame relay and ATM is used for connecting the remote campus and a secure
connection is established with the site (Yao et al., 2016). A campus area network topology is
selected and the local area network is spanned to form a wide area network. The scalability and
availability of the network is also considered for the expansion of the network and a list of the
resources are needed to be created for management of accessibility to the different users. The
routers and the switch configuration is secured with the application of password and encryption
such that it cannot be access to modify the configuration and leaving the network vulnerable to
different network threats. Proactive routing is needed to be used such that the response time of
the network can be minimized on the increase in traffic and load on the network.
MIS102 DATA AND NETWORKING
The routers and the switches are needed to be configured with load balance for handling
the incoming request from different address and eliminate congestion and delay in the network.
The network topology had an impact on the communication and bandwidth needs and it is
essential to select the appropriate topology for expansion of network and improve proficiency
between the inter connected devices. An analysis is also needed to be made for the use of
appropriate cables for connecting the devices and have high availability of bandwidth such that
bottleneck situation can be avoided (Yu et al., 2017). The network is developed for connecting
the classroom, library, study hall and the network is developed in small manageable sub parts
such that the errors in the network can be easily troubleshoot and the whole network does not
faced downtime. The interface of the router is divided into sub interface according to the number
of VLAN and the departments for the development of the logical framework of the network. For
connecting the new campus with the existing network and analysis is made on the WAN
protocols and topology and WAN link is used for connecting the remote campus. Different
technology such as frame relay and ATM is used for connecting the remote campus and a secure
connection is established with the site (Yao et al., 2016). A campus area network topology is
selected and the local area network is spanned to form a wide area network. The scalability and
availability of the network is also considered for the expansion of the network and a list of the
resources are needed to be created for management of accessibility to the different users. The
routers and the switch configuration is secured with the application of password and encryption
such that it cannot be access to modify the configuration and leaving the network vulnerable to
different network threats. Proactive routing is needed to be used such that the response time of
the network can be minimized on the increase in traffic and load on the network.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
MIS102 DATA AND NETWORKING
Load balancing is needed to be used such that congestion and performance degradation
can be avoided in the network. Multiple links can be used for connecting the core network
devices and ether channel configuration can be applied to the layer 3 devices such that the
congestion can be avoided and the increase in data traffic done not have an impact on the
availability and performance of the network. Port binding is also needed to be used for
connecting the servers and local computer devices such and the unused ports should be shut
down such that the misuse of the network can be eliminated (Bartulovic et al., 2017). For
estimating the communication and bandwidth needs the application used by the used and the
required bandwidth for each of the application is estimated such that sufficient bandwidth is
allocated and the user experience of using the network is improved. The principles of operation
of the network device and the type of servers that are needed to be deployed for meeting the user
requirement is estimated. Gateway are deployed for communicating with the outside network
and routers can also act as the gateway device. The switch is used for connecting each of the
department and they are layer 3 or layer 2 devices (Xia et al., 2016). Network cables are used for
connecting the device and the length of the device should not be more than 100 meter. A filter is
needed to be made for the restricting the unknown data traffic to reach the internal network and
secure the network from different type of threats. Multiple servers are needed to be deployed
such as Email, DNS, File, Web and proxy server. The proxy server can act as the gateway device
for acting as an intermediary such that when the clients make request to seek the resources it
fetches the resources and provide it to the client. Thus it acts as an intermediary for fulfilling the
requested resource for example a file or web page (Qi et al., 2016). It can also provide additional
benefit of load balancing, security or privacy and add encapsulation for the distributed network
framework.
MIS102 DATA AND NETWORKING
Load balancing is needed to be used such that congestion and performance degradation
can be avoided in the network. Multiple links can be used for connecting the core network
devices and ether channel configuration can be applied to the layer 3 devices such that the
congestion can be avoided and the increase in data traffic done not have an impact on the
availability and performance of the network. Port binding is also needed to be used for
connecting the servers and local computer devices such and the unused ports should be shut
down such that the misuse of the network can be eliminated (Bartulovic et al., 2017). For
estimating the communication and bandwidth needs the application used by the used and the
required bandwidth for each of the application is estimated such that sufficient bandwidth is
allocated and the user experience of using the network is improved. The principles of operation
of the network device and the type of servers that are needed to be deployed for meeting the user
requirement is estimated. Gateway are deployed for communicating with the outside network
and routers can also act as the gateway device. The switch is used for connecting each of the
department and they are layer 3 or layer 2 devices (Xia et al., 2016). Network cables are used for
connecting the device and the length of the device should not be more than 100 meter. A filter is
needed to be made for the restricting the unknown data traffic to reach the internal network and
secure the network from different type of threats. Multiple servers are needed to be deployed
such as Email, DNS, File, Web and proxy server. The proxy server can act as the gateway device
for acting as an intermediary such that when the clients make request to seek the resources it
fetches the resources and provide it to the client. Thus it acts as an intermediary for fulfilling the
requested resource for example a file or web page (Qi et al., 2016). It can also provide additional
benefit of load balancing, security or privacy and add encapsulation for the distributed network
framework.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
MIS102 DATA AND NETWORKING
The workstation and the network software is interdependent on each other and the
network software is needed to be used for handling multiple processes and consuming huge
memory. The workstation installed with the network software is needed to be compatible with
the resource requirement and run the software efficiently. The servers deployed in the network is
installed with server operating system and configured with different services such that it can
handle the request of the user (Hou et al., 2017). The interdependency between the network
hardware and the security requirement is needed to be evaluated in the design phase such that no
errors are generated during the deployment of the network. A security analysis is needed to be
made and applied for the mitigation of predicted vulnerabilities and training is needed to be
given to the user such that vulnerable application cannot be installed.
For the development of the network topology VLAN, spanning tree and VTP
server/client configuration is used for the configuration of the network. The network device
installed works under the principle of different layers of the OSI model and it is categorized for
enabling transmission between the different destination and source address in the network. The
nodes of each of the network is connected and the switch is configured with access control such
that it cannot access other departments. A test plan documentation is needed to be created for
defining the criteria of acceptance, schedule, roles and responsibility, resources and procedures
needed to be followed for the development of the network (Testa & Pavesi, 2017). Test cases are
needed to be developed and test scripts should be used for verifying the connectivity and
working of the network under load. The ability of the network to recover is also needed to be
tested such that downtime can be avoided and errors can be resolved immediately.
MIS102 DATA AND NETWORKING
The workstation and the network software is interdependent on each other and the
network software is needed to be used for handling multiple processes and consuming huge
memory. The workstation installed with the network software is needed to be compatible with
the resource requirement and run the software efficiently. The servers deployed in the network is
installed with server operating system and configured with different services such that it can
handle the request of the user (Hou et al., 2017). The interdependency between the network
hardware and the security requirement is needed to be evaluated in the design phase such that no
errors are generated during the deployment of the network. A security analysis is needed to be
made and applied for the mitigation of predicted vulnerabilities and training is needed to be
given to the user such that vulnerable application cannot be installed.
For the development of the network topology VLAN, spanning tree and VTP
server/client configuration is used for the configuration of the network. The network device
installed works under the principle of different layers of the OSI model and it is categorized for
enabling transmission between the different destination and source address in the network. The
nodes of each of the network is connected and the switch is configured with access control such
that it cannot access other departments. A test plan documentation is needed to be created for
defining the criteria of acceptance, schedule, roles and responsibility, resources and procedures
needed to be followed for the development of the network (Testa & Pavesi, 2017). Test cases are
needed to be developed and test scripts should be used for verifying the connectivity and
working of the network under load. The ability of the network to recover is also needed to be
tested such that downtime can be avoided and errors can be resolved immediately.

5
MIS102 DATA AND NETWORKING
References
Bartulovic, M., Jiang, J., Balakrishnan, S., Sekar, V., & Sinopoli, B. (2017, November). Biases
in data-driven networking, and what to do about them. In Proceedings of the 16th ACM
Workshop on Hot Topics in Networks (pp. 192-198).
Hou, R., Fang, L., Chang, Y., Yang, L., & Wang, F. (2017). Named data networking over
WDM-based optical networks. IEEE Network, 31(3), 70-79.
Jiang, J., Sekar, V., Stoica, I., & Zhang, H. (2016). Data-Driven Networking: Harnessing the
“Unreasonable Effectiveness of Data” in Network Design.
Qi, R., Liu, W., Gutierrez, J., & Malik, A. W. (2016, April). Crash me if you can: Rethinking
sustainable data center networking from a topological perspective. In 2016 IEEE
Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 566-
571). IEEE.
Testa, F., & Pavesi, L. (Eds.). (2017). Optical Switching in Next Generation Data Centers.
Springer.
Xia, W., Zhao, P., Wen, Y., & Xie, H. (2016). A survey on data center networking (DCN):
Infrastructure and operations. IEEE communications surveys & tutorials, 19(1), 640-656.
Yao, H., Qiu, C., Fang, C., Chen, X., & Yu, F. R. (2016). A novel framework of data-driven
networking. IEEE Access, 4, 9066-9072.
Yu, K., Hua, Q., Nguyen, Q. N., Sukjaimuk, R., Safitri, C., & Sato, T. (2017, December).
Standardization activities for future networks in ITU-T: A case study from Y. 3071: Data
aware networking (Information Centric Networking)—Requirements and Capabilities.
MIS102 DATA AND NETWORKING
References
Bartulovic, M., Jiang, J., Balakrishnan, S., Sekar, V., & Sinopoli, B. (2017, November). Biases
in data-driven networking, and what to do about them. In Proceedings of the 16th ACM
Workshop on Hot Topics in Networks (pp. 192-198).
Hou, R., Fang, L., Chang, Y., Yang, L., & Wang, F. (2017). Named data networking over
WDM-based optical networks. IEEE Network, 31(3), 70-79.
Jiang, J., Sekar, V., Stoica, I., & Zhang, H. (2016). Data-Driven Networking: Harnessing the
“Unreasonable Effectiveness of Data” in Network Design.
Qi, R., Liu, W., Gutierrez, J., & Malik, A. W. (2016, April). Crash me if you can: Rethinking
sustainable data center networking from a topological perspective. In 2016 IEEE
Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 566-
571). IEEE.
Testa, F., & Pavesi, L. (Eds.). (2017). Optical Switching in Next Generation Data Centers.
Springer.
Xia, W., Zhao, P., Wen, Y., & Xie, H. (2016). A survey on data center networking (DCN):
Infrastructure and operations. IEEE communications surveys & tutorials, 19(1), 640-656.
Yao, H., Qiu, C., Fang, C., Chen, X., & Yu, F. R. (2016). A novel framework of data-driven
networking. IEEE Access, 4, 9066-9072.
Yu, K., Hua, Q., Nguyen, Q. N., Sukjaimuk, R., Safitri, C., & Sato, T. (2017, December).
Standardization activities for future networks in ITU-T: A case study from Y. 3071: Data
aware networking (Information Centric Networking)—Requirements and Capabilities.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
MIS102 DATA AND NETWORKING
In 2017 3rd IEEE International Conference on Computer and Communications
(ICCC) (pp. 418-423). IEEE.
MIS102 DATA AND NETWORKING
In 2017 3rd IEEE International Conference on Computer and Communications
(ICCC) (pp. 418-423). IEEE.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




