$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!


Discuss about the COIT20264 Network Design.


Network  Requirement.

Network design revolves around the customer service, meaning that a network should be always up like 100 percent and this network need to be in a position to adjust to the dynamic traffic loads and prove consistency in response, hence these calls for careful planning and design. These are the requirements we need to put into consideration when designing a network that will meet the client needs.

  1. Always build a network having in mind that it need to be up all time, hence we need to have alternatives in situations that the network fails how are we going to recover from that error, also suppose there is an issue of equipment failure how are we going to tackle the situation also on issue of overload how are we going to come up with a network that will be able to tackle overload issues.
  2. It is a requirement that the network we build do support the applications we are using effectively; also we need to understand that the response time should be very high in communication of these apps between the host. Once we achieve these we will be having the most efficient network.
  3. Network security is an important requirement for the networks design as it is important that the company data are protected while being transmitted over these network as well as the data stored on the devices that are used to connect to it. A well secured network locks out scammer and people trying to infiltrate the network.
  4. Scalability, and easy to modify is another requirement of the network, it should allow for growth and make it easy to make changes in situation of company growth or there is business changes in the company.
  5. Network trouble shooting should be made easy because on several occasion failures do occur, hence recovery from these problem should be so easy and not time-consuming saving a lot for the company.


These are the basic fundamentals for the network design to achieve the goals

Scalability-Network designs can be made in a way it allows room for growth to include new users in the company and increase the mobile site, it should support new application without causing an effect on service delivery of the current users.

Availability-Networks designed for high availability are the best since it delivers consistently, provide reliable performance, in addition it has a recovery mechanism such that in case of a failure it will not impact on the network performance.

Security-this is the most important feature of a network that is a must to be considered when coming up with a design and not after designing. It is so critical for safeguarding network resources.

Manageability-we should come up with a network design that is easy to manage and support, a network that is complex will compromise on the effectiveness and efficiency of the network. (Oppenheimer, 2011)


Logical Network Design

When designing the network topology for this network we are going to take top-down approach. From these approach the network applications and the service requirements is first identified before the network is designed to support all. Generally we first ensure that the new design works handles all the functions before it is being implemented.

With top down approach the designer gathers requirements by identifying the issues that affect the entire network and those affecting a given section; hence we can identify what our estimate can be in term of cost and time. a top down model we start from the application layer down to the physical layer

With the Australian project, the network design requires us to implement a network design that  involve  manning of unmanned Ariel vehicles, we are going to use computers mounted on mobile cars in motion as well as link to the main data centre where all the controls of these equipment will be done; these are the applications the company needs. These network for transport will  involve us of wireless network and satellite communications for those devices that are in constant motion so that the connectivity is not lost when these UAVs goes deep into the sea.

It will involve the use of commercial network like an internet service provider to allow connectivity of these devices since we are using mobile application, so that they can easily communicate to the devices in the main data centre and be able to acquire the information about the fish quantity in a given area. Satellite will come in a situation where the farmers are deep in the sea where the telecommunication devices cannot reach the place hence ensuring reliability, consistency and efficiency in information delivery to the fishermen. These are the logical design for the network. (Froehlich, 2010)

The AG network considers all the pc mounted vehicles, unmanned Ariel vehicles and any other device connected as a node in the network, it is capable of performing the services assigned to and exchange information.

We have the main data centre where observation and admin task is operated as well as remote stations for management purposes, these stations interact with the unmanned Ariel vehicles and then it analyses the data obtained from the sea and provides out to their members so as to know the best part to carry out fishing. The data centre also is a storage point where users can retrieve some history data when they want to analyse the fishing pattern.

Remote operator and the members of the company may interact with intermediate server to access information stored about the fishing report, they can also interact with the data processing system which interact with the unit tasked with collecting data so as to generate a precise report on fishing information.

Network design for reliability

For us to attain reliability of our network we will implement the Cisco three-layer hierarchical model made of core layer, distribution layer and the access layer. Core layer is mostly tasked for transporting data quickly and ensures reliability, hence always designer is to ensure core layer is fault tolerance and avoid delays in the network

Switches and routers at the core layer provide high speed and reliable connectivity. The core network has more than one links connecting the server and supports virtual private networks as well as WAN access. This core layer design primary goals is to provide the company 100 percent uptime, maximize throughput and to facilitate growth in the company.

Model for addressing and naming

IP addressing

The addressing scheme we are going to implement is the IP addresses to distinguish one network node from another. The IP address of devices in a network must be unique hence cannot be shared with any other node in the network simultaneously, a breach of that will make the router not know the best route to deliver packets to.

Ip addresses are centrally allocated from the main data centre in our AG network so as to ensure that we avoid the issue of duplicate addressing, from these centre is where we also do subdivision of network to smaller sub-networks (subnets) so that it make it easy for network management. (Nikolaidis, 2002)

IP assigning for the company we are going to use Dynamic IP address so as to make it easy for a new member to join the group since not all members are permanently in the network hence dynamic allocation makes it easy for network management.

Routing and Switching Protocol

IGP and EGP routing protocols.

These protocols are base on the autonomous system,it is a collection of routers in a company which are commonly used

Interior Gateway Protocols(IGP):these protocol is mostly for the internal network of the company

Exterior Gateway Protocols(EGP):is the official protocol for use when connecting to the internet and by remote users to access the company .

Distance Vector Routing Protocols

It help us identify how far the device we getting information from  hence choose the best way to relay information to the user, or we can channel the user to pick information from the nearest server so as to reduce the issue of delays. Distance Vector routing Protocol measure distance based on distance of the devices from the router and vector for purpose of the direction. These will enable the system choose the best shortest route to deliver the packets to destination.

Network security Mechanism

Physical Security

Physical security is all about limiting access to the company network resources, either in a well locked area, protecting from natural and human-caused disaster. Physical security locks out unauthorised personel or people with no skills on handling of the network devices also it help to protect from bad weather or any hazards event that can cause physical damage on these devices like breakages.


We need to authenticate the users requesting the services, it helps us separate members and non members of the company and prevent them from accessing data they are not subscribed to.


We need to set privileges for users of these network and what transaction they are able to transact in the network, hence we have to set users and assign each their roles, we can assign an administrator to manage these network and set user privileges.

Data Encryption

We need to have an encryption algorithm for our network to encrypt the data as it transit over the networks that intruders are not able to alter the meaning of these messages in transit. Hence ensure data accuracy and confidentiality.


We need to have a network firewall that will only allow genuine data necessary for the company network, any other data not useful are locked out from infiltrating our network, and hence we protect our client’s data, confidentiality and data integrity.

Intrusion Detection and Prevention Systems

This will detect any malicious activity in our network and it will raise a red flag to the administrator who is then able to act on the threat and introduce am mechanism to safe guard that event from not occurring anymore. (Gorodetsky, Kotenko and Skormin, 2005)



Froehlich, A. (2010). CCNA voice study guide. 1st ed. Indianapolis, Ind.: Wiley Pub.

Gorodetsky, V., Kotenko, I. and Skormin, V. (2005). Computer Network Security (vol. # 3685). 1st ed. Berlin Heidelberg: Springer-Verlag.

Nikolaidis, I. (2002). Cisco IP routing [Book Review]. IEEE Network, 16(2), pp.4-5.

Oppenheimer, P. (2011). Top-down network design. 1st ed. Indianapolis, Ind.: Cisco Press.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). COIT20264 Network Design. Retrieved from

"COIT20264 Network Design." My Assignment Help, 2018,

My Assignment Help (2018) COIT20264 Network Design [Online]. Available from:
[Accessed 11 July 2020].

My Assignment Help. 'COIT20264 Network Design' (My Assignment Help, 2018) <> accessed 11 July 2020.

My Assignment Help. COIT20264 Network Design [Internet]. My Assignment Help. 2018 [cited 11 July 2020]. Available from: is the only dissertation writing help provider in Australia that offers the combination of quality and affordability. Students can take expert advice in selecting suitable dissertation writing topics, structuring dissertation ideas, gathering relevant research material, revising the written paper or even dissertation methodology help. As a result, they don't need to search 'who can do my dissertation', they can straight come to us. They can easily pay our expert for their assignment instead typing 'who can write my dissertation' on search engines.

Latest Database Samples

ITECH2306 Agile Coding

Download : 0 | Pages : 4
  • Course Code: ITECH2306
  • University: Federation University
  • Country: Australia

Answer: UML Class Diagrams Before   After   Screenshots demonstrating that your JUnit tests prove that the system has worked as expected Screenshot 1:   Screenshot 1 represents passed JUnit test cases of the 7-property rate calculation when each of the ratepayer did not do any charitable work. Screenshot 2:   Screenshot 2 represents passed Junit test cases of the 7-property rate calculation when each of the ratep...

Read More arrow Tags: Australia Arlington Management University of New South Wales 

COIT20247 Database Design And Development 3

Download : 1 | Pages : 2

Answer: Entity Relationship Diagram   (Smartdraw, 2016) Assumptions and Business Rules Following business rules and assumptions are put into practice into the CQI database- A customer can insure more than one property. Each property should be attached with addresses. Each claim should be belonged to one customer. The policy premium will be on yearly basis in CQI. The policy types available at CQI are- ‘Home’, &lsquo...

Read More arrow

TCC 233 Database Management Systems

Download : 0 | Pages : 7
  • Course Code: TCC 233
  • University: Wawasan Open University
  • Country: Malaysia

Answer: About Attributes and Tuples:  In the Student Relation of figure 1, tuple is a row. Here, it has 5 tuples with 6 values that is called as 6 tuples. In general, n- tuples has a list ordered of values n.  If t1 is refer to first tuple variable for the relation STUDENT, then t1 = <S10010, Chan Wai Yee, 56A, Jalan 2/14, Taman Midah, kuala Lampur, 012-3256780, F,>, similarly for the other.  Tuples may ap...

Read More arrow

OIT20247 Database Design And Development

Download : 0 | Pages : 2

Answer: Business Rules Every Entity Relationship Model must have a strong set of business rules. For the CQ Insurance company’s database adaptation, the business rules that have been implemented into the ER Diagram are as follows: A customer can apply for only one of the insurance policies. He can buy the insurance for either a building policy or a home-contents policy for a particular property of his interest, or may be a building-c...

Read More arrow

ISYS616 Systems Analysis And Design

Download : 1 | Pages : 4

Answer: Reflective Journal System Analysis & Design is one of the most significant aspects of the system development projects. There are several concepts that are defined under system analysis & design. The application of these concepts shall be done to design and develop a flexible, scalable, and reliable system. I got an opportunity to apply these concepts and my understanding of the methods on Waiters on call meal-delivery system t...

Read More arrow

Save Time & improve Grade

Just share Requriment and get customize Solution.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

647 Order Completed

98% Response Time

Adlina Han

Masters in Marketing with Specialization in Branding

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2115 Order Completed

97% Response Time

Kimberley Chen

MPA in Accounting

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

93 Order Completed

100% Response Time

Jackson Mitchell

MiM (Masters in Management) in Supply Chain Management

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

440 Order Completed

99% Response Time

Jack Arens


London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

This is one class that I absolutely hate to do the discussion questions and assignments so this service has been the best thing every and my grades are always an A


User Id: 451554 - 11 Jul 2020


student rating student rating student rating student rating student rating

This has been such a great service and I wish I had used them last year and before this session. Makes my life much easier.


User Id: 451554 - 11 Jul 2020


student rating student rating student rating student rating student rating

Always fast turn around time and quality work. Wish I had used them the last two years.


User Id: 451554 - 11 Jul 2020


student rating student rating student rating student rating student rating

I am writing to inform you that I have received my grades for Human Growth & Development. They are as follows: Assignments 8 & 4 = 100%. Thank you for such professional services rendered! I am looking forward to a continued relationship in the futu...


User Id: 452606 - 11 Jul 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?