$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!


Discuss about the COIT20264 Network Design.


Network  Requirement.

Network design revolves around the customer service, meaning that a network should be always up like 100 percent and this network need to be in a position to adjust to the dynamic traffic loads and prove consistency in response, hence these calls for careful planning and design. These are the requirements we need to put into consideration when designing a network that will meet the client needs.

  1. Always build a network having in mind that it need to be up all time, hence we need to have alternatives in situations that the network fails how are we going to recover from that error, also suppose there is an issue of equipment failure how are we going to tackle the situation also on issue of overload how are we going to come up with a network that will be able to tackle overload issues.
  2. It is a requirement that the network we build do support the applications we are using effectively; also we need to understand that the response time should be very high in communication of these apps between the host. Once we achieve these we will be having the most efficient network.
  3. Network security is an important requirement for the networks design as it is important that the company data are protected while being transmitted over these network as well as the data stored on the devices that are used to connect to it. A well secured network locks out scammer and people trying to infiltrate the network.
  4. Scalability, and easy to modify is another requirement of the network, it should allow for growth and make it easy to make changes in situation of company growth or there is business changes in the company.
  5. Network trouble shooting should be made easy because on several occasion failures do occur, hence recovery from these problem should be so easy and not time-consuming saving a lot for the company.


These are the basic fundamentals for the network design to achieve the goals

Scalability-Network designs can be made in a way it allows room for growth to include new users in the company and increase the mobile site, it should support new application without causing an effect on service delivery of the current users.

Availability-Networks designed for high availability are the best since it delivers consistently, provide reliable performance, in addition it has a recovery mechanism such that in case of a failure it will not impact on the network performance.

Security-this is the most important feature of a network that is a must to be considered when coming up with a design and not after designing. It is so critical for safeguarding network resources.

Manageability-we should come up with a network design that is easy to manage and support, a network that is complex will compromise on the effectiveness and efficiency of the network. (Oppenheimer, 2011)


Logical Network Design

When designing the network topology for this network we are going to take top-down approach. From these approach the network applications and the service requirements is first identified before the network is designed to support all. Generally we first ensure that the new design works handles all the functions before it is being implemented.

With top down approach the designer gathers requirements by identifying the issues that affect the entire network and those affecting a given section; hence we can identify what our estimate can be in term of cost and time. a top down model we start from the application layer down to the physical layer

With the Australian project, the network design requires us to implement a network design that  involve  manning of unmanned Ariel vehicles, we are going to use computers mounted on mobile cars in motion as well as link to the main data centre where all the controls of these equipment will be done; these are the applications the company needs. These network for transport will  involve us of wireless network and satellite communications for those devices that are in constant motion so that the connectivity is not lost when these UAVs goes deep into the sea.

It will involve the use of commercial network like an internet service provider to allow connectivity of these devices since we are using mobile application, so that they can easily communicate to the devices in the main data centre and be able to acquire the information about the fish quantity in a given area. Satellite will come in a situation where the farmers are deep in the sea where the telecommunication devices cannot reach the place hence ensuring reliability, consistency and efficiency in information delivery to the fishermen. These are the logical design for the network. (Froehlich, 2010)

The AG network considers all the pc mounted vehicles, unmanned Ariel vehicles and any other device connected as a node in the network, it is capable of performing the services assigned to and exchange information.

We have the main data centre where observation and admin task is operated as well as remote stations for management purposes, these stations interact with the unmanned Ariel vehicles and then it analyses the data obtained from the sea and provides out to their members so as to know the best part to carry out fishing. The data centre also is a storage point where users can retrieve some history data when they want to analyse the fishing pattern.

Remote operator and the members of the company may interact with intermediate server to access information stored about the fishing report, they can also interact with the data processing system which interact with the unit tasked with collecting data so as to generate a precise report on fishing information.

Network design for reliability

For us to attain reliability of our network we will implement the Cisco three-layer hierarchical model made of core layer, distribution layer and the access layer. Core layer is mostly tasked for transporting data quickly and ensures reliability, hence always designer is to ensure core layer is fault tolerance and avoid delays in the network

Switches and routers at the core layer provide high speed and reliable connectivity. The core network has more than one links connecting the server and supports virtual private networks as well as WAN access. This core layer design primary goals is to provide the company 100 percent uptime, maximize throughput and to facilitate growth in the company.

Model for addressing and naming

IP addressing

The addressing scheme we are going to implement is the IP addresses to distinguish one network node from another. The IP address of devices in a network must be unique hence cannot be shared with any other node in the network simultaneously, a breach of that will make the router not know the best route to deliver packets to.

Ip addresses are centrally allocated from the main data centre in our AG network so as to ensure that we avoid the issue of duplicate addressing, from these centre is where we also do subdivision of network to smaller sub-networks (subnets) so that it make it easy for network management. (Nikolaidis, 2002)

IP assigning for the company we are going to use Dynamic IP address so as to make it easy for a new member to join the group since not all members are permanently in the network hence dynamic allocation makes it easy for network management.

Routing and Switching Protocol

IGP and EGP routing protocols.

These protocols are base on the autonomous system,it is a collection of routers in a company which are commonly used

Interior Gateway Protocols(IGP):these protocol is mostly for the internal network of the company

Exterior Gateway Protocols(EGP):is the official protocol for use when connecting to the internet and by remote users to access the company .

Distance Vector Routing Protocols

It help us identify how far the device we getting information from  hence choose the best way to relay information to the user, or we can channel the user to pick information from the nearest server so as to reduce the issue of delays. Distance Vector routing Protocol measure distance based on distance of the devices from the router and vector for purpose of the direction. These will enable the system choose the best shortest route to deliver the packets to destination.

Network security Mechanism

Physical Security

Physical security is all about limiting access to the company network resources, either in a well locked area, protecting from natural and human-caused disaster. Physical security locks out unauthorised personel or people with no skills on handling of the network devices also it help to protect from bad weather or any hazards event that can cause physical damage on these devices like breakages.


We need to authenticate the users requesting the services, it helps us separate members and non members of the company and prevent them from accessing data they are not subscribed to.


We need to set privileges for users of these network and what transaction they are able to transact in the network, hence we have to set users and assign each their roles, we can assign an administrator to manage these network and set user privileges.

Data Encryption

We need to have an encryption algorithm for our network to encrypt the data as it transit over the networks that intruders are not able to alter the meaning of these messages in transit. Hence ensure data accuracy and confidentiality.


We need to have a network firewall that will only allow genuine data necessary for the company network, any other data not useful are locked out from infiltrating our network, and hence we protect our client’s data, confidentiality and data integrity.

Intrusion Detection and Prevention Systems

This will detect any malicious activity in our network and it will raise a red flag to the administrator who is then able to act on the threat and introduce am mechanism to safe guard that event from not occurring anymore. (Gorodetsky, Kotenko and Skormin, 2005)



Froehlich, A. (2010). CCNA voice study guide. 1st ed. Indianapolis, Ind.: Wiley Pub.

Gorodetsky, V., Kotenko, I. and Skormin, V. (2005). Computer Network Security (vol. # 3685). 1st ed. Berlin Heidelberg: Springer-Verlag.

Nikolaidis, I. (2002). Cisco IP routing [Book Review]. IEEE Network, 16(2), pp.4-5.

Oppenheimer, P. (2011). Top-down network design. 1st ed. Indianapolis, Ind.: Cisco Press.


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). COIT20264 Network Design. Retrieved from

"COIT20264 Network Design." My Assignment Help, 2018,

My Assignment Help (2018) COIT20264 Network Design [Online]. Available from:
[Accessed 08 April 2020].

My Assignment Help. 'COIT20264 Network Design' (My Assignment Help, 2018) <> accessed 08 April 2020.

My Assignment Help. COIT20264 Network Design [Internet]. My Assignment Help. 2018 [cited 08 April 2020]. Available from: is the only dissertation writing help provider in Australia that offers the combination of quality and affordability. Students can take expert advice in selecting suitable dissertation writing topics, structuring dissertation ideas, gathering relevant research material, revising the written paper or even dissertation methodology help. As a result, they don't need to search 'who can do my dissertation', they can straight come to us. They can easily pay our expert for their assignment instead typing 'who can write my dissertation' on search engines.

Latest Database Samples

SIT772 Database And Information Retrieval

Download : 0 | Pages : 4

Answer: 1. Below is a list of documents in unstructured format that will be used to apply an index technique to convert them into an inverted index. Doc 1?Information retrieval is the activity of obtaining information resources relevant to an information need from a collection of information resources. Searches can be based on full-text or other content-based indexing. Doc 2?Information retrieval is finding material of an unstructured natur...

Read More arrow

ITECH2002 Systems Modelling

Download : 0 | Pages : 3
  • Course Code: ITECH2002
  • University: Federation University
  • Country: Australia

Answer: Background The report contains the details of the WestAust Corporation Ltd. who is looking to implement an Operations Management System. The system would be able to support the operations in the business of the organization. The organization works in the parcel system. They also provide services in the other sectors as well. The five sub-systems of the Operations Management System (OMS) for WestAust Corporation Ltd that have been identi...

Read More arrow Tags: Australia Abbotsford Management University of Sydney 

ITC548 System Analysis Project

Download : 0 | Pages : 10
  • Course Code: ITC548
  • University: Charles Sturt University
  • Country: Australia

Answer: Introduction This report aims to discuss the aspects of the implementation of the solutions of Telehealth Project. A review of the cloud based solutions along with the advantages and the disadvantages are provided in this report. The advantages and the disadvantages of the predictive SDLC approach and the advantages and the disadvantages of the Adaptive SDLC approach is provided in this approach is provided in this report. Lastly, thi...

Read More arrow

MITS5002 Software Engineering Methodology And Investments

Download : 0 | Pages : 15
  • Course Code: MITS5002
  • University: Victorian Institute Of Technology
  • Country: Australia

Answer: Introduction System is composed of different procedures that are brought together to complete a particular designated task within a specified period of time while information system is just a software used to give a particular data to it’s users. Information system in most organizations are managing and processing data as soon as the users request for the data. It can as well be used for planning long term activities in an orga...

Read More arrow

CPT140 Database Concepts And Relation

Download : 0 | Pages : 5
  • Course Code: CPT140
  • University: Royal Melbourne Institute Of Technology
  • Country: Australia

Answer: Question 1: 1.1 Give {LoanID}+: {LoanID, MemberFirstName, MemberLastName, Address, PostCode, LoanDate, ReturnDate, Title, Year, PublisherName, Year, LoanDate, ReturnDate} The closure of {LoanID} is in the above section. 1.2 Candidate Key:  MemberID – no redundant attribute MemberFirstName - redundant attribute MemberLastName – redundant attribute Address – redundant attribute PostCode – redunda...

Read More arrow

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

184 Order Completed

96% Response Time

Arapera Billing

Masters in Management, MMgt

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

416 Order Completed

95% Response Time

Tyler Moore

MBA in Accounting

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2632 Order Completed

100% Response Time

Albert Ambrosio

MSc in Nursing

London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

Good work. it was on topic base, understandable and relevant. Help me to achieve great mark. Really appreciate.


User Id: 78040 - 08 Apr 2020


student rating student rating student rating student rating student rating

got assignment completed on time. I had lot of important information and up to the point.


User Id: 299002 - 08 Apr 2020


student rating student rating student rating student rating student rating

I was so excited to share my experience. I had Peter help me with assignment. He did and exceptional job that I couldn\'t believe it. I got an A+ PERFECT SCORE! ALL i can say is WOW! THANK YOU.


User Id: 307193 - 08 Apr 2020


student rating student rating student rating student rating student rating

Excellent work from the teacher. I got excellent marks and Assignment help had given the. assignment in the time.


User Id: 213317 - 08 Apr 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?