The Networking is a very important tool for the any kind of organization (Kretz et al. 2015). The office building of any kind of organization would require a network setup for their business. A startup business was opened by a small to medium sized company. The owner of the company Rebbeca provided certain criteria that were to be met by the network system that was to be implemented in the building. I was assigned the task of designing the network layout for the company (Majchrzak and Sakurai, 2016).
The report contains the documentation of the network system that is to be designed for the company.
The report consists of the assumptions that were to be made before the starting of the designing process of the network. In addition to this the report contains the network design and proper justification for the design of the network that id proved in the report. Some recommendation for the network has also been provided to the company for the network system.
Before the designing of the network some assumptions were to be made.
Firstly, the owner had mentioned that their company was a startup. Hence, it was assumed that, the office building that the company was going to use was, a new one. Hence, the building did not have any kind of networking structure existing it and the network system implementation process had to be started from scratch.
In addition to this, tit has been said the number total staffs in the office were 50. Therefore in the present design accommodation of only 50 staffs were made. The number of users that were using the desktop were 20 and it is assumed that the desktop users had no scope to access the wireless functions of the network. In addition to this the laptop user group consisted of 20 users and it is assumed that the laptops were Wifi enabled. In addition to this the other 10 users had to bring their own device. And it is assumed that, the BYOD users were using laptops. Although there has been a scope for LAN connections in the network for the BYOD users if somebody wants to bring their desktops into the office.
It is also assumed that the company would be obtaining the bandwidth for the network from the local internet service provider.
In addition to this it is assumed that there would be a board room in each of the floor of the building. And the ground floor of the building would be containing the server room which is to be accessed by the administrators only. And it was also assumed that the OLEDs that were to be installed in the board rooms were wifi enabled.
In addition to this, since the company is a startup therefore it was assumed that there would be more staffs that have to be allocated in the network in the feature hence the network would have to constructed keeping the scope for additional staffs in the future.
Figure 1: Network Topology Diagram
Source: (created by Author)
The justification for the diagram of the network design has been provided below.
Firstly, as the instruction of the owner the network security has been given the topmost priority. Therefore a fire wall has been installed at the entry point of the internet connection into the network. This would also prohibit the external access to the network and defend the network against virus and malware attacks.
In addition to this the witches have been implemented in each of the floor. So, that the network would be accessible through all the points of the network in the building. In addition to the switches are connected to the wireless routers that are installed in each floor of the building and also to the printers that are installed for each floor of the building. This would enable all the staffs the opportunity of remote access to the network from any part of the building and would aslo allow them access to all the printers from any part of the building.
In addition to this the SMTP, FTP and HTTP protocols are also implemented in the network. This enable the staffs to communicate among themselves and also allow them to exchanged data in between them. It also help them in downloading the files from the internet. This would allow the senior officials that send huge amount of data throughout network to perform their task efficiently.
The switches that installed in each of the floors are connected to board rooms in each of the floor of the office building. Therefor the whenever any kind of information is to be circulated from the board room to the whole office it can be done instantly.
In addition to this the provision for some extra machines in the network can also be made, so that even if there some extra staffs that are recruited in the company accommodation for the staffs can be made easily into the network.
Hence, all the criteria of the owner of the company would be met successfully by this network design.
The following recommendation can be provided to the company for maintaining and improving the network structure efficiently:
Monitoring: It is necessary for the company to monitor the network components so that, they work efficiently. Thorough checkup process for the network components are to be done daily.
Bandwidth: In addition to this, it is advisable for the company to increase their bandwidth in case there are requirements for which additional machines are to be added to the network.
Replacing the Desktops: It is also advisable for the company to change the desktops and replace them with laptops, as this would enable the whole network to be wireless and would increase the overall efficiency of the network in return.
Updating: In addition to this it is to be seen that the firewall and the antiviruses are upgraded regularly so that the network would not be subjected to external intrusion.
Accessibility: It also advisable for the company that the company implement proper restriction for the server room. So, that everyone in the office cannot access the server easily and only the administrator is able to access the server. In addition to this the administrator should monitor the network system and check the process of the network regularly.
Testing: In addition to this the security of the networked should be tested with mock hackers. They should try and find out the point through which the security of the network can be breached easily and try to seal them up.
For conclusion it can be said the report provides the thorough analysis of the network design and provides the essential documentation for it. The report provides the assumptions and the network design for the company. In addition to this the justification of the network design and proper recommendations for the company for proper maintenance and up gradation for the network is also provided in the report. It is be seen that the server is restricted and no outside interference in the server room should be allowed for proper functioning and maintenance of the network. In addition to this the administrator should also monitor the system and perform proper routine checkups on the network. In addition to all these it can also be said that the network that is design should meet the criteria of the owner.
Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S. and Uhlig, S., 2015. Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), pp.14-76.
Majchrzak, T.A. and Sakurai, M., 2016. Design Principles for the Use of Social Networking Services to Promote Transdisciplinary Collaboration, Public Deliverable, SMR Project (H2020-DRS-2014 653569).
Nunes, B.A.A., Mendonca, M., Nguyen, X.N., Obraczka, K. and Turletti, T., 2014. A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys & Tutorials, 16(3), pp.1617-1634.
Rennie, F. and Morrison, T., 2013. E-learning and social networking handbook: Resources for higher education. Routledge.
Ros-Giralt, J., Commike, A., Honey, D. and Lethin, R., 2015, November. High-performance many-core networking: design and implementation. In Proceedings of the Second Workshop on Innovating the Network for Data-Intensive Science (p. 1). ACM. Jiang, J., Sekar, V., Stoica, I. and Zhang, H., 2016. Data-Driven Networking: Harnessing the “Unreasonable Effectiveness of Data” in Network Design. Technical report, 2016. Technical Report CMU-CS-16-102.
Singh, S., Mudgal, P., Chaudhary, P. and Tripathi, A.K., 2015. Comparative Analysis of Packet Loss in Extended Wired LAN Environment. International Journal of Computer Applications, 117(2).
Singh, S., Pandey, N. and Tripathi, A.K., 2015. Extracting Maximum Utilization of data Packets in LAN. Gupta, S., 2016. A Comparative Analysis of Wired and Wireless Network Architecture. International Journal of Emerging Trends in Research, 1(1), pp.05-11.
Xylomenos, G., Ververidis, C.N., Siris, V.A., Fotiou, N., Tsilopoulos, C., Vasilakos, X., Katsaros, K.V. and Polyzos, G.C., 2014. A survey of information-centric networking research. IEEE Communications Surveys & Tutorials, 16(2), pp