This documentation is a proposal for network design and implementation for ABX legal and accounting firm in its headquarter office. The report also describes development of a virtual private network that links the network between three offices. The study includes designing a network diagram in the headquarter office for the layout of the network to be implemented and a diagram for linking the network between the offices. The design explains hardware’s and software specification and the security features that will protect network from intruders. Selection of high performing hardware and software’s will make the network work more efficiently according to (Pak et al,2008), this theory is also applied in the network design.
Network segment
This is a section of the computer that is separated from the rest of the network with networking devices such as repeater or switch or router. Each segment contains different type of hosts. The hosts varies according to type of devices that separate them .This network will have three segments and they will be connected together through cloudy.
Hardware and software components.
A combined hardware and software framework for ABX company network is developed for mechanical and structural monitoring. A system sensor node will be designed, established and calibrated for monitoring the network and modal identification. Software components will be implemented with the aim of providing an elastic platform in which applications that are being used in the company will run more smoothly and efficiently (Patra et al,2009). This components generally entails protocols and consistent commands broadcasting through the network framework and collection of data. Some improvement to application components are also explained like data pipelining.
Hardware
The network will consist of sensor hardware components, filters, microcontroller and wireless communication access points. The use of sensors is cost effective since it allows examination of network performance. Hardware components that will be used incorporate the following
Ethernet
The network will be implemented using 10base 5 and 10base 2 varieties of Ethernet. In this point multiple network segment will be implemented using repeaters to form a domain that is large.
Layer one segment
Twisted Ethernet cables, repeaters and hubs will be used to join electrical segments. This is the extension of OSL layer 1 network that is equal to the domain.
Segment two
Switches and bridges will be used to combine multiple layers this is because all the network nodes corresponds with each other through MAC addressing(Powell,2010). This will be better because traffic between the two layers will be separated using VLANS
Token ring
The stations linked to the same media are of the same network.
Token bus
All stations that are linked to the same bus are part of the same network segment.
Segment three
Also known as the subnetwork, formed by all nodes sharing the same prefix and defined by a mask .They will communicate directly through layer 2 this will be implemented at the headquarters. Transmitting network packets within this layer will require implementation of a router in the network (Sandberg et al,2013).
Network diagram
Above is the network diagram that will be used implementing network between the offices. All the network from the offices will be linked to cloud. This means independent network system from the offices will link to cloud. This connects office network together and the users can access any information from each office regardless in which office he is working from. Users also can get access to the company’s network from their homes through accessing the network from cloudy.
Software requirements
The network system will be based on TinyOs operating system that is opensource.This is high level application that supports a wide variety of applications.it has high level components that will achieve network security and routing of data packets within the network. Other applications like Microsoft word will be installed in clients’ computers .Business applications that are used to run company activities are accessed from the server (Tanenbaum,2014).
Network Security Requirements.
The company’s network will be more secured. Each network is installed with a security firewall that will filter spying application from ` accessing the company information. Since security threats exist in many forms .The aim of this is not to provide a comprehensive security source but to provide a protection for exposure in major security threats that are likely to affect the system (Wang et al,2010). The two main categories that are addressed.
Topology that will be implemented is the star bus topology. The star topology is so called because each computer (or other network device) connects to a central hub, with the cable forming the shape of a star. Bus topology is also applied in some parts of the network as shown below.
Using modern hardware components and updated software will make the company’s network to be faster efficient. This network devices should be highly protected with antiviruses to prevent intruders from accessing classified information from the company.
Pak ad, S.N., Fenves, G.L., Kim, S. and Culler, D.E., 2008. Design and implementation of scalable wireless sensor network for structural monitoring. Journal of infrastructure systems, 14(1), pp.89-101.
Patra, R.K., Nedevschi, S., Surana, S., Sheth, A., Subramanian, L. and Brewer, E.A., 2009, April. WiLDNet: Design and Implementation of High Performance WiFi Based Long Distance Networks. In NSDI (Vol. 1, No. 1, p. 1).
Powell, W.B. and Sheffi, Y., 2010. Or practice—design and implementation of an interactive optimization system for network design in the motor carrier industry. Operations Research, 37(1), pp.12-29.
Sandberg, R., Goldberg, D., Kleiman, S., Walsh, D. and Lyon, B., 2013, June. Design and implementation of the Sun network filesystem. In Proceedings of the Summer USENIX conference (pp. 119-130).
Tanenbaum, A.S. and Woodhull, A.S., 2014. Operating systems: design and implementation (Vol. 2). Englewood Cliffs, NJ: Prentice-Hall.
Wang, S.Y., Chou, C.L., Huang, C.H., Hwang, C.C., Yang, Z.M., Chiou, C.C. and Lin, C.C., 2010. The design and implementation of the NCTUns 1.0 network simulator. Computer networks, 42(2), pp.175-197.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Diploma Of Information Technology. Retrieved from https://myassignmenthelp.com/free-samples/ict50115-diploma-of-information-technology/source-software.html.
"Diploma Of Information Technology." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/ict50115-diploma-of-information-technology/source-software.html.
My Assignment Help (2021) Diploma Of Information Technology [Online]. Available from: https://myassignmenthelp.com/free-samples/ict50115-diploma-of-information-technology/source-software.html
[Accessed 23 April 2021].
My Assignment Help. 'Diploma Of Information Technology' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/ict50115-diploma-of-information-technology/source-software.html> accessed 23 April 2021.
My Assignment Help. Diploma Of Information Technology [Internet]. My Assignment Help. 2021 [cited 23 April 2021]. Available from: https://myassignmenthelp.com/free-samples/ict50115-diploma-of-information-technology/source-software.html.
Myassignmenthelp.com is committed to ease out the life of students with unmatched help on assignments, homework/coursework, dissertation, essays, research papers and others. Our fast turnaround time along with low prices ensures that students flock to us in 100s. The best part is that one gets top quality works at minimum prices along with expert guidance from a large number of PhD Scholars.
Answer Introduction The main factors of pollution this days are dusty bins. They create unhygienic conditions in areas which they are located. To solve this issue a smart waste management dustbin system has to be developed to control and manage wastes. The system will be called IOT waste management system. In this system cabbages will be located around a city. This cabbages are fixed with sensors and ID numbe...
Read MoreAnswer: Flight Management System (FMS) is used for the management of different works of aircraft controls, such as navigation, autopilot, and many others. They used super computers for managing different works of aircraft controls. Super computers are reliable for managing all the work in a hard deadline. They are fast in processing, as they used real time operating system. Super computers are having backup systems for data storages of all ac...
Read MoreAnswer: Chapter 1: Network Traffic Signatures This chapter explains the Common Vulnerabilities and Exposures (CVE) that are to be used in a system. The working of CVE is explained in this chapter which helps the security device and the hardware device by drawing same vulnerabilities in a database. This chapter also consists of a detailed study of signature analysis which is a set of characteristics which defines the network activity type. Sig...
Read MoreAnswer: Routing is the process by which the best route is chosen among many routes in order to transmit data between the source and the destination. The choice of routes depend on the routing protocols that are implemented in any given network. The routing protocols utilizes different metrics in order to select the best routes to transmit data. This paper describes how RIP with IPv6 address can be improved in any given network topology in orde...
Read MoreAnswer: Operation Bluetooth is dependent on radio waves for transaction of the data. Bluetooth sends and receives the signal in bands. The bands that are prosecuted in between the projection of the management of signals includes 79 bands. All these 79 bands consists of different frequency. 2.4 GHz is the central band of frequency. 2.4GHz is set aside for medical purposes and is not used for regular day to day use. But the networking tha...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
So satisfied with this expert, they were able to go over and beyond to make sure I get a good grade on this assignment. Thanks again
Australia
They did a great job on my literature project. I got an A on that and the other ones as well.
Australia
Thank you turnit in reports shows only 2 % of similarity....Thank you so much I like the system
Australia
great work, plagiarism free, recieved good feedback .................................
Australia