Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
loader
Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

ISSC341 Introduction To Networking

tag 0 Download 0 Pages / 0 Words tag 21-06-2022

Answer:

Introduction

The report is prepared for the development of network design for a building having 3 floors and the data center is located at the 3rd floor of the building. Each of the floor of the building have desktops and servers and are connected with the data center. The network topology and the cabling plan used for interconnecting the servers, PCs and the data centers are analyzed and the network design is created. The need for creation of the Virtual private network and the security measures that are required to be applied for securing the network from external access is documented in the report.

Designing the network

The network design is created including all the necessary networking devices and the diagram illustrates the network plan followed for the development of the network. The network is secured from outside intruder by installation of firewall ate the entry and the exit point of the network. The routers used in the network are properly labelled for each of the floor and switches are used and the routers are configured with VPN and proper cabling layout is used for creation of the design. The design is created following the WAN technology and remote connectivity of the network is enabled for increasing the efficiency and flexibility of the network. The firewall is required to be configured for allowing the administrative PC to gain access of the resources. Separate router and switches are used for each of the floor for reducing congestion in the traffic and separate VLAN are created for the different group if employees for easy management of the network. Power management and cooling of the data center is required for designing the network and the space allocation is also important for reducing the risk of tampering of the network components. The data center is required to be secured from unauthroised access and CCTV and biometric device is required to be installed increasing the security of the data center.

Figure 1: Logical Network Design

(Source: Created by author)

Network cabling plan

The LAN type is required to be selected for the development of the network cabling plan. For interconnecting the devices the interface is required to be used and copper straight through cables are used for interconnecting the switch and the workstations. Serial cables are used for interconnecting the central router with the routers of different department and segments of the building. The backbone of the network uses the fiber optics cable for larger bandwidth and faster transmission of data packets in the network. Cat 6 cables are used for long distance connection of the workstation with the switch or the router and the distance is limited to 100 meters.

Implementation of Active Directory Service

Emerging technology can be used for increasing the efficiency of the network and configuration of the active directory in the server used in the network would help in managing the network from a single point. The virtualization of the server helps in sharing of the resources and thus reduces the extra hardware cost. The main sources of the internet is protected with the installation of the firewall and appropriate authentication is used for protecting the data center and privacy of the organizational data. A DNS model is adopted for the configuration of the server and the network development team works on mixed mode for the implementation of the active directory. A central router connects the data center and the other routers installed at different floors of the building. A subnet is created for each of the floor and the devices in the network are provided with the IP address for connecting in the network. The central router is configured with VPN and it is used by the user to send and receive data in the public and the shared network. The VPN is used for securing the intranet and access the office network from remote location. The router is configures with tunneling and encryption protocol and it provides benefit for the wide area network. The router is configured with ACL (Access Control List) for limiting the access of the resource and adding permission to the authorized staffs for the development of the network. Active directory is required to be configured on the server and best practice is required to be followed for the management of the group policy in the network. The occupational and the safety of the devices are required to be developed for the development of the network. The network is design by eliminating the risk and hazards associated with the network and proper ventilation and air conditioning is required to be installed get the best performance from the devices used in the network. The installation of rack cabinet would help to save space in the workplace and a power management is also essential for avoiding situation of network downtime.

Identification of the service and the Server

There are different servers required to be installed for the management of the network and the data center is required to be managed for the identification of the server and the service.

Web server: The web server is required to be installed in the floor for the management of the information system and it comes as a package of the internet and the intranet related program. The server side programming is required to be done for optimization of the interface used for connecting the data center.

Mail Server: A mail server is configured for the management of the email account of the user and the various staffs need to communicate via the email server installed in organizational network. The deployment of the mail server in the organizational network helps to keep the records of the employees and helps in easy management.

File Server: The file server is used for storing the various files and folders and fetch them when required. The access of the file server is required to be limited and write permission should not be provided to the reducing the risk of data loss

Allocation of the IP address and subnet masking

The IP address and subnet mask is required to be assigned for each of the routers installed in the network and they are listed as follows:

Central router- 172.28.0.1/24

Business Router – 172.28.2.1/24

Accounting Router – 172.28.3.1/24

Administrative Router – 172.28.4.1/24

Web Server – 172.28.4.2/24

Mail Server – 192.28.4.3/24

File Server – 172.28.4.4/24

Simulation of the network design using cisco packet tracer

The created network is tested multiple times in cisco packet tracer after configuring the device in the network. The packets are sent from one router to another for finding proper working of the network.

Figure 2: VPN topology diagram of the network

(Source: created by author)

Figure 3: Simulation of the PC and routers

(Source: Creatre by author)

Request for proposal and the equipment’s

The network is required to be designed for the accommodation of 100 user for each of the floor. The entire design of the network is analyzed and software, hardware equipment required for the development of the network is listed for implementation of the WLAN. The scope of the project are as follows:

  • Proper development of the design of the network
  • Deployment of the Email server for communicating with the users
  • Securing the data center from unauthroised access

The network design is created and a proper plan is required to be created for the deployment of the network. A project manager is required to be appointed and a schedule is created for the development of the network. The resources required for the development of the network is analyzed and a proper budget is estimated for the development of the network solution. The timeline of the project is as follows:

Activities

Time

Designing of the network

10 days

Analysing the resources required for designing the network

15 days

Preparation of the cabling plan

30 days

Creation of the project development team

15 days

Deployment of the network

10 days

Project Closure

10 days

Different service are required to be embedded like ISP internet service provider, mail service and web service for the managing the different function of the network.

Measures for prevention of security attacks

For maintaining the confidentiality of the network it is required to be secured from unauthroised access and the network resources such as the routers and the switches is required to be protected with passwords. The hackers mainly uses the application layer in the network for gaining access of the resources and for prevention of the attack the firewall is installed at the entry point and the router is segmented with different security requirements. The security patches is required to be installed when released by the application vendor for reducing the risk of DoS attacks or SQL injections. The intranet based application is required to be blocked to use the internet and the database server is required to be encrypted for protecting the sensitive information.

Conclusion

From the report it can be concluded that for the development of the network solution the requirement of the organization is required to be analyzed. The different networking devices are required to be secured with the installation of the firewall and it is required to be configured for securing the network from unauthroised access. The data center designed for the network is required to be available during the peak time and it is required to be flexible for connecting the users in the network. An appropriate area is required to be analyzed for using the cable and connecting the devices getting the maximum performance from the devices. The network cable is required to be selected for maintaining a balance of the cost of the network for the copper and the fiber medium. The power supply and other electrical interference is required to be removed for reducing the risk of signal distortion and loss of data packets.

References

Carthern, C., Wilson, W., Bedwell, R., & Rivera, N. (2015). The Network Layer with IP. In Cisco Networks (pp. 49-68). Apress.

Dowler, P., Demleitner, M., Taylor, M., & Tody, D. (2013). Data access layer interface, version 1.0. IVOA Recommendation. URL: http://www. ivoa. net/documents/DALI.

Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., ... & Darrell, T. (2014, November). Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the 22nd ACM international conference on Multimedia (pp. 675-678). ACM.

Kumari, N., Sharma, E. B., & Saini, R. K. (2016). Comparative Study of RIPng and OSPFV3 with IPV6. International Journal, 6(9).

Morgan, W., Tam, R., Gerasimova, N., Gastauer, K., Rasgado, S., Einstein, K., ... & Townsend, E. (2016). U.S. Patent Application No. 15/361,769.

Sánchez, A., Villarrubia, G., Zato, C., Rodríguez, S. and Chamoso, P., 2013. A gateway protocol based on FIPA-ACL for the new agent platform PANGEA. In Trends in Practical Applications of Agents and Multiagent Systems (pp. 41-51). Springer International Publishing.

Simmons, J. M. (2014). Optical network design and planning. Springer.

Wan, W. and Li, J., 2014, February. Investigation of state division in botnet detection model. In Advanced Communication Technology (ICACT), 2014 16th International Conference on (pp. 265-268). IEEE

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

Upload
Unique Document

Document
Under Evaluation

Get Money
into Your Wallet

Total 0 pages

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2022). Introduction To Networking. Retrieved from https://myassignmenthelp.com/free-samples/issc341-introduction-to-networking/it-networking-designing.html.

My Assignment Help (2022) Introduction To Networking [Online]. Available from: https://myassignmenthelp.com/free-samples/issc341-introduction-to-networking/it-networking-designing.html
[Accessed 05 October 2022].

My Assignment Help. 'Introduction To Networking' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/issc341-introduction-to-networking/it-networking-designing.html> accessed 05 October 2022.

My Assignment Help. Introduction To Networking [Internet]. My Assignment Help. 2022 [cited 05 October 2022]. Available from: https://myassignmenthelp.com/free-samples/issc341-introduction-to-networking/it-networking-designing.html.


Stuck on Any Question

Our best expert will help you with the answer of your question with best explanation.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

loader
250 words
Error goes here

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

We Can Help!

Get top notch assistance from our best tutors !
Excel in your academics & career in one easy click!

icon

Other Samples

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.com then please raise the content removal request.

icon

5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile
Have any Query?