$20 Bonus + 25% OFF +
5
%
Cashback
information
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Question:

Starting from the logical design of the network that you completed in Assessment item 1, you are required to undertake the physical design of the network taking into consideration the feedback that you received in Assessment Item 1. In order to undertake your physical design, you may need to make further justifiable assumptions. You also have to complete your final network design report.

In this process, you are expected to participate in the weekly discussions and find the answers to the recommended discussion questions.  Discussion questions have been selected and created not only to gradually increase your knowledge and skills in this course but also to help produce the final network design report.  The students who do not attempt weekly discussion questions would very likely produce a report that would not satisfy the requirements and/or that cannot be justified.
 

 

Answer:

2.0 Introduction

2.1 introduction

In technology era, computer network plays an effective role and helps organization to communicate form source to destination end in effective and successful manner. A computer network is group of computer devices such as hardware devices that is connected with the help of communication channel to offers resource sharing and communication among wide range of organizations as well as clients (Shinde, 2009). Thus as per the case study it has been seen that the organization that is based upon the Australia specializes in designing and creating an effective network local as well as global. This organization presently won the contract to design an effective as well as secure computer network of new Philippines based hotels. The hotel has five floors and each floor contains 80 rooms. The organization has to develop network in such a manner that each staffs of hotels communicate effectively with each other’s. Furthermore as per the given case study, it has been gained that the organization needs to create network for one big island and three small surroundings islands. As per the study, it has been seen that the main islands have LTE (long-term evolution) and connected with other island using optical fiber that contains 200Mbps speeds.                        

2.2Project Goal

The aims and goal of the present project is to design an effective as well as most secure network of hotels that is situated in Philippines. Furthermore, the objective of present project is to evaluate the design with the help of testing procedure and analyze the effectiveness of proposed network. As per the given scenario, it has been obtained that   company has hotel and that hotel have 5 floors and each floor have 80 rooms we need to design network for 5 floors and also need satellite tower for wireless devices. In addition to this, in present research researcher build such type of computer network that helps the organization i.e. hotels to communicate with one staffs members to others though wireless communication process.      

2.3 Business Goals

The main goals of the organization or business to build a secure network that helps the organization to communicate with source to destination ends   in effective as well as successful manner. In addition to this, the organization wants to communicate with their staffs members, tourists as well as torus guides should have phone communication and internet access from anywhere on these island. Furthermore, it has been seen that an area where hotel is situated known for shark attacks and the surfers should be make available with wireless communication devices that helps them to communicate with the lifeguard’s easier manner. The goal of this business is connectivity between hotel all 5 floors and big island with three small island. The terrains of all four island need to Access Island currently uninhabited. The network design contacted of your company includes the designs of the network for the hotel on the big island and the internet and phone service on all four islands the tourists and hotel staff and tour guides should have internet access and phone communication from anywhere in the island to the rest of the world. 

2.4 Design requirement

In order to design an effective as well as secure network firstly designer needs to implements and plans needs to software as well as hardware requirements. In order to build an effective network organization needs to routers, computers, switches and others devices that helps them in communication process. In addition to this, it has been observed that the company wants to secure their clients as well as their own data and information; thereby to gain this company needs to implements firewall techniques. Furthermore, the company requires to server that helps the organization to communicate with each other’s in effective manner. Moreover, organization needs to purchase internet protocol address that helps them to communicate with one device to others in easier manner.         

2.4.1Business Goals 

If you keep in mind the changes in business strategies and enterprise networking discussed in the previous sections, it becomes possible to list some typical network design business goals: 

  • Increase revenue and profit 
  • Increase market share 
  • Expand into new markets 
  • Increase competitive advantages over companies in the same market 
  • Reduce costs 
  • Increase employee productivity 
  • Shorten product-development cycles 
  • Use just-in-time manufacturing 
  • Plan around component shortages 
  • Offer new customer services 
  • Offer better customer support 
  • Open the network to key constituents (prospects, investors, customers, business partners, suppliers, and employees) 
  • Build relationships and information accessibility to a new level, as a basis for the network organizational model 
  • Avoid business disruption caused by network security problems 
  • Avoid business disruption caused by natural and unnatural disasters 
  • Modernize outdated technologies 
  • Reduce telecommunications and network costs, including overhead associated with separate networks for voice, data, and video                  

Proper execution of network management system can be cooperative to gain weighty profits from business perspectives. Some of those assumed benefits are as follows

A network management system can have profound company-wide benefits. After all, your network consists of more than just computers. You also must consider your phone system, fax machine, printers and plotters, payroll system, and even your invoicing system. And if your business operates in more than one location, you’ll be dealing with several computers and peripherals at each location. With a network management system solution, every piece of equipment communicates with your computer system. More importantly, you can control your entire business operation from a central computer. Not only is a network management solution cost effective – it can also dramatically improve efficiency and productivity. Here are three ways in which your business will benefit from a quality network management system:

2.4.2 List of network assumption

Save Money – Instead of several IT managers monitoring each network at every location, you’ll only need one sys admin at a single location to control and monitor your entire network. As a result, you can spend your hiring dollars where you need it – on research & development, customer support, advertising, new equipment, and additional inventory.

Save Time – A network management system will allow you to give each of your IT provider's direct access to any information they need to do their jobs efficiently. Say goodbye to walking reports around the office from one data entry location to another. Also, you won’t have to worry about any more missed emails or interoffice memos. Each of your team members can enter and retrieve data right from their own workstation, and access can be controlled by your network manager.

Increase Productivity – With a quality network management system, you can monitor all aspects of your office network including hardware, software, and peripherals. All of these components need to be able to communicate with each other. Should one go down, the whole system could be impacted? The minute there’s an issue, your network management system detects it so that there’s no data loss or productivity slowdown. 

2.5 Networking Requirements

  • Application availability—Networks carry application information between computers. If the applications are not available to network users, the network is not doing its job.
  • Reliability and security:- The primary purpose of the company to secure network in effective manner thereby to gain this in effective manner the user’s needs to implements an effective data protection security devices i.e. firewalls that helps the company to secure their network in effective manner (Chao & Liu, 2007). On the other hand, reliable is most effective that helps the company to achieve consistence better quality of network related services.    

2.6 The Design Problem: Optimizing Availability and Cost

In general, the network design problem consists of the following three general elements:

  • Environmental givens—Environmental givens include the location of hosts, servers, terminals, and other end nodes; the projected traffic for the environment; and the projected costs for delivering different service levels.
  • Performance constraints—Performance constraints consist of network reliability, traffic throughput, and host/client computer speeds (for example, network interface cards and hard drive access speeds).
  • Networking variables—Networking variables include the network topology, line capacities, and packet-flow assignments.

The goal is to minimize cost based on these elements while delivering service that does not compromise established availability requirements. You face two primary concerns: availability and cost. These issues are essentially at odds. Any increase in availability must generally be reflected as an increase in cost. As a result, you must weigh the relative importance of resource availability and overall cost carefully

2.7 Networks Must Make Business Sense 

The primary purpose of the company to build an effective network design that helps the company to communicate with the staffs as well as tourism in most effective manner. In addition to this as per the case study it has been seen

That the areas where hotels situated known for Shark attacks thus with the help of implements an effective network or wireless communication devices the staffs member communicate effectively if any problem happened in those areas. 

With the economic downturn that followed the Internet boom, there is an increased need to choose technologies that solve business problems. Although many companies made "technology for technology's sake" choices during the boom, this is no longer the case. Business leaders are more involved in Information Technology (IT) decisions than they once were, and IT managers rely on business managers to help them prioritize and fund IT projects. Network upgrades are made not because some new technology sounds interesting to the engineers, but because it will help an enterprise increase profits, productivity, market share, and cash flow. Network designers must choose solutions that solve a business manager's problem. 

Network applications have become mission critical. Despite this trend, large budgets for networking and telecommunications operations have been reduced at some companies. Many companies have gone through difficult reengineering projects to reduce operational costs, and are still looking for ways to manage networks with fewer people and reduce the recurring costs of WAN circuits. 

As the head count at many corporations remains flat or shrinks, there's a renewed focus on using network applications to increase individual productivity in all departments, not just within the networking and IT departments. One result has been the emergence of web-based productivity tools. Most enterprises streamline their business processes, applications, and protocols, and standardize on Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP and web-based applications for selling products and supporting customers have risen in popularity, as have web-based applications for supporting employees and suppliers. Streamlining processes and protocols has also led to an increased use of IP telephony and to the continued convergence of voice and data networks. To save money and to reduce the need for specialized data or voice engineers, companies continue to adopt IP telephony technologies. 

Until recently, telecommunications and voice networks were separate. Telecommunications engineers knew little about data networks, and networking engineers didn't know the difference between a TDM and a Tandem Switching System (TSS). In today's environment, voice, data, and video networks are merging. 

In traditional voice and data terminal/mainframe networks, data flow and throughput were predictable. Closed communications systems were the norm, and data sources were well known. In today's networks, Internet surfing is ubiquitous. It is hard to predict data flow and the timing of bursts of data when users are jumping from one website to another, possibly downloading videos or animation files. In addition to web surfing, the move to a network organizational model where the network is used by both inside and outside users affects network data flow. Network design practices must keep pace with these changes in business practices.  

 

2.8 The Need to Support Mobile users 

Notebook computers have finally become small enough to carry around, and workers now expect to get work done at home, on the train, in hotels, in meeting rooms, at customer sites, and even while having their morning latte at the local coffee shop. These days almost every notebook computer ships with wireless networking built in to facilitate users getting work done outside the office. 

It shouldn't matter (to the user anyway) where data is and in what format. Network users expect network performance to be uniform, regardless of where the user or data resides. A user should be able to read e-mail on a cell phone, for example, and read voice mail from a web browser while sipping coffee in an Internet cafe. Users should have secure and reliable access to tools and data wherever they are. The challenge for network designers is to build networks that allow data to travel in and out of the enterprise network from various wired and wireless portals without picking up any viruses and without being read by parties for whom it was not intended. 

One of the biggest trends in network design is virtual private networking, where private networks make use of public service networks to get to remote locations or possibly other organizations. Customers getting involved in VPN projects have concerns about security, reliable and predictable performance, and data throughput requirements. VPNs are covered in Chapter 5, "Designing a Network Topology." 

Network architectures are taking on a virtual and ubiquitous form for users, while remaining highly structured and managed from the network engineers' point of view. The designer is challenged to develop secure, resilient, and manageable solutions that allow users to work efficiently, wherever they are physically located. 

2.9 The Importance of Network Security and Resiliency 

Network security has filtered to the top of the list of business goals at many companies. Although security was always important, it has become even more important as networks become indispensable and as tools for breaking into networks become ubiquitous. Enterprises must protect their networks from both the unsophisticated "script kiddies" and from more advanced attacks launched by criminals or political enemies. There is also a continued requirement to protect networks from Trojan horses and viruses. Many enterprise managers now report that the network must be available 99.999 percent of the time. Although this goal may not be achievable without expensive redundancy in staff and equipment, it may be a reasonable goal for companies that would experience a severe loss of revenue or credibility if the network were down for even very short periods. This goal is linked to goals for security, as the network cannot be available if security breaches and viruses are disabling network devices and applications (Chao & Liu, 2007). When security and operational problems occur, networks must recover quickly. Networks must be resilient. More than ever, IT and business managers require high-availability and resiliency features for their network equipment and protocols, as they realize the extent to which network downtime can jeopardize business success. Thus the primary objective of the organization is to secure network in effective and efficient manner. 

2.10  Network Design Project 

One of the first steps in starting a network design project is to determine its scope. Some of the most common network design projects these days are small in scope—for example, projects to allow a few people in a sales office to access the enterprise network via a VPN. On the other hand, some design projects are large in scope. Ask your customer to help you understand if the design is for a single network segment, a set of LANs, a set of WAN or remote-access networks, or the entire enterprise network. Also ask your customer if the design is for a new network or a modification to an existing one. 

Explain to your customer any concerns you have about the scope of the project, including technical and business concerns. Subsequent sections in this chapter discuss politics and scheduling, which are tightly linked to the scope of a network design project. (Many network designers have learned the hard way what happens when you don't help your customers match the schedules of their projects to the scope.) 

Make sure your customers tell you everything they can about the network and the design project. You may want to poke around outside the stated scope of the project; just to make sure nothing essential has been omitted. Double-check that you have gathered all the requirements and that you have accurate information about sites, links, and devices. If the project addresses network security, make sure you know about all external links, including dial-in access. 

When analysing the scope of a network design, you can refer to the seven layers of the OSI reference model to specify the types of functionality the new network design must address. For example, you might decide that the design project is concerned only with network layer concerns such as routing and IP addressing. Or you might decide that the design also concerns the application layer because the focus is on voice applications, such as Interactive Voice Response (IVR), which directs customers to the correct location in a call centre, or unified messaging, where e-mail can be retrieved via voice mail and text messages can be converted into speech. Figure 1-3 shows the OSI reference model. 

Open Systems Interconnection (OSI) Reference Model 

In addition to using the OSI reference model, this book also uses the following terms to define the scope of a network and the scope of a network design project: 

Segment:- A single network based on a particular Layer 2 protocol. May have one or more Layer 3 protocols associated with it, although most networks are standardizing on IP.Building network. Multiple LANs within a building usually connected to a building-backbone network.Campus network. Multiple buildings within a local geographical area (within a few miles), usually is connected to a campus-backbone network.Remote access. Networking is the solutions that support individual remote users or small remote branch offices to accessing the network.WAN. A geographically is dispersed network including point-to-point, Frame Relay, ATM, and other long-distance connections.Enterprise network. A large and diverse network, are consisting of campuses, remote-access services, and one or more WANs or long-range LANs. An enterprise network is also called an internetwork. 

 

2.11 Network Applications

For "Name of Application," simply use a name that your customer gives you. This could be an industry-standard name, such as Lotus Notes, or it could be an application name that means something only to the customer (especially for a home-grown application). For new applications, the name might be a code name for a software-development project.

For Type of Application, you can use any appropriate text that describes the type of application, or you can classify the application as one of the following standard network applications:

Electronic mail

File transfer, sharing, and access

Database access and updating

Groupware

Web browsing

Network game

Remote terminal

Calendar

Medical imaging

Videoconferencing

Video on demand (VoD)

Scheduled multicast video

Surveillance and security camera video

Internet or intranet voice (IP telephony)

Internet or intranet fax

Sales order entry

Management reporting

Sales tracking

Computer-aided design

Document imaging

Inventory control and shipping

Telemetry

Interactive Voice Response (IVR)

Unified messaging

Desktop publishing

Web publishing

Electronic whiteboard 

 

3.0 Logical diagram 

3.1 The logical network diagram

In order to build an effective network design organization needs to implements high-speed communication technology that helps them to connect one device to others in effective manner. Furthermore, in present scenario it has been seen that the organization want to communicate with four island where main island connected with others using fiber optics. Thereby to communicate between one devices to other organization implements routers that helps them to communicate between different network. Furthermore, developer users switch routers as well as several peripheral devices within the network that helps them to protect as well as communicate from one island to others in easier manner. Wireless communication from source to destination end has been done effective manner with the help of antenna (Goralski, 2009). Routers work within the Network with the help of IP address and the organization gain unique IP address from internet service providers. In addition to this router, helps to transfer the packets from one end to other end using shortest route. Switch helps to communicate one devices to others using MAC address.        

3.2 Justification of logical diagram:

The main motive to design this logical network is to offer access system services to the users. Use of different kinds of web servers is helpful to mitigate the network abuse from the business system. Implementation of this kind of network system contributes to sending useful data and information to the different ports and devices of the network system.  Present aim of the Hotels organization to build such type of network that helps their staffs as well as tourists to communicate effective manner. In order to perform this job organization implements router devices that help them to connect different devices or network within one network (Goralski, 2009). The main purpose of selection of router devices is that it connects different type of computer network with one and helps the organization to send data and information from source to destination end effective as well as easier manner with the help of shortest path algorithm. Apart from that the organizaiaton implements antenna that helps them to communicate wireless devices i.e. as per the study it has been observed that the areas where organization i.e. hotels situated are suffered from shark attacks thus for some reason if any problems has been indentified then staffs members easily communicate with each other using wireless  devices. To protect the network in secure manner organization implements firewall techniques that helps them to secure their network from unauthorized users in easier and effective manner.           

3.3 protocol mechanism and Security mechanism: 

Border Gateway Protocol:

Border Gateway Protocol (BGP) is a routing protocol used to transfer data and information between different host gateways, the Internet or autonomous systems.BGP is a Path Vector Protocol (PVP), which maintains paths to different hosts, networks and gateway routers and determines the routing decision based on that (Kuhn, Sriram, & Montgomery, 2007).

Open Shortest Path First (OSPF):

Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined asOSPF Version 2 in RFC 2328 (1998) for IPv4

Enhance Interior Gateway Routing Protocol: 

Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector routing protocol based on the principles of the Interior Gateway Routing Protocol (IGRP). EIGRP is a successor to the Interior Gateway Routing Protocol (IGRP). Both are owned by Cisco and operate only on their devices.

Routing Information Protocol: 

Routing Information Protocol (RIP) is a dynamic protocol used to find the best route or path from end-to-end (source to destination) over a network by using a routing metric/hop count algorithm.

3.4 The list of security mechanisms

Firewall:

Generally the firewall has two network interfaces: one for the external side of the network, one for the internal side. Its purpose is to control what traffic is allowed to traverse from one side to the other. As the most basic level, firewalls can block traffic intended for particular IP addresses or server ports In order to secure network well effective manner the company implements firewall techniques that helps the company to secure their network from unauthorized users (Judd, 2009). Furthermore with the help of proxy sever the organization also secure their network successfully manner. Moreover, network access control procedure employed in bolstering the computer network security. It helps the organization to employ the mechanism of not allowing or blocking free available network.

4.0 Physical network design

4.1 Cost of network devices

The network is a strategic element in your overall information system design. As such, the cost of your network is much more than the sum of your equipment purchase orders. View it as a total-cost-of-ownership issue. You must consider the entire life cycle of your networking environment. A brief list of costs associated with networks follows:

  • Equipment hardware and software costs—consider what is really being bought when you purchase your systems; costs should include initial purchase and installation, maintenance, and projected upgrade costs.
  • Performance trade-off costs—Consider the cost of going from a 5-second response time to a half-second response time. Such improvements can cost quite a bit in terms of media selection, network interfaces, networking nodes, modems, and WAN services.
  • Installation costs—Installing a site's physical cable plant can be the most expensive element of a large network. The costs include installation labor, site modification, fees associated with local code conformance, and costs incurred to ensure compliance with environmental restrictions (such as asbestos removal). Other important elements in keeping your costs to a minimum include developing a well-planned wiring-closet layout and implementing color-code conventions for cable runs.
  • Expansion costs—Calculate the cost of ripping out all thick Ethernet, adding additional functionality, or moving to a new location. Projecting your future requirements and accounting for future needs saves time and money.
  • Support costs—Complicated networks cost more to monitor, configure, and maintain. Your network should be no more complicated than necessary. Costs include training, direct labor (network managers and administrators), sparing, and replacement costs. Additional costs that should be considered are out-of-band management, SNMP management stations, and power.
  • Cost of downtime—Evaluate the cost of every minute that a user is unable to access a file server or a centralized database. If this cost is high, you must attribute a high cost to downtime. If the cost is high enough, fully redundant networks might be your best option.
  • Opportunity costs—Every choice you make has an opposing alternative option. Whether that option is a specific hardware platform, topology solution, level of redundancy, or system integration alternative, there are always options. Opportunity costs are the costs ofnot picking one of those options. The opportunity costs of not switching to newer technologies and topologies might be lost competitive advantage, lower productivity, and slower overall performance. Any effort to integrate opportunity costs into your analysis can help make accurate comparisons at the beginning of your project.
  • Sunken costs—Your investment in existing cable plant, routers, concentrators, switches, hosts, and other equipment and software is your sunken costs. If the sunken costs are high, you might need to modify your networks so that your existing network can continue to be utilized. Although comparatively low incremental costs might appear to be more attractive than significant redesign costs, your organization might pay more in the long run by not upgrading systems. Too much reliance on sunken costs can cost your organization sales and market share when calculating the cost of network modifications and additions.

4.2 Estimating Traffic: Workload Modeling

Empirical workload modeling consists of implementing a working network and then monitoring traffic for a given number of users, applications, and network topology. Try to characterize activity throughout a normal workday in terms of the type of traffic passed, level of traffic, response time of hosts, time to execute file transfers, and so on. You can also observe utilization on existing network equipment over the test period.

If the tested network's characteristics are similar to a prospective network, you can try extrapolating to the prospective network's number of users, applications, and topology. This is a best-guess approach to traffic estimation given the unavailability of tools to characterize detailed traffic behavior.

In addition to passive monitoring of an existing network, you can measure activity and traffic generated by a known number of users attached to a representative test network and then extrapolates findings to your anticipated population.

One problem with modeling workloads on networks is that it is difficult to accurately pinpoint traffic load and network device performance as functions of the number of users, type of application, and geographical location. This is especially true without a real network in place. Consider the following factors that influence the dynamics of the network:

  • The time-dependent nature of network access—Peak periods can vary; measurements must reflect a range of observations that includes peak demand.
  • Differences associated with type of traffic—Routed and bridged traffic place different demands on network devices and protocols; some protocols are sensitive to dropped packets; some application types require more bandwidth.
  • The random (nondeterministic) nature of network traffic—Exact arrival time and specific effects of traffic are unpredictable.

4.3 Explanation of physical network design

LAN configuration

IP big island: 192.1.0.0/23

Usable range 192.1.0.1 usable host

192.168.0.255

Subnet ID: 192.1.0.0/23

Broadcast ID: 192.0.1.256/26

IP big island: 192.1.1.0/23

Usable range 192.1.1.1 usable host

192.168.1.255

Subnet ID: 192.1.1.0/23

Broadcast ID: 192.0.1.256/26 

Small island1 LAN: 192.1.2.0/26

192.1.2.63

Broadcast ID: 192.168.168.64/276

Small island2 LAN: 192.1.3.0/27

Network devices

Routers and switch:- Network routers helps in forwarding and delivering packets form sources to destination end effective manner with the help of transmission control protocol or internet protocol. Furthermore, router has an effective ability to provide security on the network by authenticating and verifying clients accessing the computer network devices. Switch provides the communication between devices using MAC address. Scalability, cost as well as reliability are obtained effectively manner with the help of switch devices. 

Telephone:

Telephones plays an significant roles in gaining and obtaining the distance end node intended for an effective communication. In order to communicate more effective in present network developer users the telephones devices that are connected or communicated with wireless devices. 

 

5.0 Final document

5.1 Testing procedure

5.1.1 Systems Development Life Cycles

Systems analysis students are familiar with the concept that typical systems are developed and continue to exist over a period of time, often called a systems development life cycle. Many systems analysis books use the acronym SDLC to refer to the life cycle, which may sound strange to networking students who know SDLC as Synchronous Data Link Control, a bit-oriented, full-duplex protocol used on synchronous serial links, often found in a legacy Systems Network Architecture (SNA) environment. Nevertheless, it's important to realize that most systems, including network systems, follow a cyclical set of phases, where the system is planned, created, tested, and optimized.

Feedback from the users of the system causes the system to then be re-created or modified, tested, and optimized again. New requirements arise as the network opens the door to new uses. As people get used to the new network and take advantage of the services it offers, they soon take it for granted and expect it to do more.

In this book, network design is divided into four major phases that are carried out in a cyclical fashion:

  • Analyze requirements.In this phase, the network analyst interviews users and technical personnel to gain an understanding of the business and technical goals for a new or enhanced system. The task of characterizing the existing network, including the logical and physical topology and network performance, follows. The last step in this phase is to analyze current and future network traffic, including traffic flow and load, protocol behavior, and quality of service (QoS) requirements.
  • Develop the logical design.This phase deals with a logical topology for the new or enhanced network, network layer addressing, naming, and switching and routing protocols. Logical design also includes security planning, network management design, and the initial investigation into which service providers can meet WAN and remote access requirements.
  • Develop the physical design.During the physical design phase, specific technologies and products to realize the logical design are selected. Also, the investigation into service providers, which began during the logical design phase, must be completed during this phase.
  • Test, optimize, and document the design.The final steps in top-down network design are to write and implement a test plan, build a prototype or pilot, optimize the network design, and document your work with a network design proposal.

These major phases of network design repeat themselves as user feedback and network monitoring suggest enhancements or the need for new applications. Figure 1-1 shows the network design and implementation cycle.

5.1.2 Test Planning

Now that you and your client clearly understand and agree on the test scope, objectives, and criteria for success, it is finally time to roll up your sleeves and start working on the test plan. As always, it is important to collaborate with the stakeholders on the test plan to determine specifics regarding the application characteristics, behaviors, and new features that are expected of the new system. The prototype network system, equipment specifications, test cases, test tools, data to be collected, and results format must also be discussed and agreed upon. This is an important step in the process because it requires many decisions and significant teamwork.

5.2 Design the Functional Prototype Network System

For most types of tests, a working prototype network system of the intended design will serve as the platform upon which functionality, operation, and performance of the new system will be evaluated. A prototype network system is commonly illustrated in a set of network topology diagrams that represent a miniaturized version of the end-state network.

5.3 Identifying the Test Suites and Test Cases

A test case in the context of internetworking is a set of conditions or variables under which a tester will determine whether or not a design element (network service, component, or feature) is working correctly. Test cases are the essence of the test plan, and they are sometimes collected or aggregated into test suites. Identifying the right test cases and expected output is an art form in itself, often requiring a series of conversations with the project stakeholders, architects, and operators of the network?

A simple description of the test cases you expect to run, and accompany the network topology diagram you have prepared, is sufficient to begin the test plan dialog. Your client may already have some ideas of the kinds of tests they want to see, so you should request their input right away. However, some clients have no idea on how testing is conducted; in these situations, you need to rely on your own testing experience and an understanding of the design goals, test triggers, and motivations for the testing.

Table 4-1. Example Test Suites and High-Level Test Cases

Test Suite #

Test Suite

Test Case

1

Open Shortest Path First (OSPF) Routing

ABR Summarization

Default Route Announce

OSPF NSSA

Redistribution BGP to OSPF

Timer Optimizations

2

Border Gateway Protocol (BGP) Routing

Data Center iBGP Optimizations

CE-PE eBGP Optimizations

BGP Aggregation

BGP Policy (Communities and Local-Pref)

3

Quality of Service (QoS)

Marking

Queuing

Traffic Shaping

Policing

Remarking at CE-PE to MPLS

QoS Transparency Across MPLS

CoPP

4

Cisco Wide Area Application Services (WAAS)

WCCP Redirects

CIFS/FTP Acceleration

5

LAN

Campus Switching

Branch Switching

HSRP

6

Multicast

PIM Sparse Mode

AnyCast RP with MSDP

MVPN–MPLS

7

Cisco Performance Routing (PfR)

Fast Reroute

Load Balancing

Interop with WAAS

8

Cisco Group Encrypted Transport VPN (GET VPN)

Group Member at Branch and WAN Distribution

Cooperative Key Servers

9

Network Management

SNMP

SSH

AAA

NTP

Logging

NetFlow

10

Performance/Scalability

Branch Router Performance (RFC 2544)

WAN Route Saturation

WAAS Scale

11

Negative Testing

Circuit Path Failover

Line Card Failover

Route Processor Failover

Power Failures

MPLS Cloud Hard Failures

MPLS Cloud Soft Failures

BGP Flapping

Testing of pc connectivity 

Testing using packet tracer  

 

References

Convery, S. Network Security Architectures. Indianapolis, Indiana: Cisco Press; 2004.

Edney, J. and Arbaugh, W. Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Reading, Massachusetts: Addison-Wesley; 2003.

Fleck, B. and Potter, B. 802.11 Security. Cambridge, Massachusetts: O'Reilly; 2002.

Flickenger, R. Wireless Hacks. Cambridge, Massachusetts: O'Reilly; 2003.

Kaeo, M. Designing Network Security. Indianapolis, Indiana: Cisco Press; 1999.

O'Hara, B. and Petrick, A. IEEE 802.11 Handbook. Piscataway, New Jersey: IEEE Press; 2005.

Peikari, C. and Fogie, S. Maximum Wireless Security. Indianapolis, Indiana: Sams Publishing; 2002.

Roshan, P. and Leary, J. 802.11 Wireless LAN Fundamentals, Indianapolis, Indiana: Cisco Press; 2003.

Shankar, K., Sundaralingam, S., Balinsky, A., and Miller, D. Cisco Wireless LAN Security. Indianapolis, Indiana: Cisco Press; 2005.

Swaminatha, T.M. and Elden, C.R. Wireless Security and Privacy: Best Practices and Design Techniques. Reading, Massachusetts: Addison-Wesley; 2002.

Vladimirov, A.A., Gavrilenko, K.V., and Mikhailovsky, A.A. Wi-Foo: The Secrets of Wireless Hacking. Reading, Massachusetts: Addison-Wesley Professional; 2004.

Chao, H. & Liu, B. (2007). High performance switches and routers. Hoboken, N.J.: Wiley-Interscience.

Goralski, W. (2009). The illustrated network. Amsterdam: Elsevier/Morgan Kaufmann Publishers.

Huang, S., MacCallum, D., & Du, D. (2010). Network security. New York: Springer.

Judd, C. (2009). Firewall. New York: Saint Martin's Press Inc.

Kizza, J. (2013). Guide to computer network security. London: Springer.

Kuhn, D., Sriram, K., & Montgomery, D. (2007). Border Gateway Protocol security. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology.

Lee, R. (2012). Software and network engineering. Berlin: Springer.

Perez, A. (2014). Network Security. London: ISTE.

Shinde, S. (2009). Computer network. New Delhi: New Age International Ltd.

OR

MyAssignmenthelp.com is the pioneer of providing top-quality essay help at an affordable price. With the strength of 3000+ qualified and experienced experts, we are competent of providing best quality essay assistance in more than 100 subjects. Students, who wonder, 'who can help me with my essay' find our online essay help services beneficial and useful. Contact our 24x7 live customer support team to get high-quality essay writing help at an affordable price.

Most Downloaded Sample Of Networking

Security Concerns And Policy Enforcement: Patrician LLC

Download : 1 | Pages : 9

Question: Describe about the Security Concerns and Policy Enforcement for Patrician LLC.   Answer: Scenario: Patrician LLC is working on developing wireless transmission technology. Now the company wants to transfer headquarter and operational unit to Tucson, Arizona and wants to shift in the new building in Cheyenne, Wyoming. The research and development department of Patrician LLC is working on secure microburst technology. The team...

Read More arrow Tags: United States Chicago Management Melbourne Institute of Business and Technology Masters in Business Administration 

Examine Strengths And Weaknesses, Arguments

Download : 1 | Pages : 7

Questions: 1. Evaluate PICs and other programmable devices as programmable devices and embedded controllers.2. Compare the operation, functionality, advantages and limitations of PLC simulators. Your comparison will need to include two types of simulation software. 3. Would you choose to use a PLC or an embedded microcontroller in the instrument? Explain your reasoning.     Answers: 1. For this task, a comparison has been drawn ...

Read More arrow Tags: Australia Newport Management Interview Educational Leadership Melbourne Institute of Business and Technology Masters in Business Administra 

Report Of Jedox Software

Download : 5 | Pages : 9

Question: Write a report on "Jedox Software".    Answer: Summary Jedox is a client server software which has been based on creating a proper business intelligence with the performance management of the solutions through the systematic data. There have been cell-oriented figures with the in-memory OLAP server which has been for the planning, analysis and the reporting with the consolidation of the data. This pattern is for using t...

Read More arrow Tags: Australia Glenbrook Computer Science School of Computing and Information Technology Faculty of Engineering and Information Sciences NorthSho 

Network Design

Download : 4 | Pages : 26

Question: Starting from the logical design of the network that you completed in Assessment item 1, you are required to undertake the physical design of the network taking into consideration the feedback that you received in Assessment Item 1. In order to undertake your physical design, you may need to make further justifiable assumptions. You also have to complete your final network design report. In this process, you are expected to particip...

Read More arrow Tags: Australia Melbourne Management Human Resource Management HRMT 20007 Melbourne Institute of Business and Technology Masters in Business Admin 

Network, Security And Design Report

Download : 5 | Pages : 14

Question: Write a report on the network, security and design.    Answer: 6.1.2. The task of requirements analysis is the first step in the design of any system, including software systems. Its aim is to clearly identify, understand and record all aspects of the proposed system, including the stakeholders of the system, which can possibly be addressed before development actually begins, including a number of foreseeable contingenci...

Read More arrow Tags: Australia Dandenong Management Deakin University CHISHOLM INSTITUTE 
Next
watch

Save Time & improve Grade

Just share your requirement and get a customized solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,114,929

Orders

4.9/5

Overall Rating

5,043

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

154 Order Completed

97% Response Time

Harold Alderete

PhD in Economics

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

285 Order Completed

99% Response Time

Eugene Baranowski

MBA in Supply Chain

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

265 Order Completed

97% Response Time

Ken Campbell

MSc in Electrical Engineering

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1692 Order Completed

98% Response Time

Alfred Dodd

PhD in Computer and Information Science with specialization in Database

Wellington, New Zealand

Hire Me

FREE Tools

proofreading

Proofreading & Editing

Complete guid on proofreading and editing.

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

It looks amazing I will update when I receive the grades. The heading, body and conclusion is clear and references are looking amazing Thank You so much.

flag

User Id: 225650 - 21 Oct 2019

Australia

student rating student rating student rating student rating student rating

great great great great great great great great great great great great great great

flag

User Id: 147830 - 21 Oct 2019

Australia

student rating student rating student rating student rating student rating

Excellent Work!! i am really thankful to you guys. you made my assignment so much attractive and it was really understandable.

flag

User Id: 280574 - 21 Oct 2019

Australia

student rating student rating student rating student rating student rating

Had a deadline to meet completed assignment with excellent results. I appreciate your assistance.

flag

User Id: 309793 - 21 Oct 2019

Australia

student rating student rating student rating student rating student rating
Have any Query?