Home Solutions NETWORK DESIGN WRITTEN ASSESSMENT
We write, we don’t plagiarise! Every answer is different no matter how many orders we get for the same assignment. Your answer will be 100% plagiarism-free, custom written, unique and different from every other student.
I agree to receive phone calls from you at night in case of emergency
Please share your assignment brief and supporting material (if any) via email here at: email@example.com after completing this order process.
The primary theme of the paper is NETWORK DESIGN WRITTEN ASSESSMENT in which you are required to emphasize its aspects in detail. The cost of the paper starts from $105 and it has been purchased and rated 4.9 points on the scale of 5 points by the students. To gain deeper insights into the paper and achieve fresh information, kindly contact our support.
As we used Class A addressing for networking as a measure to support the scalability of thenetwork for vast expansion. The headquarters have 500 hosts which currently have 50 employees. For all the distribution centres we have 16384 hosts and the training centre has 254 hosts which will support the scalability of the network for an approximate of 10 years. Virgin mobile provides an excellent coverage in the northern coast of Australia as a number of distribution centres are located in that area which will provide a continuous connection between distribution centres and trucks. To provide the required availability connect ISP and the headquarters with gigabit internet cable which provides speeds up to 1000MBPS. This cable provides 99.99% availability over the entire networks to support high data speeds. The entire network is secured, to protect the servers from viruses and other attacks by providing a firewall and DMZ for the servers which will protect the applications and data of the organisation. As the authentication policy is strong it is hard for intruders to guess the passwords and use the resources of the organisation. As the company is opting for high scalable options the cost could reach on high but it is a trade-off for the organisation requirement.
Hierarchy topology:The network is designed in a hierarchy model. The logical network design clearly depicts that the network is divided into three main connections which are connected to theTrainingcentre, ISP, distribution centre. All the distribution centresae connected through the internet and also connects customers and fishermen with the application.
Logical network Diagram:
The network of the Auto-Fishing group is designed using a top-down approach. The above image shows an abstract view of the Auto-fishing group. The image depicts the location of the server and the distribution of the services like theinternet to in the network.
InFigure2,the satellite is connected is connected to the trucks using an onboard computers.These trucks are connected to thewireless modem using cellular. The cellular connection will allow the trucks to communicate with the branches which will provide the location of the trucks.
In the above figure,a switch connects different computers in the training centre. The connection from headquarters is connecting to the training centre router which provides adirect connection to the digital video library. There is also a data server for storage purpose.
Network diagram explanation:
The network designed will allow us to meet the criteria providing all the connectivity to the required resources to manage and run the business efficiently. There is a main router which is connected to the headquarters and also ISP, this provides the internet connecting to all the headquarters, branches and the training centre. Each branch has a router and the router is connected to a switch.
This switch will provide connection to multiple peripherals with the internet in the branch offices. There is a firewall situated between main router, headquarters and the internet which will provide the required security for the network. The headquarters have two switches, Headquarters switch is connected to the computers in the headquarters and the server switch is connected to DMZ which is connected to the servers. The training centre is also connected to the main router which provides connectivity to the media servers in the DMZ. The satellite is connected to the trucks with the help of internet and the trucks are connected to the internet via an onboard computers which use cellular. This will provide aconnection between the trucks and branches.
When a customer places an order via the web application the order goes through the application server and gets processed with the proprietary software of the company. This enables the fast processing of the orders and sends the order to the appropriate branch for a fast delivery. Fast internet is recommended for having a continuous connectivity
The Model of Addressing and Naming:
Allocating IP addressingis one of the most important parts of networking. This will allow us to identify the machines and devices we are trying to interact. There are three classes in addressing to choose from:
Each addressing contains a different number of free addresses in each class. These addresses are private and can be used by any individual for their purposes.For a small network class c, addresses are used as they contain theleast number of free IP addresses, for a network more than 200 computers class-A IP address are used .
To provide anaddress to a network we can choose two types:
The dynamic IP address will allocate IP addresses automatically. This process needs a DHCP server which will allow us to provide the Dynamic IP addresses to the network.
The AG network can be considered as a large network. In large networks, we use class A addressing, as there is an opportunity for increasing scalability we choose this network to support the future development and increase the scalability of the network.
List of Routing and switching protocols:
Cisco Discovery Protocols: We use this protocol for accessing protocol addresses of devices in the network. This will allow the network to have an uninterrupted and fast connection.
Open Shortest Path First: This protocol is used in link state routingas this will allow the packets to move in the shortest path. This will improve the speed of the network and the data transfer between the devices.
For switching, we use the VLAN (virtual Local Area Network) which will allow us to make networks inside a network. This will allow us in scalability in the future and for switching, we use hierarchal topology.
List of security mechanisms:
One of the most important and vulnerable points in any network is access to the physical devices. The intruders or unauthorised persons may access the devices and place malware or viruses to intrude the network. To minimise the risk we have to limit the access to the server’s routers and the terminals in headquarters and branches we provide key cards with RF id which will discard any threat to these places.
Authentication is aprimary task in protecting theunwanted individual from the network. As the network is mainly used by customers and the staff we provide different authentication for different individuals.
We provide guidelinesforcreating a password with 8 characters including the special character, capital letter and numbers in the password to minimise the guessing of the password.
For staff, we provide a unique ID and user generated password which can be only used in the network. This will eliminate any misuse of the resources from outside of the network. The entry into the building is also accessed by only key cards which will restrict the entry of unwanted intruders.
For fishermen and customers, we allow registering an account and providing them with aone-time password via mail or phone number which will prevent any unauthorised access.
As there is a hieratical structure to the organisation providing authorised access is a crucial part in preserving and maintains thesecurity of the network. The authorisation is decided by analysing the credentials of the user and providing the resources to the user. The resources provided for a farmer, customer and staff are different and providing only required authorisation can stop various attacks on the network.
As the organisation is dealing with personal information from customers, fishermen and staffs it is a high priority to save their privacy. Encryption is changing actual data into random text and using a key to retrieve data. This will help us to protect the privacy in an event of hack attack or any security issues.To achieve the encryption VPN (virtual private networks) are used in the network which point-to-point tunnelling which ensures the encryption of the data.
Firewalls are the first point of defence in our network. The firewall will analyse all the packets travelling through it. As the firewall is configured to stop the unwanted packets, this will only allow the packets which are familiar with the configuration. The firewall may be software or hardware. In this network hardware firewall is used between the main headquarter router and all the other connections in the network.
As there are multiple networks sharing resources using a De-Militarised Zone will help in improving the security of the network. This will allow the network to communicate with only required resources and help to provide an extra layer of security.
Check Out Our Original Reviews