Assignment 2: Network Topology Design You are the network manager of a company that has grown from 10 employees to 100 employees in 12 months. Year 2 projected growth is estimated to be 100 additional employees located at a remote location. The aggressive growth has brought about some unique challenges and opportunities. The company has one remote warehouse and no off-site disaster recovery services or servers. The network design remains a non-redundant, flat topology. Your assignment must consider the three-layer hierarchical model. You are free to make supported assumptions of the applications and services that this organization uses. Write a two to three (2-3) page paper that is supported by a Visio or similar graphic model in …show more content…
Using private network IP addresses also gives a company a measure of security A subnet is a segment of a network. Subnetting is a technique that allows a network administrator to divide one physical network into smaller logical networks and, thus, control the flow of traffic for security or efficiency reasons. 3 Not being a technical person, I am heavily relying on our text and other related literature. The fundamental to network addressing and numbering in an environment, despite the size or location, is following a structured model. A network designer should carefully develop, plan, manage, and document the network layer addresses. Since no accurate mechanisms exist for assigning network or subnet numbers dynamically, the network layer address numbers need to be well-planned, administered, and documented. There are benefits to observing this approach. The network will be easily managed, maintained, troubleshooting narrowed and isolated to the location, and the network will be scalable (Oppenheimer, p. 169, 2011). Many organizations and companies ignore the importance of planning and administering a structured model approach to network layer addressing. Many problems result from such disorganization: there are duplicate network addresses; illegal addresses that routers cannot route to the Internet, running out of addresses for existing or future use; or have larger than required
Click here to unlock this and over one million essaysGet Access
When setting up a network that will consist of many host computers, one of the first things that an administrator must do is to determine what class of networks that they must administer to a given business. This is the point where every administrator must know how to implement classful and classless IP addressing. A classful network is a network addressing architecture used in the internet from 1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. Classful IP addressing divides the addtess space on the internet into five address classes. Each class is coded in the first four bits of the address. Today
Subnetting involves borrowing host bits from an ip address to create multiple IP addresses that can either be used or saved for future workstations. This mechanism also allows an organisation to divide its network into groups which can represent departments in an organisation (i.e. Financial department), this also ensures that only the workstations within the subnetwork can access the network resources given to that department making the network more secure by restricting other departments who are not authorized to view or deal with the data
| Using your textbook and web research, in your own words, summarize what you have learned about LAN modeling using OPNET ITGuru. Requirements: Minimum one paragraph per section; best practice is two or more
This report will now cover what the purchaser of my services can expect from the analysis and changes to come. The first thing that should and must be addressed is the basic structure of the networks themselves. If there is a mismatch between the basic structures of the two networks, the singular approach that will be followed with the new network must be figured out first. This does not mean that one network's general approach has to be chosen over the other, far from it. Instead, the singular best approach that covers the needed capabilities and metrics of the combined company has to be defined and mapped out. This will then lead to the structure and strategy for the new network.
The increasing number of mobile devices, virtualization of servers and emergence of cloud services has driven the networking industry to further examine the architectures of traditional network. Most of the traditional networks are hierarchical, arranged in a tree structure and built with Ethernet switches. This design was useful when client-server computing was being used, but this kind of static architecture will not be useful in dynamic computing and storage requirements of today’s data centers, carrier environments and campuses. Some of the important computing trends that drive the need of a network include:
UMUC management is in need of a reliable network that will be able to provide enough security of their data and any intellectual property within the servers. Data loss or manipulation may be as a result of data being intercepted during its transfer between computers. When a good network is deployed, they believe that faster and secure data traffic will be maintained.
Thoroughly illustrate the possible placement of servers, including access paths to the Internet and firewalls. Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.
Key tools utilized, variable length subnet masking and route summarization are explained as well. Here choosing the appropriate routing protocol is equally critical for a successful design. To implement different masks for the same major network it is necessary to have a routing protocol that supports VLSM. Such routing protocols are called classless routing protocols. They carry the mask information along with the route advertisements therefore allowing for the support of more than one mask.
The proposed network is designed for the UMUC new building in Rockville. This new building will have some administrative offices, lecture rooms, library, and computer labs with an open Wi-Fi. This new building will be the following existing layout. There will be total six computer labs that will be used for instruction. Each of these labs will have 25 computers, 23 student computers and one instructor computer and one server in the closet for instructional use. In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework. There will be 30 computers in this lab and a server in the closet. There will be 10 computers for student’s use in the library so they can access to the library resources, and 5 computers for Library staff. There will be six class room which will have a computer for instructor’s use. Finally, there will be 7 offices in the building. Each of these offices will have one computer for staff use, with the exception of the admissions office, which will have five computers. There will be two server rooms, one on the first floor and one on the second floor. There should be at least 3 separate networks: Administrative, Instructional, and Public. All staff-accessed computers will be on the Administrative network. The computers in the computer labs and classrooms that will be used for classes should be on the Instructional network.
The acronym subnet refers to sub - networking. This is the process of logically dividing an IP network into various divisions or sections within a network. Therefore, sub-netting is the technique and practice of dividing a network into two or more logical networks (Narten, Nordmark, Simpson & Soliman 2007). Within a subnet, all computers connected to it are identifiable by their almost identical IP addresses. The use of IP addresses is in order to identify uniquely computers in a subnet by the use of a router or network IP prefix followed by a host or rest field identifier. This IP address composition makes it easy to trace the network within which the sub network is
In this day and age, the design of networks can puzzle some individuals. In fact the naming of the devices within a network can be very daunting if someone takes into account that everything can be named within a network or internetwork. This might include items such as workstations, printers, servers, switches, routers, mobile devices, and tablets. A great designed and executed naming style could easily permit the users the ability to browse with ease and connect to these pieces of equipment by name. Each device’s name is the beginning of the variables that need to be checked into, and also the network address. The different ways that are discussed within this paper apply to being able to map an address with its name and varies from both static host files and dynamic domain name systems (DDNS) (Mitchell, 2015). Unlike DNS that simply functions with static IP addresses, DDNS is also created to support dynamic IP addresses, like those that are appointed by a Dynamic Host Configuration Protocol (DHCP) server (Mitchell, 2015). The utilization of dynamic name resolution methods are at many times the best decision. The naming method that is chosen must be constant all over the network and names need to be unique, significant, and small. This naming method will also allow a user to look for and identify names that are assigned to the devices.
The explosion of mobile devices and content, server virtualization, and advent of cloud services are among the trends driving the networking industry to re-examine traditional network architectures. Many conventional networks are hierarchical, built with tiers of Ethernet switches arranged in a tree structure. This design made sense when client-server computing was dominant, but such a static architecture is ill-suited to the dynamic computing and storage needs of today's enterprise data centers, campuses, and carrier environments. Some of the key computing trends driving the need for a new network paradigm include: