Assignment 2: Network Topology Design You are the network manager of a company that has grown from 10 employees to 100 employees in 12 months. Year 2 projected growth is estimated to be 100 additional employees located at a remote location. The aggressive growth has brought about some unique challenges and opportunities. The company has one remote warehouse and no off-site disaster recovery services or servers. The network design remains a non-redundant, flat topology. Your assignment must consider the three-layer hierarchical model. You are free to make supported assumptions of the applications and services that this organization uses. Write a two to three (2-3) page paper that is supported by a Visio or similar graphic model in …show more content…
Using private network IP addresses also gives a company a measure of security A subnet is a segment of a network. Subnetting is a technique that allows a network administrator to divide one physical network into smaller logical networks and, thus, control the flow of traffic for security or efficiency reasons. 3 Not being a technical person, I am heavily relying on our text and other related literature. The fundamental to network addressing and numbering in an environment, despite the size or location, is following a structured model. A network designer should carefully develop, plan, manage, and document the network layer addresses. Since no accurate mechanisms exist for assigning network or subnet numbers dynamically, the network layer address numbers need to be well-planned, administered, and documented. There are benefits to observing this approach. The network will be easily managed, maintained, troubleshooting narrowed and isolated to the location, and the network will be scalable (Oppenheimer, p. 169, 2011). Many organizations and companies ignore the importance of planning and administering a structured model approach to network layer addressing. Many problems result from such disorganization: there are duplicate network addresses; illegal addresses that routers cannot route to the Internet, running out of addresses for existing or future use; or have larger than required
Upon reviewing Kudler Fine Food network, it has been determined that a major network overhaul will need to be conducted to make sure that Kudler is brought up to speed with the latest technology. This is very important because if Kudler is unable to keep up with the technological advances then the company will fall behind. Making sure that Kudler is not only able to keep up with the advances with network systems it is also important to install the proper systems so that no money is wasted. What is meant by this is that if the improper systems and storage units are installed to only handle data over the next year this is
Sub netting: The procedure of apportioning a solitary TCP/IP system into various separate system sections called subnets.
When setting up a network that will consist of many host computers, one of the first things that an administrator must do is to determine what class of networks that they must administer to a given business. This is the point where every administrator must know how to implement classful and classless IP addressing. A classful network is a network addressing architecture used in the internet from 1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. Classful IP addressing divides the addtess space on the internet into five address classes. Each class is coded in the first four bits of the address. Today
Section 1Computing Usable Subnets and Hosts vLab—40 Points Total * Task 1 * Task 2 * Summary Paragraph
1) In IP subnet planning, having a large subnet part allows more hosts per subnet.
Subnetting involves borrowing host bits from an ip address to create multiple IP addresses that can either be used or saved for future workstations. This mechanism also allows an organisation to divide its network into groups which can represent departments in an organisation (i.e. Financial department), this also ensures that only the workstations within the subnetwork can access the network resources given to that department making the network more secure by restricting other departments who are not authorized to view or deal with the data
The acronym subnet refers to sub - networking. This is the process of logically dividing an IP network into various divisions or sections within a network. Therefore, sub-netting is the technique and practice of dividing a network into two or more logical networks (Narten, Nordmark, Simpson & Soliman 2007). Within a subnet, all computers connected to it are identifiable by their almost identical IP addresses. The use of IP addresses is in order to identify uniquely computers in a subnet by the use of a router or network IP prefix followed by a host or rest field identifier. This IP address composition makes it easy to trace the network within which the sub network is
The increasing number of mobile devices, virtualization of servers and emergence of cloud services has driven the networking industry to further examine the architectures of traditional network. Most of the traditional networks are hierarchical, arranged in a tree structure and built with Ethernet switches. This design was useful when client-server computing was being used, but this kind of static architecture will not be useful in dynamic computing and storage requirements of today’s data centers, carrier environments and campuses. Some of the important computing trends that drive the need of a network include:
255 for each octet corresponding to the network ID. (The number 255 is 11111111 in binary and fills all eight bit positions in an IP address octet.) Therefore, the default Class A subnet mask is 255.0.0.0, the default Class B subnet mask is 255.255.0.0, and the default Class C subnet mask is 255.255.255.0.
Key tools utilized, variable length subnet masking and route summarization are explained as well. Here choosing the appropriate routing protocol is equally critical for a successful design. To implement different masks for the same major network it is necessary to have a routing protocol that supports VLSM. Such routing protocols are called classless routing protocols. They carry the mask information along with the route advertisements therefore allowing for the support of more than one mask.
In this day and age, the design of networks can puzzle some individuals. In fact the naming of the devices within a network can be very daunting if someone takes into account that everything can be named within a network or internetwork. This might include items such as workstations, printers, servers, switches, routers, mobile devices, and tablets. A great designed and executed naming style could easily permit the users the ability to browse with ease and connect to these pieces of equipment by name. Each device’s name is the beginning of the variables that need to be checked into, and also the network address. The different ways that are discussed within this paper apply to being able to map an address with its name and varies from both static host files and dynamic domain name systems (DDNS) (Mitchell, 2015). Unlike DNS that simply functions with static IP addresses, DDNS is also created to support dynamic IP addresses, like those that are appointed by a Dynamic Host Configuration Protocol (DHCP) server (Mitchell, 2015). The utilization of dynamic name resolution methods are at many times the best decision. The naming method that is chosen must be constant all over the network and names need to be unique, significant, and small. This naming method will also allow a user to look for and identify names that are assigned to the devices.
UMUC management is in need of a reliable network that will be able to provide enough security of their data and any intellectual property within the servers. Data loss or manipulation may be as a result of data being intercepted during its transfer between computers. When a good network is deployed, they believe that faster and secure data traffic will be maintained.
The proposed network is designed for the UMUC new building in Rockville. This new building will have some administrative offices, lecture rooms, library, and computer labs with an open Wi-Fi. This new building will be the following existing layout. There will be total six computer labs that will be used for instruction. Each of these labs will have 25 computers, 23 student computers and one instructor computer and one server in the closet for instructional use. In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework. There will be 30 computers in this lab and a server in the closet. There will be 10 computers for student’s use in the library so they can access to the library resources, and 5 computers for Library staff. There will be six class room which will have a computer for instructor’s use. Finally, there will be 7 offices in the building. Each of these offices will have one computer for staff use, with the exception of the admissions office, which will have five computers. There will be two server rooms, one on the first floor and one on the second floor. There should be at least 3 separate networks: Administrative, Instructional, and Public. All staff-accessed computers will be on the Administrative network. The computers in the computer labs and classrooms that will be used for classes should be on the Instructional network.
This article will focus on achieving an agreement that addressing method: positioning and identity separate protocol (LISP). Location identity separation (Loc / ID split) is now the basic idea behind the architecture of Internet routing and addressing mixed into two functions: addressing a single IP address space, the route positioning (RLOCs) describes a device is how dependent on the network, the end of the identification (EIDs) defines the device is "Who." Loc / ID Separation supporters justify that if there is no mandatory restrictions on the use of terminal system addresses, this “overload" addressing method in practice is impossible to establish an efficient routing system. Use a different address spaces to separate these two functions (EIDs and RLOCs) to generate a lot of advantages, including greater RLOCs by aggregating improved routing
Thoroughly illustrate the possible placement of servers, including access paths to the Internet and firewalls. Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.