Network Topology Design Week 4 Assignment 2 Naressa Hackney Menser Dr. Edwin Otto CIS532 Network Architecture and Analysis February 3, 2013 "Network addresses should be carefully planned managed and documented (Oppenheimer, p. 168)". All of the address names should make sense and should be easily understood. As Oppenhiemer states, I would begin planning by designing a model. Design the model without assigning any addresses (p.168). Once the model is designed, the network engineer will begin to assign blocks of addresses in a hierarchical fashion to allow scalability, and an easy level of understanding. Also important is developing policies and procedures for addressing and naming. This would involve plans for distributing …show more content…
Next we will assign an IP network number to an enterprise network (subnetting the network number and subnetting the subnets, as in the structured (hierarchical) model" (Oppenheimer, p. 168, 2011). Following is a list of additional steps that will be use in addressing and numbering a network layer: 1. Leave room for growth, renumbering or experimental purposes 2. Assign blocks of addresses in a hierarchical manner to facilitate good scalability and availability 3. Assign blocks of addresses based on the physical network, not on group membership, to avoid problems when group or individual growth or move occurs 4. Delegate authority for addressing regional and branch-office networks, subnets, servers, and end systems (if network management expertise is high in this area) 5. Use dynamic addressing for end systems to maximize flexibility and minimize configurations 6. Use private addresses with network address translation (NAT) in IP environment to maximize security and adaptability. Using a hierarchical network design topology, there will a Core Layer, Distribution Layer, and an Access Layer. The Core Layer will consist of the high-speed backbone, these will consist of the 20 backend enterprise servers, our headquarters. Since the core layer is the primary basis for interconnectivity, included are redundancy components (Oppenheimer, p. 127, 2011). The Distribution Layer will be the point of boundaries between the
“Networks are all around us. They are in our walls, in the air. At schools, hotels, hospitals, even coffee shops. Always there, always on…This power exists today. In our routers. In our switches... . (Cisco, n.d.)
3: Network Layer: The use of network layer is switching and routing technologies. It demonstrates logical path and virtual circuits for transferring data from one node to
Layer 1: Physical - This is the level of the actual hardware. It defines the physical characteristics of the network such as connections, voltage levels and timing.
When setting up a network that will consist of many host computers, one of the first things that an administrator must do is to determine what class of networks that they must administer to a given business. This is the point where every administrator must know how to implement classful and classless IP addressing. A classful network is a network addressing architecture used in the internet from 1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. Classful IP addressing divides the addtess space on the internet into five address classes. Each class is coded in the first four bits of the address. Today
Each campus will have a DHCP server to hand out ip addresses to nodes on the Curriculum network.
The best network design to ensure the security of Corporation Techs internal access while retaining public Web site availability consists of several layers of defense in order to protect the corporation’s data and provide accessibility to employees and the public.
layer 1 | Hubs, repeaters, network adapters, Parallel SCSI buses. Various physical-layer Ethernet incorporates both this layer and the data-link layer. Token ring, FDDI, and IEEE 802.11. | - |
During this period, the network identifies the product and assigns the IP address or hostname of the product.
contains the case narrative, related figures, and a set of questions and problems. These do not have one unique solution. There are too many alternatives when dealing with LANs, WANs, MANs, BNs, and the Internet, so a reallife network design and development problem can have several workable answers.
To outface this problem Network Address Translation (NAT) method is used. This enables devices with private addresses to be connected to a public network address (e.g. Internet). This private address is converted to legal IP address, through NAT routers before traveling 11 “outside”. (See figure 4). Every device that is connected to the network has a unique IP address but this doesn’t mean that is permanent. Because devices connected to the network,
In order to properly address the Infrastructure upgrade of the Kamazon Network our group decided that an appropriate ip address schema that will take into account the idea that people will be using more than just a desktop computer. They will have tablets, laptops, departmental printers, and smart phones. This is also based upon the understanding that every Department will have at least two printers for the staff and one for the Manager/Supervisor or VP of that Department. So with that being said, we estimated that could be at least three or more accurately four ip addresses per employee. So we multiplied the number of users per department by the number of estimated devices that each
In line with standard procedures, Static IP addresses will be retained for servers and networked equipment as this allows for an easier collation and management of such devices at each site.
As this demand for dynamic and unpredictable data grows, more and more devices have to be added to existing networks and configured accordingly. The need of the hour is to regulate networks centrally and as a whole rather than configure individual network devices and gain more control to achieve flexibility in existing networks.
3 Not being a technical person, I am heavily relying on our text and other related literature. The fundamental to network addressing and numbering in an environment, despite the size or location, is following a structured model. A network designer should carefully develop, plan, manage, and document the network layer addresses. Since no accurate mechanisms exist for assigning network or subnet numbers dynamically, the network layer address numbers need to be well-planned, administered, and documented. There are benefits to observing this approach. The network will be easily managed, maintained, troubleshooting narrowed and isolated to the location, and the network will be scalable (Oppenheimer, p. 169, 2011).
The OSI model defines internetworking in terms of a vertical stack of seven layers. The upper