Network design denotes to the planning put in place to implement a computing network infrastructure. It involves the evaluation and having the understanding of the scope of the network to be deployed. The entire network is presented as a network diagram that acts as the blueprint for the implementation of the physical network. Main activities in a network implementation include but are not limited to cabling structure, IP addressing structure, logical diagram of the network to be put in place, network security facilities and location, quantity and type of network devices (Pop, 2012).
In this document we are designing network for NTN College. Basically, our task will be to implement the above mentioned list of activities.
List of Business Goals and Constraints
A business goal denotes to objectives that a company prospects to achieve and a business constraint refers limitations such as time, physical, fiscal limitations that are anticipated as parameters that are affects the business goal achievement. NTN private nursing experiences the following list of business goals and constraints:
Goals
Constraints
Technical goals
Trade-offs
There are a set of trade-offs which are made to ensure that the technical goals will be attained. In the meantime the trade-off is a process that advocates the lessening or the leaving aside of some of the looked-for good results of that the project would have appreciated for the expense of another decent result. Our NTN has to trade-off more positive returns in order to upturn more staff to work as teachers to the predictable number of students.
Table of User Communities, Data Stores, Network Applications and Traffic Flows
A user community denotes to the group of people who are legible to use our NTN nursing school network infrastructure. Below is our user community table
User community name |
Data store |
Network application |
Traffic flow |
Administration |
Web server, file sharing server, email server |
Google Chrome, world client mailing application |
File transfer, messaging and mailing, voice |
Accounting |
Hospital ERP system |
SAP HANA |
File sharing, batch data, transaction data |
Nursing team |
Browser, mailing |
Chrome browser |
Messaging and mailing, file transfer, |
Students |
Cloud video server |
Cisco Webex |
Videoconferencing, voice |
Network administrators |
Logs for Open view, alerts for alert page |
Open view, alert page |
Network management, |
Doctoring team |
Web browser, email, Cloud centre |
Google chrome browser, MS. outlook |
File transfer |
Nurse Lecturer |
File server, mailing, cloud |
Webex for teleconferencing |
Videoconferencing |
Model for addressing and naming
An IP address refers a unique number that is assigned to a networked computing device to uniquely identify it on the network. In our NTN network design, we are going to use Class C IP address type. Our service provider given IP is assumed to be 192.168.10.0 /24. We are using VLSM subnetting to allow future growth. Our model for addressing are tabulated below.
Location |
Size |
Octet |
Network Address |
First Usable Address |
Last Usable Address |
Mask |
HQ |
200 |
256 |
192.168.10.0 |
192.168.10.1 |
192.168.10.25 |
/24 |
Darwin |
100 |
128 |
192.168.11.0 |
192.168.11.1 |
192.168.11.126 |
/25 |
Cairns |
100 |
128 |
192.168.11.128 |
192.168.11.129 |
192.168.11.254 |
/25 |
WAN 1 |
2 |
4 |
192.168.12.0 |
192.168.12.1 |
192.168.12.2 |
/30 |
WAN 2 |
2 |
4 |
192.168.12.4 |
192.168.12.5 |
192.168.12.6 |
/30 |
WAN 3 |
2 |
4 |
192.168.12.8 |
192.168.12.9 |
192.168.12.10 |
/30 |
Naming
Naming is key in a networked environment as it helps identify a network device by name. Our naming structure will follow the following naming structure.
Location_DeviceNameNo for instance, switch 2 in Darwin satellite campus will be, Darwin_Switch2.
Explanation and justification of the logical network design
The diagram below shows the logical diagram network design for NTN. Justification.
Network component |
Quantity |
Justification |
HQ |
||
Router |
1 |
Router required to route information from inside and outside HQ LAN |
Switches |
4-48Port |
Switches required to expand HQ LAN ie 4*48 = 384 nodes |
Wireless access-points |
2 |
Wireless network to be accessed by handheld devices. Each floor will have 1 wireless AP. |
Server |
2 |
One server to host mail and messaging, file sharing, NTN’s ERP system and another to host DHCP,DNS,WEB server, |
Firewall |
1 |
Firewall used to offer security management service. |
Cairn |
||
Router |
1 |
Router required to route information from inside and outside Cairn LAN |
Switches |
2-48Port |
Switches required to expand Cairn LAN ie 2*48 = 96 nodes Other computing devices will be using Wi-Fi |
Wireless access-points |
2 |
Wireless network to be accessed by handheld devices. Each floor will have 1 wireless AP. |
Server |
1 |
server to host mail and messaging, file sharing host DHCP,DNS,WEB server, |
Home Gateway |
1 |
Smart gateway will be used in implementation of IoT |
Darwn |
||
Router |
1 |
Router required to route information from inside and outside Darwn LAN |
Switches |
4-48Port |
Switches required to expand HQ LAN ie 2*48 = 96 nodes |
Wireless access-points |
2 |
Wireless network to be accessed by handheld devices. Each floor will have 1 wireless AP. |
Server |
1 |
server to host mail and messaging, file sharing host DHCP,DNS,WEB server, |
Home Gateway |
1 |
Smart gateway will be used in implementation of IoT |
Logical network diagram(s) including addressing and naming
Discussion of routing and switching protocols
Routing protocol denotes to the mechanism by which packets within a network are routed to another network. In our network design for NTN private college, we are using OSPF. We chose this routing protocol due to its modular convergence and ease of management features. For instance, a single area represents a full complete network.
Discussion of security mechanisms
In any computing environment, security that protects computing infrastructure is important. There are millions of network attackers out there who are trying their best to access other people’s computing infrastructure to have self-gain from their vulnerable activities. Since NTN private college handles patient data (which ought to be super confidential), network security has to be implemented. To accomplish this, we are using Cisco ASA firewall to protect such kind of health data.
References
Nogueira, A. & Salvador, ., 2013. A Practical Approach to Corporate Networks Engineering. 2nd ed. Chicago: River Publishers.
Pop, P. C., 2012. Generalized Network Design Problems: Modeling and Optimization. Berlin: Walter de Gruyter.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download