The report is prepared for the development of a computer network system for connecting the head office of the organization with its branches. A simple peer to peer network is used for the connection and sharing data and resources. The current setup of the organization is evaluated for the development of the network framework. The number of devices connected in the network is estimated for the development of IP addressing plan and a network diagram is created demonstrating the topology and devices used for the management of interconnection. A security plan is created for centrally administering the network and the performance metrics and the hardware setup is demonstrated in the report that would help to setup the system.
For the development of the network solution it is important to gather the requirement and create a network design aligning the requirement. The users of the network is needed to be divided into groups for enabling sharing of data and resources. Privileges are needed to be managed for providing them different services and improving communication, collaboration and threat protection. According to the requirement a hardware is needed to be setup and it is needed to be installed and configured with the DNS, DHCP, HTTP and client OS setup such that a centralized user management is enabled. The number of subnets needed and the number of hosts needed to be connected per subnet is need to be identified. The services that are needed by the user for management of internal communication is also needed to be evaluated for the configuration of the server with the service and align the network following the requirement. A firewall is needed to be deployed for restricting the outside user to access the internal resources of the organization and a VPN connection is also needed to be setup between the branches for increasing the security of the network framework.
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
Head Office |
254 |
254 |
192.168.2.0 |
/24 |
255.255.255.0 |
192.168.2.1 – 192.168.2.254 |
192.168.2.255 |
Branch 1 |
254 |
254 |
192.168.190.0 |
/24 |
255.255.255.0 |
192.168.190.1 – 192.168.190.254 |
192.168.190.255 |
Branch 1 |
254 |
254 |
192.168.191.0 |
/24 |
255.255.255.0 |
192.168.191.1 – 192.168.191.254 |
192.168.191.255 |
Head office – Branch 1 |
2 |
2 |
10.1.1.0 |
/30 |
255.255.255.252 |
10.1.1.1 – 10.1.1.2 |
10.1.1.3 |
Head office – Branch 2 |
2 |
2 |
10.2.2.0 |
/30 |
255.255.255.252 |
10.2.2.1 – 10.2.2.2 |
10.2.2.3 |
For the development of the network a list of the device that are needed for the development of the network. A DHCP, DNS and a RADIUS server is needed to be configured for the management of service that are needed by the users connected in the network. A router is needed to be deployed and configured such that it can help in management of service and operation. Redundant link is needed to be user for interconnecting the device and increasing the performance of the network. A proper network cabling plan is needed to be followed for interconnecting the network device with the host and configuring the server according to the requirement of the user.
Device Name |
Device Type |
Requirement |
Router |
Cisco 2811 series router |
It can be used as a VPN gateway and management of delivery of data packets between the different host connected in then network. |
Switch |
Cisco 2960 series switch |
It is used of distribution of the network and creating redundant link for ensuring that no packet are lost. |
Servers |
WEB Server, DNS Server, DNS Server, DHCP server |
Web server hosts the company’s website DNS server maps the Ip address with the URL DHCP server is used for automatically assigning Ip address to the host connected in the network. |
Linksys Router |
Wireless Access Point |
It is used for connecting the wireless devices with the organizational network. |
The security plan is needed for created for guiding the users to appropriately use the electronic device, internet and email. The plan created for the organization is given below:
Email Usage – the acceptable standard for receiving, sending and opening emails are needed to be covered and it also define the topics that can be discussed using email.
Password Security – the usage of the password for accessing devices, programs or accessing files are needed to be outlined and the users are needed to be educated to create secure password and time span for changing the password.
Internet Usage – The websites that are acceptable and the use of internet for shopping, banking and other personal needs are needed to be restricted (White, Fisch and Pooch 2017). A right balance for increasing the employee trust is needed to be maintained such that the misuse of internet is reduced and determine the culture and security needs best fitted for the organisation.
Software / Hardware Protocol – Any third party software or program should not be approved for installation in the PC and they should also be restricted to modify, uninstall or repair the existing the software or hardware component (Hussain, Hasan and Chughtai 2017). The password requirement for protecting files and acceptability for using hardware or software is also needed to be provided.
Company and Employee Owned device use – It should define the restriction for utilizing devices of the company for personal usage and the employee using the personal device for professional use. The security requirement for each of the device is needed to be outlined in this section.
Incident reporting – A clear understanding is needed to be presented to the employees such that they can report any instance of identified virus, SPAM, account breach and malware to the upper management.
Social Media Usage – For increasing the productivity of the employees and preventing breaches of data a no social media policy is needed to be implemented on the devices owned by the company. The privacy and confidentiality issues is needed to be discussed in respect of company, competitor, client, employees and social media for sharing the photos of employees and company (Ballestrero et al. 2017). The flexibility of the issue is needed to be managed and risk range for the social media is also needed to be understood.
For the deployment of the network the first step is to identify the functional needs and deployment environment. The features and the capabilities for the deployment of the network is needed to be considered for processing applications, modules and toolkits. The components are also needed to be identified and the interaction between the component are needed to be managed in relation with security of the network devices. The capacity and performance of the workplace environment is needed to be identified for identifying the number of physical servers that are needed for performing specific function (Zeb et al. 2016). The redundancy needed for the management of operation and improving the performance of the network is also needed for mitigating the failover plan. A design is needed to be created for the deployment environment and the topology pattern is needed to be created for its deployment in the network. The methodology available for the configuration is needed to be analysed for standardizing the deployment environment. The server is needed to be configured with roles and service such that the request can be distributed across different server and expanded depending on the growth of the organization. The DHCP servers are needed to be configured according to the subnet plan and different pools are needed to be created such that the IP address are automatically assigned to the hosts connected in the network (Pirani, Simpson-Porco and Fidan 2017). A wireless access point is also needed to be deployed for supporting BYOD and improving the performance of the employees. The access point is needed to be secured with the application of encryption mechanism such that it risk of misuse of the network is eliminated and the network is secured form the illegal users.
A site to site VPN connection topology is selected for the development of the network and connecting the head office with the head quarter and the two branches of the organization. It helps in creating a secured connection between the two end points and for the establishment the router is used as the VPN gateway device. With the selection of Site to Site VPN the need of VPN client software for establishing the connection is eliminated and here the hosts can send or receive TCP/IP traffic using the VPN gateway. The encapsulation and encryption of the outbound traffic is done by the VPN gateway and it is sent using the VPN tunnel. On the other end the gateway the header is stripped and the content is decrypted for relaying the packet to the targeted host. It is selected since the site to site VPN is capable of handling critical data traffic for example VOIP communication which have the requirement of good service and lower latency. Local Servers are needed to be deployed in the sites for the management of user account and groups such that risk associated with the network is eliminated. For increasing the network security the computers are needed to be installed with antivirus software such that the virus can be detected and network is secured from the external agents.
Latency, bandwidth and throughput and responsiveness of the network is needed to be analysed for improving the network performance and eliminating the delays in the network. The network devices are needed to be configured such that there is no latency for transmitting the data packets between different location of the network. The latency may cause problem for the VOIP network since the user may face call drop and jitter and thus it is necessary to divide the network communication channel and increase the efficiency of the network (Lipton et al. 2015). Sufficient bandwidth should be available for transmitting data packet between different host connected in the network. The through put of the network is needed to be analysed for the selection of ISP and improve the network performance. The bandwidth is the measure of amount of data that is transmitted for the certain amount of time. The network responsiveness and uptime should be higher and the connection should be functional. A service level agreement is needed to be signed between the ISP for eliminating the problem. The hardware and software should also be used for monitoring the network performance and tracking the utilization of the memory and other metrices necessary for managing the network performance (Plonka and Berger 2015). There are different data points that are needed to be tracked on the network and it is needed to be documented for reducing the network error and increase the utility of the network.
Application |
Required Bandwidth |
|
10 – 100 Kbps |
Messaging |
< 10 Kbps |
Web Browsing |
64 – 100+ Kbps |
Audio Streaming |
96 -160 Kbps |
VOIP |
24 – 100+ Kbps |
Video Streaming |
96 – 200+ Kbps |
File Sharing |
0 – infinity Mbps |
Conclusion
From the above report it can be concluded that for the development of the network solution it is important to manage the hosts and the other network peripheral deployed in the network. For the installation of the server a separate room should be considered and the hardware are needed to be protected from accidental damage. Proper cooling and ventilation facility is needed to be arranged along with backup of the servers such that the network is secured from any disaster. The users connected with the network should have separate account and strong password that is used for using the specific resources of the organization. User management is also necessary for centralizing the management and management of roles and responsibility of the users. A design of the network is created and reason for the section of the topology is given in the report. The performance metrics and the hardware setup that is needed for the configuration of the network is also documented in the report along with the screenshot for demonstrating the steps used for configuration of the network.
Ballestrero, S., Brasolin, F., Fazio, D., Gament, C., Lee, C.J., Scannicchio, D.A. and Twomey, M.S., 2017, October. ATLAS TDAQ system administration: Master of Puppets. In Journal of Physics: Conference Series (Vol. 898, No. 8, p. 082002). IOP Publishing.
Bholebawa, I.Z. and Dalal, U.D., 2016. Design and performance analysis of OpenFlow-enabled network topologies using Mininet. International Journal of Computer and Communication Engineering, 5(6), p.419.
Deng, G., Yan, Z., Zou, W. and Zhou, J., 2016, February. Application of DNS in the regulation of link traffic flow in multi-outlet networks. In 2015 5th International Conference on Computer Sciences and Automation Engineering (ICCSAE 2015). Atlantis Press.
DeVoe, C. and Rahman, S., 2015. Incident Response Plan for a Small to Medium Sized Hospital. arXiv preprint arXiv:1512.00054.
Gillmore, M., 2016. Multicast Protocol for Low-Power and Lossy Networks (MPL) Parameter Configuration Option for DHCPv6.
Hung, L.H., Kristiyanto, D., Lee, S.B. and Yeung, K.Y., 2016. GUIdock: using Docker containers with a common graphics user interface to address the reproducibility of research. PloS one, 11(4), p.e0152686.
Hussain, M.Z., Hasan, M.Z. and Chughtai, M.T.A., 2017. Penetration testing in system administration. International Journal of Scientific & Technology Research, 6(6), pp.2277-8616.
Jalalzai, M.H., Shahid, W.B. and Iqbal, M.M.W., 2015, January. DNS security challenges and best practices to deploy secure DNS with digital signatures. In 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST) (pp. 280-285). IEEE.
Lipton, Z.C., Kale, D.C., Elkan, C. and Wetzel, R., 2015. Learning to diagnose with LSTM recurrent neural networks. arXiv preprint arXiv:1511.03677.
Meek, J., 2018. PERSPECTIVES ON GOVERNANCE NETWORKS RESEARCH ORIENTATIONS FOR ASSESSING COLLABORATIVE PUBLIC ADMINISTRATION. Revista Científica Foz, 1(1), pp.17-17.
Pirani, M., Simpson-Porco, J.W. and Fidan, B., 2017, December. System-theoretic performance metrics for low-inertia stability of power networks. In 2017 IEEE 56th Annual Conference on Decision and Control (CDC) (pp. 5106-5111). IEEE.
Plonka, D. and Berger, A., 2015, October. Temporal and spatial classification of active IPv6 addresses. In Proceedings of the 2015 Internet Measurement Conference (pp. 509-522). ACM.
Trevisan, M., Drago, I., Mellia, M. and Munafo, M.M., 2016, September. Towards web service classification using addresses and DNS. In 2016 International Wireless Communications and Mobile Computing Conference (IWCMC)(pp. 38-43). IEEE.
White, G.B., Fisch, E.A. and Pooch, U.W., 2017. Computer system and network security. CRC press.
Zeb, A., Islam, A.M., Zareei, M., Al Mamoon, I., Mansoor, N., Baharun, S., Katayama, Y. and Komaki, S., 2016. Clustering analysis in wireless sensor networks: the ambit of performance metrics and schemes taxonomy. International Journal of Distributed Sensor Networks, 12(7), p.4979142.
Zhou, Z., Li, Z. and Zhang, K., 2017, March. All Your VMs are Disconnected: Attacking Hardware Virtualized Network. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy (pp. 249-260). ACM.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download