Planning a network mainly focuses on the topology and arrangement in which they are arranged. It is immersivelty referred to as complex since we limit ourselves to designing small and medium size network. The information networks of the computers are a main reason that leads to successful sharing of resources as well as communication. It links people, supports services and applications. In this assignment, we are going to focus mainly on the significant issues faced when planning and designing an internetwork infrastructure.
EZY Books is a specialized publisher for customized books services based in Brisbane. They have recently opened up a constituent branch that has the marketing team, Human Resource and other managerial duties. These offices comprise of 20 computers that are available and 2 servers. The first floor has the Editorial, Design and Photography team with 20 computers and 1 allocated server. EZY Books has also settled business in Sydney team with a marketing team of 8 employees and they are allocated 10 computers on a leased office.
The main aim of the network is to set up a communication channel that enables one to interact freely within the network. The interactions include file sharing and use of resources such as printers and the webmail for intranet communication within the organization. The branch network simply interlinks the connectivity of various networking segments in the topology without the devices and communication around the area. Then, the branch will be rendered functional since there is no way it can access data information and services while the isp is down or one of the distributors have spoilt it in one way or another. Here, the designed network is supposed to meet and attain certain operational and business objectives that are functional. They include:
Ethernet cables are the most preferable cables that are mostly relied in setting up a network. They are cables that are connected to the device interface to facilitate communication between two or more devices. Ethernet are simple divide in the way they can work and there duplex mode.
There is the Gigabit Ethernet with a speed of up to 1000 mbps. They work in half duplex through hubs and are not typical. In general, all applications are full duplex through the switch, half-duplex operation on the stop and wait command.
Full Duplex communication operates on simultaneous communication. There are also fast Ethernet cables used in the same network access method (CSMA/CD) since it provides a transmission speed of up to 10Mbps. Sometimes it can reach up to 100Mbps. On setting up a NIC card, one must consider some certain factors for efficient and effective communication in the network. (Trulove, 2015)
The Internet Service Providers will dedicate a public ip4 address of 120.154.191.2 with a subnet mask of 255.255.255.0 and a gateway of 120.154.19.1 that will show the interface of between the internet service providers and the EZY Router R1
Upon the entry of the network provided by the ISP to the internal network of the branch, the network will be separated into subnet that ideally means that the network will be segmented into separate sections of 3. The ip address will be of class c and the address will 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24. On every subnet, a computer will be assigned and will be configured to the available ip address in regard to the subnets respectively. (Comer & Droms, 2013)
The ip addressing table is based on the network that is layed down and the configuration across the network.
Device |
Interface |
IP Address |
Subnet Mask |
Default Gateway |
ISP |
Se2/0 |
120.154.191.1 |
255.255.255.0 |
N/A |
R1 |
Se2/0(DCE) |
120.154.191.2 |
255.255.255.0 |
N/A |
Se3/0 |
192.168.0.1 |
255.255.255.0 |
N/A |
|
Fa0/0 |
192.168.1.1 |
255.255.255.0 |
N/A |
|
R2 |
Se2/0(DCE) |
192.168.0.2 |
255.255.255.0 |
N/A |
Fa0/0 |
192.168.2.1 |
255.255.255.0 |
N/A |
|
Fa1/0 |
192.168.3.1 |
255.255.255.0 |
N/A |
|
PC1 |
NIC |
192.168.1.2 |
255.255.255.0 |
192.168.1.1 |
PC2 |
NIC |
192.168.2.2 |
255.255.255.0 |
192.168.2.1 |
PC3 |
NIC |
192.168.3.2 |
255.255.255.0 |
192.168.3.1 |
Internet Access Technologies enable the exchange of information and data through the protocol suite. The intercommunication of the internet enabled devices and the internet is initiated/triggered through the technology of data transmission communication. They majorly focus on the automatic ip assignment being dedicated across the network and the private network conversion. (Guttman, 2009)
Dial up Internet Access. It uses the modulation and demodulation technology of telephone lines. This on the other had is regarded to as old fashion technology (Analog). This is due to slow and unreliable connectivity speed. It is on the other hand least expensive if one is working on limited funds.
DSL (Digital Subscribed Loops). This is more similar to the Dial up technology only that this ensures Asymmetric Digital Subscriber Line (ADSL). This allows the conveyance of internet and telephone on massed on the same line.
Cable Internet. It provides a high bandwidth cable to transmit internet to residential area. This is among the most preferred in the context.
Wireless Broadband (WiBB). This is the modest internet access technology allowing the conveyance of high-speed internet within a large range area. It uses the microwave technology where there is the transmitter and the receiver on the other end. The waves are then demodulated and behold you have internet.
Integrated Service Digital Network (ISDN). It ensures the conveyance of better communication and data transmission along a telephone line reducing information lost along the way.
Ethernet. This is the most widely distributed local area network since it provides a transmission speed of up to 10Mbps. Sometimes it reaches up to 100Mbps. (Stockebrand, 2011)
Access control- by simply setting up a login and passphrase key keeps hackers and attackers away. One needs to be aware of the security feature and level being laid up. Also by enforcing security policies, one can keep out the non-compliant away from the endpoint by laying up the limited access
Antivirus software- Malicious software such as viruses and worm can crawl into the network, tap a machine and cripple it. At given times malware may also cripple the network and render it useless for several days.
Firewalls – this simply a setup barrier between trusted internal network and others by simply setting up rules and regulations that govern the network. It can either be software based or even hardware. They set defined rules to control the traffic flow within the network. (Brunetti et al., 2011)
Conclusion
In conclusion, we finally see that the network is successfully setup with consideration of the service they provide and focusing on the objectives that were set before starting the project. I can herby say that the network is functional.
References
Browne, R., Valente, J. and Hariri, S., 2009. An advanced middleware architecture for secure and survivable mobile C4I systems. In Military Communications Conference Proceedings, 2009. MILCOM 2009. IEEE (Vol. 1, pp. 506-513). IEEE.
Brunetti, J.A., Chakrabarti, K., Ionescu-Graff, A.M., Nagarajan, R. and Sun, D., 2011. Open network quality of service and bandwidth control: Use cases, technical architecture, and business models. Bell Labs technical journal, 16(2), pp.133-152.
Comer, D.E. and Droms, R.E., 2013. Computer networks and internets. Prentice-Hall, Inc..
Guttman, E., 2009. Service location protocol: Automatic discovery of IP network services. IEEE Internet Computing, 3(4), pp.71-80.
Stockebrand, B., 2011. Essential Network Services. IPv6 in Practice: A Unixer’s Guide to the Next Generation Internet, pp.81-102.
Trulove, J., 2015. LAN wiring. McGraw-Hill, Inc..
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download