Discuss about the Benefits of the Hierarchical Network.
When we want to understand how an IT infrastructure is arranged and laid it is good we know the needs of the organization. The first step is analyzing the existing equipment’s in the organization and this will help in knowing what we will use and what we will not. Understanding how data is transmitted then it will be easy for us to know what to require in helping us send and receive information. The second step is underlining all the AusEd requirements and fro there we can start planning of the project where we will do a feasibility study and do an analysis of what to expect. The statistics used and gathered will be used in coming up with a logical diagram clearly showing all the significant and most used devices in the design of the network that is to be setup. Lastly is that when designing the plan and the model of a network it will be wise for one to consider some of the major factors like security, financial policy of the institution in terms of the budget allocation, how resilient, scalability and future flexibility of the network and how easy the network will be when it comes to managing such networks (Leon, 2015).. The management will be tested when troubleshooting in case an error occur.
The big idea here in AusEd is that they really require a system that can help them in maintaining the system in accounting that will help to improve the customer relationships where they have purposed to use the sugar customer relationship management and Microsoft exchange server 2007 which will be used in sending, receiving and storage of emails in the system of email. Having over 2000 students in the premise and others externally doing long distant and about 100 staffs working which is inclusive of the lecturers who does the course delivery, sales and the operations team and the management AusEd will need to perform comprehensive analysis that is based on the number of students who will need a computer, the staff who will need a work station, other basic equipment’s that are multi-accessed by all the people which may include photocopiers, printers, scanners and the Iphones.
For the above understanding then we will need to develop an IT infrastructure layout that will assist us to create a plan of what we intend to achieve. In the logic diagram we purpose to explain what are some of the networking gadgets used are and how they are interconnected with each other clearly showing how information is transmitted from networking device to the other and the way the networks security devices such as firewalls and VPNs are implanted in to the system.
The main reason for giving a future plan with regard to the design of the network in AusEd is to help them to achieve their strategic plans which is to increase their diversifying sources of funds and to minimize the cost of all the non-core activities. Also when we understand their technology plan will assist them in future in developing an offline Moodle for students and the add-on Moodle for taking exams.
Understanding the objectives of each and every organization that is in need of setting the network layout will be greatly on the basis of security and future extensions (Coleman, 2012). Designing the network it will be good also to consider the management of the network especially in situations where we anticipate to have problems in future. Security is one of the key requirements in any network design layout and when data is being transmitted then we will need to filter and provide the integrity and the confidentiality of the data being transmitted at all times across the entire network. The devices to help in providing the confidentiality and filtering of data are such as the Virtual Private networks and the firewalls.
In any setup of a network we must make any assumptions in the context in cases where we have used the diagram. We have assumed that AusEd will need to expand its network so we have used 3-Layered Hierarchical model with an anticipation that we will scale the size of the network. The cost for the networking devices is not the actual estimate but just an approximate of the anticipated price.
In networking there are some gadgets or equipment’s that are used for networking and interconnecting across the network. Some of the networking devices have been listed and explained below as shown below.
They are other major servers that are located in the data center that AusEd will need in making this implementations of such a plan a success.
The explanation of a diagram that is to be used by AusEd which will use the hierarchical design model.
As seen from the diagram above there are so many computers and laptops that are used for accessing the access layer which acts as the end user connected via the switch using the cables such as the Ethernet. Dynamic Host Configuration Protocol is a server that is used for assigning the IP addresses to all the workstations connected to the network automatically (Macken, 2016). The DNS server is used for matching the web files for hosting the website of AusEd (Meena, 2017).
In demonstration of the AusEd network the network design have to be broken in to different layers where each and every layer is specified to perform functions that will help in simplifying the design of the design making it easy in scaling and managing the network (CISCO, 2014).
In the hierarchical design model the three layer fuctions in the following ways from the access layer to the core layer.
As seen in the diagram above we shown the presence of the said servers and how they communicate with the other devices. This is just a draft of the small organization network design plan.
Networking Device |
Manufacture |
Specs |
Quantity |
TOTAL Cost (Dollars $) |
Computers |
Dell |
Core i7 of 7th Generation 1TB, 2.9 GHZ with a turbo of up to 4 GHZ. 8GB RAM with a hard disk RPM of about 7200 |
1200 |
900,000 |
Laptops |
HP |
Core i7 Hard disk storage of about 500Gb and a processor of 3.4ghz. 16 GB RAM and supports wireless connections. NVIDIA950 display is supported. |
50 |
100,000 |
Servers |
IBM |
Servers come in many varieties and can be such as the file, web, dynamic host configuration protocol, DNS and the proxy servers. |
7 |
9800 |
Switch |
Cisco |
Each will have 48 ports each with an Ethernet base of about base |
30 |
30000 |
Iphones |
cisco |
– screen display of about 5” with a graphical TFT color display. – Support codec G.450 of up to G.722 |
150 |
250,000 |
Switch |
Cisco |
Supports 48 10/100/1000 Ethernet ports, they have been used for a forwarding capacity of about 71.4 megabytes per second |
25 |
24000 |
Routers |
Cisco |
Supports up to 20G – It has two antenna – Has a frequency channel of about 2.4ghz and 10Ghz – Supports all WEP, WPA and the WPA2 – Its compliant to ABCs standards of 802.11 |
1 |
3725 |
Cables |
3000 Feet |
5 rolls |
5000 |
|
Firewall |
Cisco |
RV220w network security firewall – High performance Gb Ethernet connections – 4 ports 10/100/1000 – Supports 802.1Q (VLAN) |
2 |
15000 |
VPNs |
Cisco |
VPN 3002 hardware .where we have a secure remote connections. It has VPN aware routers used in communicating with firewalls in the routers that will help to permit VPN traffic legitimacy (Nelson, 2016). |
4 |
4500 |
Transceiver |
Cisco |
1000Base-T (Tittel, 2016).-Supporting up to 400 feet. |
30 |
24,000 |
TOTAL |
1,336,025 $ |
The reason for choosing Cisco is because is able to offer enough compatibility with the other existing devices. The cost of cisco items are friendly and that they are easy to afford. Another concept is that the portability and interoperability is very good when compared to other manufacturers.
The use of HP and Dell is very significant in that they are also affordable and that they are scalable in case where we need to add additional documents. Dell devices are so durable and that they have longer warranty when compared with other manufacturers.
Conclusion
The research in this study is about implementing the plan of the proposed network design where we have to first identify the network design model. The networks design model applied is the three-hierarchical layer model where we will have to access, distribute and core all the major layers clearly indicating how they communicate and interconnect across all the devices. If the above design and plans will be followed then we will be able to implement the anticipated network design of AusEd.
References
AdminMuba, 2015. What are Types of Servers ?. [Online]
Available at: https://wifinotes.com/computer-networks/server-types.html
[Accessed 21 May 2018].
Anon., 2010. Subnetting. [Online]
Available at: https://www.tutorialspoint.com/ipv4/ipv4_subnetting.htm
[Accessed 10 September 2017].
Cisco, 2009. Benefits of a Hierarchical Network, s.l.: Cisco.
Cisco, 2012. Cisco Router. [Online]
Available at: https://www.router-switch.com New and Used Cisco network equipment, cisco router,cisco switch
[Accessed 20 May 2018].
Cisco, 2013. Small Enterprise Design Profile Reference Guide, s.l.: cisco.
CISCO, 2014. Campus Design Summary, Singapore: Cisco.
Coleman, N., 2012. Happy Haven Day care network design proposal, Michigan: Network Solution Inc.
Hope, C., 2017. Router. [Online]
Available at: https://www.computerhope.com/jargon/r/router.htm
[Accessed 03 may 2018].
Hope, C., 2017. Server. [Online]
Available at: https://www.computerhope.com/jargon/s/server.htm
[Accessed 03 May 2018].
JoshWepman, 2015. techwalla. [Online]
Available at: https://www.techwalla.com/articles/what-are-the-benefits-of-hierarchical-network-design
Leon, A., 2015. 5 Fundamental Requirements For High-Performing Networks. A new set of network essentials is necessary to meet the challenges of today’s network administration and management, pp. 23-36.
Macken, T., 2016. Azure Resource Manager and Classic Deployment, s.l.: Microsoft.
Maggie, R., 2014. server. Types of servers, 23(12), pp. 23-40.
Meena, R., 2017. How to configure DHCP , DNS, HTTP Server in Cisco packet tracer along with switches.. Technoheper24, pp. 1-9.
Mitchell, B., 2017. Internet and Network. What is Computer Networking?, pp. 1-3.
Nelson, T., 2016. VPN requirements and components: What do you need to set up a VPN?. [Online]
Available at: https://searchenterprisewan.techtarget.com/photostory/4500270544/The-best-VPNs-for-enterprise-use/4/VPN-requirements-and-components-What-do-you-need-to-set-up-a-VPN
[Accessed 20 May 2018].
requirement, N., 2014. Network Requirements for a Small Office , s.l.: requirements network.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download