Discuss about the Benefits of the Hierarchical Network.
When we want to understand how an IT infrastructure is arranged and laid it is good we know the needs of the organization. The first step is analyzing the existing equipment’s in the organization and this will help in knowing what we will use and what we will not. Understanding how data is transmitted then it will be easy for us to know what to require in helping us send and receive information. The second step is underlining all the AusEd requirements and fro there we can start planning of the project where we will do a feasibility study and do an analysis of what to expect. The statistics used and gathered will be used in coming up with a logical diagram clearly showing all the significant and most used devices in the design of the network that is to be setup. Lastly is that when designing the plan and the model of a network it will be wise for one to consider some of the major factors like security, financial policy of the institution in terms of the budget allocation, how resilient, scalability and future flexibility of the network and how easy the network will be when it comes to managing such networks (Leon, 2015).. The management will be tested when troubleshooting in case an error occur.
The big idea here in AusEd is that they really require a system that can help them in maintaining the system in accounting that will help to improve the customer relationships where they have purposed to use the sugar customer relationship management and Microsoft exchange server 2007 which will be used in sending, receiving and storage of emails in the system of email. Having over 2000 students in the premise and others externally doing long distant and about 100 staffs working which is inclusive of the lecturers who does the course delivery, sales and the operations team and the management AusEd will need to perform comprehensive analysis that is based on the number of students who will need a computer, the staff who will need a work station, other basic equipment’s that are multi-accessed by all the people which may include photocopiers, printers, scanners and the Iphones.
For the above understanding then we will need to develop an IT infrastructure layout that will assist us to create a plan of what we intend to achieve. In the logic diagram we purpose to explain what are some of the networking gadgets used are and how they are interconnected with each other clearly showing how information is transmitted from networking device to the other and the way the networks security devices such as firewalls and VPNs are implanted in to the system.
The main reason for giving a future plan with regard to the design of the network in AusEd is to help them to achieve their strategic plans which is to increase their diversifying sources of funds and to minimize the cost of all the non-core activities. Also when we understand their technology plan will assist them in future in developing an offline Moodle for students and the add-on Moodle for taking exams.
Understanding the objectives of each and every organization that is in need of setting the network layout will be greatly on the basis of security and future extensions (Coleman, 2012). Designing the network it will be good also to consider the management of the network especially in situations where we anticipate to have problems in future. Security is one of the key requirements in any network design layout and when data is being transmitted then we will need to filter and provide the integrity and the confidentiality of the data being transmitted at all times across the entire network. The devices to help in providing the confidentiality and filtering of data are such as the Virtual Private networks and the firewalls.
In any setup of a network we must make any assumptions in the context in cases where we have used the diagram. We have assumed that AusEd will need to expand its network so we have used 3-Layered Hierarchical model with an anticipation that we will scale the size of the network. The cost for the networking devices is not the actual estimate but just an approximate of the anticipated price.
In networking there are some gadgets or equipment’s that are used for networking and interconnecting across the network. Some of the networking devices have been listed and explained below as shown below.
They are other major servers that are located in the data center that AusEd will need in making this implementations of such a plan a success.
The explanation of a diagram that is to be used by AusEd which will use the hierarchical design model.
As seen from the diagram above there are so many computers and laptops that are used for accessing the access layer which acts as the end user connected via the switch using the cables such as the Ethernet. Dynamic Host Configuration Protocol is a server that is used for assigning the IP addresses to all the workstations connected to the network automatically (Macken, 2016). The DNS server is used for matching the web files for hosting the website of AusEd (Meena, 2017).
In demonstration of the AusEd network the network design have to be broken in to different layers where each and every layer is specified to perform functions that will help in simplifying the design of the design making it easy in scaling and managing the network (CISCO, 2014).
In the hierarchical design model the three layer fuctions in the following ways from the access layer to the core layer.
As seen in the diagram above we shown the presence of the said servers and how they communicate with the other devices. This is just a draft of the small organization network design plan.
Networking Device |
Manufacture |
Specs |
Quantity |
TOTAL Cost (Dollars $) |
Computers |
Dell |
Core i7 of 7th Generation 1TB, 2.9 GHZ with a turbo of up to 4 GHZ. 8GB RAM with a hard disk RPM of about 7200 |
1200 |
900,000 |
Laptops |
HP |
Core i7 Hard disk storage of about 500Gb and a processor of 3.4ghz. 16 GB RAM and supports wireless connections. NVIDIA950 display is supported. |
50 |
100,000 |
Servers |
IBM |
Servers come in many varieties and can be such as the file, web, dynamic host configuration protocol, DNS and the proxy servers. |
7 |
9800 |
Switch |
Cisco |
Each will have 48 ports each with an Ethernet base of about base |
30 |
30000 |
Iphones |
cisco |
– screen display of about 5” with a graphical TFT color display. – Support codec G.450 of up to G.722 |
150 |
250,000 |
Switch |
Cisco |
Supports 48 10/100/1000 Ethernet ports, they have been used for a forwarding capacity of about 71.4 megabytes per second |
25 |
24000 |
Routers |
Cisco |
Supports up to 20G – It has two antenna – Has a frequency channel of about 2.4ghz and 10Ghz – Supports all WEP, WPA and the WPA2 – Its compliant to ABCs standards of 802.11 |
1 |
3725 |
Cables |
3000 Feet |
5 rolls |
5000 |
|
Firewall |
Cisco |
RV220w network security firewall – High performance Gb Ethernet connections – 4 ports 10/100/1000 – Supports 802.1Q (VLAN) |
2 |
15000 |
VPNs |
Cisco |
VPN 3002 hardware .where we have a secure remote connections. It has VPN aware routers used in communicating with firewalls in the routers that will help to permit VPN traffic legitimacy (Nelson, 2016). |
4 |
4500 |
Transceiver |
Cisco |
1000Base-T (Tittel, 2016).-Supporting up to 400 feet. |
30 |
24,000 |
TOTAL |
1,336,025 $ |
The reason for choosing Cisco is because is able to offer enough compatibility with the other existing devices. The cost of cisco items are friendly and that they are easy to afford. Another concept is that the portability and interoperability is very good when compared to other manufacturers.
The use of HP and Dell is very significant in that they are also affordable and that they are scalable in case where we need to add additional documents. Dell devices are so durable and that they have longer warranty when compared with other manufacturers.
Conclusion
The research in this study is about implementing the plan of the proposed network design where we have to first identify the network design model. The networks design model applied is the three-hierarchical layer model where we will have to access, distribute and core all the major layers clearly indicating how they communicate and interconnect across all the devices. If the above design and plans will be followed then we will be able to implement the anticipated network design of AusEd.
References
AdminMuba, 2015. What are Types of Servers ?. [Online]
Available at: https://wifinotes.com/computer-networks/server-types.html
[Accessed 21 May 2018].
Anon., 2010. Subnetting. [Online]
Available at: https://www.tutorialspoint.com/ipv4/ipv4_subnetting.htm
[Accessed 10 September 2017].
Cisco, 2009. Benefits of a Hierarchical Network, s.l.: Cisco.
Cisco, 2012. Cisco Router. [Online]
Available at: https://www.router-switch.com New and Used Cisco network equipment, cisco router,cisco switch
[Accessed 20 May 2018].
Cisco, 2013. Small Enterprise Design Profile Reference Guide, s.l.: cisco.
CISCO, 2014. Campus Design Summary, Singapore: Cisco.
Coleman, N., 2012. Happy Haven Day care network design proposal, Michigan: Network Solution Inc.
Hope, C., 2017. Router. [Online]
Available at: https://www.computerhope.com/jargon/r/router.htm
[Accessed 03 may 2018].
Hope, C., 2017. Server. [Online]
Available at: https://www.computerhope.com/jargon/s/server.htm
[Accessed 03 May 2018].
JoshWepman, 2015. techwalla. [Online]
Available at: https://www.techwalla.com/articles/what-are-the-benefits-of-hierarchical-network-design
Leon, A., 2015. 5 Fundamental Requirements For High-Performing Networks. A new set of network essentials is necessary to meet the challenges of today’s network administration and management, pp. 23-36.
Macken, T., 2016. Azure Resource Manager and Classic Deployment, s.l.: Microsoft.
Maggie, R., 2014. server. Types of servers, 23(12), pp. 23-40.
Meena, R., 2017. How to configure DHCP , DNS, HTTP Server in Cisco packet tracer along with switches.. Technoheper24, pp. 1-9.
Mitchell, B., 2017. Internet and Network. What is Computer Networking?, pp. 1-3.
Nelson, T., 2016. VPN requirements and components: What do you need to set up a VPN?. [Online]
Available at: https://searchenterprisewan.techtarget.com/photostory/4500270544/The-best-VPNs-for-enterprise-use/4/VPN-requirements-and-components-What-do-you-need-to-set-up-a-VPN
[Accessed 20 May 2018].
requirement, N., 2014. Network Requirements for a Small Office , s.l.: requirements network.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.