Network design denotes to the planning put in place to implement a computing network infrastructure. It involves the evaluation and having the understanding of the scope of the network to be deployed. The entire network is presented as a network diagram that acts as the blueprint for the implementation of the physical network. Main activities in a network implementation include but are not limited to cabling structure, IP addressing structure, logical diagram of the network to be put in place, network security facilities and location, quantity and type of network devices (Pop, 2012).
In this document we are designing network for NTN College. Basically, our task will be to implement the above mentioned list of activities.
List of Business Goals and Constraints
A business goal denotes to objectives that a company prospects to achieve and a business constraint refers limitations such as time, physical, fiscal limitations that are anticipated as parameters that are affects the business goal achievement. NTN private nursing experiences the following list of business goals and constraints:
Goals
Constraints
Technical goals
Trade-offs
There are a set of trade-offs which are made to ensure that the technical goals will be attained. In the meantime the trade-off is a process that advocates the lessening or the leaving aside of some of the looked-for good results of that the project would have appreciated for the expense of another decent result. Our NTN has to trade-off more positive returns in order to upturn more staff to work as teachers to the predictable number of students.
Table of User Communities, Data Stores, Network Applications and Traffic Flows
A user community denotes to the group of people who are legible to use our NTN nursing school network infrastructure. Below is our user community table
User community name |
Data store |
Network application |
Traffic flow |
Administration |
Web server, file sharing server, email server |
Google Chrome, world client mailing application |
File transfer, messaging and mailing, voice |
Accounting |
Hospital ERP system |
SAP HANA |
File sharing, batch data, transaction data |
Nursing team |
Browser, mailing |
Chrome browser |
Messaging and mailing, file transfer, |
Students |
Cloud video server |
Cisco Webex |
Videoconferencing, voice |
Network administrators |
Logs for Open view, alerts for alert page |
Open view, alert page |
Network management, |
Doctoring team |
Web browser, email, Cloud centre |
Google chrome browser, MS. outlook |
File transfer |
Nurse Lecturer |
File server, mailing, cloud |
Webex for teleconferencing |
Videoconferencing |
Model for addressing and naming
An IP address refers a unique number that is assigned to a networked computing device to uniquely identify it on the network. In our NTN network design, we are going to use Class C IP address type. Our service provider given IP is assumed to be 192.168.10.0 /24. We are using VLSM subnetting to allow future growth. Our model for addressing are tabulated below.
Location |
Size |
Octet |
Network Address |
First Usable Address |
Last Usable Address |
Mask |
HQ |
200 |
256 |
192.168.10.0 |
192.168.10.1 |
192.168.10.25 |
/24 |
Darwin |
100 |
128 |
192.168.11.0 |
192.168.11.1 |
192.168.11.126 |
/25 |
Cairns |
100 |
128 |
192.168.11.128 |
192.168.11.129 |
192.168.11.254 |
/25 |
WAN 1 |
2 |
4 |
192.168.12.0 |
192.168.12.1 |
192.168.12.2 |
/30 |
WAN 2 |
2 |
4 |
192.168.12.4 |
192.168.12.5 |
192.168.12.6 |
/30 |
WAN 3 |
2 |
4 |
192.168.12.8 |
192.168.12.9 |
192.168.12.10 |
/30 |
Naming
Naming is key in a networked environment as it helps identify a network device by name. Our naming structure will follow the following naming structure.
Location_DeviceNameNo for instance, switch 2 in Darwin satellite campus will be, Darwin_Switch2.
Explanation and justification of the logical network design
The diagram below shows the logical diagram network design for NTN. Justification.
Network component |
Quantity |
Justification |
HQ |
||
Router |
1 |
Router required to route information from inside and outside HQ LAN |
Switches |
4-48Port |
Switches required to expand HQ LAN ie 4*48 = 384 nodes |
Wireless access-points |
2 |
Wireless network to be accessed by handheld devices. Each floor will have 1 wireless AP. |
Server |
2 |
One server to host mail and messaging, file sharing, NTN’s ERP system and another to host DHCP,DNS,WEB server, |
Firewall |
1 |
Firewall used to offer security management service. |
Cairn |
||
Router |
1 |
Router required to route information from inside and outside Cairn LAN |
Switches |
2-48Port |
Switches required to expand Cairn LAN ie 2*48 = 96 nodes Other computing devices will be using Wi-Fi |
Wireless access-points |
2 |
Wireless network to be accessed by handheld devices. Each floor will have 1 wireless AP. |
Server |
1 |
server to host mail and messaging, file sharing host DHCP,DNS,WEB server, |
Home Gateway |
1 |
Smart gateway will be used in implementation of IoT |
Darwn |
||
Router |
1 |
Router required to route information from inside and outside Darwn LAN |
Switches |
4-48Port |
Switches required to expand HQ LAN ie 2*48 = 96 nodes |
Wireless access-points |
2 |
Wireless network to be accessed by handheld devices. Each floor will have 1 wireless AP. |
Server |
1 |
server to host mail and messaging, file sharing host DHCP,DNS,WEB server, |
Home Gateway |
1 |
Smart gateway will be used in implementation of IoT |
Logical network diagram(s) including addressing and naming
Discussion of routing and switching protocols
Routing protocol denotes to the mechanism by which packets within a network are routed to another network. In our network design for NTN private college, we are using OSPF. We chose this routing protocol due to its modular convergence and ease of management features. For instance, a single area represents a full complete network.
Discussion of security mechanisms
In any computing environment, security that protects computing infrastructure is important. There are millions of network attackers out there who are trying their best to access other people’s computing infrastructure to have self-gain from their vulnerable activities. Since NTN private college handles patient data (which ought to be super confidential), network security has to be implemented. To accomplish this, we are using Cisco ASA firewall to protect such kind of health data.
References
Nogueira, A. & Salvador, ., 2013. A Practical Approach to Corporate Networks Engineering. 2nd ed. Chicago: River Publishers.
Pop, P. C., 2012. Generalized Network Design Problems: Modeling and Optimization. Berlin: Walter de Gruyter.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.