SlideShare a Scribd company logo
Assignment 1
CSNB423 Network Analysis and Design
Fahmy Khawarizmy BinZainan SN097085
Muhammad Irfan Bin Hashim SN097050
Muhammad Mu'izuddinBinMuhsinon SN097083
Assignment 1
CSNB423 Network Analysis and Design
Instructions:
1. Work in group, maximum 4 persons. Study the scenario below and answer the
questions given.
2. You need to do some research in order to get the suitable solutions. Please provide
references at the end of your report.
3. Full report submission in hardcopy is required with maximum 10 pages, not including
the front page and the reference page.
4. Use your creativity in arranging your solution, you may have appropriate diagrams to
support your solution.
5. Use Times New Roman with font size of 12 in your report.
6. Submit your report on 19/8/2016 before 5 pm.
DesignScenario1 - “Analyzing Business Goals andConstraints”
You are a network consultant who has been asked to attend an initial meeting with the
executive management team of ElectroMyCycle. ElectroMyCycle manufactures motorcycles. Its
new electric motorcycle was just picked up by a large retail chain.
ElectroMyCycle is upgrading its manufacturing capacity and hiring new employees. recently,
ElectroMyCycle employees have started saying, “The Internet is slow.” They are also
experiencing problems sending email, accessing web-based applications, and printing.
In the past, when the company was small, it didn’t have these problems. The operations
manager outsourced computer services to a local business called Network Rogues, which
installed new workstations and servers as needed, provided desktop support, and managed the
switches, router, and firewall. ElectroMyCycle is now considering bringing computer services in-
house and is wondering how its network should evolve as it increases production of its electric
motorcycle.
1. What research will you do before your initial meeting with the executive management
team?
Before our initial meeting with the executive management team of
ElectroMyCycle we would research their external relations such as the market that
they are in, their customers, suppliers, competitors, products produced, services
supplied, financial viability, and competitive advantages.
By identify the business requirements, it can help to modify the network
design according to their specific requirement. This will allow us to position
technologies and products to help strengthen the customer’s status in their industry.
By understanding the customer’s business goals and constraints we will be able to
propose a network design that would meet the customer needs.
2. What general problems does ElectroMyCycle seem to be experiencing? What network
design principles may have been ignored when Network Rogues designed and operated the
existing network?
The problem that ElectroMyCycle encounter:
i. Slow Internet
ii. Sending email
iii. Network printing problem
iv. Slow Surfing website
Design principles that may have been ignored by Network Rogues could include
analyzing
ElectroMyCycle’s initial requirements, scalability (the ability of a network to handle a
growing
amount of work or its ability to be enlarged toaccommodate that growth), bandwidth
(the average rate of successful data transfer through a communication path), and
latency (the measure of the time delay experienced by a system).
We don’t believe that Network Rogues were expecting the major jump in growth of
the company which was caused by the increase in the production of the electric
motorcycle and unfortunately did not design the network to handle this growth and
the complexity of ElectroMyCycle’s network.
3. List four major stakeholders for a new network design for ElectroMyCycle. For each
stakeholder, list some design goals, constraints, and biases.
i. End Users
Design goals – ease of use, good performance, response time
Constraints – number of stations, size of the network
Biases – may only want to use certain applications or certain e-mail programs,
equipment preferences
ii. Executives
Design goals – increased employee productivity, increased profits, less
overhead
Constraints – budget, staffing
Biases – biases toward certain technologies, acquisition
iii. Managers
Design goals – network performance, security, availability
Constraints –scheduling, politics and policies
Biases – familiarity of the system and how rapidly the system is available for
use
iv. Customers
Design goals – better customer support, offer new customer service, ease of
access
Constraints – data security, ease of use
Biases – has to be easy to access, simple, appearance of ease of use or they
won’t use it, has to look like what the customers are used to using
4. List five questions you will pose to the executive management team. Why will you pose
those questions?
1. What is your organizational structure?
Posing this question will allow us to gain an understanding of how the
company is structured in
departments, lines of business, vendors, partners, and field or remote offices.
This will eventually
help us locate major user communities and will suggest users to account for as
well as suggest
geographical locations to account for. By Understanding their organizational
structure can also help us recognize their management hierarchy which will
allow us to determine who the decision makers are.
2. What is your overall goal of the network design project?
Asking the customer for a concise statement of their goals will allow us to
determine the problems they are trying to solve and how the new technology
will help them be more successful in their business. It will enable for us to
understand what the business is trying to achieve so that we can create a
compelling proposal for their new network.
3. What will the new network be used for?
As a network designer we need to have a good understanding of what the
network will be used for and also what network assets should be protected.
We need to know who will be using this network and also what type of
activities it will be used for. With a better understanding of our client’s
expectations and needs for the new network, thus we will be able to
concentrate on exactly what they are looking for and design the network per
their request.
4. What is the expected budget for this project?
We need to know how much customer’s budget to meet with their network
requirement. Their budget should include allocations for equipment purchases,
software licenses, maintenance and support agreements, testing, training, and
staffing. It should also include consulting fees and fees for outsourcing. In order
for this project to be successful we have to try to stay in the company’s budget
and chose the most affordable solution determined by their budget.
5. May we obtain your security policy?
We would ask the executive management team for a copy of their security
policy so that we would able to get a better understanding of how the policy
will affect the new design, how the new design would affect the policy, and
whether or not the policy is too strict to where we won’t be able to do our job.
DesignScenario2
ElectroMyCycle has chosen you to design a new network that will let the company scale to a
larger size. In Scenario 2, you learned that ElectroMyCycle’s network will support about 200
employees. The network will include a data center and a new state-of-the-art manufacturing
facility. Users in the campus network will access the servers in the data center from their PCs.
For online sales, ElectroMyCycle plans to have a DMZ that connects a web server, a DNS server,
and an email server. ElectroMyCycle also plans to open a branch sales office in a city that is
about 500 miles from ElectroMyCycle’s headquarters.
Design and document an IP addressing scheme to meet ElectroMyCycle’s needs. Specify
which IP address blocks will be assigned to different modules of your network design.
Document whether you will use public or private addressing for each module. Document
whether you will use manual or dynamic addressing for each module. Specify where (if
anywhere) route summarization will occur.
Review Questions
1. Many basic networking books state that there are three network topologies, a bus, a ring,
and a star. Based on the knowledge you gained in this course, explain why these simple
topologies may not meet the needs of modern networks.
Modern network is more focusing onto using the established technologies to solve
client business problems rather than just make a good component selection and
configuration towards the network architecture. Same goes to the network topologies
likes bus, ring and star topologies. These simple topologies may not meet the needs of
modern network that will be built in ElectroMyCycle. Their new network must support
about 200 employees. At this point, bus topology can’t be chosen due it is suitable for
low traffic networks. The high traffic networks at their environment will dropdowns
the network efficiency.
Furthermore, ElectroMyCycle will include data center in their modern network to
allow the user get data faster from the server in the data center. However, ring
topology can’t be selected because the data sent must go through all intermediate
nodes that will make the transmission speed becoming slower. Lastly, the star
topology also not seems suitable with the modern network because the network
operation depends on the functioning of the central hub.
For instance, the ElectroMyCycle plans to have a web server, a DNS server and an
email server. Even they want to have a DMZ for their servers, this topology is still not
relevant hence central hub failure, and it leads to failure of the entire network. That’s
why another network topology is looks more suited with the modern network like
hybrid topology
2. Compare and contrast full- and partial-mesh topologies. What advantages does a partial
mesh have compared to a full mesh? What advantages does a full mesh have compared to a
partial mesh?
A mesh topology does not have a pattern when it comes to relaying the data. The flow
of the information comes in randomly since all of the nodes are interconnected with
each other. One of the most used network connection in the world that uses mesh
topology is the internet. The internet users consist of millions of people all over the
world. Data transmission is done through sending signals to different paths connected
in the internet connection.
Full Mesh Topology
The Mesh diagram is related with the Reed’s Law wherein communication of
groups is proportional with the exponent of the subscribers. It can be specified
into two categories; the full mesh topology and the partial mesh topology. Full
mesh topology requires each node to be interconnected with each other. This
is used to connect devices without the need to broadcast or switch.
Partial Mesh Topology
In Partial mesh topology, nodes are allowed to connect with more than one
node present in the network through the uses of a point-to-point link. The
point-to-point link advantage is that the redundancy provided by full mesh
topology can be taken to its maximum capability without the complexity
required for the node in the network.
Advantages
A broken node won’t distract the transmission of data in a mesh network. Each
node is connected to several other nodes which make it easier to relay data. A
broken device will be ignored by the signals and will then find a new one that is
connected with the node. Additional devices in a mesh topology will not affect
its network connection. Hence it will improve the traffic in the network. Mesh
topology makes a large data center that simulates useful information to its
nodes.
A mesh topology can handle high amount of network traffic since every
additional device into the network is considered a node. Interconnected
devices can simultaneously transfer data smoothly and will not complicate the
network connection.
Disadvantages
Maintaining mesh networks can be very hard to manage. It requires
continuous supervision because of the redundancy present in the network.
Skilled network administrators will find it easy to manage this kind of topology.
Due to the fact that building this topology requires a lot of devices it will need
a lot of capital to invest in. It may be expensive but the service it provides you
will definitely give back the invested capital.
Every network topology has its own ups and downs. It will only matter on how
you structure it very well and if the nature of your business requires a bigger
network system. It is important to keep learning about what you need in your
business or place to be able to come up with an effective system where in your
investment won’t go to waste and your revenue will give you excellent output.
3. The following network numbers are defined at a branch office. Can they be summarized,
and if so, what is the network number and prefix length?
10.108.48.0
10.108.49.0
10.108.50.0
10.108.51.0
10.108.52.0
10.108.53.0
10.108.54.0
10.108.55.0
10.108.48.0 = 00001010.01101100.00110000 .00000000
10.108.49.0 = 00001010.01101100.00110001 .00000000
10.108.50.0 = 00001010.01101100.00110010 .00000000
10.108.51.0 = 00001010.01101100.00110011 .00000000
10.108.52.0 = 00001010.01101100.00110100 .00000000
10.108.53.0 = 00001010.01101100.00110101 .00000000
10.108.54.0 = 00001010.01101100.00110110 .00000000
10.108.55.0 = 00001010.01101100.00110111 .00000000
21 Bits
Network number: 10.108.48.0/21
Subnet Mask: 255.255.248.0
4. What is a discontiguous subnet? Why do some enterprise networks have discontiguous
subnets? Why don’t classful routing protocols support discontiguous subnets?
A discontiguous subnet is two or more portions of a major network that are divided by
another major network. A discontiguous network in a network is that there are one or
few route in the network for which they only route to a subnet passes through
subnets of other networks.
Discontiguous subnets are a mean to travel from one subnet to another on the same
network you would need togo through of a subnet on the different network. Classful
routing protocols don’t support discontiguous subnets because they summarize routes
to only one network they are on. Discontiguous subnets can’t access other networks
5. Compare and contrast distance-vector and link-state routing. If you were designing a new
routing protocol, which would you use and why?’
Distance Vector
Distance vector involved with two factors which are the distance, metric of a
destination and the vector or direction to take to get there. The routing information
only exchange between directly connected neighbors. This means a router will know
from which neighbor a route learned but it does not know where the neighbor learned
the route. This means that the router cannot see beyond it own neighbor. This aspect
of distance vector routing sometimes referred to as routing by rumor measures like
split horizon and poison reverse are employed to avoid routing loops.
Link-state
Link-state routing will require all routers that all router know about the path
reachable by all other router in the network. Link-state protocols track the status and
connection type of each link and produce a calculated metric based on these and
other factors, including some set by the network administrator. Link-state information
is flooded throughout the link state domain to ensure all routers possess a
synchronized copy of the area link-state database. From this database, each router
constructs it own relative shortest path tree with itself as the root for all known
routes.
Comparison Link-State and Distance Vector
If all routers were running a Distance Vector protocol, the path or 'route'
chosen would be from A B directly over the ISDN serial link, even though that link is
about 10 times slower than the indirect route from A C D B.
A Link State protocolwould choose the A C D B path because it's using a faster
medium (100 Mb Ethernet). In this example, it would be better to run a Link State
routing protocol, but if all the links in the network are the same speed, then a
Distance Vector protocol is better.
Design New protocol
From this routing protocol, I will choose link state because link state is design
to operate in large and enterprise level network. Even though the routing protocol are
very complex and are much more difficult to configure, maintain, and troubleshoot
than distance vector routing protocols. However, link state routing protocol
overcomes many of shortcomings of distance vector protocols. Link state protocols
use a different algorithm than distance vector protocols for calculating the best path
to a destination. This algorithm takes into account bandwidth as well as other factors
when calculating the best path for a packet to traverse the network. Additionally, link
state convergence occurs faster than distance vectorconvergence. This is because link
state establishes a neighbour relationship with directly connected peers and shares
routing information with its neighbours only when there are changes in the network
topology.
6. Analyze the routing table on your computer. In Windows you can view it with a route print
command. On a Mac, you can view it with a netstat -rn command. What entries are in your
routing table and why are they there? Is your default route in the table and, if yes, what is
it?
A routing table contains the information necessary to forward packet along the best
path forward its destination. Each packet contains information about its origin and
destination. When a packet is received, a network device examines the packet and
matches it to the routing table entry providing the best match for its destination. The
table provides the device with instruction for sending the packet to the next hop on its
route across the network
Basic Routing Table
Destination The IP address of the packet's final destination
Next hop The IP address to which the packet is forwarded
Interface The outgoing network interface the device should use when forwarding the
packet to the next hop or final destination
Metric Assigns a cost to each available route so that the most cost-effective path
can be chosen
Routes Includes directly-attached subnets, indirect subnets that are not attached
to the device but can be accessed through one or more hops, and default
routes to use for certain types of traffic or when information is lacking.
Default Route
Routes that is used when no other routes for the destination are found in the routing
table. If a router or end system (such as a PC running Microsoft Windows or Linux),
cannot find a route for a destination, the default route is used. The default route is
used if no other host or network route matches the destination address.
The default route generally points to another router, which treats the packet the same
way. If a route matches, the packet is forwarded. Otherwise the packet is forwarded
to the default route of that router. The route evaluation process in each router uses
the longest prefix match method to obtain the most specific route. The network with
the longest subnet mask that matches the destination IP address is the next-hop
network gateway. The process repeats until a packet is delivered to the destination.
Each router traversal counts as one hop in the distance calculation for the
transmission path.

More Related Content

What's hot

Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
ArunChokkalingam
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
SHIKHA GAUTAM
 
build a small wireless LAN LO2
build a small wireless LAN LO2build a small wireless LAN LO2
build a small wireless LAN LO2
Jaleto Sunkemo
 
Network Design for a Small & Medium Enterprise
Network Design for a Small & Medium EnterpriseNetwork Design for a Small & Medium Enterprise
Network Design for a Small & Medium Enterprise
Thamalsha Wijayarathna
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
praveen369
 
GSM & UMTS Security
GSM & UMTS SecurityGSM & UMTS Security
GSM & UMTS Security
Sohaib Altaf
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
Ramesh Babu
 
DDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNDDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDN
Chao Chen
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
Smriti Tikoo
 
Paging and Location Update
Paging and Location UpdatePaging and Location Update
Paging and Location Update
Abidullah Zarghoon
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
Mshari Alabdulkarim
 
Hotel network scenario implementation by using cisco packet tracer
Hotel network scenario implementation by using cisco packet tracerHotel network scenario implementation by using cisco packet tracer
Hotel network scenario implementation by using cisco packet tracer
Home
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
AKSHIT KOHLI
 
TinyOS
TinyOSTinyOS
Analysis of mutual exclusion algorithms with the significance and need of ele...
Analysis of mutual exclusion algorithms with the significance and need of ele...Analysis of mutual exclusion algorithms with the significance and need of ele...
Analysis of mutual exclusion algorithms with the significance and need of ele...
Govt. P.G. College Dharamshala
 
How to Troubleshooting VLAN Switch Problems-Part1
How to Troubleshooting VLAN Switch Problems-Part1How to Troubleshooting VLAN Switch Problems-Part1
How to Troubleshooting VLAN Switch Problems-Part1
IT Tech
 
CSS Module 8 - Configuring the Wireless Access Point
CSS Module 8 - Configuring the Wireless Access PointCSS Module 8 - Configuring the Wireless Access Point
CSS Module 8 - Configuring the Wireless Access Point
kenjifritz
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
Tushar Anand
 
Sensor Network
Sensor NetworkSensor Network
Sensor Network
Phearin Sok
 

What's hot (20)

Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
 
build a small wireless LAN LO2
build a small wireless LAN LO2build a small wireless LAN LO2
build a small wireless LAN LO2
 
Network Design for a Small & Medium Enterprise
Network Design for a Small & Medium EnterpriseNetwork Design for a Small & Medium Enterprise
Network Design for a Small & Medium Enterprise
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
 
GSM & UMTS Security
GSM & UMTS SecurityGSM & UMTS Security
GSM & UMTS Security
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
 
DDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNDDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDN
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Paging and Location Update
Paging and Location UpdatePaging and Location Update
Paging and Location Update
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Hotel network scenario implementation by using cisco packet tracer
Hotel network scenario implementation by using cisco packet tracerHotel network scenario implementation by using cisco packet tracer
Hotel network scenario implementation by using cisco packet tracer
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
 
TinyOS
TinyOSTinyOS
TinyOS
 
Analysis of mutual exclusion algorithms with the significance and need of ele...
Analysis of mutual exclusion algorithms with the significance and need of ele...Analysis of mutual exclusion algorithms with the significance and need of ele...
Analysis of mutual exclusion algorithms with the significance and need of ele...
 
How to Troubleshooting VLAN Switch Problems-Part1
How to Troubleshooting VLAN Switch Problems-Part1How to Troubleshooting VLAN Switch Problems-Part1
How to Troubleshooting VLAN Switch Problems-Part1
 
CSS Module 8 - Configuring the Wireless Access Point
CSS Module 8 - Configuring the Wireless Access PointCSS Module 8 - Configuring the Wireless Access Point
CSS Module 8 - Configuring the Wireless Access Point
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 
Sensor Network
Sensor NetworkSensor Network
Sensor Network
 

Similar to Design Scenario Network Analysis & Design

Determining Client And Networking Requirements
Determining Client And Networking RequirementsDetermining Client And Networking Requirements
Determining Client And Networking Requirements
Steven Cahill
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
Debanjan Paul
 
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdfPart I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
anandatalapatra
 
1 IT 340 Final Project Guidelines and Rubric O.docx
1  IT 340 Final Project Guidelines and Rubric  O.docx1  IT 340 Final Project Guidelines and Rubric  O.docx
1 IT 340 Final Project Guidelines and Rubric O.docx
honey725342
 
Running head CIS 532 Term PaperAssignment 5 .docx
Running head CIS 532 Term PaperAssignment 5 .docxRunning head CIS 532 Term PaperAssignment 5 .docx
Running head CIS 532 Term PaperAssignment 5 .docx
todd271
 
Week2
Week2Week2
Week2
trayyoo
 
FinalDocument
FinalDocumentFinalDocument
FinalDocument
Michael Valente
 
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxWest Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
philipnelson29183
 
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
Eric Hyman
 
Why is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptxWhy is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptx
Bluechip Gulf IT Services
 
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docxCHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
cravennichole326
 
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docxWWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
ericbrooks84875
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
monicafrancis71118
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp cisco
Jheyson Ayala
 
Ccna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 AnswersCcna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 Answers
ccna4discovery
 
440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx
440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx
440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx
GelreyLugoJaysonAli
 
En35793797
En35793797En35793797
En35793797
IJERA Editor
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
Steven Cahill
 
Computer Networking Concepts
Computer Networking ConceptsComputer Networking Concepts
Computer Networking Concepts
Bisnis Online Mandiri
 
REP.01 NETW3205 Network Management
REP.01 NETW3205 Network ManagementREP.01 NETW3205 Network Management
REP.01 NETW3205 Network Management
Ricardo Pereira
 

Similar to Design Scenario Network Analysis & Design (20)

Determining Client And Networking Requirements
Determining Client And Networking RequirementsDetermining Client And Networking Requirements
Determining Client And Networking Requirements
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdfPart I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
Part I Identifying Your Customer’s Needs and Goals Chapter 1 A.pdf
 
1 IT 340 Final Project Guidelines and Rubric O.docx
1  IT 340 Final Project Guidelines and Rubric  O.docx1  IT 340 Final Project Guidelines and Rubric  O.docx
1 IT 340 Final Project Guidelines and Rubric O.docx
 
Running head CIS 532 Term PaperAssignment 5 .docx
Running head CIS 532 Term PaperAssignment 5 .docxRunning head CIS 532 Term PaperAssignment 5 .docx
Running head CIS 532 Term PaperAssignment 5 .docx
 
Week2
Week2Week2
Week2
 
FinalDocument
FinalDocumentFinalDocument
FinalDocument
 
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxWest Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
 
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
EarthLink Top 5 Questions Asked of EarthLInk Network Engineers 2016
 
Why is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptxWhy is Network Planning and Design So Important.pptx
Why is Network Planning and Design So Important.pptx
 
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docxCHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
 
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docxWWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
 
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docxCLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
CLASS NAMEMIS600PROFESSORS NAME STUDENTS NAME PRO.docx
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp cisco
 
Ccna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 AnswersCcna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 Answers
 
440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx
440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx
440064845-Introduction-Computer-Systems-Servicing-Nc-II.pptx
 
En35793797
En35793797En35793797
En35793797
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
 
Computer Networking Concepts
Computer Networking ConceptsComputer Networking Concepts
Computer Networking Concepts
 
REP.01 NETW3205 Network Management
REP.01 NETW3205 Network ManagementREP.01 NETW3205 Network Management
REP.01 NETW3205 Network Management
 

More from Muhd Mu'izuddin

CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
Muhd Mu'izuddin
 
Visualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital EvidenceVisualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital Evidence
Muhd Mu'izuddin
 
Lab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingLab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routing
Muhd Mu'izuddin
 
Final Year Project Report Example
Final Year Project Report ExampleFinal Year Project Report Example
Final Year Project Report Example
Muhd Mu'izuddin
 
Layer 2 & layer 3 switching
Layer 2 & layer 3 switchingLayer 2 & layer 3 switching
Layer 2 & layer 3 switching
Muhd Mu'izuddin
 
Artificial Intelligence - 2
Artificial Intelligence - 2Artificial Intelligence - 2
Artificial Intelligence - 2
Muhd Mu'izuddin
 
Artificial Intelligence - 1
Artificial Intelligence - 1Artificial Intelligence - 1
Artificial Intelligence - 1
Muhd Mu'izuddin
 
Itcb213 short essay
Itcb213   short essayItcb213   short essay
Itcb213 short essay
Muhd Mu'izuddin
 
ITCB312
ITCB312ITCB312
Hubungan Etnik
Hubungan EtnikHubungan Etnik
Hubungan Etnik
Muhd Mu'izuddin
 
Ethics & Philosophy
Ethics & PhilosophyEthics & Philosophy
Ethics & Philosophy
Muhd Mu'izuddin
 
Report Storage
Report StorageReport Storage
Report Storage
Muhd Mu'izuddin
 
Strorage Technologies
Strorage TechnologiesStrorage Technologies
Strorage Technologies
Muhd Mu'izuddin
 
Project
ProjectProject
Outline long report
Outline long reportOutline long report
Outline long report
Muhd Mu'izuddin
 
Windows 7 installation
Windows 7 installationWindows 7 installation
Windows 7 installation
Muhd Mu'izuddin
 
CSNB244 Lab5
CSNB244 Lab5CSNB244 Lab5
CSNB244 Lab5
Muhd Mu'izuddin
 
Nota dakwah
Nota dakwahNota dakwah
Nota dakwah
Muhd Mu'izuddin
 
Database lab1
Database lab1   Database lab1
Database lab1
Muhd Mu'izuddin
 
Fyp slide presentation muiz
Fyp slide presentation muizFyp slide presentation muiz
Fyp slide presentation muiz
Muhd Mu'izuddin
 

More from Muhd Mu'izuddin (20)

CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
 
Visualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital EvidenceVisualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital Evidence
 
Lab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingLab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routing
 
Final Year Project Report Example
Final Year Project Report ExampleFinal Year Project Report Example
Final Year Project Report Example
 
Layer 2 & layer 3 switching
Layer 2 & layer 3 switchingLayer 2 & layer 3 switching
Layer 2 & layer 3 switching
 
Artificial Intelligence - 2
Artificial Intelligence - 2Artificial Intelligence - 2
Artificial Intelligence - 2
 
Artificial Intelligence - 1
Artificial Intelligence - 1Artificial Intelligence - 1
Artificial Intelligence - 1
 
Itcb213 short essay
Itcb213   short essayItcb213   short essay
Itcb213 short essay
 
ITCB312
ITCB312ITCB312
ITCB312
 
Hubungan Etnik
Hubungan EtnikHubungan Etnik
Hubungan Etnik
 
Ethics & Philosophy
Ethics & PhilosophyEthics & Philosophy
Ethics & Philosophy
 
Report Storage
Report StorageReport Storage
Report Storage
 
Strorage Technologies
Strorage TechnologiesStrorage Technologies
Strorage Technologies
 
Project
ProjectProject
Project
 
Outline long report
Outline long reportOutline long report
Outline long report
 
Windows 7 installation
Windows 7 installationWindows 7 installation
Windows 7 installation
 
CSNB244 Lab5
CSNB244 Lab5CSNB244 Lab5
CSNB244 Lab5
 
Nota dakwah
Nota dakwahNota dakwah
Nota dakwah
 
Database lab1
Database lab1   Database lab1
Database lab1
 
Fyp slide presentation muiz
Fyp slide presentation muizFyp slide presentation muiz
Fyp slide presentation muiz
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 

Design Scenario Network Analysis & Design

  • 1. Assignment 1 CSNB423 Network Analysis and Design Fahmy Khawarizmy BinZainan SN097085 Muhammad Irfan Bin Hashim SN097050 Muhammad Mu'izuddinBinMuhsinon SN097083
  • 2. Assignment 1 CSNB423 Network Analysis and Design Instructions: 1. Work in group, maximum 4 persons. Study the scenario below and answer the questions given. 2. You need to do some research in order to get the suitable solutions. Please provide references at the end of your report. 3. Full report submission in hardcopy is required with maximum 10 pages, not including the front page and the reference page. 4. Use your creativity in arranging your solution, you may have appropriate diagrams to support your solution. 5. Use Times New Roman with font size of 12 in your report. 6. Submit your report on 19/8/2016 before 5 pm. DesignScenario1 - “Analyzing Business Goals andConstraints” You are a network consultant who has been asked to attend an initial meeting with the executive management team of ElectroMyCycle. ElectroMyCycle manufactures motorcycles. Its new electric motorcycle was just picked up by a large retail chain. ElectroMyCycle is upgrading its manufacturing capacity and hiring new employees. recently, ElectroMyCycle employees have started saying, “The Internet is slow.” They are also experiencing problems sending email, accessing web-based applications, and printing. In the past, when the company was small, it didn’t have these problems. The operations manager outsourced computer services to a local business called Network Rogues, which installed new workstations and servers as needed, provided desktop support, and managed the switches, router, and firewall. ElectroMyCycle is now considering bringing computer services in- house and is wondering how its network should evolve as it increases production of its electric motorcycle.
  • 3. 1. What research will you do before your initial meeting with the executive management team? Before our initial meeting with the executive management team of ElectroMyCycle we would research their external relations such as the market that they are in, their customers, suppliers, competitors, products produced, services supplied, financial viability, and competitive advantages. By identify the business requirements, it can help to modify the network design according to their specific requirement. This will allow us to position technologies and products to help strengthen the customer’s status in their industry. By understanding the customer’s business goals and constraints we will be able to propose a network design that would meet the customer needs. 2. What general problems does ElectroMyCycle seem to be experiencing? What network design principles may have been ignored when Network Rogues designed and operated the existing network? The problem that ElectroMyCycle encounter: i. Slow Internet ii. Sending email iii. Network printing problem iv. Slow Surfing website Design principles that may have been ignored by Network Rogues could include analyzing ElectroMyCycle’s initial requirements, scalability (the ability of a network to handle a growing amount of work or its ability to be enlarged toaccommodate that growth), bandwidth (the average rate of successful data transfer through a communication path), and latency (the measure of the time delay experienced by a system). We don’t believe that Network Rogues were expecting the major jump in growth of the company which was caused by the increase in the production of the electric motorcycle and unfortunately did not design the network to handle this growth and the complexity of ElectroMyCycle’s network.
  • 4. 3. List four major stakeholders for a new network design for ElectroMyCycle. For each stakeholder, list some design goals, constraints, and biases. i. End Users Design goals – ease of use, good performance, response time Constraints – number of stations, size of the network Biases – may only want to use certain applications or certain e-mail programs, equipment preferences ii. Executives Design goals – increased employee productivity, increased profits, less overhead Constraints – budget, staffing Biases – biases toward certain technologies, acquisition iii. Managers Design goals – network performance, security, availability Constraints –scheduling, politics and policies Biases – familiarity of the system and how rapidly the system is available for use iv. Customers Design goals – better customer support, offer new customer service, ease of access Constraints – data security, ease of use Biases – has to be easy to access, simple, appearance of ease of use or they won’t use it, has to look like what the customers are used to using
  • 5. 4. List five questions you will pose to the executive management team. Why will you pose those questions? 1. What is your organizational structure? Posing this question will allow us to gain an understanding of how the company is structured in departments, lines of business, vendors, partners, and field or remote offices. This will eventually help us locate major user communities and will suggest users to account for as well as suggest geographical locations to account for. By Understanding their organizational structure can also help us recognize their management hierarchy which will allow us to determine who the decision makers are. 2. What is your overall goal of the network design project? Asking the customer for a concise statement of their goals will allow us to determine the problems they are trying to solve and how the new technology will help them be more successful in their business. It will enable for us to understand what the business is trying to achieve so that we can create a compelling proposal for their new network. 3. What will the new network be used for? As a network designer we need to have a good understanding of what the network will be used for and also what network assets should be protected. We need to know who will be using this network and also what type of activities it will be used for. With a better understanding of our client’s expectations and needs for the new network, thus we will be able to concentrate on exactly what they are looking for and design the network per their request. 4. What is the expected budget for this project? We need to know how much customer’s budget to meet with their network requirement. Their budget should include allocations for equipment purchases, software licenses, maintenance and support agreements, testing, training, and staffing. It should also include consulting fees and fees for outsourcing. In order for this project to be successful we have to try to stay in the company’s budget and chose the most affordable solution determined by their budget. 5. May we obtain your security policy? We would ask the executive management team for a copy of their security policy so that we would able to get a better understanding of how the policy will affect the new design, how the new design would affect the policy, and whether or not the policy is too strict to where we won’t be able to do our job.
  • 6. DesignScenario2 ElectroMyCycle has chosen you to design a new network that will let the company scale to a larger size. In Scenario 2, you learned that ElectroMyCycle’s network will support about 200 employees. The network will include a data center and a new state-of-the-art manufacturing facility. Users in the campus network will access the servers in the data center from their PCs. For online sales, ElectroMyCycle plans to have a DMZ that connects a web server, a DNS server, and an email server. ElectroMyCycle also plans to open a branch sales office in a city that is about 500 miles from ElectroMyCycle’s headquarters. Design and document an IP addressing scheme to meet ElectroMyCycle’s needs. Specify which IP address blocks will be assigned to different modules of your network design. Document whether you will use public or private addressing for each module. Document whether you will use manual or dynamic addressing for each module. Specify where (if anywhere) route summarization will occur. Review Questions 1. Many basic networking books state that there are three network topologies, a bus, a ring, and a star. Based on the knowledge you gained in this course, explain why these simple topologies may not meet the needs of modern networks. Modern network is more focusing onto using the established technologies to solve client business problems rather than just make a good component selection and configuration towards the network architecture. Same goes to the network topologies likes bus, ring and star topologies. These simple topologies may not meet the needs of modern network that will be built in ElectroMyCycle. Their new network must support about 200 employees. At this point, bus topology can’t be chosen due it is suitable for low traffic networks. The high traffic networks at their environment will dropdowns the network efficiency. Furthermore, ElectroMyCycle will include data center in their modern network to allow the user get data faster from the server in the data center. However, ring topology can’t be selected because the data sent must go through all intermediate nodes that will make the transmission speed becoming slower. Lastly, the star topology also not seems suitable with the modern network because the network operation depends on the functioning of the central hub. For instance, the ElectroMyCycle plans to have a web server, a DNS server and an email server. Even they want to have a DMZ for their servers, this topology is still not relevant hence central hub failure, and it leads to failure of the entire network. That’s
  • 7. why another network topology is looks more suited with the modern network like hybrid topology 2. Compare and contrast full- and partial-mesh topologies. What advantages does a partial mesh have compared to a full mesh? What advantages does a full mesh have compared to a partial mesh? A mesh topology does not have a pattern when it comes to relaying the data. The flow of the information comes in randomly since all of the nodes are interconnected with each other. One of the most used network connection in the world that uses mesh topology is the internet. The internet users consist of millions of people all over the world. Data transmission is done through sending signals to different paths connected in the internet connection. Full Mesh Topology The Mesh diagram is related with the Reed’s Law wherein communication of groups is proportional with the exponent of the subscribers. It can be specified into two categories; the full mesh topology and the partial mesh topology. Full mesh topology requires each node to be interconnected with each other. This is used to connect devices without the need to broadcast or switch. Partial Mesh Topology In Partial mesh topology, nodes are allowed to connect with more than one node present in the network through the uses of a point-to-point link. The point-to-point link advantage is that the redundancy provided by full mesh topology can be taken to its maximum capability without the complexity required for the node in the network. Advantages A broken node won’t distract the transmission of data in a mesh network. Each node is connected to several other nodes which make it easier to relay data. A broken device will be ignored by the signals and will then find a new one that is connected with the node. Additional devices in a mesh topology will not affect its network connection. Hence it will improve the traffic in the network. Mesh topology makes a large data center that simulates useful information to its nodes. A mesh topology can handle high amount of network traffic since every additional device into the network is considered a node. Interconnected devices can simultaneously transfer data smoothly and will not complicate the network connection. Disadvantages
  • 8. Maintaining mesh networks can be very hard to manage. It requires continuous supervision because of the redundancy present in the network. Skilled network administrators will find it easy to manage this kind of topology. Due to the fact that building this topology requires a lot of devices it will need a lot of capital to invest in. It may be expensive but the service it provides you will definitely give back the invested capital. Every network topology has its own ups and downs. It will only matter on how you structure it very well and if the nature of your business requires a bigger network system. It is important to keep learning about what you need in your business or place to be able to come up with an effective system where in your investment won’t go to waste and your revenue will give you excellent output. 3. The following network numbers are defined at a branch office. Can they be summarized, and if so, what is the network number and prefix length? 10.108.48.0 10.108.49.0 10.108.50.0 10.108.51.0 10.108.52.0 10.108.53.0 10.108.54.0 10.108.55.0 10.108.48.0 = 00001010.01101100.00110000 .00000000 10.108.49.0 = 00001010.01101100.00110001 .00000000 10.108.50.0 = 00001010.01101100.00110010 .00000000 10.108.51.0 = 00001010.01101100.00110011 .00000000 10.108.52.0 = 00001010.01101100.00110100 .00000000 10.108.53.0 = 00001010.01101100.00110101 .00000000 10.108.54.0 = 00001010.01101100.00110110 .00000000 10.108.55.0 = 00001010.01101100.00110111 .00000000 21 Bits Network number: 10.108.48.0/21 Subnet Mask: 255.255.248.0
  • 9. 4. What is a discontiguous subnet? Why do some enterprise networks have discontiguous subnets? Why don’t classful routing protocols support discontiguous subnets? A discontiguous subnet is two or more portions of a major network that are divided by another major network. A discontiguous network in a network is that there are one or few route in the network for which they only route to a subnet passes through subnets of other networks. Discontiguous subnets are a mean to travel from one subnet to another on the same network you would need togo through of a subnet on the different network. Classful routing protocols don’t support discontiguous subnets because they summarize routes to only one network they are on. Discontiguous subnets can’t access other networks 5. Compare and contrast distance-vector and link-state routing. If you were designing a new routing protocol, which would you use and why?’ Distance Vector Distance vector involved with two factors which are the distance, metric of a destination and the vector or direction to take to get there. The routing information only exchange between directly connected neighbors. This means a router will know from which neighbor a route learned but it does not know where the neighbor learned the route. This means that the router cannot see beyond it own neighbor. This aspect of distance vector routing sometimes referred to as routing by rumor measures like split horizon and poison reverse are employed to avoid routing loops. Link-state Link-state routing will require all routers that all router know about the path reachable by all other router in the network. Link-state protocols track the status and connection type of each link and produce a calculated metric based on these and other factors, including some set by the network administrator. Link-state information is flooded throughout the link state domain to ensure all routers possess a
  • 10. synchronized copy of the area link-state database. From this database, each router constructs it own relative shortest path tree with itself as the root for all known routes.
  • 11. Comparison Link-State and Distance Vector If all routers were running a Distance Vector protocol, the path or 'route' chosen would be from A B directly over the ISDN serial link, even though that link is about 10 times slower than the indirect route from A C D B. A Link State protocolwould choose the A C D B path because it's using a faster medium (100 Mb Ethernet). In this example, it would be better to run a Link State routing protocol, but if all the links in the network are the same speed, then a Distance Vector protocol is better. Design New protocol From this routing protocol, I will choose link state because link state is design to operate in large and enterprise level network. Even though the routing protocol are very complex and are much more difficult to configure, maintain, and troubleshoot than distance vector routing protocols. However, link state routing protocol overcomes many of shortcomings of distance vector protocols. Link state protocols use a different algorithm than distance vector protocols for calculating the best path to a destination. This algorithm takes into account bandwidth as well as other factors when calculating the best path for a packet to traverse the network. Additionally, link state convergence occurs faster than distance vectorconvergence. This is because link state establishes a neighbour relationship with directly connected peers and shares
  • 12. routing information with its neighbours only when there are changes in the network topology. 6. Analyze the routing table on your computer. In Windows you can view it with a route print command. On a Mac, you can view it with a netstat -rn command. What entries are in your routing table and why are they there? Is your default route in the table and, if yes, what is it? A routing table contains the information necessary to forward packet along the best path forward its destination. Each packet contains information about its origin and destination. When a packet is received, a network device examines the packet and matches it to the routing table entry providing the best match for its destination. The table provides the device with instruction for sending the packet to the next hop on its route across the network
  • 13. Basic Routing Table Destination The IP address of the packet's final destination Next hop The IP address to which the packet is forwarded Interface The outgoing network interface the device should use when forwarding the packet to the next hop or final destination Metric Assigns a cost to each available route so that the most cost-effective path can be chosen Routes Includes directly-attached subnets, indirect subnets that are not attached to the device but can be accessed through one or more hops, and default routes to use for certain types of traffic or when information is lacking. Default Route Routes that is used when no other routes for the destination are found in the routing table. If a router or end system (such as a PC running Microsoft Windows or Linux), cannot find a route for a destination, the default route is used. The default route is used if no other host or network route matches the destination address. The default route generally points to another router, which treats the packet the same way. If a route matches, the packet is forwarded. Otherwise the packet is forwarded to the default route of that router. The route evaluation process in each router uses the longest prefix match method to obtain the most specific route. The network with the longest subnet mask that matches the destination IP address is the next-hop network gateway. The process repeats until a packet is delivered to the destination. Each router traversal counts as one hop in the distance calculation for the transmission path.