Justification Of Network Design

Decent Essays
Introduction
A computer network or data network is a telecommunications network that allows computers to exchange data. The connections between networked computing devices are established using either cable media or wireless media. The best-known computer network is the Internet.
Every computer in the network can send information to the others. Two devices are said to be networked when a process in one device is able to exchange information with a process in another device. As companies rely on applications like electronic mail and database management for core business operations, computer networking becomes increasingly more important.
Networks nowadays are critical in all organisations of all sizes. On such networks there exist multiple devices,
…show more content…
It is fully connected with internet and all wires are properly joined and all services such as print, file and proxy etc. are available on network. In this organization each user has their own desktop computer and some of them have laptops. In this type of network we need all servers and services. About the information of network, it is set up in four floors. this network is having Servers, Switches, Router, Access points and peripheral machines (Printer, Scanner) The network is sub netted with conserving IP Address. In NTEC building there are 50 desktop laptops and including Servers, peripheral machine in four level.

Justification of Network design
Here is a one router device which is connects all the internal network or external network because it make network efficient. In these network there are access points for wireless network environment, switches are there to connect networks to the different devices NTEC building also have peripheral machines which is connect to the ports. Laptops and desktops are another users which connect to the network. Servers are working properly providing services and range to the users,

IP address range and sub netting of IP address

Related Documents

  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 9 Case Study

    • 1143 Words
    • 5 Pages

    I would install the Star topology which is the most common type of network topology that is used in offices. Star topology is the best since each node is connected by more than one link basically two connection to reach a node. The speed of most star configurations is hundred megabits of data per second with gigabit hub or switches and NIC cards speeds can be at one thousand megabits per second. In a star topology is possible to have all the important data back ups on the hub in a private folder so if the computers fails, the employees can still use the data using the next computer in the network and accessing the backup files on the hub. If the hub adds a device like a printer all the other computers on the network can access the new device by simple accessing the hub.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Interrupts are most important as they give user the better control over the computer. Without interrupts, a user have to wait for a given task to complete in a specific time management with the higher priotity. This ensures that the CPU will charge the process immediately. 2. What is a trap?…

    • 681 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    CS320 Assignment 1 Andrew McConnon 13349871 You want to connect different computers, at different locations, so that they can exchange data with each other. What are the different challenges that you need to overcome? Host Identification on small networks isn’t a problem as it can be set up with manual ways of addressing, but will be exponentially harder the larger a network becomes. Protocols, DHCP servers and addressing are a huge need if you want to create and sustain a large, expanding network.…

    • 399 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 7 Exercise 1

    • 556 Words
    • 3 Pages

    1. Ethernet Ethernet is a combination of computer networking technologies most commonly used in local, metropolitan, and wide area networks. 2. Server A computer or computer program that manages access and distributes information through a centralized service in a network.…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    We must be to create a custom network as appropriate with our thesis such as star topology or random topology or simple topology [35], by using the python script to make the network and must be to create topology like in chapter four to compare the result and throughput with other paper. 2.9.3 Design algorithm We need to get the best result and best throughput…

    • 464 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    In OSI stack, presentation layer converts data transferred by the application layer of the transport node. The functions of presentation layer are : 1. Data transcription 2. Data reconstruction 3.…

    • 139 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Although IP address can be static or dynamic. A static IP address stays the same and it is a permanent Internet address. On the other hand, a dynamic IP address is a temporary address that is assigned each time a computer or device accesses the Internet, and DNS is used to it make easy to read or remember hostnames like www.it200class.com ¥ 1.2 Server and Client is a network architecture in which each computer or process on the network is either a client or a server.…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    This also helps to detect strange traffic running across the servers 3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access. 4. Secure the Network: Access level assignments…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nawaf Alnafea INTEGRATIVE CASE 10.0 1. Discuss the organizational structure at Cisco Systems. Explain and discuss each one of the current structural dimensions. Explain and discuss each one of the current contingency factors. What type of structure is this?…

    • 1197 Words
    • 5 Pages
    Improved Essays