Purpose Of The Assignment 978754
Purpose Of The Assignmentthe Purpose Of This Assignment Is To Exercis
The purpose of this assignment is to exercise and develop skills required to analyse and design networks to address the need of clients. In this assessment, students will be able to:
- Understand the basic concepts and principles of technology relating to electronic data communications and computer networking
- Demonstrate a basic understanding of terminology of network communications technology, network operating systems and network applications
- Articulate the difference between different types of network configurations and indicate the situations in which various options are best/most appropriate
- Understand and explain different roles of networking and network operating systems for information systems
- Appreciate the need for different types of networks
Paper For Above instruction
Drawing from the foundational principles of computer networking, this paper discusses the critical aspects of network analysis and design in real-world scenarios. The purpose is to equip students with the knowledge essential for creating efficient, reliable, and adaptable networks tailored to specific organizational needs. The discussion will encompass network topologies, types of networks, configuration strategies, and address management, illustrated through three detailed scenarios.
Analysis of Network Topologies and Types
A fundamental consideration in network design is selecting the appropriate topology. Topologies determine how devices are interconnected and influence network performance, scalability, and manageability. The common topologies include star, bus, ring, mesh, and hybrid. Each has distinct advantages and limitations tailored to different organizational requirements.
The first scenario involves EBiz.com, which employs a star topology wired network connecting 250 computers and five servers across its office floors, with a bus backbone interlinking the floors. Given the operational goals—to enhance performance, ensure high availability, and facilitate flexible reconfiguration—a star topology is suitable because it centralizes control through a switch, isolates faults, and simplifies the addition or removal of devices. This setup aligns with the need for frequent reconfiguration, as new workgroups can be added or removed with minimal disturbance.
Network Type: Peer-to-Peer or Server-Based
Deciding whether the network is peer-to-peer or server-based hinges on the size of the network, security requirements, and administrative controls. A peer-to-peer network is generally suitable for small setups with decentralized management, where each computer has equal authority. Conversely, server-based networks centralize data and resource management, providing enhanced security and easier administration for larger setups.
In Scenario 1, considering the number of computers (250) and the need to control access to sensitive data and databases, a server-based network is appropriate. Servers will streamline data management, facilitate centralized security policies, and enable controlled access to customer files and databases. This structure enhances data integrity, security, and scalability—crucial for an expanding enterprise like EBiz.com.
Number of Computers and Network Devices
Indeed, the network connects 250 computers. This large number necessitates robust switching and routing infrastructure to handle traffic efficiently and ensure high availability.
Reconfigurable Networking Devices and Bandwidth Optimization
Switches are the easiest to reconfigure because they can be programmed or adjusted without physical modifications. They also offer the best access to network bandwidth between device pairs due to their ability to establish dedicated communication links, thereby reducing collisions and increasing throughput compared to hubs or unmanaged devices.
Network Diagram Representation
A schematic diagram for EBiz.com would display a central switch connecting all computers in a star configuration, with servers connected directly to the switch, and the backbone interconnecting the floors. This diagram can be hand-drawn or computer-generated to illustrate the central switch, server connections, and the physical layout, facilitating clear understanding of topology and device placement.
Subnetting for Network Optimization
Efficient subnetting is vital in partitioning networks to improve security, facilitate management, and maximize address space utilization. Given the original network address 192.168.10.0/24, the subnet mask must be adapted based on the number of subnets and hosts needed. For example, if eight subnets are required, the subnet mask would be 255.255.255.224 (/27), providing up to 30 hosts per subnet.
This configuration allows flexibility for future expansion and isolates network segments to enhance security.
Subnet Mask Calculation and Address Allocation
For Scenario 2, if the original network is 192.168.10.0/24 and the goal is to create multiple subnets, then subnetting can be done by borrowing bits from the host portion. For eight subnets, the subnet mask becomes 255.255.255.224 (/27). This enables creating 8 subnets with 30 hosts each:
- Subnet 1: 192.168.10.0/27 (hosts: 192.168.10.1 to 192.168.10.30)
- Subnet 2: 192.168.10.32/27 (hosts: 192.168.10.33 to 192.168.10.62)
- Subnet 3: 192.168.10.64/27
- Subnet 4: 192.168.10.96/27
- Other subnets follow similarly up to the eighth.
Addressing for a Growing ISP
In Scenario 3, the aim is to efficiently allocate IP addresses within the Class C network 197.14.88.0 to 16 corporate clients needing 10–14 addresses each. The network must be subnetted to maximize address utilization.
Using a subnet mask of 255.255.255.240 (/28), each subnet allows for 14 usable hosts, matching the client requirements. The first four subnets would be:
- 197.14.88.0/28 (Hosts: 197.14.88.1 to 197.14.88.14)
- 197.14.88.16/28
- 197.14.88.32/28
- 197.14.88.48/28
This approach ensures the effective use of IP space while meeting client needs.
Conclusion
Designing and analyzing computer networks require a comprehensive understanding of topology, device roles, subnetting, and address management. The scenarios examined demonstrate practical applications, emphasizing the importance of choosing appropriate configurations to optimize performance, security, and scalability. These principles form the foundation for creating resilient networks tailored to organizational demands and future growth.
References
- Cisco Systems. (2020). Cisco Networking Essentials. Cisco Press.
- Kurose, J., & Ross, K. (2017). Computer Networking: A Top-Down Approach. Pearson.
- Tanenbaum, A. S., & Wetherall, D. J. (2011). Computer Networks. Pearson.
- Forouzan, B. (2017). Data Communications and Networking. McGraw-Hill Education.
- Oppenheimer, P. (2011). Top-Down Network Design. Cisco Press.
- Stallings, W. (2016). Data and Computer Communications. Pearson.
- Peterson, L. L., & Davie, B. S. (2018). Computer Networks: A Systems Approach. Morgan Kaufmann.
- Bryant, R. E., & O’Hara, R. (2015). Practical Networking. Oxford University Press.
- Hagen, J., & Miller, S. (2019). Network Security Essentials. CRC Press.
- Levine, J., & Sielken, S. (2022). Network Fundamentals: CCNA Exam Preparation. Wiley.