Assignment 2: Network Topology Design You are the network manager of a company that has grown from 10 employees to 100 employees in 12 months. Year 2 projected growth is estimated to be 100 additional employees located at a remote location. The aggressive growth has brought about some unique challenges and opportunities. The company has one remote warehouse and no off-site disaster recovery services or servers. The network design remains a non-redundant, flat topology. Your assignment must consider the three-layer hierarchical model. You are free to make supported assumptions of the applications and services that this organization uses.

There's a specialist from your university waiting to help you with that essay.
Tell us what you need to have done now!


order now

Write a two to three (2-3) page paper that is supported by a Visio or similar graphic model in which you: 1. Depict a network topology graphical model of the initial environment of 10 employees. 2. Depict a network topology graphical model of the current 100 employees. 3. Depict a network topology graphical model for future growth to 200 employees. 4. Create a two-paragraph executive summary. The format of the paper is to be as follows: •Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format. •Type the question followed by your answer to the question. In addition to the two to three (2-3) pages required, a title page is to be included. The title page is to contain the title of the assignment, your name, the instructor’s name, the course title, and the date. Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills. The assignment will be graded using the following rubric: Outcomes Assessed

•Design a network topology to include hierarchy, redundancy, modularity, and security. •Use technology and information resources to research issues in network architecture and analysis. Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics. An advantage of using private network addresses is that it makes it easier for organisations to change their Internet service provider without having to renumber their IP addresses. Using private network IP addresses also gives a company a measure of security A subnet is a segment of a network. Subnetting is a technique that allows a network administrator to divide one physical network into smaller logical networks and, thus, control the flow of traffic for security or efficiency reasons. Not being a technical person, I am heavily relying on our text and other related literature. The fundamental to network addressing and numbering in an environment, despite the size or location, is following a structured model. A network designer should carefully develop, plan, manage, and document the network layer addresses. Since no accurate mechanisms exist for assigning network or subnet numbers dynamically, the network layer address numbers need to be well-planned, administered, and documented. There are benefits to observing this approach.

The network will be easily managed, maintained, troubleshooting narrowed and isolated to the location, and the network will be scalable (Oppenheimer, p. 169, 2011). Many organizations and companies ignore the importance of planning and administering a structured model approach to network layer addressing. Many problems result from such disorganization: there are duplicate network addresses; illegal addresses that routers cannot route to the Internet, running out of addresses for existing or future use; or have larger than required addresses that end up being wasted because they are unassigned or used (Oppenheimer, pp. 68-169). The first step is to design a structured model before assigning any addresses. This “means that addresses are meaningful, hierarchical, and planned. IP addresses that include a prefix and host part are structured. Assigning an IP network number to an enterprise network… subnetting the network number and subnetting the subnets, is a structured (hierarchical) model” (Oppenheimer, p. 168, 2011). The following is a list of additional steps that I would use in addressing and numbering a network layer: Leave room for growth, renumbering or experimental purposes •Assign blocks of addresses in a hierarchical manner to facilitate good scalability and availability •Assign blocks of addresses based on the physical network, not on group membership, to avoid problems when group or individual growth or move occurs •Delegate authority for addressing regional and branch-office networks, subnets, servers, and end systems (if network management expertise is high in this area) •Use dynamic addressing for end systems to maximize flexibility and minimize configurations •Use private addresses with network address translation (NAT) in IP environment to maximize security and adaptability.

Using a hierarchical network design topology, there will a Core Layer, Distribution Layer, and an Access Layer. The Core Layer will consist of the high-speed backbone, in our case, these will consist of the 20 backend enterprise servers, our headquarters. Since the core layer is the primary basis for interconnectivity, I will ensure there are redundancy components (Oppenheimer, p. 127, 2011). The Distribution Layer will be the point of demarcation between the Core Layer and the Access Layer. It will control access to resources for security purposes and control network traffic. Assuming that each department is also uniquely geographical and that 100 employees reside in each department.

This layer will be the regional offices with one department represented. The distribution layer will connect network services to the access layer and implement policies pertaining to security, routing, and traffic loading (Oppenheimer, pp. 126-127, 2011). The Access Layer will consist of low-end routers or switches for employees and other end users, where applicable. This layer provides access to the internetwork. In addition to routers and switches, there will be bridges, wireless access points, and shared-media hubs. Wide-area network technologies such as ISDN, Frame Relay, and leased digital lines will be available (Oppenheimer, p. 128, 2011).

Leave a Reply

Your email address will not be published. Required fields are marked *