LIST OF FIGURES
Figure 3.1: Organization Unit. 8 Figure 4.1: Hierarchical Network Design Concept. 10 Figure 4.2: Enterprise Network Design Concept. 11 Figure 4.1: Local Area Network (LAN). 12 Figure 4.2: Wide Area Network(WAN). 13 Figure 6.1: Bus topology. 16 Figure 6.2: Ring topology.. 17 Figure 6.3: Mesh topology. 18 Figure 6.4: Star topology. 18 Figure 6.5: Star topology in Kitty Store network. 20 Figure 8.1: Kuala Lumpur branch. 21 Figure 8.2: Penang branch. 23 Figure 8.3: Johor Bahru Branch. 24 Figure 8.4: Router A and Router C 26 Figure 8.5: Router B and Router C 27 Figure 8.6: Router A and Router B 27 Figure 8.7: Router A and Internet N1 28 Figure 8.8: Internet N1 and Internet N2 29 Figure 8.9: Internet N2 and Internet N3 29 Figure 8.10: Internet N1 and Internet N3 30 Figure 8.11: Internet N3 and Server:HTTP 31
Introduction
A group of Local Area Networks (LANs) interconnected using Wide Area Network (WANs) to form an enterprise network (Anon, n.d.). An enterprise networks control by a big organization (Anon, n.d.). This network consists of many internetworking devices such as switch, router and etc (Anon, n.d.).
Kitty Store is one of the big enterprises in Kuala Lumpur, Malaysia. Now, it would like to expand their enterprise into 2 branches in Malaysia which is on Johor Bahru and Penang. This Kitty Store is selling variety of Hello Kitty dolls and toys. All of the products design by their own enterprise’s designer. For Kuala Lumpur is the main branches, it more focuses on the promoting. Penang branch is focuses on the production and Johor Bahru branch is focuses on design products. Before that, all of the hosts in all the departments are connecting to one vast global network, it made the performance degradation due to the large volumes of data need to be transfer in single networks. Besides that, some unauthorized user access to the network.
Kitty Store requires a new enterprise network design to help their enterprise having secure and efficiency way to share their information for the departments and branches. It can separate the large network into smaller network that were interconnected. Besides that, group all the hosts with the common factor into the same network. Grouping can base on the host geographically (grouping host at the same location) and grouping hosts for special purpose (grouping host based on the department). So that, they can earn profit from the effective way they managing information and it would also avoid unauthorized user to steal their enterprise’s information.
Business Goals and Technical Goals
Goal is very important for a company. It is let people know whether their target is achievable. There are some business goals and technical goals set by the Kitty Store, this is what they want to achieve after the implementation of the network are done. Therefore, they can know by implementing the network can help them to earn profit, secure of share information and allow them to work more efficiency and effectively or not.
Business Goals
First is the cost reduction (Chirantan, n.d.). By dividing hosts into group, it improves network management and operation (Chirantan, n.d.). Therefore, it is reduces waste and increase productivity (Chirantan, n.d.). For example: Johor Bahru branch can send the new ideas of the Hello Kitty product to the File Transfer Protocol (FTP server), therefore, Kuala Lumpur branch can download all the files immediately. Besides that, it can prevent unauthorized users to access.
Second is making the internal departments process more efficiency (Chirantan, n.d.). In one organization wants to share the information between the department, a network enables the employees to share information efficiency and effectively (Chirantan, n.d.). For example: If the designer was finished illustrate of the dolls and he wants to pass it to another designer to make color. Even if the file size is too big, the network would not be interrupted because designer has its own department networks.
Third is expands the market over country (Chirantan, n.d.). An enterprise requires a network that can help their company easier manage and share information for departments or branches. Even if wants to share the information over the country, it can finishes less than one minutes. Network for a company can be said is very important, security also important for the network. If implements the network can help the company increases profit and provide a better work place then it would not be a problem for the company to expand their business in other county.
Technical Goals Security is one of the important technical goals when implement enterprise network design (Anon, n.d.). Without the security, information might be stolen by other unauthorized users. For a company, information is the company’s wealth. When transferring important information between the departments, unauthorized users are access to the network. The company information will be leak to other company. Therefore, a firewall can be implemented at the perimeter of the networks to only allow authorized user and trusted data to access the network.
Next, the technical goal is the network scalability (Eugene, n.d.). It means that the network should able to handle large amount works or can be easily expanded if the company expand their market in other branch or country (Eugene, n.d.). The company would not like to reinstall the network or any other works, they just want it can be directly added to the network.
Availability is another important technical goal for an enterprise network. It means that how long the network can respond if transferring information is failure (Eugene, n.d.). For a company, employees are very afraid of the network down when their working time. It is bringing a troublesome for them and wasting their working period it might cause them needs to have over time to finish their own job. A good network should provide few solutions to overcome the network down and it should recover as fast as possible.
Network performance also becomes one of the technical goals (Anon, n.d.). Different users have different requirement for the network performance. Network performance can include how many bandwidths can be used for users to transfer data, how long does the network response and how accuracy of the data is transferred to the right destination (Anon, n.d.). A company might want to upgrade current network performance to make it more efficiency. For example: Kitty Store wants to increase the bandwidth of the network, so that the designer can transfer larger size file as fast as possible.
Organization Unit
Kitty Store
Kitty Store
Penang
Penang
Kuala Lumpur
Kuala Lumpur
Johor Bahru
Johor Bahru
Human Resource
Human Resource
Human Resource
Human Resource
Human Resource
Human Resource
Marketing
Marketing
Finance
Finance
Finance
Finance
Finance
Finance
Marketing
Marketing
Marketing
Marketing
Product Development
Product Development
Product
Development
Product
Development
Production Development
Production Development
Production
(Local vendors)
Production
(Local vendors)
Production
(Overseas vendors)
Production
(Overseas vendors)
Design
Design
*
Figure 3.1: Organization Unit.
Design Concept
Hierarchical Network Design To reach the business goal and technical of the network, choose the appropriate devices and network design concept for the network is considered. The network design concept that I followed is hierarchical network design. Using this design concept, it can help the Kitty Store enterprise minimize the costs from the unnecessary features for a layer. Based on the hierarchical concept, I can know the appropriate device for each layer that needs to be used. Hierarchical network design concept is a design that group devices into multiple networks, from the highest to the lowest layer (Anon, n.d.). This design concept consists of three basic layers: core layer, distribution layer and access layer (Anon, n.d.).
Highest layer is the core layer which is the backbone of the network (Anon, n.d.). It provides a high speed connection transport between core routers and distribution sites (Anon, 2009). This layer usually connects to the internet, gateways and Internet Service Provider (ISP) (Anon, 2009). Routers are used in this layer. Each port on a router is connecting to a different network and it can break up the broadcast domain and collision domain (Bradley, n.d.). The router is using Serial DCE cable to connect to another router.
Middle layer is the distribution layer which is interconnects the few smaller local networks (Anon, 2009). It provides the most tasks in the connectivity (Anon, 2009). Switch is used to connect to the access layers to the core layer (Anon, 2009). In this layer, it also implements the network policy such as security, firewall and encryption (Anon, 2009). Switch is selected on this layer. On the appropriate destination port, switch receives a frame and regenerates each bit of frames (Bradley, n.d.). Although switch is expensive, but it is help to reduces collision. One larger switch is uses at a central location; it can save the cost by using fewer switches. The longer cable is needed to connect routers and device. Using straight-through cable connect the router and the end devices.
Lowest layer is the access layer which is provides nodes connect to the network (Anon, n.d.). End devices include computer, printer, phones, server and etc. Using the straight-through cable connect the switch.
Figure below is how I based on the hierarchical design concept to distribute the enterprise network.
Figure 4.1: Hierarchical Network Design Concept.
Enterprise Network Design
Based on the Hierarchical network design concept, it can be further more divided into three modular areas (Anon, n.d.). Different physical or logical connectivity is represented by the modular areas (Anon,n.d.). Modular areas can be divided into 3 areas.
First, is the enterprise building (Anon.n.d.). In a single building or branch location, the network elements required for independent operation (Anon.n.d.). This is where the building access, building distribution and enterprise core located. Second is the enterprise edge (Anon.n.d.). In this area, it will filter the external resource when traffic comes into the enterprise network (Anon.n.d.). Secure information is provided between enterprise building and Internet in this layer (Anon.n.d.). Third is the server farm (Anon.n.d.). Server Farm is use to protect the server resource and provide reliable high-speed connectivity (Anon.n.d.). Figure below is how I refer to the enterprise network design to construct Kitty Store enterprise network. By following the design concept, can help me to know more about the appropriate device that needs to use in the network.
Figure 4.2: Enterprise Network Design Concept.
Local Area Network (LAN) and Wide Area Network (WAN)
An enterprise network requires a group of LAN, WAN and internetworking devices to build up. Without this few of elements, network would not be form and might be unsecure.
Local Area Network (LAN) as a local network which connects workstations and hundreds of hosts (Anon, n.d.). It is built within the company building as like all the departments’ hosts connect to internetworking device to utilize sharing of information (Anon, n.d.). All the departments can share and access information within the department or other departments. Besides that, by using LAN, email is allowed to send to each other within a company (Anon, n.d.). For example: if secretary wants to inform all the departments the time of meeting, she just needs to send email to inform them, no need walk to all the departments to inform her colleagues. It helps them to save their time, energy and can utilize their time in doing other jobs.
Figure 4.1: Local Area Network (LAN).
Wide Area Networks (WAN) is similar to LAN, but WAN are not only share information in one location. It can span long distances in different locations by uses connection of Telecommunication Service Provider (TSP) with smaller LAN (Anon, n.d.). TSPs increase the coverage area that company can shares information in separate networks (Anon, n.d.). For example: the information from the main branch in Kuala Lumpur can share to other branches such as Johor Bahru and Penang. WAN is not manage by an administration, it is manages by simultaneous administrations in different locations (Bitpsychobyte, 2012).
LAN and WAN very useful for an enterprise network. It is very useful for transfer information between the company’s departments or other branches. WAN has few characteristics. First, the communication facility, as what we discussed just now, by using WAN it can made the physical distance no longer a problem of communication (Anon, n.d.). It help people that are separated on different area can get instance communication through the network no matter how far they are separate (Anon, n.d.). Second will be the remote data entry. It is just like the function of internet, it allow user to access any information anywhere, any time whenever the service is on (Anon, n.d.). The last will be the centralized information. It allows the organization store their confidential information in centralized data storage (Anon, n.d.). It makes the organization feel easier to manage those data and can further secure the database (Anon, n.d.). Example of WAN: Ethernet is developed by Xerox Corporation (Anon, n.d.).
.
Figure 4.2: Wide Area Network(WAN).
Server Farm Server farm is a group of server that is located in one location to provide network management services for the enterprise (Anon, n.d.). Server farm includes of few type of services such as email, Domain Name System (DNS), File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), Dynamic Host Configuration Protocol (DHCP) and etc (Anon, n.d.). I will explain some of the service that use in the Kitty Store enterprise.
An enterprise requires DHCP server for those hosts that does not have a preconfigured IP address (Bradley, n.d.). DHCP is a protocol that gives the device a unique address when it connected to the network and IP address will be released after the devices leaved the network (Bradley, n.d.). DHCP server assigns the IP address, subnet masks, gateways and other IP networking parameters for the host from a range of available address (Bradley, n.d.). The IP address for the host is not permanently, it is just a leased for temporary period (Bradley, n.d.).
People could not memorize all the numeric Internet Protocol (IP) address for every websites; they just remember the domain name of the websites. For example: In the Kitty Store enterprise, employees just need to enter www.KittyStore.com is much easier than enter actual IP address 172.16.02. Therefore, DNS was used in the enterprise network to provide the function of automotive converts Internet domain and host names to IP addresses (Bradley, n.d.). By the DNS automotive converted IP address, people can just simply enter website name or sending email (Bradley, n.d.). Even the websites have change their name, the IP address will still remain the same.
To secure sending the email within the departments or branches that would not be access by unauthorized user, an enterprise required their own email services in the server (Margaret, 2006). For example: employee A can just attach the document on email and forward it to the employee B, they no need to worry data lost. Email uses two application layer protocols which is Post Office Protocol 3(POP3) and Simple Mail Transfer Protocol (SMTP) (Margaret, 2006). SMTP is uses for sending e-mail and POP is for receiving e-mail (Margaret, 2006).
For an enterprise, they also need a server provide a services that can help the employees to upload and download files, the services is known as File Transfer Protocol (FTP) (Margaret, 2007). For example: Penang branch upload the vendors’ information to the server. So that, when main branch wants to view the information they can directly download the information from the server (Margaret, 2007). It is much easier and avoids unauthorized user access when transferring data.
Hypertext Transfer Protocol (HTTP) is an application protocol which is used for data transfer on the World Wide Web (Anon, n.d). HTTP is operating when user enter a URL in browser (Anon, n.d). It will defines the format of the message that sent by users and the message types from the server uses to respond (Anon, n.d).
Topology In network, topology means the ways the network devices are arranged and the interconnection between them (Oak, 2011). Topology can be viewed in two layouts: physical topology and logical topology. Physical topology is how the physical media is connecting with the nodes to communication and the arrangement of the nodes (Oak, 2011). Logical topology is how the frames are transmitting over the physical media to reach the destination (Oak, 2011). There are four major types of network topology: Bus Topology, Ring Topology, Mesh Topology, Star Topology and etc (Oak, 2011). Based on the topology, I can clearly to understand which topology I used to design the Kitty Store enterprise network.
Types of Topology
Bus Topology In bus topology, all the nodes are connected to a single cable (known as backbone) to share the media (Oak, 2011). One node can send the data at any time when the backbone is free (Anon, 2012). When one node sends the data, all the other nodes will receive the information (Oak, 2011). Only one node that has addressed will accept the information, other nodes will ignore the data (Oak, 2011). Bus topology most suitable for company because of the cable length is limited (Oak, 2011).
Figure 6.1: Bus topology.
Ring Topology Ring topology is design as each node is connected to the next node and the last node is connected back to the first node, it is a complete circle (Anon, 2012). The data flow in clockwise direction as like how we draw a circle (Anon, 2012). Every node will be passed through if there have data to be transmitted and it will stop on the node that has addressed (Oak, 2011). For the node want to send data, they must receive the token only they allow sending data (Anon, 2012). After the receiving node reply a message to inform the source node that it has received the data, another token will be created for another station to transmit data (Anon, 2012).Ring topology not suitable for the enterprise network due to the reason of effect other nodes if one node was failure transmitted (Anon, 2012).
Figure 6.2: Ring topology..
Mesh Topology Mesh topology request huge costs to implements it due to all the nodes is connected to each other (Oak, 2011). And it is usually used by bank (Anon, 2012). In the mesh topology, all the nodes have the routing logic to take the shortest path for transferring the data (Oak, 2011).
Figure 6.3: Mesh topology.
Star Topology In star topology, all the nodes are connected to a central node (such as hub, switch or concentrator) (Anon, 2012). When the node wants to transmit the data to another node, the data will pass across the central node and central node will resend the data either to all the nodes or only the destination node (Anon, 2012). Star network can be expanding by using two or more individual star network to form a distributed star (Anon, 2012).
Figure 6.4: Star topology.
3. Switch
3. Switch
20. Switch
20. Switch
20. Switch
20. Switch
Physical Topology * Legend * Serial fastEthenet Legend * Serial fastEthenet . . . .
1. Switch
1. Switch
2. Switch
2. Switch
3. Switch
3. Switch
2. Switch
2. Switch
1. Switch
1. Switch
Internet
Internet
2960-24TT 2960-24TT
Router
Router
2811
Router
Router
2811 2811
20. Switch
20. Switch
3. Switch
3. Switch
2. Switch
2. Switch
1. Switch
1. Switch
Router
Router
1. Switch 1.
1. Switch 2.
1. Switch 3.
1. Switch 4. 2960-24TT 2960-24TT 2960-24TT 2960-24TT
1. Switch
1. Switch
2. Switch
2. Switch
20. Switch
20. Switch
2. Switch
2. Switch
2. Switch
2. Switch
3. Switch
3. Switch
3. Switch
3. Switch
3. Switch
3. Switch . . . . . . . . .
20. Switch
20. Switch . . . .
20. Switch
20. Switch
Logical Topology
Star topology is chosen for the Kitty Store enterprise network. It is because all the nodes are connected to the central device which provides the point-to-point connection (Anon, 2012). It also means that, when two employees want to share the information within the departments, computer is directly connected to the node by help of the switch. Besides that, it controls traffic on the network to reduce collision (Anon, 2012). Another reason I chose this topology is because it is easier to add new nodes if the enterprise want to expand their network (Anon, 2012). It was achieved the technical goals of the scalability. Besides that, the failure transferring of data would not affect other nodes (Anon, 2012). All the information will be centralized; it is helpful for the employees to manage their information (Anon, 2012).
Figure 6.5: Star topology in Kitty Store network. Calculating the Subnets
To improve network management, I based on two ways to grouping hosts. First is grouping hosts geographically which means based on the same location. Next is based on grouping hosts for specific purpose. To calculate the subnets, I was following some of the step:
First, the number and grouping hosts are: I. At Kuala Lumpur’s branch:
Human Resource Department: 50
Finance Department: 50
Marketing Department: 280
Product Development Department: 50
Production Department: 50 Switches (management): 19
Router (LAN Gateway):1
Server: 500
Total network require: 1000/2=500 Based on the purpose of grouping, I group human resource, finance, marketing, product development and production department into one group. Servers were in another group. Therefore, 1000 hosts were divided into 500 hosts per each group.
Figure 8.1: Kuala Lumpur branch.
Each group needs 500 addresses. To calculate how many bits is borrow by using the formula “usable hosts= 2n-2”.
2n-2 ≥ 500
2n≥ 500+2
2n≥ 502
29≥ 502
512 ≥ 502
n=9, borrow 9 bits and 512 bits – 2 bits (network address and broadcast address) = 510 usable address.
IP address=32bits
32bits-9bits=23bits
Subnet address= 172.16.0.0/23
Subnet mask calculation:
Address: 172.16.0.0
In binary: 10101100.00010000.00000000.00000000
Mask: 255.255.254.0
In binary: 11111111.11111111.11111110.00000000
Network Address | 172.16.0.0/23 | Subnet Mask | 255.255.254.0 | First Network | 172.16.0.1 | Last Network | 172.16.1.254 | Broadcast Address | 172.16.1.255 | Network Address | 172.16.2.0/23 | Subnet Mask | 255.255.254.0 | First Network | 172.16.2.1 | Last Network | 172.16.3.254 | Broadcast Address | 172.16.3.255 |
II. At Penang branch:
Human Resource Department: 50
Finance Department: 50
Marketing Department: 50
Product Development Department: 330
Designer Department: 500 Switches (management): 17
Server: 2
Router (LAN Gateway):1
Total network require: 1000/2=500 For this branch, I also group human resource, finance, marketing and product development into one group. Production departments were in another group due to there have a lot of local vendor’s information need to manage. Therefore, each group is 500 hosts.
Figure 8.2: Penang branch. Network Address | 172.16.4.0/23 | Subnet Mask | 255.255.254.0 | First Network | 172.16.4.1 | Last Network | 172.16.5.254 | Broadcast Address | 172.16.5.255 | Network Address | 172.16.6.0/23 | Subnet Mask | 255.255.254.0 | First Network | 172.16.6.1 | Last Network | 172.16.7.254 | Broadcast Address | 172.16.7.255 | III. At Johor Bahru branch:
Human Resource Department: 50
Finance Department: 50
Marketing Department: 180
Product Development Department: 200
Design Department: 500 Switches (management): 17
Server: 2
Router (LAN Gateway):1
Total network require: 1000/2=500 For the Johor Bahru branch, human resource, finance, marketing and product development departments was group together based on this few departments use less network to manage the information. Design department were in another group due to there have a lot of design’s information need to transfer between the departments and the branch. Therefore, 500 hosts per groups are divided.
Figure 8.3: Johor Bahru Branch. Network Address | 172.16.8.0/23 | Subnet Mask | 255.255.254.0 | First Network | 172.16.8.1 | Last Network | 172.16.9.254 | Broadcast Address | 172.16.9.255 | Network Address | 172.16.10.0/23 | Subnet Mask | 255.255.254.0 | First Network | 172.16.10.1 | Last Network | 172.16.11.254 | Broadcast Address | 172.16.11.255 | IV. Router LAN and Router Wan
Each router needs 2 addresses. Therefore, I need to use this formula “usable hosts= 2n-2” to calculate the range of the hosts available for the routers.
2n-2 ≥ 2
2n≥ 2+2
2n≥ 4
22≥ 4
4 ≥ 4
n=2, borrow 2 bits and 4 bits – 2 bits (network address and broadcast address) = 2 usable address.
IP address=32bits
32bits-2bits=30bits
Subnet address= 172.16.12.0/30
Subnet mask calculation:
Address: 172.16.12.0
In binary: 10101100.00010000.00000000.00000000
Mask: 255.255.254.0
In binary: 11111111.11111111.11111100.00000000
Figure 8.4: Router A and Router C
Only have two usable host addresses at this network. Network Address | 172.16.12.0/30 | Subnet Mask | 255.255.255.252 | First Network | 172.16.12.1 | Last Network | 172.16.12.2 | Broadcast Address | 172.16.12.3 |
Hostname: A (Serial 0/0/0)
Hostname: C (Serial 0/0/1)
Figure 8.5: Router B and Router C Network Address | 172.16.12.4/23 | Subnet Mask | 255.255.255.252 | First Network | 172.16.12.5 | Last Network | 172.16.12.6 | Broadcast Address | 172.16.12.7 |
Hostname: C (Serial 0/0/0)
Hostname: B (Serial 0/0/1)
Figure 8.6: Router A and Router B Network Address | 172.16.12.8/23 | Subnet Mask | 255.255.255.252 | First Network | 172.16.12.9 | Last Network | 172.16.12.10 | Broadcast Address | 172.16.12.11 |
Hostname: B (Serial 0/0/0)
Hostname: A (Serial 0/0/1)
Figure 8.7: Router A and Internet N1 Network Address | 172.16.12.12/23 | Subnet Mask | 255.255.255.252 | First Network | 172.16.12.13 | Last Network | 172.16.12.14 | Broadcast Address | 172.16.12.15 |
Hostname: A (Serial 0/1/0)
Internet: N1 (Serial 0/0/0)
Internet
Figure 8.8: Internet N1 and Internet N2 Network Address | 172.16.12.16/23 | Subnet Mask | 255.255.255.252 | First Network | 172.16.12.17 | Last Network | 172.16.12.18 | Broadcast Address | 172.16.12.19 |
Internet: N1 (Serial 0/0/1)
Internet: N2 (Serial 0/0/0)
Figure 8.9: Internet N2 and Internet N3 Network Address | 172.16.12.20/23 | Subnet Mask | 255.255.255.252 | First Network | 172.16.12.21 | Last Network | 172.16.12.22 | Broadcast Address | 172.16.12.23 |
Internet: N2 (Serial 0/0/1)
Internet: N3 (Serial 0/0/0)
Figure 8.10: Internet N1 and Internet N3
Network Address | 172.16.12.24/23 | Subnet Mask | 255.255.255.252 | First Network | 172.16.12.25 | Last Network | 172.16.12.26 | Broadcast Address | 172.16.12.27 |
Internet: N3 (Serial 0/0/1)
Internet: N1 (Serial 0/1/0)
Figure 8.11: Internet N3 and Server:HTTP
Network Address | 172.16.12.28/23 | Subnet Mask | 255.255.255.252 | First Network | 172.16.12.29 | Last Network | 172.16.12.30 | Broadcast Address | 172.16.12.31 |
Internet: N3 (Fa0/0) Server: HTTP
Conclusion
Before design a network, I need to do some researches about the enterprise network design and types of topologies. Different types of topology are used for different type of network that a company wants. If choose the wrong topology to implement a network, it was waste costs and time to plan all the things. The enterprise network business and technical goals would not be achieved.
Besides that, understand how to assign the address for different number of hosts is needed. Calculating the subnet masks is very important in design a network. If assign wrongly number of hosts, the network will be having a problem. It might affect the hosts cannot get an address to access the network.
From this assignment, I have learnt a lot of things. Not only learnt how to design and calculate the subnet masks, also learnt how to configure router by using packet tracer.
Reference
Anon, 9 May 2009. Hierarchical Network Design.[Online].Available <http://www.ccnaguru.com/hierarchical-network-design.html > [Accessed 1 April 2013]
Anon, 25 July 2012. Different Kinds of Network Topology In Computer Networks. [Online].Available at: <http://ecestudyaid.blogspot.com/2012/07/different-kids-of-network-topology-in.html > [Accessed 29 March 2013]
Anon, n.d. Chapter1 Introducing Network Design Concepts.[Online].Available <http://catalogue.pearsoned.co.uk/samplechapter/1587132125.pdf > [Accessed 1 April 2013]
Anon, n.d. Chapter 2 Analyzing Technical Goals and Constraints.[Online].Available at: <http://www.groupstudy.com/bookstore/samples/Oppenheimer/index.html> [Accessed 17 March 2013]
Anon, n.d. Chapter3: Structuring and Modularizing the Network. [Online].Available at: <http://cdn.ttgtmedia.com/searchNetworking/downloads/CCDA_CH03.pdf> [Accessed 29 March 2013]
Anon, n.d. Chapter4 Enterprise Network Design. [Online].Available at: <http://faculty.kfupm.edu.sa/COE/sqalli/PDF/COE-444-042-LectureNotes-Chap4.pdf> [Accessed 16 March 2013]
Anon, n.d. Communication over the network. [Online].Available at: <http://www.highteck.net/EN/Communicating/Communicating_over_the_Network.html> [Accessed 29 March 2013]
Anon, n.d. HTTP. [Online].Available at: < http://www.webopedia.com/TERM/H/HTTP.html> [Accessed 29 March 2013]
Anon, n.d. local-area network (LAN). [Online].Available at: <http://www.webopedia.com/TERM/L/local_area_network_LAN.html> [Accessed 29 March 2013]
Anon, n.d. Wide Area Network. [Online].Available at: <http://www.itsavvy.in/wide-area-network > [Accessed 29 March 2013]
Bitpsychobyte, 6 October 2012. LAN and WAN- Definition, properties and differences. [Online].Available at: <http://compinfopro.com/lan-and-wan-definition-properties-differences/> [Accessed 29 March 2013]
Bradley,M., n.d. DNS-Domain Name System [Online].Available at: < http://compnetworking.about.com/cs/domainnamesystem/g/bldef_dns.htm> [Accessed 29 March 2013]
Bradley,M., n.d. DHCP-Dynamic Host Configuration Protocol. [Online].Available at: < http://compnetworking.about.com/cs/protocolsdhcp/g/bldef_dhcp.htm > [Accessed 29 March 2013] Bradley,M., n.d. LAN-Local Area Network. [Online].Available at: <http://compnetworking.about.com/cs/lanvlanwan/g/bldef_lan.htm> [Accessed 29 March 2013] Bradley,M., n.d. router. .[Online].Available http://compnetworking.about.com/cs/routers/g/bldef_router.htm > [Accessed 1 April 2013]
Bradley,M., n.d. switch. .[Online].Available http://compnetworking.about.com/od/hardwarenetworkgear/g/bldef_switch.htm> [Accessed 1 April 2013] Chirantan, B., n.d.Goals for an ERP Project for a Manufacturing Company. [Online].Available at: <http://smallbusiness.chron.com/goals-erp-project-manufacturing-company-37347.html> [Accessed 16 March 2013]
Eugene, C., n.d. Scalability & High Availability. [Online].Available at: <http://refcardz.dzone.com/refcardz/scalability> [Accessed 17 March 2013]
Margaret,R., April 2006. Mail server (mail transfer/transport agent,MTA, mail router, Internet mailer) .[Online].Available at: <http://searchsoa.techtarget.com/definition/mail-server> [Accessed 29 March 2013]
Margaret,R., April 2007. File Transfer Protocol (FTP).[Online].Available at: < http://searchenterprisewan.techtarget.com/definition/File-Transfer-Protocol> [Accessed 29 March 2013]
Oak, M., 21 September 2011. Types of Network Topologies. [Online].Available at: <http://www.buzzle.com/articles/types-of-network-topologies.html> [Accessed 29 March 2013]
Priscilla, O., 6 August 2004. .Analyzing Business Goals and Constraints of Network Design.[Online].Available at: <http://www.ciscopress.com/articles/article.asp?p=328773&seqNum=2> [Accessed 17 March 2013]
You May Also Find These Documents Helpful
-
The first network topology is hierarchical star, also known as the tree topology. This topology has different levels. The top level is the ‘root’ node; it serves as the central connection to the next level of computers. Then the second levels of computers serves as a connection to the third level of computers so on and so forth for the rest of the computers.…
- 545 Words
- 3 Pages
Satisfactory Essays -
7.1.1 A WAN is a wide area network that is often used by large businesses or corporations. It is impractical for an organization to own an entirety of a WAN because a WAN is decentralized…
- 725 Words
- 3 Pages
Good Essays -
I learned from this video that LAN (Local Area Network) is a computer network covering a small geographic area, like a home, office, school, or group of buildings. And also that WAN (Wide Area Network) is a computer network that covers a broad area (e.g., any network whose communications links cross metropolitan, regional, or national boundaries over a long distance). In addition, I learned what the difference between a work group and a domain. Domain names are used in various networking contexts and application-specific naming and addressing purposes. I also learned that in a work group all network computers are equal.…
- 511 Words
- 2 Pages
Powerful Essays -
Wide area networks (WAN) are complex networks that span large geographical areas. The most commonly known WAN is the Internet. WANs tend to be slower in speed, highly complex, and intolerant of system problems. Because of the multitude of connections on a WAN, even a simple down can create problems across the network.…
- 855 Words
- 4 Pages
Powerful Essays -
Kudler Fine Foods was first founded by Kathy Kudler in La Jolla, California. It has expanded to two more locations, Del Mar, California, and Encinitas, California. The stores are generally spaced, about 8,000 sq ft, and have imported and domestic foods, including Fresh Bakery & Pastries, Fresh Produce, Fresh Meat & Seafood, Condiments & Packaged foods as well as Cheese and other dairy products. Kudler wants to see their company grow by upgrading their communications systems and making it wireless. The wireless technology upgrade will allow the company to have a better way of communicating between the stores as well as to the employees and customers .…
- 495 Words
- 2 Pages
Satisfactory Essays -
Enterprise network: A network owned and operated by a company, with that company being somewhat larger than typical, generally (but not exactly) with more than 1000 employees.…
- 539 Words
- 3 Pages
Satisfactory Essays -
Local area networks (LANs) consist of microcomputers located in a same general area. LANs usually share circuits where computers take turns using the same circuit. In a metropolitan area networks (MANs), a network usually covers a citywide area. Wide area networks (WANs) span a large geographical area. WANs span a larger area than MANs. Backbone networks (BNs) interconnect all networks on a single site. BNs is a large network which many networks within an organization are connected.…
- 943 Words
- 4 Pages
Good Essays -
LAN – WAN is where the IT infrastructure links to a wide area network and internet.…
- 360 Words
- 2 Pages
Satisfactory Essays -
A Land Are Network (LAN) is a network that connects a group of computers that are within distance of each other to the same network. LAN’s are very useful when it comes to printer sharing and sending and receiving files between all the systems within the facility that share that one network. A LAN is connected by using Ethernet cables, adapters, and hubs. Its counterpart is the WAN or Wide Area Network a WAN is connected by two or more LAN’s and are used for public networking the largest is the internet. This is primarily used for larger networks because it can cover more area giving access to more users. A WLAN connection is the WAP or Wireless Access Point that is transmitted by radio waves over hundreds of feet connected by the internet hub. WLAN is composed of…
- 939 Words
- 3 Pages
Better Essays -
A LAN or local area network is a group of computers all located in the same area that are usually connected via some means. (Wireless or wired).…
- 618 Words
- 3 Pages
Good Essays -
Mansfield, k. and atonakos, j., 2009.computer networking from lans to wans hardware, software, and security. (online). USA: Cengage Learning…
- 442 Words
- 2 Pages
Good Essays -
Networks are multiple computers linked together. It allows to share resources like softwares and printers.…
- 536 Words
- 3 Pages
Satisfactory Essays -
Wireless technology has grown to include additional communication media such as satellite communication connections and infrared laser communication. Within the wireless technology is the Local Area Networks. When a wireless hub or router is employed, the LAN can become a WLAN. The definition of a LAN is a computer network that interconnects computers within a limited area. LAN’s are prevalent in an office setting, schools, and within a home. A LAN is in contrast with a WAN or Wide Area Network, due to its limited area of coverage. A WAN is a computer network that covers a much larger area, such as a metropolitan area. KFF’s new WAN will employ leased lines to connect the network of computers. Businesses often use WANs to relay data between employees, customers and suppliers regardless of geographical location. Many businesses use the Internet as the backbone for their…
- 2950 Words
- 12 Pages
Better Essays -
If you are using the Blackboard Mobile Learn IOS App, please click "View in Browser."…
- 317 Words
- 2 Pages
Satisfactory Essays -
In this paper I will be going over a network design proposal for a building on the UMUC campus in Adelphi, Maryland. I would plan to run a fiber optic network to ensure the fastest speeds possible and fiber optics are notorious for not having any signal loss compared to a Cat5e. Using a star topology throughout the building with the servers in each classroom connected to the server room on the respective floor. Equipment used to build the network will consist of servers, routers, hubs and computers. There will be a physical firewall installed on each server and an IDS (Snort) for the network as well as AVG firewall and virus scanner.…
- 534 Words
- 2 Pages
Satisfactory Essays