Lan Design and Configuration for an Organization Coursework

Exclusively available on Available only on IvyPanda® Made by Human No AI

Proposed topology and justifications

The tree topology being proposed is essentially blend of various designs in Star topology connected together using the bus topology. Switches and similar networking devices used in LANs are then directly connected to the Tree bus where each of them acts as the root of the tree (Deal 2008). One key merit this topology is because of its dynamic manner in which it has room of extending the school’s network for future more than what other networking topologies offer on the same as shown in the figure below (Tamara 2005).

Proposed topology and justifications

LAB 212 will require its own switch due to the separation by the staircase that may cause cabling difficulties. The section containing staff room 210, staff room 207 and classroom 208 will also need their independent router. The print room, staff room 206 and 205 will have its own switch, while the section having LAB 213, classroom 211 and staff room 209 will have its own switch. The server room will host the main router from the backbone of the whole school network. Wireless routers will also be installed in the LAB 212 and LAB 213 (Tamara 2005). Switch to switch connections will be via the router installed in the server room. An overview of the segmentation of the network is shown in the figure below. The file and web servers will be connected to the main network of the institution through the backbone cable via the router in the server room.

Proposed topology and justifications

The school network will be designed to have a hierarchal format containing two layers; these are distribution layer and the access layer. As a core requirement, the network still has more room for the extension and inclusion of the core; the third layer when need arises in the future. The routers at the edge will be part of the distribution layer as well as servers for security servers but any other server will be grouped under the access layer of the network (Deal 2008). Therefore, this implies that in case a single location has to be upgraded, for example, when one or two additional department needs to be added, then this will be very easily to achieve without interfering any network operation of the remaining four locations or departments within them. This means that there will be two routers and firewalls will be found at each of the five locations. The firewalls implementation will make sure that packets are directed to the required department. This will be easily attained because School of Applied Computing of Swansea Metropolitan University networks modular model of design, in the sense that each department is independent and its own entity (Deal 2008). A typical location of the office layout networking is shown below:

Branch office network topology
Figure 2: Branch office network topology

The network design of any organization cannot be effectively accomplished without proper security design. It is therefore imperative that the school network design will have to adhere to the security measures set forth by the school. The first design will be a firewall implementation at each of the five locations. The entire traffic passing through the school’s network will be encrypted and will have to be linked by a VPN connection. The components on the wide area network must be configured and enabled to use login through a syslog server. Audit and certifications will have to be written by the school and there will be need of its revision on regular basis to make sure that at all times, only genuine employees with authority are the only ones being allowed have access to their respective applications at any particular time. For the purposes of accessing the two RSA authentication keys, will be required. At all times log in must be provided before any access to the network management is allowed. Equally, it is important that any production server will be part of the general school’s management network. Only a few employees will have the authority to access the network and that the network will be used to manage all servers on it. The importance of this is that it will enable accessibility to the computer and equally be in a position to provide coarse-grain protection for any server access. This implies that the five locations of School of Applied Computing of Swansea Metropolitan University network will be connected by two different networks. In order to increase the integrity and confidentiality of the provisioning system, the network must have a tiered architecture, data tier, application tier and the presentation tier. Each of these tiers will be an entity on its own and therefore control measures must be applied to make sure that only genuine authorized and authenticated transactions are move from one tier to another. Security will be enhanced by the fact that any server that connects to the outside world must be located at the network’s presentation or demilitarized zone (DMZ). In the entire network the application layer is given the duty to hosts any business logic applications that will require getting data access. At the same time, the data tier will be allowed to use the source data in the network, which are primarily from the file and the web servers. Routers, firewall and parameter will be employed in the security configuration of School of Applied Computing of Swansea Metropolitan University network. All the routers in the entire network will provide the required level of security of the network by sieving traffic to different parts of the school-protected network. The routers will use access lists configurations to carry out this duty. The DMZ will use private addresses configured on the firewall requirements. The DMZ will also house the DNS, emails, HTTP and any other types of Internet company server (Meyer 2003). Access-list is a list of instructions that group packets and are used in the configuration of the network to control, provide and deny access of the network traffic to some parts of the network or the entire network. In this network being proposed, some computers will be denied from accessing to the Internet and some resources if such a reason arises. Extended access list will be employed by the School of Applied Computing of Swansea Metropolitan University. Extended access list evaluates both the IP addresses of the source and the destination packets, the port number of the Transport layer as well as the header protocol found in the Network layer. By virtue that that the school will have different departments at a single location, access lists must be used to configure the network flow. For this reason, extended access list will be employed to avoid the interaction of host computers within a given department at a specific location. For example, the staff rooms and the computer labs will have different access lists due to the nature of the applications. At the same time using extended access lists, hosts will be prevented from accessing the Management department within a department or location. Contrary to this, the Management department’s computers will have access to the entire all the computers within the organization and the entire resources. A good implementation of the network will require that the file server and the web server located in the server room (Meyer 2003).

Cost of implementing the network

The following table shows the costs requirements for the implementation of the network

DevicequantityTotal price($)
Cisco Valet Plus M20 Wireless Router2 @ 85170
CAT6 Blue – 1000ft Bulk UTP Plenum Rated Solid Cable2@ 300600
Cisco Catalyst 4948 Series Switches4 @ 350014000
ASA5585-S20X-K9 – Cisco ASA 5585-X Security Plus Firewall Edition SSP-20 bundle – security appliance11000
Total15770

References

Deal, R 2008, Cisco Certified Network Associate study guide (exam 640-802), New York: McGraw-Hill Professional.

Meyer, M 2003, Mike Meyers’ A+ Guide to PC Hardware, New York: McGraw-Hill Professional.

Tamara, D 2005, Network+ Guide to Networks, Boston: Cengage Learning.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 30). Lan Design and Configuration for an Organization. https://ivypanda.com/essays/lan-design-and-configuration-for-an-organization/

Work Cited

"Lan Design and Configuration for an Organization." IvyPanda, 30 Mar. 2022, ivypanda.com/essays/lan-design-and-configuration-for-an-organization/.

References

IvyPanda. (2022) 'Lan Design and Configuration for an Organization'. 30 March.

References

IvyPanda. 2022. "Lan Design and Configuration for an Organization." March 30, 2022. https://ivypanda.com/essays/lan-design-and-configuration-for-an-organization/.

1. IvyPanda. "Lan Design and Configuration for an Organization." March 30, 2022. https://ivypanda.com/essays/lan-design-and-configuration-for-an-organization/.


Bibliography


IvyPanda. "Lan Design and Configuration for an Organization." March 30, 2022. https://ivypanda.com/essays/lan-design-and-configuration-for-an-organization/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1