Network Topology Design Process Essay

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Apr 3rd, 2024

Network Topology Design

Network Topology Design

We will write a custom essay on your topic a custom Essay on Network Topology Design Process
808 writers online

Explanation of the Design Topology

The network design used the allocated company address space of 150.10.0.0 /20 and employed variable length subnetting to distribute the subnets according to the demands by the number of users per given subnet.

The personal computers on the various remote sites represent the various numbers of company employees at these sites who are interconnected using a switched network environment.

This is shown by the switch between the various site routers and personal computers on the designed network topology diagram. Each personal computer is given a default gateway internet protocol of the interface of the site router facing the local site subnet, which is also assigned an internet protocol address that is part of the address space allocated to that subnet.

The remaining network addresses within the distributed subnets are then allocated to the users in those subnets.However, the remaining address space for additional subnets and users reserved for future use.

The addressing scheme that was used in designing the network topology

PART OF NETWORKNETWORK USED
New York subnet150.10.0.0 /22
San Diego subnet150.10.0.0 /24
Houston TX subnet150.10.0.8 /22
Madrid subnet150.10.0.0 /23
India subnet150.10.0.0 /26
London subnet150.10.1.0 /24
China subnet150.10.2.0 /23
New York โ€“ San Diego link150.10.0.32 /30
New York โ€“ Madrid link150.10.0.28 /30
Madrid โ€“ London link150.10.0.20 /30
China โ€“ Madrid link150.10.0.0 /30
London โ€“ India link150.10.0.12 /30
India โ€“ China link150.10.0.8 /30
London โ€“ San Diego link150.10.0.16 /30
China โ€“ San Diego link150.10.0.360 /30
Houston โ€“ China link150.10.0.4 /30
Houston โ€“ San Diego link150.10.0.0 /30
  1. Fiber links (red links) โ€“ 10GBps(gigabytes per second) links
  2. Copper lines (black links)
    1. Router to switch on the seven sites โ€“ 1 Gbps(gigabytes per second).
    2. Host PCs and endpoint devices โ€“ 100 Mbps(Megabytes per second).
    3. All servers โ€“ 1 Gbps(Gigabytes per second).

Protocols used to fulfill the network design

The WAN (wide area network) network between the seven company locations used the OSPF routing protocol whereby the site routers were all in area 1.

The WAN routers exchanged link state advertisments and maintained a state table of all the remote networks thus making them capable to sufficiently route packets to remote destinations on the company Wide Area Network.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

On the individual site servers, the following protocols were used to access the data

New York

  • Email โ€“ email was accessed by simple mail transfer protocol on port 25.
  • File transfer โ€“ file transfer was accessed by file transfer protocol and ports 20 and 21 were used.
  • Intranet web โ€“ intranet web was accessed using hyper text transfer protocol (https) and port 443 was used.

Houston TX

All backups to this server were carried out using file transfer protocol and ports 20 and 21 were used.

San Diego

For the video servers on this site, the protocol used to acces them is the Real time streaming protocol on port 554.

Wide Area Network

The wide area network employed a partial mesh layout to increase on redundancy but also enable savings on the cost of installation as well. It was made up of seven routers intercoonected using fiber 10 Gbps links.The seven site routers are interconnected using leased lines.

Remember! This is just a sample
You can get your custom paper by one of our expert writers

Remote Acess Networks

Remote access to the marketing employees was achieved by the use of a remote access VPN (virtual private network) that terminated at the New York router from the internet.

The Remote access employees used a thin client on their personal computer model wherby they were to access the company website from any remote PC connected to the internet, download a java applet that would then act as a tunnel for the VPN and after they input their login credentails get access to the companies resources.

Authentication

Before being admitted to the network or allowed to access network resources, users are authenticated against an authentication server that resides within the New York subnet.

Before the users from the VPN are authenticated, the router at the New York site prompts for the login credentials after they have downloaded the java applet and secured a secure tunnel for usage. Once the user inputs the login credentials, the router passes them by the use of RADIUS ( remote authentication dial in user service) to the authentication server which then sends an access granted or denied back to the router to thus either grant or deny access to company network rsources or not.

Security

Security for the network was employed using the following mechanisms;

Access Control lists

Access control lists were implemented on the router facing the internet at the New York head quarters that denied any access to system resources for connections initiated from outside not unless via the VPN which had user authentication controls enabled. This prevented unwanted access to company resources by unauthenticated users thus providing a layer of security.

Access control lists are also used for router interfaces conecting to the servers at different sites. This allows only users with authorisation to access information being restricted.

Authorisation and auditing

Session authorisation and auditing is enabled for all authenicated seeesions.

We will write
a custom essay
specifically for you
Get your first paper with
15% OFF

Authorisation limits a userโ€™s access to the company resources by their privilege levels that is, remote sales representative might not have access to the companies payroll database although they have access to the company network system and resources.

Auditing enables the generation of logs a for all user sessions. This allows for proper monitoring of users activities and management.

Login delays, login timeouts

The networks authentication system employed login delay systems for successive logins and login timeouts if unsuccessful logins were entered sequentially. This prevented DoS attacks on the network.

Virtual Private Network

The use of a VPN for remote access secures the data in transit as it is encrypted and provides a secure channel of remote access of data without being prone to malicious attacks such as hacking.

Fault Tolerance

The network design has a good fault tolerance as its WAN employs a partial mesh and all WAN routers exchange routing advertisments. Incase of a link or router failure, the rest of the network can continue with operation as data packets can very easily be re-routed across the failed link.

Print
Need an custom research paper on Network Topology Design Process written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2024, April 3). Network Topology Design Process. https://ivypanda.com/essays/network-technology-tp/

Work Cited

"Network Topology Design Process." IvyPanda, 3 Apr. 2024, ivypanda.com/essays/network-technology-tp/.

References

IvyPanda. (2024) 'Network Topology Design Process'. 3 April.

References

IvyPanda. 2024. "Network Topology Design Process." April 3, 2024. https://ivypanda.com/essays/network-technology-tp/.

1. IvyPanda. "Network Topology Design Process." April 3, 2024. https://ivypanda.com/essays/network-technology-tp/.


Bibliography


IvyPanda. "Network Topology Design Process." April 3, 2024. https://ivypanda.com/essays/network-technology-tp/.

Powered by CiteTotal, easy bibliography maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1