DESIGN PROPOSAL
1.0 PHYSICAL NETWORK DESIGN
This design implementation must be on LAN systems because it is located in within the same building that has no structured facilities that aid data transfer from one network to another. Use of proper network topology helps in structuring the network with advantages such as cost reduction and less power consumption. The network nodes and connection lines are supposed to be designed in such a way that it reduces complexity and utilizes the available space properly. Currently, there are both physical and logical network topologies [3]. The physical aspect is defined as the actual geometric layout while the logical topology is the virtual layout of the workstation. Due to the fact that there are several students in the university, the best topology to be used for this workstation should be BUS topology. This is because BUS topology requires less space and low cost of implementation. BUS topology is the most suitable among the other topologies since it can also be used over a wide range of the network. The figure 1.1 below illustrates the BUS network protocol representation. The design comprises of the library, 5 classrooms, a computer lab and main building that is also used as the administration block.
Figure 1.1 BUS Network Protocol Representations
1.0.1 Appropriate network media
Appropriate software and hardware are supposed to be used in design and implementation of the network. With BUS topology as a proposal, a number of network devices, connecting cables and software are used. For various nodes, switches and routers to communicate to each other effectively, it is recommended to use connecting cables such as [4];
UTP
Fiber- optic
Wireless
Security devices are supposed to be tested and used where appropriate in order to have a more secured network. Installation of network devices requires proper configurations in order to haven a perfect system. All the systems used within any computing environment are thoroughly tested in order to ensure they work properly and are compatible with each other. Appropriate LAN (Local Area Network) Devices are:
Network switches such including Hubs, Multi-station access unit, Ethernet Hubs, Bridges
Routing tables
Gateways, NICs (Network Interface Cards) and Routers.
1.0.2 Network Devices and Justification
The network devices listed above are necessary, and no network can be designed without them. The routers are configured in order to support them network and ensure the packets are transmitted appropriately. The routers are also structured in a way that they can communicate with each other, and they are connected to the switches, the servers, and the hubs. They cannot be connected to the hosts directly [3]. Wireless routers can be used by hosts directly since there is no need for switches or hubs to aid in connection. Wireless routers are configured by service providers once, and anyone is able to access the internet without any more configurations, however, they are protected through the use of passwords encryptions.
The Network interface Cards are also used in accessing the internet since they help in the configuration of host machines to the switches. Desktop computers have network adapters and NIPs that help in connection to the wireless network. Multi-station access units are only used for specific reasons and in this case, we have two different networks, and there is a clear separation of staff network and student network. The network is the same but is limited to students when it comes to the exam and other important students records that are with the administrator. Each class has a different number of students, but they access the same network. Therefore, the multi-station access units are placed where there are different groups of people within the same network, and this applies to this project.
2.0 NETWORK ADDRESSING
A subnet mask is mainly used to point out the IP address used for identifying the network and the selected hosts. Every device on the network is identified by the subnet. Subnetting is often useful in because it simplifies network administration by enabling the Admin to utilize physical media such as FDDI and Ethernet in order to improve in security monitoring and management [7]. It is very easy to know if there is an intruder within the network when all the subnets are properly configured. New students are supposed to be configured in order to limit those that left the school or already graduated. Given 199.1.2.0/24 network, we have to use VLSM get sub-netting for:
Administration 1supports 5 hosts and also supported by VPN
Administration 2 supporting 25 hosts
Classroom 1 supporting 80 hosts
Classroom 2 supports 85 hosts
Classroom 3 supports 50 hosts
Classroom 4 supports 60 hosts
Classroom 5 supports 70 hosts
Library supports 500 hosts
The above address and subnets are unique for all the classes and administration except for wired and wireless administration data. Wireless mainly configured for VPN is used when accessing delicate data. The subnet mask identifies each host uniquely, and this applies to several hosts that exist in LAN and WAN [5]. Generally, it is only possible to have a maximum of 255 computers or hosts supported by a single switch. There are several switches that are used to support the network hence forming a LAN. For this project, the LAN will comprise of four switches that will help in the connection of several hosts more so from the library. The library requires two switches for proper connection.
3.0 NETWORK SERVICES DESIGN
Network services design often defined as the organization and planning of people within a communication setup. Material components and infrastructure of a network service are designed in order to improve the quality and efficiency of communication among the students and staff members. All the techniques and methods used in designing such a system depend on the requirements of the student management and the institution at large. Students and teachers have a lot in common, the assignments are shared, and tutorials and exams results computed online [1]. This enables students and teachers to work together for the improvement their work. Therefore the network provides the avenue where students and teachers benefit from such services alongside the support staff.
3.0.1 Network Services Required
The proposed network system offers a variety of services such as emailing, printing, administration, training, scanning and marking services. Some practical done in class are marked online such as Cisco exams and training. Result computation and preparation of transcripts are done online, and students are able to view the same. Some of the staff servers are configured in order to prevent students from changing their marks and view exams before the actual day of exams. The planned network system takes care of security aspects when it comes to accessing the staff network. However, there are different servers used for assignments and other training materials that teachers would wish to share with students. There are access privileges given to students to access training materials on different subjects and also submitting the same [2]. However, such privileges are limited when it comes to exam servers and result tabulation placed on the same server.
3.0.2 Additional servers
There are a number of servers that are necessary, they include;
Authentication Server
Antivirus Server
Exam Server
Tutorials Server
Intrusion Detection/Prevention Server
Network server and Encryption server
These servers contain important data that are managed by the network administrator. There are firewalls used to help enhance security for these servers. The additional servers will influence the network layout where some of the servers will not be shared while other are shared. It is also necessary to note that some of the shared resources include the printers and the mail servers.
3.0.3 Security Measures and Justification
A number of security measures include using authenticated server to limit accessibility to some network data. Data encryption and password protection are also among the security measures used in safeguarding student records and exams. Such records are managed remotely by the staff and students therefore not allowed to get access to them. These security measures limit some staff members as well from accessing student records since all the records are stored on these servers, and there is virtual backup mechanism using VPN (Virtual Private Network) [6]. Cloud emailing system backup are also implored to take care of disasters such as fire outbreak and other physical damages that may occur. Storing data in the cloud requires encryption, and this helps in securing the network from any intruder. Intrusion detection and prevention system secures the network from none student and staff members who takes may take advantage of the vast network.
References
[1] S. Jackman, M. Swartz, M. Burton and T. Head, CWDP Certified Wireless Design Professional Official Study Guide, 1st ed. Hoboken: John Wiley & Sons, Inc., 2011.
[2] L.Jaime, P. Mauri, M. Garcia, and A. J. Ferrer. "Designing WLANS for video transmission in rural environments for agriculture and environmental researches and educational purposes." WSEAS Transactions on Communications 5, no. 11 (2006): 2064-2070.
[3] M. Hagan, H. Demuth, M. Beale and O. De Jesús, Neural network design, 1st ed. Boston:PWS Publishing Company, 1996.
[4] M. Bell and Y. Iida, Transportation network analysis, 1st ed. Chichester: J. Wiley, 1997.
[5] F. R. Thomas. "Architectural styles and the design of network-based software architectures," Ph.D. diss., University of California: Irvine, 2000.
[6] C. Kaufman, M. Speciner, R. Perlman and M. Speciner, Network Security: Private Communication in a Public World, Second Edition, 1st ed. Prentice Hall, 2002.
[7] W. Stallings, Network and internetwork security, 1st ed. Englewood Cliffs, N.J.: Prentice Hall [u.a.], 1995