This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
In designing the appropriate network for Bel-Air Academy, the design team of M-CO IT firm considered the current and potential future needs of the students, staff, and administration utilizing the school buildings. We recognize that the stakeholders desire the most robust, flexible, reliable, and fastest networking that money can buy. As high schools utilize more and more media-rich traffic, a network that can support considerable amounts of data transmission seems prudent and necessary. By networking the building, the design team has provided shared access to equipment such as printers, scanners, and other hardware.
The Network Design Plan for Bel-Air Academy presented an interesting challenge. This building project includes three buildings as part of a larger campus. The buildings included in this project were locations one, two and three. Internal and external communication will be possible for students, staff and administrators if each building is networked with the building and between the buildings.
Bel-Air academy consists of three buildings two of which are on the same location and the third location is a kilometer away. Each building contains the follow persons:-
Location 1: 20 teachers, 5 administrators and 200 students
Location 2: 30 teachers, 10 administrators and 300 students
Location 3: 15 administrators
The purpose of this report is to create a network design which meets all stakeholders' requirements.
Access to applications
Access to applications
Web space access
Access to Database
Internal and external Communication
After the first meeting with the client the following has been deduced:-
- 2 laboratories required for location one with 25 personal computers for each laboratory
- 3 laboratories required for location two with 25 personal computers for each laboratory
- Each of the administrators and teachers require a personal computer
- allow for 7% growth for all stake holders
- FTP server with 500MB space for each student
- Web server for hosting school website
- Mail server with 100MB (mega Bytes) for each of the stakeholders
- Wireless network within campus
Based on the information provided the following network diagram has been produced:-
Figure 1- General View
Figure 2-Networ Layout
Figure 3- Laboratory Layout
Figure 4- Location 2 Detailed
When designing a network numbers of parameters have to be considered:-
- Routers, switches and servers
We will start with the private fiber uplink line coming into the building. Fiber will link the Main Distribution Frame, in Location 1, with the Intermediate Distribution Frame's in location 2. We will use single mode duplex fiber to connect our Main Distribution Frame to the world. We chose this because single mode fiber has a smaller diameter and thus the light cannot bounce back and forth off the sides. We will be using duplex fiber because while single fibers can be used to send and receive information, duplex fiber is much more efficient. From our Main Distribution Frame to each Intermediate Distribution Frame, we will use multimode duplex fiber. This is because the runs are short. We will use 12 strands out to the internet and 6 strand between buildings. Category 6e cabling will be utilized throughout the buildings to provide the fastest speed of data transmission available.
Routers, switches and servers
Routers will connect Location 1 and Location to together and link them to the gateway for an internet connection. Location 3 will be connected via a VPN (Virtual Private Network) connection.
Switches will be used for the LAN (Local Area Network) connection, which will be located in the rack room with the rest of the networking devices under controlled environment.
Server will provide servers such as web hosting, FTP (File Transfer Protocol) and electronic mail, these can be stored in the rack room or a data center as see fit.
As the most important parameter of any network security of information has to be well thought, to prevent external intrusion or internal tempering. Firewalls will be installed as seen on the network diagram to prevent from external incursion, policies and rules will be implemented as part of the internal LAN to restrict access and allow each user the correct privileges.
The following is required for each location
Wireless AP (Access Point)
Internal and external communication
This will be implemented in a form of access control lists and access privileges.
The combination of hardware and software intrusion detection and filtering.
Cost and Prices
Juniper Networks J2320
CISCO systems 2911
HP Procurve 7203dl
Juniper Networks EX2200
CISCO systems WS2950
HP Procurve 7203dl
Yes (since 9.x)
Yes (since 4.x)
Web[Note 1], command line
GUI, command line, API[Note 5],WMI[Note 6], RPC[Note 7]
Runs in user space orkernel space
Abyss Web Server
Yes on Windows
Apache HTTP Server
Yes, by modules 
Personal FTP server
Cerberus FTP Server
proprietary, free for personal use
FTP, FTPS, SFTP, IPv6, SOAP-based web services API, Windows Active Directory / LDAP authentication, HTTP /HTTPS remote administration, public key and client certificate authentication
Mac OS X, Windows, Linux, *BSD, Solaris, etc
FTP, FTPS, SFTP, SCP, HTTP, HTTPS, WebDAV and WebDAV over SSL, AS2, AS3, Plugin API, Windows Active Directory / LDAP authentication, SQL authentication, GUI remote administration, Events / Alerts, Protocol Conversion (incoming FTP/FTPS/SFTP/HTTP/HTTPS protocols converted to a back end FTP/SFTP server.), SSH Tunneling,HTTP(S) Tunneling, CrushTask
Juniper Networks IDP75
CISCO ASA 5510
The following table will compare certain parameters and their importance using a weight system. We have deduced these parameters from the information given by the client; weight is also given by client. The suited system is not necessary cost efficient but by including cost in the parameters this will produce a desired outcome.
Scale 0-10 (10 being most desired)
Therefore as we can see solution 1 is the most desired.