Network Design Proposal For Bel Air Academy Computer Science Essay

Published:

In designing the appropriate network for Bel-Air Academy, the design team of M-CO IT firm considered the current and potential future needs of the students, staff, and administration utilizing the school buildings. We recognize that the stakeholders desire the most robust, flexible, reliable, and fastest networking that money can buy. As high schools utilize more and more media-rich traffic, a network that can support considerable amounts of data transmission seems prudent and necessary. By networking the building, the design team has provided shared access to equipment such as printers, scanners, and other hardware.

The Network Design Plan for Bel-Air Academy presented an interesting challenge. This building project includes three buildings as part of a larger campus. The buildings included in this project were locations one, two and three. Internal and external communication will be possible for students, staff and administrators if each building is networked with the building and between the buildings.

Lady using a tablet
Lady using a tablet

Professional

Essay Writers

Lady Using Tablet

Get your grade
or your money back

using our Essay Writing Service!

Essay Writing Service

Introduction

Bel-Air academy consists of three buildings two of which are on the same location and the third location is a kilometer away. Each building contains the follow persons:-

Location 1: 20 teachers, 5 administrators and 200 students

Location 2: 30 teachers, 10 administrators and 300 students

Location 3: 15 administrators

1 Km

Location 3

Location 2

Location 1

The purpose of this report is to create a network design which meets all stakeholders' requirements.

Teachers

Students

Administrators

Internet access

Intranet access

Access to applications

Internal communication

Internet access

Access to applications

Web space access

Intranet access

Access to Database

Internal and external Communication

After the first meeting with the client the following has been deduced:-

- 2 laboratories required for location one with 25 personal computers for each laboratory

- 3 laboratories required for location two with 25 personal computers for each laboratory

- Each of the administrators and teachers require a personal computer

- allow for 7% growth for all stake holders

- FTP server with 500MB space for each student

- Web server for hosting school website

- Mail server with 100MB (mega Bytes) for each of the stakeholders

- Wireless network within campus

Based on the information provided the following network diagram has been produced:-

Figure 1- General View

Figure 2-Networ Layout

Figure 3- Laboratory Layout

Figure 4- Location 2 Detailed

Project Analysis

When designing a network numbers of parameters have to be considered:-

- Cabling

- Routers, switches and servers

- Security

Cabling

We will start with the private fiber uplink line coming into the building. Fiber will link the Main Distribution Frame, in Location 1, with the Intermediate Distribution Frame's in location 2. We will use single mode duplex fiber to connect our Main Distribution Frame to the world. We chose this because single mode fiber has a smaller diameter and thus the light cannot bounce back and forth off the sides. We will be using duplex fiber because while single fibers can be used to send and receive information, duplex fiber is much more efficient. From our Main Distribution Frame to each Intermediate Distribution Frame, we will use multimode duplex fiber. This is because the runs are short. We will use 12 strands out to the internet and 6 strand between buildings. Category 6e cabling will be utilized throughout the buildings to provide the fastest speed of data transmission available.

Routers, switches and servers

Routers will connect Location 1 and Location to together and link them to the gateway for an internet connection. Location 3 will be connected via a VPN (Virtual Private Network) connection.

Switches will be used for the LAN (Local Area Network) connection, which will be located in the rack room with the rest of the networking devices under controlled environment.

Server will provide servers such as web hosting, FTP (File Transfer Protocol) and electronic mail, these can be stored in the rack room or a data center as see fit.

Security

As the most important parameter of any network security of information has to be well thought, to prevent external intrusion or internal tempering. Firewalls will be installed as seen on the network diagram to prevent from external incursion, policies and rules will be implemented as part of the internal LAN to restrict access and allow each user the correct privileges.

Specific Requirements

Lady using a tablet
Lady using a tablet

Comprehensive

Writing Services

Lady Using Tablet

Plagiarism-free
Always on Time

Marked to Standard

Order Now

The following is required for each location

Hardware:

Router

Switch

Workstations

Wireless AP (Access Point)

Services:

Internet access

Intranet access

Email service

Internal and external communication

Security

Internal

This will be implemented in a form of access control lists and access privileges.

External

The combination of hardware and software intrusion detection and filtering.

Cost and Prices

Routers

Juniper Networks J2320

CISCO systems 2911

HP Procurve 7203dl

$2337.00[1]

$2545.79[2]

$2141.35[3]

Switches

Juniper Networks EX2200

CISCO systems WS2950

HP Procurve 7203dl

$2078.69[4]

$464.71[5]

$1773.00[6]

Servers

DNS

Server

Authoritative

Recursive

RecursionACL

Slave mode

Caching

DNSSEC

TSIG

IPv6

Wildcard

Interface

split horizon

BIND

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes (since 9.x)

Yes (since 4.x)

Web[Note 1], command line

Yes

Microsoft DNS

Yes

Yes

No

Yes

Yes

Yes[Note 2]

Yes[Note 3]

Yes[Note 4]

Yes

GUI, command line, API[Note 5],WMI[Note 6], RPC[Note 7]

No

djbdns

Yes

Yes

Yes

Yes[Note 8]

Yes

No

No

No [1]

Partial[Note 9]

command line

Yes[Note 10]

Table 1[7]

Web

ver

Security

Dynamic content[1]

basic

access

authentication

digest

access

authentication

https

virtual

hosting

CGI

FastCGI

Java Servlets

SSI

ASP.NET

Runs in user space orkernel space

Administration console

IPv6

Abyss Web Server

Yes

No

Yes

paid version

Yes

Yes

No

Yes

Yes on Windows

user

Yes

No

AOLserver

Yes

No

Yes

Yes

Yes

No

No

Yes

?

user

Np

NO

Apache HTTP Server

Yes

Yes

Yes

Yes

Yes

Yes

No[2]

Yes

Yes, by modules [3]

user

Yes

Yes

Table 2[8]

FTP

Name

License

Platform

Details

ALFTP

proprietary

Windows only

Personal FTP server

Cerberus FTP Server

proprietary, free for personal use

Windows only

FTP, FTPS, SFTP, IPv6, SOAP-based web services API, Windows Active Directory / LDAP authentication, HTTP /HTTPS remote administration, public key and client certificate authentication

CrushFTP Server

proprietary,shareware

Mac OS X, Windows, Linux, *BSD, Solaris, etc

FTP, FTPS, SFTP, SCP, HTTP, HTTPS, WebDAV and WebDAV over SSL, AS2, AS3, Plugin API, Windows Active Directory / LDAP authentication, SQL authentication, GUI remote administration, Events / Alerts, Protocol Conversion (incoming FTP/FTPS/SFTP/HTTP/HTTPS protocols converted to a back end FTP/SFTP server.), SSH Tunneling,HTTP(S) Tunneling, CrushTask

Table 3[9]

Firewall

Juniper Networks IDP75

CISCO ASA 5510

$1372.80[10]

$1695.00[11]

Proposed Solutions

The following table will compare certain parameters and their importance using a weight system. We have deduced these parameters from the information given by the client; weight is also given by client. The suited system is not necessary cost efficient but by including cost in the parameters this will produce a desired outcome.

Parameters

Weight

Solution 1

Solution 2

Solution 3

Cost

10

8

6

4

Scalability

7

6

7

5

Management

5

7

Lady using a tablet
Lady using a tablet

This Essay is

a Student's Work

Lady Using Tablet

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Examples of our work

4

7

Security

8

8

6

7

Redundancy

7

6

7

7

Upgradability

6

8

5

6

Total

312

256

251

Scale 0-10 (10 being most desired)

Therefore as we can see solution 1 is the most desired.