Professional Documents
Culture Documents
Network
Chris Hutton -
7105090610
Major Assessment : -
Holland College Project
Solution providers embarking on a network design project face an enormous documentation problem. In
many cases, clients provide inadequate network design documentation or no network documentation at
all. This forces providers to deliver inaccurate quotes, resulting in wasted time and resources. Other
clients may not understand the importance of network documentation, and forego documentation services
or squander the documentation that a provider does deliver.
Solution providers should obtain as much network documentation as possible before embarking
on a design or redesign. The form and detail of any network documentation can vary between clients.
Solution providers should expect to have enough information to understand the business requirements for
the network; growth estimates for the network; applications running on the network; network storage
needs; external network access requirements; remote network access requirements; and network support
needs within the environment.
In practice, however, clients often have little to no network design documentation available -- or choose
not to share that documentation with providers during the pre-assessment or bidding process. This
presents a dilemma for providers who then must make an additional investment in network discovery or
risk underbidding the job. "Many consultants lose money on the first job because they don't do enough
discovery work to give an accurate quote," said Karl Palachuk, CEO of KPEnterprises Business
Consulting Inc. [www.kpenterprises.com] in Sacramento, Calif.
Client server migration is often a "first engagement" for a solution provider, but it's also one of the most
complex tasks to tackle. Without adequate network design documentation, solution providers may find
themselves quoting a complicated job with little tangible information. Palachuck underscores the
counterproductive effects of withholding documentation. "Clients are reluctant to give out too much
information before they choose a consultant to do the job," he said. "But that just means they are forcing
the consultants to give them bad estimates of the actual job!"
Any documentation presented by the client should be used cautiously. "Even if they have docs, they're
often not right," said Adam Gray, chief technology officer of Novacoast, an IT professional services
company headquartered in Santa Barbara, Calif. Mistakes may be present in the original documentation,
and changes (especially small changes) frequently go unrecorded. "Never trust any work that was done
before you. Always double-check the work you're looking at," Gray said.
Some solution providers circumvent potential problems by adding an initial discovery process to the
project. "We almost never get any documentation," Gray said. "We typically have to build in a
requirements assessment as part of a project. At the end of that requirements assessment, there's a
possible scope change based on findings." Any signed contracts should include a clause that
accommodates scope and price changes based on assessment results.
There are additional tactics to consider when initial network design documentation is scarce or
nonexistent. The first option is to price the job based on time and materials, avoiding the risk of
guesswork entirely. Another approach is to document the client's environment for them as a promotional
opportunity. "For example, we can do PC tune-ups," Palachuck says. "Then we document everything we
see and everything we touch." The insights gained during such initial jobs can help providers understand
Design a Network – Assignment - Holland College Computer Network 3
ICAA5045C -
the environment, find where critical information is stored and so on. Solution providers may rebate some
(or all) survey costs as a promotional tool when bidding on the "real" network design job.
Solution providers can use network discovery products and other tools to help speed their assessment or
spot-check the details of some documentation. For example, Microsoft's Business and Technology
Assessment Toolkit [https://partner.microsoft.com/40025740] helps consultants gather information about
the client's environment. There are also many powerful tools that can map networks and analyze
infrastructures, such as SolarWinds' LANsurveyor [http://www.solarwinds.com/products/LANsurveyor/].
A proposal contains a summary of the client's objectives, a confirmation of the project's scope (including a
description of the intended architecture and suggested equipment), a description of the intended project
(including any assumptions made), along with a phased deployment plan and a diagram of the expected
network architecture. There may be additional elements, and the level of detail can vary depending on the
project and its complexity.
"We very rarely put any network documentation in a proposal," Palachuck said. All of the meaningful
documentation generated during a network design project should be presented to the client at the
project's conclusion. A completed network design documentation package can contain considerable
detail. Content can include a summary of the project and its individual deployment phases, a detailed
diagram of the actual network architecture, executive and detailed deployment plans, a WAN diagram
listing geographic locations of all business installations, floor plans for each location, data and voice
wiring jack maps, annotated LAN and other infrastructure diagrams, power and cooling details and
specifications, and architectural diagrams (if appropriate) showing conduits and other relevant network
details.
"The basics would include a network diagram, a spec sheet for each machine including servers and
workstations, a description of the IP scheme, a list of all the equipment passwords, and an up-to-date
description of the backup strategy," Palachuck said.
The package may be daunting, but the goals are clear. "A client needs enough documentation to
completely re-create the client's computing environment in case of a disaster. They also need enough
detail to make regular maintenance fast and efficient," Palachuck said, noting an incident where a client
was obligated to buy a new firewall because the prior solution provider failed to provide the necessary
administrative credentials. A client should expect (and deserves) a complete suite of documentation.
While there are no limitations on the detail for the client, there can be too much information. For example,
listings of software components installed on every system are easily generated, but contain little practical
information for the client or future technicians. The challenge in producing documentation is to strike a
balance between detail, cost and the client's business efficiency. "Ultimately, logical network diagrams
won't mean anything to the business analyst," Gray said. "All they care about is that the thing works, it
stays up, it's stable, and that it provides the level of service they're expecting."
Solution providers rarely focus their business on developing or updating client documentation. While it's
certainly possible, clients are hesitant to buy and pay for a separate documentation package unless
they've had documentation problems in the past. Instead, providers include documentation in the current
job, and then update documentation as part of subsequent jobs. Managed services may also include
regular documentation maintenance as a standard service. Solution providers often chose to retain a
copy of the client's network design documentation. This not only provides a duplicate if the client should
lose their copy, but it also makes service more efficient for technicians that visit the client regularly”.
Design a Network – Assignment - Holland College Computer Network 4
ICAA5045C -
Task 1
Describe How a Network would benefit each of the following groups
The introduction of Networked computers into the administration area of Holland College will
improve the ability of staff to interact with one another. It will streamline communication and
resources and give administration staff more ability to manage areas of responsibility more
effectively.
Source : http://wiki.answers.com/Q/What_are_the_benefits_of_computer_networking
“One of the strongest arguments behind network computers is that they reduce the total cost of
ownership (TCO) -- not only because the machines themselves are less expensive than PCs, but also
because network computers can be administered and updated from a central network server”
Source : http://www.webopedia.com/TERM/N/network_computer.html
The ability to Network Computers will benefit the President of Holland College by allowing
her to monitor and have access to all computers from her office. The President will not have
to leave her office to deliver information and to get resources. The President will also have
the ability to manage resources and staff from her office. Networked computers allow for
better resource allocation and therefore long - term cost savings with better staff
productivity. The President would have the ability to assign access and manage different
domains within the college. Therefore allowing different access to different users.
The ability to network computers would benefit Reuben Asimow the Vice-President of
Administration. He would have the ability to access and give staff resources from any
computer in his domain. The computer network also could give the administration area the
ability to share resources. Every staff member would not need printers and scanners. These
devices can be set up as shared resources for all the administration area to use. The use of
internal Email and even Voice over internet protocol, (VOIP) could allow even more cost
savings and productivity.
Howard Victor the Vice-President of Instruction would be able to interact and monitor staff
usage of all computer use from his computer. He can access the Registrars computer to
check enrollments. He would also be able to monitor and manage the student services from
his desktop. He would have the ability to share information with any computer within the
administration domain. He could develop web enabled content about his areas of
responsibility on his computer and allow users in his domain to access and manage this for
him.
The Director of Development MS Nicole Estes will be able to share information about future
projects and the strategic direction of Holland College with fellow co- workers. The ability to
network computers can allow Nicole access to important information from other
departments easily. She can search for information from her office without having to
interrupt staff members. She will have the ability to communicate with fellow co- workers
Design a Network – Assignment - Holland College Computer Network 6
ICAA5045C -
and have internet access through the network. She can share resource with fellow team
members.
The Business Office could implement an intranet for all business activities. Payroll, receipts and
Invoices can be developed into an enterprise solution. Different users and groups can be
managed by a domain controller. This organizes the company into logical groups and users who
have different permissions and access to their area of responsibility. The business office would
benefit from the deployment of a computer network.
(c) The students and staff of each faculty using computer labs
Students would benefit from a computer network with increased access to computer based
services and training. Computers are very good at delivering complex information. The
Graphical user interface can manipulate information and make it more user friendly. The ability
to network and to use shared resources will make the cost of training by computer more
economical. Users can run programs which are not installed on their computers but are
installed on any other user's computer.
Network computers can be administered and updated from a central network server. The network will
also reduce the total cost of ownership (TCO). Users will be able to have increased ability to interact and
Design a Network – Assignment - Holland College Computer Network 7
ICAA5045C -
share resources. The Network if set up properly will be more secure. Users will be assigned different
levels of access and control. The Network has the ability to grow and develop with the business and
student needs.
Task 2 & 3
Classrooms
Units
Location CPU Ram Hard O.S Software
Drive
Math and 10 Intel Core 2 512MB 80GB Windows Microsoft Office
Science Lab Me 2000, Math CAD,
????? Auto CAD, SAS, C++
Compiler, Visual
Basic 6
12 Intel Core 2 1GB 80GB Windows Microsoft Office
Math and Me 2000, Math CAD,
Science Lab ????? Auto CAD, SAS, C++
Compiler, Visual
Basic 6
Total Math and 22 22 Intel core 2 10 * 512MB 22 * 80Gb 22 Windows 22 * Microsoft
Science 12 * 1GB Me ???? Office 2000
22 * Math CAD
22 * Auto CAD
22 * SAS C++
22 * Compiler
22 * Visual Basic 6
English and 24 Intel core 2 256MB 40GB Windows Microsoft Office
Writing ME 2000, Publisher
???? 2000, M/S Visio
2000, and M/S
Project 2000.
English and 11 Pentium 3 128MB 20GB Windows Microsoft Office
Writing ME 2000, Publisher
???? 2000, M/S Visio
2000, and M/S
Project 2000.
Design a Network – Assignment - Holland College Computer Network 8
ICAA5045C -
Administrative Offices
Units
Location CPU Ram Hard O.S Software
Drive
Angela Miles, HR 3 Pentium 4 128MB 20GB Windows ME Microsoft Office
Jackie Herrera, BM 2000
Sherry Parks, FM
Janice McKinney 2 Pentium 4 512MB 120GB Windows ME Microsoft Office
Ryan Mc Kim 2000
David 2 Pentium 4 256MB 120GB Windows ME Microsoft Office
Whitefeather 2000
Randy Thomas
John Dale 2 Pentium 4 512MB 20GB Windows ME Microsoft Office
Jill Sanchez 2000
Alice Yasui 2 Pentium 4 512MB 20GB Windows ME Microsoft Office
Dimitri Kasakav 2000, PC-based
financial aid
packages
Howard Victor 1 Intel core 2 512MB 320GB Windows Microsoft Office
2000 2000
Professional
Nicole Estes 1 Pentium 4 512Mb 500GB Windows ME Microsoft Office
2000
Steve Gaudio 1 Pentium 4 256MB 120GB Windows ME Microsoft Office
2000, FoxPro
database
Kathy Jackson 1 Pentium 4 512MB 120GB Windows Me Microsoft Office
2000
Bob Watson 1 Pentium 4 256MB 500Gb Windows Me Microsoft Office
Windows 2000
2000 Server C++ Compiler
ME!!!!!! 1 Pentium 4 1GB 500Gb Windows ME Microsoft Office
Chris Hutton Windows 2000, C++ compiler
2000 Server
Administrative 17 16 Pentium 4 1 * 1GB 3 * 500GB 1 * Windoss 17 * Microsoft
offices Total 1 Core 2 9 * 512 MB 1 * 320 GB 2000 Office 2000
4 * 256MB 6 * 120 GB Professional 2 * Financial Aid
3 * 128MB 7 * 20 GB 16 * Packages
Windows ME
1 * FoxPro
2 * Windows
2000 Server Database
Design a Network – Assignment - Holland College Computer Network 9
ICAA5045C -
2 * C++ Compiler
3 128 3 20GB
Total 74 74 74 22 Auto CAD
24 SAS
22 C++ Compiler
35 Publisher
2000
35 M/S Visio
2000
35 M/S Project
2000
2 PC-based
financial aid
Packages
Design a Network – Assignment - Holland College Computer Network 10
ICAA5045C -
1 FoxPro
database
TASK 4
The benefits of internal e-mail would be the ability to manage and control e-mail settings and to have a
domain name that reflects the nature of your business. At Holland College the natural domain name for
their business could be xxxx@hollandcollege.edu.au
“One of the main things you’ll gain from setting up your own mail server is complete control over how
many mailboxes you can have, how those mailboxes are set up, and how they work. Are you running
into size limitations on your existing mail service? Does your current mailbox keep filling up or rejecting
your messages because they are too large? No problem! When you own the mail server, you can do
whatever you want. Go right ahead and send that 20 MB attachment to the remote office.
That brings up another important advantage that your own mail server can provide. You can extend the
benefits to others, hosting accounts for other branches or even partners. That’s particularly nice if
you’ve succeeded in securing a domain name for your company. The downside comes if your remote
sites and business partners start to rely a little too much on their mail accounts. If your Internet
connection goes down for a few days for reasons beyond your control, or your server suddenly develops
a bad case of virus-of-the-week, you don’t want people calling at 2 A.M. to complain about it. I’ve been
in the 24/7 support business and hated it. You will, too, if you get in that position. If you open your
server to others, make sure they understand that they get what they pay for and should have a backup
option, such as Hotmail or Yahoo. You should have a backup for your own e-mail account as well.
Autoresponders are another handy feature offered by many mail servers, and they're much like out-of-
office replies. For example, maybe you have a document you want people to be able to obtain simply by
sending a message to a specific account. A customer can send a message to
fudge@yourdomain.whatever and get back a reply with your favorite fudge recipe. Businesses often use
autoresponders to distribute information about products and services. Whether you manage services
for a commercial venture or run a small home business, autoresponders might add a new way for you to
interact with your customers.
Many mail servers offer features that make it easier to distribute mail to groups of people. While you
can create distribution lists with any e-mail client, creating groups at the server lets anyone send mail to
that group through a single e-mail address. Some mail servers give you the ability to send messages to
group members in round-robin fashion. This means that each new message gets sent to a different
person in the group. This is a great way to distribute messages evenly across the group, and it is typically
used to distribute sales or support requests.
Keeping out spam is another potential benefit to hosting your own mail server. While you can create
rules in your e-mail client to delete messages from specific senders, keeping out spam for several mail
Design a Network – Assignment - Holland College Computer Network 11
ICAA5045C -
accounts can be a headache, particularly if your current service doesn’t give you any spam-blocking
features. With antispamming built into the server, you can block mail from domains or specific senders
for all accounts.
Many mail servers also provide built-in virus scanning or can use add-ins to scan messages coming and
going through the server. You might use this in conjunction with client virus-scanning software to add
another layer of security for your home network.”
Source : http://articles.techrepublic.com.com/5100-10878_11-5032914.html
Disadvantages of setting up your own e-mail server would be cost and ongoing technical support costs.
The main advantage of setting up your email account on the web with an Internet Service Provider, (ISP)
would be cost and support. If there is a problem with the e-mail server it would be the ISP’s
responsibility. Less technical knowledge would need to be needed to configure and support the e-mail
network. Some ISP’s also support domain name hosting. For a fee all e-mail accounts could be set up
on the Internet providers e-mail server.
An in house e-mail Server could be set up with a dedicated e-mail program like Microsoft Exchange.
“First, you’ll need your own domain if you want to receive messages directly to your server. You can
register your domain at Network Solutions, Register.com, Go Daddy, WebSite.ws and through other
domain providers. When you register a domain, you need to provide the IP address and host name of at
least one DNS server for your domain, although most registration services require two DNS servers. If
you run Windows NT Server or Windows 2000 Server, you can use the DNS service included in those
platforms to host your own DNS records. Otherwise, you can use a third-party DNS server application.
Next, you need to create or have your registrar create a host record in the DNS zone for your domain.
The host record associates a host name with an IP address. For example, the host name of my mail
server is mail.boyce.us. In addition to the host record, you also need an MX record. This mail exchanger
record tells other mail servers what address to use to deliver mail to your domain. Again, you need to
create the MX record on your own DNS server or have your registrar create it on its servers, depending
on where your DNS service resides. Both records need to point to your public IP address.
Now it’s time to hook up your server. If yours is like most networks with a broadband connection, you
have a small number of public IP addresses (perhaps only one), and all of your computers use private IP
addresses. The MX record must reference the public IP address because that’s the only one the outside
world can see. So, if your DSL router or cable modem is assigned the one public IP address, it needs to
forward the incoming SMTP traffic to the private IP of your mail server.
Check the documentation for the unit and see if it supports one-to-one Network Address Translation
Design a Network – Assignment - Holland College Computer Network 12
ICAA5045C -
(NAT). Many cable/DSL routers let you translate specific ports, so you would configure the unit to pass
port 25 (SMTP) from the public IP to the private IP of your mail server. If you’re using your own DNS
server, you’ll also need to translate port 53 to move DNS traffic to the private IP address of your DNS
server (probably the same computer that’s handling mail). If anyone, including you, needs to be able to
retrieve messages from the server outside of your network (such as from the Internet), you also need to
translate port 110 (POP3) from the public IP to the private IP of the mail server.
If your cable/DSL router doesn’t support NAT, you’ll have to either replace it or obtain a second public IP
address from your ISP. Then, set up the server with that IP address. How you hook the server into the
network depends on the type of equipment you use, so check with your ISP if you aren’t sure.
The last step is to install the mail server software and start setting up and configuring accounts. You’ll
also need to set up DNS and get that working if you'll be providing your own DNS services. Then, you can
start e-mailing to your heart’s content”
Source : http://articles.techrepublic.com.com/5100-10878_11-5032914.html
Task 5
(a)
The type of network that would provide the best reliability and performance for Holland College would
be an Ethernet. A wireless network could be susceptible to interference and poor reception areas. To
ensure reliability and connectivity at all times an Ethernet network is recommended.
(b)
The network topology recommended for best performance would be a star topology. This is where
every computer is connected to the switch. This ensures that no data collisions occur and streamlines
data throughput.
(c)
I would recommend Holland College to install fiber optic cabling. This will ensure the network will be
able to take full advantage of the new National fiber optic network. Fiber optic cabling would be the
ideal solution because of its speed. A 1000Base-SX Fiber optic Network was chosen because of its
speed. The 1000Base SX would be the backbone of the computer network. The vlan switches would be
connected to fiber optic cable. The networked computers would connect to the vlan with UTP copper
wire. The network after the Vlan would be based on the 100Base TX standard. Category 5e would be
used. Consideration would be given to Government laws regarding cabling rules and regulations. In
particular putting plastic cables into air conditioning spaces. A plenum cable must be used in air
circulation areas.
Design a Network – Assignment - Holland College Computer Network 13
ICAA5045C -
Plenum cable is cable that is laid in the plenum spaces of buildings. The plenum is the space that can
facilitate air circulation for heating and air conditioning systems, by providing pathways for either
heated/conditioned or return airflows. Space between the structural ceiling and the dropped ceiling or
under a raised floor is typically considered plenum; however, some drop ceiling designs create a tight
seal that does not allow for airflow and therefore may not be considered a plenum air-handling space.
The plenum space is typically used to house the communication cables for the building's computer and
telephone network; however, it has been proposed that the growing abandonment of cable in plenum
spaces may pose a serious hazard in the event of a fire, as once the fire reaches the plenum space the
airflow present in the space supplies fresh oxygen to the flame and makes it grow much stronger than it
would have otherwise been. Recent testing by the American Society of Heating, Refrigerating and Air-
Conditioning Engineers (ASHRAE) has shown that while flame spread is limited by accumulated cable
bundles, other structural concerns may still exist due to increased load on suspended components. As
plenum spaces are restricted from use as areas for storage, the principle behind removal of abandoned
cable is that regulated removal prevents the use of plenum spaces as a storage area for abandoned
cable. Additionally, no high-voltage powered equipment is allowed in the plenum space because
presence of fresh air can greatly increase danger of rapid flame spreading should the equipment catch
on fire.
Source : http://en.wikipedia.org/wiki/Plenum_cable
If fiber is more expensive, why have all the telephone networks been converted to fiber? And why are all
the CATV systems converting to fiber too? Are their networks that different? Is there something they
know we don't? Telcos use fiber to connect all their central offices and long distance switches because it
has thousands of times the bandwidth of copper wire and can carry signals hundreds of times further
before needing a repeater. The CATV companies use fiber because it give them greater reliability and
the opportunity to offer new services, like phone service and Internet connections. Both telcos and CATV
operators use fiber for economic reasons, but their cost justification requires adopting new network
architectures to take advantage of fiber's strengths. A properly designed premises cabling network can
also be less expensive when done in fiber instead of copper.”
Source : http://www.lanshack.com/fiber-optic-tutorial-network.aspx
FJ2-SCSC5MM-
(A) Fiber Jumper FJ2-SCSC-MM-03
03
FJ2-SCSC5MM-
(F) Fiber Jumper FJ2-SCSC-MM-03
03
Customer Supplied
Source :
http://www.siemon.com/us/applicationguide/1000basesxlx.asp
Design a Network – Assignment - Holland College Computer Network 15
ICAA5045C -
The table below helps you determine which type of cable you need for your setup.
Workstatio
Hub Switch Router
n
Crossove Crossove
Hub Straight Straight
r r
Crossove Crossove
Switch Straight Straight
r r
Crossove
Router Straight Straight Crossover
r
Workstatio Crossove
Straight Straight Crossover
n r
The table below lists the Ethernet cabling guidelines for 10BaseT and 100BaseTX cables.
With Class II
Design a Network – Assignment - Holland College Computer Network 16
ICAA5045C -
repeaters: 1
Maximum number
of nodes per 1024 1024
segment
UTP, UTP category 5 or
Cable type required category 3, Shielded twisted pair
4, or 5 (STP)
1
Hop count = Routing metric used to measure the distance between a source and a destination.
The table below lists the Ethernet version 2 and IEEE 802.3 physical characteristics of the
different Ethernet cables.
IEEE 802.3
Ethernet
10Base5 10Base2 10BaseT
Data rate
10 10 10 10
(Mbps)
Signaling
Baseband Baseband Baseband Baseband
method
100
Maximum
(Unshielded
segment 500 500 185
twisted pair
length (m)
- UTP)
50-ohm 50-ohm 50-ohm Unshielded
Media coax coax coax twisted pair
(thick) (thick) (thin) (UTP)
Topology Bus Bus Bus Star
The Fast Ethernet RJ-45 port actively terminates wire pair 4 and 5 and wire pair 7 and 8.
Common-mode termination reduces electromagnetic interference (EMI) and susceptibility to
common-mode sources.
Design a Network – Assignment - Holland College Computer Network 17
ICAA5045C -
The table below shows the pin and corresponding signal for the RJ-45 connector pinouts.
The table below lists cable specifications and connection limits for 100-Mbps transmission.
2
EIA/TIA-568 or EIA-TIA-568 TSB-36 compliant.
3
Cisco Systems does not supply Category 5 UTP RJ-45 or 150-ohm STP MII cables. Both are
available commercially.
4
AWG = American Wire Gauge. This gauge is specified by the EIA/TIA-568 standard.
5
This is the cable between the MII port on the port adapter and the appropriate transceiver.
Design a Network – Assignment - Holland College Computer Network 18
ICAA5045C -
6
This length is specifically between any two stations on a repeated segment.
The table below lists the IEEE 802.3u physical characteristics for the Ethernet 100BaseT cable.
Parameter 100BaseT
Data rate (Mbps) 100
Signaling method Baseband
Maximum
segment length (in 100 m between DTE7 and repeaters
meters)
RJ-45: Category 5 UTP MII: Category
Media 3, 4, or 5, 150-ohm UTP or STP, with
appropriate transceiver
Topology Star/Hub
7
DTE = data terminal equipment.
8
Pins 4, 5, 7, and 8 are not used.
The table below lists the pinouts for the Ethernet RJ-45 crossover cable.
- 5 5 -
RX- 6 2 TX-
- 7 7 -
- 8 8 -
The table below shows the pinouts for the RJ-45 rolled console cable.
Source :
http://www.cisco.com/en/US/products/hw/routers/ps133/products_tech_note09186a00801f5d9e.
shtml
(d)
The equipment needed to install a hybrid network of fiber optic backbone and Copper to the nodes
would include :
(e)
The recommended Network Operating System (NOS) I would recommend would be Windows
Server 2008. Windows Server 2008 would allow users to use the Windows operating systems on
their desktops. Microsoft Windows is the most popular and well known operating system.
Users would be familiar with these operating systems and would help productivity.
TASK 6
In the Administration network security issues need to be planned and developed into manageable and
practical areas. Areas that would need to be password protected and have sensitive data would include:
Payroll
Student Loans
Financial Aid
Registrar
All these areas and others identified by the department heads will need to have password protection
and or encrypted data with high level password management procedures.
Source : http://medschool.ucsf.edu/isu/pdf/Security/password_management.pdf
Other security issues that need to be addressed are: Computer Viruses and Malware. The College will
make sure that firewalls are used on all computers and trusted virus scanning software that is
configured to run and update regularly. Windows update should be configured on all workstations to
update operating systems to ensure system vulnerabilities are minimized.
The physical security of the network should also be addressed. Areas with sensitive data should be
locked when Key employees are not present. A culture of complying with company security policies and
procedures needs to be implemented and enforced to ensure the integrity of sensitive and private
information.
Students should not be able to enter areas where sensitive data is being used. Physical barriers like
locks on doors and walls will help to ensure data security.
Design a Network – Assignment - Holland College Computer Network 22
ICAA5045C -
Task 8
The Total amount of network interface cards required to connect all PC’s at Holland College would be :
E-mail server 1
File servers 2
Proxy server 1
Network printers 10
____________________________________________________________________________________
Task 9
Intel Core i5
ProcessorSuper Fast
1333 FSB Speed
CPU4GB DDR3
MemoryPowerful
AMD ATI HD5770
1GB Graphics Card
Processor
Intel® Pentium® $1549.00 5 $7,745.00 C
Processor G6950
(2.80GHz, 3MB L2
Cache, 1066MHz FSB)
(d1)
Power Shield
Centurion
Design a Network – Assignment - Holland College Computer Network 24
ICAA5045C -
Microsoft® Exchange
(g) Standard CAL Single
License/Software
$10.00 200 $2,000.00 G
Assurance Pack
Academic OPEN User
CAL User CAL
(g) Microsoft® Windows
Web Server Sngl
License/Software
$162.00 1 $162.00 G
Assurance Pack
Academic OPEN 1
License
(g) Microsoft®
Windows® Server $291.00 5 $1,455.00 G
Standard Single
License/Software
Design a Network – Assignment - Holland College Computer Network 25
ICAA5045C -
$799.00 10 7,990.00 N
HP LaserJet P2050
Printer series -
Specifications
$1,200.00 2 $2,400 P
Suppliers
Supplier A
http://www.crazysales.com.au/xtreme-core-i5-750-ati-gaming-pc-computer-system_p4739.html
Supplier B
http://tpg.com.au/shdsl/products_services.php
Design a Network – Assignment - Holland College Computer Network 28
ICAA5045C -
Supplier D
http://www1.ap.dell.com/au/en/business/servers/poweredge-t110/pd.aspx?refid=poweredge-
t110&s=bsd&cs=aubsd1
Supplier D1
http://www.upssystems.com.au/centurion_11.html
Supplier E
http://cgi.ebay.com.au/NEW-HP-LTO-3-ULTRIUM-960-SCSI-TAPE-ARRAY-DRIVE-
Q1540A-/360290478645?pt=AU_Components&hash=item53e2fc6a35
supplier F1
http://cgi.ebay.com.au/100-RJ45-RJ-45-CAT5-Modular-Plug-Network-Connector-100X-/250520119801?
pt=AU_Computers_Networking_Accessories&hash=item3a5429a9f9
Supplier F
Design a Network – Assignment - Holland College Computer Network 29
ICAA5045C -
https://www.lindy.com.au/online/arrshop.exe?anonymous=true&cat=nj
or
http://cgi.ebay.com.au/New-Cat5e-Cat-5E-CMP-4-24-Plenum-Bulk-Cable-2000ft-/170535857316?
pt=LH_DefaultDomain_0&hash=item27b4baaca4
Supplier G
http://www.microsoft.com/licensing/mla/summary.aspx#W
Supplier H
http://www.amazon.com/Gigabit-Fiber-Nic-32BIT-1000BSX/dp/B000IOG232
Supplier H1
Design a Network – Assignment - Holland College Computer Network 30
ICAA5045C -
http://www.microsoftstore.com.au/shop/en-AU/Microsoft/Windows/Windows-7?
WT.mc_id=pointitsem_ad_win7_generic&WT.srch=1&WT.term=microsoft+windows+7&WT.campaign=6
074&WT.source=google&WT.medium=cpc&WT.content=623196099&cshift_ck=2098988581cs62319609
9&WT.srch=1&tid=623196099
Supplier I
http://www.shopping.com/xPO-Linksys-EtherFast-LNE100TX-AT
Supplier J
http://us.hardware.com/store/cisco/WS-C2950SX-48-SI
Supplier K
http://shopper.cnet.com/switches/cisco-catalyst-2950sx-24/4014-6432_9-20295099.html#stores
Supplier L
http://submit.apnic.net/cgi-bin/feecalc.pl?ipv4=10&ipv6=&action=Calculate
Supplier M :
http://accessories.us.dell.com/sna/productdetail.aspx?
sku=A2330376&cs=04&c=us&l=en&dgc=SS&cid=52102&lid=1342490
Supplier N :
http://h10010.www1.hp.com/wwpc/au/en/ho/WF06a/18972-18972-3328059-236263-236263-
3662052.html
Supplier O
http://shopper.cnet.com/routers/cisco-modular-gigabit-ethernet/4014-3319_9-30484805.html#stores
Supplier P
http://www.milcom.com.au/course-description.aspx?cc=CAN-38&ccid=TELEC
Design a Network – Assignment - Holland College Computer Network 31
ICAA5045C -
TASK 10
Task Software Cost Number Of Total Cost Supplier
10 Units
Microsoft office 2000 $849.00 111 $94,239.00 A
http://www.microsoftstore.com.au/shop/en-AU/Microsoft/Microsoft-Office-Professional-2010
http://store.ptc.com/store?
SiteID=ptc&Locale=en_US&Action=DisplayProductDetailsPage&productID=197962800&pgm=6660430
0&ThemeID=6865700&Currency=USD
Design a Network – Assignment - Holland College Computer Network 32
ICAA5045C -
http://www.studentdiscounts.com.au/microsoft-visual-studio-professional-2010-educ
http://www.citysoftware.com.au/Autodesk_AutoCAD_LT_2011_New_Seat_AUT0267.aspx?
gclid=CPa8t6a58aMCFROmbwodZXL32A
http://e5.onthehub.com/WebStore/OfferingDetails.aspx?ws=49c547ba-f56d-dd11-bb6c-
0030485a6b08&o=c9192ece-f6b6-dd11-b00d-0030485a6b08&JSEnabled=1
http://www.microsoftstore.com.au/shop/en-AU/Microsoft/Publisher-2010?
WT.mc_id=pointitsem_ad_Publisher_generic_2007&WT.srch=1&WT.term=microsoft+publisher&WT.c
ampaign=6071&WT.source=google&WT.medium=cpc&WT.content=623191469&cshift_ck=209898858
1cs623191469&WT.srch=1&tid=623191469
http://www.microsoft.com/licensing/mla/summary.aspx#W
http://www.microsoftstore.com.au/shop/en-AU/Microsoft/Project-Professional-2010?
WT.mc_id=pointitsem_Project_generic_2007&WT.srch=1&WT.term=microsoft+project&WT.campaign=
6136&WT.source=google&WT.medium=cpc&WT.content=623736044&cshift_ck=2098988581cs6237360
44&WT.srch=1&tid=623736044
https://estore.quicken.com.au/ProductDetails.aspx?CategoryID=70
http://www.au.winbuyer.com/Microsoft_Visual_FoxPro_Professional_Edition_90_Full_Version_for_PC_
340-01231/pid-22878396/offers.html
Design a Network – Assignment - Holland College Computer Network 33
ICAA5045C -
Major Task
“Network Infrastructure Planning Overview
Planning network infrastructure is a complex task that needs to be performed so that the network
infrastructure needed by the organization can be designed and created. Proper planning is crucial to
ensure a highly available network and high performance network that result in reduced costs and
enhances business procedures for the organization.
To properly plan your network infrastructure, you have to be knowledgeable on a number of factors,
including the following:
Requirements of users.
Networking services which should be installed on the user's computers so that they can perform
their necessary tasks.
Determine the requirements of the organization and its users, and then document these
requirements.
Identify the capacity for the physical network installation. This should encompass the following:
o Allocation of network bandwidth for the necessary networking services and applications.
Determine which technologies, such as operating systems and routing protocols are needed to
cater for the organization's needs as well as for possible future expansions.
Determine the security mechanisms which will be implemented to secure the network and
network communication.
Design a Network – Assignment - Holland College Computer Network 34
ICAA5045C -
After planning, the following step would be to implement the technologies which you have identified.
Implementation of the network infrastructure involves the following tasks:
Determining the network infrastructure maintenance strategy which you will employ once the
network infrastructure is implemented. Network infrastructure maintenance consists of the
following activities:
o Upgrading applications.
(a) Description of the proposed LAN topology and why is was selected.
The proposed Local Area Network (LAN) topology proposed for Holland College is a star
topology. The star topology was chosen because of the ability to eliminate data collisions
between host computers.
Design a Network – Assignment - Holland College Computer Network 35
ICAA5045C -
In local area networks with a star topology, each network host is connected to a central hub. In
contrast to the bus topology, the star topology connects each node to the hub with a point-to-
point connection. All traffic that transverses the network passes through the central hub. The hub
acts as a signal booster or repeater. The star topology is considered the easiest topology to design
and implement. An advantage of the star topology is the simplicity of adding additional nodes.
The primary disadvantage of the star topology is that the hub represents a single point of failure.
After the special case of the point-to-point link, as in note 1.) above, the next simplest type of
network that is based upon the physical star topology would consist of one central node – the
'hub' – with two separate point-to-point links to two peripheral nodes – the 'spokes'.
Although most networks that are based upon the physical star topology are commonly
implemented using a special device such as a hub or switch as the central node (i.e., the 'hub' of
the star), it is also possible to implement a network that is based upon the physical star topology
using a computer or even a simple common connection point as the 'hub' or central node –
however, since many illustrations of the physical star network topology depict the central node
as one of these special devices, some confusion is possible, since this practice may lead to the
misconception that a physical star network requires the central node to be one of these special
devices, which is not true because a simple network consisting of three computers connected as
in note 2.) above also has the topology of the physical star.
Star networks may also be described as either broadcast multi-access or nonbroadcast multi-
access (NBMA), depending on whether the technology of the network either automatically
propagates a signal at the hub to all spokes, or only addresses individual spokes with each
communication”
Design a Network – Assignment - Holland College Computer Network 36
ICAA5045C -
Source : http://en.wikipedia.org/wiki/Network_topology
OSI Model
Internet Service
Proxy Server
Network Backbone
E-mail Server
Router
255.255.255.0
Microsoft
192.168.4.x
Switch
255.255.255.0
255.255.255.0
192.168.2.x
192.168.3.x
Math and Math and Science English and English and Admin Administration
Lab 22 Intel i5 Writing Lab 35
Intel i5 17 Intel i5
Design a Network – Assignment - Holland College Computer Network 37
ICAA5045C -
The OSI model is made up of seven layers which are presented as a stack. Data which is passed over
the network moves through each layer. Each layer of the OSI model has its own unique functions and
protocols. Different protocols operate at the different layers of the OSI model. The layer of the OSI
reference model at which the protocol operates defines its function. Different protocols can operate
together at different layers within a protocol stack. When protocols operate together, they are referred to
as a protocol suite or protocol stack. When protocols support multiple path LAN-to-LAN communications,
they are called routable protocols. The binding order determines the order in which the operating system
runs the protocols.
The seven layers of the OSI reference model, and each layers' associated function are listed here:
Physical Layer - layer 1: The Physical layer transmits raw bit streams over a physical medium,
and deals with establishing a physical connection between computers to enable communication.
The physical layer is hardware specific; it deals with the actual physical connection between the
computer and the network medium. The medium used is typically a copper cable that utilizes
electric currents for signaling. Other media that are becoming popular are fiber-optic and wireless
media. The specifications of the Physical layer include physical layout of the network, voltage
changes and the timing of voltage changes, data rates, maximum transmission distances, and
physical connectors to transmission mediums. The issues normally clarified at the Physical Layer
include:
Data-Link Layer - layer 2: The Data-link layer of the OSI model enables the movement of data
over a link from one device to another, by defining the interface between the network medium and
the software on the computer. The Data-link layer maintains the data link between two computers
to enable communications. The functions of the Data-link layer include packet addressing, media
access control, formatting of the frame used to encapsulate data, error notification on the
Physical layer, and management of error messaging specific to the delivery of packets. The Data-
link layer is divided into the following two sublayers:
o The Logical Link Control (LLC) sublayer provides and maintains the logical links used for
communication between the devices.
o The Media Access Control (MAC) sublayer controls the transmission of packets from one
network interface card (NIC) to another over a shared media channel. A NIC has a
unique MAC address, or physical address. The MAC sublayer handles media access
control which essentially prevents data collisions. The common media access control
methods are:
Network Layer - layer 3: The Network layer provides end-to-end communications between
computers that exist on different network. One of the main functions performed at the Network
layer is routing. Routing enables packets to be moved between computers which are more than
one link from one another. Other functions include traffic direction to the end destination,
addressing, packet switching and packet sequence control, end-to-end error detection,
congestion control, and Network layer flow control and error control.
Transport Layer - layer 4: The Transport layer deals with transporting data in a sequential
manner, and with no data loss. The Transport layer divides large messages into smaller data
packets so that it can be transmitted to the destination computer. It also reassembles packets into
messages for it to be presented to the Network layer. Functions of the Transport layer include
guaranteed data delivery, name resolution, flow control, and error detection and recovery. The
common Transport protocols utilized at this layer are Transmission Control Protocol (TCP) and
User Datagram Protocol (UDP).
Session Layer - layer 5: The Session layer enables communication sessions to be established
between processes or applications running on two different computers. A process is a specific
task that is associated with a particular application. Applications can simultaneously run
numerous processes. The Session layer establishes, maintains and terminates communication
sessions between applications. The Session layer utilizes the virtual circuits created by the
Transport layer to establish communication sessions.
Presentation Layer - layer 6: The Presentation layer is responsible for translating data between
the formats which the network requires and the formats which the computer is anticipating. The
presentation layer translates the formats of each computer to a common transfer format which
can be interpreted by each computer. Functions include protocol conversion, data translation,
data encryption and decryption, data compression, character set conversion, and interpretation of
graphics commands.
Application Layer - layer 7: The Application layer provides the interface between the network
protocol and the software running on the computer. It provides the interface for e-mail, Telnet and
File Transfer Protocol (FTP) applications, and files transfers. This is the location where
applications interrelate with the network.
Planning the logical network is often the most difficult portion of network planning, because you won’t
have any
Design a Network – Assignment - Holland College Computer Network 39
ICAA5045C -
obvious or easy ways to measure or determine network requirements or usage. Fortunately, we can
spare you some trouble by passing on the experience of many network technicians.
If you were going to build a warehouse to store engines, you could simply measure the size of
each engine, determine how high you can stack them, add floor space for access, and build a warehouse
of the exact size you need. Most architects also add room for expansion and growth. Another method is
to simply buy more space than you will ever need, but this approach obviously requires deep pockets.
Both techniques are used in networking, and unfortunately, the second is more common. Many
organizations waste a lot of money on hardware to guarantee that they will not have a capacity
problem. In very small networks buying more hardware than you need can actually make financial sense
because network architects may charge more than the extra equipment will cost to design a network of
the proper size. We will assume, however, that you intend to spend as little as you can to create a well-
designed network. The steps in designing the logical network are as follows:
Determine which types of cable support that data link layer technology
Although no simple method will replace an experienced network integrator, experience can be
distilled into methods that are useful for planning and estimating. A good working methodology will
serve a number of roles:
It will be able to predict the amount and type of hardware necessary to implement the network
We have developed a simple method that will help you plan your network based upon the client load
limit of various current data link technologies. For instance, a single 10 Mb/s Ethernet network can
support a maximum of about 50 DOS clients. The same Ethernet network can reliably serve 20 or so
Windows NT workstations.
Of course, these estimations are not absolute-the way the client is used will affect its load on
the network greatly, and as technology changes so will the load estimates for various clients. The law of
averages comes to our aid here by smoothing the usage characteristics of a single computer over the
number of computers attached to the network. This method doesn’t always work well, however.
Consider the case of a diskless DOS workstation that must boot its operating system from a network
server. This client will typically demand more from a network than a typical client because even its
memory page file is being sent over the network.
You can use the method presented here if your operations conform to the common uses of
computers. If you are doing something you know will require more bandwidth , consider revising the
load values for clients upwards. We have presented worst-case capacities in this method, so resist the
temptation to revise them downward.
Make a map of all the computers in your organization based on their rough location in your
facility, matching them to one of the types in the table below. Sum the values to determine your
organization’s total client load.
We chose to use the worst-case number of clients we felt could be usefully attached to a single
shared media network rather than to use a comparison of raw throughput. We then applied this metric
to the capacities of other types of networks that are not shared media, such as asynchronous transfer
mode (ATM), to show how these networks can be aggregated into large internetworks.
When creating internetworks, the capacity number used for a subnetwork becomes its load. For
instance, a Fiber Distributed Data Interface (FDDI) ring with a capacity rating of 1,000 can handle up to
ten Ethernet networks, each with a capacity rating of 100. The table below shows the load capacities of
various network data link technologies.
speed links.
ATM OC-192 48,000 ATM at OC-192 (8.8 Gb/s) is used for major trunks between
metropolitan
When calculating load versus capacity, remember that these numbers are maximum capacity estimates.
Erring on the side of excess capacity is preferable to being tied to a slow network. You should try to
avoid coming within 25 percent of the maximum values presented here if you want your network to run
smoothly.
Make a rough map of the computers in your organization based on location. Select a network
technology and group clients into networks based upon location. Then sum the client load values of
each group to make sure you are well within the load capacity for the network type you’ve selected”
A score of 5 for windows XP for a fast Ethernet connection score of 500. Therefore theoretically 100 (or
75 with 25% of the maximum value) computers can connect to 1 sub network. The maximum amount of
computers attached to 1 sub network on the Holland College network is 36.
There are three variables that form the basic model of system capacity. These variables are
Observation time (T), the amount of time that the server is monitored for activity
Busy time (B), the amount of time that the server was active during the observation time
Completions (C), the number of transactions completed during the observation period
With these three variables, you can calculate the six significant values, described in Table 9.4, that are used to
develop a capacity planning model.
CPU Utilization The percentage of CPU capacity used during a specific U = B/T
period of time.
Transaction capacity of the The number of transactions the server handles. Cp = 1/S
system
If the SLA states that during any given 60 second period, the server should not utilize more than 85 percent of the
processor and should be capable of handling at least 100 transactions, the calculated values shown in Table 9.5
indicate that the SLA is being met. If the SLA stated that during any 60 second period, the server should not utilize
more that 75 percent of the processor or should not have more than three transactions waiting in queue, then the
calculated values shown in Table 9.5 indicate that the server cannot perform within the limits of the SLA and
probably must be upgraded.
Use these formulas as tools to help you to determine current server performance levels, to develop acceptable and
reasonable SLAs given current and expected server hardware configurations, and to identify where upgrades or
new equipment is necessary.
When you consider response time, you should not think only in terms of a single server's response time and
performance, but instead you should think of all the data components that make up the service chain for that
transaction. So, the first step in determining end-to-end response time is identifying the data components that
make up the service chain.
For example, consider that information flows from an SMS client to a CAP or management point, and then to the
site server. The service chain that emerges from this flow has five data components associated with it as shown in
Figure 9.2:
Network connection between client and CAP or management point Q, R, and S values
Network connection between CAP or management point and site server Q, R, and S values
Figure 9.2 A service chain and the computation of end-to-end response time
The end-to-end response time, then, is the sum of each of the R values for each component in the service chain.
Use this information to develop SLAs for service chain performance, and to determine when there are performance
aberrations.
There are no standard metrics for SMS performance. Your organization might want to consult its SLAs and perform
a cost-to-benefit analysis to determine how fast the SMS site servers must run. Your organization might have time
requirements. For example, mission-critical applications might require updating on 95 percent of desktops in an
eight-hour period. Another SLA might state that critical virus signature update files must be distributed to all
desktops within a two-hour period.
After running a pilot project and discovering the cost to distribute the package to all desktops on the network in
four hours, you might compromise on a reduced hardware configuration and accept a window of five hours to
complete the distribution. In general, faster response times require more expensive hardware, and lower
acceptable response times require less expensive hardware.
Because many SMS service requests come in surges, most SMS sites have service request backlogs that last for at
least a few minutes. The two most common surges occur during the user logon cycle and when you send package
advertisements.
While you experiment to find the least expensive hardware configuration to meet your needs, consider future
growth requirements and the potential for change, and monitor the SMS site for backlogs. If a site is backlogged
most of the day and catches up between 3:00 A.M. and 4:00 A.M., then there is a risk that the site cannot catch up
if the weekly load increases. Plan for extra capacity so that you can quickly meet unexpected software distribution
or other feature demands. Also, when SMS users and administrators become familiar with SMS, their usage levels
increase.
The combination of business objectives and operational styles in every organization creates unique load signatures.
However, if an organization has ten remote offices with the same number of workers, the same software, and the
same hardware, and you manage them all similarly, then they all might have a similar load signature. Grouping
computers with similar load signatures can reduce planning time.
By determining the load signature of servers in the SMS site, you can plan for an appropriate hardware component
capacity. Then, by changing hardware capacity, you can increase or decrease the responsiveness of SMS and the
time required to accomplish specific tasks. The load signature is determined by several factors, including:
Location of site server in the SMS hierarchy (whether it communicates with parent or child sites)
4. Use the hardware requirements to construct sample SMS configurations to test in your isolated test lab
and later in the pilot project.
Testing your hardware configuration and conducting a successful pilot project helps ensure that your organization's
deployment progresses smoothly, because the deployment itself is based on site designs customized for your
organization's data and tested in your environment”.
IP Address
192.168.2.1 to M&S 1 to M&S23 Math and Science Lab Math and Science Lab computers
192.168.2.23
192.168.2.100 M&S_Server Server English and Writing Lab English and Writing Lab
192.168.3.36
192.168.3.100 E&W_Server Server English and Writing Lab English and Writing Lab
192.168.4.18
Public IP
Addresses
Holland College will purchase 10 public IP addresses for DNS and Web server.
Source : http://submit.apnic.net/cgi-bin/feecalc.pl?ipv4=10&ipv6=&action=Calculate
Public IP addresses: Here, the IP addressing scheme consists of only public IP addresses.
Design a Network – Assignment - Holland College Computer Network 48
ICAA5045C -
Private IP addresses: Here, the IP addressing scheme consists of private IP addresses and a
small number of public IP addresses needed to enable Internet connectivity.
If you are only using a public IP addressing scheme in your network design, then you need to perform the
following activities:
Purchase a range of public IP addresses from an ISP that is approved by the Internet Corporation
for Assigned Names and Numbers (ICANN).
The IP address range should have sufficient IP addresses for all interfaces in your network
infrastructure design. Devices that connect to the private network need an IP address, and so too
does VPN connections.
You need to be certain that network address translation (NAT) is not required.
You need to implement firewalls and router packet filters to secure the resources within your
private network from Internet users.
If you are implementing a private IP addressing scheme, then the network design would consist of the
following:
Private IP addresses would be assigned to all devices in the private internal network.
Public IP addresses would be assigned to all devices connecting to the public network.
The selection of the IP address range needed for the organization should be based on the following
factors:
If you are using a private IP addressing scheme in your network design, consider the following important
points:
For those IP devices that connect the company network to public networks such as the Internet,
you need to obtain a range of public IP addresses from the ISP for these devices.
You should only assign public IP addresses to those devices that communicate directly with the
Internet. This is mainly due to you paying for each IP address obtained. Devices which directly
connect to the Internet are your network address translation (NAT) servers, Web servers, VPN
remote access servers, routers, firewall devices, and Internet application servers.
The private IP address range which you choose should have sufficient addresses to support the
number of network subnets in your design, and the number of devices or hosts on each particular
network subnet.
You must cater for a network address translation (NAT) implementation. NAT translates IP
addresses and associated TCP/UDP port numbers on the private network to public IP addresses
which can be routed on the Internet. Networks that do not require an implementation of a firewall
solution or a proxy server solution can use NAT to provide basic Internet connectivity. Through
Design a Network – Assignment - Holland College Computer Network 49
ICAA5045C -
NAT, host computers are able to share a single publicly registered IP address to access the
Internet.
The primary differences between IPv6 and IPv4 are listed here
Source and destination addresses: IPv4: 128 bits in length; IPv6: 32 bits in length
Configuration of IP addresses: IPv4: Manually or via DHCP; IPv6: Via Address Autoconfiguration
- DHCP is no longer required, nor is manual configuration.
Packet flow identification for QoS handling in the header: IPv4: No identification of packet flow;
IPv6: Packet flow identification for QoS handling exists via the Flow Label field.
Broadcast addresses: IPv4: Broadcast addresses are used to transmit traffic to all nodes on a
specific subnet; IPv6: Broadcast addresses are replaced by a link-local scope all-nodes multicast
address.
Fragmentation: IPv4: Performed by the sending host and at the routers; IPv6: Performed by the
sending host.
Reassembly: IPv4: Has to be able to reassemble a 576-byte packet; IPv6: Has to be able to
reassemble a 1,500-byte packet.
ARP Request frames: IPv4: Used by ARP to resolve an IPv4 address to a link-layer address;
IPv6: Replaced with Neighbor Solicitation messages.
ICMP Router Discovery: IPv4: Used to determine the IPv4 address of the optimal default
gateway; IPv6: Replaced with ICMPv6 Router Solicitation and Router Advertisement messages.
Internet Group Management Protocol (IGMP): IPv4: Used to manage local subnet group
membership; IPv6: Replaced with Multicast Listener Discovery (MLD) messages.
Large address space: Because of the larger number of available addresses, it is no longer
necessary to use utilize Network Address Translator (NAT) to map a public IP address to multiple
private IP addresses.
A new header format which offers less overhead: The new header format of IPv6 is designed to
minimize header overhead. All optional fields which are needed for routing are moved to
extension headers. These extension headers are located after the IPv6 header. The IPv6 header
format is also streamlined so that it is more efficiently processed at intermediate routers. The
number of bits in IPv6 addresses is four times larger than IPv4 addresses.
An efficient hierarchical addressing and routing infrastructure: The IPv6 global addresses are
designed to create an efficient routing infrastructure.
Built in support for security - IPSec: A requirement of IPv6 is support for IPSec. IPSec contains
the following components that provide security:
o Authentication header (AH): The AH provides data authentication, data integrity and
replay protection for the IPv6 packet. The only fields in the IPv6 packet that are excluded
are those fields that change when the packet moves over the network.
o Encapsulating Security Payload (ESP) header: The ESP header provides data
authentication, data confidentiality, data integrity, and replay protection for ESP
encapsulated payload
o Internet Key Exchange (IKE) protocol: The IKE protocol is used to negotiate IPSec
security settings.
Support for Stateless and stateful address configuration: IPv6 can support a stateful address
configuration and a stateless address configuration. With IPv4, hosts configured to use DHCP
have to wait a minute before they can configure their own IPv4 addresses. Stateless address
configuration however enables a host on a link to automatically configure its own IPv6 address for
the link. These addresses are called link-local addresses. A link-local address is configured
automatically, even when no router exists. This allows communication between neighboring
nodes on the same link to occur immediately.
Support for Quality of service (QoS) header fields: There are new fields in the IPv6 header that
specify the way traffic is identified and handled.
o Traffic Class field: This field defines traffic that must be prioritized.
o Flow Label field: This field enables the router to identify packets, and also handle packets
that are part of the identical flow in a special way.
Unlimited extension headers: You can add extension headers after the IPv6 header if you want to
extend IPv6 for any new features.
The Neighbor Discovery (ND) protocol for managing nodes on the same link: Neighbor Discovery
is a series of Internet Control Message Protocol for IPv6 (ICMPv6) messages that are used in
IPv6 environments to identify the relationships between neighboring nodes. ND enables hosts to
discover routes on the same segment, addresses and address prefixes. Address Resolution
Protocol (ARP), ICMPv4 Router Discovery and ICMPv4 Redirect messages are replaced with the
more efficient multicast and unicast Neighbor Discovery messages.
Design a Network – Assignment - Holland College Computer Network 51
ICAA5045C -
If you want an IP address to provide all services to the network, then each particular service must have a
unique TCP port or UDP port from that specific IP address. There are a number of well-known ports which
are used by the different services running on your computers.
The main port numbers used by protocols/services running on your computers are listed here:
Port 49; for Terminal Access Controller Access Control System (TACACS) and TACACS+
Port 389; for Lightweight Directory Access Protocol (LDAP) and Connectionless Lightweight
X.500 Directory Access Protocol (CLDAP)
“If DNS is setup incorrectly, over time your mail server IP will be added to blacklists. Nowadays
most E-Mail servers have some kind of spam protection service which in turn means that all your
inbound mail will be blocked if you do happen to be listed on a spam blacklist.
In this article I will describe how to correctly configure your MX and reverse DNS records for
your mail server. This article is based on an Exchange 2003/2007 server but every other
messaging server will follow the same principle.
Assigning an IP address
Starting from the bottom up the first thing you need to do is assign a static external IP address to
the internal private address of your mail server. You will need to apply these rules on your
firewall to port forward SMTP (port 25) and NAT an external IP address to the internal address
of the server.
Something that a lot of administrators forget to do or check is to set the outgoing NAT rule to
use the same external IP address created for the inbound rule to the mail server. If this isn't set,
Reverse DNS will not match and in turn your mail server will be listed on blacklists. If your
firewall rules are setup correctly the IP address listed on this page should be the same IP address
you mapped to the internal private IP address of the mail server.
For the purpose of this example, listed below are all the details of my mail server to help you
understand what you need to do.
You will need to be an administrative contact for your External DNS provider for your domain to
make these changes. In most cases this can be done through an online control panel through your
DNS provider. Failing that on the phone or via E-Mail.
1. The first thing we need to do is create an A record to point to the external IP address mapped
on your firewall to the mail server. The host A record can be called any thing but is commonly
called "mail". In our example we will create "mail.domain.com" to point to IP address
"87.22.1.22"
2. Next we will create an MX record to point to the newly created A record of our mail server.
Within your DNS control panel select "add MX record". Make sure that the host address is the
root domain name in our case "domain.com"
Set the FQDN as the A record we just created which in our case is "mail.domain.com".
The lowest property is the most preferred but in our example we will set the priority as 10.
It can take up to 48 hours for DNS to propagate but in most cases 12-24 hours. To check our
DNS entries are applied and correct we can use nslookup.
> domain.com
Non-authoritative answer:
Reverse DNS is used to verify that the mail server is who it says it is. The recipients mail server
will do a reverse lookup to make sure that the IP address of the mail A or host record in DNS is
Design a Network – Assignment - Holland College Computer Network 54
ICAA5045C -
the same as the IP address it is communicating with. Only 1 RDNS entry can be present per IP
address.
To do this you will need to contact your ISP to make this entry. You will not be able to do this in
your DNS control panel unless your ISP also host your DNS and give you the functionality to
add your own RDNS records.
In our case we would contact our ISP and advise that we would like to create an RDNS entry for
our IP address 87.22.1.22 which would resolve too mail.domain.com.
Again it can take up to 48 hours for DNS to propagate but in most cases 12-24 hours. To verify
that the RDNS entries have been added and are correct do the following:
2. Type Ping -a 87.22.1.22 (This is the external IP address for your mail server. In our case we
use our external IP address stated above)
C:UsersUser>ping -a 87.22.1.22
SMTP Banner
Every time a mail server establishes a connection with your mail server it shows its SMTP
banner. This banner must be resolvable on the internet and best practice is to have it as your mail
host/A record.
3. Expand Servers.
4. Expand YourServerName.
7. On the right window, right click the Default SMTP virtual Server (Or the name you set
your SMTP Server) and
select Properties.
10. Under the Fully-qualified domain name type mail.domain.com (The A/Host record you
created in DNS for your mail server)
6. On the General tab under the Set the FQDN this connector will... type the A record domain
name you created. Which in our case is mail.domain.com. Click OK.
7. Under the Server Configuration container click the Hub Transport container.
8. In the Right window Select the properties of the Receive Connector under Receive
Connectors tab.
9. On the General tab under the Set the FQDN this connector will... type the A record domain
name you created. Which in our case is mail.domain.com. Click OK
To verify these changes we can use telnet to view the output upon establishing a connection on
port 25 to our mail server. Use the following steps to do this:
The output you see should look something like this and contain your A record of your mail
server:
Design a Network – Assignment - Holland College Computer Network 56
ICAA5045C -
If you use an edge server or a SPAM filter appliance like a Barracuda the SMTP banner will
have to be set on this device/server.
Check to see if your mail server is on spam lists and/or an open relay
A great website to use to check your MX records, RDNS, check if your mail server is an open
relay and check to see if you are listed on spam lists is www.mxtoolbox.com. This is a great site
and one to keep in your favourites.
Following these guide lines will successfully and correctly configure mail routing to and from
your mail server. The next step is too secure and ensure your mail server is not an open relay. I
will be writing a separate article dedicated to this in the near future.
If you would prefer to not experience the stress in looking after and maintaining an Exchange
server environment you may choose a hosted exchange server solution instead.
Mike Collins has over 10 years experience in computing and is a senior IT Consultant at Sphere
IT Consulting”
Source : http://ezinearticles.com/?Configure-Exchange-E-Mail-Server-Reverse-DNS-and-MX-
Records-Correctly&id=3844191
(b) Description of the file servers and NOS, and why they were selected.
There are 5 Main servers in the Holland College Network. The three Domain and file servers for
classrooms and Administration, a e-mail server for Microsoft exchange and the proxy server which will
act as a filter for websites. The servers were chosen because of the geographical area they are in also
for their performance . Hardware Performance specifications for the 5 main servers are.
Design a Network – Assignment - Holland College Computer Network 57
ICAA5045C -
Dell aims to add value to your business by providing the features you
need without a lot of the unnecessary extras. Our goal is to deliver value
through tailored solutions based on industry standards, as well as
purposeful, innovative design.
Purposeful Design
Design a Network – Assignment - Holland College Computer Network 58
ICAA5045C -
Built with the latest quad-core Intel® Our high efficiency, low-flow fans are In addition, the T110 features up to
Xeon® processor inside, the designed to spin faster in accordance four hard drives for your most
PowerEdge T110 can easily handle with server workload demands. This important data and customer
day-to-day computing and file storage helps to reduce unnecessary noise information. It also features basic
demands. when possible and keeps the server systems management designed to
cooler in your office environment. enable easy system monitoring and
alerts to help ensure reliable
performance day after day without
interruption.
Solid Security
http://www1.ap.dell.com/au/en/business/servers/poweredge-t110/pd.aspx?refid=poweredge-
t110&s=bsd&cs=aubsd1
The Network Operating System Microsoft server 2008 was chosen for Holland College to network with
the Microsoft Windows 7 workstations. The email server and proxy host will also use Server 2008.
Microsoft is the most widely deployed and well respected operating system provider.
A table of all hardware costs is included in this document under Task 9. The total hardware cost
of this scoping study is $244,387.67. Considerable savings to this amount are envisaged if
Holland College can negotiate with vendors. Also vendors usually give discounts for multiple
purchases. The price displayed in this report mostly is the full recommended retail price. I
would recommend to Holland College to source at least three independent prices before
purchasing from individual vendors.
A table of all software costs is included in this document under Task 10. The total software cost
of this scoping study is $308,167.85. Considerable savings to this amount are envisaged if
Holland College can negotiate with vendors about the use and license agreements. Also vendors
usually give discounts for multiple purchases. The price displayed in this report mostly is the full
recommended retail price. I would recommend to Holland College to source at least three
independent prices before purchasing from individual vendors.
(e) The total cost of networking Holland College would be $552,555.52. The total cost of
networking the Administration building only: -
- Total $143,081.85
Design a Network – Assignment - Holland College Computer Network 61
ICAA5045C -
Intel Core i5
ProcessorSuper Fast
1333 FSB Speed
CPU4GB DDR3
MemoryPowerful
AMD ATI HD5770
1GB Graphics Card
Processor
Intel® Pentium® $1549.00 3 $4,647.00 C
Processor G6950
(2.80GHz, 3MB L2
Cache, 1066MHz FSB)
(d1)
Design a Network – Assignment - Holland College Computer Network 62
ICAA5045C -
Microsoft® Exchange
(g) Standard CAL Single
License/Software
$10.00 26 $26.00 G
Assurance Pack
Academic OPEN User
CAL User CAL
(g) Microsoft® Windows
Web Server Sngl
License/Software
$162.00 1 $162.00 G
Assurance Pack
Academic OPEN 1
License
(g) Microsoft® $291.00 3 $873.00 G
Design a Network – Assignment - Holland College Computer Network 63
ICAA5045C -
5 * Public IP4
addresses
1 off Fee $4,175.00 1 $4,175.00 L
Yearly Fee $23,230.5 1 $23,230.50
0
$5,991.69 1 5,991.69 M
QLOGIC SANBOX
5802V FABRIC SWCH-
8GB PT ENABLED PLS
4
$799.00 5 3,995.00 N
HP LaserJet P2050
Printer series -
Specifications
$1,200.00 2 $2,400 P
(f) Explain why you are recommending each item of equipment in Task 9, and how the
recommended system meets reliability goals.
Design a Network – Assignment - Holland College Computer Network 67
ICAA5045C -
(e) NEW BOXED SEALED New box sealed product with Data will be able to be backed up
HP LTO-3 warrenty
ULTRIUM 960 SCSI
TAPE ARRAY DRIVE
Q1540A
(f1) RJ 45 Connectors Needed for 100Base TX network New product with warrenty
(f) Safe non toxic burning in case of Needed for fast Ethernet
New Cat5e Cat 5E
fire
CMP 4/24 Plenum
Bulk Cable 2000ft
Microsoft® Exchange
(g) Standard CAL Single
Microsoft Cal needed to comply If Microsoft need to come to service
License/Software
with Microsoft license software company is fully compliant with
Assurance Pack
agreements Software license agreements
Academic OPEN User
CAL User CAL
(g) Microsoft® Windows
Web Server Sngl
License/Software Web Server needs to be operating 23hrs
Web Server Assurance of service
Assurance Pack 7days week
Academic OPEN 1
License
(g) Microsoft®
Windows® Server
Standard Single Servers need to be reliable and Ensures that Microsoft will fully support
License/Software on line 23hrs day 7 days week our Servers when we need help
Assurance Pack
Academic OPEN
(g) If Microsoft need to come to service
Microsoft Cal needed If Microsoft need to come to
to comply with service software company is fully software company is fully compliant with
Microsoft license compliant with Software license Software license agreements
Design a Network – Assignment - Holland College Computer Network 69
ICAA5045C -
(h) Microsoft® Exchange Microsoft Exchange Server 2008 If Microsoft need to come to service
Design a Network – Assignment - Holland College Computer Network 70
ICAA5045C -
(k) Manufacturer: Cisco Vlan for the backbone of the High Quality part from Cisco reliability and
Part Code: WS- Network. Cisco is the leading performance.
C2950SX-48-SI manufacturer of switches
Form Factor: External
- 1U
RAM: 16 MB
Flash Memory: 8 MB
Ports Qty: 48 x
Ethernet 10Base-T,
Ethernet 100Base-TX
(l) Cisco Catalyst Vlan for the backbone of the High Quality part from Cisco reliability and
2950SX-24 - switch - Network. Cisco is the leading performance.
24 ports manufacturer of switches
10 * Public IP4 IP4 addresses are the network Needed DNS and E-mail servers. Needed
addresses addressing system for the for web presence for Holland College
1 off Fee internet
Yearly Fee
Fiber Switch to enable fast To ensure network speed and efficiency.
QLOGIC SANBOX connections between servers.
5802V FABRIC SWCH-
8GB PT ENABLED PLS
4
HP is the leading printer Quality products = quality results for our
manufacturer. staff.
HP LaserJet P2050
Design a Network – Assignment - Holland College Computer Network 71
ICAA5045C -
Printer series -
Specifications
Cisco 12000 Series The connection to the internet for Brand name product. High quality and
Router Gigabit our staff. Fiber channel. Fast. very fast speed.
Ethernet Line Card With a quality manufacturer Cisco
Needed for IT staff to manage Will ensure Holland College Staff are able
and configure the fiber backbone to fix and diagnose problems with the
Fibre cable course of the network fiber network quickly and efficiently.
“Everyone would like a network that was up 100% of the time, but no one can really
afford that. Getting that last 1% is incredibly expensive. A network that's up 99% of the
time is actually a pretty easy thing to achieve -- that's 15 minutes of downtime each day
or a small blip of an outage every hour and a half. So it's important to set expectations
that no network is perfect, but there are certain things that you can do to improve
uptime.
The difference between something that's up 99.95% of the time and something that's up
99.96% of the time is difficult to design around. We don't have that kind of granularity in
network engineering.
Let me break [service-level agreements] down into a couple of different buckets. The
first bucket is one-day return to service. This is a problem that might take a day to fix.
Network equipment vendors often offer a service contract that lets them replace a part
within four hours. That doesn't mean that the outage will last four hours, because it often
takes a couple of hours to diagnose a problem, four hours for the part to arrive and a
couple of hours to install it. But for some networks, that's sufficient for what they need.
It's not the solution that most people want, especially if the company has maybe more
than 50 people or more than three or four locations.
The improvement would be the next bucket, which is called N+1 redundancy. This
means that any one component can fail and the system keeps working. So to achieve
that, you have to have redundancy in the network. For example, a router might need
two fans to keep it cool, but you would buy a model that has three fans -- any one can
fail and the system can keep running. That's what's called N+1 redundancy -- the N is
what's required for the system to keep running, and the 1 is for redundancy.
Design a Network – Assignment - Holland College Computer Network 72
ICAA5045C -
Most equipment nowadays, especially networking equipment, is assigned with all N+1
redundancy on the internal parts, and that can really improve the service-level
agreement, because now you're in a situation where a part that fails does not
automatically equal an outage. If it's one of the few parts that isn't redundant -- for
example, if there's only one network connection between point A and point B -- all the
fans and CPUs in the routers could be redundant, but if they're connecting a single point
between two buildings, and that link goes down, then you're going to have an outage.
So the third bucket is system-wide N+1 redundancy. That's where we have redundancy
not just on the internal links in the equipment, but for all the network links also. For
example, you'd have dual network connections to a wiring closet or between offices.
Especially if you're going between offices, it's important that the two connections are
diversely routed, so that one backhoe doesn't ruin your whole day.
Service-level agreements can be even more protective that that, but usually [additional]
requirements like that are from companies that engineer their own solutions.
Lastly, there are hybrids. So for example, a company with many sites will have a high
service-level agreement for their medium and large offices, where everything is
redundant. But for the smallest of offices -- maybe they have dozens and dozens of
offices with just one or two people, maybe sales offices, scattered all around the world --
often you'll see a different service-level agreement for those offices, where if the router
dies, those people are just going to work off the Wi-Fi from their local Starbucks until the
office can be brought back online.
One should measure application requirements from real-world examples, so if you can
spend time monitoring the network to determine average bandwidth used by certain
applications, you're going to be able to do a much better job.
Latency is another quality that you should investigate. Some applications require low-
latency networking, like NFS, [which] really requires less than two milliseconds of
latency, while other things, like FTP, can work on very high-latency networks.
Q4: What networking skills does your client's in-house IT staff have?
Finding out what skills the client has in-house is important because it determines [at]
what technical level you'll be able to have your conversation, but also what technical
involvement [the client] wants after the installation is done.
Design a Network – Assignment - Holland College Computer Network 73
ICAA5045C -
Are they highly technical and just want assistance designing and spec-ing out the
details of a network design, and then they're going to run the network after that? Maybe
they want project management help, or the nontechnical process of making sure you're
coordinating all the vendors and making sure everything gets done.
Are they just somewhat technical? Maybe they can handle add/move/change requests,
but [are] not technical enough to configure new VLANs or add new connections to new
buildings.
Or maybe they're not technical at all and need a fully managed solution where you're
monitoring remotely and you're contacting them about periodic maintenance and that
kind of thing.
Often clients want some kind of hybrid. Their requirements or their skill level for the LAN
is different from the WAN. Typically [these] users can support their own LAN, ports and
add/move/change requests themselves but want a more managed solution for the WAN
because that's often dealing with vendors and telecoms and a whole different set of
terminology.”
Source :
Q1 Ian Good
You finally have the consulting project you've been waiting for: A customer is building a new office and
has asked you to design their entire local area network (LAN), as their present infrastructure is outdated
and has ports failing by the day. This is a consultant's dream! However, it can become a nightmare for
you and your company if you design the network improperly. Let's look at some big network design issues
to consider when designing a new LAN for your customers.
Switches and routers come with hundreds of features and functions. However, engineering too many bells
and whistles into the network can create support problems in the future, if the customer's IT staff does not
have some basic understanding of the features and functions you implement. Recognize the business's
needs without making the network overly complex.
More and more customers are deploying wireless LAN technology and IP telephony. Wireless LAN
access points are easiest to install when Power over Ethernet (PoE) is available. IP telephony utilizes
phones that connect to and draw power from the LAN. The days of the traditional PBX system are
numbered; every vendor out there is moving towards IP PBX systems and handsets. Many customers will
tell you "We are not using wireless," or "We will never move to IP telephony." They may not now (at least
as far as their manager knows), but if you do a good job on this project, your customer will keep their
equipment for at least three to five years. You'll do a great service to your customer if you can convince
them to purchase PoE switches now. Then, when the CIO decides to move to WLAN or IP telephony in
18 months, the non-PoE switches won't have to be replaced.
Just because 10 Gigabit Ethernet is here today and higher speeds are coming does not mean that you
need those ports all over the LAN. All too often customers purchase the fastest equipment possible
thinking they need it, even though their existing 100 Mbps network is only running at 5% capacity. While it
is definitely prudent to ensure that core switches can support these higher speeds, you may be advising
the customer to waste a lot of money if you tell them that 10 Gigabit switches are needed everywhere.
Redundancy.
Network uptime becomes more critical every year. Spend time planning a design that provides network
redundancy from a physical and logical perspective. For example, utilize dual fiber-optic uplinks from the
wiring closets to the core switches. Ensure that chassis-based core switches have dual CPU cards. Be
sure to think about items like default gateway redundancy. You can design the most redundant physical
network in the world, but if it's not properly configured to provide Layer 3 IP Default Gateway redundancy
and a failure occurs, your customer's network will grind to a screeching halt and you can be sure they will
call you to ask why.
When designing a corporate network, try to standardize on a few different types of devices, as opposed to
using a different type of switch in every wiring closet, even if all your equipment is from the same
manufacturer. Standardizing on a few different types of hardware simplifies configuration and
troubleshooting. It also allows the customer to keep cold spares of each device with next-business-day
maintenance, allowing for more rapid and cost-effective responses to device failures.
While these always seem to be left off purchase orders, network management tools are invaluable in
providing maximum network uptime. Software that periodically backs up all device configurations to a
share on the network is simple but extremely useful. Also, think about the following scenario: Two
switches provide IP Default Gateway redundancy on your customer's network. One of them fails, but you
don't realize it because the network is redundant. When the other one fails, the customer experiences a
total network outage. This can be easily avoided by using a simple tool to ping all network devices and
report on their status.
There are many more items to think about when designing a local area network for your customer. These
are some of the big ones that will hopefully get you pointed in the right direction and, more importantly,
provide you with a happy (and returning) customer.
Design a Network – Assignment - Holland College Computer Network 75
ICAA5045C -
Bibliograpgy
Page Reference
2,3 Network design documentation Ian Good
4 http://wiki.answers.com/Q/What_are_the_benefits_of_computer_networking
4 http://www.webopedia.com/TERM/N/network_computer.html
10,11 http://articles.techrepublic.com.com/5100-10878_11-5032914.html
11,12 http://articles.techrepublic.com.com/5100-10878_11-5032914.html
12,13 http://en.wikipedia.org/wiki/Plenum_cable
13 http://www.lanshack.com/fiber-optic-tutorial-network.aspx
13-19 http://www.cisco.com/en/US/products/hw/routers/ps133/products_tech_note09186a00801f
5d9e.shtml
21 http://medschool.ucsf.edu/isu/pdf/Security/password_management.pdf
35,36 http://en.wikipedia.org/wiki/Network_topology
38-43 Methods and Formulas Used to Determine Server Capacity Ian Good
43-46 Methods and Formulas Used to Determine Server Capacity Ian Good
47 http://submit.apnic.net/cgi-bin/feecalc.pl?ipv4=10&ipv6=&action=Calculate
52,56 http://ezinearticles.com/?Configure-Exchange-E-Mail-Server-Reverse-DNS-and-MX-Records-
Correctly&id=3844191
57-59 http://www1.ap.dell.com/au/en/business/servers/poweredge-t110/pd.aspx?
refid=poweredge-t110&s=bsd&cs=aubsd1
Design a Network – Assignment - Holland College Computer Network 77
ICAA5045C -
Page Reference
Q1 Ian Good
72-74