You are on page 1of 77

ICAA5045C - Design a

Network
Chris Hutton -
7105090610

Major Assessment : -
Holland College Project

Chris Hutton - #7105090610


Design a Network – Assignment - Holland College Computer Network 2
ICAA5045C -

“Network design documentation Ian Good

Solution providers embarking on a network design project face an enormous documentation problem. In
many cases, clients provide inadequate network design documentation or no network documentation at
all. This forces providers to deliver inaccurate quotes, resulting in wasted time and resources. Other
clients may not understand the importance of network documentation, and forego documentation services
or squander the documentation that a provider does deliver.

Obtaining and supplementing current network design documentation

Solution providers should obtain as much network documentation as possible before embarking

on a design or redesign. The form and detail of any network documentation can vary between clients.
Solution providers should expect to have enough information to understand the business requirements for
the network; growth estimates for the network; applications running on the network; network storage
needs; external network access requirements; remote network access requirements; and network support
needs within the environment.

In practice, however, clients often have little to no network design documentation available -- or choose
not to share that documentation with providers during the pre-assessment or bidding process. This
presents a dilemma for providers who then must make an additional investment in network discovery or
risk underbidding the job. "Many consultants lose money on the first job because they don't do enough
discovery work to give an accurate quote," said Karl Palachuk, CEO of KPEnterprises Business
Consulting Inc. [www.kpenterprises.com] in Sacramento, Calif.

Client server migration is often a "first engagement" for a solution provider, but it's also one of the most
complex tasks to tackle. Without adequate network design documentation, solution providers may find
themselves quoting a complicated job with little tangible information. Palachuck underscores the
counterproductive effects of withholding documentation. "Clients are reluctant to give out too much
information before they choose a consultant to do the job," he said. "But that just means they are forcing
the consultants to give them bad estimates of the actual job!"

Any documentation presented by the client should be used cautiously. "Even if they have docs, they're
often not right," said Adam Gray, chief technology officer of Novacoast, an IT professional services
company headquartered in Santa Barbara, Calif. Mistakes may be present in the original documentation,
and changes (especially small changes) frequently go unrecorded. "Never trust any work that was done
before you. Always double-check the work you're looking at," Gray said.

Some solution providers circumvent potential problems by adding an initial discovery process to the
project. "We almost never get any documentation," Gray said. "We typically have to build in a
requirements assessment as part of a project. At the end of that requirements assessment, there's a
possible scope change based on findings." Any signed contracts should include a clause that
accommodates scope and price changes based on assessment results.

There are additional tactics to consider when initial network design documentation is scarce or
nonexistent. The first option is to price the job based on time and materials, avoiding the risk of
guesswork entirely. Another approach is to document the client's environment for them as a promotional
opportunity. "For example, we can do PC tune-ups," Palachuck says. "Then we document everything we
see and everything we touch." The insights gained during such initial jobs can help providers understand
Design a Network – Assignment - Holland College Computer Network 3
ICAA5045C -

the environment, find where critical information is stored and so on. Solution providers may rebate some
(or all) survey costs as a promotional tool when bidding on the "real" network design job.

Solution providers can use network discovery products and other tools to help speed their assessment or
spot-check the details of some documentation. For example, Microsoft's Business and Technology
Assessment Toolkit [https://partner.microsoft.com/40025740] helps consultants gather information about
the client's environment. There are also many powerful tools that can map networks and analyze
infrastructures, such as SolarWinds' LANsurveyor [http://www.solarwinds.com/products/LANsurveyor/].

Delivering network design documentation to the client

A proposal contains a summary of the client's objectives, a confirmation of the project's scope (including a
description of the intended architecture and suggested equipment), a description of the intended project
(including any assumptions made), along with a phased deployment plan and a diagram of the expected
network architecture. There may be additional elements, and the level of detail can vary depending on the
project and its complexity.

"We very rarely put any network documentation in a proposal," Palachuck said. All of the meaningful
documentation generated during a network design project should be presented to the client at the
project's conclusion. A completed network design documentation package can contain considerable
detail. Content can include a summary of the project and its individual deployment phases, a detailed
diagram of the actual network architecture, executive and detailed deployment plans, a WAN diagram
listing geographic locations of all business installations, floor plans for each location, data and voice
wiring jack maps, annotated LAN and other infrastructure diagrams, power and cooling details and
specifications, and architectural diagrams (if appropriate) showing conduits and other relevant network
details.

"The basics would include a network diagram, a spec sheet for each machine including servers and
workstations, a description of the IP scheme, a list of all the equipment passwords, and an up-to-date
description of the backup strategy," Palachuck said.

The package may be daunting, but the goals are clear. "A client needs enough documentation to
completely re-create the client's computing environment in case of a disaster. They also need enough
detail to make regular maintenance fast and efficient," Palachuck said, noting an incident where a client
was obligated to buy a new firewall because the prior solution provider failed to provide the necessary
administrative credentials. A client should expect (and deserves) a complete suite of documentation.

While there are no limitations on the detail for the client, there can be too much information. For example,
listings of software components installed on every system are easily generated, but contain little practical
information for the client or future technicians. The challenge in producing documentation is to strike a
balance between detail, cost and the client's business efficiency. "Ultimately, logical network diagrams
won't mean anything to the business analyst," Gray said. "All they care about is that the thing works, it
stays up, it's stable, and that it provides the level of service they're expecting."

Solution providers rarely focus their business on developing or updating client documentation. While it's
certainly possible, clients are hesitant to buy and pay for a separate documentation package unless
they've had documentation problems in the past. Instead, providers include documentation in the current
job, and then update documentation as part of subsequent jobs. Managed services may also include
regular documentation maintenance as a standard service. Solution providers often chose to retain a
copy of the client's network design documentation. This not only provides a duplicate if the client should
lose their copy, but it also makes service more efficient for technicians that visit the client regularly”.
Design a Network – Assignment - Holland College Computer Network 4
ICAA5045C -

Source : Network design documentation Ian Good

Task 1
Describe How a Network would benefit each of the following groups

(a) The Management Team

The introduction of Networked computers into the administration area of Holland College will
improve the ability of staff to interact with one another. It will streamline communication and
resources and give administration staff more ability to manage areas of responsibility more
effectively.

“Some benefits of computer networks are given below.


(1) Computers which are connected through a network can share resources as hard drives,
printers, scanners etc with each other.
(2) They can send file from one computer to another quite easily.
(3) You can connect all the computers which are connected through a network to the internet
by using a single line. So it means that you can save the connection cost for each computer but
you internet connection must be fast.
(4) IF you want to access data from the other computer which is the part of network then you
can access data from that computer.
(5) Users can run those programs which are not installed on their computers but are installed on
any other user's computer.”

Source : http://wiki.answers.com/Q/What_are_the_benefits_of_computer_networking

“One of the strongest arguments behind network computers is that they reduce the total cost of
ownership (TCO) -- not only because the machines themselves are less expensive than PCs, but also
because network computers can be administered and updated from a central network server”

Source : http://www.webopedia.com/TERM/N/network_computer.html

- Kathy Jackson – President


Design a Network – Assignment - Holland College Computer Network 5
ICAA5045C -

The ability to Network Computers will benefit the President of Holland College by allowing
her to monitor and have access to all computers from her office. The President will not have
to leave her office to deliver information and to get resources. The President will also have
the ability to manage resources and staff from her office. Networked computers allow for
better resource allocation and therefore long - term cost savings with better staff
productivity. The President would have the ability to assign access and manage different
domains within the college. Therefore allowing different access to different users.

- Reuben Asimow – Vice-President of Administration

The ability to network computers would benefit Reuben Asimow the Vice-President of
Administration. He would have the ability to access and give staff resources from any
computer in his domain. The computer network also could give the administration area the
ability to share resources. Every staff member would not need printers and scanners. These
devices can be set up as shared resources for all the administration area to use. The use of
internal Email and even Voice over internet protocol, (VOIP) could allow even more cost
savings and productivity.

- Howard Victor –Vice-President of Instruction

Howard Victor the Vice-President of Instruction would be able to interact and monitor staff
usage of all computer use from his computer. He can access the Registrars computer to
check enrollments. He would also be able to monitor and manage the student services from
his desktop. He would have the ability to share information with any computer within the
administration domain. He could develop web enabled content about his areas of
responsibility on his computer and allow users in his domain to access and manage this for
him.

- Nicole Estes – Director of Development

The Director of Development MS Nicole Estes will be able to share information about future
projects and the strategic direction of Holland College with fellow co- workers. The ability to
network computers can allow Nicole access to important information from other
departments easily. She can search for information from her office without having to
interrupt staff members. She will have the ability to communicate with fellow co- workers
Design a Network – Assignment - Holland College Computer Network 6
ICAA5045C -

and have internet access through the network. She can share resource with fellow team
members.

(b) The Business Office -Jackie Herrera –Business Manager

The Business Office could implement an intranet for all business activities. Payroll, receipts and
Invoices can be developed into an enterprise solution. Different users and groups can be
managed by a domain controller. This organizes the company into logical groups and users who
have different permissions and access to their area of responsibility. The business office would
benefit from the deployment of a computer network.

(c) The students and staff of each faculty using computer labs

Students would benefit from a computer network with increased access to computer based
services and training. Computers are very good at delivering complex information. The
Graphical user interface can manipulate information and make it more user friendly. The ability
to network and to use shared resources will make the cost of training by computer more
economical. Users can run programs which are not installed on their computers but are
installed on any other user's computer.

(d) Yourself, as the PC Co-ordinator

Network computers can be administered and updated from a central network server. The network will
also reduce the total cost of ownership (TCO). Users will be able to have increased ability to interact and
Design a Network – Assignment - Holland College Computer Network 7
ICAA5045C -

share resources. The Network if set up properly will be more secure. Users will be assigned different
levels of access and control. The Network has the ability to grow and develop with the business and
student needs.

Task 2 & 3

Inventory of Computers, Operating Systems and Software used at Holland


College.

Classrooms
Units
Location CPU Ram Hard O.S Software
Drive
Math and 10 Intel Core 2 512MB 80GB Windows Microsoft Office
Science Lab Me 2000, Math CAD,
????? Auto CAD, SAS, C++
Compiler, Visual
Basic 6
12 Intel Core 2 1GB 80GB Windows Microsoft Office
Math and Me 2000, Math CAD,
Science Lab ????? Auto CAD, SAS, C++
Compiler, Visual
Basic 6
Total Math and 22 22 Intel core 2 10 * 512MB 22 * 80Gb 22 Windows 22 * Microsoft
Science 12 * 1GB Me ???? Office 2000
22 * Math CAD
22 * Auto CAD
22 * SAS C++
22 * Compiler
22 * Visual Basic 6
English and 24 Intel core 2 256MB 40GB Windows Microsoft Office
Writing ME 2000, Publisher
???? 2000, M/S Visio
2000, and M/S
Project 2000.
English and 11 Pentium 3 128MB 20GB Windows Microsoft Office
Writing ME 2000, Publisher
???? 2000, M/S Visio
2000, and M/S
Project 2000.
Design a Network – Assignment - Holland College Computer Network 8
ICAA5045C -

Total English and 35 24 * Intel Core 2 24 * 256MB 24 * 40GB 35 * 35 * Microsoft


Writing 11 * Pentium 3 11 * 128MB 11 * 20GB Windows Office 2000
ME ???? 35 * Publisher 2000
35 * M/S Visio 2000
35 * M/S Project
2000.

Administrative Offices
Units
Location CPU Ram Hard O.S Software
Drive
Angela Miles, HR 3 Pentium 4 128MB 20GB Windows ME Microsoft Office
Jackie Herrera, BM 2000
Sherry Parks, FM
Janice McKinney 2 Pentium 4 512MB 120GB Windows ME Microsoft Office
Ryan Mc Kim 2000
David 2 Pentium 4 256MB 120GB Windows ME Microsoft Office
Whitefeather 2000
Randy Thomas
John Dale 2 Pentium 4 512MB 20GB Windows ME Microsoft Office
Jill Sanchez 2000
Alice Yasui 2 Pentium 4 512MB 20GB Windows ME Microsoft Office
Dimitri Kasakav 2000, PC-based
financial aid
packages
Howard Victor 1 Intel core 2 512MB 320GB Windows Microsoft Office
2000 2000
Professional
Nicole Estes 1 Pentium 4 512Mb 500GB Windows ME Microsoft Office
2000
Steve Gaudio 1 Pentium 4 256MB 120GB Windows ME Microsoft Office
2000, FoxPro
database
Kathy Jackson 1 Pentium 4 512MB 120GB Windows Me Microsoft Office
2000
Bob Watson 1 Pentium 4 256MB 500Gb Windows Me Microsoft Office
Windows 2000
2000 Server C++ Compiler
ME!!!!!! 1 Pentium 4 1GB 500Gb Windows ME Microsoft Office
Chris Hutton Windows 2000, C++ compiler
2000 Server
Administrative 17 16 Pentium 4 1 * 1GB 3 * 500GB 1 * Windoss 17 * Microsoft
offices Total 1 Core 2 9 * 512 MB 1 * 320 GB 2000 Office 2000
4 * 256MB 6 * 120 GB Professional 2 * Financial Aid
3 * 128MB 7 * 20 GB 16 * Packages
Windows ME
1 * FoxPro
2 * Windows
2000 Server Database
Design a Network – Assignment - Holland College Computer Network 9
ICAA5045C -

2 * C++ Compiler

Total School Wide IT Equipment


Location Units CPU Ram Hard O.S Software
Drive
units Processor units Mb/Gb units GB
Total School
1 * windows
Wide 47 Intel Core 2 12 1GB 12 80GB 2000
Professional
11 512 MB 1 320GB Software
10 80GB units Packages
73 *
Totals
24 256 MB 24 40GB Windows
11 Pentium 3 11 128 MB 11 20GB ME 74 Microsoft
16 Pentium 4 1 1GB 1 500GB office 2000
2*
Windows
8 512MB 1 500GB 2000 Server 22 Math CAD
3 120GB
4 20GB
4 256MB 1 500GB 22 Visual
3 120GB Basic 6

3 128 3 20GB
Total 74 74 74 22 Auto CAD

24 SAS
22 C++ Compiler
35 Publisher
2000

35 M/S Visio
2000
35 M/S Project
2000

2 PC-based
financial aid
Packages
Design a Network – Assignment - Holland College Computer Network 10
ICAA5045C -

1 FoxPro
database

TASK 4
The benefits of internal e-mail would be the ability to manage and control e-mail settings and to have a
domain name that reflects the nature of your business. At Holland College the natural domain name for
their business could be xxxx@hollandcollege.edu.au

“One of the main things you’ll gain from setting up your own mail server is complete control over how
many mailboxes you can have, how those mailboxes are set up, and how they work. Are you running
into size limitations on your existing mail service? Does your current mailbox keep filling up or rejecting
your messages because they are too large? No problem! When you own the mail server, you can do
whatever you want. Go right ahead and send that 20 MB attachment to the remote office.

That brings up another important advantage that your own mail server can provide. You can extend the
benefits to others, hosting accounts for other branches or even partners. That’s particularly nice if
you’ve succeeded in securing a domain name for your company. The downside comes if your remote
sites and business partners start to rely a little too much on their mail accounts. If your Internet
connection goes down for a few days for reasons beyond your control, or your server suddenly develops
a bad case of virus-of-the-week, you don’t want people calling at 2 A.M. to complain about it. I’ve been
in the 24/7 support business and hated it. You will, too, if you get in that position. If you open your
server to others, make sure they understand that they get what they pay for and should have a backup
option, such as Hotmail or Yahoo. You should have a backup for your own e-mail account as well.

Autoresponders are another handy feature offered by many mail servers, and they're much like out-of-
office replies. For example, maybe you have a document you want people to be able to obtain simply by
sending a message to a specific account. A customer can send a message to
fudge@yourdomain.whatever and get back a reply with your favorite fudge recipe. Businesses often use
autoresponders to distribute information about products and services. Whether you manage services
for a commercial venture or run a small home business, autoresponders might add a new way for you to
interact with your customers.

Many mail servers offer features that make it easier to distribute mail to groups of people. While you
can create distribution lists with any e-mail client, creating groups at the server lets anyone send mail to
that group through a single e-mail address. Some mail servers give you the ability to send messages to
group members in round-robin fashion. This means that each new message gets sent to a different
person in the group. This is a great way to distribute messages evenly across the group, and it is typically
used to distribute sales or support requests.

Keeping out spam is another potential benefit to hosting your own mail server. While you can create
rules in your e-mail client to delete messages from specific senders, keeping out spam for several mail
Design a Network – Assignment - Holland College Computer Network 11
ICAA5045C -

accounts can be a headache, particularly if your current service doesn’t give you any spam-blocking
features. With antispamming built into the server, you can block mail from domains or specific senders
for all accounts.

Many mail servers also provide built-in virus scanning or can use add-ins to scan messages coming and
going through the server. You might use this in conjunction with client virus-scanning software to add
another layer of security for your home network.”

Source : http://articles.techrepublic.com.com/5100-10878_11-5032914.html

Disadvantages of setting up your own e-mail server would be cost and ongoing technical support costs.

The main advantage of setting up your email account on the web with an Internet Service Provider, (ISP)
would be cost and support. If there is a problem with the e-mail server it would be the ISP’s
responsibility. Less technical knowledge would need to be needed to configure and support the e-mail
network. Some ISP’s also support domain name hosting. For a fee all e-mail accounts could be set up
on the Internet providers e-mail server.

An in house e-mail Server could be set up with a dedicated e-mail program like Microsoft Exchange.

Some of the other issues are addressed in the following article.

“First, you’ll need your own domain if you want to receive messages directly to your server. You can
register your domain at Network Solutions, Register.com, Go Daddy, WebSite.ws and through other
domain providers. When you register a domain, you need to provide the IP address and host name of at
least one DNS server for your domain, although most registration services require two DNS servers. If
you run Windows NT Server or Windows 2000 Server, you can use the DNS service included in those
platforms to host your own DNS records. Otherwise, you can use a third-party DNS server application.

Next, you need to create or have your registrar create a host record in the DNS zone for your domain.
The host record associates a host name with an IP address. For example, the host name of my mail
server is mail.boyce.us. In addition to the host record, you also need an MX record. This mail exchanger
record tells other mail servers what address to use to deliver mail to your domain. Again, you need to
create the MX record on your own DNS server or have your registrar create it on its servers, depending
on where your DNS service resides. Both records need to point to your public IP address.

Now it’s time to hook up your server. If yours is like most networks with a broadband connection, you
have a small number of public IP addresses (perhaps only one), and all of your computers use private IP
addresses. The MX record must reference the public IP address because that’s the only one the outside
world can see. So, if your DSL router or cable modem is assigned the one public IP address, it needs to
forward the incoming SMTP traffic to the private IP of your mail server.

Check the documentation for the unit and see if it supports one-to-one Network Address Translation
Design a Network – Assignment - Holland College Computer Network 12
ICAA5045C -

(NAT). Many cable/DSL routers let you translate specific ports, so you would configure the unit to pass
port 25 (SMTP) from the public IP to the private IP of your mail server. If you’re using your own DNS
server, you’ll also need to translate port 53 to move DNS traffic to the private IP address of your DNS
server (probably the same computer that’s handling mail). If anyone, including you, needs to be able to
retrieve messages from the server outside of your network (such as from the Internet), you also need to
translate port 110 (POP3) from the public IP to the private IP of the mail server.

If your cable/DSL router doesn’t support NAT, you’ll have to either replace it or obtain a second public IP
address from your ISP. Then, set up the server with that IP address. How you hook the server into the
network depends on the type of equipment you use, so check with your ISP if you aren’t sure.

The last step is to install the mail server software and start setting up and configuring accounts. You’ll
also need to set up DNS and get that working if you'll be providing your own DNS services. Then, you can
start e-mailing to your heart’s content”

Source : http://articles.techrepublic.com.com/5100-10878_11-5032914.html

Task 5
(a)

The type of network that would provide the best reliability and performance for Holland College would
be an Ethernet. A wireless network could be susceptible to interference and poor reception areas. To
ensure reliability and connectivity at all times an Ethernet network is recommended.

(b)

The network topology recommended for best performance would be a star topology. This is where
every computer is connected to the switch. This ensures that no data collisions occur and streamlines
data throughput.

(c)

I would recommend Holland College to install fiber optic cabling. This will ensure the network will be
able to take full advantage of the new National fiber optic network. Fiber optic cabling would be the
ideal solution because of its speed. A 1000Base-SX Fiber optic Network was chosen because of its
speed. The 1000Base SX would be the backbone of the computer network. The vlan switches would be
connected to fiber optic cable. The networked computers would connect to the vlan with UTP copper
wire. The network after the Vlan would be based on the 100Base TX standard. Category 5e would be
used. Consideration would be given to Government laws regarding cabling rules and regulations. In
particular putting plastic cables into air conditioning spaces. A plenum cable must be used in air
circulation areas.
Design a Network – Assignment - Holland College Computer Network 13
ICAA5045C -

Plenum cable is cable that is laid in the plenum spaces of buildings. The plenum is the space that can
facilitate air circulation for heating and air conditioning systems, by providing pathways for either
heated/conditioned or return airflows. Space between the structural ceiling and the dropped ceiling or
under a raised floor is typically considered plenum; however, some drop ceiling designs create a tight
seal that does not allow for airflow and therefore may not be considered a plenum air-handling space.
The plenum space is typically used to house the communication cables for the building's computer and
telephone network; however, it has been proposed that the growing abandonment of cable in plenum
spaces may pose a serious hazard in the event of a fire, as once the fire reaches the plenum space the
airflow present in the space supplies fresh oxygen to the flame and makes it grow much stronger than it
would have otherwise been. Recent testing by the American Society of Heating, Refrigerating and Air-
Conditioning Engineers (ASHRAE) has shown that while flame spread is limited by accumulated cable
bundles, other structural concerns may still exist due to increased load on suspended components. As
plenum spaces are restricted from use as areas for storage, the principle behind removal of abandoned
cable is that regulated removal prevents the use of plenum spaces as a storage area for abandoned
cable. Additionally, no high-voltage powered equipment is allowed in the plenum space because
presence of fresh air can greatly increase danger of rapid flame spreading should the equipment catch
on fire.

Source : http://en.wikipedia.org/wiki/Plenum_cable

“Why Use Fiber?

If fiber is more expensive, why have all the telephone networks been converted to fiber? And why are all
the CATV systems converting to fiber too? Are their networks that different? Is there something they
know we don't? Telcos use fiber to connect all their central offices and long distance switches because it
has thousands of times the bandwidth of copper wire and can carry signals hundreds of times further
before needing a repeater. The CATV companies use fiber because it give them greater reliability and
the opportunity to offer new services, like phone service and Internet connections. Both telcos and CATV
operators use fiber for economic reasons, but their cost justification requires adopting new network
architectures to take advantage of fiber's strengths. A properly designed premises cabling network can
also be less expensive when done in fiber instead of copper.”

Source : http://www.lanshack.com/fiber-optic-tutorial-network.aspx

Table 1 — Operating range for 1000Base-SX over each optical fiber

Fiber type Modal bandwidth Minimum range


Design a Network – Assignment - Holland College Computer Network 14
ICAA5045C -

(MHz· km) (meters)

62.5 µm MMF 160 2 to 220

62.5 µm MMF 200 2 to 275

50 µm MMF 400 2 to 500

50 µm MMF 500 2 to 550

62.5/125µm Fiber 50/125µm Fiber


Siemon Product
Solution Solution

FJ2-SCSC5MM-
(A) Fiber Jumper FJ2-SCSC-MM-03
03

(B) Fiber Enclosure RIC24-F-01 & (4) RIC-F-SC6-01

(C) Fiber Connector FC2-SC-MM-B80

(D) Fiber Connector FC2-SC-MM-B80

(E) Work Area Outlet


MX-FP-S-02-02 & MX-SC-02
Assembly

FJ2-SCSC5MM-
(F) Fiber Jumper FJ2-SCSC-MM-03
03

Customer Supplied

(1) 1000BASE-SX/LX Hub Customer Supplied Item

(2) 2-strand Horizontal


62.5/125µm Fiber 50/125µm Fiber
Optical Fiber

(3) Work Area Equipment

Source :

http://www.siemon.com/us/applicationguide/1000basesxlx.asp
Design a Network – Assignment - Holland College Computer Network 15
ICAA5045C -

“100BaseTX Cable Specifications

Which Cable Do I Need?

The table below helps you determine which type of cable you need for your setup.

Workstatio
  Hub Switch Router
n
Crossove Crossove
Hub Straight Straight
r r
Crossove Crossove
Switch Straight Straight
r r
Crossove
Router Straight Straight Crossover
r
Workstatio Crossove
Straight Straight Crossover
n r

Ethernet Cabling Guidelines

The table below lists the Ethernet cabling guidelines for 10BaseT and 100BaseTX cables.

Specifications 10BaseT 100BaseTX


 With Class I
repeaters: 1
Maximum number
of segments per 5
 With Class II
network
repeaters: 2

Maximum hop 4  With Class I


count1 repeaters:
none

 With Class II
Design a Network – Assignment - Holland College Computer Network 16
ICAA5045C -

repeaters: 1

Maximum number
of nodes per 1024 1024
segment
UTP, UTP category 5 or
Cable type required category 3, Shielded twisted pair
4, or 5 (STP)

1
Hop count = Routing metric used to measure the distance between a source and a destination.

Ethernet Version 2 and IEEE 802.3 Physical Characteristics

The table below lists the Ethernet version 2 and IEEE 802.3 physical characteristics of the
different Ethernet cables.

IEEE 802.3
  Ethernet
10Base5 10Base2 10BaseT
Data rate
10 10 10 10
(Mbps)
Signaling
Baseband Baseband Baseband Baseband
method
100
Maximum
(Unshielded
segment 500 500 185
twisted pair
length (m)
- UTP)
50-ohm 50-ohm 50-ohm Unshielded
Media coax coax coax twisted pair
(thick) (thick) (thin) (UTP)
Topology Bus Bus Bus Star

Fast Ethernet Connector Pinouts RJ-45

100BaseTX RJ-45 Connector

The Fast Ethernet RJ-45 port actively terminates wire pair 4 and 5 and wire pair 7 and 8.
Common-mode termination reduces electromagnetic interference (EMI) and susceptibility to
common-mode sources.
Design a Network – Assignment - Holland College Computer Network 17
ICAA5045C -

The table below shows the pin and corresponding signal for the RJ-45 connector pinouts.

RJ-45 Connector Pinout


Pin Signal
1 TX+
2 TX-
3 RX+
6 RX-

Specifications and Connection Limits for 100-Mbps Transmission

The table below lists cable specifications and connection limits for 100-Mbps transmission.

Parameter RJ-45 MII SC-type


Category 3, r,
2
Category 5 , or 5, 150-ohm 62.5/125
Cable
UTP3, 22 to UTP or STP, or multimode
specification
24 AWG4 multimode optical fiber
optical fiber
0.5 m (1.64
Maximum
- ft.) (MII-to-MII -
cable length
cable5)
1 m (3.28 ft.)6
Maximum 100m (328
or 400 m 100 m (328
segment ft.) for
(1312 ft.) for ft.)
length 100BaseTX
100BaseFX
200 m (656 200 m (656
Maximum
ft.)6 (with ft.)6 (with
network -
one one
length
repeater) repeater)

2
EIA/TIA-568 or EIA-TIA-568 TSB-36 compliant.
3
Cisco Systems does not supply Category 5 UTP RJ-45 or 150-ohm STP MII cables. Both are
available commercially.
4
AWG = American Wire Gauge. This gauge is specified by the EIA/TIA-568 standard.
5
This is the cable between the MII port on the port adapter and the appropriate transceiver.
Design a Network – Assignment - Holland College Computer Network 18
ICAA5045C -

6
This length is specifically between any two stations on a repeated segment.

IEEE 802.3u Physical Characteristics

The table below lists the IEEE 802.3u physical characteristics for the Ethernet 100BaseT cable.

Parameter 100BaseT
Data rate (Mbps) 100
Signaling method Baseband
Maximum
segment length (in 100 m between DTE7 and repeaters
meters)
RJ-45: Category 5 UTP MII: Category
Media 3, 4, or 5, 150-ohm UTP or STP, with
appropriate transceiver
Topology Star/Hub

7
DTE = data terminal equipment.
8
Pins 4, 5, 7, and 8 are not used.

RJ-45 Crossover (Ethernet) Cable Pinouts

The table below lists the pinouts for the Ethernet RJ-45 crossover cable.

Signal Pin Pin Signal


TX+ 1 3 RX+
TX- 2 6 RX-
RX+ 3 1 TX+
- 4 4 -
Design a Network – Assignment - Holland College Computer Network 19
ICAA5045C -

- 5 5 -
RX- 6 2 TX-
- 7 7 -
- 8 8 -

RJ-45 Rolled (Console) Cable Pinouts

The table below shows the pinouts for the RJ-45 rolled console cable.

Signal Pin Pin Signal


RTS 1 8 CTS
DTR 2 7 DSR
TxD 3 6 RxD
GND 4 5 GND
GND 5 4 GND
RxD 6 3 TxD
DSR 7 2 DTR
CTS 8 1 RTS

Source :

http://www.cisco.com/en/US/products/hw/routers/ps133/products_tech_note09186a00801f5d9e.
shtml

(d)

The equipment needed to install a hybrid network of fiber optic backbone and Copper to the nodes
would include :

- 100 MHZ NIC (network Interface Cards)


- Patch Cables
- Copper wire UTP cat 5 cable approx. 450m RJ 45 Connectors
- Fiber optic cables and components
- Patch Panels
- Switches
- Servers for files, DNS, proxy and email.
Design a Network – Assignment - Holland College Computer Network 20
ICAA5045C -

- Network operating system


- ADSL 2 Modem (if fiber optic cable ISP connection is not available).
- Internet Service Provider.

(e)

The recommended Network Operating System (NOS) I would recommend would be Windows
Server 2008. Windows Server 2008 would allow users to use the Windows operating systems on
their desktops. Microsoft Windows is the most popular and well known operating system.
Users would be familiar with these operating systems and would help productivity.

TASK 6
In the Administration network security issues need to be planned and developed into manageable and
practical areas. Areas that would need to be password protected and have sensitive data would include:

Payroll

Student Loans

Financial Aid

Registrar

Teaching Staff Results

Student files of attendance and performance, and discipline.

Director of development (planning and development files and proposals)

Business transactions, Credit Card details

Information Technology - Logins, passwords, system passwords, system procedures.

Senior Management, Confidential and sensitive information.

All these areas and others identified by the department heads will need to have password protection
and or encrypted data with high level password management procedures.

Some good password procedures are included in this reference :


Design a Network – Assignment - Holland College Computer Network 21
ICAA5045C -

3.0 Procedures 3.1 Passwords are an important aspect of computer security. A


poorly chosen password may result in the compromise of UCSF’s
entire corporate network. Some of the more common uses
include: user-level accounts, web accounts, e-mail accounts,
screen saver protection, voicemail password, and local router
logins.
3.1.1 Require Passwords: A unique password is required for all
accounts including those designated to allow system-level
privileges. Examples of system level privileges can include creating
and/or deleting a printer queue or creating and/or modifying a
user data directory.
3.1.2 Adhere to Strong Password Security Standards: Users of the
Windows Professional Operating systems must adhere to the
following password security standards:
• Expiration: Change password every 90 days or less. Passwords
will automatically expire every ninety days.
• Password History: Users should not re-use prior passwords. User
password history is retained for the last eight passwords to
prevent re-use.
• Length: Password length must be a minimum of six characters.
• Complexity: Passwords may not contain your users
name or any part of your full name.
• Password Communication: Users must keep their passwords
secret and not communicate their password to others in any
manner. Administrators must not communicate passwords via
email or other electronic communication.

Source : http://medschool.ucsf.edu/isu/pdf/Security/password_management.pdf

Other security issues that need to be addressed are: Computer Viruses and Malware. The College will
make sure that firewalls are used on all computers and trusted virus scanning software that is
configured to run and update regularly. Windows update should be configured on all workstations to
update operating systems to ensure system vulnerabilities are minimized.

The physical security of the network should also be addressed. Areas with sensitive data should be
locked when Key employees are not present. A culture of complying with company security policies and
procedures needs to be implemented and enforced to ensure the integrity of sensitive and private
information.

Students should not be able to enter areas where sensitive data is being used. Physical barriers like
locks on doors and walls will help to ensure data security.
Design a Network – Assignment - Holland College Computer Network 22
ICAA5045C -

Task 8

The Total amount of network interface cards required to connect all PC’s at Holland College would be :

Admin office computers – 17

English and writing classroom – 35

Math and Science classroom – 22

E-mail server 1

File servers 2

Proxy server 1

Network printers 10

____________________________________________________________________________________

Network Cards TOTAL 88


Design a Network – Assignment - Holland College Computer Network 23
ICAA5045C -

Task 9

Task 9 Equipment Cost Number Total Cost Supplier


Of Units
(a) Computer $1,112.31 74 $82,310.94 A

Intel Core i5
ProcessorSuper Fast
1333 FSB Speed
CPU4GB DDR3
MemoryPowerful
AMD ATI HD5770
1GB Graphics Card

7.1 High Definition


Audio Sound Card

1000GB SATA II Hard included included included A


Disk

(b) Powerful AMD ATI


HD5770 1GB Graphics
Card

7.1 High Definition


Audio Sound Card
(c) Internet Service $10,587.0 1 $10,587.00 B
Provider TPG 0
4Mbps/4Mbps Year
(4 wire)
(d) PowerEdge™ T110

Processor
Intel® Pentium® $1549.00 5 $7,745.00 C
Processor G6950
(2.80GHz, 3MB L2
Cache, 1066MHz FSB)
(d1)
Power Shield
Centurion
Design a Network – Assignment - Holland College Computer Network 24
ICAA5045C -

Task 9 Equipment Cost Number Total Cost Supplier


Of Units
The Power Shield
Centurion UPS
provides a
permanent backup
power solution for $699.00 2 $1,398.00 D
sensitive devices such
as medical
equipment and
internet routers.

(e) NEW BOXED SEALED 1,690.00 5 $8,450.00 E


HP LTO-3
ULTRIUM 960 SCSI
TAPE ARRAY DRIVE
Q1540A
(f1) RJ 45 Connectors $3.74 300 $10.74 F1
for 100

(f) $330.00 1 $330.00 F


New Cat5e Cat 5E
CMP 4/24 Plenum
Bulk Cable 2000ft

Microsoft® Exchange
(g) Standard CAL Single
License/Software
$10.00 200 $2,000.00 G
Assurance Pack
Academic OPEN User
CAL User CAL
(g) Microsoft® Windows
Web Server Sngl
License/Software
$162.00 1 $162.00 G
Assurance Pack
Academic OPEN 1
License
(g) Microsoft®
Windows® Server $291.00 5 $1,455.00 G
Standard Single
License/Software
Design a Network – Assignment - Holland College Computer Network 25
ICAA5045C -

Task 9 Equipment Cost Number Total Cost Supplier


Of Units
Assurance Pack
Academic OPEN
(g) Microsoft® Exchange
Enterprise CAL Sngl
License/Software
Assurance Pack
$28.00 200 $5,600.00 G
Academic OPEN 1
License Device CAL
Device CAL Without
Services
(g) Microsoft®
Windows® Server CAL
Single
License/Software $20.00 86 $1,720.00 G
Assurance Pack
Academic OPEN
Device CAL
(g) Microsoft®
Windows® Server CAL
Single
License/Software $20.00 26 $520.00 G
Assurance Pack
Academic OPEN
Device CAL
(g) Microsoft® Core CAL
(Client Access
License) Single
License/Software $100.00 86 $8,600.00 G
Assurance Pack
Academic OPEN
Device CAL
(g) Microsoft® Core CAL
(Client Access
License) Single $100.00 26 $2,600.00 G
License/Software
Assurance Pack
Design a Network – Assignment - Holland College Computer Network 26
ICAA5045C -

Task 9 Equipment Cost Number Total Cost Supplier


Of Units
Academic OPEN
Device CAL
(h) Microsoft®
Windows® Server
Standard Single
$291.00 5 $1,455.00 G
License/Software
Assurance Pack
Academic OPEN
(h) Microsoft® Exchange
Server Standard
Single
$473.00 1 $473.00 G
License/Software
Assurance Pack
Academic OPEN
(h1) Microsoft® Windows
7 Professional Sngl $449.00 74 $33,226.00 H1
Software
(i) Gigabit Fiber Nic $129.99 5 $649.95 H
32BIT Pci 1000BSX Sc
(j) Linksys EtherFast $19.95 84 $1,476.30 I
(LNE100TX-AT)
Network Adapter

(k) Manufacturer: Cisco


Part Code: WS-
C2950SX-48-SI $3,019.50 1 $3,019.50 J
Form Factor: External
- 1U
RAM: 16 MB
Flash Memory: 8 MB
Ports Qty: 48 x
Ethernet 10Base-T,
Ethernet 100Base-TX

(l) Cisco Catalyst $1,160.99 2 $2,321.98 K


2950SX-24 - switch -
24 ports
Design a Network – Assignment - Holland College Computer Network 27
ICAA5045C -

Task 9 Equipment Cost Number Total Cost Supplier


Of Units
10 * Public IP4
addresses
1 off Fee $4,175.00 1 $4,175.00 L
Yearly Fee $46,461.0 1 $46,461.00
0
$5,991.69 1 5,991.69 M
QLOGIC SANBOX
5802V FABRIC SWCH-
8GB PT ENABLED PLS
4

$799.00 10 7,990.00 N
HP LaserJet P2050
Printer series -
Specifications

Cisco 12000 Series $1,259.57 1 $1,259.57 O


Router Gigabit
Ethernet Line Card

$1,200.00 2 $2,400 P

Fibre cable course


Total $244,387.67

Suppliers
Supplier A

http://www.crazysales.com.au/xtreme-core-i5-750-ati-gaming-pc-computer-system_p4739.html

Supplier B

http://tpg.com.au/shdsl/products_services.php
Design a Network – Assignment - Holland College Computer Network 28
ICAA5045C -

Supplier D

http://www1.ap.dell.com/au/en/business/servers/poweredge-t110/pd.aspx?refid=poweredge-
t110&s=bsd&cs=aubsd1

Supplier D1

http://www.upssystems.com.au/centurion_11.html

Supplier E

http://cgi.ebay.com.au/NEW-HP-LTO-3-ULTRIUM-960-SCSI-TAPE-ARRAY-DRIVE-
Q1540A-/360290478645?pt=AU_Components&hash=item53e2fc6a35

supplier F1

http://cgi.ebay.com.au/100-RJ45-RJ-45-CAT5-Modular-Plug-Network-Connector-100X-/250520119801?
pt=AU_Computers_Networking_Accessories&hash=item3a5429a9f9

Supplier F
Design a Network – Assignment - Holland College Computer Network 29
ICAA5045C -

https://www.lindy.com.au/online/arrshop.exe?anonymous=true&cat=nj

or

http://cgi.ebay.com.au/New-Cat5e-Cat-5E-CMP-4-24-Plenum-Bulk-Cable-2000ft-/170535857316?
pt=LH_DefaultDomain_0&hash=item27b4baaca4

Supplier G

http://www.microsoft.com/licensing/mla/summary.aspx#W

Supplier H

http://www.amazon.com/Gigabit-Fiber-Nic-32BIT-1000BSX/dp/B000IOG232

Supplier H1
Design a Network – Assignment - Holland College Computer Network 30
ICAA5045C -

http://www.microsoftstore.com.au/shop/en-AU/Microsoft/Windows/Windows-7?
WT.mc_id=pointitsem_ad_win7_generic&WT.srch=1&WT.term=microsoft+windows+7&WT.campaign=6
074&WT.source=google&WT.medium=cpc&WT.content=623196099&cshift_ck=2098988581cs62319609
9&WT.srch=1&tid=623196099

Supplier I

http://www.shopping.com/xPO-Linksys-EtherFast-LNE100TX-AT

Supplier J

http://us.hardware.com/store/cisco/WS-C2950SX-48-SI

Supplier K

http://shopper.cnet.com/switches/cisco-catalyst-2950sx-24/4014-6432_9-20295099.html#stores

Supplier L

http://submit.apnic.net/cgi-bin/feecalc.pl?ipv4=10&ipv6=&action=Calculate

Supplier M :

http://accessories.us.dell.com/sna/productdetail.aspx?
sku=A2330376&cs=04&c=us&l=en&dgc=SS&cid=52102&lid=1342490

Supplier N :

http://h10010.www1.hp.com/wwpc/au/en/ho/WF06a/18972-18972-3328059-236263-236263-
3662052.html

Supplier O

http://shopper.cnet.com/routers/cisco-modular-gigabit-ethernet/4014-3319_9-30484805.html#stores

Supplier P

http://www.milcom.com.au/course-description.aspx?cc=CAN-38&ccid=TELEC
Design a Network – Assignment - Holland College Computer Network 31
ICAA5045C -

TASK 10
Task Software Cost Number Of Total Cost Supplier
10 Units
Microsoft office 2000 $849.00 111 $94,239.00 A

Math CAD $1050.50 33 $34.666.50 B


Microsoft Visual Studio $164.95 33 $5,443.35 C
2010 Professional
Auto CAD 2011 $1,718.00 33 $56,694.00 D
SAS Learning Edition 4.1 for $68.75 36 $2,475.00 E
Students
C++ Compiler ---- 33 ---- C
Included in Visual Studio
Publisher 2010 $189.00 53 10,017.00 F

M/S Visio 2010 $217.00 53 11,501.00 G

M/S Project 2010 $1,699.00 53


90,047.00 H

PC-based financial aid $329.00 3


Packages 987.00 I

FoxPro database $1049.00 2 $2,098.00 J

Visual foxpro professional


edition 9.0
Total $308,167.8
5

Supplier A =Microsoft office 2010

http://www.microsoftstore.com.au/shop/en-AU/Microsoft/Microsoft-Office-Professional-2010

Supplier B = Math CAD 15

http://store.ptc.com/store?
SiteID=ptc&Locale=en_US&Action=DisplayProductDetailsPage&productID=197962800&pgm=6660430
0&ThemeID=6865700&Currency=USD
Design a Network – Assignment - Holland College Computer Network 32
ICAA5045C -

Supplier C = Microsoft Visual Studio 2010 Professional

http://www.studentdiscounts.com.au/microsoft-visual-studio-professional-2010-educ

Supplier D = Auto CAD 2011

http://www.citysoftware.com.au/Autodesk_AutoCAD_LT_2011_New_Seat_AUT0267.aspx?
gclid=CPa8t6a58aMCFROmbwodZXL32A

Supplier E = SAS Learning Edition 4.1 for Students

http://e5.onthehub.com/WebStore/OfferingDetails.aspx?ws=49c547ba-f56d-dd11-bb6c-
0030485a6b08&o=c9192ece-f6b6-dd11-b00d-0030485a6b08&JSEnabled=1

Supplier F = Publisher 2010

http://www.microsoftstore.com.au/shop/en-AU/Microsoft/Publisher-2010?
WT.mc_id=pointitsem_ad_Publisher_generic_2007&WT.srch=1&WT.term=microsoft+publisher&WT.c
ampaign=6071&WT.source=google&WT.medium=cpc&WT.content=623191469&cshift_ck=209898858
1cs623191469&WT.srch=1&tid=623191469

Supplier G = M/S Visio 2010

http://www.microsoft.com/licensing/mla/summary.aspx#W

Supplier H = M/S Project 2010

http://www.microsoftstore.com.au/shop/en-AU/Microsoft/Project-Professional-2010?
WT.mc_id=pointitsem_Project_generic_2007&WT.srch=1&WT.term=microsoft+project&WT.campaign=
6136&WT.source=google&WT.medium=cpc&WT.content=623736044&cshift_ck=2098988581cs6237360
44&WT.srch=1&tid=623736044

Supplier I = PC-based financial aid Packages Quicken

https://estore.quicken.com.au/ProductDetails.aspx?CategoryID=70

Supplier J = Visual foxpro professional edition 9.0

http://www.au.winbuyer.com/Microsoft_Visual_FoxPro_Professional_Edition_90_Full_Version_for_PC_
340-01231/pid-22878396/offers.html
Design a Network – Assignment - Holland College Computer Network 33
ICAA5045C -

Major Task
“Network Infrastructure Planning Overview

Planning network infrastructure is a complex task that needs to be performed so that the network
infrastructure needed by the organization can be designed and created. Proper planning is crucial to
ensure a highly available network and high performance network that result in reduced costs and
enhances business procedures for the organization.

To properly plan your network infrastructure, you have to be knowledgeable on a number of factors,
including the following:

 Requirements of the organization.

 Requirements of users.

 Existing networking technologies.

 Necessary hardware and software components.

 Networking services which should be installed on the user's computers so that they can perform
their necessary tasks.

A typical network infrastructure planning strategy should include the following:

 Determine the requirements of the organization and its users, and then document these
requirements.

 Define a performance baseline for all existing hardware devices.

 Define a baseline for network utilization as well.

 Identify the capacity for the physical network installation. This should encompass the following:

o Server hardware, client hardware.

o Allocation of network bandwidth for the necessary networking services and applications.

o Allocation of Internet bandwidth

 Determine which network protocol will be used.

 Determine which IP addressing method you will use.

 Determine which technologies, such as operating systems and routing protocols are needed to
cater for the organization's needs as well as for possible future expansions.

 Determine the security mechanisms which will be implemented to secure the network and
network communication.
Design a Network – Assignment - Holland College Computer Network 34
ICAA5045C -

After planning, the following step would be to implement the technologies which you have identified.
Implementation of the network infrastructure involves the following tasks:

 Installing the operating systems.

 Installing the necessary protocols and software components.

 Deploying DNS or WINS name resolution.

 Designing the DNS namespace.

 Assigning IP addresses and subnet masks to computers.

 Deploying the necessary applications.

 Implementing the required security mechanisms.

 Defining and implementing IPSec policies.

 Determining the network infrastructure maintenance strategy which you will employ once the
network infrastructure is implemented. Network infrastructure maintenance consists of the
following activities:

o Upgrading operating systems.

o Upgrading applications.

o Monitoring network performance, processes and usage.

o Troubleshooting networking issues.”

Source : Defining Network Infrastructure Ian Good

(a) Description of the proposed LAN topology and why is was selected.

The proposed Local Area Network (LAN) topology proposed for Holland College is a star
topology. The star topology was chosen because of the ability to eliminate data collisions
between host computers.
Design a Network – Assignment - Holland College Computer Network 35
ICAA5045C -

“Star network topology

In local area networks with a star topology, each network host is connected to a central hub. In
contrast to the bus topology, the star topology connects each node to the hub with a point-to-
point connection. All traffic that transverses the network passes through the central hub. The hub
acts as a signal booster or repeater. The star topology is considered the easiest topology to design
and implement. An advantage of the star topology is the simplicity of adding additional nodes.
The primary disadvantage of the star topology is that the hub represents a single point of failure.

 A point-to-point link (described above) is sometimes categorized as a special instance of the


physical star topology – therefore, the simplest type of network that is based upon the physical
star topology would consist of one node with a single point-to-point link to a second node, the
choice of which node is the 'hub' and which node is the 'spoke' being arbitrary [1].

 After the special case of the point-to-point link, as in note 1.) above, the next simplest type of
network that is based upon the physical star topology would consist of one central node – the
'hub' – with two separate point-to-point links to two peripheral nodes – the 'spokes'.

 Although most networks that are based upon the physical star topology are commonly
implemented using a special device such as a hub or switch as the central node (i.e., the 'hub' of
the star), it is also possible to implement a network that is based upon the physical star topology
using a computer or even a simple common connection point as the 'hub' or central node –
however, since many illustrations of the physical star network topology depict the central node
as one of these special devices, some confusion is possible, since this practice may lead to the
misconception that a physical star network requires the central node to be one of these special
devices, which is not true because a simple network consisting of three computers connected as
in note 2.) above also has the topology of the physical star.

 Star networks may also be described as either broadcast multi-access or nonbroadcast multi-
access (NBMA), depending on whether the technology of the network either automatically
propagates a signal at the hub to all spokes, or only addresses individual spokes with each
communication”
Design a Network – Assignment - Holland College Computer Network 36
ICAA5045C -

Source : http://en.wikipedia.org/wiki/Network_topology

Proposed Network Holland College

OSI Model

Internet Service

Layer 1 Provider CABLE

Layer 2 01010101 01010100 0101010 Fiber-Optic Cable


Layer 3 Cat 5e UTP
Layer 4
Modem
Layer 5

Proxy Server
Network Backbone

E-mail Server
Router
255.255.255.0
Microsoft
192.168.4.x

Switch
255.255.255.0
255.255.255.0
192.168.2.x
192.168.3.x

VLAN 24 VLAN 48 VLAN 24


Port Port Port
Server Server Server

Math and Math and Science English and English and Admin Administration
Lab 22 Intel i5 Writing Lab 35
Intel i5 17 Intel i5
Design a Network – Assignment - Holland College Computer Network 37
ICAA5045C -

The OSI model is made up of seven layers which are presented as a stack. Data which is passed over
the network moves through each layer. Each layer of the OSI model has its own unique functions and
protocols. Different protocols operate at the different layers of the OSI model. The layer of the OSI
reference model at which the protocol operates defines its function. Different protocols can operate
together at different layers within a protocol stack. When protocols operate together, they are referred to
as a protocol suite or protocol stack. When protocols support multiple path LAN-to-LAN communications,
they are called routable protocols. The binding order determines the order in which the operating system
runs the protocols.

The seven layers of the OSI reference model, and each layers' associated function are listed here:

 Physical Layer - layer 1: The Physical layer transmits raw bit streams over a physical medium,
and deals with establishing a physical connection between computers to enable communication.
The physical layer is hardware specific; it deals with the actual physical connection between the
computer and the network medium. The medium used is typically a copper cable that utilizes
electric currents for signaling. Other media that are becoming popular are fiber-optic and wireless
media. The specifications of the Physical layer include physical layout of the network, voltage
changes and the timing of voltage changes, data rates, maximum transmission distances, and
physical connectors to transmission mediums. The issues normally clarified at the Physical Layer
include:

o Whether data is transmitted synchronously or asynchronously.

o Whether the analog or digital signaling method is used.

o Whether baseband or broadband signalling is used.

 Data-Link Layer - layer 2: The Data-link layer of the OSI model enables the movement of data
over a link from one device to another, by defining the interface between the network medium and
the software on the computer. The Data-link layer maintains the data link between two computers
to enable communications. The functions of the Data-link layer include packet addressing, media
access control, formatting of the frame used to encapsulate data, error notification on the
Physical layer, and management of error messaging specific to the delivery of packets. The Data-
link layer is divided into the following two sublayers:

o The Logical Link Control (LLC) sublayer provides and maintains the logical links used for
communication between the devices.

o The Media Access Control (MAC) sublayer controls the transmission of packets from one
network interface card (NIC) to another over a shared media channel. A NIC has a
unique MAC address, or physical address. The MAC sublayer handles media access
control which essentially prevents data collisions. The common media access control
methods are:

 Token Passing; utlized in Token Ring and FDDI networks

 Carrier Sense Multiple Access/Collision Detection (CSMA/CD); utilized in


Ethernet networks.
Design a Network – Assignment - Holland College Computer Network 38
ICAA5045C -

 Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA); utilized in


AppleTalk networks.

 Network Layer - layer 3: The Network layer provides end-to-end communications between
computers that exist on different network. One of the main functions performed at the Network
layer is routing. Routing enables packets to be moved between computers which are more than
one link from one another. Other functions include traffic direction to the end destination,
addressing, packet switching and packet sequence control, end-to-end error detection,
congestion control, and Network layer flow control and error control.

 Transport Layer - layer 4: The Transport layer deals with transporting data in a sequential
manner, and with no data loss. The Transport layer divides large messages into smaller data
packets so that it can be transmitted to the destination computer. It also reassembles packets into
messages for it to be presented to the Network layer. Functions of the Transport layer include
guaranteed data delivery, name resolution, flow control, and error detection and recovery. The
common Transport protocols utilized at this layer are Transmission Control Protocol (TCP) and
User Datagram Protocol (UDP).

 Session Layer - layer 5: The Session layer enables communication sessions to be established
between processes or applications running on two different computers. A process is a specific
task that is associated with a particular application. Applications can simultaneously run
numerous processes. The Session layer establishes, maintains and terminates communication
sessions between applications. The Session layer utilizes the virtual circuits created by the
Transport layer to establish communication sessions.

 Presentation Layer - layer 6: The Presentation layer is responsible for translating data between
the formats which the network requires and the formats which the computer is anticipating. The
presentation layer translates the formats of each computer to a common transfer format which
can be interpreted by each computer. Functions include protocol conversion, data translation,
data encryption and decryption, data compression, character set conversion, and interpretation of
graphics commands.

 Application Layer - layer 7: The Application layer provides the interface between the network
protocol and the software running on the computer. It provides the interface for e-mail, Telnet and
File Transfer Protocol (FTP) applications, and files transfers. This is the location where
applications interrelate with the network.

Source : Course material MSIT Ian Good

“Planning the logical network

Planning the logical network is often the most difficult portion of network planning, because you won’t
have any
Design a Network – Assignment - Holland College Computer Network 39
ICAA5045C -

obvious or easy ways to measure or determine network requirements or usage. Fortunately, we can
spare you some trouble by passing on the experience of many network technicians.

If you were going to build a warehouse to store engines, you could simply measure the size of
each engine, determine how high you can stack them, add floor space for access, and build a warehouse
of the exact size you need. Most architects also add room for expansion and growth. Another method is
to simply buy more space than you will ever need, but this approach obviously requires deep pockets.

Both techniques are used in networking, and unfortunately, the second is more common. Many
organizations waste a lot of money on hardware to guarantee that they will not have a capacity
problem. In very small networks buying more hardware than you need can actually make financial sense
because network architects may charge more than the extra equipment will cost to design a network of
the proper size. We will assume, however, that you intend to spend as little as you can to create a well-
designed network. The steps in designing the logical network are as follows:

 Estimate the client load

 Determine which Data link technologies will support that load

 Determine which types of cable support that data link layer technology

 Decide whether you will centralize or distribute servers on the network

 Lay out a network map

Estimating Client Load


To estimate load capacities of networks, you need a metric with which you can compare very different
network technologies and relate them to client computer requirements, often without the benefit of
knowing exactly how those client computers will be used. Seasoned network integrators base their
estimates on what they’ve done and seen work in the past.

Although no simple method will replace an experienced network integrator, experience can be
distilled into methods that are useful for planning and estimating. A good working methodology will
serve a number of roles:

 It will be useful for comparing data link technologies


Design a Network – Assignment - Holland College Computer Network 40
ICAA5045C -

 It will be useful for planning the network’s physical layout

 It will be able to predict the amount and type of hardware necessary to implement the network

We have developed a simple method that will help you plan your network based upon the client load
limit of various current data link technologies. For instance, a single 10 Mb/s Ethernet network can
support a maximum of about 50 DOS clients. The same Ethernet network can reliably serve 20 or so
Windows NT workstations.

Of course, these estimations are not absolute-the way the client is used will affect its load on
the network greatly, and as technology changes so will the load estimates for various clients. The law of
averages comes to our aid here by smoothing the usage characteristics of a single computer over the
number of computers attached to the network. This method doesn’t always work well, however.
Consider the case of a diskless DOS workstation that must boot its operating system from a network
server. This client will typically demand more from a network than a typical client because even its
memory page file is being sent over the network.

You can use the method presented here if your operations conform to the common uses of
computers. If you are doing something you know will require more bandwidth , consider revising the
load values for clients upwards. We have presented worst-case capacities in this method, so resist the
temptation to revise them downward.

Load Requirements of Typical Network clients


We determined the client load requirements shown in the table below by dividing 100 by the maximum
useful number of clients of that type that could operate on a single Ethernet segment.

Make a map of all the computers in your organization based on their rough location in your
facility, matching them to one of the types in the table below. Sum the values to determine your
organization’s total client load.

CLIENT METRIC EXPLANATION


Macintosh 1 Macintoshes typically require very little from a network, so we used a typical
Macintosh client as the basis for our network metric.
DOS 2 MS-DOS machines tend to run simpler applications software that does not
demand much from a network
Diskless DOS 6 Diskless MS-DOS clients, however, are much more demanding. These
Client computers must use the network for every I/O command that would normally
Design a Network – Assignment - Holland College Computer Network 41
ICAA5045C -

go to a local hard disk drive.


Windows 3 Windows is a more complex platform than MS-DOS is, and applications built
to run on Windows are more complex and network aware.
Power 3 Macintosh computers based on the PowerPC microprocessor are very fast.
Macintosh Although Macintoshes demand less from a network than most PC file-sharing
schemes demand, these computers can hit the network hard because of their
speed.
Citrix – 9 Diskless Windows clients using “terminal services” are extremely demanding
diskless of network bandwidth-more so than any other type of computer.
clients
Windows 95 4 Windows 95 is a powerful multitasking operating system that typically runs on
fast client computers.
OS/2 4 OS/2 is very similar to Windows 95 in most respects. It runs on similar
hardware and runs similar applications.
Windows XP 5 Windows XP Workstation is one of the most powerful operating systems
available for PCs. Its ability to multitask multiple network applications
smoothly requires much from a network.
UNIX 5 UNIX Workstations are usually used by bandwidth-intensive users like
Workstation programmers, graphic artists, and CAD operators.
UNIX X- 3 X-terminals are diskless, but they operate as simple displays. Screen updates
terminal are sent from a server that actually performs the work requested by the user.
TCP/IP print 10 Although print servers technically do not generate load of their own, printed
server documents do. Every document you print to a print server moves across the
network twice-when it is sent from your computer to the Windows NT server
that processes it and again when it is sent to the print server attached to the
printer. Because printed documents can also be quite large, they can create
quite a load on your network.

Load Capacities of Data Link technologies


Data link technologies use various methods to arbitrate the sharing of media, which makes a
comparison difficult. For example, although token ring uses a faster bit rate than Ethernet uses, a client
must wait for the token before transmitting, which can make Ethernet seem more responsive. Adding
clients to a Token ring will slow the network in a simple deterministic manner, whereas overloading an
Ethernet can cause it to suddenly cease operating altogether. These differences mean that comparisons
based on simple bit rate are meaningless.
Design a Network – Assignment - Holland College Computer Network 42
ICAA5045C -

We chose to use the worst-case number of clients we felt could be usefully attached to a single
shared media network rather than to use a comparison of raw throughput. We then applied this metric
to the capacities of other types of networks that are not shared media, such as asynchronous transfer
mode (ATM), to show how these networks can be aggregated into large internetworks.

When creating internetworks, the capacity number used for a subnetwork becomes its load. For
instance, a Fiber Distributed Data Interface (FDDI) ring with a capacity rating of 1,000 can handle up to
ten Ethernet networks, each with a capacity rating of 100. The table below shows the load capacities of
various network data link technologies.

NETWORK CAPACITY EXPLANATION


Ethernet 100 Ethernet was used as the basis for comparison because it is the most
common network data link technology. You can expect to attach 50
DOS clients to a single Ethernet subnetwork before it bogs down.
Token Ring 200 A single Token Ring can support roughly twice as many computers as a
single Ethernet subnetwork. Because Token Ring degrades gracefully,
you can continue to load a Token Ring past this point, but your
network will slow considerably.
Fast Ethernet 500 Although the bit rate for fast Ethernet is ten times the rate of Ethernet,
it cannot handle ten times the traffic because of the delay involved in
resolving collisions.
Fiber 1,000 You can reasonably connect ten Ethernet networks on a single FDDI
Distributed ring. This arrangement depends greatly upon where you’ve chosen to
Data Interface place your servers-centralized servers demand more from the
backbone.
FiberChannel 10,000 Gigabit Ethernet will operate over FiberChannel at one gigabit per
(IGB/s) second. Although gigabit Ethernet retains the Ethernet name, it is full
duplex point to point and does not have collisions. It is a perfect
backbone technology in campus environments.
ATM-155 OC- 1000 ATM is switched network technology. It is not shared. For this reason,
3 you can count on being able to use about 80 percent of the bit rate for
useable traffic so long as you maintain constant connections between
servers.
ATM OC-12 4000 ATM bandwidth increases linearly with speed. At 622 Mb/s, ATM OC-
12 is sufficient for the most demanding backbone applications.
ATM OC-48 16,000 ATM at OC-48 (2.2 Gb/s) is typically used for metropolitan area
networks. This capacity is appropriate for metropolitan area high-
Design a Network – Assignment - Holland College Computer Network 43
ICAA5045C -

speed links.
ATM OC-192 48,000 ATM at OC-192 (8.8 Gb/s) is used for major trunks between
metropolitan

When calculating load versus capacity, remember that these numbers are maximum capacity estimates.
Erring on the side of excess capacity is preferable to being tied to a slow network. You should try to
avoid coming within 25 percent of the maximum values presented here if you want your network to run
smoothly.

Make a rough map of the computers in your organization based on location. Select a network
technology and group clients into networks based upon location. Then sum the client load values of
each group to make sure you are well within the load capacity for the network type you’ve selected”

Source : Planning the logical network Ian Good

A score of 5 for windows XP for a fast Ethernet connection score of 500. Therefore theoretically 100 (or
75 with 25% of the maximum value) computers can connect to 1 sub network. The maximum amount of
computers attached to 1 sub network on the Holland College network is 36.

Methods and Formulas Used to Determine Server Capacity Ian Good

“Methods and Formulas Used to Determine Server Capacity


You can understand a server's workload and capacity when you determine the kinds of tasks carried out on that
server. The performance statistics that are calculated by System Monitor reveal the effects of those tasks. You can
use these statistics with a number of standard mathematical formulas to help determine server size and plan for
capacity and growth.

Basic Model of System Capacity

There are three variables that form the basic model of system capacity. These variables are

 Observation time (T), the amount of time that the server is monitored for activity

 Busy time (B), the amount of time that the server was active during the observation time

 Completions (C), the number of transactions completed during the observation period

With these three variables, you can calculate the six significant values, described in Table 9.4, that are used to
develop a capacity planning model.

Table 9.4 Capacity Planning Data Formulas


Design a Network – Assignment - Holland College Computer Network 44
ICAA5045C -

Data Description Formula

CPU Utilization The percentage of CPU capacity used during a specific U = B/T
period of time.

Transaction throughout of The average number of transactions completed during a X = C/T


the system specified period of time.

Average service time The average time to complete a transaction. S = B/C

Transaction capacity of the The number of transactions the server handles. Cp = 1/S
system

Average queue length The average number of transactions in queue. Q = U/(1-U)

Average response time The average time to respond to a transaction. R = (Q×S)


+S
Here is an example of how to use these formulas to size a server. Suppose that you observe the server for 60
seconds (T), during which time there are 90 completed transactions (C), and the server is actually busy processing
that workload for 48 seconds (B). Table 9.5 shows the resulting data values using this information.

Table 9.5 Capacity Planning Resource Formula Results

Resource Formula Result

CPU Utilization U = B/T 48/60 = 80 percent utilization

Average transaction throughput of the X = C/T 90/60 = 1.5 transactions/sec


system

Average service time S = B/C 48/90 = .53 seconds

Transaction capacity of the server Cp = 1/S 1/.53 = 1.875 transactions/sec

Average queue length Q = U/(1-U) .8/(1 - .8) = 4 transactions

Average response time R = (Q×S) (3 × .53)+.53 = 2.12


+S seconds
The CPU utilization was at 80 percent, and handled an average of 1.5 transactions per second. The average service
time for these transactions was .53 seconds, and transactions were completed in an average time of 2.12 seconds.
On average, there were four transactions waiting to be processed at any given point in time during the observation
period, and the server had the capacity to process 1.875 transactions per second.

If the SLA states that during any given 60 second period, the server should not utilize more than 85 percent of the
processor and should be capable of handling at least 100 transactions, the calculated values shown in Table 9.5
indicate that the SLA is being met. If the SLA stated that during any 60 second period, the server should not utilize
more that 75 percent of the processor or should not have more than three transactions waiting in queue, then the
calculated values shown in Table 9.5 indicate that the server cannot perform within the limits of the SLA and
probably must be upgraded.

Use these formulas as tools to help you to determine current server performance levels, to develop acceptable and
reasonable SLAs given current and expected server hardware configurations, and to identify where upgrades or
new equipment is necessary.

End-to-End Response Time

When you consider response time, you should not think only in terms of a single server's response time and
performance, but instead you should think of all the data components that make up the service chain for that
transaction. So, the first step in determining end-to-end response time is identifying the data components that
make up the service chain.

For example, consider that information flows from an SMS client to a CAP or management point, and then to the
site server. The service chain that emerges from this flow has five data components associated with it as shown in
Figure 9.2:

 Client Q, R, and S values


Design a Network – Assignment - Holland College Computer Network 45
ICAA5045C -

 Network connection between client and CAP or management point Q, R, and S values

 CAP or management point Q, R, and S values

 Network connection between CAP or management point and site server Q, R, and S values

 Site server Q, R, and S values

Figure 9.2 A service chain and the computation of end-to-end response time

The end-to-end response time, then, is the sum of each of the R values for each component in the service chain.
Use this information to develop SLAs for service chain performance, and to determine when there are performance
aberrations.

There are no standard metrics for SMS performance. Your organization might want to consult its SLAs and perform
a cost-to-benefit analysis to determine how fast the SMS site servers must run. Your organization might have time
requirements. For example, mission-critical applications might require updating on 95 percent of desktops in an
eight-hour period. Another SLA might state that critical virus signature update files must be distributed to all
desktops within a two-hour period.

After running a pilot project and discovering the cost to distribute the package to all desktops on the network in
four hours, you might compromise on a reduced hardware configuration and accept a window of five hours to
complete the distribution. In general, faster response times require more expensive hardware, and lower
acceptable response times require less expensive hardware.

Because many SMS service requests come in surges, most SMS sites have service request backlogs that last for at
least a few minutes. The two most common surges occur during the user logon cycle and when you send package
advertisements.

While you experiment to find the least expensive hardware configuration to meet your needs, consider future
growth requirements and the potential for change, and monitor the SMS site for backlogs. If a site is backlogged
most of the day and catches up between 3:00 A.M. and 4:00 A.M., then there is a risk that the site cannot catch up
if the weekly load increases. Plan for extra capacity so that you can quickly meet unexpected software distribution
or other feature demands. Also, when SMS users and administrators become familiar with SMS, their usage levels
increase.

Determining Load Signatures

The combination of business objectives and operational styles in every organization creates unique load signatures.
However, if an organization has ten remote offices with the same number of workers, the same software, and the
same hardware, and you manage them all similarly, then they all might have a similar load signature. Grouping
computers with similar load signatures can reduce planning time.

By determining the load signature of servers in the SMS site, you can plan for an appropriate hardware component
capacity. Then, by changing hardware capacity, you can increase or decrease the responsiveness of SMS and the
time required to accomplish specific tasks. The load signature is determined by several factors, including:

 Number of optional SMS features installed and in use on the computer

 Location of site server in the SMS hierarchy (whether it communicates with parent or child sites)

 Number of objects in the site

 Size of objects being processed

 Frequency of scheduled events

 Frequency of feature use


Design a Network – Assignment - Holland College Computer Network 46
ICAA5045C -

To successfully determine server sizes for an SMS hierarchy:

1. Define the load signature for each site component server.

2. Determine throughput requirements using the formulas documented in this section.

3. Use the throughput requirements to estimate hardware requirements.

4. Use the hardware requirements to construct sample SMS configurations to test in your isolated test lab
and later in the pilot project.

Testing your hardware configuration and conducting a successful pilot project helps ensure that your organization's
deployment progresses smoothly, because the deployment itself is based on site designs customized for your
organization's data and tested in your environment”.

Methods and Formulas Used to Determine Server Capacity Ian Good


Design a Network – Assignment - Holland College Computer Network 47
ICAA5045C -

Private Host Name Description Location

IP Address

192.168.2.1 to M&S 1 to M&S23 Math and Science Lab Math and Science Lab computers

192.168.2.23

192.168.2.100 M&S_Server Server English and Writing Lab English and Writing Lab

192.168.3.1 to E&W1 to E&W36 English and Writing Lab

192.168.3.36

192.168.3.100 E&W_Server Server English and Writing Lab English and Writing Lab

192.168.4.1 to Admin1 to Admin18 Administrative Offices Administrative Offices

192.168.4.18

192.168.4.100 Admin_Server Administrative Offices Administrative Offices

192.168.5.100 Email_Server Administrative Offices Administrative Offices

192.168.6.100 Proxy_Server Administrative Offices Administrative Offices

Public IP
Addresses

Holland College will purchase 10 public IP addresses for DNS and Web server.

1 off membership cost $4,175

Annual Fee $46,461

Source : http://submit.apnic.net/cgi-bin/feecalc.pl?ipv4=10&ipv6=&action=Calculate

“The IP addressing scheme which you use can be based on:

 Public IP addresses: Here, the IP addressing scheme consists of only public IP addresses.
Design a Network – Assignment - Holland College Computer Network 48
ICAA5045C -

 Private IP addresses: Here, the IP addressing scheme consists of private IP addresses and a
small number of public IP addresses needed to enable Internet connectivity.

If you are only using a public IP addressing scheme in your network design, then you need to perform the
following activities:

 Purchase a range of public IP addresses from an ISP that is approved by the Internet Corporation
for Assigned Names and Numbers (ICANN).

 The IP address range should have sufficient IP addresses for all interfaces in your network
infrastructure design. Devices that connect to the private network need an IP address, and so too
does VPN connections.

 You need to be certain that network address translation (NAT) is not required.

 You need to implement firewalls and router packet filters to secure the resources within your
private network from Internet users.

If you are implementing a private IP addressing scheme, then the network design would consist of the
following:

 Private IP addresses would be assigned to all devices in the private internal network.

 Public IP addresses would be assigned to all devices connecting to the public network.

The selection of the IP address range needed for the organization should be based on the following
factors:

 Maximum number of IP devices on each subnet

 Maximum number of network subnets needed in the network design.

If you are using a private IP addressing scheme in your network design, consider the following important
points:

 For those IP devices that connect the company network to public networks such as the Internet,
you need to obtain a range of public IP addresses from the ISP for these devices.

 You should only assign public IP addresses to those devices that communicate directly with the
Internet. This is mainly due to you paying for each IP address obtained. Devices which directly
connect to the Internet are your network address translation (NAT) servers, Web servers, VPN
remote access servers, routers, firewall devices, and Internet application servers.

 The private IP address range which you choose should have sufficient addresses to support the
number of network subnets in your design, and the number of devices or hosts on each particular
network subnet.

 You must cater for a network address translation (NAT) implementation. NAT translates IP
addresses and associated TCP/UDP port numbers on the private network to public IP addresses
which can be routed on the Internet. Networks that do not require an implementation of a firewall
solution or a proxy server solution can use NAT to provide basic Internet connectivity. Through
Design a Network – Assignment - Holland College Computer Network 49
ICAA5045C -

NAT, host computers are able to share a single publicly registered IP address to access the
Internet.

IP version 6 (IPv6) was designed to deal with the current


shortage of IP addresses with IP version 4 (IPv4). IP version 6
also includes some modifications to TCP/IP.

Holland College might have to go to IPv6

The primary differences between IPv6 and IPv4 are listed here

 Source and destination addresses: IPv4: 128 bits in length; IPv6: 32 bits in length

 IPSec support: IPv4: Optional; IPv6: Required.

 Configuration of IP addresses: IPv4: Manually or via DHCP; IPv6: Via Address Autoconfiguration
- DHCP is no longer required, nor is manual configuration.

 Packet flow identification for QoS handling in the header: IPv4: No identification of packet flow;
IPv6: Packet flow identification for QoS handling exists via the Flow Label field.

 Broadcast addresses: IPv4: Broadcast addresses are used to transmit traffic to all nodes on a
specific subnet; IPv6: Broadcast addresses are replaced by a link-local scope all-nodes multicast
address.

 Fragmentation: IPv4: Performed by the sending host and at the routers; IPv6: Performed by the
sending host.

 Reassembly: IPv4: Has to be able to reassemble a 576-byte packet; IPv6: Has to be able to
reassemble a 1,500-byte packet.

 ARP Request frames: IPv4: Used by ARP to resolve an IPv4 address to a link-layer address;
IPv6: Replaced with Neighbor Solicitation messages.

 ICMP Router Discovery: IPv4: Used to determine the IPv4 address of the optimal default
gateway; IPv6: Replaced with ICMPv6 Router Solicitation and Router Advertisement messages.

 Internet Group Management Protocol (IGMP): IPv4: Used to manage local subnet group
membership; IPv6: Replaced with Multicast Listener Discovery (MLD) messages.

 Header checksum: IPv4: Included; IPv6: Excluded

The advantages of IPv6 are listed below:


Design a Network – Assignment - Holland College Computer Network 50
ICAA5045C -

 Large address space: Because of the larger number of available addresses, it is no longer
necessary to use utilize Network Address Translator (NAT) to map a public IP address to multiple
private IP addresses.

 A new header format which offers less overhead: The new header format of IPv6 is designed to
minimize header overhead. All optional fields which are needed for routing are moved to
extension headers. These extension headers are located after the IPv6 header. The IPv6 header
format is also streamlined so that it is more efficiently processed at intermediate routers. The
number of bits in IPv6 addresses is four times larger than IPv4 addresses.

 An efficient hierarchical addressing and routing infrastructure: The IPv6 global addresses are
designed to create an efficient routing infrastructure.

 Built in support for security - IPSec: A requirement of IPv6 is support for IPSec. IPSec contains
the following components that provide security:

o Authentication header (AH): The AH provides data authentication, data integrity and
replay protection for the IPv6 packet. The only fields in the IPv6 packet that are excluded
are those fields that change when the packet moves over the network.

o Encapsulating Security Payload (ESP) header: The ESP header provides data
authentication, data confidentiality, data integrity, and replay protection for ESP
encapsulated payload

o Internet Key Exchange (IKE) protocol: The IKE protocol is used to negotiate IPSec
security settings.

 Support for Stateless and stateful address configuration: IPv6 can support a stateful address
configuration and a stateless address configuration. With IPv4, hosts configured to use DHCP
have to wait a minute before they can configure their own IPv4 addresses. Stateless address
configuration however enables a host on a link to automatically configure its own IPv6 address for
the link. These addresses are called link-local addresses. A link-local address is configured
automatically, even when no router exists. This allows communication between neighboring
nodes on the same link to occur immediately.

 Support for Quality of service (QoS) header fields: There are new fields in the IPv6 header that
specify the way traffic is identified and handled.

o Traffic Class field: This field defines traffic that must be prioritized.

o Flow Label field: This field enables the router to identify packets, and also handle packets
that are part of the identical flow in a special way.

 Unlimited extension headers: You can add extension headers after the IPv6 header if you want to
extend IPv6 for any new features.

 The Neighbor Discovery (ND) protocol for managing nodes on the same link: Neighbor Discovery
is a series of Internet Control Message Protocol for IPv6 (ICMPv6) messages that are used in
IPv6 environments to identify the relationships between neighboring nodes. ND enables hosts to
discover routes on the same segment, addresses and address prefixes. Address Resolution
Protocol (ARP), ICMPv4 Router Discovery and ICMPv4 Redirect messages are replaced with the
more efficient multicast and unicast Neighbor Discovery messages.
Design a Network – Assignment - Holland College Computer Network 51
ICAA5045C -

If you want an IP address to provide all services to the network, then each particular service must have a
unique TCP port or UDP port from that specific IP address. There are a number of well-known ports which
are used by the different services running on your computers.

The main port numbers used by protocols/services running on your computers are listed here:

 Port 20; for File Transfer Protocol (FTP) data

 Port 21; for File Transfer Protocol (FTP) control

 Port 23; for Telnet.

 Port 25; for Simple Mail Transfer Protocol (SMTP)

 Port 37; for Time Protocol.

 Port 49; for Terminal Access Controller Access Control System (TACACS) and TACACS+

 Port 53; for DNS.

 Port 67; for BOOTP server.

 Port 68; for BOOTP client.

 Port 69; for TFTP.

 Port 70; for Gopher.

 Port 79; for Finger.

 Port 80; for Hypertext Transfer Protocol (HTTP)

 Port 88; for Kerberos

 Port 109; for Post Office Protocol version 2 (POP2)

 Port 110; for Post Office Protocol version 3 (POP3)

 Port 115; for Simple File Transfer Protocol (SFTP)

 Port 119; for Network News Transfer Protocol (NNTP)

 Port 123; for Network Time Protocol (NTP)

 Port 137; for NetBIOS Name Service

 Port 138; for NetBIOS Datagram Service

 Port 139; for NetBIOS Session Service

 Port 143; for Internet Message Access Protocol (IMAP)

 Port 153; for Simple Gateway Monitoring Protocol (SGMP)


Design a Network – Assignment - Holland College Computer Network 52
ICAA5045C -

 Port 161; for SNMP

 Port 161; for SNMP traps

 Port 179; for BGP

 Port 389; for Lightweight Directory Access Protocol (LDAP) and Connectionless Lightweight
X.500 Directory Access Protocol (CLDAP)

 Port 443; for Secure HTTP (HTTPS)

 Port 500; for Internet Key Exchange (IKE)

 Port 546; for DHCPv6 client

 Port 547; for DHCPv6 server

 Port 631; for Internet Printing Protocol (IPP)”

 Source : Class Handout Ian Good

“If DNS is setup incorrectly, over time your mail server IP will be added to blacklists. Nowadays
most E-Mail servers have some kind of spam protection service which in turn means that all your
inbound mail will be blocked if you do happen to be listed on a spam blacklist.

In this article I will describe how to correctly configure your MX and reverse DNS records for
your mail server. This article is based on an Exchange 2003/2007 server but every other
messaging server will follow the same principle.

Assigning an IP address

Starting from the bottom up the first thing you need to do is assign a static external IP address to
the internal private address of your mail server. You will need to apply these rules on your
firewall to port forward SMTP (port 25) and NAT an external IP address to the internal address
of the server.

Something that a lot of administrators forget to do or check is to set the outgoing NAT rule to
use the same external IP address created for the inbound rule to the mail server. If this isn't set,
Reverse DNS will not match and in turn your mail server will be listed on blacklists. If your
firewall rules are setup correctly the IP address listed on this page should be the same IP address
you mapped to the internal private IP address of the mail server.

Create the MX records for your mail server

For the purpose of this example, listed below are all the details of my mail server to help you
understand what you need to do.

External IP: 87.22.1.22


Design a Network – Assignment - Holland College Computer Network 53
ICAA5045C -

E-Mail Domain: domain.com

You will need to be an administrative contact for your External DNS provider for your domain to
make these changes. In most cases this can be done through an online control panel through your
DNS provider. Failing that on the phone or via E-Mail.

1. The first thing we need to do is create an A record to point to the external IP address mapped
on your firewall to the mail server. The host A record can be called any thing but is commonly
called "mail". In our example we will create "mail.domain.com" to point to IP address
"87.22.1.22"

2. Next we will create an MX record to point to the newly created A record of our mail server.

Within your DNS control panel select "add MX record". Make sure that the host address is the
root domain name in our case "domain.com"

Set the FQDN as the A record we just created which in our case is "mail.domain.com".

The lowest property is the most preferred but in our example we will set the priority as 10.

Use NSlookup to check DNS and MX records are applied

It can take up to 48 hours for DNS to propagate but in most cases 12-24 hours. To check our
DNS entries are applied and correct we can use nslookup.

1. Open a CMD prompt and type nslookup

2. Type set type=mx

3. Type the domain name which in our case is domain.com.

In our example the output should read as follows if correctly setup:

> domain.com

Non-authoritative answer:

domain.com MX preference = 10, mail exchanger = mail.domain.com

mail.domain.com internet address = 87.22.1.22

Configure Reverse DNS

Reverse DNS is used to verify that the mail server is who it says it is. The recipients mail server
will do a reverse lookup to make sure that the IP address of the mail A or host record in DNS is
Design a Network – Assignment - Holland College Computer Network 54
ICAA5045C -

the same as the IP address it is communicating with. Only 1 RDNS entry can be present per IP
address.

To do this you will need to contact your ISP to make this entry. You will not be able to do this in
your DNS control panel unless your ISP also host your DNS and give you the functionality to
add your own RDNS records.

In our case we would contact our ISP and advise that we would like to create an RDNS entry for
our IP address 87.22.1.22 which would resolve too mail.domain.com.

Verify Reverse DNS

Again it can take up to 48 hours for DNS to propagate but in most cases 12-24 hours. To verify
that the RDNS entries have been added and are correct do the following:

1. Open a CMD prompt.

2. Type Ping -a 87.22.1.22 (This is the external IP address for your mail server. In our case we
use our external IP address stated above)

If RDNS is configured correctly the following output will be shown:

C:UsersUser>ping -a 87.22.1.22

Pinging mail.domain.com [87.22.1.22] with 32 bytes of data:

SMTP Banner

Every time a mail server establishes a connection with your mail server it shows its SMTP
banner. This banner must be resolvable on the internet and best practice is to have it as your mail
host/A record.

Configure SMTP banner Exchange 2003

1. Open Exchange system manager.

2. Expand your administrative group ("First administrative group" by default).

3. Expand Servers.

4. Expand YourServerName.

5. Expand Protocals container.

6. Select SMTP container.


Design a Network – Assignment - Holland College Computer Network 55
ICAA5045C -

7. On the right window, right click the Default SMTP virtual Server (Or the name you set
your SMTP Server) and

select Properties.

8. Select the Delivery Tab.

9. Click the Advanced button.

10. Under the Fully-qualified domain name type mail.domain.com (The A/Host record you
created in DNS for your mail server)

11. Click OK and OK again to accept the changes

Configure SMTP banner Exchange 2007/2010

1. Open the Exchange management console.

2. Select the Organisation Configuration container.

3. Select Hub Transport container.

4. On the right select the Send Connectors tab.

5. Right click your send connector and select properties.

6. On the General tab under the Set the FQDN this connector will... type the A record domain
name you created. Which in our case is mail.domain.com. Click OK.

7. Under the Server Configuration container click the Hub Transport container.

8. In the Right window Select the properties of the Receive Connector under Receive
Connectors tab.

9. On the General tab under the Set the FQDN this connector will... type the A record domain
name you created. Which in our case is mail.domain.com. Click OK

To verify these changes we can use telnet to view the output upon establishing a connection on
port 25 to our mail server. Use the following steps to do this:

1. Open a CMD prompt

2. Type Telnet mail.domain.com 25.

The output you see should look something like this and contain your A record of your mail
server:
Design a Network – Assignment - Holland College Computer Network 56
ICAA5045C -

220 mail.domain.com Microsoft ESMTP MAIL Service ready at Sun, 28 Feb 2

010 17:51:20 +0000

If you use an edge server or a SPAM filter appliance like a Barracuda the SMTP banner will
have to be set on this device/server.

Check to see if your mail server is on spam lists and/or an open relay

A great website to use to check your MX records, RDNS, check if your mail server is an open
relay and check to see if you are listed on spam lists is www.mxtoolbox.com. This is a great site
and one to keep in your favourites.

Following these guide lines will successfully and correctly configure mail routing to and from
your mail server. The next step is too secure and ensure your mail server is not an open relay. I
will be writing a separate article dedicated to this in the near future.

If you would prefer to not experience the stress in looking after and maintaining an Exchange
server environment you may choose a hosted exchange server solution instead.

Mike Collins has over 10 years experience in computing and is a senior IT Consultant at Sphere
IT Consulting”

Source : http://ezinearticles.com/?Configure-Exchange-E-Mail-Server-Reverse-DNS-and-MX-
Records-Correctly&id=3844191

(b) Description of the file servers and NOS, and why they were selected.

There are 5 Main servers in the Holland College Network. The three Domain and file servers for
classrooms and Administration, a e-mail server for Microsoft exchange and the proxy server which will
act as a filter for websites. The servers were chosen because of the geographical area they are in also
for their performance . Hardware Performance specifications for the 5 main servers are.
Design a Network – Assignment - Holland College Computer Network 57
ICAA5045C -

Right Sized, Flexible Technology and Enhanced Business Value


The compact DellTM  PowerEdgeTM  T110 was designed to meet the needs  
of the small business environment. Customizable with up to four hard
drives for your important data, cost effective RAID options for added data
protection, new e-SATA external storage connectivity options and basic
systems management for easy system monitoring, the T110 is an ideal
first server for the small business needing to increase productivity and
collaboration in their office.

Dell aims to add value to your business by providing the features you
need without a lot of the unnecessary extras. Our goal is to deliver value
through tailored solutions based on industry standards, as well as
purposeful, innovative design.

Purposeful Design
Design a Network – Assignment - Holland College Computer Network 58
ICAA5045C -

Built with the latest quad-core Intel®  Our high efficiency, low-flow fans are In addition, the T110 features up to
Xeon®  processor inside, the designed to spin faster in accordance four hard drives for your most
PowerEdge T110 can easily handle with server workload demands. This important data and customer
day-to-day computing and file storage helps to reduce unnecessary noise information. It also features basic
demands. when possible and keeps the server systems management designed to
cooler in your office environment. enable easy system monitoring and
alerts to help ensure reliable
performance day after day without
interruption.

Solid Security  

Dell provides standard security features in the


PowerEdge T110 to help keep your data secure.
The included Trusted Platform Module (TPM)
provides hardware-based encryption and
authentication.

A chassis-intrusion switch alerts you


when internal system components
have been accessed.

The internal locked-down USB ports


helps give IT administrators or small
business owners an opportunity to
implement other security and
recovery options such as a
password verification process to
prevent unauthorised system
access.

And finally, the PowerEdge T110


also features cost effective RAID
options that can prevent data loss by
further protecting the way your data
is stored on your internal hard
drives.
Design a Network – Assignment - Holland College Computer Network 59
ICAA5045C -

http://www1.ap.dell.com/au/en/business/servers/poweredge-t110/pd.aspx?refid=poweredge-
t110&s=bsd&cs=aubsd1

The Network Operating System Microsoft server 2008 was chosen for Holland College to network with
the Microsoft Windows 7 workstations. The email server and proxy host will also use Server 2008.
Microsoft is the most widely deployed and well respected operating system provider.

(c) Summary of hardware costs.

A table of all hardware costs is included in this document under Task 9. The total hardware cost
of this scoping study is $244,387.67. Considerable savings to this amount are envisaged if
Holland College can negotiate with vendors. Also vendors usually give discounts for multiple
purchases. The price displayed in this report mostly is the full recommended retail price. I
would recommend to Holland College to source at least three independent prices before
purchasing from individual vendors.

(d) Summary of software costs

A table of all software costs is included in this document under Task 10. The total software cost
of this scoping study is $308,167.85. Considerable savings to this amount are envisaged if
Holland College can negotiate with vendors about the use and license agreements. Also vendors
usually give discounts for multiple purchases. The price displayed in this report mostly is the full
recommended retail price. I would recommend to Holland College to source at least three
independent prices before purchasing from individual vendors.

(e) The total cost of networking Holland College would be $552,555.52. The total cost of
networking the Administration building only: -

- hardware costs $117,428.00


- Software costs $25,653.85
Design a Network – Assignment - Holland College Computer Network 60
ICAA5045C -

- Total $143,081.85
Design a Network – Assignment - Holland College Computer Network 61
ICAA5045C -

Table of Networking Administration Building Only


Hardware Costs
Assumption : I have based the total of networking just the Administration building
on the current computer allocation of 17 + 50% = 26 units

Task 9 Equipment Cost Number Total Cost Supplier


Of Units
(a) Computer $1,112.31 26 $28,920.06 A

Intel Core i5
ProcessorSuper Fast
1333 FSB Speed
CPU4GB DDR3
MemoryPowerful
AMD ATI HD5770
1GB Graphics Card

7.1 High Definition


Audio Sound Card

1000GB SATA II Hard included included included A


Disk

(b) Powerful AMD ATI


HD5770 1GB Graphics
Card

7.1 High Definition


Audio Sound Card
(c) Internet Service $10,587.0 1 $10,587.00 B
Provider TPG 0
4Mbps/4Mbps Year
(4 wire)
(d) PowerEdge™ T110

Processor
Intel® Pentium® $1549.00 3 $4,647.00 C
Processor G6950
(2.80GHz, 3MB L2
Cache, 1066MHz FSB)
(d1)
Design a Network – Assignment - Holland College Computer Network 62
ICAA5045C -

Task 9 Equipment Cost Number Total Cost Supplier


Of Units
Power Shield
Centurion

The Power Shield


Centurion UPS
provides a
permanent backup
power solution for $699.00 2 $1,398.00 D
sensitive devices such
as medical
equipment and
internet routers.

(e) NEW BOXED SEALED 1,690.00 3 $5,070.00 E


HP LTO-3
ULTRIUM 960 SCSI
TAPE ARRAY DRIVE
Q1540A
(f1) RJ 45 Connectors $3.74 200 $7.48 F1
for 100

(f) $330.00 1 $330.00 F


New Cat5e Cat 5E
CMP 4/24 Plenum
Bulk Cable 2000ft

Microsoft® Exchange
(g) Standard CAL Single
License/Software
$10.00 26 $26.00 G
Assurance Pack
Academic OPEN User
CAL User CAL
(g) Microsoft® Windows
Web Server Sngl
License/Software
$162.00 1 $162.00 G
Assurance Pack
Academic OPEN 1
License
(g) Microsoft® $291.00 3 $873.00 G
Design a Network – Assignment - Holland College Computer Network 63
ICAA5045C -

Task 9 Equipment Cost Number Total Cost Supplier


Of Units
Windows® Server
Standard Single
License/Software
Assurance Pack
Academic OPEN
(g) Microsoft® Exchange
Enterprise CAL Sngl
License/Software
Assurance Pack
$28.00 26 $728.00 G
Academic OPEN 1
License Device CAL
Device CAL Without
Services
(g) Microsoft®
Windows® Server CAL
Single
License/Software $20.00 26 $520.00 G
Assurance Pack
Academic OPEN
Device CAL
(g) Microsoft®
Windows® Server CAL
Single
License/Software $20.00 26 $520.00 G
Assurance Pack
Academic OPEN
Device CAL
(g) Microsoft® Core CAL
(Client Access
License) Single
License/Software $100.00 26 $2,600.00 G
Assurance Pack
Academic OPEN
Device CAL
(g) Microsoft® Core CAL $100.00 26 $2,600.00 G
(Client Access
Design a Network – Assignment - Holland College Computer Network 64
ICAA5045C -

Task 9 Equipment Cost Number Total Cost Supplier


Of Units
License) Single
License/Software
Assurance Pack
Academic OPEN
Device CAL
(h) Microsoft®
Windows® Server
Standard Single
$291.00 3 $873.00 G
License/Software
Assurance Pack
Academic OPEN
(h) Microsoft® Exchange
Server Standard
Single
$473.00 1 $473.00 G
License/Software
Assurance Pack
Academic OPEN
(h1) Microsoft® Windows
7 Professional Sngl $449.00 26 $11,674.00 H1
Software
(i) Gigabit Fiber Nic $129.99 5 $649.95 H
32BIT Pci 1000BSX Sc
(j) Linksys EtherFast $19.95 35 $698.25 I
(LNE100TX-AT)
Network Adapter

(k) Manufacturer: Cisco


Part Code: WS-
C2950SX-48-SI $3,019.50 1 $3,019.50 J
Form Factor: External
- 1U
RAM: 16 MB
Flash Memory: 8 MB
Ports Qty: 48 x
Ethernet 10Base-T,
Ethernet 100Base-TX

(l) Cisco Catalyst K


Design a Network – Assignment - Holland College Computer Network 65
ICAA5045C -

Task 9 Equipment Cost Number Total Cost Supplier


Of Units
2950SX-24 - switch -
24 ports

5 * Public IP4
addresses
1 off Fee $4,175.00 1 $4,175.00 L
Yearly Fee $23,230.5 1 $23,230.50
0
$5,991.69 1 5,991.69 M
QLOGIC SANBOX
5802V FABRIC SWCH-
8GB PT ENABLED PLS
4

$799.00 5 3,995.00 N
HP LaserJet P2050
Printer series -
Specifications

Cisco 12000 Series $1,259.57 1 $1,259.57 O


Router Gigabit
Ethernet Line Card

$1,200.00 2 $2,400 P

Fibre cable course


Total Hardware $117,428.00
Costs
Design a Network – Assignment - Holland College Computer Network 66
ICAA5045C -

Table of Networking Administration Building Only


Software Costs
Assumption : I have based the total of networking just the Administration on the
current computer allocation of 17 + 50% = 26 units

Task Software Cost Number Of Total Cost Supplier


10 Units
Microsoft office 2000 $849.00 26 $22,074.00 A

Math CAD $1050.50 B


Microsoft Visual Studio 2010 $164.95 3 $494.85 C
Professional
Auto CAD 2011 $1,718.00 D
SAS Learning Edition 4.1 for $68.75 E
Students
C++ Compiler ---- ---- C
Included in Visual Studio
Publisher 2010 $189.00 F
M/S Visio 2010 $217.00 G
M/S Project 2010 $1,699.00
H

PC-based financial aid $329.00 3


$987.00 I
Packages

FoxPro database $1049.00 2 $2,098.00 J

Visual foxpro professional


edition 9.0
Total $25,653.85

(f) Explain why you are recommending each item of equipment in Task 9, and how the
recommended system meets reliability goals.
Design a Network – Assignment - Holland College Computer Network 67
ICAA5045C -

Hardware Recommendation and Reliability


Task 9 Equipment Recommendation Reliability Goals
(a) Computer

Intel Core i5 Intel is the words Largest Chip Quality Components


ProcessorSuper Fast Maker
1333 FSB Speed With warrenty
CPU4GB DDR3
MemoryPowerful AMD major Motherboard Maker
AMD ATI HD5770
1GB Graphics Card

7.1 High Definition


Audio Sound Card

1000GB SATA II Hard


Disk

(b) Powerful AMD ATI


HD5770 1GB Graphics
Card

7.1 High Definition


Audio Sound Card
(c) Internet Service TPG 4Mbps Connection
Provider TPG Established ISP Fast for ADSL 2
4Mbps/4Mbps
(4 wire)
(d) PowerEdge™ T110 Quality Server made by Dell Warrenty and after sales service
Intel Processor
Processor
Intel® Pentium®
Processor G6950
(2.80GHz, 3MB L2
Cache, 1066MHz FSB)
(d1)
Power Shield Quality
Centurion UPS Will provide stability and time to shut
Designed down esscential services
The Power Shield For Medical Equipment
Centurion UPS
provides a
permanent backup
power solution for
sensitive devices such
Design a Network – Assignment - Holland College Computer Network 68
ICAA5045C -

Task 9 Equipment Recommendation Reliability Goals


as medical
equipment and
internet routers.

(e) NEW BOXED SEALED New box sealed product with Data will be able to be backed up
HP LTO-3 warrenty
ULTRIUM 960 SCSI
TAPE ARRAY DRIVE
Q1540A
(f1) RJ 45 Connectors Needed for 100Base TX network New product with warrenty

(f) Safe non toxic burning in case of Needed for fast Ethernet
New Cat5e Cat 5E
fire
CMP 4/24 Plenum
Bulk Cable 2000ft

Microsoft® Exchange
(g) Standard CAL Single
Microsoft Cal needed to comply If Microsoft need to come to service
License/Software
with Microsoft license software company is fully compliant with
Assurance Pack
agreements Software license agreements
Academic OPEN User
CAL User CAL
(g) Microsoft® Windows
Web Server Sngl
License/Software Web Server needs to be operating 23hrs
Web Server Assurance of service
Assurance Pack 7days week
Academic OPEN 1
License
(g) Microsoft®
Windows® Server
Standard Single Servers need to be reliable and Ensures that Microsoft will fully support
License/Software on line 23hrs day 7 days week our Servers when we need help
Assurance Pack
Academic OPEN
(g) If Microsoft need to come to service
Microsoft Cal needed If Microsoft need to come to
to comply with service software company is fully software company is fully compliant with
Microsoft license compliant with Software license Software license agreements
Design a Network – Assignment - Holland College Computer Network 69
ICAA5045C -

Task 9 Equipment Recommendation Reliability Goals


agreements agreements
(g) Microsoft®
Windows® Server CAL
Single Microsoft Cal needed to comply If Microsoft need to come to service
License/Software with Microsoft license software company is fully compliant with
Assurance Pack agreements Software license agreements
Academic OPEN
Device CAL
(g) Microsoft®
Windows® Server CAL
Single Microsoft Cal needed to comply If Microsoft need to come to service
License/Software with Microsoft license software company is fully compliant with
Assurance Pack agreements Software license agreements
Academic OPEN
Device CAL
(g) Microsoft® Core CAL
(Client Access
License) Single Microsoft Cal needed to comply If Microsoft need to come to service
License/Software with Microsoft license software company is fully compliant with
Assurance Pack agreements Software license agreements
Academic OPEN
Device CAL
(g) Microsoft® Core CAL
(Client Access
License) Single Microsoft Cal needed to comply If Microsoft need to come to service
License/Software with Microsoft license software company is fully compliant with
Assurance Pack agreements Software license agreements
Academic OPEN
Device CAL
(h) Microsoft®
Windows® Server
Standard Single Microsoft Exchange Server 2008 If Microsoft need to come to service
License/Software needed for Exchange Server software company is fully compliant with
Assurance Pack problems Software license agreements
Academic OPEN

(h) Microsoft® Exchange Microsoft Exchange Server 2008 If Microsoft need to come to service
Design a Network – Assignment - Holland College Computer Network 70
ICAA5045C -

Task 9 Equipment Recommendation Reliability Goals


Server Standard
Single
needed for Exchange Server software company is fully compliant with
License/Software
problems Software license agreements
Assurance Pack
Academic OPEN
(h1) Microsoft® Windows
Quality Operating system that
7 Professional Sngl Microsoft Support
staff members know how to use
Software
(i) Gigabit Fiber Nic Gigabit quality manufacturer of Quality part for the Fiber Backbone
32BIT Pci 1000BSX Sc parts for IT
(j) Linksys EtherFast Linksys is a major manufacturer Quality network NIC for network
(LNE100TX-AT) of quality II components connectivity
Network Adapter

(k) Manufacturer: Cisco Vlan for the backbone of the High Quality part from Cisco reliability and
Part Code: WS- Network. Cisco is the leading performance.
C2950SX-48-SI manufacturer of switches
Form Factor: External
- 1U
RAM: 16 MB
Flash Memory: 8 MB
Ports Qty: 48 x
Ethernet 10Base-T,
Ethernet 100Base-TX

(l) Cisco Catalyst Vlan for the backbone of the High Quality part from Cisco reliability and
2950SX-24 - switch - Network. Cisco is the leading performance.
24 ports manufacturer of switches

10 * Public IP4 IP4 addresses are the network Needed DNS and E-mail servers. Needed
addresses addressing system for the for web presence for Holland College
1 off Fee internet
Yearly Fee
Fiber Switch to enable fast To ensure network speed and efficiency.
QLOGIC SANBOX connections between servers.
5802V FABRIC SWCH-
8GB PT ENABLED PLS
4
HP is the leading printer Quality products = quality results for our
manufacturer. staff.
HP LaserJet P2050
Design a Network – Assignment - Holland College Computer Network 71
ICAA5045C -

Task 9 Equipment Recommendation Reliability Goals

Printer series -
Specifications

Cisco 12000 Series The connection to the internet for Brand name product. High quality and
Router Gigabit our staff. Fiber channel. Fast. very fast speed.
Ethernet Line Card With a quality manufacturer Cisco

Needed for IT staff to manage Will ensure Holland College Staff are able
and configure the fiber backbone to fix and diagnose problems with the
Fibre cable course of the network fiber network quickly and efficiently.

” What service-level agreement (SLA) does your networking client expect?

“Everyone would like a network that was up 100% of the time, but no one can really
afford that. Getting that last 1% is incredibly expensive. A network that's up 99% of the
time is actually a pretty easy thing to achieve -- that's 15 minutes of downtime each day
or a small blip of an outage every hour and a half. So it's important to set expectations
that no network is perfect, but there are certain things that you can do to improve
uptime.

The difference between something that's up 99.95% of the time and something that's up
99.96% of the time is difficult to design around. We don't have that kind of granularity in
network engineering.

Let me break [service-level agreements] down into a couple of different buckets. The
first bucket is one-day return to service. This is a problem that might take a day to fix.
Network equipment vendors often offer a service contract that lets them replace a part
within four hours. That doesn't mean that the outage will last four hours, because it often
takes a couple of hours to diagnose a problem, four hours for the part to arrive and a
couple of hours to install it. But for some networks, that's sufficient for what they need.
It's not the solution that most people want, especially if the company has maybe more
than 50 people or more than three or four locations.

The improvement would be the next bucket, which is called N+1 redundancy. This
means that any one component can fail and the system keeps working. So to achieve
that, you have to have redundancy in the network. For example, a router might need
two fans to keep it cool, but you would buy a model that has three fans -- any one can
fail and the system can keep running. That's what's called N+1 redundancy -- the N is
what's required for the system to keep running, and the 1 is for redundancy.
Design a Network – Assignment - Holland College Computer Network 72
ICAA5045C -

Most equipment nowadays, especially networking equipment, is assigned with all N+1
redundancy on the internal parts, and that can really improve the service-level
agreement, because now you're in a situation where a part that fails does not
automatically equal an outage. If it's one of the few parts that isn't redundant -- for
example, if there's only one network connection between point A and point B -- all the
fans and CPUs in the routers could be redundant, but if they're connecting a single point
between two buildings, and that link goes down, then you're going to have an outage.

So the third bucket is system-wide N+1 redundancy. That's where we have redundancy
not just on the internal links in the equipment, but for all the network links also. For
example, you'd have dual network connections to a wiring closet or between offices.
Especially if you're going between offices, it's important that the two connections are
diversely routed, so that one backhoe doesn't ruin your whole day.

Service-level agreements can be even more protective that that, but usually [additional]
requirements like that are from companies that engineer their own solutions.

Lastly, there are hybrids. So for example, a company with many sites will have a high
service-level agreement for their medium and large offices, where everything is
redundant. But for the smallest of offices -- maybe they have dozens and dozens of
offices with just one or two people, maybe sales offices, scattered all around the world --
often you'll see a different service-level agreement for those offices, where if the router
dies, those people are just going to work off the Wi-Fi from their local Starbucks until the
office can be brought back online.

Q3: What is the purpose of the network being designed?

One should measure application requirements from real-world examples, so if you can
spend time monitoring the network to determine average bandwidth used by certain
applications, you're going to be able to do a much better job.

Latency is another quality that you should investigate. Some applications require low-
latency networking, like NFS, [which] really requires less than two milliseconds of
latency, while other things, like FTP, can work on very high-latency networks.

Q4: What networking skills does your client's in-house IT staff have?

Finding out what skills the client has in-house is important because it determines [at]
what technical level you'll be able to have your conversation, but also what technical
involvement [the client] wants after the installation is done.
Design a Network – Assignment - Holland College Computer Network 73
ICAA5045C -

Are they highly technical and just want assistance designing and spec-ing out the
details of a network design, and then they're going to run the network after that? Maybe
they want project management help, or the nontechnical process of making sure you're
coordinating all the vendors and making sure everything gets done.

Are they just somewhat technical? Maybe they can handle add/move/change requests,
but [are] not technical enough to configure new VLANs or add new connections to new
buildings.

Or maybe they're not technical at all and need a fully managed solution where you're
monitoring remotely and you're contacting them about periodic maintenance and that
kind of thing.

Often clients want some kind of hybrid. Their requirements or their skill level for the LAN
is different from the WAN. Typically [these] users can support their own LAN, ports and
add/move/change requests themselves but want a more managed solution for the WAN
because that's often dealing with vendors and telecoms and a whole different set of
terminology.”

Source :

Q1 Ian Good

Network design checklist:


Six factors to consider when designing LANs

You finally have the consulting project you've been waiting for: A customer is building a new office and
has asked you to design their entire local area network (LAN), as their present infrastructure is outdated
and has ports failing by the day. This is a consultant's dream! However, it can become a nightmare for
you and your company if you design the network improperly. Let's look at some big network design issues
to consider when designing a new LAN for your customers.

Plan the network's complexity to be in line with the customer's IT expertise.

Switches and routers come with hundreds of features and functions. However, engineering too many bells
and whistles into the network can create support problems in the future, if the customer's IT staff does not
have some basic understanding of the features and functions you implement. Recognize the business's
needs without making the network overly complex.

To PoE, or not to PoE?


Design a Network – Assignment - Holland College Computer Network 74
ICAA5045C -

More and more customers are deploying wireless LAN technology and IP telephony. Wireless LAN
access points are easiest to install when Power over Ethernet (PoE) is available. IP telephony utilizes
phones that connect to and draw power from the LAN. The days of the traditional PBX system are
numbered; every vendor out there is moving towards IP PBX systems and handsets. Many customers will
tell you "We are not using wireless," or "We will never move to IP telephony." They may not now (at least
as far as their manager knows), but if you do a good job on this project, your customer will keep their
equipment for at least three to five years. You'll do a great service to your customer if you can convince
them to purchase PoE switches now. Then, when the CIO decides to move to WLAN or IP telephony in
18 months, the non-PoE switches won't have to be replaced.

10 Gigabit Ethernet? 100 Gigabit? Do I need that?

Just because 10 Gigabit Ethernet is here today and higher speeds are coming does not mean that you
need those ports all over the LAN. All too often customers purchase the fastest equipment possible
thinking they need it, even though their existing 100 Mbps network is only running at 5% capacity. While it
is definitely prudent to ensure that core switches can support these higher speeds, you may be advising
the customer to waste a lot of money if you tell them that 10 Gigabit switches are needed everywhere.

Redundancy.

Network uptime becomes more critical every year. Spend time planning a design that provides network
redundancy from a physical and logical perspective. For example, utilize dual fiber-optic uplinks from the
wiring closets to the core switches. Ensure that chassis-based core switches have dual CPU cards. Be
sure to think about items like default gateway redundancy. You can design the most redundant physical
network in the world, but if it's not properly configured to provide Layer 3 IP Default Gateway redundancy
and a failure occurs, your customer's network will grind to a screeching halt and you can be sure they will
call you to ask why.

Standards and maintenance.

When designing a corporate network, try to standardize on a few different types of devices, as opposed to
using a different type of switch in every wiring closet, even if all your equipment is from the same
manufacturer. Standardizing on a few different types of hardware simplifies configuration and
troubleshooting. It also allows the customer to keep cold spares of each device with next-business-day
maintenance, allowing for more rapid and cost-effective responses to device failures.

Network management tools.

While these always seem to be left off purchase orders, network management tools are invaluable in
providing maximum network uptime. Software that periodically backs up all device configurations to a
share on the network is simple but extremely useful. Also, think about the following scenario: Two
switches provide IP Default Gateway redundancy on your customer's network. One of them fails, but you
don't realize it because the network is redundant. When the other one fails, the customer experiences a
total network outage. This can be easily avoided by using a simple tool to ping all network devices and
report on their status.

There are many more items to think about when designing a local area network for your customer. These
are some of the big ones that will hopefully get you pointed in the right direction and, more importantly,
provide you with a happy (and returning) customer.
Design a Network – Assignment - Holland College Computer Network 75
ICAA5045C -

Source : Network design checklist Ian Good


Design a Network – Assignment - Holland College Computer Network 76
ICAA5045C -

Bibliograpgy
Page Reference
2,3 Network design documentation Ian Good

4 http://wiki.answers.com/Q/What_are_the_benefits_of_computer_networking

4 http://www.webopedia.com/TERM/N/network_computer.html

10,11 http://articles.techrepublic.com.com/5100-10878_11-5032914.html

11,12 http://articles.techrepublic.com.com/5100-10878_11-5032914.html

12,13 http://en.wikipedia.org/wiki/Plenum_cable

13 http://www.lanshack.com/fiber-optic-tutorial-network.aspx

13-19 http://www.cisco.com/en/US/products/hw/routers/ps133/products_tech_note09186a00801f
5d9e.shtml

21 http://medschool.ucsf.edu/isu/pdf/Security/password_management.pdf

33,34 Defining Network Infrastructure Ian Good

35,36 http://en.wikipedia.org/wiki/Network_topology

37,38 Course material MSIT Ian Good

38-43 Methods and Formulas Used to Determine Server Capacity Ian Good

43-46 Methods and Formulas Used to Determine Server Capacity Ian Good

47 http://submit.apnic.net/cgi-bin/feecalc.pl?ipv4=10&ipv6=&action=Calculate

47,52 Source : Class Handout Ian Good

52,56 http://ezinearticles.com/?Configure-Exchange-E-Mail-Server-Reverse-DNS-and-MX-Records-
Correctly&id=3844191

57-59 http://www1.ap.dell.com/au/en/business/servers/poweredge-t110/pd.aspx?
refid=poweredge-t110&s=bsd&cs=aubsd1
Design a Network – Assignment - Holland College Computer Network 77
ICAA5045C -

Page Reference

Q1 Ian Good

Network design checklist Ian Good


70-72

72-74

You might also like