You are on page 1of 9

0

TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................2
What I intend to do this...............................................................................................................2
NETWORK DIAGRAM.................................................................................................................3
ANALYSIS OF THE NETWORK..................................................................................................4
BASIC DATA FLOW OF THE UNIVERSITY.........................................................................4
EXAMINATION OF NETWORK..............................................................................................4
RECOMMENDATION...................................................................................................................6
FLOW STACK OF PROTOCOLS.............................................................................................6
LAYER USED IN LOGIN..........................................................................................................6
RECOMMENDATION FOR PROTOCOLS..............................................................................6
CONCLUSIONS.............................................................................................................................7
REFERENCES................................................................................................................................8
2

INTRODUCTION
Each office operates on a computer network. All these computers are connected so that they can
communicate with each other. Administrators can simplify the work they do and prevent data
theft. Therefore, each office will have a network administrator, but larger offices will have more
responsibilities than network management specialist services.
Network professionals look after the computer networks within the institute. They also keep up
networks in engineering units and confirm that all organizational contacts are in the complete
institute. They built all the network systems themselves. They also often serve the network, so
there are NOV errors in LAN (Local Area Network) and WAN (Wide Area Network)
communications.
An important part of a network specialist job description is implementing office-specific
networking software. He has the expertise to design the internal network system keeping in view
the needs of the organization. They thoroughly review the requirements without consulting and
studying the network and without designing the network. They can also assist other software
professionals in setting up the system.
Once the network is designed and implemented, the system teaches all employees and all work
and communication within the system takes place. They are constantly searching for new
software that applies to the company's systems.
[ CITATION BSR20 \l 1033 ]
One of the basic requirements of network professionals is data security. Important and
confidential documents can be protected from theft by rival companies or employees. Therefore,
the specialist will restrict access to these documents and install a firewall and anti-virus system
on the network. They also need to see who is using the network and what they are doing.
[ CITATION Bet20 \l 1033 ]
What I intend to do this
First simply I have look out the old network of the university. Find some key points of the old
topology of the network. Then assume some sing tomes In mind and then put my input and
efforts to the network.
3

NETWORK DIAGRAM
4

ANALYSIS OF THE NETWORK


BASIC DATA FLOW OF THE UNIVERSITY
First thing that needs to clearly defined is that the transmission protocol. So, the network that I
have created for the university is fully based on TCP/IP protocol. Network is too simple to
understand and work. If there is some problem in the network then we can easily debug or
troubleshoot it. We use simple devices in the network on both campuses. These devices are as in
the following.
[ CITATION UAB09 \l 1033 ]
 Mainframe Computer
 Switch
 Router
 Hub
 Personal Computer
 Ethernet Cable
 Firewall
And configuration of these upper devices is done appropriately.
 Basic flow of the network is that there are two type of users in the university. Users has
privilege’s and staff members has no privileges.
 Students can only use software or can use data of the given datasets. But cannot install or
uninstall any type of software.
 But staff members can do any thing like installation or uninstallation.
 First data is reach at the main switch of the campus that I put very next to the mainframe
server.
 Server only maintain the resources like printer fax or other devices.
 When data is submitted over the internet from any user then first data will reach to the
firewall and then submit to the internet.
[ CITATION Mac74 \l 1033 ]
EXAMINATION OF NETWORK
If we think about the computer field then we cannot sure that there is some thing enough or
complete like software or network design.
So, now if we talk about this network design then we will say that yes there is some weaknesses
in the network design. If we install more costly devices in the network then automatically our
network performance will be increased. For example, we can use high technology proxy server
or firewall so our data will be encrypted and no one can harm or access our data. We can use
Higher encryption technique.
5

we used mainframe computer in the local network. So, we can use more expensive and high-
speed computer as server machine.
Now we are using internet data server to store our data. But if we build our data center then
oncourse data will more secure and fast access.
6

RECOMMENDATION
FLOW STACK OF PROTOCOLS
In computer field every thing has many processes in its background. So, now we are talking
about this network design. Now we will talk about the protocols and their order of working.
 At the lower level if we use ring topology then token ring protocol will be used.
 After this TCP/IP protocol will work for transmission of data.
 When data reach to server then there are number of algorithms and programming’s that
are used to manage data and resources.
 When data reach to router for access to internet then OSPF and TCP protocols will be
used.
LAYER USED IN LOGIN
 Router work on Layer 3 (Network Layer)
 Switch work on Second Layer
 Hub work on physical Layer
TCP protocol is used in Login application because if we talk about the login application then it is
all send message and receive reply. So, in Login application TCP protocol is used because in this
protocol when message is sent then sender wait for the response. In this scenario when user enter
the ID and Password then wait for the reply from the server.
RECOMMENDATION FOR PROTOCOLS
Do we really need new network protocols? The short answer is yes. In fact, the current network
protocols are working wonderfully and efforts to improve them have not improved much.
However, some smart people have suggested significant changes in the basic protocols that make
networking easier. The real question is, is change so important that their adoption is justified?

If what we have is working, why do we need new protocols? Review the functionality layers
required to implement security, NAT, QoS and content management. This becomes complex
very quickly when the layers contact each other. Some of the recommended protocols contribute
to network flexibility. ITV6 was intended to mend security, but further investigation exposed
some important security resources, such as neighborhood discovery and automated tunneling.
New protocols:
 Designated Data Networking (NDN)
 Rebuild Internet Architecture (Reena)
 Good IP
 Easy IP (EZIP)
[ CITATION Ter18 \l 1033 ]
7

CONCLUSIONS
At the end I would like to say that if your network design is simple and consistent then there is
much easy to find and remove the problem in the network. So, we keep our design simple and
simple. Then asked in the paper for the new protocols. So, we told in the last question about the
well-known new protocols.
And if you spent more and more on your network design then your network design will pe best
and best.
At the end one for the network design
Nothing is best or consistent for once. But after time and many updated or modification to
designs we can achieve best and best results.
8

REFERENCES
Bakshi, U., 2009. Network Analysis. 2 ed. s.l.:Technical Publisher.
BetterTeam, 2020. Network Specialist Job Description. [Online]
Available at: https://www.betterteam.com/network-specialist-job-description#:~:text=Network
%20specialists%20deploy%20and%20maintain,network%20errors%20at%20client
%20locations.
[Accessed 11 October 2020].
BSR, 2020. Network Specialist Job Description. [Online]
Available at: https://www.bestsampleresume.com/job-descriptions/network-specialist.html
[Accessed 11 October 2020].
Slattery, T., 2018. Examining Emerging Network Protocols. [Online]
Available at: https://www.nojitter.com/examining-emerging-network-protocols
[Accessed 11 Oct 2020].
Valkenburg, M. E. V., 1974. Network Anaysis. 1 ed. s.l.:Printice Hall.
Valkenburg, M. E. V., n.d. s.l.:s.n.

You might also like