Professional Documents
Culture Documents
implementation of a new office located at Orchard road. The new office will comprise
Executives with forecast of not exceeding more than 50 personnel in the future.
Several information has been given by the Network Director to facilitate the
implementation of the new network design, one Domain server where the Active
Directory is to be installed, one DNS and DHCP server that is to provide both DNS
and DHCP services, a third party email service and the network IP (Internet Protocol)
Transmission media
sender to receiver in two forms, Guided and Unguided (Polak, Laskowski, 2016).
information via a directed physical link through physical mediums. Guided media
have higher speed and are more secure however, are limited to shorter distances.
(i) Twisted pair cables where two separate insulated wires are wounded
further into two types known as the Shielded and Unshielded pair. The
shielded pair boosts better performance at higher data rate and eliminates
interferences but is bulky and expensive which leads to difficulty in
(ii) Optical fibre cable which utilizes the reflection of light through a medium
Unguided media on the other hand which refers to wireless transmission without the
(i) Radiowaves. This transmission media is the most common wireless media
used in modern times due to its easy to generate and high material
(ii) Infrared. These wireless media is used for extremely short distances. It
does not possess the capacity to penetrate most materials thus it is mainly
Laskowski, 2016).
For Kaplan’s network design, the combination of both guided and unguided
transmission media is utilised. The network design will consist of the following
(i) Cat 5 unshielded twisted pair cable will be used to link up the entire
within the office. Other transmission media are not considered due to price
required.
Network Components
Upon the identification of transmission media, the next stage of planning will be the
Each network component is described in detail below to further explain the usage
and purpose.
(i) Routers, the main hub of accepting and transmitting electronic data from
(ii) Switches. The main bridge within the company’s network. Switches
several VLAN (Virtual Local Area Network) into a single internal network
desktop network card. This allows employees within the office access to
the company’s internal network whilst gaining mobility within the premise.
from the laptops, the servers are the ones that will assist in the facilitation
of network infrastructure.
Network Diagram
To further illustrate the design flow, a Star Topology network diagram of the Orchard
office is displayed below (Orchard Network Diagram). Inter transmission for the data
of the two offices between Wilkie Edge office and Orchard office will ride on a leased
line service so that both offices are able to access data that is shared between each
other despite being different physical sites. The network diagram is designed with
the focus of high availability to reduce potential down time and abrupt cessation of
productivity at any time of day. This aids in regular maintenance and patching that is
Computation of IP address
address, the last assignable IP address, the broadcast IP address, and the range of
assignable IP address.
IP Address: 10.64.136.105
Due to the extremely large possible subnets available, the total utilised subnets for
this design will start with the first 5 ranges and the remainder to be reserved as
the design.
Every device that is connected to the internet uses a unique IP address. This allows
other machines that are connected to find one and other. A Domain Name System is
like the phonebook of the internet (Hoogendoorn, 2021). It translates domain names
into IP addresses through numbers. This also works within the internal network of
the company.
Threats
With current day advancement in technology, cyber threats are fundamentally the
new normal (Hodson, 2019). Threats are classified in several categories of their own
Malware attack comes in a variety of forms such as, viruses, ransomware, Trojan or
worms. They work by breaching through the network via vulnerabilities or when an
end user clicks on an email attachment which then installs it. Malware is capable of
software installed which will identify and quarantine these malicious files.
Attackers are able to disrupt the traffic and siphon information through
eavesdropping (Hodson, 2019). Thus it is critical that devices are encrypted and
secured with passwords with password changes occurring every 3-6 months at a
time.
Phishing attacks are the most commonplace as they are usually sent through email
sensitive information such as credit card details or even install Malware to the
phishing mails and on top of that messaging gateway filters can be implemented to
Conclusion
In conclusion, this report has fulfilled the objective of defining the transmission media
and hardware components that were chosen for the network design.