Discuss the importance of servers in computer networks

Assignment Help Computer Networking
Reference no: EM133186655 , Length: 3000 words

Scenario:

Case Study:
Fushia Group is a privately owned, well-known Software company located in Colombo. The Management of Fushia Group has purchased a 3-story building in the heart of Kandy. They are planning to make it one of the state-of-the-art companies in Kandy with the latest facilities. It is expected to have nearly 350 employees in Kandy branch.

Department

Number of Users

Support and Delivery

80

Sales and Marketing

10

Finance

25

HR

5

Engineering

200

Infosec

3

Server Room

Servers + ISP connections

Following requirements are given by the Management.
• All the departments must be separated with unique subnet and should not communicate with each other unless there is a special requirement.
• 192.168.10.0/24 is given and should be used for all the departments except the server room. IPs should assign using DHCP.
• ERP and CRM Systems need to be implemented in Kandy branch in local servers.
• Number of servers required for the Server room need to be decided by the Network designer and should be assigned with 10.254.1.0/24 subnet. (Uses static IPs)
• High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.
• Sales and Marketing Team need to access Network resources using WIFI connectivity.
• Proper methods for networking monitoring and troubleshooting need to be established.
• All possible network security mechanisms should be implemented.

Assume you have been appointed as the new network consultant of Fushia Group. Prepare a network architectural design and implement it with your suggestions and recommendations to meet the company requirements.

(Note: Clearly state your assumptions. You are allowed to design the network according to your assumptions, but main requirements should not be violated)

Task 01
1. Discuss the different network models/system types that can be implemented in Kandy branch with their benefits and constraints.
2. Discuss main IEEE Ethernet standards that can be used in above LAN and WLAN design?
3. Recommend a suitable network topology for above scenario and justify your answer with valid points.

Task 02
1. Discuss the operating principles of network devices that can be used for above scenario. Ex: Router, Switch, Etc.
2. Explore and describe the devices which we can use to enhance security of Fushia Group Kandy Branch.
3. Critically analyze the importance of networking software and provide examples for networking software can be used in above network design.
4. Discuss the importance of Servers in computer networks and research on Servers that are available in today's market with their specifications and Recommend server/servers and workstations for above scenario and justify your selection with valid points.
5. Discuss why it is important to have compatible devices and related software in network design.

Task 03
1. Provide IP subnetting scheme for above scenario to satisfy user requirements.
2. Provide a list of devices, network components and software need to design a network for above scenario and justify your selection.
3. Provide a detailed network design (Diagram) for your design using modeling tool. (Ex: Microsoft Visio).
4. Install and configure Network services and Applications* of your choice to accomplish above user requirements. (Ex: DHCP, DNS, Active Directory, Proxy, Web, Etc.) (Note: Screen shots of minimum 2 services are required)
5. Design a detailed Maintenance schedule for above Network design.

Task 04
1. Implement and configure all network devices* according to the requirements given in the scenario.
2. Conduct verification with e.g., Ping, extended ping, trace route, telnet, SSH, etc.
3. Provide troubleshooting steps for following situations.
1. Everything is working normally but suddenly the connection goes away, and then comes back, and then goes away again on client computer. (i.e., flapping)
2. Network cable plugged in but getting no connection.
4. Recommend potential future enhancements for the networked system and justify your recommendations.
5. Write a conclusion for your report by Critically evaluating design, planning, Configuration and testing of your network.

*Note: - Screen shots of Configuration scripts should be presented.

Reference no: EM133186655

Questions Cloud

Small businesses found in service-producing sector : Why are most small businesses found in the service-producing sector? Identify five small service-producing businesses that you patronize frequently.
Expansionary and contractionary monetary policy : Explain?the chain of events that occurs for expansionary and contractionary monetary policy to affect the long-run equilibrium level of real gross domestic prod
What is the arbitrage profit : The risk free asset has a return of 5%, is there an arbitrage opportunity and what is the arbitrage profit?
Apparent failure of classical economic theory : Keynes economic theory was developed in large part as response to the apparent failure of the Classical economic theory during the Great Depression
Discuss the importance of servers in computer networks : Discuss the different network models/system types that can be implemented in Kandy branch with their benefits and constraints.
Show the entries that Brian Company will make : For the year 20X1, show the entries that Brian Company will make related to the above transactions, assuming that it uses the equity method
Identify revenue sources and expenditures : Identify three revenue sources and three expenditures for that agency. The impact of the expenditures on the revenue source
What amount would the company recognize as a gain : On January 25, Year 2, when the payment was made, $1 could purchase 0.85 euros. What amount would the company recognize as a gain
Relationship between positive analysis and public economics : Explain the relationship between positive analysis and public economics. Explain the relationship between normative analysis and pubic economics.

Reviews

Write a Review

Computer Networking Questions & Answers

  What type of wireless protection do you use

What type of Wireless protection do you use on your home network? Advantages, disadvantages? Discuss a couple of different ways that you can "harden" your home wireless network protection

  Compare the different vpn services offered

Using the Internet, locate TWO companies that provide VPN services. Compare the TWO different services offered. Include their services, pricing, and make.

  Review on security aspects for cloud architecture

Need 3000 words including citation & APA referencing - Potentials for applying cloud technology in accounting. Review on security aspects for cloud architecture

  What does the Hub do with MAC addresses

Were there different types of wires used to connect devices and What does the Hub do with MAC addresses and IP addresses

  Explain how security and privacy laws affect the design

Explain the role of IT in monitoring compliance with the organization's risk management policies and plans when outsourcing the identified IT function.

  Demilitarized zone

Demilitarized zone (DMZ) can be found in which firewall configuration

  Implement a program in which a client sends the server

A valid variable name is defined for this assignment to be 6 characters or less, consisting only of lower-case letters from a to 'z', inclusive.

  Examine advantage of organization using cloud backup storage

Cloud backup storage is growing in popularity. Examine the advantages and disadvantages of an organization using cloud backup storage. Explain whether or not you would recommend using cloud backup storage.

  BN110 Information Systems Fundamentals Assignment

BN110 Information Systems Fundamentals Assignment Help and Solution, Melbourne Institute of Technology - Assessment Writing Service

  Implement client and server programs on bank atm application

Implement client and server programs on bank ATM application. Give error checking if amount is legal and userID/password (created in the 1st time).

  Can we find the prefix length

In classless addressing, we know the first address and the number of addresses in the block. Can we find the prefix length?

  Show an example of a dhcp packet with an end-of-list option

Show an example of a DHCP packet with an end-of-list option. What is maximum number of seconds that can be stored in Number of Seconds field of a DHCP packet?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd