Unit-2 Network Design Assignment Help | Designing Activ Directory Logical Structure
Test results against expected results
Unit-2 Network Design Assignment Help Test results of the network design are analysed against the user requirements and existing network design. It is observed that network design is effective to deliver the performance and other parameters those are effective to serve the requirements of users from network. But the security of network needs some improvements because the internal verifier is not setup to govern the user activities and requests on server and information. However, security and encryption is provided to secure the information from outsider unknown IP
addresses (Bonald and Feuillet, 2013). The network design is also compatible to use different wired and wireless equipments from different vendors.
Table 2: Test results
|Quality of Service||Excellent||Excellent||Response time is reduced to 1.5 sec for request to servers.|
|Bandwidth||Shared effectively to serve all the devices with large files.||Enough to send word and portal format files||Bandwidth is enhanced to meet future requirements as approx. 650 users can be connected without degrading the performance a much.|
|Security||Enough to block unknown request and packages in network.||Secure against failures.||Al though, there is no security from the inside of network as logging of user activities and router is not done.|
|Compatibility||High||Medium||However all the devices in network are from same vendor but compatibility is provided to use equipments from different vendor and protocols (Voznak, and Rozhon, 2010).|
Recommendation on potential enhancements
The network design for Amun-Ra is effective but still needs some changes to make it robust against the network attacks and failures.
- Amun-Ra organization can modify the internal network design to enhance the physical security on devices. Physical security can be enhanced by protecting the access to servers and major workstations in network. Also the routers and switches can be placed away from the user access and needs proper monitoring for their functioning. The network design is recommended to use the advance security of physical devices.
- The firewall and filtering services in network is recommended to modify with access control list (ACL). Organization can implement ACL to control the user access to resources and network requests (El Gamal and Kim, 2011).
- Servers and storage locations can be replicated so that data can be accessed and recover in case of loss or theft.
- Amun-Ra can use latest technical hardware and software to enhance the utilization of resources and to secure the communication among employees.
The maintenance process is required to keep the network update and fresh from barriers to serve effectively. The potential problems in network maintenance may arise in the form of:
Bandwidth: The high number of users rather than recommended may decrease the network performance. Therefore, organization needs to analyse the network bandwidth and its usages to enhance the performance in data transmission. Also the bandwidth needs to be divided uniformly to serve all the terminals with equal bandwidth portion from network (Smoot.et.al.2011).
Connectivity: Network will work if any of the routers fails in branch but the performance will decrease. The connectivity to all network components should be checked periodically. Organization may document the device locations and configurations to resolve the connectivity issues. Organization can take help of various software and hardware tools to check the connectivity of components.
Security: Whenever the new components are added in network or existing IP addresses are changes, the network configuration needs to be secure against new rules. Firewall and routers can be setup to new configuration to meet the new requirements of organization. Addition to proper authentication and user activity monitoring can help to reduce the risk of network failures and data loss (Murray, 2013).
Unit-2 Network Design Assignment Help | Designing Activ Directory Logical Structur
The report has been concluded the benefits and constraints of various networking system and topologies. Impacts of various networking technologies and standard have been identified along with role of protocols to effective utilization of network. The report has been discussed the role of hardware and software components in network and determined the server and workstation for network requirements. The report has been designed and evaluated the network design for organization. The network has been implemented and tested for the desired results and maintenance report has been generated with recommendations. Potential problems and their solutions have been identified to improve the network design.
Books and Journals
Bonald, T. and Feuillet, M., 2013. Network performance analysis. John Wiley & Sons.
Chandra, R. and Sinnen, O., 2010, April. Improving application performance with hardware data structures. In Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), 2010 IEEE International Symposium on (pp. 1-4). IEEE.
Che, X. and Maag, S., 2014. Passive performance testing of network protocols. Computer Communications, 51, pp.36-47.
Ciccarelli, P., Faulkner, C., FitzGerald, J., Dennis, A., Groth, D. and Skandier, T., 2012. Introduction to Networking Basics. John Wiley & Sons.
De Smet, R. and Marchal, K., 2010. Advantages and limitations of current network inference methods. Nature Reviews Microbiology, 8(10), pp.717-729.
El Gamal, A. and Kim, Y.H., 2011. Network information theory. Cambridge university press.
Fall, K.R. and Stevens, W.R., 2011. TCP/IP illustrated, volume 1: The protocols. addison-Wesley.
Ghosh, U. and Datta, R., 2011. A secure dynamic IP configuration scheme for mobile ad hoc networks. Ad Hoc Networks, 9(7), pp.1327-1342.
Gill, P., Jain, N. and Nagappan, N., 2011, August. Understanding network failures in data centers: measurement, analysis, and implications. In ACM SIGCOMM Computer Communication Review (Vol. 41, No. 4, pp. 350-361). ACM.
Hiertz, G.R., Denteneer, D., Stibor, L., Zang, Y., Costa, X.P. and Walke, B., 2010. The IEEE 802.11 universe. IEEE Communications Magazine, 48(1), pp.62-70.
John, W., Pentikousis, K., Agapiou, G., Jacob, E., Kind, M., Manzalini, A., Risso, F., Staessens, D., Steinert, R. and Meirosu, C., 2013, November. Research directions in network service chaining. In Future Networks and Services (SDN4FNS), 2013 IEEE SDN for (pp. 1-7). IEEE.Order Now