Data and Networking

Table of Contents

Introduction.

Existing Network Topology.

Recommendations

Justification of the proposed solution.

Conclusion.

References

Introduction to Network Architecture

The growth and prosperity of institutions have significantly influenced the quality of the network system, facilitating communication and flow of information from the internet to the institution. The rise of technology has helped some institutions to grow faster after embracing and implementing the appropriate network systems, which improve the rate of handling institutional activities. However, improper integration of internet devices may risk the entire network system by creating insecurity loopholes. The network system is essential in Xerlasian University to facilitate communication between the staff, students, and gathering relevant information necessary for creating smooth learning. The University is planning to open a new branch in Australia. Therefore, it needs to set up a better network system to ensure a smooth flow of information from the internet. Therefore, this report handles the existing network system and recommends the best ways to improve the network system.

Existing Network Topology

Xerlasian University Australia is planning to expand its scope and open a new campus in Australia. Due to this plan, there is a call for setting up a new network on the second campus. Before setting the system, the campus sources advice from data and networking specialists on the network will be done. All the networking devices will include the topology to be used, the networking devices, the flow of information. The University has an existing network that is thought not to be effective, and therefore there is a call to set a useful system on the second campus. The staff and students at the University share the same hub for the class computers and staff computers. Sharing of seats reduces the efficiency of operation due to increased traffic coming from many requests from the multiple end-user devices (Kayvanfar et al., 2019). The failure rate in the network also increases due to congestion resulting from voluminous access of information from the single hub. Security and privacy are not guaranteed in the current system since both students and staff have equal privileges. The network also allows both students and the team to install software on computers, resulting in information jeopardy. 

The current network flow of information is full of and prone to intrusion, which makes it insecure for the University's private data and information such as copyrights, financial, among other critical details. From a request by the end-user devices to the internet, the flow of information follows a defined path. From the internet, information flows to the router, from router to hub, where either the student or the staff access it using their servers. The existing network uses the Open System Interconnection (OSI) protocol stack, which contains seven layers which allow communication throughout the internet (Ruland, 2019). the OSI protocol layers include application, presentation, session, transport, network, data link, and physical layer. In a network protocol stack, Hubs work in the physical layer of the OSI model. It is responsible for detecting collisions and helps in forwarding the jam signals. The router operates in the network layer, and its responsible for forwarding data packets between computer networks. Also, the router detects traffic on the internet. Therefore, its major function is routing data packets through the internet network. The log-in application operates in the application layer of the OSI protocol stack and allows the users to access services that are provided by the system.

Recommendations on Network Architecture

Architecture: there is a rampant change in technology; therefore, the network in the existing campus is full of faults that need to be fixed on the projected campus (Fernandes et al., 2017). There is a need for multiple connections; therefore, switches should replace hubs, and a firewall should be installed for security purposes. During the network building, the network experts should place the firewall between the router and the server. The firewall will screen every request from the internet or the client nodes and block any fish activity when detected (Angeles, 2020). In this project, Bus topology is considered the best topology to use in the upgrade since it is cost-effective to install and maintain. UPS shall be integrated into the architecture and connected to the main power supply to regulate power failure and upsurge.

Components: The components in the proposed network shall include different servers that will be serving different roles. The servers will consist of domain name servers, proxy servers, mail servers, and database servers. DHCP, UPS, and switches shall be integrated into the new network. A firewall shall be installed to sit between the server and the router to prevent any malicious attack.

Generally, for more effective functioning, the technicians advise installing various devices with the current technology. The network will contain virtual LANs, thin client servers, maintain bus topology as networking layout, Virtual Private Network (VPN), use SDN, and integrate Storage Area Network (SAN). The network will have integrated security features such as password managers, port security, and firewalls.

The current OSI protocol stack needs to be improved by implementing other, more sophisticated, and effective protocols. In this case, the network shall contain an internet protocol stack for providing both connectionless, unreliable branch (UDP) and connection-oriented reliable branch (TCP) built on the internet protocol. Also, the network can consider replacing the OSI protocol stack by TCP/IP protocol stack, which combines the seven layers of the OSI model to form four layers that are, Network Interface, Internet, Transport, and Application layer. The protocol ensures successful transmission of data and information from the internet to the user via a protocol stack.

Justification of The Proposed Solution

The proposed network shall be installed with a firewall that shall sit between the server and router for the security of the network. The firewall shall be filtering all the internet information and prevent unauthorized access as compared to the conventional system in the existing campus (Bakker, 2017). The DHCP server will be responsible for automatically assigning IP addresses to all the nodes available. The introduction of UPS will ensure the uninterruptable power supply in case of power failure and upsurge. Upgrade and introduction of new servers will provide a robust network with few flaws and failure rates. The password managers will provide extra security to the hardware and software.

Conclusion on Network Architecture

Conclusively, networking is critical in the modern era, where the world is turning digital in all aspects. From the case scenario, the network to be set in the second campus should offer better functionality than the already existing network in the Xerlasian University Australia. The flows diagnosed in the current network the University is operating in should be addressed in the new network setup. The existing network does not guarantee security. Therefore, the new network setup should include a firewall that should sit between the router and the server to filter all services that reach the server for dissemination. Thus, the new network setup should advance the current one regarding security, efficiency, and reliability.

References for Network Architecture

Angeles, P. (2019). U.S. Patent No. 10,419,562. Washington, DC: U.S. Patent and Trademark Office.

Bakker, J. N., Welch, I., & Seah, W. K. (2016, November). Network-wide virtual firewall using SDN/OpenFlow. In 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN) (pp. 62-68). IEEE.

Fernandes, E., Rahmati, A., Eykholt, K., & Prakash, A. (2017). Internet of things security research: A rehash of old ideas or new intellectual challenges?. IEEE Security & Privacy15(4), 79-84.

Kayvanfar, V., Husseini, S. M., NengSheng, Z., Karimi, B., & Sajadieh, M. S. (2019). A practical supply-demand hub in industrial clusters: a new perspective. Management Research Review.

Ruland, C., Kang, N., & Sassmannshausen, J. (2016, November). Rejuvenation of the IEC 61850 protocol stack for MMS. In 2016 IEEE International Conference on Smart Grid Communications (SmartGridComm) (pp. 625-630). IEEE.

Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Management Assignment Help

Get It Done! Today

  • 1,212,718Orders

  • 4.9/5Rating

  • 5,063Experts

Highlights

  • 21 Step Quality Check
  • 2000+ Ph.D Experts
  • Live Expert Sessions
  • Dedicated App
  • Earn while you Learn with us
  • Confidentiality Agreement
  • Money Back Guarantee
  • Customer Feedback

Just Pay for your Assignment

  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00Per Page
  • Consultation with Expert

    $35.00Per Hour
  • Live Session 1-on-1

    $40.00Per 30 min.
  • Quality Check

    $25.00
  • Total

    Free
  • Let's Start

Get
500 Words Free
on your assignment today

Browse across 1 Million Assignment Samples for Free

Explore MASS
Order Now

My Assignment Services- Whatsapp Tap to ChatGet instant assignment help

Collect Chat

refresh