Recommended Network Design
The recommended network design is the computer network. Computer network mainly entail the connection of either two or more computers with the objective of exchanging information and sharing of the available resources within the business enterprise. This computer network enables the communications amongst the clients by e-mail through the means of sending and receiving the information by the constructions and establishment of the suitable communication channels. Computer network majorly entail numerous computers that are normally linked together within the same home environment in order to exchange data and consequently share the available resources. The recommended network that is to be designed is the one that is called the local area network because it is specifically for covering the smaller geographical location (Philip 2008). The designed network is to be connected through the network interface card with the support of the operating system. Local area network is normally utilized in linking the computers that are in secure nearness to every one such as home. It is significant in sharing of the resources such as files, printers and computer games. The local Area network operates in connection with the internet and the wide area network (WAN). Its design demands the use of the Ethernet cables, network adapters together with the hubs (Curt 2011).
The best design of the local area network (LAN) the business individual ought to have the desired communication information requirement that entail the appropriate communication patterns and the comprehensive networked devices. The designed network system ought to be the one that is extremely flexible for future alteration by incorporation of the architectures such as the Cisco and Rockwell Automation Converged Plantwide Ethernet (CPwE)
Drawing of the Configuration
Network Architecture Suggestion
The designed network system ought to be the one that is extremely flexible for future alteration by incorporation of the architectures such as the Cisco and Rockwell Automation Converged Plantwide Ethernet (CPwE). The designed network ought to have the creation of the structure of the plantwide EtherNet/IP network, which entail the logical topology that utilizes the combination of a multi-tier switch hierarchy of logical model(Philip 2008). The distinct zone and segmentation to be put within the control systems devices, servers and the final communicating end electronic components in a manner that they are in logical topology that is based on the home geographical location,purpose,accessibility and the anticipated performance demands. Within the segregated logical topology that consists of the modular building blocks ought to be designed into dual layer of networks in order to minimize broadcast domains. The utilization of the fundamental local area networks found within the segregated zones cater for the purpose of differentiating of the diverse traffic types that coexist within the network desired by aiding in the minimization of the number of the devices to be used in the existing zones by less than two hundred and the VLAN. The use of the firewalls is to strongly segregated within the manufacturing and the business zones hence creating a demilitarized, which in turn make the sharing of the application and information amidst the existing zones(Curt 2011).
There provision of the significant network services that include the loop avoidance, resiliency, isolation, priorization, time harmonization, multicast management, safety and diagnostics (Philip 2008). The design and the implementation of the local area network demand the reflecting accessibility and the resiliency. The logical topology overlay of the design network incorporate the physical topology that utilizes the fiber links and the redundant paths amidst the switches for the maximal network connectivity. There ought also to be best speed and duplex within the end devices incorporated by the smooth network infrastructure components of communication. This can be proficient via the deployment of the in depth technique that aids in the prevention of the noise production. The noise productions include the bonding of the sound, EMI separation, shield obstructions and the filtering.
The application of the design local area network must be determined accompanied by the appropriate network security measures. This achieved through the establishment of the dialogue box for the information technology that are workable within the demands of the design network. The person involve in the operation of the design local area network ought to apply security approaches that encompasses numerous applications. There must be measures to eradicate the network latency and the worry via application of the standard network protocols. These protocols entail time harmonization via application of the IEEE 1588 time protocol, superiority of the service for the curbing information prioritization accompanied by the internet group administration protocol for the multicast firms. The computer network design ought to be the one that enhance the availability of information data and the redundant (Curt 2011).
Internet Access Configuration
The internet Access configuration is the main means through which the business premise would connect itself to the design network. The configuration involves the numerous end user available devices such as routers to the customer to the premises site, which are at high speed to the backbone interne. The accessibility of the local area network is mainly connected to the routers located to the customer`s premises(Curt, 2011). The routers that aid in the relaying of the configuration work through some special means and perform functions. The router is concerned with forwarding of the outgoing packets from the existing local area network to the end default gateway that is the backbone router. Routers typically serve the function of forwarding the packets to the prevailing remote IP addresses up to the backbone network, and then leave the desired packets for the local region within the local area network. The available router within the premises aids in the filtering of the transmission packets that are allowed to pass in and out of the local area network. This is carried out in the form of equipping the router with the access lists which normally records the both the initial IP addresses and the eventual addresses that are then forwarded to the existing local area network. The source and the destination packets that are not recognized by the access list are simply discarded within the router thus filtering the existing data that is transmitted(Philip, 2008).
The router existing will aid in the conversion of the local IP network addresses to the public IP addresses which are recognized by the public internet through the usage of the Network Address Translation(NAT). The configuration of the internet access utilizes routers in the assortment and the bite rate when relating to the existing exterior network.
Recommended Hardware
The recommended hardware for this design network include routers, system interface cards,hubs,bridges and switches The designed network will utilized the routers as one of the chief hardware in its transmission of the information data. Router is a small box like device that is utilized in the distribution of the signal from the modem to the prevailing computer internet (Philip 2008). This devices is an in built of the firewall and normally found outside the computers with hard drives that is difficult to be infested hence it is the safest and safeguard the whole network as it is always on. Since it has the inbuilt of the firewall, it aids in safeguarding the computer from the crackers and unnecessary viruses within the internet (Curt 2011). Network interface cards involve the internet adapters that are designed specifically in physical accessing of the prevailing networking medium thus giving a low height addressing system via the utilization of the MAC addresses.
Repeaters hardware is the electronic device used in the receiving of the signals, cleaning of the redundant noise, regenerates and then retransmits the signal to the advanced power level. Repeaters are normally demanded in the form of the twisted pair Ethernet configurations, which runs for approximate distance of one hundred meters. Hub is a repeater that has numerous ports and normally serves the same function as the repeater and requires minimal time for it to generate the signals (Philip 2011). The bridge must also be utilized as it composed of numerous network cables that are best in the data link layer application. It functions in collaboration of the existing MAC addresses that are accessible via the special ports and it composed of three major kind local bridges being the most appropriate for the underlying network design. Wireless bridges are also normally utilized in either joining of the local area network or connection of the remote stations to the existing local area networking. Network switches are the hardware device that is utilized in the forwarding and the filtering of the signals amidst the existing ports. It is different from the hubs since it mainly involved in the transmission of the signals frontwards the structures to the prevailing ports that are within the reach of the required communication. Switches normally create the processes of front warding via utilizing the fundamentals of the MAC addresses. Firewall hardware is the most vital in provision of the network security as it functions in a way that rejects the unsecure access request while allowing the genuine one to pass.
The vital hardware within the Local Area Network is the cables, which are normally in variety. The most appropriate cables are the twisted cables which is the cheapest thus affordable for the businessperson (Chris, 2008). The other required cable is the coaxial cable has it can be utilized in connection of numerous computers and they are relatively cheaper. Fiber optic are the best choice amongst the three because the arte capable of transmitting light and immune to interference that are normally resulting from the electrical devices. They can also carry numerous channels at ago.
Costs of the Hardware
The cost of the hardware utilized within the implementation of the local area network is relatively affordable depending on the quality and capacity the consumers demand. This hardware includes the firewall that has major constituents as the cables, routers, electronic switches, bridges, repeaters and hubs. The firewall is considerately expensive as it acts as a protective device preventing the computer from being attacked by the crackers and the viruses. Router is estimated to be $350 while switches are dependent on the quality that the traders demands with the swift one going at $124. The total amount of the required hardware is less than the Mooney the entrepreneur has thus all the devices ought to be put in place for the accomplishment of the project (Philip 2011).
Recommended Software
. The recommended software to be used in the designing of the network arte the office web that normally presented as a sole non-devoted PC workstation and the web server equipped with little cost ISDN adapter. The server PC utilizes either window 95 or window NT for connection of the control panel up networking services to develop demand control panel linkage with the local area network users’ internet interchange at a speed of 128kbps. Office web software aids in provision of high-speed internet admittance for the person utilizing the local area network(Curt 2011). The business enterprise also ought to use the existing LAN monitoring software called the osMonitor software. This software allows the monitoring of the employees within the working job hours as it display the crucial details of the local area network through the usage of the network interface flow cards accompanied with its hardware sections. osMonitor local area network normally monitor the existence of the clients within the LAN through the aids of the central computer known as the server manufactured by the server managers the details of all the clients are set in it automatically. This software shall also the used of the actual time scrutinizing and the perpetual tracking of the users` undertakings within the local network computers (Chris, 2008). The Window NT version 4 Software utilizes the master model domain in the exercising of the control over the user account information.
The maintenance of the network software mainly requires the utilities, internet software that is very efficient in terms of the operation, the modern programming tool and the appropriate methods of its application. The utilities that are mandatory in the maintenance include the antivirus software, help software, crash defense software, remote access software and the uninstall software that are mainly utilized in the replacement of the destroyed ones. Internet server software act as the support for the side internet connections,retrievation of the web pages other important within the client workstation, storage of the business enterprise data and finally aid in the function of the commercial internet applications. The availability of the software programming tools within the business enables the creation of the workable programs with the inclusion of the compellers and the interpreters. These software in programming allow clients and the business owner to edit, remove the error within the written program and the execute the program.
Generally, the designing of the network within the business entail advanced methods that are very significant in the modern competitive market, which is global market. Local area network allows the segmentation of the hardware that is very essential to the operation of the network design system. Routers plays a significant role in this design as it incorporate the firewall that act as the protective desired of the operating system from cracking and accessing the important to the business enterprise. However, the local area network covers a smaller geographical region that enables it to work efficiently.
.
References
Fehily, C. (2008). Microsoft Windows Vista. Berkeley, Calif: Peachpit Press.
Dick, P. K. (2011). Valis. Boston: Mariner Books
White, C. (2011). Data communications and computer networks: A business user’s approach. Boston: Course Technology.