Key Topics
- Requirement
- Solution
- A. Network and Cloud Based Storage
- Technical Requirements
- Proposed Computer Systems Hardware
- Justification
- B. Data Protection and Backup
- Technical Requirements
- Proposed Computer Systems Hardware
- Justification
- C. Network Monitoring
- Technical Requirements
- Proposed Network Monitoring Solutions
- Justification
- D. and Management
- Technical Requirements
- Proposed Logging Solution
- Justification
- E. Troubleshooting Methodology
- Technical Requirements
- Proposed Computer Systems Hardware
- Network Customization and Optimization
Requirement
Question: Write a network design proposal.
Solution
A. Network and Cloud Based Storage
Technical Requirements
The university network need to have a system to provide a 24x7 internet access as it is the backbone to all other functionalities that are to be performed by organization. In order to do that, the topology should be well chosen that could serve the purpose. The hardware should be well picked according to the requirement. Assuming the university is having a sufficiently big server room where all the network related activities could be carried out. The servers are required to be kept at a very secure place with access to only the IT guys. In a university a huge amount of data is supposed to be stored and shared across the entire network. Having a physical server for that shall be very expensive as it is already very costly and difficult to maintain. Additionally, as the data increases, the memory racks on the server are also required to increase. In order to avoid such problems, the university should choose the cloud server provided by Amazon and other companies. The best part of choosing such server is that they are cost efficient and easy to maintain. The server cost is reasonable and there is no overhead to maintain them the companies provide 24x7 support for it and whenever required, the university can ask the company to increase the rack space of the memory. Taking a third party server also reduces the overhead of the security as the server providers very keenly look into the matter of server security. The take all possible measures to secure their servers from the intruders and the attackers.
Proposed Computer Systems Hardware
The university campus network is supposed to be interconnected with high speed Ethernet that links over optical fiber gigabit Ethernet and 10 gigabit Ethernet. The tiered architecture of the network helps in establishing university network with proper distribution and provides access to segments for undisturbed flow of data and information traffic. Wi-Fi routers shall be required to provide internet access in the common areas like conference rooms and seminar halls. Getting a virtual infrastructure manager is very crucial. Eucalyptus, Open Stack and Open Nebula are the very well-known open source software. A cloud management software like RightScale shall be required to ease up the routine tasks like Virtual machine installation, setup, defining policies etc. in case the university prefers to use the third party server then, all these software are not required. The university can ask the server providing company to install the required software and provide their access.
Justification
All the building blocks, residential areas, hostels, and other centers shall be connected via high speed optical fiber and within the building, the connection shall be carried out using the UTP copper cable that supports gigabits speed. The seminar halls and conference rooms shall be provided with Wi-Fi routers that are 802.11 security enabled having centralized authentication.
B. Data Protection and Backup
Technical Requirements
One of the most important aspect of information technology today is data protection and it’s availability whenever required. The data should be made available to all the authorized user on demand irrespective of the location or any other factor. The data should be timely backed up so e in case of any calamity, the data is secure. The system should be smart enough to restore to it’s normal self in the least possible time soon after the calamity. In order to do so the backup a d restore system should well equipped and effective. Data protection too is a wide area to cover.
Proposed Computer Systems Hardware
The backup of the data cannot be made on CDs or DVDs. It has to be on a very secured and trustworthy source. If the university is using external webserver, then these webserver providers also provide extra storage areas. For example, Amazon offers Amazon S3 for data storage. Carbonite is another option which keeps data encrypted too. For data protection various antivirus and antispyware software are available in the market. We can opt any of them according to the requirement.
Justification
We should consider all possible causes of data loss before deciding on the data backup and restore plan for the organization. Various data loss reasons could be due to natural calamity or man made causes. In both the cases the data should be timely backed up. Now the data that is backed up, should be secured using a trustworthy software. The off-site storage options can be well considered.
C. Network Monitoring
Technical Requirements
Once the network plan is laid out successfully, its monitoring system is setup. It helps in finding out the loopholes in the system. The network monitoring system not just helps to trace out the faulty points in the connection, but also the cause of it. It helps in the tracking of such trap doors in the network that can invite intruders in to the system.
Proposed Network Monitoring Solutions
Open NMS, Cacti, Zabbix are few of the open source software that help in Network monitoring. There are other paid tools too like AddMon, AppNeta etc. The choice of the software completely depends on the requirement and the budget of the organization.
Justification
The network monitoring tool is very much required in an organization’s as it not only helps in finding out loopholes and trapdoors in the system, it also helps in timely checking the health of the network. The network tends to wear out with time and the efficiency decreases. In order to avoid such problems, network monitoring tools are helpful.
D. and Management
Technical Requirements
The purpose of a log management tool is to find out an doing point to the location or the reasons that caused or may cause network failure. The logging software contains functions like regular logging of audits, log collection, log analysis and it’s reporting too.
Proposed Logging Solution
There are many tools available for log management and analysis namely: Retrace, GoAccess etc. These software are very helpful in tracking the software theatre may cause or are currently causing trouble in the network system.
Justification
The log storage and management system comes very handy in when it comes to finding problem in the existing network system. There can be scenario where the network fails and causes a lot of damage. In order to avoid such damages in future, log management system comes handy. It helps in finding the loopholes that has caused the damage. The log management system has audits that pin points the location and cause of the issue.
E. Troubleshooting Methodology
Technical Requirements
In network management, troubleshooting is an important aspect. Whenever the network fails or tends to fail, the troubleshooting method comes to be very helpful in fighting the issue causing the problem.
Proposed Computer Systems Hardware
There can be a number of good software for troubleshooting system. But a good design is helpful in troubleshooting the issues. By good design, we mean the network topology should be simple, the hardware should be user friendly so that whenever the system fails or tends to perform inefficiently, the IT team is able the trace the issue and fix it asap
Network Customization and Optimization
In the university, various network services are required. The university students would require intranet services for data and information sharing. The college professor would require a college network to share the assignment and notes with the students. The students would also require internet services. Since there is huge data that would travel over the network or would be stored, large webservers with huge storage would be required. With data and large network layout, demand comes for data security. Data is to be secured against both attackers outside and the inside intruders. Outside attackers tend to interrupt the network and exploit the services for their own benefit. The inside intruder work to crack the network and make the work easy for the outside attackers. Once the data is secured against the attackers, it has to be secured against the natural or man-made disasters. Disasters cause huge loss of data and it becomes very difficult to restore to system back to its normal self. In order to do so, the organization implements the backup and restore mechanisms. The backup and restore mechanisms take timely backup of the data and they are well logged. Once the data is backed up, it can be easily restored in case of any natural calamity or man-made disasters. After the backup and restore system, comes the logging systems. The logging system is helpful in keeping logs of the action that are taken and whenever any mishap take place, these logs are considered and they prove to be very helpful in tracking the issue and fixing it. Network monitoring system is another very useful mechanism in tracking the issue in the network. It finds out loopholes in the system and help in fixing them. Even if there is no issue in the system, the hardware tends to wear out with time, making the system inefficient. In order to avoid the latency caused by them, the network monitoring system, helps in fixing them in time.
Place Order For A Top Grade Assignment Now
We have some amazing discount offers running for the students
Place Your OrderThe network based storage shall be very much required by the university students, as they would have a lot of data and information to be shared among them. Additionally, the college professors too would need the network to share the notes and other information with the student. The university would also require to store the student’s, faculty’s and academic details on the network and make these data available to everyone who are authorized to access these data. That is why, proper data backup and restore system is to be implemented. Once the network plan is laid out successfully, its monitoring system is setup. It helps in finding out the loopholes in the system. The network monitoring system not just helps to trace out the faulty points in the connection, but also the cause of it. It helps in the tracking of such trap doors in the network that can invite intruders in to the system. The choice of the software completely depends on the requirement and the budget of the organization. The network monitoring tool is very much required in an organization’s as it not only helps in finding out loopholes and trapdoors in the system, it also helps in timely checking the health of the network. The network tends to wear out with time and the efficiency decreases. In order to avoid such problems, network monitoring tools are helpful.
The purpose of a log management tool is to find out an doing point to the location or the reasons that caused or may cause network failure. The logging software contains functions like regular logging of audits, log collection, log analysis and it’s reporting too. These software are very helpful in tracking the software theatre may cause or are currently causing trouble in the network system. The log storage and management system comes very handy in when it comes to finding problem in the existing network system. There can be scenario where the network fails and causes a lot of damage. In order to avoid such damages in future, log management system comes handy. It helps in finding the loopholes that has caused the damage. The log management system has audits that pin points the location and cause of the issue. In network management, troubleshooting is an important aspect. Whenever the network fails or tends to fail, the troubleshooting method comes to be very helpful in fighting the issue causing the problem. There can be a number of good software for troubleshooting system. But a good design is helpful in troubleshooting the issues. By good design, we mean the network topology should be simple, the hardware should be user friendly so that whenever the system fails or tends to perform inefficiently, the IT team is able the trace the issue and fix it asap.
+1-817-968-5551
+61-488-839-671
+44-7480-542904




