102
ICAA5045C - Design a Network Chris Hutton - 7105090610 Major Assessment : - Holland College Project Chris Hutton - #7105090610 12/9/2010

Holland College Project

Embed Size (px)

Citation preview

Page 1: Holland College Project

Design a NetworkChris Hutton - 7105090610

Major Assessment : - Holland College Project

Chris Hutton - #7105090610

12/9/2010

Page 2: Holland College Project

Design a Network – Assignment - ICAA5045C -

2

“Network design documentation Ian Good

Solution providers embarking on a network design project face an enormous documentation problem. In many cases, clients provide inadequate network design documentation or no network documentation at all. This forces providers to deliver inaccurate quotes, resulting in wasted time and resources. Other clients may not understand the importance of network documentation, and forego documentation services or squander the documentation that a provider does deliver.

Obtaining and supplementing current network design documentation

Solution providers should obtain as much network documentation as possible before embarkingon a design or redesign. The form and detail of any network documentation can vary between clients. Solution providers should expect to have enough information to understand the business requirements for the network; growth estimates for the network; applications running on the network; network storage needs; external network access requirements; remote network access requirements; and network support needs within the environment.

In practice, however, clients often have little to no network design documentation available -- or choose not to share that documentation with providers during the pre-assessment or bidding process. This presents a dilemma for providers who then must make an additional investment in network discovery or risk underbidding the job. "Many consultants lose money on the first job because they don't do enough discovery work to give an accurate quote," said Karl Palachuk, CEO of KPEnterprises Business Consulting Inc. [www.kpenterprises.com] in Sacramento, Calif.

Client server migration is often a "first engagement" for a solution provider, but it's also one of the most complex tasks to tackle. Without adequate network design documentation, solution providers may find themselves quoting a complicated job with little tangible information. Palachuck underscores the counterproductive effects of withholding documentation. "Clients are reluctant to give out too much information before they choose a consultant to do the job," he said. "But that just means they are forcing the consultants to give them bad estimates of the actual job!"

Any documentation presented by the client should be used cautiously. "Even if they have docs, they're often not right," said Adam Gray, chief technology officer of Novacoast, an IT professional services company headquartered in Santa Barbara, Calif. Mistakes may be present in the original documentation, and changes (especially small changes) frequently go unrecorded. "Never trust any work that was done before you. Always double-check the work you're looking at," Gray said.

Some solution providers circumvent potential problems by adding an initial discovery process to the project. "We almost never get any documentation," Gray said. "We typically have to build in a requirements assessment as part of a project. At the end of that requirements assessment, there's a possible scope change based on findings." Any signed contracts should include a clause that accommodates scope and price changes based on assessment results.

There are additional tactics to consider when initial network design documentation is scarce or nonexistent. The first option is to price the job based on time and materials, avoiding the risk of guesswork entirely. Another approach is to document the client's environment for them as a promotional opportunity. "For example, we can do PC tune-ups," Palachuck says. "Then we document everything we see and everything we touch." The insights gained during such initial jobs can help providers understand the environment, find where critical information is stored and so on. Solution providers may rebate some (or all) survey costs as a promotional tool when bidding on the "real" network design job.

Page 3: Holland College Project

Design a Network – Assignment - ICAA5045C -

3

Solution providers can use network discovery products and other tools to help speed their assessment or spot-check the details of some documentation. For example, Microsoft's Business and Technology Assessment Toolkit [https://partner.microsoft.com/40025740] helps consultants gather information about the client's environment. There are also many powerful tools that can map networks and analyze infrastructures, such as SolarWinds' LANsurveyor [http://www.solarwinds.com/products/LANsurveyor/].

Delivering network design documentation to the client

A proposal contains a summary of the client's objectives, a confirmation of the project's scope (including a description of the intended architecture and suggested equipment), a description of the intended project (including any assumptions made), along with a phased deployment plan and a diagram of the expected network architecture. There may be additional elements, and the level of detail can vary depending on the project and its complexity.

"We very rarely put any network documentation in a proposal," Palachuck said. All of the meaningful documentation generated during a network design project should be presented to the client at the project's conclusion. A completed network design documentation package can contain considerable detail. Content can include a summary of the project and its individual deployment phases, a detailed diagram of the actual network architecture, executive and detailed deployment plans, a WAN diagram listing geographic locations of all business installations, floor plans for each location, data and voice wiring jack maps, annotated LAN and other infrastructure diagrams, power and cooling details and specifications, and architectural diagrams (if appropriate) showing conduits and other relevant network details.

"The basics would include a network diagram, a spec sheet for each machine including servers and workstations, a description of the IP scheme, a list of all the equipment passwords, and an up-to-date description of the backup strategy," Palachuck said.

The package may be daunting, but the goals are clear. "A client needs enough documentation to completely re-create the client's computing environment in case of a disaster. They also need enough detail to make regular maintenance fast and efficient," Palachuck said, noting an incident where a client was obligated to buy a new firewall because the prior solution provider failed to provide the necessary administrative credentials. A client should expect (and deserves) a complete suite of documentation.

While there are no limitations on the detail for the client, there can be too much information. For example, listings of software components installed on every system are easily generated, but contain little practical information for the client or future technicians. The challenge in producing documentation is to strike a balance between detail, cost and the client's business efficiency. "Ultimately, logical network diagrams won't mean anything to the business analyst," Gray said. "All they care about is that the thing works, it stays up, it's stable, and that it provides the level of service they're expecting."

Solution providers rarely focus their business on developing or updating client documentation. While it's certainly possible, clients are hesitant to buy and pay for a separate documentation package unless they've had documentation problems in the past. Instead, providers include documentation in the current job, and then update documentation as part of subsequent jobs. Managed services may also include regular documentation maintenance as a standard service. Solution providers often chose to retain a copy of the client's network design documentation. This not only provides a duplicate if the client should lose their copy, but it also makes service more efficient for technicians that visit the client regularly”.

Source : Network design documentation Ian Good

Page 4: Holland College Project

Design a Network – Assignment - ICAA5045C -

4

Task 1

Describe How a Network would benefit each of the following groups

(a) The Management Team

The introduction of Networked computers into the administration area of Holland College will improve the ability of staff to interact with one another. It will streamline communication and resources and give administration staff more ability to manage areas of responsibility more effectively.

“Some benefits of computer networks are given below. (1) Computers which are connected through a network can share resources as hard drives, printers, scanners etc with each other. (2) They can send file from one computer to another quite easily. (3) You can connect all the computers which are connected through a network to the internet by using a single line. So it means that you can save the connection cost for each computer but you internet connection must be fast. (4) IF you want to access data from the other computer which is the part of network then you can access data from that computer. (5) Users can run those programs which are not installed on their computers but are installed on any other user's computer.”

Source : http://wiki.answers.com/Q/What_are_the_benefits_of_computer_networking

“One of the strongest arguments behind network computers is that they reduce the total cost of ownership (TCO) -- not only because the machines themselves are less expensive than PCs, but also because network computers can be administered and updated from a central network server”

Source : http://www.webopedia.com/TERM/N/network_computer.html

.

- Kathy Jackson – President

The ability to Network Computers will benefit the President of Holland College by allowing her to monitor and have access to all computers from her office. The President will not have

Page 5: Holland College Project

Design a Network – Assignment - ICAA5045C -

5

to leave her office to deliver information and to get resources. The President will also have the ability to manage resources and staff from her office. Networked computers allow for better resource allocation and therefore long - term cost savings with better staff productivity. The President would have the ability to assign access and manage different domains within the college. Therefore allowing different access to different users.

- Reuben Asimow – Vice-President of Administration

The ability to network computers would benefit Reuben Asimow the Vice-President of Administration. He would have the ability to access and give staff resources from any computer in his domain. The computer network also could give the administration area the ability to share resources. Every staff member would not need printers and scanners. These devices can be set up as shared resources for all the administration area to use. The use of internal Email and even Voice over internet protocol, (VOIP) could allow even more cost savings and productivity.

- Howard Victor –Vice-President of Instruction

Howard Victor the Vice-President of Instruction would be able to interact and monitor staff usage of all computer use from his computer. He can access the Registrars computer to check enrollments. He would also be able to monitor and manage the student services from his desktop. He would have the ability to share information with any computer within the administration domain. He could develop web enabled content about his areas of responsibility on his computer and allow users in his domain to access and manage this for him.

- Nicole Estes – Director of Development

The Director of Development MS Nicole Estes will be able to share information about future projects and the strategic direction of Holland College with fellow co- workers. The ability to network computers can allow Nicole access to important information from other departments easily. She can search for information from her office without having to interrupt staff members. She will have the ability to communicate with fellow co- workers and have internet access through the network. She can share resource with fellow team members.

Page 6: Holland College Project

Design a Network – Assignment - ICAA5045C -

6

(b) The Business Office -Jackie Herrera –Business Manager

The Business Office could implement an intranet for all business activities. Payroll, receipts and Invoices can be developed into an enterprise solution. Different users and groups can be managed by a domain controller. This organizes the company into logical groups and users who have different permissions and access to their area of responsibility. The business office would benefit from the deployment of a computer network.

(c) The students and staff of each faculty using computer labs

Students would benefit from a computer network with increased access to computer based services and training. Computers are very good at delivering complex information. The Graphical user interface can manipulate information and make it more user friendly. The ability to network and to use shared resources will make the cost of training by computer more economical. Users can run programs which are not installed on their computers but are installed on any other user's computer.

(d) Yourself, as the PC Co-ordinator

Network computers can be administered and updated from a central network server. The network will also reduce the total cost of ownership (TCO). Users will be able to have increased ability to interact and share resources. The Network if set up properly will be more secure. Users will be assigned different levels of access and control. The Network has the ability to grow and develop with the business and student needs.

Page 7: Holland College Project

Design a Network – Assignment - ICAA5045C -

7

Task 2 & 3

Inventory of Computers, Operating Systems and Software used at Holland College.

Classrooms

Location Units CPU Ram Hard Drive

O.S Software

Math and Science Lab

10 Intel Core 2 512MB 80GB Windows Me

?????

Microsoft Office 2000, Math CAD,

Auto CAD, SAS, C++ Compiler, Visual

Basic 6

Math and Science Lab

12 Intel Core 2 1GB 80GB Windows Me

?????

Microsoft Office 2000, Math CAD,

Auto CAD, SAS, C++ Compiler, Visual

Basic 6Total Math and

Science22 22 Intel core 2 10 * 512MB

12 * 1GB22 * 80Gb 22 Windows

Me ???? 22 * Microsoft Office 200022 * Math CAD22 * Auto CAD22 * SAS C++ 22 * Compiler22 * Visual Basic 6

English and Writing

24 Intel core 2 256MB 40GB Windows ME

????

Microsoft Office 2000, Publisher 2000, M/S Visio 2000, and M/S Project 2000.

English and Writing

11 Pentium 3 128MB 20GB Windows ME

????

Microsoft Office 2000, Publisher 2000, M/S Visio 2000, and M/S Project 2000.

Total English and Writing

35 24 * Intel Core 211 * Pentium 3

24 * 256MB11 * 128MB

24 * 40GB11 * 20GB

35 * Windows ME ????

35 * Microsoft Office 2000

35 * Publisher 2000 35 * M/S Visio 2000

Page 8: Holland College Project

Design a Network – Assignment - ICAA5045C -

8

35 * M/S Project 2000.

Administrative Offices

Location Units CPU Ram Hard Drive

O.S Software

Angela Miles, HRJackie Herrera, BMSherry Parks, FM

3 Pentium 4 128MB 20GB Windows ME Microsoft Office 2000

Janice McKinneyRyan Mc Kim

2 Pentium 4 512MB 120GB Windows ME Microsoft Office 2000

David Whitefeather

Randy Thomas

2 Pentium 4 256MB 120GB Windows ME Microsoft Office 2000

John DaleJill Sanchez

2 Pentium 4 512MB 20GB Windows ME Microsoft Office 2000

Alice YasuiDimitri Kasakav

2 Pentium 4 512MB 20GB Windows ME Microsoft Office 2000, PC-based

financial aid packages

Howard Victor 1 Intel core 2 512MB 320GB Windows 2000

Professional

Microsoft Office 2000

Nicole Estes 1 Pentium 4 512Mb 500GB Windows ME Microsoft Office 2000

Steve Gaudio 1 Pentium 4 256MB 120GB Windows ME Microsoft Office 2000, FoxPro

databaseKathy Jackson 1 Pentium 4 512MB 120GB Windows Me Microsoft Office

2000Bob Watson 1 Pentium 4 256MB 500Gb Windows Me

Windows 2000 Server

Microsoft Office 2000

C++ CompilerME!!!!!!

Chris Hutton1 Pentium 4 1GB 500Gb Windows ME

Windows 2000 Server

Microsoft Office 2000, C++ compiler

Administrative offices Total

17 16 Pentium 41 Core 2

1 * 1GB9 * 512 MB4 * 256MB3 * 128MB

3 * 500GB1 * 320 GB6 * 120 GB7 * 20 GB

1 * Windoss 2000

Professional16 *

Windows ME2 * Windows 2000 Server

17 * Microsoft Office 2000

2 * Financial Aid Packages

1 * FoxPro Database

2 * C++ Compiler

Page 9: Holland College Project

Design a Network – Assignment - ICAA5045C -

9

Total School Wide IT Equipment

Location Units CPU Ram Hard Drive

O.S Software

Total School Wide

units Processor units Mb/Gb units GB1 * windows

2000 Professional

47 Intel Core 2 12 1GB 12 80GB

11 512 MB 110

320GB80GB units

SoftwarePackages

Totals73 *

Windows ME

24 256 MB 24 40GB11 Pentium 3 11 128 MB 11 20GB 74 Microsoft

office 200016 Pentium 4 1 1GB 1 500GB2 *

Windows 2000 Server8 512MB 1

34

500GB120GB20GB

22 Math CAD

4 256MB 13

500GB120GB

22 VisualBasic 6

3 128 3 20GBTotal 74 74 74 22 Auto CAD

24 SAS22 C++ Compiler

35 Publisher 2000

35 M/S Visio 2000

35 M/S Project 2000

2 PC-based financial aid

Packages1 FoxPro

database

Page 10: Holland College Project

Design a Network – Assignment - ICAA5045C -

10

TASK 4

The benefits of internal e-mail would be the ability to manage and control e-mail settings and to have a domain name that reflects the nature of your business. At Holland College the natural domain name for their business could be [email protected]

“One of the main things you’ll gain from setting up your own mail server is complete control over how many mailboxes you can have, how those mailboxes are set up, and how they work. Are you running into size limitations on your existing mail service? Does your current mailbox keep filling up or rejecting your messages because they are too large? No problem! When you own the mail server, you can do whatever you want. Go right ahead and send that 20 MB attachment to the remote office.

That brings up another important advantage that your own mail server can provide. You can extend the benefits to others, hosting accounts for other branches or even partners. That’s particularly nice if you’ve succeeded in securing a domain name for your company. The downside comes if your remote sites and business partners start to rely a little too much on their mail accounts. If your Internet connection goes down for a few days for reasons beyond your control, or your server suddenly develops a bad case of virus-of-the-week, you don’t want people calling at 2 A.M. to complain about it. I’ve been in the 24/7 support business and hated it. You will, too, if you get in that position. If you open your server to others, make sure they understand that they get what they pay for and should have a backup option, such as Hotmail or Yahoo. You should have a backup for your own e-mail account as well.

Autoresponders are another handy feature offered by many mail servers, and they're much like out-of-office replies. For example, maybe you have a document you want people to be able to obtain simply by sending a message to a specific account. A customer can send a message to [email protected] and get back a reply with your favorite fudge recipe. Businesses often use autoresponders to distribute information about products and services. Whether you manage services for a commercial venture or run a small home business, autoresponders might add a new way for you to interact with your customers.

Many mail servers offer features that make it easier to distribute mail to groups of people. While you can create distribution lists with any e-mail client, creating groups at the server lets anyone send mail to that group through a single e-mail address. Some mail servers give you the ability to send messages to group members in round-robin fashion. This means that each new message gets sent to a different person in the group. This is a great way to distribute messages evenly across the group, and it is typically used to distribute sales or support requests.

Keeping out spam is another potential benefit to hosting your own mail server. While you can create rules in your e-mail client to delete messages from specific senders, keeping out spam for several mail accounts can be a headache, particularly if your current service doesn’t give you any spam-blocking features. With antispamming built into the server, you can block mail from domains or specific senders for all accounts.

Many mail servers also provide built-in virus scanning or can use add-ins to scan messages coming and going through the server. You might use this in conjunction with client virus-scanning software to add another layer of security for your home network.”

Page 11: Holland College Project

Design a Network – Assignment - ICAA5045C -

11

Source : http://articles.techrepublic.com.com/5100-10878_11-5032914.html

Disadvantages of setting up your own e-mail server would be cost and ongoing technical support costs.

The main advantage of setting up your email account on the web with an Internet Service Provider, (ISP) would be cost and support. If there is a problem with the e-mail server it would be the ISP’s responsibility. Less technical knowledge would need to be needed to configure and support the e-mail network. Some ISP’s also support domain name hosting. For a fee all e-mail accounts could be set up on the Internet providers e-mail server.

An in house e-mail Server could be set up with a dedicated e-mail program like Microsoft Exchange.

Some of the other issues are addressed in the following article.

“First, you’ll need your own domain if you want to receive messages directly to your server. You can register your domain at Network Solutions, Register.com, Go Daddy, WebSite.ws and through other domain providers. When you register a domain, you need to provide the IP address and host name of at least one DNS server for your domain, although most registration services require two DNS servers. If you run Windows NT Server or Windows 2000 Server, you can use the DNS service included in those platforms to host your own DNS records. Otherwise, you can use a third-party DNS server application.

Next, you need to create or have your registrar create a host record in the DNS zone for your domain. The host record associates a host name with an IP address. For example, the host name of my mail server is mail.boyce.us. In addition to the host record, you also need an MX record. This mail exchanger record tells other mail servers what address to use to deliver mail to your domain. Again, you need to create the MX record on your own DNS server or have your registrar create it on its servers, depending on where your DNS service resides. Both records need to point to your public IP address.

Now it’s time to hook up your server. If yours is like most networks with a broadband connection, you have a small number of public IP addresses (perhaps only one), and all of your computers use private IP addresses. The MX record must reference the public IP address because that’s the only one the outside world can see. So, if your DSL router or cable modem is assigned the one public IP address, it needs to forward the incoming SMTP traffic to the private IP of your mail server.

Check the documentation for the unit and see if it supports one-to-one Network Address Translation (NAT). Many cable/DSL routers let you translate specific ports, so you would configure the unit to pass port 25 (SMTP) from the public IP to the private IP of your mail server. If you’re using your own DNS server, you’ll also need to translate port 53 to move DNS traffic to the private IP address of your DNS server (probably the same computer that’s handling mail). If anyone, including you, needs to be able to retrieve messages from the server outside of your network (such as from the Internet), you also need to translate port 110 (POP3) from the public IP to the private IP of the mail server.

If your cable/DSL router doesn’t support NAT, you’ll have to either replace it or obtain a second public IP

Page 12: Holland College Project

Design a Network – Assignment - ICAA5045C -

12

address from your ISP. Then, set up the server with that IP address. How you hook the server into the network depends on the type of equipment you use, so check with your ISP if you aren’t sure.

The last step is to install the mail server software and start setting up and configuring accounts. You’ll also need to set up DNS and get that working if you'll be providing your own DNS services. Then, you can start e-mailing to your heart’s content”

Source : http://articles.techrepublic.com.com/5100-10878_11-5032914.html

Task 5

(a)

The type of network that would provide the best reliability and performance for Holland College would be an Ethernet. A wireless network could be susceptible to interference and poor reception areas. To ensure reliability and connectivity at all times an Ethernet network is recommended.

(b)

The network topology recommended for best performance would be a star topology. This is where every computer is connected to the switch. This ensures that no data collisions occur and streamlines data throughput.

(c)

I would recommend Holland College to install fiber optic cabling. This will ensure the network will be able to take full advantage of the new National fiber optic network. Fiber optic cabling would be the ideal solution because of its speed. A 1000Base-SX Fiber optic Network was chosen because of its speed. The 1000Base SX would be the backbone of the computer network. The vlan switches would be connected to fiber optic cable. The networked computers would connect to the vlan with UTP copper wire. The network after the Vlan would be based on the 100Base TX standard. Category 5e would be used. Consideration would be given to Government laws regarding cabling rules and regulations. In particular putting plastic cables into air conditioning spaces. A plenum cable must be used in air circulation areas.

Plenum cable is cable that is laid in the plenum spaces of buildings. The plenum is the space that can facilitate air circulation for heating and air conditioning systems, by providing pathways for either heated/conditioned or return airflows. Space between the structural ceiling and the dropped ceiling or under a raised floor is typically considered plenum; however, some drop ceiling designs create a tight seal that does not allow for airflow and therefore may not be considered a plenum air-handling space. The plenum space is typically used to house the communication cables for the building's computer and telephone network; however, it has been proposed that the growing abandonment of cable in plenum

Page 13: Holland College Project

Design a Network – Assignment - ICAA5045C -

13

spaces may pose a serious hazard in the event of a fire, as once the fire reaches the plenum space the airflow present in the space supplies fresh oxygen to the flame and makes it grow much stronger than it would have otherwise been. Recent testing by the American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE) has shown that while flame spread is limited by accumulated cable bundles, other structural concerns may still exist due to increased load on suspended components. As plenum spaces are restricted from use as areas for storage, the principle behind removal of abandoned cable is that regulated removal prevents the use of plenum spaces as a storage area for abandoned cable. Additionally, no high-voltage powered equipment is allowed in the plenum space because presence of fresh air can greatly increase danger of rapid flame spreading should the equipment catch on fire.

Source : http://en.wikipedia.org/wiki/Plenum_cable

“Why Use Fiber?

If fiber is more expensive, why have all the telephone networks been converted to fiber? And why are all the CATV systems converting to fiber too? Are their networks that different? Is there something they know we don't? Telcos use fiber to connect all their central offices and long distance switches because it has thousands of times the bandwidth of copper wire and can carry signals hundreds of times further before needing a repeater. The CATV companies use fiber because it give them greater reliability and the opportunity to offer new services, like phone service and Internet connections. Both telcos and CATV operators use fiber for economic reasons, but their cost justification requires adopting new network architectures to take advantage of fiber's strengths. A properly designed premises cabling network can also be less expensive when done in fiber instead of copper.”

Source : http://www.lanshack.com/fiber-optic-tutorial-network.aspx

Table 1 — Operating range for 1000Base-SX over each optical fiber

Fiber typeModal bandwidth

(MHz· km)Minimum range

(meters)

62.5 µm MMF 160 2 to 220

62.5 µm MMF 200 2 to 275

Page 14: Holland College Project

Design a Network – Assignment - ICAA5045C -

14

50 µm MMF 400 2 to 500

50 µm MMF 500 2 to 550

Siemon Product62.5/125µm Fiber

Solution50/125µm Fiber

Solution

(A) Fiber Jumper FJ2-SCSC-MM-03FJ2-SCSC5MM-

03

(B) Fiber Enclosure RIC24-F-01 & (4) RIC-F-SC6-01

(C) Fiber Connector FC2-SC-MM-B80

(D) Fiber Connector FC2-SC-MM-B80

(E) Work Area Outlet Assembly

MX-FP-S-02-02 & MX-SC-02

(F) Fiber Jumper FJ2-SCSC-MM-03FJ2-SCSC5MM-

03

Customer Supplied

(1) 1000BASE-SX/LX Hub Customer Supplied Item

(2) 2-strand Horizontal Optical Fiber

62.5/125µm Fiber 50/125µm Fiber

(3) Work Area Equipment

Source :

http://www.siemon.com/us/applicationguide/1000basesxlx.asp

Page 15: Holland College Project

Design a Network – Assignment - ICAA5045C -

15

“100BaseTX Cable Specifications

Which Cable Do I Need?

The table below helps you determine which type of cable you need for your setup.

Hub Switch Router Workstation

Hub Crossover

Crossover

Straight Straight

Switch Crossover

Crossover

Straight Straight

Router Straight Straight Crossover

Crossover

Workstation

Straight Straight Crossover

Crossover

Ethernet Cabling Guidelines

The table below lists the Ethernet cabling guidelines for 10BaseT and 100BaseTX cables.

Specifications 10BaseT 100BaseTX

Maximum number of segments per network

5

With Class I repeaters: 1

With Class II repeaters: 2

Maximum hop count1 4

With Class I repeaters: none

With Class II repeaters: 1

Maximum number 1024 1024

Page 16: Holland College Project

Design a Network – Assignment - ICAA5045C -

16

of nodes per segment

Cable type requiredUTP, category 3, 4, or 5

UTP category 5 or Shielded twisted pair (STP)

1Hop count = Routing metric used to measure the distance between a source and a destination.

Ethernet Version 2 and IEEE 802.3 Physical Characteristics

The table below lists the Ethernet version 2 and IEEE 802.3 physical characteristics of the different Ethernet cables.

EthernetIEEE 802.3

10Base5 10Base2 10BaseT

Data rate (Mbps)

10 10 10 10

Signaling method

Baseband Baseband Baseband Baseband

Maximum segment length (m)

500 500 185

100 (Unshielded twisted pair - UTP)

Media50-ohm coax (thick)

50-ohm coax (thick)

50-ohm coax (thin)

Unshielded twisted pair (UTP)

Topology Bus Bus Bus Star

Fast Ethernet Connector Pinouts RJ-45

100BaseTX RJ-45 Connector

The Fast Ethernet RJ-45 port actively terminates wire pair 4 and 5 and wire pair 7 and 8. Common-mode termination reduces electromagnetic interference (EMI) and susceptibility to common-mode sources.

The table below shows the pin and corresponding signal for the RJ-45 connector pinouts.

RJ-45 Connector Pinout

Page 17: Holland College Project

Design a Network – Assignment - ICAA5045C -

17

Pin Signal

1 TX+

2 TX-

3 RX+

6 RX-

Specifications and Connection Limits for 100-Mbps Transmission

The table below lists cable specifications and connection limits for 100-Mbps transmission.

Parameter RJ-45 MII SC-type

Cable specification

Category 52, UTP3, 22 to 24 AWG4

Category 3, r, or 5, 150-ohm UTP or STP, or multimode optical fiber

62.5/125 multimode optical fiber

Maximum cable length -

0.5 m (1.64 ft.) (MII-to-MII cable5)

-

Maximum segment length

100m (328 ft.) for 100BaseTX

1 m (3.28 ft.)6 or 400 m (1312 ft.) for 100BaseFX

100 m (328 ft.)

Maximum network length

200 m (656 ft.)6 (with one repeater)

-

200 m (656 ft.)6 (with one repeater)

2 EIA/TIA-568 or EIA-TIA-568 TSB-36 compliant.

3 Cisco Systems does not supply Category 5 UTP RJ-45 or 150-ohm STP MII cables. Both are available commercially.

4 AWG = American Wire Gauge. This gauge is specified by the EIA/TIA-568 standard.

5 This is the cable between the MII port on the port adapter and the appropriate transceiver.

6 This length is specifically between any two stations on a repeated segment.

IEEE 802.3u Physical Characteristics

Page 18: Holland College Project

Design a Network – Assignment - ICAA5045C -

18

The table below lists the IEEE 802.3u physical characteristics for the Ethernet 100BaseT cable.

Parameter 100BaseT

Data rate (Mbps) 100

Signaling method Baseband

Maximum segment length (in meters)

100 m between DTE7 and repeaters

MediaRJ-45: Category 5 UTP MII: Category 3, 4, or 5, 150-ohm UTP or STP, with appropriate transceiver

Topology Star/Hub

7 DTE = data terminal equipment.

8Pins 4, 5, 7, and 8 are not used.

RJ-45 Crossover (Ethernet) Cable Pinouts

The table below lists the pinouts for the Ethernet RJ-45 crossover cable.

Signal Pin Pin Signal

TX+ 1 3 RX+

TX- 2 6 RX-

RX+ 3 1 TX+

- 4 4 -

- 5 5 -

RX- 6 2 TX-

Page 19: Holland College Project

Design a Network – Assignment - ICAA5045C -

19

- 7 7 -

- 8 8 -

RJ-45 Rolled (Console) Cable Pinouts

The table below shows the pinouts for the RJ-45 rolled console cable.

Signal Pin Pin Signal

RTS 1 8 CTS

DTR 2 7 DSR

TxD 3 6 RxD

GND 4 5 GND

GND 5 4 GND

RxD 6 3 TxD

DSR 7 2 DTR

CTS 8 1 RTS

Source :

http://www.cisco.com/en/US/products/hw/routers/ps133/products_tech_note09186a00801f5d9e.shtml

(d)

The equipment needed to install a hybrid network of fiber optic backbone and Copper to the nodes would include :

- 100 MHZ NIC (network Interface Cards)- Patch Cables- Copper wire UTP cat 5 cable approx. 450m RJ 45 Connectors- Fiber optic cables and components- Patch Panels- Switches- Servers for files, DNS, proxy and email.- Network operating system- ADSL 2 Modem (if fiber optic cable ISP connection is not available).- Internet Service Provider.

Page 20: Holland College Project

Design a Network – Assignment - ICAA5045C -

20

(e)

The recommended Network Operating System (NOS) I would recommend would be Windows Server 2008. Windows Server 2008 would allow users to use the Windows operating systems on their desktops. Microsoft Windows is the most popular and well known operating system. Users would be familiar with these operating systems and would help productivity.

TASK 6

In the Administration network security issues need to be planned and developed into manageable and practical areas. Areas that would need to be password protected and have sensitive data would include:

Payroll

Student Loans

Financial Aid

Registrar

Teaching Staff Results

Student files of attendance and performance, and discipline.

Director of development (planning and development files and proposals)

Business transactions, Credit Card details

Information Technology - Logins, passwords, system passwords, system procedures.

Senior Management, Confidential and sensitive information.

All these areas and others identified by the department heads will need to have password protection and or encrypted data with high level password management procedures.

Some good password procedures are included in this reference :

3.0 Procedures 3.1 Passwords are an important aspect of computer security. A

poorly chosen password may result in the compromise of UCSF’s entire corporate network. Some of the more common uses

Page 21: Holland College Project

Design a Network – Assignment - ICAA5045C -

21

include: user-level accounts, web accounts, e-mail accounts, screen saver protection, voicemail password, and local router logins. 3.1.1 Require Passwords: A unique password is required for all accounts including those designated to allow system-level privileges. Examples of system level privileges can include creating and/or deleting a printer queue or creating and/or modifying a user data directory. 3.1.2 Adhere to Strong Password Security Standards: Users of the Windows Professional Operating systems must adhere to the following password security standards: • Expiration: Change password every 90 days or less. Passwords will automatically expire every ninety days. • Password History: Users should not re-use prior passwords. User password history is retained for the last eight passwords to prevent re-use. • Length: Password length must be a minimum of six characters. • Complexity: Passwords may not contain your usersname or any part of your full name. • Password Communication: Users must keep their passwords secret and not communicate their password to others in any manner. Administrators must not communicate passwords via email or other electronic communication.

Source : http://medschool.ucsf.edu/isu/pdf/Security/password_management.pdf

Other security issues that need to be addressed are: Computer Viruses and Malware. The College will make sure that firewalls are used on all computers and trusted virus scanning software that is configured to run and update regularly. Windows update should be configured on all workstations to update operating systems to ensure system vulnerabilities are minimized.

The physical security of the network should also be addressed. Areas with sensitive data should be locked when Key employees are not present. A culture of complying with company security policies and procedures needs to be implemented and enforced to ensure the integrity of sensitive and private information.

Students should not be able to enter areas where sensitive data is being used. Physical barriers like locks on doors and walls will help to ensure data security.

Task 8

Page 22: Holland College Project

Design a Network – Assignment - ICAA5045C -

22

The Total amount of network interface cards required to connect all PC’s at Holland College would be :

Admin office computers – 17

English and writing classroom – 35

Math and Science classroom – 22

E-mail server 1

File servers 2

Proxy server 1

Network printers 10

____________________________________________________________________________________

Network Cards TOTAL 88

Page 23: Holland College Project

Design a Network – Assignment - ICAA5045C -

23

Task 9

Task 9 Equipment Cost Number Of

Units

Total Cost Supplier

(a)

(b)

Computer

Intel Core i5 ProcessorSuper Fast

1333 FSB Speed CPU4GB DDR3

MemoryPowerful AMD ATI HD5770

1GB Graphics Card

7.1 High Definition Audio Sound Card

1000GB SATA II Hard Disk

Powerful AMD ATI HD5770 1GB Graphics

Card

7.1 High Definition Audio Sound Card

$1,112.31

included

74

included

$82,310.94

included

A

A

(c) Internet Service Provider TPG

4Mbps/4Mbps(4 wire)

$10,587.00Year

1 $10,587.00 B

(d) PowerEdge™ T110

ProcessorIntel® Pentium® Processor G6950 (2.80GHz, 3MB L2

Cache, 1066MHz FSB)

$1549.00 5 $7,745.00 C

(d1)Power Shield

Centurion

Page 24: Holland College Project

Design a Network – Assignment - ICAA5045C -

24

Task 9 Equipment Cost Number Of

Units

Total Cost Supplier

The Power Shield Centurion UPS

provides a permanent backup power solution for

sensitive devices such as medical

equipment and internet routers.

$699.00 2 $1,398.00 D

(e) NEW BOXED SEALED HP LTO-3

ULTRIUM 960 SCSI TAPE ARRAY DRIVE

Q1540A

1,690.00 5 $8,450.00 E

(f1) RJ 45 Connectors $3.74for 100

300 $10.74 F1

(f)New Cat5e Cat 5E

CMP 4/24 Plenum

Bulk Cable 2000ft

$330.00 1 $330.00 F

(g)Microsoft® Exchange Standard CAL Single

License/Software Assurance Pack

Academic OPEN User CAL User CAL

$10.00 200 $2,000.00 G

(g) Microsoft® Windows Web Server Sngl License/Software Assurance Pack

Academic OPEN 1 License

$162.00 1 $162.00 G

(g) Microsoft® Windows® Server

$291.00 5 $1,455.00 G

Page 25: Holland College Project

Design a Network – Assignment - ICAA5045C -

25

Task 9 Equipment Cost Number Of

Units

Total Cost Supplier

Standard Single License/Software Assurance Pack Academic OPEN

(g) Microsoft® Exchange Enterprise CAL Sngl License/Software Assurance Pack

Academic OPEN 1 License Device CAL Device CAL Without

Services

$28.00 200 $5,600.00 G

(g) Microsoft® Windows® Server CAL

Single License/Software Assurance Pack Academic OPEN

Device CAL

$20.00 86 $1,720.00 G

(g) Microsoft® Windows® Server CAL

Single License/Software Assurance Pack Academic OPEN

Device CAL

$20.00 26 $520.00 G

(g) Microsoft® Core CAL (Client Access License) Single

License/Software Assurance Pack Academic OPEN

Device CAL

$100.00 86 $8,600.00 G

(g) Microsoft® Core CAL (Client Access

$100.00 26 $2,600.00 G

Page 26: Holland College Project

Design a Network – Assignment - ICAA5045C -

26

Task 9 Equipment Cost Number Of

Units

Total Cost Supplier

License) Single License/Software Assurance Pack Academic OPEN

Device CAL

(h) Microsoft® Windows® Server Standard Single

License/Software Assurance Pack Academic OPEN

$291.00 5 $1,455.00 G

(h) Microsoft® Exchange Server Standard

Single License/Software Assurance Pack Academic OPEN

$473.00 1 $473.00 G

(h1) Microsoft® Windows 7 Professional Sngl

Software $449.00 74 $33,226.00 H1

(i) Gigabit Fiber Nic 32BIT Pci 1000BSX Sc

$129.99 5 $649.95 H

(j) Linksys EtherFast (LNE100TX-AT)

Network Adapter

$19.95 84 $1,476.30 I

(k) Manufacturer: CiscoPart Code: WS-C2950SX-48-SI

Form Factor: External - 1U

RAM: 16 MBFlash Memory: 8 MB

Ports Qty: 48 x Ethernet 10Base-T,

Ethernet 100Base-TX

$3,019.50 1 $3,019.50 J

Page 27: Holland College Project

Design a Network – Assignment - ICAA5045C -

27

Task 9 Equipment Cost Number Of

Units

Total Cost Supplier

(l) Cisco Catalyst 2950SX-24 - switch -

24 ports

$1,160.99 2 $2,321.98 K

10 * Public IP4 addresses1 off Fee

Yearly Fee

$4,175.00$46,461.00

11

$4,175.00$46,461.00

L

QLOGIC SANBOX 5802V FABRIC SWCH-8GB PT ENABLED PLS

4

$5,991.69 1 5,991.69 M

HP LaserJet P2050 Printer series - Specifications

$799.00 10 7,990.00 N

Cisco 12000 Series Router Gigabit

Ethernet Line Card

$1,259.57 1 $1,259.57 O

Fibre cable course

$1,200.00 2 $2,400 P

Total $244,387.67

Suppliers

Supplier A

http://www.crazysales.com.au/xtreme-core-i5-750-ati-gaming-pc-computer-system_p4739.html

Supplier B

http://tpg.com.au/shdsl/products_services.php

Page 28: Holland College Project

Design a Network – Assignment - ICAA5045C -

28

Supplier D

http://www1.ap.dell.com/au/en/business/servers/poweredge-t110/pd.aspx?refid=poweredge-t110&s=bsd&cs=aubsd1

Supplier D1

http://www.upssystems.com.au/centurion_11.html

Supplier E

http://cgi.ebay.com.au/NEW-HP-LTO-3-ULTRIUM-960-SCSI-TAPE-ARRAY-DRIVE-Q1540A-/360290478645?pt=AU_Components&hash=item53e2fc6a35

supplier F1

http://cgi.ebay.com.au/100-RJ45-RJ-45-CAT5-Modular-Plug-Network-Connector-100X-/250520119801?pt=AU_Computers_Networking_Accessories&hash=item3a5429a9f9

Page 29: Holland College Project

Design a Network – Assignment - ICAA5045C -

29

Supplier F

https://www.lindy.com.au/online/arrshop.exe?anonymous=true&cat=nj

or

http://cgi.ebay.com.au/New-Cat5e-Cat-5E-CMP-4-24-Plenum-Bulk-Cable-2000ft-/170535857316?pt=LH_DefaultDomain_0&hash=item27b4baaca4

Supplier G

http://www.microsoft.com/licensing/mla/summary.aspx#W

Supplier H

http://www.amazon.com/Gigabit-Fiber-Nic-32BIT-1000BSX/dp/B000IOG232

Page 30: Holland College Project

Design a Network – Assignment - ICAA5045C -

30

Supplier H1

http://www.microsoftstore.com.au/shop/en-AU/Microsoft/Windows/Windows-7?WT.mc_id=pointitsem_ad_win7_generic&WT.srch=1&WT.term=microsoft+windows+7&WT.campaign=6074&WT.source=google&WT.medium=cpc&WT.content=623196099&cshift_ck=2098988581cs623196099&WT.srch=1&tid=623196099

Supplier I

http://www.shopping.com/xPO-Linksys-EtherFast-LNE100TX-AT

Supplier J

http://us.hardware.com/store/cisco/WS-C2950SX-48-SI

Supplier K

http://shopper.cnet.com/switches/cisco-catalyst-2950sx-24/4014-6432_9-20295099.html#stores

Supplier L

http://submit.apnic.net/cgi-bin/feecalc.pl?ipv4=10&ipv6=&action=Calculate

Supplier M :

http://accessories.us.dell.com/sna/productdetail.aspx?sku=A2330376&cs=04&c=us&l=en&dgc=SS&cid=52102&lid=1342490

Supplier N :

http://h10010.www1.hp.com/wwpc/au/en/ho/WF06a/18972-18972-3328059-236263-236263-3662052.html

Supplier O

http://shopper.cnet.com/routers/cisco-modular-gigabit-ethernet/4014-3319_9-30484805.html#stores

Supplier P

http://www.milcom.com.au/course-description.aspx?cc=CAN-38&ccid=TELEC

Page 31: Holland College Project

Design a Network – Assignment - ICAA5045C -

31

TASK 10

Task 10

Software Cost Number Of Units

Total Cost Supplier

Microsoft office 2000 $849.00 111 $94,239.00 A

Math CAD $1050.50 33 $34.666.50 BMicrosoft Visual Studio

2010 Professional$164.95 33 $5,443.35 C

Auto CAD 2011 $1,718.00 33 $56,694.00 DSAS Learning Edition 4.1 for

Students$68.75 36 $2,475.00 E

C++ CompilerIncluded in Visual Studio

---- 33 ---- C

Publisher 2010 $189.00 53 10,017.00 F

M/S Visio 2010 $217.00 53 11,501.00 G

M/S Project 2010 $1,699.00 5390,047.00 H

PC-based financial aidPackages

$329.00 3987.00 I

FoxPro database

Visual foxpro professional edition 9.0

$1049.00 2 $2,098.00 J

Total $308,167.85

Supplier A =Microsoft office 2010

http://www.microsoftstore.com.au/shop/en-AU/Microsoft/Microsoft-Office-Professional-2010

Supplier B = Math CAD 15

http://store.ptc.com/store?SiteID=ptc&Locale=en_US&Action=DisplayProductDetailsPage&productID=197962800&pgm=66604300&ThemeID=6865700&Currency=USD

Page 32: Holland College Project

Design a Network – Assignment - ICAA5045C -

32

Supplier C = Microsoft Visual Studio 2010 Professional

http://www.studentdiscounts.com.au/microsoft-visual-studio-professional-2010-educ

Supplier D = Auto CAD 2011

http://www.citysoftware.com.au/Autodesk_AutoCAD_LT_2011_New_Seat_AUT0267.aspx?gclid=CPa8t6a58aMCFROmbwodZXL32A

Supplier E = SAS Learning Edition 4.1 for Students

http://e5.onthehub.com/WebStore/OfferingDetails.aspx?ws=49c547ba-f56d-dd11-bb6c-0030485a6b08&o=c9192ece-f6b6-dd11-b00d-0030485a6b08&JSEnabled=1

Supplier F = Publisher 2010

http://www.microsoftstore.com.au/shop/en-AU/Microsoft/Publisher-2010?WT.mc_id=pointitsem_ad_Publisher_generic_2007&WT.srch=1&WT.term=microsoft+publisher&WT.campaign=6071&WT.source=google&WT.medium=cpc&WT.content=623191469&cshift_ck=2098988581cs623191469&WT.srch=1&tid=623191469

Supplier G = M/S Visio 2010

http://www.microsoft.com/licensing/mla/summary.aspx#W

Supplier H = M/S Project 2010

http://www.microsoftstore.com.au/shop/en-AU/Microsoft/Project-Professional-2010?WT.mc_id=pointitsem_Project_generic_2007&WT.srch=1&WT.term=microsoft+project&WT.campaign=6136&WT.source=google&WT.medium=cpc&WT.content=623736044&cshift_ck=2098988581cs623736044&WT.srch=1&tid=623736044

Supplier I = PC-based financial aid Packages Quicken

https://estore.quicken.com.au/ProductDetails.aspx?CategoryID=70

Supplier J = Visual foxpro professional edition 9.0

http://www.au.winbuyer.com/Microsoft_Visual_FoxPro_Professional_Edition_90_Full_Version_for_PC_340-01231/pid-22878396/offers.html

Page 33: Holland College Project

Design a Network – Assignment - ICAA5045C -

33

Major Task

“Network Infrastructure Planning Overview

Planning network infrastructure is a complex task that needs to be performed so that the network infrastructure needed by the organization can be designed and created. Proper planning is crucial to ensure a highly available network and high performance network that result in reduced costs and enhances business procedures for the organization.

To properly plan your network infrastructure, you have to be knowledgeable on a number of factors, including the following:

Requirements of the organization.

Requirements of users.

Existing networking technologies.

Necessary hardware and software components.

Networking services which should be installed on the user's computers so that they can perform their necessary tasks.

A typical network infrastructure planning strategy should include the following:

Determine the requirements of the organization and its users, and then document these requirements.

Define a performance baseline for all existing hardware devices.

Define a baseline for network utilization as well.

Identify the capacity for the physical network installation. This should encompass the following:

o Server hardware, client hardware.

o Allocation of network bandwidth for the necessary networking services and applications.

o Allocation of Internet bandwidth

Determine which network protocol will be used.

Determine which IP addressing method you will use.

Determine which technologies, such as operating systems and routing protocols are needed to cater for the organization's needs as well as for possible future expansions.

Page 34: Holland College Project

Design a Network – Assignment - ICAA5045C -

34

Determine the security mechanisms which will be implemented to secure the network and network communication.

After planning, the following step would be to implement the technologies which you have identified. Implementation of the network infrastructure involves the following tasks:

Installing the operating systems.

Installing the necessary protocols and software components.

Deploying DNS or WINS name resolution.

Designing the DNS namespace.

Assigning IP addresses and subnet masks to computers.

Deploying the necessary applications.

Implementing the required security mechanisms.

Defining and implementing IPSec policies.

Determining the network infrastructure maintenance strategy which you will employ once the network infrastructure is implemented. Network infrastructure maintenance consists of the following activities:

o Upgrading operating systems.

o Upgrading applications.

o Monitoring network performance, processes and usage.

o Troubleshooting networking issues.”

Source : Defining Network Infrastructure Ian Good

(a) Description of the proposed LAN topology and why is was selected.

The proposed Local Area Network (LAN) topology proposed for Holland College is a star topology. The star topology was chosen because of the ability to eliminate data collisions between host computers.

Page 35: Holland College Project

Design a Network – Assignment - ICAA5045C -

35

“Star network topology

In local area networks with a star topology, each network host is connected to a central hub. In contrast to the bus topology, the star topology connects each node to the hub with a point-to-point connection. All traffic that transverses the network passes through the central hub. The hub acts as a signal booster or repeater. The star topology is considered the easiest topology to design and implement. An advantage of the star topology is the simplicity of adding additional nodes. The primary disadvantage of the star topology is that the hub represents a single point of failure.

A point-to-point link (described above) is sometimes categorized as a special instance of the physical star topology – therefore, the simplest type of network that is based upon the physical star topology would consist of one node with a single point-to-point link to a second node, the choice of which node is the 'hub' and which node is the 'spoke' being arbitrary[1].

After the special case of the point-to-point link, as in note 1.) above, the next simplest type of network that is based upon the physical star topology would consist of one central node – the 'hub' – with two separate point-to-point links to two peripheral nodes – the 'spokes'.

Although most networks that are based upon the physical star topology are commonly implemented using a special device such as a hub or switch as the central node (i.e., the 'hub' of the star), it is also possible to implement a network that is based upon the physical star topology using a computer or even a simple common connection point as the 'hub' or central node – however, since many illustrations of the physical star network topology depict the central node as one of these special devices, some confusion is possible, since this practice may lead to the misconception that a physical star network requires the central node to be one of these special devices, which is not true because a simple network consisting of three computers connected as in note 2.) above also has the topology of the physical star.

Star networks may also be described as either broadcast multi-access or nonbroadcast multi-access (NBMA), depending on whether the technology of the network either automatically propagates a signal at the hub to all spokes, or only addresses individual spokes with each communication”

Page 36: Holland College Project

Design a Network – Assignment - ICAA5045C -

36

Source : http://en.wikipedia.org/wiki/Network_topology

Proposed Network Holland College

OSI Model

Layer 1 CABLE

Layer 2 01010101 01010100 0101010 Fiber-Optic Cable

Layer 3 Cat 5e UTPLayer 4Layer 5

Network Backbone

Math and Science Lab 22 Intel i5

English and Writing Lab 35 Intel i5

Administration

17 Intel i5

VLAN 24 Port

VLAN 24 Port

VLAN 48 Port

Switch

Router

Proxy Server

Modem

E-mail Server

Microsoft

Server

Math and

Server

English and

Server

Admin

Internet Service

Provider

255.255.255.0

192.168.2.x255.255.255.0

192.168.3.x

255.255.255.0

192.168.4.x

Page 37: Holland College Project

Design a Network – Assignment - ICAA5045C -

37

The OSI model is made up of seven layers which are presented as a stack. Data which is passed over the network moves through each layer. Each layer of the OSI model has its own unique functions and protocols. Different protocols operate at the different layers of the OSI model. The layer of the OSI reference model at which the protocol operates defines its function. Different protocols can operate together at different layers within a protocol stack. When protocols operate together, they are referred to as a protocol suite or protocol stack. When protocols support multiple path LAN-to-LAN communications, they are called routable protocols. The binding order determines the order in which the operating system runs the protocols.

The seven layers of the OSI reference model, and each layers' associated function are listed here:

Physical Layer - layer 1: The Physical layer transmits raw bit streams over a physical medium, and deals with establishing a physical connection between computers to enable communication. The physical layer is hardware specific; it deals with the actual physical connection between the computer and the network medium. The medium used is typically a copper cable that utilizes electric currents for signaling. Other media that are becoming popular are fiber-optic and wireless media. The specifications of the Physical layer include physical layout of the network, voltage changes and the timing of voltage changes, data rates, maximum transmission distances, and physical connectors to transmission mediums. The issues normally clarified at the Physical Layer include:

o Whether data is transmitted synchronously or asynchronously.

o Whether the analog or digital signaling method is used.

o Whether baseband or broadband signalling is used.

Data-Link Layer - layer 2: The Data-link layer of the OSI model enables the movement of data over a link from one device to another, by defining the interface between the network medium and the software on the computer. The Data-link layer maintains the data link between two computers to enable communications. The functions of the Data-link layer include packet addressing, media access control, formatting of the frame used to encapsulate data, error notification on the Physical layer, and management of error messaging specific to the delivery of packets. The Data-link layer is divided into the following two sublayers:

o The Logical Link Control (LLC) sublayer provides and maintains the logical links used for communication between the devices.

o The Media Access Control (MAC) sublayer controls the transmission of packets from one network interface card (NIC) to another over a shared media channel. A NIC has a unique MAC address, or physical address. The MAC sublayer handles media access control which essentially prevents data collisions. The common media access control methods are:

 

Token Passing; utlized in Token Ring and FDDI networks

Carrier Sense Multiple Access/Collision Detection (CSMA/CD); utilized in Ethernet networks.

Page 38: Holland College Project

Design a Network – Assignment - ICAA5045C -

38

Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA); utilized in AppleTalk networks.

Network Layer - layer 3: The Network layer provides end-to-end communications between computers that exist on different network. One of the main functions performed at the Network layer is routing. Routing enables packets to be moved between computers which are more than one link from one another. Other functions include traffic direction to the end destination, addressing, packet switching and packet sequence control, end-to-end error detection, congestion control, and Network layer flow control and error control.

Transport Layer - layer 4: The Transport layer deals with transporting data in a sequential manner, and with no data loss. The Transport layer divides large messages into smaller data packets so that it can be transmitted to the destination computer. It also reassembles packets into messages for it to be presented to the Network layer. Functions of the Transport layer include guaranteed data delivery, name resolution, flow control, and error detection and recovery. The common Transport protocols utilized at this layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

Session Layer - layer 5: The Session layer enables communication sessions to be established between processes or applications running on two different computers. A process is a specific task that is associated with a particular application. Applications can simultaneously run numerous processes. The Session layer establishes, maintains and terminates communication sessions between applications. The Session layer utilizes the virtual circuits created by the Transport layer to establish communication sessions.

Presentation Layer - layer 6: The Presentation layer is responsible for translating data between the formats which the network requires and the formats which the computer is anticipating. The presentation layer translates the formats of each computer to a common transfer format which can be interpreted by each computer. Functions include protocol conversion, data translation, data encryption and decryption, data compression, character set conversion, and interpretation of graphics commands.

Application Layer - layer 7: The Application layer provides the interface between the network protocol and the software running on the computer. It provides the interface for e-mail, Telnet and File Transfer Protocol (FTP) applications, and files transfers. This is the location where applications interrelate with the network.

Source : Course material MSIT Ian Good

“Planning the logical network

Planning the logical network is often the most difficult portion of network planning, because you won’t have any

Page 39: Holland College Project

Design a Network – Assignment - ICAA5045C -

39

obvious or easy ways to measure or determine network requirements or usage. Fortunately, we can spare you some trouble by passing on the experience of many network technicians.

If you were going to build a warehouse to store engines, you could simply measure the size of each engine, determine how high you can stack them, add floor space for access, and build a warehouse of the exact size you need. Most architects also add room for expansion and growth. Another method is to simply buy more space than you will ever need, but this approach obviously requires deep pockets.

Both techniques are used in networking, and unfortunately, the second is more common. Many organizations waste a lot of money on hardware to guarantee that they will not have a capacity problem. In very small networks buying more hardware than you need can actually make financial sense because network architects may charge more than the extra equipment will cost to design a network of the proper size. We will assume, however, that you intend to spend as little as you can to create a well-designed network. The steps in designing the logical network are as follows:

Estimate the client load

Determine which Data link technologies will support that load

Determine which types of cable support that data link layer technology

Decide whether you will centralize or distribute servers on the network

Lay out a network map

Estimating Client LoadTo estimate load capacities of networks, you need a metric with which you can compare very different network technologies and relate them to client computer requirements, often without the benefit of knowing exactly how those client computers will be used. Seasoned network integrators base their estimates on what they’ve done and seen work in the past.

Although no simple method will replace an experienced network integrator, experience can be distilled into methods that are useful for planning and estimating. A good working methodology will serve a number of roles:

It will be useful for comparing data link technologies

Page 40: Holland College Project

Design a Network – Assignment - ICAA5045C -

40

It will be useful for planning the network’s physical layout

It will be able to predict the amount and type of hardware necessary to implement the network

We have developed a simple method that will help you plan your network based upon the client load limit of various current data link technologies. For instance, a single 10 Mb/s Ethernet network can support a maximum of about 50 DOS clients. The same Ethernet network can reliably serve 20 or so Windows NT workstations.

Of course, these estimations are not absolute-the way the client is used will affect its load on the network greatly, and as technology changes so will the load estimates for various clients. The law of averages comes to our aid here by smoothing the usage characteristics of a single computer over the number of computers attached to the network. This method doesn’t always work well, however. Consider the case of a diskless DOS workstation that must boot its operating system from a network server. This client will typically demand more from a network than a typical client because even its memory page file is being sent over the network.

You can use the method presented here if your operations conform to the common uses of computers. If you are doing something you know will require more bandwidth , consider revising the load values for clients upwards. We have presented worst-case capacities in this method, so resist the temptation to revise them downward.

Load Requirements of Typical Network clientsWe determined the client load requirements shown in the table below by dividing 100 by the maximum useful number of clients of that type that could operate on a single Ethernet segment.

Make a map of all the computers in your organization based on their rough location in your facility, matching them to one of the types in the table below. Sum the values to determine your organization’s total client load.

CLIENT METRIC EXPLANATION

Macintosh 1 Macintoshes typically require very little from a network, so we used a typical Macintosh client as the basis for our network metric.

DOS 2 MS-DOS machines tend to run simpler applications software that does not demand much from a network

Diskless DOS Client

6 Diskless MS-DOS clients, however, are much more demanding. These computers must use the network for every I/O command that would normally

Page 41: Holland College Project

Design a Network – Assignment - ICAA5045C -

41

go to a local hard disk drive.

Windows 3 Windows is a more complex platform than MS-DOS is, and applications built to run on Windows are more complex and network aware.

Power Macintosh

3 Macintosh computers based on the PowerPC microprocessor are very fast. Although Macintoshes demand less from a network than most PC file-sharing schemes demand, these computers can hit the network hard because of their speed.

Citrix – diskless clients

9 Diskless Windows clients using “terminal services” are extremely demanding of network bandwidth-more so than any other type of computer.

Windows 95 4 Windows 95 is a powerful multitasking operating system that typically runs on fast client computers.

OS/2 4 OS/2 is very similar to Windows 95 in most respects. It runs on similar hardware and runs similar applications.

Windows XP 5 Windows XP Workstation is one of the most powerful operating systems available for PCs. Its ability to multitask multiple network applications smoothly requires much from a network.

UNIX Workstation

5 UNIX Workstations are usually used by bandwidth-intensive users like programmers, graphic artists, and CAD operators.

UNIX X-terminal

3 X-terminals are diskless, but they operate as simple displays. Screen updates are sent from a server that actually performs the work requested by the user.

TCP/IP print server

10 Although print servers technically do not generate load of their own, printed documents do. Every document you print to a print server moves across the network twice-when it is sent from your computer to the Windows NT server that processes it and again when it is sent to the print server attached to the printer. Because printed documents can also be quite large, they can create quite a load on your network.

Load Capacities of Data Link technologiesData link technologies use various methods to arbitrate the sharing of media, which makes a comparison difficult. For example, although token ring uses a faster bit rate than Ethernet uses, a client must wait for the token before transmitting, which can make Ethernet seem more responsive. Adding clients to a Token ring will slow the network in a simple deterministic manner, whereas overloading an Ethernet can cause it to suddenly cease operating altogether. These differences mean that comparisons based on simple bit rate are meaningless.

Page 42: Holland College Project

Design a Network – Assignment - ICAA5045C -

42

We chose to use the worst-case number of clients we felt could be usefully attached to a single shared media network rather than to use a comparison of raw throughput. We then applied this metric to the capacities of other types of networks that are not shared media, such as asynchronous transfer mode (ATM), to show how these networks can be aggregated into large internetworks.

When creating internetworks, the capacity number used for a subnetwork becomes its load. For instance, a Fiber Distributed Data Interface (FDDI) ring with a capacity rating of 1,000 can handle up to ten Ethernet networks, each with a capacity rating of 100. The table below shows the load capacities of various network data link technologies.

NETWORK CAPACITY EXPLANATION

Ethernet 100 Ethernet was used as the basis for comparison because it is the most common network data link technology. You can expect to attach 50 DOS clients to a single Ethernet subnetwork before it bogs down.

Token Ring 200 A single Token Ring can support roughly twice as many computers as a single Ethernet subnetwork. Because Token Ring degrades gracefully, you can continue to load a Token Ring past this point, but your network will slow considerably.

Fast Ethernet 500 Although the bit rate for fast Ethernet is ten times the rate of Ethernet, it cannot handle ten times the traffic because of the delay involved in resolving collisions.

Fiber Distributed Data Interface

1,000 You can reasonably connect ten Ethernet networks on a single FDDI ring. This arrangement depends greatly upon where you’ve chosen to place your servers-centralized servers demand more from the backbone.

FiberChannel (IGB/s)

10,000 Gigabit Ethernet will operate over FiberChannel at one gigabit per second. Although gigabit Ethernet retains the Ethernet name, it is full duplex point to point and does not have collisions. It is a perfect backbone technology in campus environments.

ATM-155 OC-3

1000 ATM is switched network technology. It is not shared. For this reason, you can count on being able to use about 80 percent of the bit rate for useable traffic so long as you maintain constant connections between servers.

ATM OC-12 4000 ATM bandwidth increases linearly with speed. At 622 Mb/s, ATM OC-12 is sufficient for the most demanding backbone applications.

ATM OC-48 16,000 ATM at OC-48 (2.2 Gb/s) is typically used for metropolitan area

Page 43: Holland College Project

Design a Network – Assignment - ICAA5045C -

43

networks. This capacity is appropriate for metropolitan area high-speed links.

ATM OC-192 48,000 ATM at OC-192 (8.8 Gb/s) is used for major trunks between metropolitan

When calculating load versus capacity, remember that these numbers are maximum capacity estimates. Erring on the side of excess capacity is preferable to being tied to a slow network. You should try to avoid coming within 25 percent of the maximum values presented here if you want your network to run smoothly.

Make a rough map of the computers in your organization based on location. Select a network technology and group clients into networks based upon location. Then sum the client load values of each group to make sure you are well within the load capacity for the network type you’ve selected”

Source : Planning the logical network Ian Good

A score of 5 for windows XP for a fast Ethernet connection score of 500. Therefore theoretically 100 (or 75 with 25% of the maximum value) computers can connect to 1 sub network. The maximum amount of computers attached to 1 sub network on the Holland College network is 36.

Methods and Formulas Used to Determine Server Capacity Ian Good

“Methods and Formulas Used to Determine Server Capacity You can understand a server's workload and capacity when you determine the kinds of tasks carried out on that server. The performance statistics that are calculated by System Monitor reveal the effects of those tasks. You can use these statistics with a number of standard mathematical formulas to help determine server size and plan for capacity and growth.

Basic Model of System Capacity

There are three variables that form the basic model of system capacity. These variables are

Observation time (T), the amount of time that the server is monitored for activity

Busy time (B), the amount of time that the server was active during the observation time

Completions (C), the number of transactions completed during the observation period

With these three variables, you can calculate the six significant values, described in Table 9.4, that are used to develop a capacity planning model.

Page 44: Holland College Project

Design a Network – Assignment - ICAA5045C -

44

Table 9.4 Capacity Planning Data Formulas

Data Description Formula

CPU Utilization The percentage of CPU capacity used during a specific period of time.

U = B/T

Transaction throughout of the system

The average number of transactions completed during a specified period of time.

X = C/T

Average service time The average time to complete a transaction. S = B/C

Transaction capacity of the system

The number of transactions the server handles. Cp = 1/S

Average queue length The average number of transactions in queue. Q = U/(1-U)

Average response time The average time to respond to a transaction. R = (Q×S)+S

Here is an example of how to use these formulas to size a server. Suppose that you observe the server for 60 seconds (T), during which time there are 90 completed transactions (C), and the server is actually busy processing that workload for 48 seconds (B). Table 9.5 shows the resulting data values using this information.

Table 9.5 Capacity Planning Resource Formula Results

Resource Formula Result

CPU Utilization U = B/T 48/60 = 80 percent utilization

Average transaction throughput of the system

X = C/T 90/60 = 1.5 transactions/sec

Average service time S = B/C 48/90 = .53 seconds

Transaction capacity of the server Cp = 1/S 1/.53 = 1.875 transactions/sec

Average queue length Q = U/(1-U) .8/(1 - .8) = 4 transactions

Average response time R = (Q×S)+S (3 × .53)+.53 = 2.12 seconds

The CPU utilization was at 80 percent, and handled an average of 1.5 transactions per second. The average service time for these transactions was .53 seconds, and transactions were completed in an average time of 2.12 seconds. On average, there were four transactions waiting to be processed at any given point in time during the observation period, and the server had the capacity to process 1.875 transactions per second.

If the SLA states that during any given 60 second period, the server should not utilize more than 85 percent of the processor and should be capable of handling at least 100 transactions, the calculated values shown in Table 9.5 indicate that the SLA is being met. If the SLA stated that during any 60 second period, the server should not utilize more that 75 percent of the processor or should not have more than three transactions waiting in queue, then the calculated values shown in Table 9.5 indicate that the server cannot perform within the limits of the SLA and probably must be upgraded.

Use these formulas as tools to help you to determine current server performance levels, to develop acceptable and reasonable SLAs given current and expected server hardware configurations, and to identify where upgrades or new equipment is necessary.

End-to-End Response Time

When you consider response time, you should not think only in terms of a single server's response time and performance, but instead you should think of all the data components that make up the service chain for that transaction. So, the first step in determining end-to-end response time is identifying the data components that make up the service chain.

For example, consider that information flows from an SMS client to a CAP or management point, and then to the site server. The service chain that emerges from this flow has five data components associated with it as shown in Figure 9.2:

Client Q, R, and S values

Page 45: Holland College Project

Design a Network – Assignment - ICAA5045C -

45

Network connection between client and CAP or management point Q, R, and S values

CAP or management point Q, R, and S values

Network connection between CAP or management point and site server Q, R, and S values

Site server Q, R, and S values

Figure 9.2 A service chain and the computation of end-to-end response time

The end-to-end response time, then, is the sum of each of the R values for each component in the service chain. Use this information to develop SLAs for service chain performance, and to determine when there are performance aberrations.

There are no standard metrics for SMS performance. Your organization might want to consult its SLAs and perform a cost-to-benefit analysis to determine how fast the SMS site servers must run. Your organization might have time requirements. For example, mission-critical applications might require updating on 95 percent of desktops in an eight-hour period. Another SLA might state that critical virus signature update files must be distributed to all desktops within a two-hour period.

After running a pilot project and discovering the cost to distribute the package to all desktops on the network in four hours, you might compromise on a reduced hardware configuration and accept a window of five hours to complete the distribution. In general, faster response times require more expensive hardware, and lower acceptable response times require less expensive hardware.

Because many SMS service requests come in surges, most SMS sites have service request backlogs that last for at least a few minutes. The two most common surges occur during the user logon cycle and when you send package advertisements.

While you experiment to find the least expensive hardware configuration to meet your needs, consider future growth requirements and the potential for change, and monitor the SMS site for backlogs. If a site is backlogged most of the day and catches up between 3:00 A.M. and 4:00 A.M., then there is a risk that the site cannot catch up if the weekly load increases. Plan for extra capacity so that you can quickly meet unexpected software distribution or other feature demands. Also, when SMS users and administrators become familiar with SMS, their usage levels increase.

Determining Load Signatures

The combination of business objectives and operational styles in every organization creates unique load signatures. However, if an organization has ten remote offices with the same number of workers, the same software, and the same hardware, and you manage them all similarly, then they all might have a similar load signature. Grouping computers with similar load signatures can reduce planning time.

By determining the load signature of servers in the SMS site, you can plan for an appropriate hardware component capacity. Then, by changing hardware capacity, you can increase or decrease the responsiveness of SMS and the time required to accomplish specific tasks. The load signature is determined by several factors, including:

Number of optional SMS features installed and in use on the computer

Location of site server in the SMS hierarchy (whether it communicates with parent or child sites)

Number of objects in the site

Size of objects being processed

Frequency of scheduled events

Frequency of feature use

Page 46: Holland College Project

Design a Network – Assignment - ICAA5045C -

46

To successfully determine server sizes for an SMS hierarchy:

1. Define the load signature for each site component server.

2. Determine throughput requirements using the formulas documented in this section.

3. Use the throughput requirements to estimate hardware requirements.

4. Use the hardware requirements to construct sample SMS configurations to test in your isolated test lab

and later in the pilot project.

Testing your hardware configuration and conducting a successful pilot project helps ensure that your organization's deployment progresses smoothly, because the deployment itself is based on site designs customized for your organization's data and tested in your environment”.

Methods and Formulas Used to Determine Server Capacity Ian Good

Page 47: Holland College Project

Design a Network – Assignment - ICAA5045C -

47

Private

IP Address

Host Name Description Location

192.168.2.1 to

192.168.2.23

M&S 1 to M&S23 Math and Science Lab Math and Science Lab computers

192.168.2.100 M&S_Server Server English and Writing Lab English and Writing Lab

192.168.3.1 to

192.168.3.36

E&W1 to E&W36 English and Writing Lab

192.168.3.100 E&W_Server Server English and Writing Lab English and Writing Lab

192.168.4.1 to

192.168.4.18

Admin1 to Admin18 Administrative Offices Administrative Offices

192.168.4.100 Admin_Server Administrative Offices Administrative Offices

192.168.5.100 Email_Server Administrative Offices Administrative Offices

192.168.6.100 Proxy_Server Administrative Offices Administrative Offices

Public IP Addresses

Holland College will purchase 10 public IP addresses for DNS and Web server.

1 off membership cost $4,175

Annual Fee $46,461

Source : http://submit.apnic.net/cgi-bin/feecalc.pl?ipv4=10&ipv6=&action=Calculate

“The IP addressing scheme which you use can be based on:

Public IP addresses: Here, the IP addressing scheme consists of only public IP addresses.

Page 48: Holland College Project

Design a Network – Assignment - ICAA5045C -

48

Private IP addresses: Here, the IP addressing scheme consists of private IP addresses and a small number of public IP addresses needed to enable Internet connectivity.

If you are only using a public IP addressing scheme in your network design, then you need to perform the following activities:

Purchase a range of public IP addresses from an ISP that is approved by the Internet Corporation for Assigned Names and Numbers (ICANN).

The IP address range should have sufficient IP addresses for all interfaces in your network infrastructure design. Devices that connect to the private network need an IP address, and so too does VPN connections.

You need to be certain that network address translation (NAT) is not required.

You need to implement firewalls and router packet filters to secure the resources within your private network from Internet users.

If you are implementing a private IP addressing scheme, then the network design would consist of the following:

Private IP addresses would be assigned to all devices in the private internal network.

Public IP addresses would be assigned to all devices connecting to the public network.

The selection of the IP address range needed for the organization should be based on the following factors:

Maximum number of IP devices on each subnet

Maximum number of network subnets needed in the network design.

If you are using a private IP addressing scheme in your network design, consider the following important points:

For those IP devices that connect the company network to public networks such as the Internet, you need to obtain a range of public IP addresses from the ISP for these devices.

You should only assign public IP addresses to those devices that communicate directly with the Internet. This is mainly due to you paying for each IP address obtained. Devices which directly connect to the Internet are your network address translation (NAT) servers, Web servers, VPN remote access servers, routers, firewall devices, and Internet application servers.

The private IP address range which you choose should have sufficient addresses to support the number of network subnets in your design, and the number of devices or hosts on each particular network subnet.

You must cater for a network address translation (NAT) implementation. NAT translates IP addresses and associated TCP/UDP port numbers on the private network to public IP addresses which can be routed on the Internet. Networks that do not require an implementation of a firewall solution or a proxy server solution can use NAT to provide basic Internet connectivity. Through

Page 49: Holland College Project

Design a Network – Assignment - ICAA5045C -

49

NAT, host computers are able to share a single publicly registered IP address to access the Internet.

IP version 6 (IPv6) was designed to deal with the current shortage of IP addresses with IP version 4 (IPv4). IP version 6 also includes some modifications to TCP/IP.

Holland College might have to go to IPv6

The primary differences between IPv6 and IPv4 are listed here

Source and destination addresses: IPv4: 128 bits in length; IPv6: 32 bits in length

IPSec support: IPv4: Optional; IPv6: Required.

Configuration of IP addresses: IPv4: Manually or via DHCP; IPv6: Via Address Autoconfiguration - DHCP is no longer required, nor is manual configuration.

Packet flow identification for QoS handling in the header: IPv4: No identification of packet flow; IPv6: Packet flow identification for QoS handling exists via the Flow Label field.

Broadcast addresses: IPv4: Broadcast addresses are used to transmit traffic to all nodes on a specific subnet; IPv6: Broadcast addresses are replaced by a link-local scope all-nodes multicast address.

Fragmentation: IPv4: Performed by the sending host and at the routers; IPv6: Performed by the sending host.

Reassembly: IPv4: Has to be able to reassemble a 576-byte packet; IPv6: Has to be able to reassemble a 1,500-byte packet.

ARP Request frames: IPv4: Used by ARP to resolve an IPv4 address to a link-layer address; IPv6: Replaced with Neighbor Solicitation messages.

ICMP Router Discovery: IPv4: Used to determine the IPv4 address of the optimal default gateway; IPv6: Replaced with ICMPv6 Router Solicitation and Router Advertisement messages.

Internet Group Management Protocol (IGMP): IPv4: Used to manage local subnet group membership; IPv6: Replaced with Multicast Listener Discovery (MLD) messages.

Header checksum: IPv4: Included; IPv6: Excluded

The advantages of IPv6 are listed below:

Page 50: Holland College Project

Design a Network – Assignment - ICAA5045C -

50

Large address space: Because of the larger number of available addresses, it is no longer necessary to use utilize Network Address Translator (NAT) to map a public IP address to multiple private IP addresses.

A new header format which offers less overhead: The new header format of IPv6 is designed to minimize header overhead. All optional fields which are needed for routing are moved to extension headers. These extension headers are located after the IPv6 header. The IPv6 header format is also streamlined so that it is more efficiently processed at intermediate routers. The number of bits in IPv6 addresses is four times larger than IPv4 addresses.

An efficient hierarchical addressing and routing infrastructure: The IPv6 global addresses are designed to create an efficient routing infrastructure.

Built in support for security - IPSec: A requirement of IPv6 is support for IPSec. IPSec contains the following components that provide security:

o Authentication header (AH): The AH provides data authentication, data integrity and replay protection for the IPv6 packet. The only fields in the IPv6 packet that are excluded are those fields that change when the packet moves over the network.

o Encapsulating Security Payload (ESP) header: The ESP header provides data authentication, data confidentiality, data integrity, and replay protection for ESP encapsulated payload

o Internet Key Exchange (IKE) protocol: The IKE protocol is used to negotiate IPSec security settings.

Support for Stateless and stateful address configuration: IPv6 can support a stateful address configuration and a stateless address configuration. With IPv4, hosts configured to use DHCP have to wait a minute before they can configure their own IPv4 addresses. Stateless address configuration however enables a host on a link to automatically configure its own IPv6 address for the link. These addresses are called link-local addresses. A link-local address is configured automatically, even when no router exists. This allows communication between neighboring nodes on the same link to occur immediately.

Support for Quality of service (QoS) header fields: There are new fields in the IPv6 header that specify the way traffic is identified and handled.

o Traffic Class field: This field defines traffic that must be prioritized.

o Flow Label field: This field enables the router to identify packets, and also handle packets that are part of the identical flow in a special way.

Unlimited extension headers: You can add extension headers after the IPv6 header if you want to extend IPv6 for any new features.

The Neighbor Discovery (ND) protocol for managing nodes on the same link: Neighbor Discovery is a series of Internet Control Message Protocol for IPv6 (ICMPv6) messages that are used in IPv6 environments to identify the relationships between neighboring nodes. ND enables hosts to discover routes on the same segment, addresses and address prefixes. Address Resolution Protocol (ARP), ICMPv4 Router Discovery and ICMPv4 Redirect messages are replaced with the more efficient multicast and unicast Neighbor Discovery messages.

Page 51: Holland College Project

Design a Network – Assignment - ICAA5045C -

51

If you want an IP address to provide all services to the network, then each particular service must have a unique TCP port or UDP port from that specific IP address. There are a number of well-known ports which are used by the different services running on your computers.

The main port numbers used by protocols/services running on your computers are listed here:

Port 20; for File Transfer Protocol (FTP) data

Port 21; for File Transfer Protocol (FTP) control

Port 23; for Telnet.

Port 25; for Simple Mail Transfer Protocol (SMTP)

Port 37; for Time Protocol.

Port 49; for Terminal Access Controller Access Control System (TACACS) and TACACS+

Port 53; for DNS.

Port 67; for BOOTP server.

Port 68; for BOOTP client.

Port 69; for TFTP.

Port 70; for Gopher.

Port 79; for Finger.

Port 80; for Hypertext Transfer Protocol (HTTP)

Port 88; for Kerberos

Port 109; for Post Office Protocol version 2 (POP2)

Port 110; for Post Office Protocol version 3 (POP3)

Port 115; for Simple File Transfer Protocol (SFTP)

Port 119; for Network News Transfer Protocol (NNTP)

Port 123; for Network Time Protocol (NTP)

Port 137; for NetBIOS Name Service

Port 138; for NetBIOS Datagram Service

Port 139; for NetBIOS Session Service

Port 143; for Internet Message Access Protocol (IMAP)

Port 153; for Simple Gateway Monitoring Protocol (SGMP)

Page 52: Holland College Project

Design a Network – Assignment - ICAA5045C -

52

Port 161; for SNMP

Port 161; for SNMP traps

Port 179; for BGP

Port 389; for Lightweight Directory Access Protocol (LDAP) and Connectionless Lightweight X.500 Directory Access Protocol (CLDAP)

Port 443; for Secure HTTP (HTTPS)

Port 500; for Internet Key Exchange (IKE)

Port 546; for DHCPv6 client

Port 547; for DHCPv6 server

Port 631; for Internet Printing Protocol (IPP)”

Source : Class Handout Ian Good

“If DNS is setup incorrectly, over time your mail server IP will be added to blacklists. Nowadays most E-Mail servers have some kind of spam protection service which in turn means that all your inbound mail will be blocked if you do happen to be listed on a spam blacklist.

In this article I will describe how to correctly configure your MX and reverse DNS records for your mail server. This article is based on an Exchange 2003/2007 server but every other messaging server will follow the same principle.

Assigning an IP address

Starting from the bottom up the first thing you need to do is assign a static external IP address to the internal private address of your mail server. You will need to apply these rules on your firewall to port forward SMTP (port 25) and NAT an external IP address to the internal address of the server.

Something that a lot of administrators forget to do or check is to set the outgoing NAT rule to use the same external IP address created for the inbound rule to the mail server. If this isn't set, Reverse DNS will not match and in turn your mail server will be listed on blacklists. If your firewall rules are setup correctly the IP address listed on this page should be the same IP address you mapped to the internal private IP address of the mail server.

Create the MX records for your mail server

For the purpose of this example, listed below are all the details of my mail server to help you understand what you need to do.

External IP: 87.22.1.22

Page 53: Holland College Project

Design a Network – Assignment - ICAA5045C -

53

E-Mail Domain: domain.com

You will need to be an administrative contact for your External DNS provider for your domain to make these changes. In most cases this can be done through an online control panel through your DNS provider. Failing that on the phone or via E-Mail.

1. The first thing we need to do is create an A record to point to the external IP address mapped on your firewall to the mail server. The host A record can be called any thing but is commonly called "mail". In our example we will create "mail.domain.com" to point to IP address "87.22.1.22"

2. Next we will create an MX record to point to the newly created A record of our mail server.

Within your DNS control panel select "add MX record". Make sure that the host address is the root domain name in our case "domain.com"

Set the FQDN as the A record we just created which in our case is "mail.domain.com".

The lowest property is the most preferred but in our example we will set the priority as 10.

Use NSlookup to check DNS and MX records are applied

It can take up to 48 hours for DNS to propagate but in most cases 12-24 hours. To check our DNS entries are applied and correct we can use nslookup.

1. Open a CMD prompt and type nslookup

2. Type set type=mx

3. Type the domain name which in our case is domain.com.

In our example the output should read as follows if correctly setup:

> domain.com

Non-authoritative answer:

domain.com MX preference = 10, mail exchanger = mail.domain.com

mail.domain.com internet address = 87.22.1.22

Configure Reverse DNS

Reverse DNS is used to verify that the mail server is who it says it is. The recipients mail server will do a reverse lookup to make sure that the IP address of the mail A or host record in DNS is

Page 54: Holland College Project

Design a Network – Assignment - ICAA5045C -

54

the same as the IP address it is communicating with. Only 1 RDNS entry can be present per IP address.

To do this you will need to contact your ISP to make this entry. You will not be able to do this in your DNS control panel unless your ISP also host your DNS and give you the functionality to add your own RDNS records.

In our case we would contact our ISP and advise that we would like to create an RDNS entry for our IP address 87.22.1.22 which would resolve too mail.domain.com.

Verify Reverse DNS

Again it can take up to 48 hours for DNS to propagate but in most cases 12-24 hours. To verify that the RDNS entries have been added and are correct do the following:

1. Open a CMD prompt.

2. Type Ping -a 87.22.1.22 (This is the external IP address for your mail server. In our case we use our external IP address stated above)

If RDNS is configured correctly the following output will be shown:

C:UsersUser>ping -a 87.22.1.22

Pinging mail.domain.com [87.22.1.22] with 32 bytes of data:

SMTP Banner

Every time a mail server establishes a connection with your mail server it shows its SMTP banner. This banner must be resolvable on the internet and best practice is to have it as your mail host/A record.

Configure SMTP banner Exchange 2003

1. Open Exchange system manager.

2. Expand your administrative group ("First administrative group" by default).

3. Expand Servers.

4. Expand YourServerName.

5. Expand Protocals container.

6. Select SMTP container.

Page 55: Holland College Project

Design a Network – Assignment - ICAA5045C -

55

7. On the right window, right click the Default SMTP virtual Server (Or the name you set your SMTP Server) and

select Properties.

8. Select the Delivery Tab.

9. Click the Advanced button.

10. Under the Fully-qualified domain name type mail.domain.com (The A/Host record you created in DNS for your mail server)

11. Click OK and OK again to accept the changes

Configure SMTP banner Exchange 2007/2010

1. Open the Exchange management console.

2. Select the Organisation Configuration container.

3. Select Hub Transport container.

4. On the right select the Send Connectors tab.

5. Right click your send connector and select properties.

6. On the General tab under the Set the FQDN this connector will... type the A record domain name you created. Which in our case is mail.domain.com. Click OK.

7. Under the Server Configuration container click the Hub Transport container.

8. In the Right window Select the properties of the Receive Connector under Receive Connectors tab.

9. On the General tab under the Set the FQDN this connector will... type the A record domain name you created. Which in our case is mail.domain.com. Click OK

To verify these changes we can use telnet to view the output upon establishing a connection on port 25 to our mail server. Use the following steps to do this:

1. Open a CMD prompt

2. Type Telnet mail.domain.com 25.

The output you see should look something like this and contain your A record of your mail server:

Page 56: Holland College Project

Design a Network – Assignment - ICAA5045C -

56

220 mail.domain.com Microsoft ESMTP MAIL Service ready at Sun, 28 Feb 2

010 17:51:20 +0000

If you use an edge server or a SPAM filter appliance like a Barracuda the SMTP banner will have to be set on this device/server.

Check to see if your mail server is on spam lists and/or an open relay

A great website to use to check your MX records, RDNS, check if your mail server is an open relay and check to see if you are listed on spam lists is www.mxtoolbox.com. This is a great site and one to keep in your favourites.

Following these guide lines will successfully and correctly configure mail routing to and from your mail server. The next step is too secure and ensure your mail server is not an open relay. I will be writing a separate article dedicated to this in the near future.

If you would prefer to not experience the stress in looking after and maintaining an Exchange server environment you may choose a hosted exchange server solution instead.

Mike Collins has over 10 years experience in computing and is a senior IT Consultant at Sphere IT Consulting”

Source : http://ezinearticles.com/?Configure-Exchange-E-Mail-Server-Reverse-DNS-and-MX-Records-Correctly&id=3844191

(b) Description of the file servers and NOS, and why they were selected.

There are 5 Main servers in the Holland College Network. The three Domain and file servers for classrooms and Administration, a e-mail server for Microsoft exchange and the proxy server which will act as a filter for websites. The servers were chosen because of the geographical area they are in also for their performance . Hardware Performance specifications for the 5 main servers are.

Page 57: Holland College Project

Design a Network – Assignment - ICAA5045C -

57

Right Sized, Flexible Technology and Enhanced Business ValueThe compact DellTM  PowerEdgeTM  T110 was designed to meet the needs of the small business environment. Customizable with up to four hard drives for your important data, cost effective RAID options for added data protection, new e-SATA external storage connectivity options and basic systems management for easy system monitoring, the T110 is an ideal first server for the small business needing to increase productivity and collaboration in their office.

Dell aims to add value to your business by providing the features you need without a lot of the unnecessary extras. Our goal is to deliver value through tailored solutions based on industry standards, as well as purposeful, innovative design.

 

Purposeful Design

Page 58: Holland College Project

Design a Network – Assignment - ICAA5045C -

58

Built with the latest quad-core Intel®  Xeon®  processor inside, the PowerEdge T110 can easily handle day-to-day computing and file storage demands.

Our high efficiency, low-flow fans are designed to spin faster in accordance with server workload demands. This helps to reduce unnecessary noise when possible and keeps the server cooler in your office environment.

In addition, the T110 features up to four hard drives for your most important data and customer information. It also features basic systems management designed to enable easy system monitoring and alerts to help ensure reliable performance day after day without interruption.

Solid Security

Dell provides standard security features in the PowerEdge T110 to help keep your data secure. The included Trusted Platform Module (TPM) provides hardware-based encryption and authentication.

A chassis-intrusion switch alerts you when internal system components have been accessed.

 

The internal locked-down USB ports helps give IT administrators or small business owners an opportunity to implement other security and recovery options such as a password verification process to prevent unauthorised system access.

 

And finally, the PowerEdge T110 also features cost effective RAID options that can prevent data loss by further protecting the way your data is stored on your internal hard drives.

 

Page 59: Holland College Project

Design a Network – Assignment - ICAA5045C -

59

 

http://www1.ap.dell.com/au/en/business/servers/poweredge-t110/pd.aspx?refid=poweredge-t110&s=bsd&cs=aubsd1

The Network Operating System Microsoft server 2008 was chosen for Holland College to network with the Microsoft Windows 7 workstations. The email server and proxy host will also use Server 2008. Microsoft is the most widely deployed and well respected operating system provider.

(c) Summary of hardware costs.

A table of all hardware costs is included in this document under Task 9. The total hardware cost of this scoping study is $244,387.67. Considerable savings to this amount are envisaged if Holland College can negotiate with vendors. Also vendors usually give discounts for multiple purchases. The price displayed in this report mostly is the full recommended retail price. I would recommend to Holland College to source at least three independent prices before purchasing from individual vendors.

(d) Summary of software costs

A table of all software costs is included in this document under Task 10. The total software cost of this scoping study is $308,167.85. Considerable savings to this amount are envisaged if Holland College can negotiate with vendors about the use and license agreements. Also vendors usually give discounts for multiple purchases. The price displayed in this report mostly is the full recommended retail price. I would recommend to Holland College to source at least three independent prices before purchasing from individual vendors.

(e) The total cost of networking Holland College would be $552,555.52. The total cost of networking the Administration building only: -

- hardware costs $117,428.00- Software costs $25,653.85

Page 60: Holland College Project

Design a Network – Assignment - ICAA5045C -

60

- Total $143,081.85

Page 61: Holland College Project

Design a Network – Assignment - ICAA5045C -

61

Table of Networking Administration Building Only

Hardware CostsAssumption : I have based the total of networking just the Administration building

on the current computer allocation of 17 + 50% = 26 units

Task 9 Equipment Cost Number Of

Units

Total Cost Supplier

(a)

(b)

Computer

Intel Core i5 ProcessorSuper Fast

1333 FSB Speed CPU4GB DDR3

MemoryPowerful AMD ATI HD5770

1GB Graphics Card

7.1 High Definition Audio Sound Card

1000GB SATA II Hard Disk

Powerful AMD ATI HD5770 1GB Graphics

Card

7.1 High Definition Audio Sound Card

$1,112.31

included

26

included

$28,920.06

included

A

A

(c) Internet Service Provider TPG

4Mbps/4Mbps(4 wire)

$10,587.00Year

1 $10,587.00 B

(d) PowerEdge™ T110

ProcessorIntel® Pentium® Processor G6950 (2.80GHz, 3MB L2

Cache, 1066MHz FSB)

$1549.00 3 $4,647.00 C

Page 62: Holland College Project

Design a Network – Assignment - ICAA5045C -

62

Task 9 Equipment Cost Number Of

Units

Total Cost Supplier

(d1)Power Shield

Centurion

The Power Shield Centurion UPS

provides a permanent backup power solution for

sensitive devices such as medical

equipment and internet routers.

$699.00 2 $1,398.00 D

(e) NEW BOXED SEALED HP LTO-3

ULTRIUM 960 SCSI TAPE ARRAY DRIVE

Q1540A

1,690.00 3 $5,070.00 E

(f1) RJ 45 Connectors $3.74for 100

200 $7.48 F1

(f)New Cat5e Cat 5E

CMP 4/24 Plenum

Bulk Cable 2000ft

$330.00 1 $330.00 F

(g)Microsoft® Exchange Standard CAL Single

License/Software Assurance Pack

Academic OPEN User CAL User CAL

$10.00 26 $26.00 G

(g) Microsoft® Windows Web Server Sngl License/Software Assurance Pack

Academic OPEN 1

$162.00 1 $162.00 G

Page 63: Holland College Project

Design a Network – Assignment - ICAA5045C -

63

Task 9 Equipment Cost Number Of

Units

Total Cost Supplier

License

(g) Microsoft® Windows® Server Standard Single

License/Software Assurance Pack Academic OPEN

$291.00 3 $873.00 G

(g) Microsoft® Exchange Enterprise CAL Sngl License/Software Assurance Pack

Academic OPEN 1 License Device CAL Device CAL Without

Services

$28.00 26 $728.00 G

(g) Microsoft® Windows® Server CAL

Single License/Software Assurance Pack Academic OPEN

Device CAL

$20.00 26 $520.00 G

(g) Microsoft® Windows® Server CAL

Single License/Software Assurance Pack Academic OPEN

Device CAL

$20.00 26 $520.00 G

(g) Microsoft® Core CAL (Client Access License) Single

License/Software Assurance Pack Academic OPEN

$100.00 26 $2,600.00 G

Page 64: Holland College Project

Design a Network – Assignment - ICAA5045C -

64

Task 9 Equipment Cost Number Of

Units

Total Cost Supplier

Device CAL

(g) Microsoft® Core CAL (Client Access License) Single

License/Software Assurance Pack Academic OPEN

Device CAL

$100.00 26 $2,600.00 G

(h) Microsoft® Windows® Server Standard Single

License/Software Assurance Pack Academic OPEN

$291.00 3 $873.00 G

(h) Microsoft® Exchange Server Standard

Single License/Software Assurance Pack Academic OPEN

$473.00 1 $473.00 G

(h1) Microsoft® Windows 7 Professional Sngl

Software $449.00 26 $11,674.00 H1

(i) Gigabit Fiber Nic 32BIT Pci 1000BSX Sc

$129.99 5 $649.95 H

(j) Linksys EtherFast (LNE100TX-AT)

Network Adapter

$19.95 35 $698.25 I

(k) Manufacturer: CiscoPart Code: WS-C2950SX-48-SI

Form Factor: External - 1U

RAM: 16 MBFlash Memory: 8 MB

$3,019.50 1 $3,019.50 J

Page 65: Holland College Project

Design a Network – Assignment - ICAA5045C -

65

Task 9 Equipment Cost Number Of

Units

Total Cost Supplier

Ports Qty: 48 x Ethernet 10Base-T,

Ethernet 100Base-TX

(l) Cisco Catalyst 2950SX-24 - switch -

24 ports

K

5 * Public IP4 addresses1 off Fee

Yearly Fee

$4,175.00$23,230.50

11

$4,175.00$23,230.50

L

QLOGIC SANBOX 5802V FABRIC SWCH-8GB PT ENABLED PLS

4

$5,991.69 1 5,991.69 M

HP LaserJet P2050 Printer series - Specifications

$799.00 5 3,995.00 N

Cisco 12000 Series Router Gigabit

Ethernet Line Card

$1,259.57 1 $1,259.57 O

Fibre cable course

$1,200.00 2 $2,400 P

Total Hardware Costs

$117,428.00

Page 66: Holland College Project

Design a Network – Assignment - ICAA5045C -

66

Table of Networking Administration Building OnlySoftware Costs

Assumption : I have based the total of networking just the Administration on the

current computer allocation of 17 + 50% = 26 units

Task 10

Software Cost Number Of Units

Total Cost Supplier

Microsoft office 2000 $849.00 26 $22,074.00 A

Math CAD $1050.50 BMicrosoft Visual Studio 2010

Professional$164.95 3 $494.85 C

Auto CAD 2011 $1,718.00 DSAS Learning Edition 4.1 for

Students$68.75 E

C++ CompilerIncluded in Visual Studio

---- ---- C

Publisher 2010 $189.00 FM/S Visio 2010 $217.00 G

M/S Project 2010 $1,699.00 H

PC-based financial aidPackages

$329.00 3 $987.00 I

FoxPro database

Visual foxpro professional edition 9.0

$1049.00 2 $2,098.00 J

Total $25,653.85

(f) Explain why you are recommending each item of equipment in Task 9, and how the recommended system meets reliability goals.

Page 67: Holland College Project

Design a Network – Assignment - ICAA5045C -

67

Hardware Recommendation and Reliability

Task 9 Equipment Recommendation Reliability Goals(a)

(b)

Computer

Intel Core i5 ProcessorSuper Fast

1333 FSB Speed CPU4GB DDR3

MemoryPowerful AMD ATI HD5770

1GB Graphics Card

7.1 High Definition Audio Sound Card

1000GB SATA II Hard Disk

Powerful AMD ATI HD5770 1GB Graphics

Card

7.1 High Definition Audio Sound Card

Intel is the words Largest Chip Maker

AMD major Motherboard Maker

Quality Components

With warrenty

(c) Internet Service Provider TPG

4Mbps/4Mbps(4 wire)

TPGEstablished ISP

4Mbps ConnectionFast for ADSL 2

(d) PowerEdge™ T110

ProcessorIntel® Pentium® Processor G6950 (2.80GHz, 3MB L2

Cache, 1066MHz FSB)

Quality Server made by DellIntel Processor

Warrenty and after sales service

(d1)Power Shield

Centurion

The Power Shield Centurion UPS

provides a permanent backup power solution for

sensitive devices such

QualityUPS

DesignedFor Medical Equipment

Will provide stability and time to shut down esscential services

Page 68: Holland College Project

Design a Network – Assignment - ICAA5045C -

68

Task 9 Equipment Recommendation Reliability Goalsas medical

equipment and internet routers.

(e) NEW BOXED SEALED HP LTO-3

ULTRIUM 960 SCSI TAPE ARRAY DRIVE

Q1540A

New box sealed product with warrenty

Data will be able to be backed up

(f1) RJ 45 Connectors Needed for 100Base TX network New product with warrenty

(f)New Cat5e Cat 5E

CMP 4/24 Plenum

Bulk Cable 2000ft

Safe non toxic burning in case of fire

Needed for fast Ethernet

(g)Microsoft® Exchange Standard CAL Single

License/Software Assurance Pack

Academic OPEN User CAL User CAL

Microsoft Cal needed to comply with Microsoft license

agreements

If Microsoft need to come to service software company is fully compliant with

Software license agreements

(g) Microsoft® Windows Web Server Sngl License/Software Assurance Pack

Academic OPEN 1 License

Web Server Assurance of serviceWeb Server needs to be operating 23hrs

7days week

(g) Microsoft® Windows® Server Standard Single

License/Software Assurance Pack Academic OPEN

Servers need to be reliable and on line 23hrs day 7 days week

Ensures that Microsoft will fully support our Servers when we need help

(g) Microsoft Cal needed to comply with

Microsoft license

If Microsoft need to come to service software company is fully compliant with Software license

If Microsoft need to come to service software company is fully compliant with

Software license agreements

Page 69: Holland College Project

Design a Network – Assignment - ICAA5045C -

69

Task 9 Equipment Recommendation Reliability Goalsagreements agreements

(g) Microsoft® Windows® Server CAL

Single License/Software Assurance Pack Academic OPEN

Device CAL

Microsoft Cal needed to comply with Microsoft license

agreements

If Microsoft need to come to service software company is fully compliant with

Software license agreements

(g) Microsoft® Windows® Server CAL

Single License/Software Assurance Pack Academic OPEN

Device CAL

Microsoft Cal needed to comply with Microsoft license

agreements

If Microsoft need to come to service software company is fully compliant with

Software license agreements

(g) Microsoft® Core CAL (Client Access License) Single

License/Software Assurance Pack Academic OPEN

Device CAL

Microsoft Cal needed to comply with Microsoft license

agreements

If Microsoft need to come to service software company is fully compliant with

Software license agreements

(g) Microsoft® Core CAL (Client Access License) Single

License/Software Assurance Pack Academic OPEN

Device CAL

Microsoft Cal needed to comply with Microsoft license

agreements

If Microsoft need to come to service software company is fully compliant with

Software license agreements

(h) Microsoft® Windows® Server Standard Single

License/Software Assurance Pack Academic OPEN

Microsoft Exchange Server 2008 needed for Exchange Server

problems

If Microsoft need to come to service software company is fully compliant with

Software license agreements

(h) Microsoft® Exchange Microsoft Exchange Server 2008 If Microsoft need to come to service

Page 70: Holland College Project

Design a Network – Assignment - ICAA5045C -

70

Task 9 Equipment Recommendation Reliability GoalsServer Standard

Single License/Software Assurance Pack Academic OPEN

needed for Exchange Server problems

software company is fully compliant with Software license agreements

(h1) Microsoft® Windows 7 Professional Sngl

Software

Quality Operating system that staff members know how to use

Microsoft Support

(i) Gigabit Fiber Nic 32BIT Pci 1000BSX Sc

Gigabit quality manufacturer of parts for IT

Quality part for the Fiber Backbone

(j) Linksys EtherFast (LNE100TX-AT)

Network Adapter

Linksys is a major manufacturer of quality II components

Quality network NIC for network connectivity

(k) Manufacturer: CiscoPart Code: WS-C2950SX-48-SI

Form Factor: External - 1U

RAM: 16 MBFlash Memory: 8 MB

Ports Qty: 48 x Ethernet 10Base-T,

Ethernet 100Base-TX

Vlan for the backbone of the Network. Cisco is the leading

manufacturer of switches

High Quality part from Cisco reliability and performance.

(l) Cisco Catalyst 2950SX-24 - switch -

24 ports

Vlan for the backbone of the Network. Cisco is the leading

manufacturer of switches

High Quality part from Cisco reliability and performance.

10 * Public IP4 addresses1 off Fee

Yearly Fee

IP4 addresses are the network addressing system for the

internet

Needed DNS and E-mail servers. Needed for web presence for Holland College

QLOGIC SANBOX 5802V FABRIC SWCH-8GB PT ENABLED PLS

4

Fiber Switch to enable fast connections between servers.

To ensure network speed and efficiency.

HP LaserJet P2050

HP is the leading printer manufacturer.

Quality products = quality results for our staff.

Page 71: Holland College Project

Design a Network – Assignment - ICAA5045C -

71

Task 9 Equipment Recommendation Reliability Goals

Printer series - Specifications

Cisco 12000 Series Router Gigabit

Ethernet Line Card

The connection to the internet for our staff. Fiber channel.

Fast. With a quality manufacturer Cisco

Brand name product. High quality and very fast speed.

Fibre cable course

Needed for IT staff to manage and configure the fiber backbone

of the network

Will ensure Holland College Staff are able to fix and diagnose problems with the fiber network quickly and efficiently.

” What service-level agreement (SLA) does your networking client expect?

“Everyone would like a network that was up 100% of the time, but no one can really afford that. Getting that last 1% is incredibly expensive. A network that's up 99% of the time is actually a pretty easy thing to achieve -- that's 15 minutes of downtime each day or a small blip of an outage every hour and a half. So it's important to set expectations that no network is perfect, but there are certain things that you can do to improve uptime.

The difference between something that's up 99.95% of the time and something that's up 99.96% of the time is difficult to design around. We don't have that kind of granularity in network engineering.

Let me break [service-level agreements] down into a couple of different buckets. The first bucket is one-day return to service. This is a problem that might take a day to fix. Network equipment vendors often offer a service contract that lets them replace a part within four hours. That doesn't mean that the outage will last four hours, because it often takes a couple of hours to diagnose a problem, four hours for the part to arrive and a couple of hours to install it. But for some networks, that's sufficient for what they need. It's not the solution that most people want, especially if the company has maybe more than 50 people or more than three or four locations.

The improvement would be the next bucket, which is called N+1 redundancy. This means that any one component can fail and the system keeps working. So to achieve that, you have to have redundancy in the network. For example, a router might need two fans to keep it cool, but you would buy a model that has three fans -- any one can fail and the system can keep running. That's what's called N+1 redundancy -- the N is what's required for the system to keep running, and the 1 is for redundancy.

Page 72: Holland College Project

Design a Network – Assignment - ICAA5045C -

72

Most equipment nowadays, especially networking equipment, is assigned with all N+1 redundancy on the internal parts, and that can really improve the service-level agreement, because now you're in a situation where a part that fails does not automatically equal an outage. If it's one of the few parts that isn't redundant -- for example, if there's only one network connection between point A and point B -- all the fans and CPUs in the routers could be redundant, but if they're connecting a single point between two buildings, and that link goes down, then you're going to have an outage.

So the third bucket is system-wide N+1 redundancy. That's where we have redundancy not just on the internal links in the equipment, but for all the network links also. For example, you'd have dual network connections to a wiring closet or between offices. Especially if you're going between offices, it's important that the two connections are diversely routed, so that one backhoe doesn't ruin your whole day.

Service-level agreements can be even more protective that that, but usually [additional] requirements like that are from companies that engineer their own solutions.

Lastly, there are hybrids. So for example, a company with many sites will have a high service-level agreement for their medium and large offices, where everything is redundant. But for the smallest of offices -- maybe they have dozens and dozens of offices with just one or two people, maybe sales offices, scattered all around the world -- often you'll see a different service-level agreement for those offices, where if the router dies, those people are just going to work off the Wi-Fi from their local Starbucks until the office can be brought back online.

Q3: What is the purpose of the network being designed?

One should measure application requirements from real-world examples, so if you can spend time monitoring the network to determine average bandwidth used by certain applications, you're going to be able to do a much better job.

Latency is another quality that you should investigate. Some applications require low-latency networking, like NFS, [which] really requires less than two milliseconds of latency, while other things, like FTP, can work on very high-latency networks.

Q4: What networking skills does your client's in-house IT staff have?

Finding out what skills the client has in-house is important because it determines [at] what technical level you'll be able to have your conversation, but also what technical involvement [the client] wants after the installation is done.

Page 73: Holland College Project

Design a Network – Assignment - ICAA5045C -

73

Are they highly technical and just want assistance designing and spec-ing out the details of a network design, and then they're going to run the network after that? Maybe they want project management help, or the nontechnical process of making sure you're coordinating all the vendors and making sure everything gets done.

Are they just somewhat technical? Maybe they can handle add/move/change requests, but [are] not technical enough to configure new VLANs or add new connections to new buildings.

Or maybe they're not technical at all and need a fully managed solution where you're monitoring remotely and you're contacting them about periodic maintenance and that kind of thing.

Often clients want some kind of hybrid. Their requirements or their skill level for the LAN is different from the WAN. Typically [these] users can support their own LAN, ports and add/move/change requests themselves but want a more managed solution for the WAN because that's often dealing with vendors and telecoms and a whole different set of terminology.”

Source :

Q1 Ian Good

Network design checklist:

Six factors to consider when designing LANs

You finally have the consulting project you've been waiting for: A customer is building a new office and has asked you to design their entire local area network (LAN), as their present infrastructure is outdated and has ports failing by the day. This is a consultant's dream! However, it can become a nightmare for you and your company if you design the network improperly. Let's look at some big network design issues to consider when designing a new LAN for your customers.

Plan the network's complexity to be in line with the customer's IT expertise.

Switches and routers come with hundreds of features and functions. However, engineering too many bells and whistles into the network can create support problems in the future, if the customer's IT staff does not have some basic understanding of the features and functions you implement. Recognize the business's needs without making the network overly complex.

To PoE, or not to PoE?

Page 74: Holland College Project

Design a Network – Assignment - ICAA5045C -

74

More and more customers are deploying wireless LAN technology and IP telephony. Wireless LAN access points are easiest to install when Power over Ethernet (PoE) is available. IP telephony utilizes phones that connect to and draw power from the LAN. The days of the traditional PBX system are numbered; every vendor out there is moving towards IP PBX systems and handsets. Many customers will tell you "We are not using wireless," or "We will never move to IP telephony." They may not now (at least as far as their manager knows), but if you do a good job on this project, your customer will keep their equipment for at least three to five years. You'll do a great service to your customer if you can convince them to purchase PoE switches now. Then, when the CIO decides to move to WLAN or IP telephony in 18 months, the non-PoE switches won't have to be replaced.

10 Gigabit Ethernet? 100 Gigabit? Do I need that?

Just because 10 Gigabit Ethernet is here today and higher speeds are coming does not mean that you need those ports all over the LAN. All too often customers purchase the fastest equipment possible thinking they need it, even though their existing 100 Mbps network is only running at 5% capacity. While it is definitely prudent to ensure that core switches can support these higher speeds, you may be advising the customer to waste a lot of money if you tell them that 10 Gigabit switches are needed everywhere.

Redundancy.

Network uptime becomes more critical every year. Spend time planning a design that provides network redundancy from a physical and logical perspective. For example, utilize dual fiber-optic uplinks from the wiring closets to the core switches. Ensure that chassis-based core switches have dual CPU cards. Be sure to think about items like default gateway redundancy. You can design the most redundant physical network in the world, but if it's not properly configured to provide Layer 3 IP Default Gateway redundancy and a failure occurs, your customer's network will grind to a screeching halt and you can be sure they will call you to ask why.

Standards and maintenance.

When designing a corporate network, try to standardize on a few different types of devices, as opposed to using a different type of switch in every wiring closet, even if all your equipment is from the same manufacturer. Standardizing on a few different types of hardware simplifies configuration and troubleshooting. It also allows the customer to keep cold spares of each device with next-business-day maintenance, allowing for more rapid and cost-effective responses to device failures.

Network management tools.

While these always seem to be left off purchase orders, network management tools are invaluable in providing maximum network uptime. Software that periodically backs up all device configurations to a share on the network is simple but extremely useful. Also, think about the following scenario: Two switches provide IP Default Gateway redundancy on your customer's network. One of them fails, but you don't realize it because the network is redundant. When the other one fails, the customer experiences a total network outage. This can be easily avoided by using a simple tool to ping all network devices and report on their status.

There are many more items to think about when designing a local area network for your customer. These are some of the big ones that will hopefully get you pointed in the right direction and, more importantly, provide you with a happy (and returning) customer.

Page 75: Holland College Project

Design a Network – Assignment - ICAA5045C -

75

Source : Network design checklist Ian Good

Page 76: Holland College Project

Design a Network – Assignment - ICAA5045C -

76

Bibliograpgy

Page Reference2,3

4

4

10,11

11,12

12,13

13

13-19

21

33,34

35,36

37,38

38-43

43-46

47

47,52

52,56

57-59

Network design documentation Ian Good

http://wiki.answers.com/Q/What_are_the_benefits_of_computer_networking

http://www.webopedia.com/TERM/N/network_computer.html

http://articles.techrepublic.com.com/5100-10878_11-5032914.html

http://articles.techrepublic.com.com/5100-10878_11-5032914.html

http://en.wikipedia.org/wiki/Plenum_cable

http://www.lanshack.com/fiber-optic-tutorial-network.aspx

http://www.cisco.com/en/US/products/hw/routers/ps133/products_tech_note09186a00801f5d9e.shtml

http://medschool.ucsf.edu/isu/pdf/Security/password_management.pdf

Defining Network Infrastructure Ian Good

http://en.wikipedia.org/wiki/Network_topology

Course material MSIT Ian Good

Methods and Formulas Used to Determine Server Capacity Ian Good

Methods and Formulas Used to Determine Server Capacity Ian Good

http://submit.apnic.net/cgi-bin/feecalc.pl?ipv4=10&ipv6=&action=Calculate

Source : Class Handout Ian Good

http://ezinearticles.com/?Configure-Exchange-E-Mail-Server-Reverse-DNS-and-MX-Records-Correctly&id=3844191

http://www1.ap.dell.com/au/en/business/servers/poweredge-t110/pd.aspx?refid=poweredge-t110&s=bsd&cs=aubsd1

Page 77: Holland College Project

Design a Network – Assignment - ICAA5045C -

77

Page Reference

70-72

72-74

Q1 Ian Good

Network design checklist Ian Good