Network Topology Logical Layout
Logical Topology |
The figure shown is the logical layout of the whole network of the school. This figure shows how the computers are connected to the MDF of the network. It also shows the three major hierarchical network design layer of the network (Core layer, Distribution layer, and Access Layer).
There are only two kinds of cable that comprise the layout; CAT 5e UTP cable and an outdoor CAT 5e UTP cable.
The MDF is composed of a multilayer switch, a 24-port switch, an FTP server, the administrator’s computer and the router for the connection to the ISP. It is also illustrated in the figure that every section is assigned to a specific Virtual LAN by the researchers. The IP addressing is also included to show the addressing assigned by the researchers to the different areas.
In addressing the different users, the proponents used different Virtual LANs to group our users based on the restrictions and privileges that they should have. The Virtual LANs are assigned to the multilayer switch for easy manageability of the network administrator. Student users are assigned to a different Virtual LAN in order to separate them with the other area that may have different privileges and restrictions like the faculty and administrators, all with different Virtual LANs depending on the needs of these areas. In creating the Virtual LANs, the researchers also considered the future growth of the locale. Another reason of having different Virtual LAN for each department is the anticipation of the increase in the number of users. If the additional users are to be added, it will not be applicable to have one Virtual LAN for different department because it will be more difficult to organize and manage them since they are included in one Virtual LAN and they are having different functions. In addition, each department will be using different systems and programs accordingly.
Read More Add your Comment 0 comments
Sample of Network Requirements for Schools
Technical Requirements
Reliability
• Internet and network availability during business hours.
• Wireless internet connection for wireless devices of students and employees.
• Uninterrupted power supply for network equipment, servers and the administrators end devices.
Scalability
• Provision for expansion and upgrades of network infrastructure.
Security
• Restrictions of forbidden web sites for student PC.
• Regulation of users where only teachers and administrators can access the File Server.
• Network administrator passwords for network devices.
• Regulation of the wireless Internet where it can only be accessed by registered MAC-address.
• Port security implementation.
• Secured physical location of network devices and servers.
• Antivirus Software and firewall.
Manageability
• Hierarchical network design.
• Implementation of Virtual LAN and VTP.
• Use of network tools for troubleshooting.
• Proper orientation of employees with the use of the network (security policies, file server).
Users
The main users of PCHS are the students, teachers, and administration (accountant, registrar, principal, librarian, guidance, computer technicians and network administrators). Every user must be aware of the network policies.
For Network Administrator
• Has all the physical access to every equipment and devices on the network.
• Can access network devices remotely such as router, wireless router and switches.
• Can access all websites.
• Can upload and download files to and from the FTP server.
• Can install and uninstall programs and software.
For Computer Technicians
• Has access to network and end devices physically.
• Has access to the internet.
• Has access to social networking sites.
• Restricted access on video streaming web sites.
• Restricted access on games and pornographic web sites.
• Restricted access to Peer to Peer file sharing such as torrents.
• Can install and uninstall programs and software.
For Principal
• Has an account for use on FTP server.
• Can view faculty members’ file but cannot modify.
• Has access to social networking sites.
• Has access to video streaming sites.
• Restricted access on games and pornographic web sites.
• Restricted access to Peer to Peer file sharing such as torrents.
• Cannot access network devices physically and remotely.
• Cannot install/uninstall programs and software.
For Faculty Members
• Have account for use on FTP server.
• Cannot view other FTP account files.
• Have access to the internet.
• Have access to social networking sites.
• Restricted access on video streaming sites.
• Restricted access on games and pornographic web sites.
• Restricted access on peer to peer file sharing such as torrents.
• Cannot access network devices physically and remotely.
• Cannot install/uninstall programs and software.
For Non-teaching Personnel
(Accountant, Guidance, Registrar, Librarian)
• Have account for use on FTP server.
• Have access to the internet.
• Have access to social networking sites.
• Restricted access on video streaming sites.
• Restricted access on games and pornographic web sites.
• Restricted access on peer to peer file sharing such as torrents.
• Cannot access network devices physically and remotely.
• Cannot install/uninstall programs and software.
For Students
• Have access to the internet.
• Observe restrictions on social networking sites.
• Observe restrictions on video streaming sites.
• Observe restrictions on games and pornographic web sites.
• Observe restrictions on peer to peer file sharing such as torrents.
• Cannot access network devices physically and remotely.
• Cannot install/uninstall programs and software.
For Wireless Connection Users
• Availability of internet access only if the MAC address of device is registered.
• Observe restrictions on social networking sites.
• Observe restrictions on video streaming sites.
• Observe restrictions on games and pornographic web sites.
• Observe restrictions on peer to peer file sharing such as torrents.
• Cannot access network devices physically and remotely.
Applications
Here are the lists of applications that will be supported by the network.
• NetOP, used to monitor student activity, as well as for discussion and data collection by teachers.
• Telnet, application used by network administrator to remotely configure network devices.
• FTP Clients, used by faculty members and administrators to connect to FTP server.
Read More Add your Comment 0 comments
Observe the Current Network Environment
Network configuration documentation provides a logical diagram of the network and detailed information about each component.
Network documentation should include these components:
• Network configuration table
• End-system configuration table
• Network topology diagram
• The existing network strengths and weaknesses and how they impact the business goals
Network Configuration Table
Contains accurate, up-to-date records of the hardware and software used in a network.
Example:
The table in the figure illustrates the data set that should be included for all components:
- Type of device, model designation
- IOS image name
- Device network hostname
- Location of the device (building, floor, room, rack, panel)
- If it is a modular device, include all module types and in which module slot they are located
- Data link layer addresses
- Network layer addresses
- Any additional important information about physical aspects of the device
End-system Configuration Table
Contains baseline records of the hardware and software used in end-system devices such as servers, network management consoles, and desktop workstations. An incorrectly configured end system can have a negative impact on the overall performance of a network.
For troubleshooting purposes, the following information should be documented:
- Device name (purpose)
- Operating system and version
- IP address
- Subnet mask
- Default gateway, DNS server, and WINS server addresses
- Any high-bandwidth network applications that the end-system runs
•Network Topology Diagram
Graphical representation of a network, which illustrates how each device in a network is connected and its logical architecture. A topology diagram shares many of the same components as the network configuration table. Each network device should be represented on the diagram with consistent notation or a graphical symbol. Also, each logical and physical connection should be represented using a simple line or other appropriate symbol. Routing protocols can also be shown.
A physical network diagram shows the physical layout of the devices connected to the network.
Typically includes:
• Device type
• Model and manufacturer
• Operating system version
• Cable type and identifier
• Cable specification
• Connector type
• Cabling endpoints
Example:
• A logical network diagram shows how data is transferred on the network.
Typically includes:
• Device identifiers
• IP address and subnet
• Interface identifiers
• Connection type
• DLCI for virtual circuits
• Site-to-site VPNs
• Routing protocols
• Static routes
• Data-link protocols
• WAN technologies used
Example:
Example: Physical Topology – Site LAN
Example: physical Topology
The network designer creates a chart that lists each of the identified weaknesses, which business or technical goal is impacted, and how the weakness can be eliminated in the proposed network design.
Example:
Read More Add your Comment 0 comments
What are the Network Requirements?
The Network Requirements section is very detailed. This section helps drive the network design and implementation of new technologies.
The Network Requirements section has the following four subsections:
• Business Goals
• Technical Requirements
• Users
• Applications
o Business Goals
The NetworkingCompany designer lists the goals in order of priority. The most important goals are listed first.
Example:
o Technical Requirement
The Networking Company designer evaluates each of the business goals. The designer then determines the technical requirements to meet the goals. These requirements are outlined in the Technical Requirements section under the properties of scalability, availability, security, and manageability.
Example:
o Users
In this section, the different user groups and their access requirements are listed.
o Applications
The network traffic characteristics and requirements of various applications affect the design of the network. This section of the document describes the types of applications the network must support. Any specific network traffic requirements are listed as well.
Read More Add your Comment 0 comments
Network Proposal Executive Summary
Important notes about the Executive Summary:
• The Executive Summary is presented first because it provides the reader with an overview of the complete proposal. The proposal will be read by people with different roles and requirements. These may include managers; network engineers and technicians; marketing and sales consultants; and finance and accounting personnel. By reviewing the Executive Summary first, readers can then decide whether to read through the complete document or read only those sections that apply to their role.
• Although presented first, the Executive Summary cannot be written until the rest of the proposal document has been compiled. This section is therefore the final section to be written.
Read More Add your Comment 0 comments
Layout of the Network Architecture Proposal
The proposal layout should be highly readable and aid the reader in locating information. Graphics enhance the readability of a proposal and convey information as well. Text should be legible, typically a serif typeface such as Times Roman, at 10-point to 12-point type. Page margins should be at least 0.5 inches, and page numbers should be included at the top or bottom of each page.
Section
|
Description
|
Executive Summary
|
Discusses the project goals and project scope at a high level. This section demonstrates that the network vendor understands the extent of the project and the role of the network in meeting the business goals. The goal of the summary is to convince the decision-makers of the business benefits of the design. This section is typically one to two pages long.
|
Network Requirements
|
Reviews the business goals and network requirements, including users and applications that need to be supported. This section often lists the business goals, in order of priority, with critical goals marked. This section includes the topologies; protocols, hardware, software, and training that are required to meet the business goals.
|
Current Network Environment
|
Documents the state of the existing network. This section includes physical and logical diagrams and the IP addressing scheme. The section summarizes the results of the network characterization, including strengths and weaknesses of the existing network. It also documents the user community and applications currently in use, based on the network characterization.
|
Proposed Physical Design
|
Describes the physical layout of the proposed design. This section documents trade-offs made to accommodate business goals and technical requirements. The section describes the features and recommended uses for the technologies and devices proposed for the new network design. This section documents the new WAN service and new network equipment. The section also includes proposed network diagrams.
|
Proposed Logical Design
|
Describes the logical topology of the proposed network. This section documents any proposed addressing and naming conventions. It describes the routing and switching protocols recommended for the planned network. This section includes recommended security mechanisms and products that support the security policy of the business. The section may include information on recommended network management procedures and applications.
|
Implementation Plan
|
Provides a detailed list of the tasks that must be performed to install and implement the new network. This section includes tasks, steps, time required, and proposed schedules.
|
Cost Proposal
|
Provides cost proposal for equipment, software, installation, and ongoing support.
|
Read More Add your Comment 0 comments
Guideline in Network Administration
Cisco Lifecycle Services
Cisco Lifecycle Services is designed to support evolving networks. Cisco Lifecycle Services is a six-phase approach to deploying and operating Cisco technologies.
The six phases of the Cisco Lifecycle Services are:
• The Preparation Phase
• The Plan Phase
• The Design Phase
• The Implement Phase
• The Operate Phase -maintenance
• The Optimize Phase -maintenance
- In the Prepare phase, the business goals of the project are identified and a business case is created to justify the installation of the network upgrade.
- During the Plan phase, the network designer performs a comprehensive site and operations assessment of the current network. A project plan is created that includes the tasks, time-lines, risks, responsibilities and the resources required to complete the network design project.
- In the Design Phase, the designer creates a flexible design that can integrate new technologies into the current operations and existing network infrastructure.
- During the Implement phase, the network is built according to the approved designs and specifications and tested to ensure it meets the business goals and requirements.
- The Operate and Optimize phases of the network lifecycle are ongoing and represent the day-to-day operations of the network. Optimizing a network is a continuous process that identifies and resolves potential weaknesses before they become problems for network operations.
The proposal typically contains the following sections:
A. Executive Summary
B. Network Requirements (planning stage)
C. Current Network Environment (planning stage)
D. Proposed Physical Design
E. Proposed Logical Design
F. Implementation Plan
G. Cost Estimate
Read More Add your Comment 0 comments