Question

In: Computer Science

Explain the methodologies and design issues that will need to be addressed by the network architect...

Explain the methodologies and design issues that will need to be addressed by the network architect when planning and designing a network. Also, detail how hardware, software, data, and media will determine the technology implemented. Include discussion on how devices such as switches, routers, and IOS function within a network.

Solutions

Expert Solution

solution:

Implemneting network for an infrastructure is the primary requirement of an organization such that each and every devices present within the infrastructure can connect with each other. Methodologies such as what type of topologies will be best for business and how to implement such topologies to function properly. Even choosing the correct network device is also very important for a business perspective. All these factors are important and all these factors can cause issues as well such as:

  • Compatibility issue: may be few devices will not be compatible with the existing software version you are using. Hence you will be unable to connect to the other devices in the network.
  • Security: It is also important to implement proper security in your infrastructure such that your data is safe from threats. Security realated issues will be quite common.
  • Devices issue: May be for your infrastructure you don't require specific devices as they are meant to be used for larger infrastructure.

Coming to the hardware part if the infrastructure, you need to make sure that you are using proper network devices such as routers and switches so that it can be easily connected to different network both inside and outside of the infrastructure.

Software or proper application must be installed such that they can be easily hosted on your network and you need to make sure that your firewalls are properly enabled such that outside untrusted traffic don't get into the network.

Proper network level data encryption should be done such that your data is not vulnerable to attacks or someone can't able to decrypt and exploit the data easily.

  1. Swiches are used to connect the devices within a network. Let say an example, all the machines in your accounts depart ment are connected to a switch. Similarly, finance department, IT department are using individual switches to connect.
  2. Routers are used to connect other networks such that through the help of routers we can communicate between department networks as well as to the internet. Routers will route the packets to other networks thereby establishing a connection.
  3. The IOS is used to enable communication of data between network nodes. It can even be used to improve the performance of the network traffic and enhance security.

please give me thumb up


Related Solutions

2. Imagine a contractor engages an architect to design a house and the architect engages an...
2. Imagine a contractor engages an architect to design a house and the architect engages an engineer to complete the drawing: Does the engineer owe any duty to the contractor? why?
Using an example explain why network design using IPv6 is simpler compared to IPv4 network design....
Using an example explain why network design using IPv6 is simpler compared to IPv4 network design.
The network architect/engineer usually are the ones asking the questions. And the customers, users, and IT...
The network architect/engineer usually are the ones asking the questions. And the customers, users, and IT staff using the network usually are the ones that would provide answers to the network design questions. Listed below are a few basic subject areas to consider when forming your questions. You may use this list to identify what questions would be asked for each of the subject areas. You may include other subject areas as you deem appropriate. Users Organization Growth Security Budget...
I am creating a system for a security design and need to choose controls for network...
I am creating a system for a security design and need to choose controls for network security and those with access controls as well. I need to decide what major network security controls I would need to recommend. Which ones are good examples and why? Within that, I need to describe three access control techs. and their essentials for util. apps. Are there a few cases to assist in demonstrating those access control techs.
Network Design proposal for a University Problem: Suppose you are asked to design of a network...
Network Design proposal for a University Problem: Suppose you are asked to design of a network infrastructure for a university. The university has 7 departments namely, IT, Finance, HR, Management, Faculty, students and R&D. The university also has an ADSL internet connection which is shared for the different departments. It is required that all the departments should have intercommunication. The R&D department should not have access to the internet. Each of the department contain 50-100 users. Explain your design giving...
You work for a consulting company as the senior network architect. Your company was contracted by...
You work for a consulting company as the senior network architect. Your company was contracted by a local university to design and deploy a new network. During the deployment process, this network will operate in parallel to the present infrastructure. The network currently has many performance issues and security concerns. A few months ago, there was a situation reported in the local newspapers that students had gained access to the student records database and had made modifications to grades. Your task as...
Q1) Discuss the top-down and the bottom-up digital design methodologies? Q2) Explain the advantages and disadvantages...
Q1) Discuss the top-down and the bottom-up digital design methodologies? Q2) Explain the advantages and disadvantages of FPGAs compared to ASICs? Q3) Explain the benefits of hierarchical design methodology in Verilog HDL? Q4) Discuss the tradeoffs between PLDs and FPGAs devices? Q5) Discuss the advantages and disadvantages of HDL modeling using built-in primitives and User Defined Primitives (UDPs)? Q6) Discuss the tradeoffs between schematic-based design and HDL-based design? Q7) Discuss the tradeoffs between PLDs and ASIC devices? Q8) Discuss the...
you are a client asked an architect to design a villa for yourself. You as a...
you are a client asked an architect to design a villa for yourself. You as a client didn’t ask for fees. The architect finished design and tried to collect the fees, and you were reasonable thinking that the fees will be around $3000. Since, this was paid for similar villa design of your friend. The architect argued that the fees should be $5000, discuss the possible action by judge if architect sued you and explain why?     
What is a network design document?
What is a network design document?
two methodologies for obtaining buy-in from an organization's executive team in support of network monitoring
two methodologies for obtaining buy-in from an organization's executive team in support of network monitoring
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT