Free Essay

You Are a Network Consultant Who Has Been Asked to Attend an Initial Meeting with the Executive Management Team of Electromycycle, Llc. Electromycycle Manufactures Motorcycles. Its New Electric Motorcycle Was Just

In:

Submitted By adoji
Words 576
Pages 3
NETWORK ANALYSIS AND DESIGN
(BTN-208)

INDIVIDUAL ASSIGNMENT-1

NAME | YASIR ADOJI | NRIC | 151914240 | COURSE | NETWORK ANALYSIS AND DESIGN | LECTURER | NASARUDDEN | DATE | 26TH APRIL, 2016 |

1.0 INTRODUCTION

The Genome4U is a scientific research it will be used by the end user to study their specific genetic heritage with assistance of their doctor and genetic counselors. The topology of this network design will use the routing protocol of Open Shortest Path First (OSPF). The data will be used by different personality they might be computers researchers’ mathematians physicists and researches and also different laboratories may use different routing protocols example like Enhance Interior Gateway Routing Protocol (EIGRP), Routing Information Protocol (RIP) so as to connect the campus and provide full access to the entire network. In this network design I designed the network in hierarchical and redundant way which will allow users to access the network in a multiple way even if some interfaces are down or got problem.

User Communities User Community Name | Size of Community (Number of Users) | Location(s) of Community | Application(s) Used by Community | Doctors | 100 | Kajang | All | Researchers | 200 | Kuala lumpur | All | Volunteers | 5000 | Cybajaya | All | Mathematians | 1000 | Ayar Hitam | All | Physicist | 500 | Batu Phat | All | Engineers | 9000 | Selengo | All | End users | 7000 | Puchong | All | Scientists | 8000 | Jahor Baru | All |

Data Store and User Communities Data Store | Location | Application(s) | Used by User Community(or Communities) | Data Store | Data store server | | | | | Medical storage | | | | | DNA database | | | | | Email sever | | | | | DNS server | | | | | | | | | |

Q3) - Characterize the network traffic in terms of flow, load, behavior, and QoS requirements.
You will not be able to precisely characterize the traffic but provide some theories about it and document the types of tests you would conduct to prove your theories right or wrong.

1) Optimizing application where application performance, resiliency and availability will be kept to highest to satisfy users. 2) Downtime will be minimized and redundancy will be implemented. 3) Simplification of the application will be kept at minimum where users will be able to use the application easily. 4) Monitoring security of the application where hacking should not occur and unwanted people should not be able to have access of it 5) Optimizing data centers 6) Latency testing

I would conduct several tests to characterize the traffic which are follows: 1) Network Traffic Utilization: This Can be used to monitor the speed of application that are being used such as: VoIP, teleconferencing, file transferring. 2) Network Replay Testing: Is used by recording sample of traffic and the recorder sample is replayed on separate network for testing to determine if the measured load of traffic for network is appropriate or not. 3) Network Traffic Simulation: Will be used to measure the efficiency of the network Q4) -How often application will be optimized? -What amount of maximum uptime of application per year? -What amount of downtime application will be having per year? -What is network resiliency and Quality of Service (QoS)? -How will be security kept at highest to avoid downtime? -What are the limitations of the application? -How will load traffic be monitored for application? -What critical threats can harm the network application? -How will application be deployed and monitored?

Bibliography FreeNAS. (2011). so what is FreeNAS. Retrieved on oct 20, 2011 fromhttp://www.freenas.org/item/what-is-freenas?category_id=109DanseglioMike.(2011) Testing Network Performance with Real Traffic. Retrieved on Oct 20,2011 fromhttp://www.scriptlogic.com/smbit/article/testing-network-performance-with-real-traffic.

Similar Documents

Premium Essay

Networ Design

...Scenario You are a network consultant who has been asked to attend an initial meeting with the executive management team of ElectroMyCycle, LLC. ElectroMyCycle manufactures motorcycles. Its new electric motorcycle was just picked up by a large retail chain. ElectroMyCycle is upgrading its manufacturing capacity and hiring new employees. Recently, ElectroMyCycle employees have started saying, “The Internet is slow.” They are also experiencing problems sending email, accessing web-based applications, and printing. In the past, when the company was small, it didn’t have these problems. The operations manager outsourced computer services to a local business called Network Rogues, which installed new workstations and servers as needed, provided desktop support, and managed the switches, router, and firewall. ElectroMyCycle is now considering bringing computer services in-house and is wondering how its network should evolve as it increases production of its electric motorcycle. 1. What research will you do before your initial meeting with the executive management team? 1. Find out the industry and status of the industry the client is in. 2. Client’s market share in the industry 3. Financial growth history of the client 4. Client’s suppliers and customers 5. Products and services offered 6. Any recent important news on client’s business strategies or focus 2. What general problems does ElectroMyCycle seem to be experiencing? What network design...

Words: 621 - Pages: 3

Premium Essay

Networks

...Chapter 1 Analyzing Business Goals and Constraints This chapter serves as an introduction to the rest of the book by describing top-down network design. The first section explains how to use a systematic, top-down process when designing computer networks for your customers. Depending on your job, your customers might consist of other departments within your company, those to whom you are trying to sell products, or clients of your consulting business. After describing the methodology, this chapter focuses on the first step in top-down network design: analyzing your customer’s business goals. Business goals include the capability to run network applications to meet corporate business objectives, and the need to work within business constraints, such as budgets, limited networking personnel, and tight timeframes. This chapter also covers an important business constraint that some people call the eighth layer of the Open System Interconnection (OSI) reference model: workplace politics. To ensure the success of your network design project, you should gain an understanding of any corporate politics and policies at your customer’s site that could affect your project. The chapter concludes with a checklist to help you determine if you have addressed the business issues in a network design project. Using a Top-Down Network Design Methodology According to Albert Einstein: 000200010270745975 “The world we’ve made as a result of the level of thinking we have done...

Words: 8812 - Pages: 36

Premium Essay

Top Down Cisco

...Top-Down Network Design Third Edition Priscilla Oppenheimer Priscilla Oppenheimer Cisco Press 800 East 96th Street Indianapolis, IN 46240 ii Top-Down Network Design Top-Down Network Design, Third Edition Priscilla Oppenheimer Copyright© 2011 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing August 2010 Library of Congress Cataloging-in-Publication data is on file. ISBN-13: 978-1-58720-283-4 ISBN-10: 1-58720-283-2 Warning and Disclaimer This book is designed to provide information about top-down network design. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco...

Words: 79785 - Pages: 320