Running head: NETWORK MODEL
1
A Network Model for Scenario Dreamz Inc.
Cynthia Pate
ITS2103 Networking Fundamentals
April 18, 2017
Professor Jennifer Merritt
South University
NETWORK MODEL
2
Introduction
The company continues to grow, and there is establishment of new branches across
various regions. With this, the staff members will go on increasing, and thus they will need to
communicate through the internet despite their different locations. The company needs to ensure
this communication is readily available which can be provided by choosing the best network
model whereby the TCP / IP Model will serve the best. This model utilizes the most recent
architecture of the internet, and it stands for transmission control protocol together with internet
protocol. Protocols can be termed as a set of regulations and rules that command all the
communication across any network by describing data movement that occurs between
destination and source together with across the internet. The protocols also provide a simplified
way of giving names and scheme addressing. The model was established by the research agency
in the Department of Defense (ARPA which changed to DARPA) like a project research of
interconnecting network mainly in connecting machine remotely.
Among the features which exist in this model is that it supports an architecture which is
flexible and more devices can be easily added to a network, the network is made to be more
robust, and connections can remain intact until the time when the machines used in destination
and source start to function. With this model application, a computer can send packets of data to
other applications which could be running on a different machine. The architecture of this model
has four layers to complete the system used for communication (Forouzan, 2002).
NETWORK MODEL
3
With this model, the systems used are compatible and can have communication with each
other. Through this model communication throughout the whole network will be understood
with a lot of ease, new technologies will be easily comprehended and also incorporated as the
growth in technology occur, software and hardware will be seen and understood with ease and
particularly on how they work together, and it will be very easy to troubleshoot especially in the
separate networks. The model will allow interdependent operations for the network
administrators and scalability is well enhanced. The client-server architecture is enabled which
allows monitoring and organized communication between different parties. A significant
NETWORK MODEL
4
number of protocols are utilized in routing with the help of this model. The connection is also
made with a lot of ease among the various computers.
The model bases itself on protocols which developed the internet and act as a protocol for
communication allowing host connection over the network. Even though the transport layer in
this model never guarantees packet delivery, it is the most reliable model. It utilizes an approach
which is horizontal and does not have different session and presentation layer. The model also
fully implements the OSI model. Network layer in this model support services which are
connectionless and it is very hard to replace protocols thus it is more secure (Lakshman, &
Madhow, 1997).
Description of the numerous protocols
The first layer
This is the lowest also called host to the network layer and is used in connecting the host to allow
packets to be sent through it. There are variations in one host and another and also in one network
and another network.
The second layer
The layer is called the internet layer, and packet switch network is selected within an internetwork
layer which is connectionless. The layer holds together the full architecture and aid packets to
travel on their own to their destination. Order of receiving packet is not the same as sent and
internet protocols are utilized within this layer.
The third layer
It is termed as the transport layer and make decisions concerning data transmission if they are to
be on a single or parallel path. Here activities like segmenting, splitting and multiplexing data are
performed. Applications can write and read in this layer. The layer includes the data header the
NETWORK MODEL
5
header information and breaks data into minimal units to allow them to be handled in an efficient
manner while they are on the network layer together with arranging packets which are to be sent
in sequence.
The fourth layer
This layer is termed as application layer and describes application such as FTP, TELNET, DNS,
and FTP. Telnet can be termed as a protocol for communication which is two-way allowing
connection of machine which is remote and running application on the same.
File Transfer Protocol enables transfer of files among those using computers and is connected to
the network, and it is efficient, simple and reliable. Simple Mail Transfer Protocol is utilized in
transporting mails electronically from source to destination mainly through a route. Domain Name
Server provides IP addresses to those connected to the network.
NETWORK MODEL
6
References
Handel, T., & Sandford, M. (1996). Hiding data in the OSI network model. In Information
Hiding (pp. 23-38). Springer Berlin/Heidelberg.
Forouzan, B. A. (2002). TCP/IP protocol suite. McGraw-Hill, Inc.
Lakshman, T. V., & Madhow, U. (1997). The performance of TCP/IP for networks with high
bandwidth-delay products and random loss. IEEE/ACM Transactions on Networking
(ToN), 5(3), 336-350.
Ritchey, Ronald, Brian O'Berry, and Steven Noel. "Representing TCP/IP connectivity for
topological analysis of network security." In Computer Security Applications Conference,
2002. Proceedings. 18th Annual, pp. 25-31. IEEE, 2002.
Running Head: Dreamz Inc
1
A Network Model for Scenario Dreamz Inc.
Cynthia Pate
ITS2103 Networking Fundamentals
April 25, 2017
Professor Jennifer Merritt
South University
Dreamz Inc
2
Hardware and Software Components for Dreamz Inc
The Expansion of LAN requires the various categories of network hardware peripherals and
software components to configure the peripheral as per the given specification to support the
specific requirement of data communication within the LAN and WAN. It is also considered here
that the LAN user access the WAN to connect with regional, branch and head office resources for
the business functionalities of Dreamz Inc. The list of hardware and software components is as
follows.
Hardware for LAN
•
Bridge: Source Routing Bridges are used to connect two LANs of different departments.
•
Switch: A multi-station intelligent switch is used to distribute the traffic of network with each
node or workstation (Cooper, 2016).
•
Server: The server system such as LAN, File, DHCP, Proxy etc are taken with given
configuration to setup the LAN under the individual offices. The server configuration must be
with Processor – Intel Xenon, HDD – 1 T.B, RAM – 8 GB to smooth handling of client services
(Rainoff, 2016).
•
UPS: Uninterrupted power supply for each device, servers and workstations computers for
constant functioning.
Software for LAN
•
Operating System: The servers of LANs are configured and installed with Redhat
Enterprise Linux Operating system. Each workstation of newly formed LAN must have
configured and installed operating system such as Windows 7 or Windows 8 to operate the
system. Windows 7 or Windows 8 is being installed on each workstation.
Dreamz Inc
•
3
TCP/IP Protocol Suite: Each Workstation and servers is configured with networking
protocol suite like TCP/IP protocol to make the workstation to communicate the
information in LAN. A client version protocol suite is also being installed.
•
Web Browser: A web browser such as Google Chrome is being installed. This web browser
enables the user to access the LAN server resources like web applications, electronic
messaging application, etc.
•
MS- Office 2010: Each workstation is being installed with Ms-Office application suite to
facilitate the word processing, calculation work, and presentation work.
•
SNMP: Simple Network Management Protocol to remote setup and configuration of
network equipments and devices of offices.
Hardware and Software Components for WAN
Wide Area Network for Dreamz Inc. is taken with the interface of Public Network such as Internet.
An ISP based connection for WAN is suitable for each offices of Dreamz Inc.
Hardware for WAN
•
Router: A routing device of network which forwards the packets from LANs to WAN link
with defined destination address. This device is configured and installed on each end link
of LAN of the individual office.
•
Firewall: A network hardware device which is required to be configured and placed with
each router to filer the traffic incoming from WAN link and also outgoing from LAN of
individual office to WAN link. This device secures the LAN from unauthorized access of
LAN resources of Dreamz Inc.
Dreamz Inc
•
4
Connectors: This hardware equipments are used to connect the cables with male and female
ports or sockets of network devices such as router, firewall etc (Jones, 2008).
Software for WAN
▪
VPN Software: A bundle of Virtual Private network software suit that creates the secured
end to end security of information between LANs of different Offices.
In this respect the Detroit branch office LAN hardware devices are selected with following
advanced configuration.
▪
Router: Cisco 2621XM is used with this branch WAN link to handle the heavy load like
100 Mbps data at a time.
▪
Switch: Cisco 2960 with 25 ports has the serial and Fast Ethernet interface to handle 100
Mbps and more data rate.
Connection Media Specification
The media is selected with defined specification for the LANs and server connectivity with
following specification
▪
T.P Cat 7: used to connect LAN switch with Server Ethernet Card.
▪
T.P Cat 6: Used to connect each workstation system with switch.
▪
Serial Cable: Used to connect router with server of individual office LAN
▪
WAN: Specified by ISP.
Dreamz Inc
5
References
Cooper, S. (2016). 6 Required Components of a LAN. Smallbusiness.chron.com. Retrieved 22
April 2017, from http://smallbusiness.chron.com/6-required-components-lan-26555.html
Rainoff, M. (2016). System Information - Networking, LAN, Local Area Network, NIC, Network
Interface Card, Hub, Bridge, LAN Switch, Router, Network Management, SNMP, Simple
Network Management Protoco, RMON, JAVA, JAVA-based Network Management
System, RMON software probe, Mbp. Idp.net. Retrieved 22 April 2017, from
https://www.idp.net/sysinfo/networking.asp
Jones, C. (2008). Wide Area Network (WAN). EzineArticles. Retrieved 22 April 2017, from
http://ezinearticles.com/?Wide-Area-Network-(WAN)&id=1225622
A summary of Hands-on Labs 1–3 results
In week one, we discovered in the labs why protocols were important for networking,
what the advantages were for a client-server network when compared to a peer-to-peer
network, what the main characteristic was of a subnet and how to tell one subnet from
another, also how the intranet is different from the internet and the purpose of the
extranet. We also covered networking protocols and how a protocol suite differs from a
protocol, how TCP is different from UDP, the differences between three email protocols:
IMAP4, POP3, and SMTP, how SSH differs from Telnet, and how HTTPS is different
from HTTP. We covered the numbering system: the difference between a binary number
system and a hexadecimal numbering system, the possible values in a binary number,
how many possible characters can be used for each number space in a hexadecimal
number and how many possible combinations there were in a 3-bit binary number.
In week two, we discovered cables and connectors and how to identify network cables by
sight or name, how to identify network cable speed capabilities by name, how to identify
network connectors by sight or name, why wires are twisted together in twisted pair
cables, the difference between STP and UTP cabling, and the differences between Cat3
and Cat5 cables. Network Devices were also part of the discovery: the purpose of CRC,
which layer of OSI layer that the network adapter card operates and the layer the media
converter works, how to identify a network card manufacture from the MAC address and
the two major differences between a modem and an Ethernet NIC. The Ethernet was
covered: An Ethernet network supports which logical topologies, the purpose of the
backoff on Ethernet networks, and how to eliminate collision on an Ethernet network.
In week three, we have covered configuring switch port, creating VLANs, creating a
Home Wireless Network, and configuring a PPP WAN Link.
NETWORK PROJECT
Computing networks are everywhere. They can be in our home or in a business. So far,
this class has taught me and on some instances reminded of the networking fundamentals.
A course project was started in week one that has evolved over the weeks. In week one, a
network was designed for a fictitious organization called Dreamz Inc. There were
various branches worldwide that required services of a LAN, proxy and database servers.
The finance and HR department required a certain bandwidth and access applications
from an Oracle server and the server was only accessible to user in these departments.
There are three branch office that had to be setup and connected to the main office.
Dreamz Inc also is connected to the internet from the same network. Hardware and
software components were selected to build the LAN and the WAN so that Dreamz can
connect to other public and private networks. Network equipment, a Cisco 2960 with 25
ports, for a branch in Detroit was selected so that each user would have at the minimum,
100 Mbps connection speed because the users have highly billable resources and cannot
afford any network problems or down time. How data is flowing at each OSI layer is
discovered during the third week. A MAC and IP address must be assigned since a
computer in different geographical area is trying to access a computer in Dreamz
network. A packet is generated at the network layer which will be sent to the Data Link
for framing and transmit, then it is handed off to the physical layer for encoding of 0’s
and 1’s. There is no fragmentation or collision occur.
Experience
The experience gained through the Hands-on Lab 1-3 and the creating of the course
project has given me a sense of reality. From learning the different topologies of
networks and the various best uses, to building a Home Wireless Network, all of it has
been useful. One thing that helps so much is that while reading and learning, we then are
able to recreate in the lab, plus being able to follow up with building Dreamz Inc.
network and following along each week with changes that capture the material we have
been studying. From layers, connectors, protocols, switches, routers and hubs, cables and
connectors, network devise and adapters, the Ethernet, to PPP WAN Link, this class has
been an experience of a multitude of resources. I feel like I can be knowledgeable on
many different areas and yet that I still have so much more to learn. I plan to take these
exercises so far and play with an old computer and reiterate what I have learned.
Computers and technology are changing constantly so I know this class and this field is
one that will never get old or boring.
Purchase answer to see full
attachment