Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
24 views7 pages

Tropical Assignment 1 Final Docks

The document outlines essential considerations for successful computer network design, emphasizing performance, reliability, purpose, scalability, security, and cost. It details the importance of defining network requirements, ensuring scalability through modular design, implementing robust security measures, and managing budget constraints. By evaluating these components, designers can create networks that meet current needs and adapt to future demands.

Uploaded by

phelixb.odero
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views7 pages

Tropical Assignment 1 Final Docks

The document outlines essential considerations for successful computer network design, emphasizing performance, reliability, purpose, scalability, security, and cost. It details the importance of defining network requirements, ensuring scalability through modular design, implementing robust security measures, and managing budget constraints. By evaluating these components, designers can create networks that meet current needs and adapt to future demands.

Uploaded by

phelixb.odero
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Running head: Tropical Assignment 1

Tropical Assignment One

Devanand Reddy Bodhireddi

Webster University

ITM 5100

26/01/2025
Tropical assignment 2

A successful computer network design demands detailed strategic planning together with

complete consideration of multiple factors to effectively achieve its objectives while operating

efficiently. Here are the five most important considerations when designing a computer network:

Performance and Reliability

Considerations of performance and reliability are complementary in the design of a

computer network. Performance entails that the network meets the desired traffic demands without

delays or interruptions, which is accomplished through effective management of bandwidth,

latency, and packet loss. Ellaboration of the general purpose of the network suggests that designers

should determine the specific requirements of the applications and users, which in this case, should

include seamless video conferencing and large file transfers. Setting the right network topology and

defining QoS (Quality of Service) policies for critical applications may help sustain reasonable

network performance under high usage times.

Reliability guarantees network services availability and show the worst interruption of

services. A reliable network is comprehensively constructed with multiple links and devices, so

when one system is compromised, another is immediately active ensuring no interruptions for the

user. Additionally, to enhance reliability, devices are installed in a bulk manner which also provides

additional backup if one of the devices is inactive. Moreover, device load balancing eliminates the

risk of network traffic congestion by allocating varied workloads to the available devices. Network

reliability can also be achieved by regularly inspecting and correcting the network components

before they cause a service disruption.

Purpose and Requirements

The first step in network design is to clearly define the purpose and requirements of the

network. Understanding what the network is intended to achieve is fundamental. Key questions to

address include:
Tropical assignment 3

Types of Applications:

What are the various kinds of applications that the network will support? Web services

together with email systems and VoIP require their own dedicated bandwidth requirements in

addition to unique latency definitions that video conferencing solutions and file sharing require. For

instance, VoIP and video conferencing require low latency for real-time communication, while file

sharing may tolerate higher latency ("Five things to keep in mind, while designing a network,"

2023).

User Base:

How many users will access the network simultaneously? Network design begins with user

estimations that drive capacity and performance level requirements. Subject matter experts need to

analyze how employees alongside guests and customers use company resources while maintaining

comprehensive user needs in mind.

Data Transfer Requirements:

What speed should data transfer rates reach in this system? Network performance depends

heavily on determining the volume of data that will move through the system. An evaluation of

present usage and estimates for future expansion needs to be conducted.

Reliability and Availability:

What extent of reliability needs to be achieved? Different organizations need varying

amounts of system availability. For example, business applications of critical importance must

reach an operational availability of 99.999% to enable organizations to implement redundant

component setups and automated failover systems ("Five things to keep in mind, while designing a

network," 2023).

Scalability
Tropical assignment 4

Platform scalability stands as a fundamental factor when designing network infrastructure.

Good network design requires systems that will adjust to growth and change while maintaining

operational integrity. A successful network design requires protocols that predict forthcoming needs

while implementing design elements that adjust easily to accommodate future requirements.

Important aspects of scalability include:

Modular Design:

Network scalability becomes easy when engineers follow modular architecture principles for

device and service inclusion. No matter how many users or applications are added, a network

becomes more robust through the utilization of modular switches and routers.

Hierarchical Architecture:

The implementation of hierarchies within network structure facilitates more efficient growth

management. This approach typically involves three layers: the core layer, distribution layer and

access layer. The systematic organization of network components by layers creates distinct

operational zones which simplifies the process of updating individual devices without disturbing

overall system performance.

Future-Proofing:

Organizations need to select technologies and protocols that demonstrate broad acceptance

and future expansion opportunities. Companies must consider equipment that implements upcoming

technology standards such as 10G and 100G Ethernet to ensure the network handles expanding

bandwidth utilization ("Five things to keep in mind, while designing a network," 2023).

Security

Security stands as an essential requirement throughout today's digital environment. Modern

network design requires the integration of solid security methods to combat increasing numbers of

cyberattacks and unauthorized access and data breaches.


Tropical assignment 5

Access Control:

The network should use powerful authorization and authentication tools to manage what

users can reach. Organizations implement access controls through roles grounded authentication

methods (RBAC) and multi-factor authentication (MFA) to confine sensitive information access to

authorized personnel.

Data Encryption:

Protection of critical data requires encryption protocols throughout its complete life cycle

including movement in transit and storage at rest. By implementing the data transmission protocol

TLS (Transport Layer Security) organizations can establish secure connections between their

computing devices.

Firewalls and Intrusion Detection Systems:

Having deployed firewalls together with intrusion detection/prevention systems (IDS/IPS)

allows organizations to monitor and filter traffic and spot emerging security threats. Security

systems utilizing this method assist with both access prevention and instant detection of

untrustworthy activities.

Regular Audits and Updates:

Organizations should make security assessments with scheduled updates into standard

operational procedures to keep security protocols functional at optimum levels. Through continuous

software vulnerability patching as well as updated security policy management organizations gain

the ability to respond to novel cyber security threats ("Five things to keep in mind, while designing

a network," 2023).

Cost and Budget Considerations


Tropical assignment 6

When it comes to designing a network for an organization which has budget constraints, cost

should always be top of the list of considerations. The cost of establishing a network, for instance, is

often high because it comprises of hardware, software, installation and configuration costs. It is

important, however, to consider all parameters to strike a balance with cost. These parameters

include performance, security, reliability, and others that will determine the bandwidth of the

network without exceeding budgetary limits.

There are two sets of costs that are important when designing a network; upfront and

ongoing costs. This involves the purchase of the hardware used like routers, switches, cables, and

servers as well as acquiring licenses for the software, maintaining hardware, and the associated

support services. These costs can often be reduced by making use of cloud-based solutions and

virtualization technologies as they allow sharing of resources and enable better use of the physical

infrastructure. A detailed cost-benefit study must be carried out to establish which network

components will offer the maximum satisfaction whilst still complying with the performance and

security demands.

Conclusion

Creating a computer network requires detailed knowledge about organizational necessities

while considering present security needs alongside expected performance levels together with

budgetary limitations and anticipated growth rate and security requirements. Network designers can

establish robust and future-proof networks that properly serve user needs by evaluating five

essential parts: purpose and requirements along with scalability combined with security alongside

performance and reliability and a final decision based on cost evaluation. These vital network

components work together to fulfill both present requirements and sustain future organizational

objectives.
Tropical assignment 7

References

Five things to be considered in designing a network. (n.d.). Small Business -

Chron.com. https://smallbusiness.chron.com/five-things-considered-designing-network-

35911.html

Five things to keep in mind, while designing a network. (2023, April 22).

LinkedIn. https://www.linkedin.com/pulse/five-things-keep-mind-while-designing-

network-itglobalservicesllc

You might also like