Running head: Tropical Assignment 1
Tropical Assignment One
Devanand Reddy Bodhireddi
Webster University
ITM 5100
26/01/2025
Tropical assignment 2
A successful computer network design demands detailed strategic planning together with
complete consideration of multiple factors to effectively achieve its objectives while operating
efficiently. Here are the five most important considerations when designing a computer network:
Performance and Reliability
Considerations of performance and reliability are complementary in the design of a
computer network. Performance entails that the network meets the desired traffic demands without
delays or interruptions, which is accomplished through effective management of bandwidth,
latency, and packet loss. Ellaboration of the general purpose of the network suggests that designers
should determine the specific requirements of the applications and users, which in this case, should
include seamless video conferencing and large file transfers. Setting the right network topology and
defining QoS (Quality of Service) policies for critical applications may help sustain reasonable
network performance under high usage times.
Reliability guarantees network services availability and show the worst interruption of
services. A reliable network is comprehensively constructed with multiple links and devices, so
when one system is compromised, another is immediately active ensuring no interruptions for the
user. Additionally, to enhance reliability, devices are installed in a bulk manner which also provides
additional backup if one of the devices is inactive. Moreover, device load balancing eliminates the
risk of network traffic congestion by allocating varied workloads to the available devices. Network
reliability can also be achieved by regularly inspecting and correcting the network components
before they cause a service disruption.
Purpose and Requirements
The first step in network design is to clearly define the purpose and requirements of the
network. Understanding what the network is intended to achieve is fundamental. Key questions to
address include:
Tropical assignment 3
Types of Applications:
What are the various kinds of applications that the network will support? Web services
together with email systems and VoIP require their own dedicated bandwidth requirements in
addition to unique latency definitions that video conferencing solutions and file sharing require. For
instance, VoIP and video conferencing require low latency for real-time communication, while file
sharing may tolerate higher latency ("Five things to keep in mind, while designing a network,"
2023).
User Base:
How many users will access the network simultaneously? Network design begins with user
estimations that drive capacity and performance level requirements. Subject matter experts need to
analyze how employees alongside guests and customers use company resources while maintaining
comprehensive user needs in mind.
Data Transfer Requirements:
What speed should data transfer rates reach in this system? Network performance depends
heavily on determining the volume of data that will move through the system. An evaluation of
present usage and estimates for future expansion needs to be conducted.
Reliability and Availability:
What extent of reliability needs to be achieved? Different organizations need varying
amounts of system availability. For example, business applications of critical importance must
reach an operational availability of 99.999% to enable organizations to implement redundant
component setups and automated failover systems ("Five things to keep in mind, while designing a
network," 2023).
Scalability
Tropical assignment 4
Platform scalability stands as a fundamental factor when designing network infrastructure.
Good network design requires systems that will adjust to growth and change while maintaining
operational integrity. A successful network design requires protocols that predict forthcoming needs
while implementing design elements that adjust easily to accommodate future requirements.
Important aspects of scalability include:
Modular Design:
Network scalability becomes easy when engineers follow modular architecture principles for
device and service inclusion. No matter how many users or applications are added, a network
becomes more robust through the utilization of modular switches and routers.
Hierarchical Architecture:
The implementation of hierarchies within network structure facilitates more efficient growth
management. This approach typically involves three layers: the core layer, distribution layer and
access layer. The systematic organization of network components by layers creates distinct
operational zones which simplifies the process of updating individual devices without disturbing
overall system performance.
Future-Proofing:
Organizations need to select technologies and protocols that demonstrate broad acceptance
and future expansion opportunities. Companies must consider equipment that implements upcoming
technology standards such as 10G and 100G Ethernet to ensure the network handles expanding
bandwidth utilization ("Five things to keep in mind, while designing a network," 2023).
Security
Security stands as an essential requirement throughout today's digital environment. Modern
network design requires the integration of solid security methods to combat increasing numbers of
cyberattacks and unauthorized access and data breaches.
Tropical assignment 5
Access Control:
The network should use powerful authorization and authentication tools to manage what
users can reach. Organizations implement access controls through roles grounded authentication
methods (RBAC) and multi-factor authentication (MFA) to confine sensitive information access to
authorized personnel.
Data Encryption:
Protection of critical data requires encryption protocols throughout its complete life cycle
including movement in transit and storage at rest. By implementing the data transmission protocol
TLS (Transport Layer Security) organizations can establish secure connections between their
computing devices.
Firewalls and Intrusion Detection Systems:
Having deployed firewalls together with intrusion detection/prevention systems (IDS/IPS)
allows organizations to monitor and filter traffic and spot emerging security threats. Security
systems utilizing this method assist with both access prevention and instant detection of
untrustworthy activities.
Regular Audits and Updates:
Organizations should make security assessments with scheduled updates into standard
operational procedures to keep security protocols functional at optimum levels. Through continuous
software vulnerability patching as well as updated security policy management organizations gain
the ability to respond to novel cyber security threats ("Five things to keep in mind, while designing
a network," 2023).
Cost and Budget Considerations
Tropical assignment 6
When it comes to designing a network for an organization which has budget constraints, cost
should always be top of the list of considerations. The cost of establishing a network, for instance, is
often high because it comprises of hardware, software, installation and configuration costs. It is
important, however, to consider all parameters to strike a balance with cost. These parameters
include performance, security, reliability, and others that will determine the bandwidth of the
network without exceeding budgetary limits.
There are two sets of costs that are important when designing a network; upfront and
ongoing costs. This involves the purchase of the hardware used like routers, switches, cables, and
servers as well as acquiring licenses for the software, maintaining hardware, and the associated
support services. These costs can often be reduced by making use of cloud-based solutions and
virtualization technologies as they allow sharing of resources and enable better use of the physical
infrastructure. A detailed cost-benefit study must be carried out to establish which network
components will offer the maximum satisfaction whilst still complying with the performance and
security demands.
Conclusion
Creating a computer network requires detailed knowledge about organizational necessities
while considering present security needs alongside expected performance levels together with
budgetary limitations and anticipated growth rate and security requirements. Network designers can
establish robust and future-proof networks that properly serve user needs by evaluating five
essential parts: purpose and requirements along with scalability combined with security alongside
performance and reliability and a final decision based on cost evaluation. These vital network
components work together to fulfill both present requirements and sustain future organizational
objectives.
Tropical assignment 7
References
Five things to be considered in designing a network. (n.d.). Small Business -
Chron.com. https://smallbusiness.chron.com/five-things-considered-designing-network-
35911.html
Five things to keep in mind, while designing a network. (2023, April 22).
LinkedIn. https://www.linkedin.com/pulse/five-things-keep-mind-while-designing-
network-itglobalservicesllc