Part 1 – Response to ITT
UKF Trading Company is a financial organization with its base in Birmingham, Manchester and Edinburgh. There are different business organization that gets their service from UKF Trading and the company have the requirement to expand their current network in order to serve the growing needs of their customers. For the expansion of the organization the company needs to relocate the headquarter to a large space and design a network to connect all the workspace of the new building. Thus a new network design is needed according to the layout of the building and a network design is proposed for the organization for meeting the tender invitation.
Performance – The UKF Trading Company network should be developed for the measurement of the service quality and the performance of the network is measured depending on the bandwidth, throughput, latency, error rate and jitter in the network. The network downtime should be minimum and it should be available to the user all the time. Backup of the network should be created for the reducing the recovery time and increasing the performance of the network.
Availability – The network device should be connected with each other using redundant link such that if one of the link fails the data packets can reach the destination address using the mirror link. It also eliminates the congestion in the network and reduces the rate of error and latency. The use of separate channel for the different departments increases the availability of the network resources and the servers should be configured with virtualization for balancing the loads and serve the needs of the clients.
Flexibility – Different options should be available to the user for the expansion of the network and reduce the failure point for the development of the network framework. The network should be tested for analysis in the errors in the configuration and the business policy should be evaluated for the configuration of the network device. The network should be flexible such that it can be expanded according to the growth of the organization and there should be no performance issues for maintaining high latency.
Manageability – The network administrator is responsible for the management of the network performance and the problems in the network should be identified for mitigation of the risk associated with the development of the network. The throughput of the network should be optimized for allowing the user to get the best output from the network. Different Vlans are used for the management of the departments and divide the communication channel for transferring of data packets. The VLAN management is important for the management of the data traffic and enabling control on the flow of traffic in the network.
Part 2 – Network Design and Decisions
The logical diagram of the network is prepared for the AMY networks including all the details such as the list of the network device and the IP address used for the configuration of the interface of the device. The UKF trading servers are located in different geographical location such as Manchester, Edinburgh and Birmingham and it is serves the needs of the regional offices.
There is an expected growth in the current business and the current network framework does not meets the expansion of the network. Thus the current network needs to be modified and should be aligned with the current needs of the organization according to the building floor plan and design the network according to the layout of the building. An invitation of the tender is proposed by the UKF trading company for the creation of the design of the network. The goals and objectives of the project should be analysed for the development of the network. The network should be designed for making it flexible and increasing the manageability of the network.
IP address |
2001:db8:2::/48 |
type |
GLOBAL-UNICAST (reserved for documentation purpose (2001:db8::/32) |
network |
2001:db8:2:: |
Prefix length |
48 |
network range |
2001:0db8:0002:0000:0000:0000:0000:0000- |
total IP addresses |
1208925819614629174706176 |
IP address (full) |
2001:0db8:0002:0000:0000:0000:0000:0000 |
integer ID |
42540766411285010708543214210003238912 |
hexadecimal ID |
0x20010db8000200000000000000000000 |
dotted decimal ID |
32.1.13.184.0.2.0.0.0.0.0.0.0.0.0.0 |
base 85 ID |
9r}Vsq9IQv2$ZC>c}s5! |
binary ID |
00100000000000010000110110111000… |
ip6.arpa Format |
0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa |
Main Network
2001:0db8:0002:0000:0000:0000:0000:0000/48
Addressing Table
Department |
Subscriber |
Maximum user |
Network |
VLAN |
Trading flow employee’s pcs |
45 |
62 |
2001:db8::2:0/122 |
10 |
Trading flow employee’s printers |
20 |
30 |
2001:db8::2:40/123 |
20 |
Manager’s pcs |
15 |
30 |
2001:db8::2:60/123 |
30 |
Manager’s printers |
15 |
30 |
2001:db8::2:80/123 |
40 |
The report describes the logical design that is created for designing the framework of the trading floor. The architecture and the protocols used for the configuration of the network is analysed and documented for the management of the network. There are different security measures that are used for the development of the network and prevent the external users to access the internal components of the network.
For the development of the network framework the network is divided into smaller segments that can be managed for the development of the network. The problems and the barriers faced for the development of the network should be identified for eliminating the errors and management of the development of the network framework. The business goals and the technical needs is analysed and the solution is developed following the cisco SAFE architecture for dividing the layers into the following such as:
- Core
- Access and
- Distribution layer.
Each of the layers of the network is described in the following section of the report.
Core layer
The main elements of the core layer are the access list and the IP address used for the configuration of the interface of the network device. It is used for transferring the data packets from different address in the network and maintaining a consistency in the framework of the network.
Access Layer
The access layer is used for the management of the permission of the users connected in the network and handling the request of the user. The request needs to be handled independently and each of the device connected in the network should be managed for accessing the network framework and providing the different service required by the UKF trading floor
Part 3 – Presentation and Professionalism
Distribution Layer
It is used for connecting the user with the network device and providing the access of the core layer to the user connected in the network. It acts as an intermediate layer with the core and the access layer for routing the data packets to the destination address in the network.
There are different protocols used for the configuration of the network device and it is used for the specification of the interaction and management of the user device and service connected in the network.
Ethernet – It works in the physical layer of the OSI model and the Ethernet protocol manages the communication of the data packets from the different ports of the network device. The logical diagram states the connection between the different device and the paths used for sending and receiving the data packets.
PPP – The point to point protocol works on the data link layer of the OSI model and is used of the configuration of the serial interface and create a direct link with the router for sending and receiving the data packets. It is used for encryption of the data packets and increasing the security of the network.
IP – The internet protocol is used for the management of the identity of the hosts connected in the network and management of the transmission of the data packets in the network. There are different IP version such as IPv4 and IPv6 and it can be subnetted for the management of the hosts connected in the network.
EIGRP – It is used for automating the routing protocol and management of the routing decision and configure the router to exchange the routing information with each other. The routing table is exchanged for the management of sending and receiving the data packets.
TCP – The transmission control protocol is used for the establishment of the network protocol and interconnecting the different network devices with the ISP router for exchanging the information.
OSPF – The open shortest path first routing protocol is used for configuring the router to find the shortest path and transmit the data packets using the path. The topology of the network is created for the calculation of the routes and improvement of the efficiency of the network.
Layer 2 Switch
Manageable switches are used for increasing the performance of the network and improvement of the network quality and there are different network protocols that are used for the configuration of the switches. Dynamic decision should be taken for enabling the user for carry the data packets to the destination address. The business process of the network should be analysed for the identification of the failure point of the UKF Trading Company. The switch can be used for extending the network and connecting the network devices and improvement of the cost effectiveness.
Performance
Routers
The main purpose for the deployment of the router is to connect the different floors of the building and divide the network into different segments for the management of the network services. It also helps in reducing the congestion in the network and have the traffic redirecting functionality used for controlling the flow of data traffic in the network. The incoming and the outgoing data packets in the network should be managed using different protocols and configuring the router with firewall policy and access control list.
Network cables
The efficiency of the network is dependent on the types of network cables used for interconnecting the network device installed in different location of the network. The cable types is selected depending on the type of communication such as short distance or long distance. Good quality cables are used for management of the network fundamentals and shielded cables should be used for the removal of the electromagnetic interference that can affect the quality of the signal and cause loss of data. The following table is created for listing the type of cables and recording the performance of the cables.
Name of the cable |
Cable Type |
Maximum speed |
Distance of Transmission |
Cat 5, Cat 5e and Cat6 |
UTP |
100Mbps |
100 meter |
Cat5e and Cat6 |
UTP |
100Mbps |
100 meter |
Cat5e and Cat6 |
UTP |
10Gbps |
100 meter |
Single Mode fibre |
Fibre |
10 Gbps |
10 Kms |
Multimode Fibre |
Fibre |
10 gbps |
300 meters |
Firewall
The firewall device are used for enhancement of the security of the network and there are different types of firewall policy that are used for the configuration of the firewall. The firewall is used for blocking the unauthorised access of the users from accessing the secure information of the organization. There are different inbound or outbound rules that can be used for the management of the internal and the external traffic in the network. It can be hardware or software used for the development of a virtual private network and manage the flow of traffic between the trusted and the untrusted zones of the network.
There are different cloud solutions that can be used as a backup for storing the organizational data of the UKF trading company and increase the redundancy of the data. The cloud servers would be an ideal choice for backing up the data as it can improve the redundancy of data and make it available to the user from remote location.
Intrusion Prevention System
It is developed for the management of the IPS policy of the UKF trading company and different set of rules are created for the prevention of the intruder to attack the network. The flow of the network traffic can be used for the examination of the traffic flow and identification of the exploits of the vulnerability for increasing the network security. It also helps in improvement of the response time for any kind of emergency condition and take immediate action according to the network management plan for mitigating the risk of network disruption. The traffic patter should be identified for matching the type of data traffic and detection of the anomaly in the TCP or UDP data traffic.
Availability
It also monitors the flow of data traffic in the network and configured to generate an alert on detection of abnormal behaviour for the usage of the network. The violation of the network policy can be detected with the application of the intrusion detection system and the vulnerabilities can be exploited for reposting the permission of the access of the network device to the users connected in the network. The service and the traffic pattern should be analysed for the configuration of the intrusion detection system and it also analyses the target source for blocking its access and secure the network from DDoS attacks.
The network architecture should be analysed for enforcing the port security and disable the unused ports in the network such that it cannot be used by the attacker to intrude into the network. The attacker can access the ports to intrude into the network and get the details about the network device and the configuration used for creating a backdoor and access the secure information. The network device connected with the port have a Mac address and it is binded with the port such that other illegal devices cannot be connected.
It is used for the configuration of the router for allowing or denying the data packets coming from unknown sources to reach the internal network of the organization. The security and efficiency of the network is dependent on the configuration of the router with the access control list. It is the responsibility of the network administrator to create the access control list and deploy it in the interface of the router for adding extra level of security to the network.
It is used for filtering the data packets based on the network protocol such as ICMP, UDP, IGMP, etc. The default security setting of the network device allows all the network protocols and the network administrator needs to restrict the protocols depending on the needs of the organization for management of the communication of the data packets to the destination address.
Conclusion
The LAN is designed for the UKF trading floor after analysing the security technologies and features that can be applied for securing the network components. For the development of the network a prototype of the network is designed virtually that would help to analyse the protocols and the routing protocol that should be used for the configuration of the network. The number of routers and the switches required for providing service to the user is also analysed for the preparation of the design of the network. The design of the network is created for maintaining redundancy such that multiple link can be used by the user to reach the destination address. This also helps in increasing the network uptime and reliability of the network such that the network is available to the user all the time.
References
Beverly, R., Rohrer, J. and LaFever, B., 2016. Empirical Study of Router IPv6 Interface Address Distributions.
CCM, (2016). Networking – 3-Tier Client/Server Architecture. [online] Available at: https://ccm.net/contents/151-networking-3-tier-client-server-architecture [Accessed 23 Jul. 2018].
Cisco, (2016). Catalyst 6500 Release 12.2SX Software Configuration Guide – VLANs [Cisco Catalyst 6500 Series Switches]. [online] Available at: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/vlans.html [Accessed 23 Jul. 2018].
Cisco, (2016). Layer 2 and Layer 3 Switch Evolution – The Internet Protocol Journal – Volume 1, No. 2. [online] Available at: https://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_1-2/switch_evolution.html [Accessed 23 Jul. 2018].
Davies, J., 2012. Understanding ipv6. Pearson Education.
Gont, F. and Chown, T., 2016. Network Reconnaissance in IPv6 Networks (No. RFC 7707).
Paper, T. (2016). Enhanced Interior Gateway Routing Protocol. [online] Cisco. Available at: https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/16406-eigrp-toc.html [Accessed 23 Jul. 2018].
Rohrer, J., LaFever, B. and Beverly, R., 2016. Empirical Study of Router IPv6 Interface Address Distributions.
SearchNetworking, (2016). What is PPP (Point-to-Point Protocol)? [online] Available at: https://searchnetworking.techtarget.com/definition/PPP [Accessed 23 Jul. 2018].
SearchNetworking, (2016). What is TCP (Transmission Control Protocol)? [online] Available at: https://searchnetworking.techtarget.com/definition/TCP [Accessed 23 Jul. 2018].
SearchNetworking, (2016). What is Virtual LAN (VLAN)? [online] Available at: https://searchnetworking.techtarget.com/definition/virtual-LAN [Accessed 23 Jul. 2018].
SearchSecurity, (2016). What is Firewall? [online] Available at: https://searchsecurity.techtarget.com/definition/firewall [Accessed 23 Jul. 2018].
Techopedia.com, (2016). What is Network Redundancy? [online] Available at: https://www.techopedia.com/definition/29305/network-redundancy [Accessed 23 Jul. 2018].
Thubert, P., Watteyne, T., Palattella, M.R., Vilajosana, X. and Wang, Q., 2013, July. Ietf 6tsch: Combining ipv6 connectivity with industrial performance. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on (pp. 541-546). IEEE.
Verizon.com, (2016). What is a Virus Guard and Why do I need it? | High Speed Internet | Residential Support | Verizon. [online] Available at: https://www.verizon.com/support/residential/internet/highspeed/troubleshooting/connection+issues/questionsone/121054.htm [Accessed 23 Jul. 2018].
Webopedia.com, (2016). What is Intrusion Detection System? [online] Webopedia. Available at: https://www.webopedia.com/TERM/I/intrusion_detection_system.html [Accessed 23 Jul. 2018].
Webopedia.com, (2016). What is Redundant? [online] Webopedia. Available at: https://www.webopedia.com/TERM/R/redundant.html [Accessed 23 Jul. 2018].
Webopedia.com, (2016). What is Three-Tier? [online] Webopedia. Available at: https://www.webopedia.com/TERM/T/three_tier.html [Accessed 23 Jul. 2018].