Department Number of Users
Customer Care 10
Sales and Marketing 20
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
Server Room
Servers +ISP connections
· High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.
· Sales and Marketing Team need to access Network resources using WIFI connectivity.
· Proper methods for networking monitoring and troubleshooting need to be established.
· All possible network security mechanisms should be implemented.
Recommend suitable network topologies and network protocol suites for above scenario and justify your answer with valid points.
Customer Care 10
Sales and Marketing 20
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
Server Room
Servers +ISP connections
· High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.
· Sales and Marketing Team need to access Network resources using WIFI connectivity.
· Proper methods for networking monitoring and troubleshooting need to be established.
· All possible network security mechanisms should be implemented.
Recommend suitable network topologies and network protocol suites for above scenario and justify your answer with valid points.
Answer:
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This topology setup allows for most transmissions to be distributed even if one of the connections goes down
Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point links. Mesh technology comes into two types:
A network structure whose design contains more than one topology is said to be hybrid topology. Hybrid topology inherits merits and demerits of all the incorporating topologies. It is extremely flexible. It is very reliable. It is easily scalable as Hybrid networks are built in a fashion which enables for easy integration of new hardware components.
Suitable network protocols for the above scenario.
Def.: A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network.
1..TCP/IP stack is designed to be generic as possible, so applications can interact with various data link protocols such as 802.3 (Ethernet), 802.11 (Wi-Fi), PPP (point-to-point protocol) and so on without needing to know what sort of link they are using.
2.WPA3 protocol-when choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols, experts agree WPA3 is best for Wi-Fi security. As the most up-to-date wireless encryption protocol, WPA3 is the most secure choice. Some wireless APs do not support WPA3, however.
3. Simple Network Management Protocol (SNMP) is used to monitor the network
· Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
· SNMP is widely used in network management for network monitoring.
Comments
Leave a comment