Networks and Networking – AICT003-3-2

Table of Contents

Main diagram        


Introduction

APIIT Law School is established to provide law degrees in Sri-Lanka from end of 2009.This new law school will be established in a newly purchased 5 floor building nearby the APIIT main City campus.

The business interaction and the IT infrastructure of the new law school will be independent from the main campus.

The proposed computer network should be able to provide high speed access to the internet and also  a connection between main campus and the new law school also should be established .the sharing of the network also should be controlled according to the different users .

The proposed network should be crash proof and should consist of backup plans in case of a network failure.


Assumptions

  • The assumption that cost in not a major issue was taken into consideration.
  • We assumed that single point failures will not occur often.
  • We also assumed that there are no technological constraints.


Network Plan

Figure 1 – Law School Network Diagram

Internet Connectivity

We proposed leased line connections compared to ADSL and Wi-MAX connections because according to Dialog Telekom PLC (2008) Wi-MAX broadband is a shared bandwidth services so actual speeds may vary due to many factors like internet traffic, selected plan, so there will be no static speed.

But according to Sri-Lanka Telecom (2008) leased lines are dedicated connection so speed will be fixed and it’s monitored around the clock to provide the highly reliable uninterrupted service.

We proposed to use two leased lines - one leased line dedicated to internet and other leased line is a VPN leased line and its dedicated to VPN to the main campus. We use two dedicated lines because the Law school will use more than 200 wired and wireless devices and most of the devices will connect to the internet on the proposed network, so the institute will require higher internet bandwidth, if not the connection to the internet will slow down .Also we need higher bandwidth because of the VPN and the VoIP implementation. If we didn’t propose a high bandwidth internet connection the Voice Quality of the VoIP will be drop down and the VPN connection between main campus and the law college will be slow down so both voice and data services will be interrupted.

Load Balancer

According to , M and Goldie, P in their book “Optimizing Network Performance” they say that when dealing with multiple internet connections load balancer needs to be used to connect the multiple links simultaneously.

We proposed to use a load balancer because with the load balancer both leased line connections can be used at the same time, also if management wants to add more internet connectivity they can easily connect the new connection to the load balancer without rewiring the premises.

If one connection fails, with the other link the internet connection can be accessed.  

Firewall  

According to Dr. Alkharobi, T (2007) in his book “Firewalls” defines that a firewall is a dedicated network device positioned on the boundary of two or more networks which filters all traffic entering or leaving the connected networks.

We proposed to use a hardware firewall because hardware firewall uses the packet filtering, that means check the packet and determine whether packet should or should not forwarded to the internal network but in software firewalls it can only block unsafe applications which connects to the external network. So hardware firewalls have more enhanced security controls.

DMZ (Demilitarized zone)

According to Dr. Alkharobi, T (2007) in his book “Firewalls” describes that a zone with an intermediate trust level, situated between Internet and a trusted internal network is a demilitarized zone (DMZ).

We proposed to use a demilitarized zone because servers in the DMZ are placed with their own subnet, so if a network attack comes through the internet the attacker can only access the DMZ and the internal network will not be attacked and the rest of the network will be protected. So we placed servers like application server, e-mail inside the DMZ which are exposed to the users from the external network so the internal network can be protected from attacks.


Proxy Server

Proxy server is a server that sits between internet and the internal network which provide security, administrative control and cache services.

We proposed to use a proxy server because of its abilities of:

  • Content filtering
  • Bandwidth management
  • Cache services

IPPBX

IPPBX is the equipment that helps to switch calls between the traditional phone line and VoIP.

Internet Security Systems (2004). VoIP: The Evolving Solution and the Evolving Threat. United States: Internet Security Systems. p1-p6.

We proposed to use a IPPBX as a part of VoIP implementation because IPPBX is an essential network element for the VoIP implementation.

Backbone Switch

For the backbone switch we use a 48 port layer 3 switch. We are proposing to use a layer 3 switch to the backbone switch because according to Allied ,T (2005) “Layer 3 switches” as their whitepaper it describes that layer 3 switches are capable  to  do switching and routing on every port in high speeds and can handle high bandwidth of traffic than layer 2 switches

To the backbone switch servers, internet connectivity and other switches are connected, so through the backbone switch high bandwidth of traffic goes in and out. Also traffic should be routed to the destinations.


Servers

We mainly use several servers in our network proposal they are:

Join now!
  • Domain Controllers
  • Database Server
  • Application Server
  • Printer Server
  • E-Mail Server
  • File Server
  • DNS Server
  • DHCP Serverg
  • VPN Server
  • SIP Server

Domain Controller Servers

According to Microsoft TechNet (2008), in their knowledge base it describes domain controllers can authenticate users and assign permissions on the network.

We proposed two domains to students and staff to separate the network features among the students and the staff and for authentication purposes. So there will be two separate logins for the staff and students. With proper authentication methods the unauthorized access to the network can be reduced.

E-Mail Server

...

This is a preview of the whole essay