Free Network Management Essay Sample
Communication is an extremely crucial factor for any company to survive. For a cellular company, telecommunication is its core business and thus networking should be done in a way that would provide excellent communication without any breakdown. It should be fast, efficient and lower the cost of production of the company and maximize on the profit margin. The public road separates the two new buildings, building A (two stories) and building B (single floor), but they have to be networked together to function as one solid unit without any hitches.
The best solution to the network would be a combination of a Local Area Network (LAN) connection and Wide Area Network (WAN) connection. The Local Area Network will deal with the network within the individual offices, and the various floors in both building A and building B. The Wide Area Network will cover the larger geographical area and thus enable fast, efficient and straightforward communication within the company’s two buildings. It will enable the company to continue with its daily transactions normally regardless of the position of the staff members.
A leased line model will be in use for the Wide Area Network. This is for the basic reason that a cellular company needs a lot of security for its information, and the leased line provides the best security for this purpose. The basement of the buildings, where the electric power for the building originates would be the start of the network to provide the necessary power for the networking, equipment and devices. Therefore, the level of networking in the basement will be minimal. The server computers will also be stationed at the basement for technical reasons. It will involve the cooling and it will reduce the noise that the server computers make.
The ground floor is now the first network vital center. The computers and other devices to be networked will range from the reception area, individual offices, the testing and repair lab and the conference rooms. All these networks should be accessible, fast and most importantly secure from all possible security threats that may arise.
The network will consist of several Open System Interconnection (OSI) layers. The layers will have different technical and security function in the network. They are unique in their own way; the layers will create the ultimate network. These layers are the physical layer, the data link layer, the network layer, the transport layer, the session layer, the presentation layer and finally the application layer.
Physical Layer
The physical layer of the network entails the physical and electrical specifications for the devices in the network. It interrelates the network devices and the medium. The transmission mediums are copper for the electric connections and fiber optic cables for the data transfer. The physical layer will comprise of layout of pins, host bus adapters voltages, hubs, cable specifications, repeaters, network adapters, and the network devices.
The major function of the physical layer is to establish or terminate a device to a communication medium, ensure communication resources, and flow control is effectively and efficiently share among the multiple user interface, modulate and convert digital data in the devices and then transmit signals over the communication channel.
Parallel SCSI buses will effectively operate in this first layer. The logical SCSI protocol is the transport layer protocol that runs through this bus. Various physical-layers of Ethernet standards will also be in this layer. The Ethernet will incorporate the data link and physical layers. Other local-area networks which will include ITU-T G.hn, FDDI and IEEE 802.11, and also personal area networks that with Bluetooth and IEEE 802.15.4. in this layer.
Data Link Layer
The data link layer (the second layer) will provide the procedural and basic functional means to transfer all data between network entities. It will also be used to detect and possibly auto-correct any erroneous events that may accidentally occur in the first layer, the physical layer. This will serve two media transfer system, point-to-point and point-to-multipoint media. The use of local area network here will have a broadcast-capable multi-access media. Flow control functions will also be performed using a sliding window.
The ITU-T G.hn standard will provide high-speed local area networking beyond the ordinary capabilities.
Network Layer
The network layer main function will be to provide a reliable means of transferring variable lengths of data sequences, from a specific source host on the main network to a destination host on a sub network. It will still maintain the high quality of normal service requested by the main transport. The network layer will also perform network routing functions errors reporting, fragmentation, reassembly and finally report delivery. Routers will also operate from the network layer. The rooters will send data throughout the entire extended network and this will make internet access possible to all terminals.
The network layer will work under three sub layers: the sub network access, the sub network dependent convergence and the sub network independent convergence sub layers.
Sub network access sub layer will handle the protocols that mainly deal with the entire interface to networks. The sub network-dependent convergence sub layer will effectively come in when it is necessary. It will bring up the overall level of the transit network to the average level of networks on either side of the system. This sub layer will automatically handle transfers across the multiple networks in the system. All the routing protocols, network-layer information multicast group management, address assignment and error issues will all be handled at this network layer.
Transport Layer
The transport layer will handle transparent transfer of all data between all the end users. It will also provide reliable and fast data transfer services to all the mentioned upper layers of the network system. Controls of the reliability of any given link at any time through flow control will still be availed by the transport layer. The transport layer can accurately keep track and record of all the segments and retransmit those segments that may fail. Segmentation/desegmentation, the acknowledgement of the successful data transmission and sending the next data if no errors occurred, showing error in case of there are some of the automatic functions that the transport layer will provide.
Session Layer
The session layer will control all the dialogues or connections between all computers in the network. Its functions involve establishing, managing and terminating the connections between all the local and all remote applications.
Presentation Layer
The presentation layer will establish context between the application-layer entities. This layer provides independence from data representation or encryption by translating between the application formats and the network formats.
The application layer is visible to the end user and thus interacts directly with the available software application. Application-layer will identify the communication partners, immediately determine resource availability than instant synchronize communication.
Estimated Budget
No. |
Name of item |
Estimated price |
Point to point backhaul equipment |
$ 2,200 |
|
Speed coaxial cables |
$ 750 |
|
Modem |
$ 2,600 |
|
Router |
$ 2,500 |
|
Electric cables |
$ 285 |
|
Cable fixers |
$ 85 |
|
Computers |
$ 10,000 |
|
Interface module |
$ 600 |
|
Kit |
$ 100 |
|
Software |
$ 700 |
|
|
Total |
$ 19,820 |
Recommendations
The basic design of the company’s two buildings and their position require an efficient and cost effective network module. The use of both Local Area Network and Wide Area Network will make this possible. The offices will use the Local Area network to network the computers, printers and other shared devices within the individual offices and the reception area. The big number of offices on the three floors of building A and the nature of building B being across a public road some distance from B make use of just one Local Area Network unsuitable and inefficient.
The use of the point to point back haul will now bring the two buildings together through the Wide Area Network. There is an assurance security of the network and software that runs the network. The choice of software is excellent, and hacking into the network should be next to impossible whether directly or by use of some hack tools. The leased line model of the network will also be put to ensure the security of the network as the leased model is the most secure network model.
The administrator will control the network as he is highly conversant with the network system. He has enough experience to detect a security threat or a security bridge. The end users will also have a clear and friendly graphical interface to help them interact within the network with simplicity and efficiency. They will not fear of insecurity of the information they are trading within the network with other colleagues.
The company is sure of having a secure, fast, efficient, cost effective network system with the creation of the above system.