StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Design Internet Services Providers Network - Report Example

Cite this document
Summary
This report "Design Internet Services Providers Network" discusses the commercialization of the internet, it has received phenomenal success and exponential growth. The internet has developed from the then government-owned and accessible to only a few in the academic research field in the U.S…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful

Extract of sample "Design Internet Services Providers Network"

Dеsign ISР Network Name: Course Name: Unit Name: Submission Deadline: 1.0 Introduction Since commercialization of the internet in the 1990s, it has received phenomenal success and exponential growth. The internet has developed from the then government owned and accessible to only few in the academic research field in the U.S. Today’s internet is available to thousands and thousands of end users, through independently operated networks around the globe. Many of these networks in the internet are ISPs (Internet Services Providers), which offer other networks access to the end users (customers). Collectively acting as the “core” networks for the internet; ISPs has been found to place a crucial role in keeping end users well connected and have stable internet, as well as providing internet services that meet the need of their customers or end-users. All services that are offered by the Internet Services Providers (ISPs) fundamentally depend on routing i.e. this process involves discovering paths in a network which to send traffic packets to reach its destinations (i.e. the receivers). In spite of the importance of internet, today’s Internet Services Providers (ISPs) routing network practices are surprisingly primitive and cannot be understood. For example, even though customers to customers have different preferences for the path they would like to use, todays Internet Services Providers (ISPs) are not able to provide such customized services. Nowadays, the configuration practices for networks are usually disruptive, complicated and error-prone. Using these principles as a guide, we will design a network that offers Internet Services Providers (ISPs) flexibility in realizing their objective. 2.0 Problem Statement Today, internet based economy demand round the clock efficient and effective customer services. This simple means network infrastructure of ISPs must be available at 100 per cent at all the time. The network should be set in such a way it can protect against any security issue or incident. In addition, the network should be able to support the changing traffic loads in order to maintain consistent application response time. From this argument, it is not practical to develop a network that has many users without carefully design the network itself to handle the demand. This project proposal sought to design a network infrastructure for an ISP in Muscat that will link it four branches located in Dakhleya, Sharqiya, Salalah and Batina to local and wide area networks throughout its Wide Area Network (WAN). The network infrastructure will be able to support internal servers like DHCP, AAA, DNS, and Speed Servers, which will be used by end users in the network for Authentication and name resolution and IP assignment. All the branches in the network will have high speed Links of 10G. There will be approximately 5,000 users in each remote city and 10,000 end users in the main city. 3.0 Methodology 3.1 Waterfall Methodology The waterfall model, a sequential development process that involves the stages of requirements i.e. analysis, design, implementation, validation or (testing), integration, and maintenance, was used to develop and test the network. The various phases of this model may overlap each other. The waterfall methodology was preferred as it lays emphasis on time schedule, budgets, target date, and implementation of an entire network on time. A brief description of the various phases is as follows: 1. Requirements analysis: The process of studying and analyzing the customers and end user needs to arrive at a definition of the system requirements. 2. Design: Involves developing the network, which is establishing inputs and outputs from the network, processes, structure of the files, security and back-up concerns, and network testing and implementation planning. 3. Implementation: The actual translation of the network design (logical system) into a working network. Key function is designing of the network. 4. Testing: Involves testing the network to ensure it successfully performs the tasks in the business environment. 5. Maintenance: This is a stage that runs throughout the lifecycle of the project or the network. It involves the continuous assessment of the system functionality and addressing the drifts where necessary. 3.1 Requirements Elicitation Techniques 3.1.1 Interviews This involved visiting the firm to talk to the management and staff about the operations of the company and how they went about their day to day work. 3.1.2 Observation This involved personally visiting the company’s site and watching the staff, and management performing their daily tasks. 4.0 Literature Review A network is simple a collection of devices and computers connected by communication channels that allow communication among end users and allow end-users to share resources with other end-users. In today’s networks, one way to categorize network designs is by their scope or scale. Most common types of networks have been classified according to their characteristics. Wide Area Network (WAN) and Local Area Network (LAN) and are the popular network topologies that were original categories of area networks. Over the years, these type of networks have gradually emerged thanks to technology development. LAN connects computers or devices that are over short distances, for example a network in a school, office building or a residential place. LAN is typically owned, managed and controlled by a single organization or person. LAN tends to use certain connectivity technologies, primarily Token Ring and Ethernet. WAN as the term implies, it involves a large physical distance or area. At the moment, the internet is the largest WAN connecting many users around the globe. A WAN is a collection of LANs. A router is used to connect numerous LANs from different areas to a WAN. In IP networking, the router will maintain both LAN addresses and WAN addresses. A WAN infrastructure differs from a LAN infrastructure in several ways. Most WANs are not owned by any organization but exist under distributed or collective management and ownership. WANs tend to use technology like VRRP, ATM, Frame Relay, and X.25 BGP, for connectivity over the longer distances. Virtual Router Redundancy Protocol (VRRP) is a standard protocol that can be used in an environment where the network has many devices that are not from the same manufacturing vendor (Salchow, 2012). In VRRP, a group of routers are configured that contains a number of default gateway; and one router in the network is selected to be the master router (Ding, 2010). While the other member routers in the VRRP network will be in a position to communicate with the master router and take over duties of forwarding traffic should the master router fail to work in the network. The IP address that will be used will belong to the master router which will be referred to as the IP address owner (Ding, 2010). But, when the master router recover, it will revert to its previous role of routing for that IP address (Salchow, 2012). It is possible to have many VRRP groups on a single subnet, which will be used to spread the load of the traffic that is coming from the subnet (Ding, 2010). However, this will be done manually at the end-user’s location, by changing their gateway addresses. Intermediate System to Intermediate System (ISIS) protocol has been designed to move information efficiently within a network infrastructure, a group of physically connected similar devices or computers (Gredler and Goraiski, 2005). ISIS protocol will accomplish this by determining the best route for datagrams through the packet-switched network. Even though ISIS protocol has been designed to route ISO CLNP packets, it is used in IP environments as Integrated IS-IS. Integrated IS-IS protocol has evolved over the years into robust, scalable, and easy to use Interior Gateway Routing Protocol (IGP) that can be used in a dual mode to support overlayed ISO CLNS and IP networks (Gredler and Goraiski, 2005). However IS-IS protocol has gained popularity on the internet, where its primary application is for intra-domain IP routing. Integrated IS-IS plays an important supportive role for the for Border Gateway Protocol (BGP). Boarder Gateway Protocol (BGP) is a routing protocol that is used to transfer information and data between different host gateways, autonomous systems or internet (Craig, 2015). Boarder Gateway Protocol (BGP) is a Path Vector Protocol (PVP), which is used to maintain the paths to different networks, hosts and gateway routers and determines the routing decision based on that (Craig, 2015). Sometimes, BGP is described as a reachability protocol rather than a routing protocol. Internet forwarding and routing are vulnerable to misconfigurations and attacks that compromise secure communication between end users. With networks facing external attempts to compromise their routers (Craig, 2015). Much prior work has proposed to improve network security with BGP. Secure routing protocols focus on providing path validity and origin authentication, identified as necessary by the IETF to secure BGP. 5.0 Development Tools 5.1 Software Requirements 5.1.1 Operating System Microsoft Windows and Linux 5.1.2 Development Platforms a. Virtual MX box b. Cisco Packet Tracer 5.1.3 Hardware Requirement a. Intel Pentium 4 computer or later version b. Flash disk for transferring information c. HP LaserJet printer for printing reports d. Servers 5.1.4 Technical Requirements a. POP Topologies -Core Routers-High speed trunk connections -Border routers- Connections to other providers. -Distribution routers and Access routers-high port density -Service routers-Hosting and servers. b. Boarder Gateway Protocol (BGP) c. Intermediate System to Intermediate System (ISIS) d, Virtual Router Redundancy Protocol (VRRP). 6.0 Project Time Schedule Table 1: Project Schedule Table Activity Duration Problem statement 7 days Project Proposal 17 days Requirements gathering 21 days Requirements Analysis 14 days Network Design 7 days Network Coding 21 days System Testing 14 Days Report Writing 20 days System Demonstration 1 Day User Manual/Documentation Through out References Craig T. (2015-05-31). “Quick fix for an early Internet problem lives on a quarter-century later” . The Washington Post. Ding J. (2010), "Basic concept of network management," in Advances in Network Management , Boca Raton: Taylor & Francis, pp. 43-48 Gredler, H and Goraiski, W. (2005). The complete IS-IS routing protocol. Springer. p. 1. Salchow, K. (2012). Load balancing 101: Nuts and bolts. [Online].Available: http://www.f5.com/pdf/white-papers/load-balancing101-wp.pdf. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Design Internet Services Providers Network Report, n.d.)
Design Internet Services Providers Network Report. https://studentshare.org/engineering-and-construction/2055840-design-isp-network-interim-report
(Design Internet Services Providers Network Report)
Design Internet Services Providers Network Report. https://studentshare.org/engineering-and-construction/2055840-design-isp-network-interim-report.
“Design Internet Services Providers Network Report”. https://studentshare.org/engineering-and-construction/2055840-design-isp-network-interim-report.
  • Cited: 0 times

CHECK THESE SAMPLES OF Design Internet Services Providers Network

Florida Department of Management Service

hellip; The security mechanisms include IP security and virtual private network.... The virtual private network makes use of special protocols.... This brings about a similarity in the manner in which access to information on the extended network and the way there is access on the private network.... The IP security on the other hand acts as a filter for traffic going through the administrator of the network....
4 Pages (1000 words) Case Study

Dynamic Domain Name System in Linux

The author focuses on dynamic DNS network service that provides the capability for a networked device using the IP Suite, such as an IP router or computer system, to notify a domain name server to change, in real time, the active DNS configuration of its configured hostnames stored in DNS.... DHCP became an important tool for ISPs to manage their address spaces for connecting home and small-business end-users with a single IP address each by connecting them through a network Address Translation (NAT) router....
7 Pages (1750 words) Assignment

The Popularity of MySpace

he anonymity of the internet has caused some problems when it comes to usage and application of services like MySpace.... om has quickly made it the premier social networking website, and has catapulted into the mainstream a new genre of internet social communication tied to establishment of individual web pages to which the pages of others are linked.... It truly represents a new generation in interpersonal communication and establishes a model for how the power of the internet can be leveraged to bring social networking to a whole new level....
9 Pages (2250 words) Essay

Design a system to pay the credit card bills via handset

Mobile banking functions as a phone channel, meaning banks no longer have to depend on the branch network to reach the customer frontier.... Service providers can… The requirement specifications are detailed considering the convenience of the customer as well as interface compatibility.... This mobile service is preferred by individuals due to ease of use and the access opportunities to a wide variety of personalized services.... As competition increases, banks realise the importance of providing integrated delivery channels; branch, phone, Internet, digital television and hand-held computers all add value to the traditional card-based services....
18 Pages (4500 words) Essay

Introduction to the Internet and E-Business

hellip; Home Delights is a traditional catering company that provides custom catering services for a variety of events that includes wedding, corporate, and private parties.... The demand-Sensitive model will enable a group of customers to get a group discount on using the services of Home Delights.... here are many methods through which Home Delights can make use of internet technology to sell its services to the customers.... he first company, Eatable Delights Catering, provides a variety of catering services to the customers....
5 Pages (1250 words) Assignment

The World of Digital Entertainment

The new market continues to be robust and evolving media, internet services, mobile communications and consumer electronic products.... The robust technological change, in the mobile communication market, has enabled usability of high bandwidth and declining of network… By introducing advanced mobile data services including enhanced voice and data communication to customers, these opportunities are eliminated.... The mobile TV global ecosystem consists of content providers, aggregators, retailers, service providers, networks, device software solution providers, and device OEMs....
7 Pages (1750 words) Essay

Network Competition when Skype Enters the Mobile Market

The paper 'network Competition when Skype Enters the Mobile Market' presents Skype which is one of the most popular application software that has penetrated the market for use in social and business spheres.... The company provides unique and reliable communication services over the internet.... Since its launch, the company has seen its population grow rapidly with customers highly motivated by cheap and reliable messaging and call services....
8 Pages (2000 words) Case Study

System Design and Development Project - Voice over Internet Protocol

Another driving factor is that it lacks regulatory oversight of VoIP service providers.... The regulatory void has led to an arbitrage opportunity to enable service providers to deliver similar products delivered by traditional communication methods.... Lack of regulatory costs also creates a low entry fee for startup VoIP providers.... ne of the driving factors about VoIP migration is that it provides quality services.... The fact that VoIP services provide provides multimedia and unified messaging capacities make it overrun the traditional long-distance services....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us