Home > Subjects > IT/Technology > Network Design Proposal For Office

Network Design Proposal For Office

Network Overview

The Situation in Which the Project Exists: This proposition is for an information correspondence network to a web-based business website office. Three stories in the building should be associated with the correspondence inside the association and also needed to set up an internet infrastructure.

Network Scope: The proposed network is intended to serve the web-based business website Office. The workplace contains three-story. First, we have two spaces for the site staff. The aggregate staff involves ten individuals—every five in one room. On the second floor, we have three places and the general population getting requested by the clients. There will be 15 individuals, every five in one room. On the third floor, we will have a stockroom store the items and ten individuals to dispatch the items according to the incoming requests. Subsequently, our aggregate staff entireties up to be 35.

The usage of staff with the PC will vary from department to department; there will be different work scope in each department with various people working on some PC related to their desired work assigned to them. Their pc speed may be entirely different from others, but the internet-connected to all the systems contain the same rate.


Objectives of the Network. The network is intended to accomplish a few particular business/operational goals:​​ 

  • Secure Service:​​ This network's primary goal is to secure an administrative computing administration to the Site Office. It is intended to​​ be practically and physically disengaged from access by individuals not utilized by the site office to minimize unapproved danger. ​​ 

  • Integration and Update:​​ Presently, there are no LANs in the site office. This proposition portrays a LAN that integrates and updates the entire LANs framework to help gainful joint effort over the workplace. ​​ 

  • Flexible Information Processing:​​ The network will empower clients to recover, process, and store ASCII and non-ASCII content, still illustrations, sound, and video from any associated PC.​​ 

  • Joint Effort:​​ The network will combine the power and abilities of various gear over the state to give a synergistic medium that enables clients to connect their aptitudes, paying little heed to their physical area. A network for this instructive group will empower individuals to share information and thoughts effortlessly to work all the more effectively and beneficially.

  • Adaptability:​​ The plan is scale capable so that if more floor or office would be included as funding winds up accessible without having to re-try the installed network. 

Intended Users.​​ The system's essential users at the workplace web page will be the heads, site staff of ten individuals, fifteen individuals who are getting orders from the​​ clients, ten of the individuals at Warehouse and some different people groups of rest of the business offices. ​​ 

Design Assumptions.​​ This design expects the accompanying:​​ 

  • The E-business site office Network has a firewall that shields all data going back and forth from​​ the system.​​ 

  • Network access is given by the E-trade site office, which is financed by the state government.

Network Needs Analysis​​ 

Data Types.​​ The sorts of data served by the framework will be reports, discharges, accounting information,​​ workforce profiles, and site pages. The majority of the data will be content (ASCII and non-ASCII); however, there will be some still representations and possibly a little measure of voice and video (basically for PC-based remotely planning). (B, 1997)

Data Sources.​​ Data will be made and used at all end stations on the framework. The data will be conveyed by programming applications in Windows 10, fundamentally Dream Weaver and Office 2016 Professional (Word, Excel, Access, PowerPoint, and Outlook).​​ 

Amounts of Users and Priority Levels.​​ The customers will be chiefs, site staff, and people from other divisions. At the region levels, the customers will be heads, secretaries, and people from other divisions. Three need levels will be maintained: organization (top need), the customer (medium need), and establishment (low​​ requirement). Framework organization strategies will get top-require advantage; most framework methodology will get the medium-require benefit; a few techniques (e.g., email trades, fortification, et cetera.) will be given a low-require gift. (Bononi, 1999)

Transmission Speed Requirements.​​ The framework is to be clear to the customers. In this way, remotely executed applications, report trades, and so forth should ideally appear to fill in as quick as systems managed inside an end-station ​​ 

Why is Transmission Speed a Significant Issue?

The system is to be straightforward to the clients. Subsequently, remotely executed applications, record exchanges, et cetera should seem to work as fast as​​ procedures performed inside an end-station in a perfect world. This has to be very clear to the ones who are using it; that's why transmission speed plays a vital role.​​ 

Limit Requirements. Limit necessities ought to be adequately broad to store all data.​​ Gatherings and impression of customers' accessible and anticipated amassing conditions demonstrate that each customer will require a type of 100 MB of server space (despite the discretionary limit on close-by PCs); the most outrageous surveyed server-side​​ storing essential per customer is around 1 GB. (Qiao, 1999)

Constancy Requirements. Concerning customer wants and industry rules, both the LANs and the WAN are depended upon to work at 99.9% uptime and a new screw up the rate of .001%.

Security Requirements. A firewall will be used so that unapproved customers will be restricted. Some bit of the security will be User records and passwords that will give​​ compelled get to. There will be different access capacities with regards to sort out executives and customers.

Is Security a Major issue?

Yes, Security lies in such a significant issue while establishing a network design. Following an organized arrangement of steps when creating and actualizing system security will enable you to address the shifted worries that impact the security plan. Numerous security techniques have been developed randomly and have neglected to secure resources for protection. Separating the procedure of security outline into the accompanying advances will help you adequately design and execute a security system:

  • Recognize arrange resources.​​ 

  • Break down security dangers.​​ 

  • Examine security necessities and tradeoffs.​​ 

  • Build up a security design.​​ 

  • Characterize a security strategy.​​ 

10 Faster Computers:

We need to set up a giant network environment with different Computers performing numerous functions in other departments. Many factors are used in it like setting up LAN & WAN's, which were interconnected with the multiple servers with billions of transactions happening. Whereas Transfer speed is a critical factor in deciding the speed of a PC organize. Everybody knows the data transfer capacity evaluations of their system​​ switches and their Internet benefit, numbers conspicuously included in item promotions.

Transfer speed in PC organizing alludes to the information rate upheld by a system association or interface. It speaks to the general limit of the association—the more prominent the limit, the more probable that better execution will come about.

Data transfer capacity alludes to hypothetical​​ evaluations and actual throughput, and it is essential to recognize the two. For instance, a standard 802.11g Wi-Fi association offers 54 Mbps of evaluated data transmission yet accomplishes just half or less of this number in real throughput. With such vast data transmission, there should be Faster servers supported by faster Computers, so we at least need ten fast PCs in this environment.​​ 

Network Diagrams & Topologies

Networking Diagram

Administration’s LAN



Networking Diagram

Site Staff​​ Curriculum LAN


Networking Sub-Diagram

Customer Service LAN in the Company


Network Topologies


The E-commerce site office required a facility that will provide a complete, interconnected networking structure to their whole three floors building connecting various departments.

Proposed Topology

I am proposing the utilization of​​ physical and logical star topologies​​ when arranging the office organized. Even though the star topology is costlier because of the expanded number of system gadgets utilized all through the system, it is anything but difficult to introduce, design and takes into account the extension and simplicity of expelling gadgets without any interruptions. (Qiao, 1999)

To meet the system prerequisites for the new office, I will utilize the​​ accompanying foundation gear.

  • CISCO WS-C2960X-24TD-L Catalyst 2960 $1270.00 each​​ 

  • Cisco 4331 arrangement switch; ~$1500.00 each​​ 

  • Cisco WS-C2960X-48TD-L Catalyst 2960; $1700.00 each​​ 

  • Cisco WAP321 Wireless Access point $310.00 each ​​ (Cisco, 2016)

  • Fortinet FortiGate-90D; ~$1500.00 each ​​ (Fort iGATE/FortiWiFiÂ, 2016)

After an intensive audit of the distinctive topology sorts, I concluded that​​ the star topology would best suit the office needs. This topology permits the arrangement and administration​​ or each of the required networks freely of each other and gives the capacity to develop if necessary. The size and format of the building alternate topologies did not appear to be a solid match. Many different accessible topologies are outdated and would not be an astute usage for this situation. For instance, the ring and bus topologies are incredibly wasteful with the way activity goes all through the network are hard to execute on a vast scale. (Cisco, 2016)

Proposed Network Media

I propose to utilize​​ the Cat-6a link and fibre link​​ all through the building. See the chart for particular points of interest. ​​ 


The explanation behind utilizing Cat-6a link rather than the other accessible sorts is to decrease purchasing cabling's general cost because it is the most current form available right now. We won't need to redesign for quite a while. Feline 6a considers fast associations amongst switches and servers and eventually diminishes dormancy for the end client because of its capacity to wipe out​​ crosstalk all the more proficiently. Fibre will be utilized for any associations between getting to switches and the center switches​​ in the server rooms to eliminate inertness crosswise over long separations (Agrawal, 1997)

Proposed Network Devices​​ 

I propose to utilize the network gadgets are business review equipment that is sufficiently dependable to deal with a lot of movement.​​ 

The​​ Cisco 4331 Router​​ is a capable gadget that can double the base throughput required in the office. This gadget underpins all current directing conventions to incorporate IPv6. This will be utilized as the essential limit gadget for the office and will consider interconnectivity to whatever remains of the grounds. There may be one of these gadgets in the main floor server room.​​ 

The​​ Cisco Catalyst 2960​​ arrangement switches have layer three abilities, enabling us to isolate the working into the many required networks. Utilizing 24 and 48 port switches will permit the extension or extra seats added to classrooms and allowing the​​ links to keep running for the workplaces on each floor. There will be nine of 2960 arrangement 48 port switches all through the building (Qiao, 1999)

The Design Problem: Optimizing Availability and Cost​​ 

When all is said in done, the system plan issue comprises of the accompanying three general components:​​ 

  • Environmental givens

  • Performance imperatives

  • Networking factors

Evaluating Costs​​ 

The system is a vital component in your general data framework plan. In that capacity, the cost of your system is significantly more than the whole of your gear buy orders. View it as an aggregate cost-of-proprietorship issue. It would help if you considered the whole life cycle of your systems administration condition. ​​ (Keiser, 2000). A short rundown of expenses related to​​ systems takes after:

  • Equipment and programming costs

  • Performance exchange off costs

  • Installation costs

  • Expansion costs​​ 

  • Support costs

  • Cost of downtime

  • Opportunity costs

  • Sunken costs

Elements Affecting Networking Costs​​ 

Building and working such a​​ system costs cash. By and large, expenses are controlled by various variables, among them are:​​ 

  • Circuit costs​​ 

  • Equipment costs​​ 

  • Programming costs​​ 

  • Test and Maintenance costs​​ 

  • System administration costs​​ 

  • Workforce costs

  • At what speed of correspondence will​​ the system run?​​ 

  • How perplexing or essential will the system be?

  • How all around outlined in the system?

  • What strategies for evaluating are accessible, and what precision can be accomplished?

  • Would all be able to costs be recognized and precisely evaluated?​​ 

Protocol / Implementation Layout

I would like to propose the "Server Network Layout" within the eCommerce site office.


Servers are very particular PCs, and the plan prerequisites for the networks they use are specific also. Servers give numerous customers access, regardless of whether they're interior to the association or inner; along these lines, a network blackout on a server is more genuine than a network blackout on any one customer. The network that gives access to these machines should be more reliable and blame tolerant than would be the situation for desktop PCs. ​​ (Fort iGATE/FortiWiFiÂ, 2016)


Every server machine is gotten to by various customers; thus, the network execution needs are higher than on end-client networks. The uptime prerequisite for the server framework is in this manner extensively higher.​​ 

Resources Required:​​ 

An IT organize interfaces every one of your gadgets and other fringe hardware, for example, printers.

To manufacture a system, you will require a scope of​​ gear, including the accompanying:

Cables and Connectors.​​ These connections, together with the PCs, printers, servers and other gear on your system. ​​ 

A Switch. This oversees organized movement, guaranteeing gadgets can speak with each other through​​ wired and remote associations and gives web networks.

A Remote Access Point (discretionary). This will broaden your private system if the switch is unequipped for offering scope in specific parts of the building.

A Web Association.​​ This could be a speedier​​ fibre association or a devoted rented line. ​​ 

An Equipment Firewall.​​ This makes a protected obstruction between your system and the web, blocking security dangers. At times, systems incorporate a location organize server, which runs focal applications, goes about as an email server and gives document stockpiling. (Agrawal, 1997)


  • [1]"Cisco 4000 Series Integrated Services Routers - Products and Services," Cisco, 2016. [Online]. Accessible: http://www.cisco.com/c/en/us/items/switches/4000-arrangement incorporated administrations switches isr/index.html. [Accessed: 12-Mar-2016].​​ 

  • [2] Fort iGATE/FortiWiFi® 90D Series, first ed. Fortinet, 2016.​​ 

  • [3]"Cisco Catalyst 2960-X Series Switches - Products and Services", Cisco, 2016. [Online]. Accessible: http://www.cisco.com/c/en/us/items/switches/impetus 2960-x-arrangement switches/index.html#. [Accessed: 12-Mar-2016].​​ 

  • [4]"Cisco WAP321 Wireless-N Access Point with Single Point Setup", Cisco, 2016. [Online]. Accessible: http://www.cisco.com/c/en/us/items/remote/wap321-remote n-selectable-band-get to point-single-point-setup/index.html. [Accessed: 12-Mar-2016].​​ 

  • [5] Cisco Enterprise Campus Infrastructure: Best Practices Guide, first ed. 2013.


Related Posts

Leave a Comment