Our Sample Works

Essay-Samples offers to evaluate samples of various types of papers. We have gathered all of them to show you the qualification and high professional level of our writers.

Sample banner

Infrastructure Design Document

0 / 5. 0

Infrastructure Design Document

Category: Capstone Project

Subcategory: IT Technology

Level: College

Pages: 8

Words: 2200

Infrastructure Design Document
Institutional Affiliation:
Infrastructure Design Document
The process of network design and planning is essential and should always be done prior to any new network. The main reason why network planning is required is because of the requirements that are usually needed by the new system. The overall process of network planning involves forecasts of how the new network will be operational, the technical part of the network and the costs that concern the whole process. There are two important designs that are usually considered when designing of the new network is done. The logical and physical designs are often required for a complete process to build.
Presentation of the designs in a visual manner is essential for purposes of providing designs that are relevant and workable. Logical designs are those that have been planned and thought by a designer while the physical design is the overall application of different objects of the logical plan. The physical design is essential as it involves different configurations of the computers, various peripherals and cables. The work of the logical topology is simply to ensure information is transferred from one workstation to another. The topology clearly indicates how different devices are being connected to the users. The physical topology on the other hand is how the devices are connected with each other through the use of cables and wires. It is vital to note that physical and logical can be termed as low level versus high level.
The logical topology is usually referred as the high level and the physical topology on the other hand is low level. When creating the network, a logical design is first created then an expression of the conceptual design is done. This is the stage whereby designers make considerations about future expansions and growth. The logical design needs to have an IP address which should be in line with the network that is being put in place.
A logical and physical topographical layout of the planned network
In the process of documenting the network environment special notice should be taken on where there are current problems. Stabilizing a network before a new operating system is deployed often helps in troubleshooting and deployment. This usually gives increased confidence to the users and designer of the new or upgraded network. A test lab will be needed for purposes of duplicating configurations and problems that might arise as a result of the new upgraded system. This is the best method when one desires to deploy windows 2000 into the system with different protocols, clients, drivers and other configurations.
When designers are doing the documentation of the network infrastructure, they usually desire to have both software and hardware data of the system. Documenting the logical organization of the network is essential as it usually indicates the network organization, address and name ways of resolution and the overall existence of the services put in place. Documenting the place of the network and the available bandwidth helps to understand whether to make use of on demand installations or push installations. Building the logical and physical diagrams of the network helps in the overall organization of the information gathered.
Physical Network
The physical diagram has different features which are essential in the process of designing the desired network. The details of physical links of communication will be required in the system to ensure succinct information to the users. The physical links will include cable grade, length and overall measurements of the paths where wiring will be done. The network will also have a computer name, servers, server role, IP address and the domain. It is vital to note that a server is able to operate in different functions as it can be a backup controller or primary controller and this depends on the needs of the organization.
Other important components that will be included include the Domain Name System server, the Dynamic Host Configuration Protocol server, router, file and print server. The location of various devices will also be indicated and this includes switches, hubs, modems, bridges and other proxy servers that are available in the same network. Communication links for the wide area network will be included and the other bandwidth sites, and this can either be an estimation or measurable in terms of figures. The total number of users will also be indicated in every site, and this may include other mobile users who are not indicated at the sites. The physical network diagram is indicated in appendix I of the document.
The Logical Network
The logical network diagram has different capabilities that enable it work in collaboration with the physical protocol without problems. The logical network often has a domain architecture which has all the names and addressing capabilities. It also takes care of different server roles and encompasses the trust relationships available. The logical network diagram is shown in appendix II of the document.
There are usually different regions which require configuration before the network embarks on providing services to the organization. The various areas that usually require configuration include the name resolution services, where designers provide coded names for the networks. Documentation of the available WINS and DNS servers will be done, with considerations made on configurations and information pertaining to the new network. In the case of void network running on Windows NT, the designers will be informed to document their services. The versions will also be documented for easy identification and incorporation to the system.
Documentation of the IP Addresses and service configurations will be required in the system. Some of the documentations in the DHCP will be its settings and details of the subways with the aim of relating them to the available domain structure. Dealing with mobile and remote users will make the designers to document the remote access and all the dial-up configurations. Through the use of third party software, the designer will need to configure all the products that are being used in the network system.
Bandwidth issues will also need to be tackled by the designers when in the process of making the new telecommunication network. This will be done for purposes of establishing the baseline for which changes will be required. The use of other Microsoft tools and third party metrics will also be used together as bytes which are received and sent from the workstations. The speed will also be documented, and this will be done in between the different network segments and locations.
Rationale for the logical and physical topographical layout of the planned network
Logical and physical topographical networks are usually very important as they enhance the overall operations of an organization. The company will be able to provide their different services and products easily through the communication that will be between the different networks installed. It is therefore important for the designers to prepare a telecommunication network that is viable and able to provide the required services without problems.
A physical layout often indicates the physical nature and the overall connections between all the networks that are participating. Workstations are usually indicated by computer icons while servers have towers which are like cases. The switches together with different small devices are always displayed by rectangular boxes that are small with different ports of RJ-45.
A logical layout is important because it is able to indicate all the logical part of any network. Such aspects include assigned IP addresses, logical networks, tables that are used for routing and many others. It is vital to note in logical diagrams, individuals usually have minimal interest in the interfaces that are together with their physical cables.
All the products provided in the protocols are essential as they aid in security purposes as other make the system run well without problems. Without the use of such components most configurations might become impossible and worse they may not work. When problem arise, individuals can simple look at the layout and be able to tell where fixing is required. The layout is thus vital as it helps in making work easy more so when there is a breakdown of the system as a whole. Resolving problems and making the network work as usual is essential as it aids in quick and high returns.
When administrators and users have a look at the visual display of the physical and logical layout they are often able to tell where there are security problems. When people who are unwanted try to log into the system the layout often helps users to identify they and abort any risks that might arise later in the system. Such a precaution is essential as it will help the company to take care of their files and documents safe and only present them to other people who are authorized by the company. Such layouts may also be disastrous to the company if they allow other visitors to use them without the company permission. Such maps should only be left on the hands of the administrators and not other people who might become a threat to the progress of the network and company as a whole. This is because they are known to be the best weapons enemies can use when they want to perform other unwanted processes.
Having a comprehensive security policy for the company will help in eradicating any risks that can be found during installation and use of the network. The security policy will be required to be comprehensive and tackle different issues that will govern both the users and administrators in the event of using the network system. Building access procedures and logon procedures will be essential for the company as it will aid in only accepting people into the system who are allowed by the administrators.
Educating users will be one of the tools that will aid in aborting unwanted users into the system. This will be done by way of educating users on the need of securing the network and not allowing other people who do not work in the company to know the various passwords contained in the system. The administrators will also need to inform users of the need of implementing different policies so that they can understand the need to have a secure system while using the network. Such provisions can only be made through training and providing different policies that can avert such problems.
Building a security policy often involves different facets apart from training and documenting information for the users. The document will need to be introduced afresh or build with the view of targeting all possible attacks from outsiders. The issues behind the security problem will need to be identified and enumerated by the users before it is used and handed to the users.
Enforcements and enactments will lead to deployment of the policies of the organization. Communicating to the relevant authorities will be beneficial as it will help the users know their levels of operation and usage of the new system. Monitoring and maintenance of the system will also be a great step towards making sure that the system is safe and only used by the intended users.
Confidentiality, Integrity & Availability
Confidentiality is the overall principle of controlling and ensuring strict observance of access to individuals who are responsible in the company operations. This is important as it helps members to only make use of information that is provided to them and making sure that other members of the community who are not part of the organization are not allowed within the perimeters of the system. Only members who have the need to have information from the company should be allowed to take part in using and following after different parts of the system network settings.
Through integrity, information will be reliable and accurate and will only be provided to those members who need the information at that particular moment. Integrity issues include verifiable capabilities that are often hard to find within most organizations. Through confidentiality and integrity all the information that pertain the running of the company will be kept safe and only be used by members of the company who are authorized by the management.
Through availability, the information provided by the company will only be available to members of the company who have a right to use them. Information is always lost not only when it is lost but also when it is tempered by other unauthorized members of the community. The information should also be available when needed by the organization and other users and not limited too few people who can manipulate them for their own good.
The three elements are essential because they usually safeguard the company information and also provide restrictions to other people who are not allowed to use the information. It is vital to note that all company provisions like land, building and assets are often kept in form of information. When such information is used by other people who are not authorized by the company, it is usually manipulated and used for wrong purposes. When important information is left on the hands of every worker or outsider in the company it may be used to harm their processes and overall success in the long run.
The workers should be aware of the risks involved after sharing important information that pertain to the company and this should be kept secret. All passwords should be given to responsible users who should be informed of their importance and the need to keep them safe from all other outsiders. The employees ought to get access into information that they need and not other information that does not need their attention.
To ensure integrity and availability of the information, the company will need to hire different professionals who will be given the task of ensuring high level security. The workers will also need to be told of the importance of the information and the need to keep them safe from other outsiders. The policies provided by the company should also foster unity within the organization to avoid instances or rivalry and misunderstanding.
Appendix I
Physical Network

Appendix II
Logical Network



Read more
Don’t waste time!

Get a verified expert to help you with any urgent paper!

Hire a Writer

from $10 per-page