BN202 Internetworking Technologies Proof Reading Services

BN202 Internetworking Technologies Assignment Help

BN202 Internetworking Technologies Proof Reading Services


The present study is based on an organisation scenario where the organisation has 4 branches and 1 headquarter located at different location. The organisation wants to implement a network system which resolves some key issues like- secure online payment system, outside visitors can access the internal environment, and the network downtime does not exceed 0.04%.  The study is going to find a network layout that may be able to fulfil both business goal and technical goals of the company. The study will also find the requirement of equipment in order to implement complete network and their quantity with a price. The report also describes network application which is used for proposed solutions of given scenario.

BN202 Internetworking Technologies Assignment Help

Business Goals

The main goal of ‘NewAge Florists’ is to provide fresh floral design at local, national and international region. They want to provide flexibility and security to their national and international customers by enabling web-based ordering services. ‘NewAge Florist’ has presently four major branches in Australia and headquarter is located in Sydney. The business goal of the company is offering faster delivery so that customers get fresh floral arts. In this way, they want to expand their business by adding more and more customer with the company (Sehgal, 2010). The delivery of national and international orders will handle from the appropriate place like- any of three branches. Apart from this, the company has four branches and each branch has 200 employees. Headquarter has 400 employees, therefore, the organization wants to track the activity of each employee. The company wants to improve customer relationship by providing secure payment system. In spite of this, the organization wishes to also provide flexibility to their employee such that workers may telecommunicate from shops to their home on weekends.

Technical Goals

The technical goal of ‘NewAge florists’ is to build a network which provides access to database server from its four branches as well as headquarters also. The main motto of the company is to develop such network topology so that the network downtime does not exceed 0.04%. In this data servers and web servers can be threatened by malicious attacks like unauthorized access and malware program like viruses, warm etc. In the present scenario, organizations are facing vulnerable attack inside company also. There may be rivals present in company environment (Marot and Sicard, 2012). They present themselves as employees so that company wants to implement a technique to observe the activity of employee like- software download, change in web page activity that can affect the whole system. The key goal is that company does not allow to access resources by outside visitors only internal staff can access them. It has been required that when employees are connected from shop to their home for telecommunicating, the network system needs to maintain a secure connection between them over wired or wireless LAN (Binderkrantz and Krøyer, 2012).  

Characterize the Existing Internetwork and Network Traffic

The existing internetwork is using common devices like laptops, desktop computer, server, switch, and router. All such devices are connected to each other by the help of LAN media i.e.  Co-axial cable. The messages are originated from one host to another host by the help of LAN media. The internetwork is also consisting of the switch in order to interconnect devices of local area network. The existing network is implemented by routers and server also. Routers are used for direct the messages so that data packets can travel across the network ( A network interface card (NIC) is contained by PC or any other host device in order to connect them with the network. The internetwork handles data traffic by using routing protocols that maintain a list of the host with IP address so that routers are enabled to deliver data packets by passing them to next relevant routers and finally reach the destination (Simmons, 2014). The existing system does not have security constraints against venerable attacks. Apart from this, the existing system also includes wireless data access while employees are moving at the store. In this way system is allowing both wired and wireless access to internet and data servers.

Network Design Proposal

The company ‘NewAge Florist’ wants to resist their system from external visitor and wants to maintain the security of the system. It has been noticed that organization wants to secure online payment system so that it gain believe of the customer. For this purpose, the present report is suggesting a network design proposal for ‘NewAge Florist’ company. The design proposal is shown at below diagram:

The campus network layout

The above figure defines proposed network topology for ‘NewAge florists’ organization. The figure describes network topology at one branch and this same topology would be implemented at other three branches as well as headquarters.  Proposed network is designed by using common devices such as workstation consists of laptops, PCs or some other resources like printers. The workstations represent employees of the organisation. The proposed figure indicates that workstations are required to connect with hubs. The hubs are used for broadcasting data packets and make a segment of the network. Each segment is connected to router which maintains IP address of each network (Korowajczuk, 2011). Apart from this, the database server is also connected to network as it is used to hold sensitive information of the company. The customer orders and their account details are stored in the database. The database server is accessed by employees of the company. The network is necessary to include switches in order to increase the performance of the company. It is implemented with the server as each response data is passed to switches to avoid traffic in the network.

Routing protocol: The proposed system is using ‘Link State Routing’ protocol technique at each router. Therefore, routers are able to find shortest data among the network. The protocol maintains details of each node so that it able to choose appropriate routes.

IP addressing issues:  IP addressing issues are arises when two computer are assigned the same IP address. This issue occurs when one computer is assigned IP address which falls in the range of DHCP and the same address is assigned by DHCP server. IP address is the unique identifier in order to identify a host of the network. In this way, the system includes technology to resolve IP address issue. Such issue is generally found in internal LAN network. Any device which has same IP address will definitely conflict to another host. Therefore, the proposed system is using dynamic IP address strategy. Static IP address can’t be changed by the system (Jezowski, 2010). According to dynamic IP addressing, the server every time set new IP address to host and it very rarely happens that two IP address are common at the same time.

The Cabling Layout, the Devices and Their Locations

Proposed security strategies:the proposed network also includes encryption and firewall technique on the network in order to avoid risk on the system. This is the most important part in order to achieve the technical goal of the company. Firewall is used to rejected unauthorised access request of visitors. Some attackers also include unwanted data packet in the network. Firewall discards such packets for maintaining confidentiality and performance of the network. Cryptography techniques are also including at data server and data access. It is used to convert plain text into cipher text so that attacker is not able to attack data base. It also sends request to the server in encrypted form so that it becomes safe from vulnerable attacks.

Working with proposed network: The workstations are connected to the network by providing them unique IP address. The system is using dynamic IP address so each workstation will get a unique IP address. The workstations fire a request to access data from the data server. The response of request is transfer from server to the switch. The switch performs link state routing protocol in order to find the best path to the network. The algorithm defines shortest route path with relevant details of a router. Each router is maintaining routing table which contains node details such as IP address of nodes. In this way, the data packet is delivered to the sender. Apart from this, when workstations are wanted to access the internet then they are enabled to send the request. Each request should past barrier of the firewall. The company ‘NewAge florists’ wants to track the activity of employees’ like- their downloaded software, change in a web page. Such request will pass through the firewall and get easily track rival hidden in the company (Jezowski, 2010). Therefore, employees are restricted to download malicious software. Incoming data packets which are irrelevant and belong from unauthorised access are restricted to enter in the system.

Network Applications

The network applications are running on one host and provide services to applications which are running on the different node. The proposed system includes network applications which are described as follows:

Secure Remote login:The proposed system is allowed remote login from stores of the company. The system is first checking authorised client than connect them to the server. Therefore, employees are allowed to access database server outside organization environment.

Dynamic IP addressing:The organization is suffered from IP addressing issues which conflicting data services on destination. The proposed system is recommended that the system should use dynamic IP addressing instead of static. This internet application dynamically allocates IP address at some duration. The application alters IP address so that it cannot match with another IP address (

Instant messaging and E-mail:The proposed design depict that link state routing protocol is used at the switch of the network. The link state routing protocol is used to find shortest among the network. The protocol has defined a sequence of the router which is followed by the data packet in order to deliver information on time. It maintains updated table of the network that includes information of each node. Therefore, the system enabled to provide faster delivery of messages and instant e-mail.

File transfer protocol:The internet applications provide facility to upload and download data file from the data server. The employees of ‘NewAge florists’ company required downloading online orders from the data server. The local orders are also allowed to upload on the server so that employees may easily access them whether they are sitting at stores (Yang and Zhang, 2011).

Streaming Stored video clip:The proposed system recommended that the organization should include video clips of their floral art in order to attract more customers. The video internet application allows storing video which is ready to access by customers.

Firewall:Firewall is a network security system which acts as a barrier between company’s internal system and outside environment. The firewall allows authorized data access in the system. Each request of data server or internet access is the first pass with a firewall. The firewall does not allow downloading malicious software by employees. It inspects employee’s activity. Apart from this, the firewall does not allow to enter unwanted outside data packet into the system. It discards unsecured attempt of the attacker. The firewall does not allow to access sensitive information system and personal communication of organization (Yang and Zhang, 2011). The network system has implemented privileges which are taken care by company firewall. The firewall allows passing request only if clients have authority to access them otherwise it would reject the request and generate a response message. 

Data Encryption methodologies:The proposed systems include data encryption methodologies. The sensitive information like employees account details, customer details, a secure online payment detail, order details etc. are stored at the database. There may be chances of Man in middle attack while an employee is fetching orders outside at workplace or it may happen that attacker damage sensitive files.

Network Devices

The proposed system is including following devices:

Wireless Controller:The wireless controller device generally combine with light weight access point protocol in order to provide wireless access point in network. In this way employees who are located in floral store are able to access internet ( The device is placed at company campus from where hundreds of clients require access point (AP).

Cisco wireless controller

Router:The routers are used to transfer data packet from one node another node. It located at each hub of network. Hub is connected with number of workstation.

Image of Router

IP telephony server:The internet protocol is used for public switch telephone network so that employees are able to send voice, fax and video clips over network. NewAge Florists provide facility to employee that they can call to their home or internal employees may create contact with outer employees. IP telephony is used for establish a connection with public switch telephone network and connected at top of the hierarchy.

IP telephony server

Switch:It is connected one step above than router. Switch mainly enhances performance of network by using MAC address of data packet. It transfer data packet at appropriate router for faster delivery.

Firewall:It connected between internal system and external internet services. It is used to connect in order to make system security and avoid unauthorized access.

IP surveillance camera:It is digital camera that record digital video of campus and record activity of each employee. The recorded content is send through IP network. It is connected at centre of work environment where it can track employee’s activity (

IP surveillance camera


The proposed network devices are connected with media cables. It has been recommended to the organisation that the whole system should be connected with optical fibre cable because it provides greater bandwidth than other cables. Therefore, it will transmit data packet faster than other cable. It is thinner and lighter also ( The locations of cables are clearly found at cabling layout of system as shown in figure-2. The optical fibre cable allows running data with speed of runs at 100 Mbit/s or 1 Gbit/second. The cable provides length approx 1000 metre ( Therefore, it requires only one switch from where cables are connected.


Name of Device

Quantity* per device cost

Total cost

Wireless controller

1* $9,995.00.


Optical fibre cable

2* $52,400.00


IP surveillance camera

2*  $139.99



1* $8500



4* $400


IP telephony server

1* $ 80



3* $30



approx $1,17,800

The proposed system requires investment of approximately $117800 in order to implement whole system.


The present report concluded that ‘NewAge Florists’ company wants to secure customer online payment system and the network downtime does not exceed 0.04%. Therefore, network establishes its own sub-Data server. The proposed design system suggests a network layout which is implemented switch, routing protocols and router at appropriate place so that it allows data accessing faster. The proposed system has been suggested that the system should implement firewall and encryption technique so that customer’ s account detail will keep safe and online payment system cannot be interrupted by hackers. This would also resolve interrupt of outside visitor. They are not allowed to access resources of the system.


Benson, T., Akella, A. and Maltz, D.A., 2010, November. Network traffic characteristics of data centers in the wild. In Proceedings of the 10th ACM SIGCOMM conference on Internet measurement (pp. 267-280). ACM.

Binderkrantz, A.S. and Krøyer, S., 2012. Customizing strategy: Policy goals and interest group strategies. Interest Groups & Advocacy, 1(1), pp.115-138.

Challa, V.R., Prasad, M.G. and Fisher, F.T., 2011. Towards an autonomous self-tuning vibration energy harvesting device for wireless sensor network applications. Smart Materials and Structures, 20(2), p.025004.

Heninger, N., Durumeric, Z., Wustrow, E. and Halderman, J.A., 2012. Mining your Ps and Qs: Detection of widespread weak keys in network devices. InPresented as part of the 21st USENIX Security Symposium (USENIX Security 12) (pp. 205-220).

Jezowski, J., 2010. Review of water network design methods with literature annotations. Industrial & Engineering Chemistry Research, 49(10), pp.4475-4516.

Korowajczuk, L., 2011. LTE, WiMAX and WLAN network design, optimization and performance analysis. John Wiley & Sons.

Marot, C. and Sicard, E., 2012. EMC standards at IC level-status of IEC and technical goals of the SEISME project. In 2012 Asia-Pacific Symposium on Electromagnetic Compatibility.

Sehgal, V., 2010. Supply chain as strategic asset: the key to reaching business goals (Vol. 22). John Wiley & Sons.

Simmons, J.M., 2014. Optical network design and planning. Springer.

Vegesna, S. and Thomas, S., Juniper Networks, Inc., 2012. Work-conserving packet scheduling in network devices. U.S. Patent 8,230,110.

Yang, H. and Zhang, Y., 2011. Self-discharge analysis and characterization of supercapacitors for environmentally powered wireless sensor network applications. Journal of Power Sources, 196(20), pp.8866-8873.

Zhu, B., Taunay, T.F., Yan, M.F., Fini, J.M., Fishteyn, M., Monberg, E.M. and Dimarcello, F.V., 2010. Seven-core multicore fiber transmissions for passive optical network. Optics Express, 18(11), pp.11117-11122.