2.1 Memory Calculations
Based on the logical calculation developed, and the number of PCs and servers attached, it is clear that memory sizing is necessary to make reasonable resource allocations.
2GB RAM for each PC
8GB RAM for server
Computing nodes are accompanied by 2, 4,8 and 16GB sticks.
Abilities to carry out a financial plan of the right decision
Created number of sticks through the server for demanding throughout the one terabyte of harddisk. The RAM sticks are mounted through the gauged and resulting way.
Division of the 1000 GB/16 = 62.5
The procedure for deviousness are charted
2.2 Switch Calculation
Considering the power requirements required to support the two switches, it is important to select the proper network gear. The network equipment should reflect on the possible direct impacts of TCO through monthly recurring. The customers are naturally engaged through the creation of an elaborate switching plan. The Cisco expandable power system (XPS) 220 has with it various options that related to the 3560-X series. The Cisco XPS power systems create a stable energy formula one that reflects the need of the switching ring topology. The Cisco XPS 2200 creates the supplies of authority pool that involves extending the power stack to various outputs. The XPS is deployed without a power supply through a powered-up global reserve. The XPS 2200 adds power supplies through the power pool, which extend the power stack to the two switches. Although the XPS will be used without a particular power supply, a 30W global reserve will be provided. The network personnel is deployed through the switches through considered power where the power issues will be attended through the appropriate network planning while using the right purchase deployment. The power requirements and consumption for Cisco catalysts 3750-X series switch or stack through with the necessary Power over Ethernet POE capabilities. The need to calculate the utility of authority required determining power consumptions, power needs, and power dissipation which helps in selecting the power supplied needs while ensuring that the power stack is based on the specific requirements.
2.3 Calculating Power Consumption
Calculating the energy consumption was important because it would help to consider the appropriate power supply for a particular switch. To calculate the energy consumption on Cisco Catalyst 3750-X, Series Switch, it was important to utilize a combination of various power supplies related options, for instance, 715W, 1100W, and 440WDC. The efficiency of power supply indicates the passing of power through various load-related option. The transformation of energy in the supply was from AC TO DC. The loss of power will, therefore, be accounted to as follows
% Efficiency = Output (w)/ Input (W) * 100
The Cisco Catalysts 3750 X-Series power supplies by reaching 80 percent of the efficiency at small loads of little as 15 percent.
2.3.2 Market Shares
Table 1.0 Switch Calculations
Power Supply characteristics Maximum Input and Output Power Watts & BTU hr 350w 715w 110w 440WDC
Efficiency
(< 40%) 87.0% 89.0% 88.0% 81.5%
Power Unit Watt BTU/HR
1W=3.412BTU Watt BTU/HR
1W=3.412BTU WATT BTU/HR
1W=3.412BTU WATT BTU/HR =3.412BTUC
Maximum Input Power from the wall 402.29 1372.61 803.37 274.10 1250.00 4265.00 539.88 1842.07
Maximum Output Power into the system 350.00 1194.20 715.00 2439.58 1100.00 3753.20 440.00 1501.28
Table 1.0: Switch Calculations
2.4 Network Calculations
To satisfy the arrangement of switches, PCs, and routers, it is clear that the execution and networking administration experience through the various assumptions presented.
200 Mbits/ second through the essential per VM
Tiniest network latency.
The conceivable server of the VMs are utilized through a 10GB link to the server as provided through the following configuration
1000 Mbits/ second / 25 VMS = 400 Mbits/ second.
The incredibly fulfilling systems involve creating components that are accessible through the network design. The option involves utilizing the two data switches with the first switch which has 24 pots of information. Hence, it is possible to create the growth to the 48 ports provided.
The Virtual Link Trunking (VLT) innovation involves pairing switches and accumulation. The resources of the every server are isolated through the various connections between the changes used to accomplish through intense-active connection while utilizing through full data transmission ability and prerequisites for spreading progressively with time.
2.5 Storage Calculations
Based on the illustration presented, it is clear that limits for the server calculations are based on the server of 25 VMs each, which are accompanied through the various suppositions.
- The utilization of transient helps in stockpiling for the nearby drive for the VM.
- The 1000 GB for server capacity depends naturally on the VM drive.
- The utilization is readily determined by the ability to store and ensure that the remote connecting volumes of the VMs are used.
The elements are necessary because they help to improve and isolate connections based between the different pair of changes that contribute to accomplishing an intense active through the relationships while adding the full data transmission at the specific prerequisites for the spreading the data.
3.0 Subnetting Scheme
Our Small LAN office has one router, two servers, two switches and 60 client computers, and a possibility of a wireless hotspot. The IPv6 provides an appropriate subnetting scheme that will help in keeping the control center appropriately subnetted. The subnetted 2001:0DB8:0002:/48 will be used to specify the right subnetted under each category.
Required Subnets = 16
Bits registered = x, as of (2^x) >=3 , x = 2). From the following, four subnets will be created. However, the total volume is 50*(48+2)
The hexits are presented through 2 bits that are assigned to =1
Defining hexit is based on the hex values 0,4,8, 12, 16, 20, etc.
From the table, the defining hexit increments by 4 with discrete hex values 0002,
Thus, our 16 subnets are:
2001:0DB8:0002: 0000:/50
2001:0DB8:0002: 0004:/50
2001:0DB8:0002: 0008:/50
2001:0DB8:0002: 0012:/50
2001:0DB8:0002: 0016:/50
2001:0DB8:0002: 0020:/50
2001:0DB8:0002: 0024:/50
2001:0DB8:0002: 0028:/50
2001:0DB8:0002: 0032/50
2001:0DB8:0002: 0036:/50
2001:0DB8:0002: 0040:/50
2001:0DB8:0002: 0044:/50
2001:0DB8:0002: 0048:/50
2001:0DB8:0002: 0052:/50
2001:0DB8:0002: 0056:/50
2001:0DB8:0002: 0060:/50
2001:0DB8:0002: 0064:/50
4.1 Allocation
To allocate IP addresses to the different blocks, the system uses Regional Internet Registries (RIRs). Each RIR allocates IP address based on the different situation facing the RIR. Illustratively, the RIR forms part of the Numbers Resource Organization that is represented through collective interests while ensuring that policy statements are coordinated. The IANA delegations are allocated through IPv6 established. Given the possibility of the infinity of IP addresses, the multicast allocations will provide a resource for the IPv6 addressing where it is possible to constitute 1/256 of the available address space. The maximum number of the multicast address is constrained by the requirement that is under Group ID and is contained in the last rightmost 112 bits of addressing. The approach leaves sufficient room for over four billion possible multicasts.
Part 2: Theoretical Assessment
5. Description for the Design and Decisions
A range business and technical requirements have been witnessed from the network upgrade. The project plan facilitates management of the task, responsibilities, critical milestones, and resources that are required to implement changes that the new system is bringing.
To begin with, the initial requirements were derived from the planned phase and driven through the various activities that oversaw the appropriate design specialists. As noted, the network design specification is a comprehensive, detailed plan that is in place to meet the current business and technical requirements that seek to incorporate specifications for upgrading the system based on the availability, reliability, scalability and performance. The design specification is naturally based on the implementation of activities. While implementing, the design will be approved through the appropriate application and verification begins. The networks or additional components are developed according to the design specifications, which involves integrating devices without disrupting existing network environment and creating points of vulnerability. As well, under operating, the final tests involve creating an appropriate environment through the design. The operation phase includes maintaining network health through daily working, which include determining the availability of the system on an upscale basis.
The design of the two floors upgrades is made possible through conjoining the requirements that are gathered around the network. Firstly, the system design considers the need to prioritize business goal, a principle that motivates the designer to prepare, design, plan, implement, and optimize network operations. The designers considered the Preparation, Planning, Designing, Implementation, Operation and Optimization process of the technical designs while examined the ability to meet...
Cite this page
Report Example on Computer Network Design. (2021, Mar 31). Retrieved from https://proessays.net/essays/report-example-on-computer-network-design
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Advantages and Disadvantages of the Internet Being Censored In Hong Kong
- IT Security Policy Framework Paper Example
- Research Paper on Cybertechnology
- Corporate Insider Threat Detection Paper Example
- Essay Sample on OpenStack: Cloud Computing Deployment & Management Made Easy
- Essay Example on The Cloud Revolution: Competing with On-Premise Systems for Housing Employee Data
- Free Essay Sample: Risks Faced Australian Government