Network Infrastructure Upgrade For ALTEC: Design And Implementation

Business Scenario

Network infrastructure is a very critical aspect to any company or institution regardless of the operations that they do. The network ensures that there is smooth and continuous communication and sharing of resources within the organization. Having a stable, reliable, secure, and well-designed network infrastructure facilitates institutions to enhance their productivity and service delivery because of the readily accessible resources for decision making all the time.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Network infrastructure has been defined as an interconnection of networking devices such as switches, routers, servers, workstations, and personal computers to facilitate sharing of resources and reliable communication (Bird and Harwood, 2010). A network is defined by its characteristics such as security, scalability, efficiency, management, and administration. As such, it is important to pay attention to these factors while designing or upgrading the network.

The network design (topology) is another key factor that determines the reliability of the network. As such, it is essential to select a network design or topology that best meets the business requirements. Additionally, the choice of the networking components is crucial in determining the overall network performance and its ability to scale. A good network should be able to allow addition of more networking devices and users without affecting its reliability or performance. This report will focus on recommending a new network infrastructure for ALTEC’ campus located in ST. Kilda Road building. The campus wants to upgrade its network infrastructure so as to meet the new requirements.

Business Scenario

Before designing a network for a client, it is important to have a clear picture of what they expect. More often than not, people have been acquiring and implementing technology without defining their business requirements clearly or the problem that the acquired technology will solve. The aim of having the meeting with the client was to have a deeper understanding of their operations and their current challenges. Additionally, it is necessary to have insights on the current network infrastructure and the limitations associated with it.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

ALTEC is a training institution that has been legally registered and offer a wide range of higher education and vocational courses to both international and local students. Currently the campus occupies two floors at St Kilda modern building and is used by 40 staff members and 800 students. Currently, the campus has two dedicated wired networks for students and the administration. Some of the services that are currently shared in the network include email, print, scan, and the internet. In addition, the college has an intranet for the purpose of content repository, sharing of application, and as communication channel. The institution has set up different legacy, data/email, database, print, and file servers.

Business Requirements

Business Requirements

ALTEC also mentioned that the major reason why they are upgrading the network is because they have acquired additional floor so as to expand its higher education services. The college has leased the entire second floor and current renovations are being done so as to meet the requirements for academic operations. Moreover, a part of the second floor will be used as an administration office. The new setup for the institution is as follows: the ground and first floor will be used for vocational course while the second floor will be dedicated to higher education courses.

In the meeting, ALTEC representative also there are several objectives that they wish to achieve with the new network infrastructure. The college seeks to have a reliable network infrastructure that will allow all the staff member and students to do their daily activities efficiently. The objectives that ALTEC seek to achieve include:

Enhance communication: communication is very important to the college since it has to communicate to several parties including international students regarding different aspects, lectures, meetings, examinations, among others. Having a proper communication network will increase the connectivity among the staff and the students and this will improve the overall productivity of the college. Good communication channels also enhance relationships and determines how efficient or quickly an activity is completed. As such, the team emphasized on this objective because it determines on the progress of the institution.

Data security: of key concern to ALTEC is the security of their digital resources such as data and applications. The institution will be holding very sensitive and private information of the students and the staff members. The security of such resource is if importance to the college and thus should be protected at all-time from any unauthorized access or attack that may modify or destroy the data. Data is a very valuable resource because it drives the decision made by the college and it is essential that it is secured at all time.

Improve file organization: the college wants to have a paradigm shift and move to a more digital reporting and filing systems and this can only by having a well-designed network to handle these requirements. This will also allow international or distant learners to have access to important educational resources without having to print them. The network should also facilitate remote access so that students can be able to login and access library resources or lecture resources without having to physically visit the physical library.

Enhance Communication

File sharing: ALTEC being a college, students and lecturers will be sharing a lot of files (including lecture notes and other reference materials) and the new network should be able to support this functionality. A student can request a lecture for a particular learning resource and the lecturer will be able to share it without having to physically meet with the student.

The major objective is to connect the new leased floor to the already existing network infrastructure. The following are the specific requirements as stated by the college:

To have two core backbones to separate traffic and access by the staff and student. One backbone is dedicated solely for the student while the other is for the staff/administration. Secondly, the network should enable different services and access levels across the three floors. Thirdly, to integrate network management, video, routing traffic through VPN, and Voice. Fourthly, the network should support traffic shaping and access control lists for the different users and departments. Fifth, to have an out-of-band access to the network to facilitate management and troubleshooting of the network components and the devices connected to the network. Sixth, the network should have three unique layers of connection, that is, internet, student administration, and remote access. Finally, the network should be flexible to support future expansion (Scalability) to an enterprise WAN.

Existing Network Components

Currently the campus has the following network components:

  • 2 Core and 4 access switches
  • 4 Printers
  • 2 Wireless access points
  • 1 router
  • 5 servers (email, print, application, file, and backup server)

Proposed Solution

After carefully reviewing ALTEC requirements and the objectives that the college seeks to achieve, the proposed network solution is a campus model network infrastructure because it can be scaled up to an enterprise network architecture. It has the ability to provide all the required network services such as communication and resources sharing to the end users located in a single building or geographical area. The network will be designed as a part of a bigger enterprise network so as to facilitate future expansion without affecting the overall performance and optimize the network for high speed physical infrastructure (10/100/1000 Gbps) (Wolf, 2010). The campus network architecture follows the architectural and engineering principles: modularity, hierarchy, and resiliency.

The hierarchical network design allows the network designers and engineers to reduce the complexities of the network by breaking down into smaller manageable networks. This is very crucial for ALTEC because it has to lay down two backbones for the administration and students. This will allow the network to be broken down to two subnetworks to allow easy management for the administration and student network and manage traffic across them. Hierarchical enterprise campus network is made up of three layers: the core layer, distribution layer, and access layer.

Data Security

These layers are crucial for the implementation of ALTEC network infrastructure such as the core layer provides of high performance routing and optimal transport between sites. The distribution layer it offers policy-based boundary control and connectivity between core and access layers. The access layers facilitate the different categories of network users to access network resources when they need them.

The most essential factor is to ensure that the solution meet the business requirements and objectives that have been laid out in the requirements specification file. of importance is the reliability, security, backup and disaster recovery strategies, availability, and performance of the network to facilitate smooth flow of college operations. As such, by implementing a campus network infrastructure model all the laid out requirements will be met.

Proposed Physical Network Topology

Proposed Logical Network Topology

How the Proposed Network Design Will Meet the Business Requirements

The proposed network design has put into consideration all the requirements including the number of users and expected growth in the coming years. The network will be able to accommodate all the 840 users and allows for addition of more users and devices without overloading the network. Additionally, the proposed designed will make use of firewall to ensure that network is secure from any threat or attack.

ALTEC has acquired a new floor and it is required that the new floor be connected to the existing network. Therefore, it is required that changes be made to the existing network so as to accommodate the new requirements. Several steps need to be taken in order to achieve this including identifying the site requirements, resources and tools needed, tools for managing the network, security requirements, tools, and strategies, and implementation tasks.

Site Requirements

It is important to assess the network requirements carefully because there is no ‘one-size-fits-all’ network solution. By critically analyzing the network requirements, it will be easier to identify other requirements such as site requirements. The site requirements will depend on data transmission and communication, network services, technologies to be used, and the overall network design. Additionally, it is important to consider the business processes, the existing infrastructure and components, number of users, budget, peripherals, security issues, and future network requirements. 

Environmental Requirements

The network components must be well mounted to ensure that tit does not affect the mobility of the users or ventilation. Devices like switches should be mounted on a cabinet or rack. The room should be well-ventilated, clean, dry, and the temperature should be controlled. The site should be free of dust to avoid clogging the air filters which may reduce the performance and efficiency of the cooling system (CertificationKits, 2018). Sufficient air flow should be maintained to protect the hardware components from overheating.

Improve File Organization

The table below gives the minimum environmental conditions for the network site:

Environmental condition

Requirement

Altitude

Maximum 86 degrees Fahrenheit

Relative humidity

Noncondensing, 5% to 90% relative humidity

Temperature

Acceptable range 0 degree to 50 degree Celsius

Seismic

Should comply with the requirements of Zone 4 earthquake.

Power Requirements

All the network components require power supply in order to operate. The power should be stable and regulated to prevent power surges from damaging the components or blackouts causing service unavailability. The should be a backup generator to ensure service delivery and availability is not affected. The power supply unit should be installed in an area that facilitates easy access to thermal circuit breakers (Hohlfeld, Zinner, Benson and Hausheer, 2015). There should be at least two power supply sources and for this case electricity and generator so that incase one fails the other will provide the required power.

Hardware Requirements

The performance of the network is greatly dependent on the choice of the network components used. Acquiring reliable and high performance components will increase the overall business performance and productivity. The following hardware components will be used in the new network infrastructure for ALTEC:

Router: Cisco 4000 series router will be used for setting up the new network because it is intelligent enough to identify and block any unwanted traffic from getting into the network. Additionally, this router supports virtualization to facilitate resource availability from anywhere.

This router supports intelligent caching, unified communication, WAN connection, application optimization, and advanced security features to protect the network.

Switch: Cisco Meraki MS225 will be used to configure ALTEC network. It supports 10/100/1000 BASE T Ethernet connection and has 48 ports.

The router employs 802.3af security standards and all the ports supports power-over-Ethernet. Other unique features about this switch include fault detection, remote diagnostics, fingerprinting f hostnames, notification alerts, flexible stacking, 2-factor authentication, and Ethernet switching capabilities. This switch will best suite all the need of ALTEC college.

Wireless Access Point: Cisco business 100 series is the best choice for ALTEC wireless needs. This is because it is affordable, powerful, and covers wider distance. Several devices can be connected to one WAP without getting overloaded.

It is easy to set up and install because of the intuitive and integrated graphical user interface. Additionally, it provides reliable high-speed wireless connection to the users and is easy to expand and scale.

Firewall: Juniper SRX220 is the firewall that will be used in providing network security to ALTEC college. This is because it comes fully integrated with security, WAN connectivity, switching, and routing in one package (LI, 2018).

Moreover, this particular firewall is designed for small to medium organization such as ALTEC college thus will provide high level of security required. This firewall provides up to 100mbps IPsec VPN, 950 Mbps firewall, and 80Mbps intrusion prevention system. Additionally, it has more features such as flexible configuration scaling, security and routing, consolidated, switching, and secure applications.

File sharing

Network Cable: cat6 Ethernet cable because it has peculiar and superior properties to handle the high bandwidth and traffic that will be transmitted within the network. It is a high-speed, high-level performance cable and is less prone to cross talk and noise compared to the previous cables. This cable is very efficient, effective, and reliable and requires no testing after installation.

It is a highly flexible and trustworthy cable and has a more extended bandwidth compared to the previous versions.

Other resources and tools required include rack cabinets for mounting the network components, uninterruptible power supply (UPS), cable labelling machine, and FO patch cords.

Network Management Tool

The recommended network management tool is PRTG Network Monitor which is a product form Paessler. This tool has advanced capabilities for managing network infrastructure. All the network services and resources such as traffic, systems, applications, devices, and users can be easily shown in a hierarchical manner displaying performance, usage, and alerts. This tools utilizes WMI, HTTP requests, Pings, SNMP, SSH, REST APIs, SQL, Packet/ flows sniffing, among other technologies (Kuipers, 2012).

This is the best tool because of its simple, easy to use, and powerful user interface. One of the unique features of this tool is its ability to allow network administrators to monitor network devices and components from a mobile application. Additionally, its pricing plan is very flexible.

Network Implementation Tasks

Step

Task

1.           

Confirmation of ESD processes

2.           

Preparation of installation site.

3.           

Building and setting up cabinets and racks

4.           

Installing rails, power supply, and protective earthing on the cabinets.

5.           

Unpacking the components

6.           

Actual installation of network components in the cabinet including laying of cables.

7.           

Confirming and recording component and device serial numbers

8.           

Verifying that the network components have been install correctly.

9.           

Installation of backup power supply

10.       

Installing inter- and intra-cabinet cables for communication.

11.       

Verifying that the termination of the circuit in ALTEC patch panel had been done correctly.

12.       

Powering up the network components.

13.       

Loading and verifying system firmware and software

14.       

Setting up and configuring the equipment to meet the ALTEC requirements.

15.       

Carrying out comprehensive installation testing.

16.       

Adding user devices to ALTEC network

17.       

Performing commissioning tests.

18.       

Provide comprehensive and supportive manual document.

Security Requirements

The network should be able to meet the following security requirements:

Integrity: the network should ensure that consistency of the data is maintained.

Confidentiality: the data and other private information should not be disclosed to unauthorized persons or third parties.

Authentication: the source of the data or user identity should be assured and verified.

Availability: all the authorized and legitimate network users should be able to access the network resources at any time.

Security strategy

The following network strategies should be adopted by ALTEC college:

Access control: the institution should implement this security mechanism to control access to network resources such as data and other sensitive files. This is to reduce the chances of unauthorized access to such resources. Both physical and logical access control mechanisms should be implemented. Physical access control involves burglar proofing the data centers and any other computer rooms by installing strong door and window grills to prevent unauthorized physical access to the computer rooms and data centers.

Logical access control involves setting up different policies such as password policy to regulate access to the resources over the network. In essence, users need to be provided with login credentials and if you don’t have one then you will not be able to access the network resources and services. Other logical access controls mechanisms include biometric scans, personal identification numbers, and security tokens.

Specific Requirements

Digital signature: this security approach should be adopted because it is used to validate the integrity of the information, files, documents, programs, and other digital files sent over the network. This security approach employs mathematical algorithms to authenticate the digital content before being sent to the target user (Kuipers, 2012). This is a very useful mechanism especially when sensitive information is being sent over the network.

Encryption: the staff and students will be sharing some sensitive information such as passwords over the network and this makes the network vulnerable to attackers who would want to access such information. Therefore, this information should be encrypted/ encoded while transmitting it over the network so that the attackers cannot interpret the information.

Security tools and methods for ongoing monitoring

The following security method and tools can be employed in monitoring the network:

The network should have the ability to detect threats in real-time for rapid remediation. The network monitoring tool (PRTG Network Monitor) should be able to scan for any security threats, record and analyze the log then compare it against threat intelligence sources. It should also be able to store and process logs from the network system and examine them against emerging threat intelligence feeds. PRTG should also automate fully intelligent response to help in address the security incidents quickly.

Regulatory compliance and event log management simplification should be focused on. This will help in centralizing log collections, event correlation for intelligent detection, and minimized confusion for regulatory compliance data to be used (Weng, Yang and Lai, 2014). Additionally, software updates to workstations and servers should be automated. This will ensure that all the security fixes are regularly updated to ensure that system security is kept at a high level.

IP Addressing

Zone

Network

Subnet Mask

Hosts

Management

10.10.10.0

255.255.255.224/27

30

Student

10.10.20.0

255.255.255.0/24

254

Staff

10.10.30.0

255.255.255.0/24

254

Servers

10.10.40.0

255.255.255.0/27

30

Wifi

10.10.50.0

255.255.255.0/24

254

Access Layer Tuning

ALTEC-switch#show vlan

ALTEC-switch#show vlan

VLAN Name                             Status    Ports

—- ——————————– ——— ——————————-

1    default                          active    Fa0/1, Fa0/2, Fa0/3, Fa0/4,

                                                Fa0/5, Fa0/6, Fa0/7, Fa0/8,

                                                Fa0/9, Fa0/10, Fa0/11, Fa0/12,

                                                Gi0/1, Gi0/2

100  Student                         active

1002 Staff                            active

1003 Servers                         active

1004 Wifi                             active

1005 trnet-default                    active

VLAN Type  SAID       MTU   Parent RingNo BridgeNo Stp  BrdgMode Trans1 Trans2

—- —– ———- —– —— —— ——– —- ——– —— ——

1    enet  100001     1500  –      –      –        –    –        1002   1003

100  enet  100100     1500  –      –      –        –    –        0      0

1002 fddi  101002     1500  –      –      –        –    –        1      1003

1003 tr    101003     1500  1005   0      –        –    srb      1      1002

Network Layers

1004 fdnet 101004     1500  –      –      1        ibm  –        0      0

1005 trnet 101005     1500  –      –      1        ibm  –        0      0

ALTEC-switch#

ALTEC-switch1 Configuration

ALTEC-switch1#vlan database

ALTEC-switch1(vlan)#vtp transparent

Setting device to VTP TRANSPARENT mode.

ALTEC-switch1(vlan)#vlan 10 name Host-Vlan-1

VLAN 10 added:

    Name: Host-Vlan-1

ALTEC-switch1(vlan)#vlan 20 name Host-Vlan-2

VLAN 20 added:

    Name: Host-Vlan-2

ALTEC-switch1(vlan)#exit

APPLY completed.

Exiting….

ALTEC-switch1#

ALTEC-switch2 Configuration

ALTEC-switch2#vlan database

ALTEC-switch2(vlan)#vtp transparent

Setting device to VTP TRANSPARENT mode.

ALTEC-switch2(vlan)#vlan 30 name Host-Vlan-3

VLAN 30 added:

    Name: Host-Vlan-3

ALTEC-switch2(vlan)#exit

APPLY completed.

Exiting….

ALTEC-switch2#

ALTEC-switch3 Configuration

ALTEC-switch3#configure terminal

Enter configuration commands, one per line.  End with CNTL/Z.

ALTEC-switch3(config)#interface port-channel 1

ALTEC-switch3(config-if)#exit

ALTEC-switch3(config)#interface gig 49

ALTEC-switch3(config-if)#no shutdown

ALTEC-switch3(config-if)#no negotiation auto

ALTEC-switch3(config-if)#channel-group 1

ALTEC-switch3(config-if)#exit

ALTEC-switch3(config)#interface gig 50

ALTEC-switch3(config-if)#no shutdown

ALTEC-switch3(config-if)#no negotiation auto

ALTEC-switch3(config-if)#channel-group 1

ALTEC-switch3(config-if)#exit

ALTEC-switch3(config)#interface port-channel 2

ALTEC-switch3(config-if)#exit

ALTEC-switch3(config)#interface fast 45

ALTEC-switch3(config-if)#no shutdown

ALTEC-switch3(config-if)#channel-group 2

ALTEC-switch3(config-if)#exit

ALTEC-switch3(config)#interface fast 46

ALTEC-switch3(config-if)#no shutdown

ALTEC-switch3(config-if)#channel-group 2

ALTEC-switch3(config-if)#exit

ALTEC-switch3(config)#interface fast 47

ALTEC-switch3(config-if)#no shutdown

ALTEC-switch3(config-if)#channel-group 2

ALTEC-switch3(config-if)#exit

ALTEC-switch3(config)#interface fast 48

ALTEC-switch3(config-if)#no shutdown

ALTEC-switch3(config-if)#channel-group 2

ALTEC-switch3(config-if)#^Z

ALTEC-switch3#

ALTEC-switch Configuration

ALTEC-switch#configure terminal

Enter configuration commands, one per line.  End with CNTL/Z.

ALTEC-switch(config)#interface gig 0/1

ALTEC-switch(config-if)#no negotiation auto

ALTEC-switch(config-if)#port group 1

ALTEC-switch(config-if)#exit

ALTEC-switch(config)#interface gig 0/2

ALTEC-switch(config-if)#no negotiation auto

ALTEC-switch(config-if)#port group 1

ALTEC-switch(config-if)#^Z

ALTEC-switch#

ALTEC-switch1

ALTEC-switch1#configure terminal

Enter configuration commands, one per line.  End with CNTL/Z.

ALTEC-switch1(config)#interface fast 0/45

ALTEC-switch1(config-if)#port group 1

ALTEC-switch1(config-if)#exit

ALTEC-switch1(config)#interface fast 0/46

ALTEC-switch1(config-if)#port group 1

ALTEC-switch1(config-if)#exit

ALTEC-switch1(config)#interface fast 0/47

ALTEC-switch1(config-if)#port group 1

ALTEC-switch1(config-if)#exit

ALTEC-switch1(config)#interface fast 0/48

ALTEC-switch1(config-if)#port group 1

ALTEC-switch1(config-if)#^Z

ALTEC-switch1#

Distribution Layer Tuning

ALTEC-switch2#

ALTEC-switch2#configure terminal

Enter configuration commands, one per line.  End with CNTL/Z.

ALTEC-switch2(config)#interface port-channel 1.1

ALTEC-switch2(config-subif)#encapsulation isl 1

ALTEC-switch2(config-subif)#bridge-group 1

ALTEC-switch2(config-subif)#exit

ALTEC-switch2(config)#interface port-channel 1.10

ALTEC-switch2(config-subif)#encapsulation isl 10

ALTEC-switch2(config-subif)#ip address 10.10.10.1 255.255.255.0

ALTEC-switch2(config-subif)#exit

ALTEC-switch2(config)#interface port-channel 2.1

ALTEC-switch2(config-subif)#encapsulation isl 1

ALTEC-switch2(config-subif)#bridge-group 1

ALTEC-switch2(config-subif)#exit

ALTEC-switch2(config)#interface port-channel 2.10

ALTEC-switch2(config-subif)#encapsulation isl 10

ALTEC-switch2(config-subif)#ip address 10.10.10.1 255.255.255.0

ALTEC-switch2(config-subif)#exit

ALTEC-switch2(config)#interface port-channel 2.20

ALTEC-switch2(config-subif)#encapsulation isl 20

ALTEC-switch2(config-subif)#ip address 10.20.20.1 255.255.255.0

ALTEC-switch2(config-subif)#exit

ALTEC-switch2(config)#interface fast 44 

ALTEC-switch2(config-if)#no shutdown

ALTEC-switch2(config-if)#exit

ALTEC-switch2(config)#interface fast 44.1

ALTEC-switch2(config-subif)#encapsulation isl 1

ALTEC-switch2(config-subif)#bridge-group 1

ALTEC-switch2(config-subif)#exit

ALTEC-switch2(config)#interface fast 44.30

ALTEC-switch2(config-subif)#encapsulation isl 30

ALTEC-switch2(config-subif)#ip address 10.30.30.1 255.255.255.0

ALTEC-switch2(config-subif)#^Z

ALTEC-switch2#

ALTEC-switch #show run

Building configuration…

Current configuration: 1619 bytes

version 13.0

hostname ALTEC-switch

spanning-tree mode pvst

!interface FastEthernet0/1

switchport access vlan 20

interface FastEthernet0/1

switchport access vlan 20

interface FastEthernet0/2

switchport trunk encapsulation dot1q

switchport mode trunk

interface FastEthernet0/1

switchport trunk encapsulation dot1q

switchport mode trunk

interface Vlan1

no ip address

shutdown

ip classless

ip flow-export version 11

!line con 0

line aux 0

line vty 0 4

login

VPN and Traffic Shaping

end

Core Layer Tuning

ALTEC-switch2#configure terminal

Enter configuration commands, one per line.  End with CNTL/Z.

ALTEC-switch2(config)#bridge irb

ALTEC-switch2(config)#bridge 20 protocol ieee

ALTEC-switch2(config)#bridge 20 route ip

ALTEC-switch2(config)#interface bvi 200

ALTEC-switch2(config-if)#ip add 10.10.20.1 255.255.255.0

ALTEC-switch2(config-if)#exit

ALTEC-switch2(config)#interface fast 1

ALTEC-switch2(config-if)#no shutdown

ALTEC-switch2(config-if)#bridge-group 20

ALTEC-switch2(config-if)#bridge-group 20 spanning-disabled

ALTEC-switch2(config)#interface fast 43

ALTEC-switch2(config-if)#no shutdown

ALTEC-switch2(config-if)#bridge-group 20

ALTEC-switch2(config-if)#bridge-group 20 spanning-disabled

ALTEC-switch2(config-if)#exit

ALTEC-switch2(config)#bridge 1 protocol ieee

ALTEC-switch2(config)#bridge 1 route ip

ALTEC-switch2(config)#interface bvi 1

ALTEC-switch2(config-if)#ip add 10.10.10.1 255.255.255.0

ALTEC-switch2(config-if)#^Z

ALTEC-switch1

ALTEC-switch1#configure terminal

Enter configuration commands, one per line.  End with CNTL/Z.

ALTEC-switch1(config)#interface gig 0/1

ALTEC-switch1(config-if)#switchport mode trunk

ALTEC-switch1(config-if)#^Z

ALTEC-switch1#

ALTEC-switch3#configure terminal

Enter configuration commands, one per line.  End with CNTL/Z.

ALTEC-switch3(config)#interface fast 0/45

ALTEC-switch3(config-if)#port group 1

ALTEC-switch3(config-if)#exit

ALTEC-switch3(config)#interface fast 0/46

ALTEC-switch3(config-if)#port group 1

ALTEC-switch3(config-if)#exit

ALTEC-switch3(config)#interface fast 0/47

ALTEC-switch3(config-if)#port group 1

ALTEC-switch3(config-if)#exit

ALTEC-switch3(config)#interface fast 0/48

ALTEC-switch3(config-if)#port group 1

ALTEC-switch3(config-if)#^Z

ALTEC-switch3#

Conclusion

The firm recommends that ALTEC accept this proposal because all the business requirements have been considered and factored in. More focus had been put network performance and security to ensure that users are able to enjoy the network services and resources fast and securely. The proposed network components are also reliable, affordable, supports scalability, and offer high performance. This is to ensure high availability of network resources and services. The objectives that ALTEC seek to achieve include enhance communication, data security, improve file organization, and file sharing. The major objective is to connect the new leased floor to the already existing network infrastructure.

After carefully reviewing ALTEC requirements and the objectives that the college seeks to achieve, the proposed network solution is a campus model network infrastructure because it can be scaled up to an enterprise network architecture. It has the ability to provide all the required network services such as communication and resources sharing to the end users located in a single building or geographical area. By critically analyzing the network requirements, it will be easier to identify other requirements such as site requirements.

The site requirements will depend on data transmission and communication, network services, technologies to be used, and the overall network design. The recommended network management tool is PRTG Network Monitor because of its advanced capabilities for managing network infrastructure. All the network services and resources such as traffic, systems, applications, devices, and users can be easily shown in a hierarchical manner displaying performance, usage, and alerts.

Reference List

Bird, D. and Harwood, M. (2010). Networking Components and Devices | Introduction | Pearson IT Certification. 

CertificationKits, C. (2018). What is the best Cisco CCNA Lab Switch? – 

Cisco (2018). Best Small Business Routers – Cisco. [online] 

Cisco (2018). Cisco IT Best Practices. Cisco IP addressing Policy. [ebook] Cisco, pp.5-10. 

Cisco (2018). Cisco Small Business 100 Series Wireless Access Points. [online] Cisco

Hohlfeld, O., Zinner, T., Benson, T. and Hausheer, D. (2015). Special issue on Software-Defined Networking and Network Functions Virtualization for flexible network management. International Journal of Network Management, 26(1), pp.4-5.

Kuipers, F. (2012). An Overview of Algorithms for Network Survivability. ISRN Communications and Networking, 2012, pp.1-19.

Kuipers, F. (2012). An Overview of Algorithms for Network Survivability. ISRN Communications and Networking, 2012, pp.1-19

LI, Q. (2018). Design and implementation of network firewall system based on Godson CPU. Journal of Computer Applications, 28(6), pp.1372-1375.

Oppenheimer, P. (2016). Top-down network design. Indianapolis, Ind.: Cisco Press

Weng, C., Yang, W. and Lai, K. (2014). Technological position in alliances network. Technology Analysis & Strategic Management, 26(6), pp.669-685.

Wolf, T. (2010). In-network services for customization in next-generation networks. IEEE Network, 24(4), pp.6-12.