|Type of paper:||Essay|
|Categories:||Computer science Information technologies Technology|
Computer Science Research Paper
UKF Replacement of Trading Floor Network (Network Design, Layer 1, 2 and 3)
UKF network design for layer 1 to layer 3 (LAN), is built on a series of hardware and protocols that are going to be operating interactively with each other. Building the network in layers enables the easy making of changes in the network has it grows. Changing a small portion of the network infrastructure requires a hierarchical design that allows and strengthening of the system. The three network layers include core layers, distribution layer, and access layer. The core purpose of each layer is to ensure that packets are quickly moved in a fast and easy way as possible. The movement enables natural filtering of the packets while using some access list, routers in the access. Given the distribution layer is situated between the core of the access layer, it acts as a demarcation point. The distribution provides a boundary definition where the two layers of networks are creatively combined. The filtering of routes through the core layers enables the easy handling of the packet in a way that it can be easily shared. Other important factors include switching, security, IPv6 configuration and subnetting, and protocol development. Essentially, the stability and security network forms the background of this research.
There are assumptions involved in developing the system. Jin et al., (2004, p. 32) argue that assumptions help to categorize the network. Assumptions are projected into three main groups, network routing, network latency and IDMaps infrastructure. The latency between the source and destination of a network remains on smaller latency that is reflected on the segments of the path between the source and the destination. The assumption is not on realistic since they create routes through the changes experienced from time to time. Routing and switching will be considered optimal if packets from the source destination follow the shortest path possible. Hence, the ITT assumes that configuration will be selecting the right route to minimize the possible hope count. The network service providers generalize and optimize network latencies for the performance reasons. Besides, the assumption of efficient routing makes the need for trace placement easier since they are addictive and hold triangulation.
Total Cost of Ownership (TCO)
It is important to embed the management functionality as operating inside the network, which implies the required functionality of the provided centrally of the network. The team will be consulting the management on the possibility of providing the overall network. FitzGerald and Dennis (2009, p. 575) claim that the contribution of the network management provides a deeper analysis of the total cost of the ownership. This encourages the management to understand the system results in a reduction of the overall costs means, which means that it is possible to reflect on the performance of the network in general. Progressively, the management and administrators need to understand how the system functions. It is important to mentally show how these costs are duplicated on the network.
Core Layer and Its Components
The core layer will be the busiest in the entire system. Teare (2010) explains that the core layer is responsible for all transportation of data across the network. The layer presents itself in a small distribution layer where all devices are connected to each other. The system designer identifies the necessary technical constraints that are associated with a deep bad connection. The infrastructure standard at this level is the Switches, Routers, WiFi, and Servers, although the switches are the center most. The core layer has a small latency period where the high speed of low latency circuits is achieved, as well have greater reliability. Thus the network fault tolerance is possible.
There are five main hardware components, Switches, a Router, Servers, PC and a Wireless access point. Other important devices include a hub and repeater. Cabling, Wireless or Bluetooth connects them, depending on the network the operating system chooses to use. The communication between a client application and a server application happens at the hardware established, backed by operating systems and applications. The computer addressing other devices finds each other through the configuration protocols established earlier. The layers of Network Communication naturally depend on the hardware used.
5.2 Memory Calculations
Based on the logical calculation developed, and the number of PCs and servers attached, it is clear that memory sizing is necessary to make reasonable resource allocations.
2GB RAM for each PC
8GB RAM for server
Computing nodes are accompanied by 2, 4,8 and 16GB sticks.
Abilities to carry out a networking plan
The RAM sticks are mounted through the gauged and resulting way.
Division of the 1000 GB/16 = 62
Table 1.0: Switch Calculations
5.3 Network Calculations
To satisfy the arrangement of switches, PCs, and servers, trunking calculations will be adopted and analyzed.
200 Mbits/ second through the essential per VM
Tiniest network latency
The conceivable server of the VMs are utilized through a 10GB link to the server as provided through the following configuration
1000 Mbits/ second / 25 VMS = 400 Mbits/ second.
The incredibly fulfilling systems involve creating components that are accessible through the network design. The option involves utilizing the two data switches with the first switch, which has 24 pots of information. Hence, it is possible to create the growth to the 48 ports provided.
The Virtual Link Trunking (VLT) innovation involves pairing switches and accumulation. The resources of the every server are isolated through the various connections between the changes used to accomplish through intense-active connection while utilizing through full data transmission ability and prerequisites for spreading progressively with time.
5.4 Storage Calculations
Based on the illustration presented, it is clear that limits for the server calculations are based on the server of 25 VMs each, which are accompanied through the various suppositions.
- The utilization of transient helps in stockpiling for the nearby drive for the VM.
- The 1000 GB for server capacity depends naturally on the VM drive.
- The utilization is readily determined by the ability to store and ensure that the remote connecting volumes of the VMs are used.
The elements are necessary because they help to improve and isolate connections based between the different pair of changes that contribute to accomplishing an intense active through the relationships while adding the full data transmission at the specific prerequisites for the spreading the data.
At the core, the combination of dual-core switches creates a complexity design that requires the creation of an efficient network. The core switch makes a new header for the optical packages involved at the linking layer network. Packets arriving at the core switch might face a collision of the output port of the core switch (Donoso, 2009). The resolution scheme provides an innersole switch for which is used in sharing the addressing information.
5.5.1 Switch Calculation
Considering the power requirements required to support the two switches, it is important to select the proper network gear. The network equipment should reflect on the possible direct impacts of TCO through monthly recurring. The customers are naturally engaged through the creation of an elaborate switching plan. The Cisco expandable power system (XPS) 220 has with it various options that related to the 3560-X series. The Cisco XPS power systems create a stable energy formula one that reflects the need of the switching ring topology. The Cisco XPS 2200 creates the supplies of authority pool that involves extending the power stack to various outputs. The XPS is deployed without a power supply through a powered-up global reserve. The XPS 2200 adds power supplies through the power pool, which extend the power stack to the two switches. Although the XPS will be used without a particular power supply, a 30W global reserve will be provided. The network personnel is deployed through the switches through considered power where the power issues will be attended through the appropriate network planning while using the right purchase deployment. The power requirements and consumption for Cisco catalysts 3750-X series switch or stack through with the necessary Power over Ethernet POE capabilities. The need to calculate the utility of authority required determining power consumptions, power needs, and power dissipation which helps in selecting the power supplied needs while ensuring that the power stack is based on the specific requirements.
5.5.2 Calculating Power Consumption
Calculating the energy consumption was important because it would help to consider the appropriate power supply for a particular switch. To calculate the energy consumption on Cisco Catalyst 3750-X Series Switch, the ITT utilizes a combination of various power supplies related options, for instance, 715W, 1100W, and 440WDC. The efficiency of power supply indicates the passing of power through various load related option. The transformation of energy in the supply was from AC TO DC. The loss of power will, therefore, be accounted to as follows
% Efficiency = Output (w)/ Input (W) * 100
The Cisco Catalysts 3750 – X-Series power supplies by reaching 80 percent of the efficiency at small loads of little as 15 percent.
Table 1: Switching Table
Power Supply characteristics Maximum Input and Output Power Watts & BTU hr
Maximum Input Power from the wall
Maximum Output Power into the system
Table 1.0 Switch Calculations
The router in this case helps the LAN to connect the WAN. The connection is necessary whereby the two floors will be assessing internet connective. The router is configured using OSPF, EIGRP and RIP that functions at various levels of connection. The router helps to deliver the information from clients to each other. The router will be storing information on the shortest path possible. The routing table stores all the history and information, hence the router will be retrieving the routing information, and use it to calculate the best viable destination.
Cite this page
Computer Science Research Paper Example. (2018, Jan 24). Retrieved from https://speedypaper.com/essays/computer-science-research
If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:
- Lua Code Clarifications
- Free Essay Sample on Definitions of Outsourcing
- Essay Example on Cyber Attacks
- Essay Sample: Mini-Management Plan for Cyber Software
- Free Essay: Governing the Internet and Policing Activities
- Free Essay: How a Programmer Would Prove He or She Can Write Code
- Free Essay Example on Mobile Banking and Financial Institutions