0% found this document useful (0 votes)
12 views

Network Engineering Report 2

Uploaded by

nivadramdass
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Network Engineering Report 2

Uploaded by

nivadramdass
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

NWEG 5122

N������ E���������� 1B

P�E: P��� 2

N���� R������

By submitting this assignment, I acknowledge that I have read and understood all the rules as
per the terms in the registration contract, in particular the assignment and assessment rules
in The IIE Assessment Strategy and Policy (IE009), the intellectual integrity and plagiarism
rules in the Intellectual Integrity and Property Rights Policy (IE023), as well as any rules
and regulations published in the student portal.

© 2024 The Independent Institute of Education (Pty) Ltd 2024


1

P��������� S���������

Statement Signature Statement Signature

I have read the


I have not shared this
assessment rules
assessment with any
provided in this
other student.
declaration.

I have not presented


This assessment is my the work of
own work. published sources as
my own work.

I have not copied any I have correctly cited


other student’s work in all my sources of
this assessment. information.

I have not uploaded


the assessment My referencing is
question to any technically correct,
website or App consistent, and
offering assessment congruent.
assistance.

I have not downloaded I have acted in an


my assessment academically honest
response from a way in this
website. assessment.

I have not used any AI


tool without reviewing,
re-writing, and
re-working this
information, and
referencing any AI
tools in my work.
Q1.1.
Building a Resilient and Redundant Network for Mr. Khoza’s Small Business
As Mr. Khoza's business in Midrand continues to grow, it is crucial to implement a secure,
resilient, and cost-effective network that can sustain operational efficiency in the face of both
minor technical issues and major disruptions. The current setup, where PCs and laptops rely on
3G dongles and printing is facilitated by USB cables, is not only inefficient but also susceptible
to frequent interruptions. By transitioning to a structured, resilient network, Mr. Khoza can
ensure business continuity, focus on productivity, and maintain reliable services for his
employees and customers.

Resilience and redundancy are vital for any network, but they are especially critical for small and
medium-sized enterprises (SMEs), which often have fewer resources to recover from outages.
According to Sgroi (2023), resilience in SMEs can be achieved without enterprise-level
resources if businesses understand their connectivity requirements and implement cost-effective
strategies such as diversified connectivity and proper planning (Sgroi, 2023). For Mr. Khoza’s
business, building resilience will involve assessing current infrastructure and implementing
scalable solutions that offer protection against frequent disruptions like power failures and
network outages.

Understanding Network Resilience


Network resilience refers to the ability of a network to withstand and recover from disruptions,
whether caused by technical failures, cyber-attacks, or natural disasters. A resilient network
ensures minimal downtime and continued operation even when part of the system fails.
According to Wallace (2024), network resilience is critical for businesses to maintain
functionality during widespread outages, as illustrated by the aftermath of Hurricane Helene,
which left millions without power and communications (Wallace, 2024). While Mr. Khoza’s
business may not face the same scale of disaster, planning for network resilience is vital to avoid
any prolonged interruptions that can harm business continuity.

Disaster Recovery Plan


A robust disaster recovery plan (DRP) is a cornerstone of any resilient network. It ensures that
business operations can continue in the event of a major system failure. The plan should include
regular data backups and detailed procedures for restoring lost or corrupt information. In case of
network failure, a well-defined DRP will allow Mr. Khoza’s business to quickly recover data,
reducing downtime and minimizing the impact on productivity and revenue.
As highlighted by ZPE Systems (2024), having a disaster recovery plan that incorporates isolated
recovery environments (IRE) is crucial. IRE ensures that recovery operations are insulated from
live networks, preventing reinfection by malware or interference from ongoing cyberattacks
(ZPE Systems, 2024). Additionally, the plan should specify clear responsibilities and
communication channels to ensure employees know how to act during a network failure.
Power Backup and Backup Internet Connectivity
Power outages and internet connectivity failures are common challenges in South Africa,
exacerbated by load shedding and infrastructure issues. A network designed without redundancy
in power and internet services risks frequent interruptions that can disrupt Mr. Khoza’s business
operations. To mitigate this, installing uninterruptible power supplies (UPS) and backup
generators will ensure that the network remains operational during power outages.
SEACOM (2024) emphasizes the importance of diversified connectivity and backup power
systems to prevent costly downtime during outages (SEACOM, 2024a). By having multiple
backup connections and power sources in place, businesses can maintain service continuity even
during prolonged power cuts, which are increasingly common in South Africa. The ability to
seamlessly switch to backup power and maintain internet connectivity is crucial for minimizing
disruption and ensuring that business-critical services remain accessible. Similarly, SEACOM
(2024b) highlights how enterprises can minimize the impact of power outages by incorporating
backup power solutions, such as batteries or generators, and ensuring that their connectivity
solutions are resilient enough to withstand frequent disruptions (SEACOM, 2024b).
Additionally, backup internet connectivity, such as LTE or satellite, can maintain business-
critical services when the primary connection fails. This aligns with the strategy of having
multiple, independent service providers to avoid reliance on a single connection (Sgroi, 2023).
By incorporating power and internet backups, Mr. Khoza’s business can avoid costly downtime
and maintain productivity during disruptions.

Segregation of Networks
Segregating networks is another essential factor for ensuring resilience. By creating separate
virtual local area networks (VLANs), Mr. Khoza can segment the business’s internal traffic,
isolating critical services from less important ones. For example, a dedicated network for
customer access and a separate one for business-critical operations will help prevent overloading
and protect sensitive information from unauthorized access. If one segment of the network
encounters issues, the others can continue to function, ensuring that disruptions are contained
and do not affect the entire system.
According to Sgroi (2023), using technologies like SD-WAN to create segmented networks
improves both performance and security, especially in small businesses where resources are
limited (Sgroi, 2023). Segregation also allows for more efficient management of bandwidth and
resources, ensuring that the most critical operations always have access to the necessary network
capacity.

Cloud-Based Infrastructure
Adopting cloud-based infrastructure provides flexibility, scalability, and redundancy, ensuring
that critical data and applications are always accessible. Cloud solutions enable businesses to
store data offsite, reducing the risk of data loss due to local hardware failure. Furthermore, cloud
services allow for easy scalability as the business grows, without requiring significant
investments in on-premises hardware.
Cloud infrastructure also supports remote work capabilities, allowing employees to access
business systems from any location, a necessity highlighted by the shift to remote work during
the COVID-19 pandemic. ZPE Systems (2024) and SEACOM (2024a) emphasize the
importance of cloud-based services in modern business operations, noting that cloud solutions
provide a more resilient environment compared to traditional on-site servers (ZPE Systems,
2024; SEACOM, 2024a). With Mr. Khoza’s business relying on cloud services, network issues
at the physical location will have a reduced impact, as critical operations can continue through
the cloud.

Centralized Network Monitoring


Centralized network monitoring provides real-time visibility into network performance, allowing
issues to be detected and resolved before they escalate into major disruptions. For Mr. Khoza’s
business, implementing centralized monitoring tools will ensure that any network problems—
such as bandwidth bottlenecks or security breaches—are quickly identified and addressed.
According to ZPE Systems (2024), monitoring is a key component of network resilience,
ensuring that teams have the information they need to manage network traffic, detect
vulnerabilities, and respond swiftly to outages (ZPE Systems, 2024). This approach also aligns
with best practices for maintaining control over a growing and complex network, especially
when critical services are involved.

Scalable Infrastructure
Scalable infrastructure is essential for accommodating future business growth without the need
for a complete network overhaul. By designing a network that can easily expand, Mr. Khoza’s
business will be able to integrate new devices, services, and applications as needed.
As highlighted by SEACOM (2024a), scalable infrastructure is key to ensuring that a network
can meet both current and future demands, allowing businesses to adapt to changing conditions
without sacrificing performance or security (SEACOM, 2024a). By planning for scalability from
the outset, Mr. Khoza can avoid costly upgrades and ensure that the network remains resilient
and adaptable over time.

Conclusion
By implementing the six key factors discussed—disaster recovery planning, power and internet
backups, network segmentation, cloud-based infrastructure, centralized network monitoring, and
scalable infrastructure—Mr. Khoza can build a secure, resilient, scalable network that minimizes
downtime and ensures business continuity. Each of these elements plays a critical role in
ensuring that the network can adapt to and recover from disruptions, thereby safeguarding
business operations in the face of both technical failures and external challenges.
Given the current challenges in South Africa’s connectivity landscape, from frequent power
outages to the rising costs of reliable internet, small businesses like Mr. Khoza should invest in
resilient network solutions. As demonstrated by the global response to recent disasters like
Hurricane Helene, resilience is not a luxury but a necessity for modern businesses (Wallace,
2024). By taking these steps, Mr. Khoza can ensure that his business will remain competitive,
productive, and prepared for future growth.

References
1. SEACOM (2024a). Improve Business Resilience through Modernised Networking
Infrastructure. SEACOM. Available at: https://seacom.co.za/news/improve-business-
resilience-through-modernised-networking-infrastructure
2. SEACOM (2024b). Working in the Dark: How SA Enterprises Can Minimise the Impact
of Network Outages. SEACOM. Available at: https://seacom.co.za/news/working-in-the-
dark-how-sa-enterprises-can-minimise-the-impact-of-network-outages
3. Sgroi, E. (2023). What SMEs Need to Know about Connectivity Resilience. IT News
Africa. Available at: https://www.itnewsafrica.com/2023/07/what-smes-need-to-know-
about-connectivity-resilience/
4. Wallace, B. (2024). Hurricane Helene Communications Outages Show Need for Greater
Network Resilience. Network Computing. Available at:
https://www.networkcomputing.com/network-resilience/hurricane-helene-
communications-outages-show-need-for-greater-network-resilience
5. ZPE Systems (2024). Network Resilience: What is a Resilience System? ZPE Systems.
Available at: https://zpesystems.com/network-resilience-zs/

Q1.2.
Ten Principles of Network Design for Mr. Khoza’s Small Business
As Mr. Khoza's business grows, the current network, relying on 3G dongles and USB-connected
printers, is no longer sufficient. The business needs a secure, resilient, and scalable network to
support 30 devices, including 15 desktops, 7 laptops, 2 servers, and 4 BYOD devices. Visitors
also require Wi-Fi access, and users need to print seamlessly. This report outlines ten network
design principles that a network designer should follow for Mr. Khoza's business, ensuring both
current specifications and future scalability are addressed.

1. Understand the Existing Network Requirements

The existing network setup is based on individual 3G dongles, which provide slow and
unreliable internet, while printing is done through manual USB connections. To address these
inefficiencies, it is essential to assess current bandwidth usage, traffic patterns, and how devices
connect to the network (Sgroi, 2023). The projected network will be based on a centralized wired
and wireless infrastructure using Ethernet switches and Wi-Fi access points. This will facilitate
shared internet access, enable networked printing, and provide the foundation for future
scalability.

2. Design for Scalability

The new network must support future growth. While the current network supports 22 devices,
the projected network will need to handle 30 devices with the ability to scale further. The use of
modular switches, such as a 48-port gigabit switch, will allow for additional desktops and laptops
as the business expands (SEACOM, 2024a). Scalable routers and firewalls will be used to
accommodate additional internet traffic and secure new devices, ensuring that Mr. Khoza’s
network grows without the need for major hardware replacements.

3. Implement Redundancy

Redundancy is essential for minimizing downtime. Currently, the network does not have backup
power or internet options. Implementing uninterruptible power supplies (UPS) and a secondary
internet connection, such as LTE or satellite, will ensure that the business remains operational
during power outages and ISP failures (SEACOM, 2024b). The network will automatically
switch to backup systems during disruptions, preventing downtime during load shedding or other
connectivity issues, ensuring seamless business operations.

4. Use VLANs for Network Segmentation

Network segmentation using VLANs will improve both security and performance. Currently, the
network lacks any form of segmentation, which exposes all devices to the same risks. The new
network will use VLANs to separate business-critical functions from guest Wi-Fi and BYOD
devices (Sgroi, 2023). This ensures that guests can access the internet without gaining access to
internal business data, and critical functions such as servers and employee devices are prioritized
in terms of bandwidth and security.

5. Centralized Network Monitoring

The new network will require centralized monitoring to ensure optimal performance and
security. Centralized monitoring tools will provide real-time visibility into network traffic,
device health, and potential security threats (ZPE Systems, 2024). This is critical for ensuring
smooth operations, particularly during peak usage times or when network performance is
stressed. Alerts for bandwidth issues or unauthorized access attempts will enable quick responses
to maintain network reliability.

6. Adopt Cloud-Based Solutions

Currently, Mr. Khoza’s business does not use cloud-based services. By adopting cloud-based
infrastructure, such as remote data storage and cloud backup, the business can reduce the risk of
data loss due to local hardware failures (ZPE Systems, 2024). Cloud-based applications will also
improve collaboration, allowing employees to access important files from anywhere, which is
particularly valuable as the business grows or introduces remote work options.

7. Ensure Proper Security Measures

Currently, the network lacks comprehensive security protocols, leaving it vulnerable to threats.
The new network will include a next-generation firewall (NGFW), WPA3 encryption for
wireless connections, and VPNs for secure remote access (SEACOM, 2024a). These measures
will protect against unauthorized access and data breaches, ensuring the integrity of both internal
and external network traffic. Multi-factor authentication will add an additional layer of security
for sensitive data and applications.

8. Prioritize High Availability

High availability ensures that the network remains operational under all conditions. This is
particularly important for Mr. Khoza’s business, which relies on uninterrupted internet access for
communication and transactions. High availability will be achieved through the use of multiple
ISPs and load balancing (Wallace, 2024). If one ISP fails, the system will automatically switch to
another, ensuring uninterrupted service. Load balancing will distribute network traffic to prevent
any single device from becoming overwhelmed.

9. Use a Modular Design

A modular network design simplifies future upgrades and troubleshooting. The current network
lacks this structure, making it difficult to manage. By organizing the projected network into
functional modules, such as core, distribution, and access layers, the new network will be easier
to expand and troubleshoot (Sgroi, 2023). For instance, if an issue arises with guest Wi-Fi, it can
be isolated and resolved without affecting the rest of the network.

10. Documentation and Maintenance

Proper documentation of the network's design and configuration is essential for long-term
success. The current network lacks any formal documentation, making troubleshooting and
upgrades more challenging. The new network will include detailed documentation of all devices,
IP address schemes, security policies, and network diagrams (ZPE Systems, 2024). This will
streamline network maintenance and future expansions, reducing downtime and the likelihood of
errors during upgrades or changes.

Conclusion

Network systems must be designed to meet both qualitative and quantitative performance
requirements. Qualitative requirements, such as correct operation, work conservation, and in-
order packet delivery, ensure the network functions reliably and maintains data integrity
(Serpanos & Wolf, 2011). For example, Mr. Khoza's projected network must support real-time
applications like video conferencing without packet loss or jitter. Quantitative requirements, such
as throughput, delay, jitter, and packet loss, must also be carefully managed. Throughput will
need to be maximized to support multiple users and devices, while delay and jitter must be
minimized to ensure smooth operation of services such as VoIP and video streaming (Serpanos
& Wolf, 2011). The use of robust switches and routers capable of handling high throughput and
low latency is critical for meeting these requirements.

By adhering to these ten network design principles—understanding the existing network,


designing for scalability, implementing redundancy, using VLANs for segmentation, centralizing
network monitoring, adopting cloud solutions, ensuring security, prioritizing high availability,
using a modular design, and maintaining proper documentation—Mr. Khoza’s business can
transition to a secure, resilient, and scalable network. This network will address the current
inefficiencies and ensure the business can grow while maintaining optimal performance and
reliability.

References

1. SEACOM (2024a). Improve Business Resilience through Modernised Networking


Infrastructure. SEACOM. Available at: https://seacom.co.za/news/improve-business-
resilience-through-modernised-networking-infrastructure
2. SEACOM (2024b). Working in the Dark: How SA Enterprises Can Minimise the Impact
of Network Outages. SEACOM. Available at: https://seacom.co.za/news/working-in-the-
dark-how-sa-enterprises-can-minimise-the-impact-of-network-outages
3. Sgroi, E. (2023). What SMEs Need to Know about Connectivity Resilience. IT News
Africa. Available at: https://www.itnewsafrica.com/2023/07/what-smes-need-to-know-
about-connectivity-resilience/
4. Wallace, B. (2024). Hurricane Helene Communications Outages Show Need for Greater
Network Resilience. Network Computing. Available at:
https://www.networkcomputing.com/network-resilience/hurricane-helene-
communications-outages-show-need-for-greater-network-resilience
5. ZPE Systems (2024). Network Resilience: What is a Resilience System? ZPE Systems.
Available at: https://zpesystems.com/network-resilience-zs/
6. Serpanos, D., & Wolf, T. (2011). Architecture of Network Systems. Morgan Kaufmann.

Q1.3.
Figure 1. LAN diagram for the small business (Blown up version attached at the end of file)

The LAN network for Mr. Khoza's business will be designed with secure infrastructure that
incorporates a firewall connected to the main router to ensure network security. This firewall will
filter traffic and protect the internal network from external threats. The network will include
switches for each of the four office spaces, which will connect the desktops, printers, and servers
in those rooms, while wireless access points (WAPs) will be installed to provide wireless
coverage for laptop spaces. This setup will provide both wired and wireless connectivity,
allowing seamless communication between devices.

In each room, printers will be connected either to the room’s switch for wired connections or to
the WAPs for wireless printing. This ensures that all users, whether on wired desktops or
wireless laptops, can print easily without transferring files via USB drives. The network will
support a total of 30 devices, including desktops, laptops, servers, and BYOD devices, with
ample capacity to add more in the future.

Wireless access points in the laptop spaces will provide stable and secure Wi-Fi for employees,
while guest devices such as those from customers and suppliers will also be able to connect
through a segregated guest network. This ensures visitors can access the internet without posing
a security risk to the internal business systems. The separation of networks through Virtual Local
Area Networks (VLANs) will help to prioritize business-critical functions, such as file servers,
while ensuring visitors and less critical traffic do not impact network performance.
This design also solves Mr. Khoza’s existing issues. Instead of relying on 3G dongles for internet
connectivity, all devices, whether wired or wireless, will connect to a unified network via the
main router and WAPs, greatly improving efficiency. The introduction of centralized printing in
each room connected to the local switch or WAP will streamline the printing process,
eliminating the need to manually transfer files for printing. Guest Wi-Fi will ensure that visitors
can access the internet, enhancing their experience without compromising business security.

The network’s scalability is ensured by using switches and WAPs that can support additional
devices as the business grows. Each switch will manage the network traffic within its office
space, while the wireless access points will support more devices over time without the need for
a major overhaul. Security is enhanced by the inclusion of the firewall and VLANs, which
isolate different segments of the network to prevent unauthorized access to sensitive business
data.

Cost efficiency is achieved by centralizing internet access and printing capabilities, removing the
need for individual internet dongles, and streamlining management. Additionally, by
implementing a firewall and security protocols, the network will be protected from external
threats, reducing the risk of breaches. The inclusion of backup power (UPS) and alternative
internet options (such as LTE) ensures that the network will remain operational even during
power outages, safeguarding against lost productivity during load-shedding events.

Assumptions:

• Office Space Layout and Cabling: It is assumed that each office space is physically
conducive to installing network switches and running Ethernet cables to the desktops,
servers, and printers. Cabling infrastructure should support Cat 6 Ethernet cables to
ensure high-speed and stable data transmission. Additionally, power outlets are assumed
to be available for network devices such as switches, printers, and wireless access points
(WAPs).
• Internet Service: It is assumed that the business has access to a reliable high-speed
internet service provided by an ISP capable of supporting the required number of devices
and bandwidth demands. The design includes backup internet solutions such as LTE or
satellite to ensure continuous connectivity during ISP outages, assuming that these
services are available in the Midrand, Gauteng area.
• Firewall and Security: It is assumed that the firewall included in the design is capable of
handling the traffic load generated by the 30 connected devices and can manage VLANs
for segmentation of internal and guest traffic. The firewall is also assumed to include
essential security features such as intrusion detection, VPN support, and access control.
• Network Growth: It is assumed that the network will need to support future expansion,
meaning that the switches and WAPs have additional capacity to support new devices
beyond the current 30. This assumption ensures scalability and minimizes future network
redesign costs.
• Device Capabilities: It is assumed that all devices (desktops, laptops, printers) are
network-capable, either through Ethernet or Wi-Fi, and can connect to the network via
the switches or WAPs without requiring additional hardware upgrades.
• Printing Requirements: It is assumed that network printing is sufficient for the
business's needs, and the existing printers will work seamlessly in a networked
environment. This assumes that the printers have either built-in network functionality or
can be connected via Ethernet or Wi-Fi.
• Power Infrastructure: It is assumed that the office space has a reliable power supply,
with access to backup power options like uninterruptible power supplies (UPS) or
generators, particularly to mitigate the impact of load-shedding events. The design
assumes that there is no significant disruption to power supply that cannot be mitigated
by the proposed backup solutions.
• Wi-Fi Coverage and Performance: It is assumed that the two WAPs are sufficient to
provide adequate wireless coverage across the entire office space, including the laptop
areas and guest access areas. The design also assumes that the WAPs can handle the
required traffic and number of connected devices without performance degradation.

Each desktop computer in the office spaces will be connected via Cat 6 Ethernet cables to the
corresponding switch in that room. These switches will handle the traffic generated by the
desktops and route it either to other devices on the network or to the main router for internet
access. The switches are designed to manage multiple connections at the same time, providing
high-speed communication between connected devices.

Each switch will be connected to the main router via Cat 6 Ethernet cables. The main router acts
as the central point of the network, directing traffic between the various devices and managing
internet access. The router will handle requests from both wired and wireless devices, ensuring
that all connected devices can communicate with each other and access the internet without
issues.

In the offices where wired printers are installed, the printers will also be connected via Cat 6
Ethernet cables to the room’s switch. This setup allows all devices within the network, whether
wired or wireless, to print directly without needing to move files between devices manually.
These networked printers will be accessible to all users on the LAN, improving efficiency.

Employees using laptops or mobile devices will connect to the business Wi-Fi network broadcast
by the WAPs. The WAPs will ensure strong and stable Wi-Fi coverage, allowing employees to
move between rooms without losing connectivity. These devices will use WPA3 encryption to
ensure a secure connection and prevent unauthorized access.

BYOD devices, such as smartphones or tablets belonging to employees, will connect to the
internal Wi-Fi network in the same way as laptops. However, guest devices, such as those
belonging to customers or suppliers, will connect to a segregated guest Wi-Fi network. The guest
Wi-Fi will be hosted on a separate VLAN to prevent unauthorized access to internal resources
while still allowing internet access. The WAPs will handle both the internal and guest traffic,
ensuring that each network remains isolated for security purposes.

With the WAPs properly placed, employees will have the ability to move between rooms with
their wireless devices (laptops, tablets, etc.), and the WAPs will handle the handoff of devices
between access points without any disruption to service. This ensures seamless Wi-Fi coverage
and a consistent connection, whether they are in the laptop work areas, meeting rooms, or even
in guest-facing areas.

Q1.4.

Figure 2. WAN Diagram


The WAN configuration for Mr. Khoza's business integrates the use of multiple routers
connected to a centralized cloud, representing the ISP, and includes a separation between the
office building, a VLAN network created by wireless access points (WAPs), and any cloud-
based productivity solutions. The central cloud (ISP) represents the central point where all
internet services are provided to the business. This setup is crucial as it forms the backbone of
Mr. Khoza's WAN, providing seamless connectivity for all internal and external services,
including both wired and wireless access.

The first router is connected to the office building’s main network, acting as a gateway between
the LAN and the ISP. All internal devices such as the desktops, printers, and servers
communicate through this router to the broader internet. This ensures that the devices within the
office building maintain a stable and high-speed connection to external resources while allowing
data transfer between the internal devices. This router manages all internal traffic, enabling Mr.
Khoza’s employees to collaborate efficiently, share files, and access necessary online services,
including software tools and communication platforms.

The second router connects to a VLAN that has been created for wireless devices via WAPs.
This VLAN segregates the wireless network, ensuring that employees using laptops, BYOD
devices, or mobile phones remain connected without interfering with the primary wired LAN.
Additionally, this VLAN handles guest Wi-Fi access, allowing visitors to connect to the internet
without compromising the security of the business’s internal systems. By separating wireless
traffic from wired traffic, the network maintains strong performance and security, ensuring
sensitive business operations are unaffected by guest or wireless traffic.

The third router connects to the cloud-based solutions, which represent any external productivity
tools or services Mr. Khoza’s business may adopt, such as cloud storage or collaboration
platforms. These services operate on a separate server, providing secure and reliable access to
critical business data and tools. By keeping the cloud-based services on a separate router, the
network ensures that external cloud interactions are efficiently managed and do not overload the
internal office network. Employees can access cloud resources remotely or from within the
office, ensuring flexibility and continuity in operations, even during power outages or local
server failures.

This WAN setup solves Mr. Khoza’s current connectivity problems by providing a unified,
reliable internet access point for all devices, whether connected through wired LAN, wireless
VLAN, or external cloud services. It ensures that all users in the office can seamlessly print,
access the internet, and collaborate on internal and cloud-based projects. The separation between
wired and wireless networks, combined with robust cloud solutions, guarantees security,
scalability, and business continuity, ultimately addressing the inefficiencies in the previous
network configuration while laying the foundation for future growth.
Legend

LAN Diagram:

Switch
Internet PCs

Firewall
Wireless Access Point
Visitors' Mobile Phones

Router
Laptop

Unlimited Power Supply (UPS)


Server
BYOD

You might also like