Mr. Khoza runs a small business in Midrand, Gauteng. His business has been steadily growing since

its inception in February 2019 in spite of the ill-effects of the COVID-19 lockdowns as well as the
ripple effects of the economic issues and financial markets such as rising fuel prices and inflation.
He, Mr. Khoza, has asked you to design a secure network for his small business. Additionally, he
would like you to design and build a cost-effective network for his business.
The current setup is such that every PC and laptop user uses a 3G dongle to connect to the Internet.
When users need to print, they either copy the work that needs to be printed to USB flash drives
or email their work to any one of the five users whose PCs are attached to a printer – all printers
connect via USB cables.
The new network, according to Mr. Khoza, should cater to at least thirty devices, fifteen desktops
(PCs), seven laptops including Mr. Khoza’s laptop, two servers and four BYOD devices. Additionally,
Mr. Khoza wants to allow visitors such as customers and suppliers to connect mobile devices to get
Internet connectivity. All users with PCs and laptops should still be able to print.
The premises where Mr. Khoza runs his business has six offices (rooms). All the rooms are located
on the same floor. Mr. Khoza has an office and does not share office space. There are two open�plan offices, the first open-plan office houses seven desktops and the remainder of the PCs are
housed in the second open-plan office. Two laptop users share an office while the other three
laptop users share a separate office. A small storeroom has been selected for use as a server room.

Using examples, write a report to discuss ten principles of network design that you
can recommend to a network designer to follow when designing Mr. Khoza’s
network. In your answer, each example must show evidence that you have applied
the scenario to both the specifications of the existing network and the projected
network.
• The report must be at least three pages and must not exceed five pages,
excluding diagrams.
• Reference all the sources including in-text referencing

A. The discussion identifies ten adequate principles.

B. The discussion adequately explains each principle
recommended.

C. Each example adequately shows evidence that the scenario is
applied (both the specifications of the existing network and the
projected network).

Introduction:

Designing a secure and cost-effective network for Mr. Khoza's small business requires careful consideration of the existing network setup and the projected requirements. In this report, I will discuss ten principles of network design that can be recommended to a network designer when designing Mr. Khoza's network. Each principle will be explained and examples will be provided to show how they can be applied to both the current and projected network.

1. Scalability:
Scalability is the ability of the network to accommodate future growth and changes in Mr. Khoza's business. In the current network, there are fifteen desktops, seven laptops, two servers, four BYOD devices, and the need to connect mobile devices for visitors. By designing a network that can handle at least 30 devices, we ensure that the network can easily accommodate future expansion. This can be achieved by using switches with enough ports, ensuring sufficient bandwidth, and implementing virtual LANs (VLANs) to segregate traffic.

2. Reliability:
Reliability is crucial for Mr. Khoza's business to ensure continuous operation and minimize downtime. In the current network, users rely on individual 3G dongles for internet connectivity, which can be unreliable and prone to connection issues. By implementing a dedicated internet connection such as fiber optic, cable, or DSL, the network can provide a more stable and reliable internet connection for all users.

3. Security:
Security is of utmost importance to protect Mr. Khoza's business data and sensitive information. In the current network, users connect to the internet through 3G dongles, which may not provide adequate security measures. By implementing a firewall, antivirus software, and encryption protocols, the network can ensure that data transmission is secure, and unauthorized access is prevented. Additionally, setting up separate VLANs for visitors can isolate their devices from the internal network, further enhancing security.

4. Centralized Management:
Centralized management simplifies network administration and maintenance. Currently, the printers are connected to individual PCs via USB cables, making it difficult to manage and control print jobs. By implementing a print server, all printers can be connected to the network, and users can print directly from their devices without the need for USB flash drives or email transfers. Centralized management also allows for easier implementation of security measures and software updates.

5. Redundancy:
Redundancy is essential to ensure business continuity in the event of a network failure. Currently, there is no backup plan in case of internet or system failures. By implementing redundant internet connections, such as a secondary ISP or failover routers, the network can continue to operate even if one connection fails. Redundant servers and storage devices can also be implemented to minimize data loss and downtime in case of hardware failures.

6. Quality of Service (QoS):
QoS ensures that critical network traffic, such as VoIP calls or video conferencing, receives priority over less important traffic. Currently, there is no prioritization of network traffic, which may lead to poor call quality or video buffering. By implementing QoS policies, the network can prioritize critical traffic and allocate bandwidth accordingly, ensuring a smooth user experience for real-time applications.

7. Wireless Coverage and Capacity:
As BYOD devices and visitor connectivity are introduced in the projected network, it is important to ensure adequate wireless coverage and capacity. Currently, there is no provision for wireless connectivity. By installing multiple access points strategically throughout the premises and using wireless controllers to manage and optimize network performance, all users can have reliable and high-speed wireless access.

8. Network Segmentation:
Network segmentation improves network performance and security by dividing the network into smaller, more manageable segments. Both in the current and projected network, implementing VLANs to separate different user groups and devices can enhance security and prevent unauthorized access. For example, creating separate VLANs for employees, servers, and visitors can ensure that each group has limited access to resources.

9. Backup and Disaster Recovery:
A robust backup and disaster recovery plan is crucial to protect Mr. Khoza's business data and ensure quick recovery in case of a disaster. In the current network, there is no dedicated backup and disaster recovery strategy. By implementing regular automated backups and storing backups in off-site locations, the network can ensure that data can be restored in case of hardware failures or data loss.

10. Future Proofing:
Future-proofing the network ensures that it can adapt to emerging technologies and trends. In the projected network, it is important to consider potential advancements that may impact Mr. Khoza's business, such as cloud services or IoT devices. By implementing a flexible and scalable network architecture, Mr. Khoza can easily incorporate these advancements without significant reconfiguration or infrastructure changes.

Conclusion:

Designing a secure and cost-effective network for Mr. Khoza's small business requires following ten key principles of network design. By considering scalability, reliability, security, centralized management, redundancy, QoS, wireless coverage, network segmentation, backup and disaster recovery, and future proofing, the network can meet the current and projected requirements of the business. By implementing these principles, Mr. Khoza can ensure a robust and efficient network that supports his business growth.