America One Car Dealership Network Design


Institution Affiliation:

America One Car dealership network design

Networkdesign for AOC proposal

The standard description of how messages are transmitted from onepoint to another is known as the Open Systems Intersection (OSI). Thepurpose of this model is to advise the implementer of the network onhow to install their infrastructure to work with the router switch.The document is also helpful to service providers (ISP) for the samepurpose.

In the model, seven stages of functions will take place at eitherends of the communication line. According to Saxena (2014), thefundamental concept of the OSI is that there the processes ofcommunication at either ends of the layers are dependent in terms offunctioning and specialty. This is the unique factor about thistelecommunication model.

These layers shall act as host to the users on the entire network.The flow of information shall also follow a certain direction andprotocol. For instance, a signal sent from one user to another willflow down from one layer to another in the network system. In thelong run, when the signal reaches the last computer on the line, areverse direction flow of data takes place, until it finally reachesthe end user. AS earlier describes, one of the function of the OSI isto divide the telecommunication into seven layers, which are in turngrouped into two groups, the upper and lower layers. The latter isused when a signal is sent from one user to the other, while the restare used when a signal is sent to the host machine. For protocolpurposes, all signals that are sent to this machine are passed on tothe upper layers. All the other messages, not meant to be passed tothe host machine, are relayed to another host, instead of beingtransmitted to the upper layers as described.

Physical layer completion

There are two main physical layers, the physical layer and the dataLink Layer. This section addresses the completion both layers. Forthis model (OSI model), the table below shows the cost of theappliances of the physical layer, as well as the necessaryinformation for the enterprise Local Area Network (LAN).



Analog broadband cable (Coaxial)

1500 M

Ethernet cable

1500 M

Fiber optics

1500 M

Twisted pair

1500 M

Local Area Network

5 WT

Wireless transmission

6 WT


25 modems



Broadband ISDN

4 Circuits





Data Link Layer appliances

Thetable below lists the specifications of the Layer 2.

Thecompany has the freedom to choose any topology, depending on theirdemands and further advice.



WNP (802.11 a/b/g)

One of the advantages of the WNP is that it offers mobility advantages. It does away with the need for wiring, which is characteristics of the Ethernet cables. WI-FI (WIreless FIdelity), as it is commonly referred to as in modern practice. There are possibilities of internet speeds of up to 12 Mbps for a range of up to 200 meters.

Asynchronous Transfer Mode

With the possibility of reaching up to 11 Gbps, the pre-specified rates for this particular option are either 155.52 Mbps or 622.08 Mbps.


This is the simplest standard, which describes the connection of computers on a Local Area Network.

Token Ring

AS the name suggests, this refers to the standard whereby data is sent from one machine to the next, until it gets back to the starting point.

Network storage

For the project of this magnitude, Chang et al (2012) say that thereis need to specify a Network-Attached Storage (NAS) that isdistinguished from file servers. In this project, IBM’s DTE/DCE NASwill be used, given that it high speed. There are a number ofelements that make support its proposal. First, the system has adigital signaling interface which describes how each user on thenetwork communicates with the host, and how signals are exchangedwithin the entire system. These enhance security by upholdingprotocol (Tarasov et al, 2013). Additionally, DTE is able to detectand provide logs for the transfer of every bit in the system.


Virtual Private Networks (VPN) are the best solution to security oncorporate networks (Kappes, 2013). VPN also ensures that data, voiceand video signals can be transmitted safely through a secured networkchannel. There are a number of features that come along with the VPNtechnology. These are encryption, certified connection, identityprotection and protocol tunneling (Nielsen &amp Hacker, 2012). Atthe same time, VPN provides improved scalability and costeffectiveness. As for the administrator, VPN allows for the blockingof websites that are not necessary or bypassing internet filters. VPNis also reduces the bulk of logistics, as they is no need for harddrive connection. The secured communication option that comes alongwith it ensures that the company’s sensitive information is keptsecure.

There shall also be implementation of group policy. This ensures thatall the users on the network follow certain laid down rules which areset by the organization’s administration. Having a central controlunit, which is attached to a windows domain, all commands andprotocols can be wired to the host computer and keep a record of theregistry. Below is the justification of the security options for thisnetwork

  1. There is need for every organization to arrange and set for security demands for the IT department.

  2. There has to be a guaranteed web server application for arranging security needs of the organization.

  3. There has to be proper protection from intruders or unauthorized access.

There are a number of steps that will be followed in ensuring theintegrity of the Web server’s security. First, there shall belogging of all activities over the network, such as log in, dataaccess and storage. There should also be regular backing up of data,incase of unexpected system shutdowns or power breakouts. Theadministrator shall also keep a legitimate duplicate of the network’sweb content, to ensure that no illegal activities go on. Finally,tests shall be used to apply fixes to the network.

Visio diagram

Thediagram below is a simplified networking model for America One CarCompany.


The above proposal has outlined the hardware and softwarespecifications for America One Car network. In order to uphold theintegrity of the system, security procedures and user protocols havebeen identified. Given the nature of the company’s operation andsize of the network VPN has been recommended. Other factors such asmalware and viruses that can cause harm to the system have been dulyaddressed. The cost of the entire project is subject to change.


Chang, H., Kodialam, M., Lakshman,T. V., Mukherjee, S., &amp Wang, L. (2012, April). Building accessoblivious storage cloud for enterprise. In&nbspProceedingsof the 2nd USENIX conference on Hot Topics in Management of Internet,Cloud, and Enterprise Networks and Services&nbsp(pp.5-5). USENIX Association.

Kappes, M. (2013). Virtual PrivateNetworks (VPN). In&nbspNetzwerk-undDatensicherheit&nbsp(pp.197-227). Springer Fachmedien Wiesbaden.

Nielsen, J., &amp Hacker, T.(2012, November). Using Virtual Private Networks for Reliable VMBased HPC Systems. In&nbspHighPerformance Computing, Networking, Storage and Analysis (SCC), 2012SC Companion:&nbsp(pp.1226-1233). IEEE.

Saxena, P. (2014). OSI ReferenceModel A Seven Layered Architecture of OSI Model.&nbspInternationalJournal of Research,&nbsp1(10),1145-1156.

Tarasov, V., Hildebrand, D.,Kuenning, G., &amp Zadok, E. (2013, February). Virtual machineworkloads: the case for new benchmarks for NAS. In&nbspFAST(pp. 307-320).