Download Network Design Proposal

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Wireless security wikipedia , lookup

Computer security wikipedia , lookup

Computer network wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Distributed firewall wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Transcript
Running Head: Network Design Proposal
Network Design Proposal
Student’s Name
Professor’s Name
UNIVERSITY OF MARYLAND
Course Title
0
Running Head: The New Network Layout Proposal
1
Physical Network Design
Network Topology
This paper seeks to present a detailed proposal for network design by analysing the
proposed network arrangement including the networking infrastructure. It includes herein the
analysis of the physical topology that aides the establishment of a network layout as per the
business needs of a company or organization such as University of Maryland. In such a
setting, data security for students and teachers must be achieved through the network
arrangement. The new network system must consider the possibility of departmental and nonnetwork infrastructural expansion such as laboratories and libraries. This therefore makes this
proposal very useful for the above mentioned University. (Stewart, 2008)
The diagram below is an illustration of the general network topological layout
containing a protected system connection within the college campus.
Running Head: The New Network Layout Proposal
2
Business Needs
The Cisco Enterprise IT Business Specialist Association provides IT professionals
with innovative skills that help them improve their business output. The skills acquired
through the membership of the above association help in:

Assessment of all the viable technological alternatives within a business
connection

Evaluation of all the possible avenues of meeting the business needs.

Courteous conduct towards business peers.

Acquisition of knowledge regarding IT arrangement's (ROI) and (TCO) (Eernet,
n.d)
Proposed topology
The system documentation is generally concise at its establishment. This however
changes with time making the system more sophisticated. To maintain the briefness and
comprehension of the system documentation, it needs to be redesigned over time. Every
System Topology Map presents a unique floor arrangement. This means that any changes in
the floor arrangements must be accompanied by appropriate markings to indicate the
alterations. The changed layout must be organized and well presented. An as-assembled
outline provides the manual that helps in the determination of how a system was actually
created thereby aiding in any further alteration. The existing documentation reflects the asmanufactured floor arrangement and includes all system topology changes.
Running Head: The New Network Layout Proposal
3
(Cisco.com)
Justification for proposed network topology
The Cisco Services is a global organization comprised of over 9,500 workers
operating in more than 120 countries throughout 380 locations. It has a trusted public image
emanating from its best practices; industry-based technological developments and brilliance.
Cisco maintains various network emergency response vehicles (NERV)’s that are deployed
by the Cisco employees in case of natural disasters or public crises. Cisco Enterprise Services
helps the companies to seize the opportunities of tomorrow by providing amazing networks
and connections. (Cisco.com, 2016)
Running Head: The New Network Layout Proposal
4
Network Media
Network media refers to the over which electrical data signals travel from one site to
another within the campus or an organization. Network media basically refers to
communication channels among devices that share data within a network. Twisted pair
cables, coaxial cables, wireless and fibre-optic cables are the most widely applied network
media. All the above types of network media have unique characteristics useful in different
environments. Star topology is commonly used in offices and homes. (Cisco Systems, Inc.,
2016.).
Business Needs
The desire to increase efficiency and productivity, improve on coordination,
streamline operations and minimize operational costs has led to the migartion from analogue
systems to what is now known as Green IT. The Green IT helps the organizations to work
more efficiently, optimize their infrastructure and achieve environmental sustainability. This
therefore further emphasizes the importance of investment in proper network infrastructure
that will optimize performance and avoid network break-downs.
The established network system must therefore meet the requirements and the scope
of media and system applications. All business applications require the utilization of
appropriate system hardware to achieve business efficiency. IT solutions and network
structure responds to the changes more quickly and improves the ways the businesses
manage, share and use knowledge in their business. System applications are designed to meet
the specific user needs and to improve productivity and to perform the business functions
accurately. (cisco.com)
Running Head: The New Network Layout Proposal
5
Proposed Network Media
The different-levelled diagram above uses the building square approach which utilizes
a quickly directed focus framework layer upon which distinctive free movement pieces are
joined. The course pieces incorporate 2 layers of switches namely; genuine assignment
centers which operate in the capacity of aggregators as well as wiring closet switches.
Justification of selected network media
All the systems that utilize the 3rd layer exchanging access within their pieces of
appropriation are advised that an inclusive direction convention requires actualization as
grounds Interior Gateway Protocol (IGP). This helps in achieving more efficient merging,
Running Head: The New Network Layout Proposal
6
effective recovery from interior failures, improved reasoning as well as adaptation to
configurations which utilize static direction or outlines that influence steering conventions.
Network Devices
Business Network Devices
Setting up a business network device infrastructure has become easier over the years
with the improvement of network technologies. The network allows sharing of a single
broadband internet connection over multiple PC users. Once a network system has been put
in place, business organizations must afterwards purpose to initiate security measures using
security programs and firewalls that limit access to authorized personnel only and protect
against cyber attackers. (Cisco.com, 2016)
Proposed Network Devices
The following are the devices that form the core of the current system plan.
Network Switches refer to networking components used to connect devices to a
computer network through packet switching to initiate and facilitate communication among
the computers and devices within the network. A network switch is a multiport network
Running Head: The New Network Layout Proposal
7
bridge using hardware in the processing and forwarding of data. A common type is Ethernet
switches which channel data from multiple inputs port to a specific output port to deliver data
to the destination device.
Routers refer to devices that forward data packet between the components of
networks. They direct traffic on the internet. The most common routers are the office routers
which pass IP packets between computer and internet. (Sans.org).
Justification for the selected network devices
Owing to the fact that businesses have been radicalized technologically and further
advancements have been made in the quest for higher efficiency, the above mentioned
devices will aid this particular network to be at par with the rest of the world in terms
sophistication and modernity.
Network Security Devices
Business needs
Network security plan ensures that data access is limited to authorized users. The
sophistication of cyber attackers and hackers can only be challenged by a similar level of
sophistication in network security. Network security system with monitoring capabilities
gives IT organizations a powerful weapon for fighting cyber threats. Security layout requires
the incorporation of IT infrastructure describing how an organization secures its system’s
data resources. Security efficiency of a network requires the following specifications; User
identification,
programming
authentication,
secure
remote
accessibility,
authentication and suspicious incident reporting. (Pearsonhighered.com)
command
Running Head: The New Network Layout Proposal
8
Recommended Network Security gadgets
A firewall is an essential framework that can block traffic based on IP protocols, IP
address or a port number. It protects a trusted network from corruption by suspicious
networks. It does so by limiting accessibility of the resources within a network to authorized
users. Any packet seeking to go through any firewall is first verified before being let through.
Fig. A firewall arrangement in the organization or campus
Justification of the above security devices
Secure topologies are more often established by putting up a firewall. A firewall
protects a system from intrusion by malwares. It works mainly on the initial 3 layers within
the OSI model. These layers include; data link, network as well physical layers. (Swathe, n.d)
Computer Systems
Business Necessities
A PC system can be defined as connected computers sharing central storage as well as
peripheral devices including scanners, routers, and printers. Each computer within the system
Running Head: The New Network Layout Proposal
9
operates independently and maintains the capacity to communicate with all the components
of that particular system.
Proposed Computer Systems
The operating system installed on a computer affects the business particularly when
other computers are connected to the business network. PC frameworks are fundamental parts
of basically every affiliation. They make, present, and reinforce an affiliation's PC structures,
including neighborhood (LANs), wide zone frameworks (WANs), framework pieces,
intranets, and other data correspondence systems.
PC frameworks hardware and correspondence traditions have undergone evolution
over the years. The System Control Protocol evolved to the TCP/IP tradition stack in 1978. It
prevailed over the seven-layered Open Systems Interconnection (OSI) stack which was
proposed in 1977 by Worldwide Standard Organization (ISO), and which was ruled as too
complex by the Web Engineering Task Force and Organization of Electrical and Electronic
Engineers traditions stacks (Stewart, 2008)
Running Head: The New Network Layout Proposal
10
Fig: Components of new network layout
Justification of the selected components of the new layout
Paul Baron fronted a framework system that would facilitate the forwarding of
datagram between computers in a network from origin o destination. The package trading
perspective gives the quality of framework against framework center point disillusionments.
The independent coordination of datagram per center makes it possible for the datagram to
accomplish their goal even in the region of various center point frustrations.
Running Head: The New Network Layout Proposal
II.
11
Network Addresses Design
Subletting within the Network
Assessment of Business Needs
A subnet mask generally is used to determine the specific function of each gap within
an IP address. It may give off an impression of being unnecessary at first because the
underlying segments within an IP address from left to the right, for instance, 190.166.1
reliably recognize the framework, and the last digit constantly recognizes individual devices
within frameworks. Regardless, this is not of any consequence for various frameworks.
Hence the reason subnet cover is used to isolate the framework fragment of the address from
the host portion (Cisco, 2016)
Proposed Subletting
IP addressing and subletting are important elements of network systems. Subletting
allows business to prepare multiple sensible systems existing inside a solitary Class A, B, or
C system. Refusal to sublet implies that one only utilizes one system within the network
when there are multiple options for better efficiency.
Any data available on a PC system requires an exceptional ID, with each hub within
the system operating as an independent entity. Braking noteworthy systems into smaller subnetworks will be documented any such sub-network will have a unique ID. Any new
interface within the framework will have a unique IP address. Consideration the final aim of
subnetting a framework, one can increase the general distribution using bit rate of a host ID
fragment create a subnetwork ID.
Running Head: The New Network Layout Proposal
12
Justification of the network address design
Through the extension of the cover, one will have utilized three bits from the initial
host segment in creating subnets. These bits can further create additional eight subnets. Each
subnet has the potential of possessing a maximum of 32 addresses using the remaining host
ID bits. (Stewart, 2008)
III. Network Services Design
Network Services
Business Necessities
Listed below are some of the factors that necessitate investment into network services by
business organizations. The list also includes advantages thereof of acquiring such services.

Data rates keep increasing

Protocols and applications keep evolving

System implementation and testing take too long

Provision of detailed instructions together with the resources needed in the creation
and management of online computer laboratories

Provides the guidelines regarding the development of fully functional Linux network
systems with open source materials

Provides an effective, cost-efficient replacement to the traditional proprietary-based
network systems.
Creation and maintenance of a fully operational enterprise network system is not
expensive undertaking. The primary objectives of a network are to satisfy customer needs
Running Head: The New Network Layout Proposal
13
efficiently. It is important to understand the network’s architecture, topology and protocols.
(ucisa.ac.uk)
Proposed Network Services
Mentioned below are the proposed customizations needed to develop a system design
network:

Security

One central location for Backups

Hardware, Network, wirelessly scalability

Disaster Recovery

Allows the IT expert to work remotely
Justification for supporting these network services
The success of automated businesses and the efficiency of business applications
heavily rely on the availability and reliability of networks. This therefore necessitates the
installation of measures that will guarantee the network’s availability, reliability and
consistency.
Networking and communication costs are perennial concerns for organizations and
form one of the most important factors that necesitate the implementation of a new network
system design. In-house technical expertise could be better used to progress business projects
rather than manage network monitoring and availability issues. (Cisco.com)
Network Security Measures
Business Necessities
Running Head: The New Network Layout Proposal
14
In an increasingly sophisticated cyber attack-threatened environment, organizations
should secure their networks with equally sophisticated firewalls and other security measures.
With the increased growth of complex networks, network security has taken the centre stage
leading to further concerns regarding data privacy and security.
It is imperative therefore for business organizations to possess the knowledge on
securing their networks. The good thing is that there exist alternatives regarding the
implementation of functional security protection for networks.
Proposed Network Security Measures
System Security Software: Antimalware examples include such software as the Sophos
Endpoint Security Control and McAfee Protection. On the other hand application security
includes IBM Web Sphere Data Power and F5 networks Application Security Manager.
Digital identity verification can be done through Juniper networks Steel belted Radius Server.
Network Firewall: This refers to a program put in place for security purposes to protect
against external unauthorized intruders. A network firewall screens the system’s activities
and reports of any suspicious activity. It has an arrangement of guidelines connected to every
bundle. The guidelines serve as parcel clearance. Typically firewalls are installed in both
trusted and less trusted systems. In the event that an expansive system needs to be secured,
the firewall keeps running on a PC that is dormant. A firewall secures user in the system
against unapproved access.(Lewis).
Secured Wireless Network
To be able to successfully achieve network security, one must change all the preconfigured
default settings within network devices and wireless access points. Also, default passwords
must be changed and further data encryption must be done to lock out any potential hackers
and cyber criminals.
Running Head: The New Network Layout Proposal
15
Back-up or Reinforcement Solutions: System reinforcement requires a customer server
programming design. The reinforcement server lives on a brought-together server and the
reinforcement customers dwell on each framework to be supported. Advanced system
reinforcement frameworks oversee reinforcement media which are associated with the
reinforcement server through a network. Network reinforcement frameworks are considerably
more versatile and sensible than neighborhood reinforcement frameworks where tape drives
are connected to every PC framework.
Patching and Programming Maintenance: Another real security issue is to maintain the
programming through software such as Astea Alliance, MaintiMizer, Man Win, upkeep,
Fixed, Rosmiman IWMS and Net Dispatcher, etc.
Justification of the security protocols
The significance of secure networks can never be over emphasized. With an increase
in corporate cyber espionage and potential hackers, network security has become the most
important aspect of all automated business operations for protection of sensitive data.
Advantages of using network security software include the protection of customer data to
maintain confidentiality, protection against hackers who would steal vulnerable data if not
well encrypted and protection against arbitrary malicious malware that may cause system
breakdowns and data corruption.
Running Head: The New Network Layout Proposal
16
References
A. Swetha, Y. M. (n.d.). Network Security-Proposals. Network Security-Proposals.
Cisco Systems, Inc.. (2016). CCNA: Network Media Types. Retrieved from
www.ciscopress.com: http://www.ciscopress.com/articles/article.asp?p=31276
Cisco.com. (2016). Cisco Enterprise IT Business Specialist. Retrieved from www.cisco.com:
http://www.cisco.com/web/CA/learning/certifications/specialist/business/enterprise_I
T.html
Cisco.com. (2016). Cisco Enterprise Mobility Solution At-A-Glance. Retrieved from
www.cisco.com:
http://www.cisco.com/c/dam/en/us/td/docs/solutions/Enterprise/Borderless_Networks/
Unified_Access/byodaag.pdf
Cisco.com. (2016). Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready
Deployments. Retrieved from www.cisco.com:
http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/unifiednetwork-services-uns/white_paper_C11-64521.html
Cisco.com. (2016). Enterprise Data Center Topology. Enterprise Data Center Topology.
Cisco.com. (2016). IP Addressing Guide. IP Addressing Guide.
Cisco.com. (2016). Networking Basics: What You Need To Know. Retrieved from
www.cisco.com:
http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/co
nnect_employees_and_offices/networking_basics/index.html
Running Head: The New Network Layout Proposal
17
Cisco.com. (2016). Overview of a Medianet Architecture. Retrieved from www.cisco.com:
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Video/vrn.html
Cisco.com. (2016). The Strategic and Financial Justification for IP Communications. The
Strategic and Financial Justification for IP Communications.
Ernet. (n.d.). computer networks. Retrieved from ernet:
http://www.ernet.in/services/cwnetwork.html
Kenneth D. Stewart III, A. A. (2008). Designing and Supporting Computer Networks.
Designing and Supporting Computer Networks.
Lewis, A. (n.d.). Best Network Security Measures. Retrieved from go.limeleap.com:
http://go.limeleap.com/community/bid/281578/Best-Network-Security-Measures
Pearsonhighered.com. (n.d.). Exploring the Enterprise Network Infrastructure.Exploring the
Enterprise Network Infrastructure.
Sans.org. (n.d.). Network Security- A Guide for Small and Mid-sized Businesses. Network
Security- A Guide for Small and Mid-sized Businesses.
Ucisa.ac.uk. (n.d.). ITIL – Introducing service design. ITIL – Introducing service design.