roirdian_ networking

19
1

Upload: tamptress-vamp

Post on 10-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 1/19

1

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 2/19

Albany & Pontiac facilitiesare operating with outdatedtechnology. Network uses

cat5 cable along withpatches and hubs.

Corporate & China facilitieshave been modernized withEthernet, switches, hubs andVoIP for phone services.

All facilities operate on astandard star topology.

2

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 3/19

Outdated network equipment and separatetelephone system hinder the Pontiac & Albanyfacilities from effectively communicating with theother locations.

The Ethernet back bone and VoIP processor coupledwith the use of routers and satellites provide a stableenvironment for the Corporate facilities.

3

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 4/19

Increase connection at the Pontiac &Albany facilities.

Upgrade both cabling and switches to allowsupport of VoIP and Ethernet backbone.

Implement Quality of Service (QoS) at the

corporate office to eliminate network congestion.

Install VoIP capabilities to take advantage ofthe lower cost of long distance calling.

4

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 5/19

Standard Protocol San Jose Pontiac Albany China

Open TCP/IP X X X X

Open UDP X X X X

Open DHCP

X X X XOpen HTTP X X X X

Open FTP X X

Open OSI X X X X

Open iSCSI X

Open UPnP X X X XOpen NFS

Proprietar y

SMB X X X X

Proprietar y

SNA X X

Proprietar y

RSYNC X X X 5

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 6/19

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 7/19

Connection Oriented TransportServices (COTS)

Benefits Provides full duplex data transfer 

Error detection

Establishing a connection-oriented session

7

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 8/19

Inadequate security documentation at

some locations

No user definition for system access

Insufficient security protocols

No data backup policies in place

8

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 9/19

Develop user authentication protocols

Apply Content filters

Implement System firewall

9

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 10/19

Improve security documentation that meetsfederal, state and business requirements.

Apply user authentication devices to limit accessto the network.

Apply content filters to manage and observe howusers interact with the system.

Implement Firewall to protect from outsideintrusions.

10

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 11/19

Tree Topology

BusTopology

Ring Topology

Star Topology

MeshTopology

11

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 12/19

All of the Riordan sites are currentlyutilizing a standard star topology.

The star topology provides a centralconnection point with a hub or switch.

This is ideal for Riordan sites becauseif a cable goes bad then typically it

will only affect one computer rather than the entire network like a bustopology.

12

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 13/19

Most network designers prefer the star topology, because these topologiesmake it simple to add network devices without disruptions to the network.

It is also easy to detect faults and to remove parts as each device has itsown cable.

New stations can be added easily and quickly.

A single cable failure won't bring down the entire network.

The star topology is susceptible to bottlenecking and single-point failurebecause all the nodes rely on a single connection device (the hub).

Total installation cost can be higher because of the larger number ofcables, but prices are constantly becoming more and more competitive.

13

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 14/19

Hardware & Software

$Estimated amount«. add

Update & Implement Security Policies- all 4 locations, includelabor, and equipment with onsite analysis giving exactinglocation of security breaches, and oversight

$Estimated amount add«..

LAN administration: each site

$ input amount

Connectivity

$ input amount

14

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 15/19

Location Switches Hubs

San Jose (Corporate) two each Cisco port

Two gateway

One Linksys port

China Location two Cisco -port

One gateway

One 8 port hub

Linksys port

Pontiac Location None Insert info

Albany Location Insert info None

15

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 16/19

Reduces network congestion.

Lessens data breaches because itsends the packet to the destinationonly.

Allows each station to utilize fullbandwidth without sharing.

16

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 17/19

Update «« with Ethernet connections.

Implement a VoIP interfaced telephonesystem at «...

Update all locations with switches toenhance the Ethernet connections.

17

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 18/19

To improve the efficiency of Riordan·s telephoneand data networks Team D suggests:

Update all outdated wiring to Ethernetconnections.

Make use of switches to enhance the operationsof hubs.

Implement documented security measures.

18

8/8/2019 Roirdian_ Networking

http://slidepdf.com/reader/full/roirdian-networking 19/19

Fairhurst, G. (2001). Communications protocols. Retrieved September 14, 2010, fromhttp://www.erg.abdn.ac.uk/users/gorry/eg3561/intro-pages/protocols.html

Mitchell, B. (2010). Standard network layer architecture. Retrieved September 16, 2010,from

http://compnetworking.about.com/cs/designosimodel/a/osimodel.htm

Picture on slide 12 was retrieved on September 18, 2010 fromhttp://whatis.techtarget.com/definition/network-topologies.html

Picture from slide 9 was retrieved on September 17, 2010 fromhttp://www.asksid.com/2008/01/09/users-are-a-vital-part-of-computer-security/

Riorden logo picture on slide one was retrieved on September 18, 2010 fromhttps://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/Ops/GoingGree

nFolder.pdf

Tomsho, G., Tittel, E., & Johnson, D. (2004). Guide to Networking Essentials (4th ed.).Boston, MA: Course Technology

19