roirdian_ networking
TRANSCRIPT
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 2/19
Albany & Pontiac facilitiesare operating with outdatedtechnology. Network uses
cat5 cable along withpatches and hubs.
Corporate & China facilitieshave been modernized withEthernet, switches, hubs andVoIP for phone services.
All facilities operate on astandard star topology.
2
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 3/19
Outdated network equipment and separatetelephone system hinder the Pontiac & Albanyfacilities from effectively communicating with theother locations.
The Ethernet back bone and VoIP processor coupledwith the use of routers and satellites provide a stableenvironment for the Corporate facilities.
3
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 4/19
Increase connection at the Pontiac &Albany facilities.
Upgrade both cabling and switches to allowsupport of VoIP and Ethernet backbone.
Implement Quality of Service (QoS) at the
corporate office to eliminate network congestion.
Install VoIP capabilities to take advantage ofthe lower cost of long distance calling.
4
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 5/19
Standard Protocol San Jose Pontiac Albany China
Open TCP/IP X X X X
Open UDP X X X X
Open DHCP
X X X XOpen HTTP X X X X
Open FTP X X
Open OSI X X X X
Open iSCSI X
Open UPnP X X X XOpen NFS
Proprietar y
SMB X X X X
Proprietar y
SNA X X
Proprietar y
RSYNC X X X 5
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 7/19
Connection Oriented TransportServices (COTS)
Benefits Provides full duplex data transfer
Error detection
Establishing a connection-oriented session
7
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 8/19
Inadequate security documentation at
some locations
No user definition for system access
Insufficient security protocols
No data backup policies in place
8
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 9/19
Develop user authentication protocols
Apply Content filters
Implement System firewall
9
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 10/19
Improve security documentation that meetsfederal, state and business requirements.
Apply user authentication devices to limit accessto the network.
Apply content filters to manage and observe howusers interact with the system.
Implement Firewall to protect from outsideintrusions.
10
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 11/19
Tree Topology
BusTopology
Ring Topology
Star Topology
MeshTopology
11
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 12/19
All of the Riordan sites are currentlyutilizing a standard star topology.
The star topology provides a centralconnection point with a hub or switch.
This is ideal for Riordan sites becauseif a cable goes bad then typically it
will only affect one computer rather than the entire network like a bustopology.
12
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 13/19
Most network designers prefer the star topology, because these topologiesmake it simple to add network devices without disruptions to the network.
It is also easy to detect faults and to remove parts as each device has itsown cable.
New stations can be added easily and quickly.
A single cable failure won't bring down the entire network.
The star topology is susceptible to bottlenecking and single-point failurebecause all the nodes rely on a single connection device (the hub).
Total installation cost can be higher because of the larger number ofcables, but prices are constantly becoming more and more competitive.
13
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 14/19
Hardware & Software
$Estimated amount«. add
Update & Implement Security Policies- all 4 locations, includelabor, and equipment with onsite analysis giving exactinglocation of security breaches, and oversight
$Estimated amount add«..
LAN administration: each site
$ input amount
Connectivity
$ input amount
14
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 15/19
Location Switches Hubs
San Jose (Corporate) two each Cisco port
Two gateway
One Linksys port
China Location two Cisco -port
One gateway
One 8 port hub
Linksys port
Pontiac Location None Insert info
Albany Location Insert info None
15
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 16/19
Reduces network congestion.
Lessens data breaches because itsends the packet to the destinationonly.
Allows each station to utilize fullbandwidth without sharing.
16
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 17/19
Update «« with Ethernet connections.
Implement a VoIP interfaced telephonesystem at «...
Update all locations with switches toenhance the Ethernet connections.
17
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 18/19
To improve the efficiency of Riordan·s telephoneand data networks Team D suggests:
Update all outdated wiring to Ethernetconnections.
Make use of switches to enhance the operationsof hubs.
Implement documented security measures.
18
8/8/2019 Roirdian_ Networking
http://slidepdf.com/reader/full/roirdian-networking 19/19
Fairhurst, G. (2001). Communications protocols. Retrieved September 14, 2010, fromhttp://www.erg.abdn.ac.uk/users/gorry/eg3561/intro-pages/protocols.html
Mitchell, B. (2010). Standard network layer architecture. Retrieved September 16, 2010,from
http://compnetworking.about.com/cs/designosimodel/a/osimodel.htm
Picture on slide 12 was retrieved on September 18, 2010 fromhttp://whatis.techtarget.com/definition/network-topologies.html
Picture from slide 9 was retrieved on September 17, 2010 fromhttp://www.asksid.com/2008/01/09/users-are-a-vital-part-of-computer-security/
Riorden logo picture on slide one was retrieved on September 18, 2010 fromhttps://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/Ops/GoingGree
nFolder.pdf
Tomsho, G., Tittel, E., & Johnson, D. (2004). Guide to Networking Essentials (4th ed.).Boston, MA: Course Technology
19