Preview

Final Project: Executive Summary for Network Design Project

Powerful Essays
Open Document
Open Document
6229 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Final Project: Executive Summary for Network Design Project
CphoeniX Inc.'s Network DesignOctober 25, 2009Executive SummaryCphoeniX INC is a small organization that specializes in aircraft maintenance. The company's headquarters are based in Illinois; and they have facilities located in four other states as well. Each facility or office then consist primarily of four departments; maintenance, accounting, receiving, and shipping. Due to the breakdown of each department, and the multiple facilities, constant sharing of data, programs and various applications will need to be accessible over a Local Area Network (LAN); as well as over a Wide Area Network (WAN), and via remote access. The goals of the network, both LAN and WAN, are to allow for a secure yet easily expandable network, that allows real-time data transfer.

When planning the LAN for CphoeniX INC, there were multiple considerations to take into account; the main concerns being the integrity and accessibility of the data over the network; as well as the ease of expanding the network. Along with these concerns, it has also been decided that each department needs to be able to share peripherals devices; such as scanners, copiers and printers. For this reasoning, the LAN in each of the facilities will use a star topology for its setup. CphoeniX Inc.'s star topology LAN will consist of Cat 5 e and 100Base-T cables. These cables will provide the necessary support for the network design allowing for speed and integrity. As well, this network layout will also allow for network expansion and management; and help support the future goals of the company.

As for the WAN that is to be used to connect the facilities to one another, there are a few key factors that need to be considered; the requirements of the WAN. These requirements include: being able to allow each facility to be able to connect, or rather be connected to the WAN to allow the accountants at headquarters access to all financial data. The WAN must allow for approximately 40 users at any given time on the WAN;



References: ., Robert (December 29, 2008) Top 9 Network Security Threats in 2009. Retrieved October 17,2009, from:http://www.cgisecurity.com/2008/12/top-9-network-security-threats-in-2009.htmlCisco Systems, Inc. (July 12, 2007.) Disaster Recovery: Best Practices White Paper. RetrievedOctober 17, 2009, from: http://www.cisco.com/warp/public/63/disrec.pdfCisco Systems, Inc. (July 12, 2007.) Disaster Recovery: Best Practices White Paper. RetrievedOctober 17, 2009, from: http://www.cisco.com/warp/public/63/disrec.pdfCisco Systems, Inc. (n.d.) Internetworking Technology Handbook. Retrieved September 05,2009, from http://www.cisco.com/en/US/docs/internetworking/technology/handbook/ito_doc.htmlCisco Systems, Inc. (n.d.) Internetworking Technology Handbook. Retrieved September 19,2009, from http://www.cisco.com/en/US/docs/internetworking/technology/handbook/Intro-to-WAN.htmlCisco Systems, Inc. (n.d.) Internetworking Technology Handbook. Retrieved September 25,2009, fromhttp://www.cisco.com/en/US/docs/internetworking/technology/handbook/VPN.htmlFortinet (n.d.) Solutions for Small to Medium Business (SMB/ROBO). Retrieved October 17,2009, from: http://www.fortinet.com/solutions/soho.htmlHallberg, B. (2005). Networking: A Beginner 's Guide. 4th ed. New York: McGraw-Hill/OsborneHeaton, Warren (2000, August 16) What 's the best WAN connection type for you?. RetrievedSeptember 19, 2009, from TechRepublic:http://articles.techrepublic.com.com/5100-10878_11-5033247.htmlMicrosoft Corporation (2002, March 16) Microsoft Remote Access Introduction and Overview. Retrieved September 25, 2009, from Microsoft TechNet:http://technet.microsoft.com/en-us/library/bb742490.aspxMicrosoft Corporation (2002, June 16) Administrator 's Guide to Microsoft L2TP/IPSec VPNClient. Retrieved October 03, 2009, from Microsoft TechNet:http://technet.microsoft.com/en-us/library/bb742553.aspxMicrosoft Corporation (2003, March 16) Dial-up Remote Access Technical Reference. Retrieved October 03, 2009, from Microsoft TechNet:http://technet.microsoft.com/en-us/library/cc780183%28WS.10%29.aspxMicrosoft Corporation (2006, October 30) How to Install and Configure a Virtual PrivateNetwork Server in Windows 2000. Retrieved September 25, 2009, from Microsoft Helpand Support: http://support.microsoft.com/kb/308208"New standards for remote access." PC Magazine (UK) (Oct 1998): 227(1). GeneralOneFile. Gale. Apollo Library-Univ of Phoenix. Retrieved October 03, 2009, fromhttp://find.galegroup.com/itx/start.do?prodId=ITOFTechTarget. (2006, December 16). Star Network. Retrieved September 05, 2009, fromTechTarget the Technolgy Media ROI Experts:http://searchnetworking.techtarget.com/dictionary/definition/what-is-star-network.html#VMware (2009), Disaster Recovery: Build a Rapid, Reliable, & Cost-Effective DisasterRecovery Solution. Retrieved October 16, 2009 from: http://www.vmware.com/solutions/continuity/disasterrecovery.htmlWalton, R. (1990, June 15). Learning More About LANs: Topologies. Library Journal 115(11),54-55

You May Also Find These Documents Helpful

  • Powerful Essays

    INDP Final Project

    • 1793 Words
    • 4 Pages

    References: Banathy, A., Panozzo, G., Gordy, A., & Senese, J. (2013, July). A Layered Approach to Network Security. Retrieved from http://www.industrial-ip.org/en/knowledge-center/solutions/security-and-compliance/a-layered-approach-to-network-security…

    • 1793 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    The many complexities of network design are vast, wide and most often tailored to the customer and their uses. In the case of Kudler Fine Foods the network is the backbone of the company compromising the bulk of communications as well as the point of sale network. The design of these networks is a collaborative procedure aimed at ensuring that the services provided meet the needs of the customer. In the search of the ideal plan for network development I will discuss and explain principles of distributed and centralized computer systems. Accomplishing this by describing different network topologies; the standards and protocols that are essential to networking. The responsibilities essential in providing telecommunication services to include security, privacy, reliability and performance. How we distinguish and understand the uses of voice over the internet protocol, Centrex and other forms of telecommunications. With our main goal is to develop a system to utilize in our company that will ensure a proper management of our resources. The timeline for this is to have an implemented plan in place within 30 days of commencement. Our outline of six months to have the plan implemented is not outside the rational. Considering the internal and external resources implemented in the project.…

    • 3954 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    It331 Unit 5 Essay

    • 593 Words
    • 3 Pages

    1) You have been asked to design a LAN with operation over a distance of about 100m. Compare and contrast twisted pair cable, coaxial cable, fiber-optics, and wireless for this application. You should create a table or flow chart which would facilitate choosing between these options depending on circumstances. The table or flow chart should be submitted as part of your document. You may not submit a separate file…

    • 593 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Netw410 Week2

    • 716 Words
    • 3 Pages

    The actual business goals for this project is to offer new and better services and support, open the network to key constituents, build relationships and information accessibility to a new level, as a basis for the network organizational model, avoid business disruption caused by network security problems, avoid business disruption caused by natural and unnatural disaster, modernize outdated technologies and reduce telecommunications and network costs, including overhead associated with separate networks for voice, data and video.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Microsoft TechNet (2003). Comparison of Windows Server 2003 editions. Retrieved January 10, 2009 from http://technet.microsoft.com/en-us/library/cc758523.aspx…

    • 3895 Words
    • 16 Pages
    Best Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    The equipment expected to effectively set up the LAN networks at every area are a switch/firewall mix, a modem, remote network interface cards for every workstation, and the cabling important to associate the switch to the modem and the modem to the Internet to secure the WAN association. Servers and their arrangement additionally have influence in keeping networks and information safe. Each bit of equipment and programming are essential in shielding the network and the information from electronic dangers.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    The hospital uses a network bridge to interconnect its logical network. A network bridge connects multiple network segments at the data link layer, which is Layer 2 of the OSI model. The Data Link Layer enables data to be transferred between network entities and might provide the means to detect and possibly correct errors that may occur in the Physical Layer. The hospital’s network is an Ethernet network. The Ethernet network uses a protocol called CSMA/CD which stands for Carrier Sense, Multiple Access with Collision Detection. The computers that use 1000Base T are networked with Cat. 6 cable. This cable allows for backward compatibility with the Cat. 5 and Cat. 3 cable standards but offers an increase in performance of up to 250 MHZ. The computers that use the 1000Base F are…

    • 3074 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Networking is everywhere one of the main benefits is that we can share devices such as printers, scanners, CD-ROM drives and many more. Also, we can connect to networks as Meyers (2003, p3) said “one network can be connected to another network and become a more powerful tool because of the great resources”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    Provide at least 3 examples of Network Architecture Controls that help enforce data access policies at LAN-to-WAN Domain level.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Timeline

    • 3694 Words
    • 15 Pages

    Kudler Fine Foods is an upscale food store that is located in the San Diego metropolitan area. There are three locations, La Jolla, Del Mar, and Encinitas, that make up this company. With each store there is approximately 8,000 sq. ft. of space that is located in fashionable shopping centers. Each of the stores are stocked with fresh produce, meat and seafood, and bakery and pastries. In order to better serve their customers Kudler Fine Foods is looking to tie all three of the stores into one wide area network (WAN). They are also looking to include a wireless local area network (WLAN), and add Voice over Internet Phone (VOIP) to the multi-store network. KFF wants to define just which store will house the central servers and to design the network to be expandable beyond the existing stores.…

    • 3694 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Duvv Enterprises is the IT solution for WAN/WLAN integration needs. For Patton-Fuller Community Hospital, we will address the existing network architecture of the hospital: Patton-Fuller utilizes a “high-end Local Area Network (LAN) (based on 1000Base-T using CAT 6 cable) that links all of its Systems Applications and Products (SAP) and terminals to workstations over a small geographic area. Duvv Enterprises will also touch basis with the implementation of a complete WLAN networking environment that calls also for the installation of Voice-Over-Internet-Protocol (VOIP), and the design of a high-speed Wide Area Network (WAN) that will enable Packet Filters (PF), or firewalls to connects three other hospitals with Patton-Fuller. Lastly, Duvv Enterprises will implement the following three processes: the first process will identify the hardware and software needed to secure Patton-Fuller’s choice of networks against all electronic threats. The second process will distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies. The third…

    • 2183 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    capstone example

    • 1267 Words
    • 4 Pages

    To build and roll out a top level enterprise-wide telecommunications network for the ABC Company. As ABC’s Technical contractors meeting the ABC Company’s technical needs by meeting the requirements for each of their separate office locations in San Francisco, Detroit, Washington, Indianapolis, Tampa, Paris, Liverpool, Tokyo, and Sao Paulo. With local LANs that are in each office that connect to a WAN to share data files and multimedia. There are many different pieces of equipment needed when setting up and maintain a large business network. Each piece of equipment has many different choices in brands and even capabilities that set them apart from each other. Each piece of equipment can be detrimental to the flow and success of the network at hand. Now that we have discussed the importance of equipment on the network let us move on to discussing each piece of equipment needed to running a successful network.…

    • 1267 Words
    • 4 Pages
    Better Essays
  • Better Essays

    References: Comer, D. E. (2009, 2009,2004,2001,1999,1997). Computer Networks And Internets (5th ed.). Upper Saddle River, New Jersey: Pearson Education, Inc.…

    • 1195 Words
    • 5 Pages
    Better Essays
  • Good Essays

    IS3220 Assignment 3

    • 980 Words
    • 4 Pages

    In the interest of business continuity, remote access will be utilized. User wishing access to internal network assets will only be able to access said assets with the use of a company issued laptop. We will make use of MAC address filtering to allow remote users access to the internal network via VPN. Each of the remote access laptops will have been loaded with VPN and have the MAC address added to the list on the MAC address filter. Users will be able to login to the VPN by using their local username and password. By making use of a VPN connection, users should be able to easily access the network assets. VPN connections are protected by SSL encryption which provides communication security over the internet. Each of the remote access laptops will be encrypted with McAfee safeboot encryption and all local data will remain encrypted until a valid login is entered. McAfee safeboot encryption requires additional login information to access the IDI internal network.…

    • 980 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Resume

    • 1004 Words
    • 5 Pages

    Roles:       Implementation of Static routing for MAN connectivity and routing protocols over the different networks. Configuration of L3, L2 Distribution & Access switches on various locations.…

    • 1004 Words
    • 5 Pages
    Satisfactory Essays