SlideShare a Scribd company logo
1 of 18
Data Communications &
Networks
COMP.6104
Case Study Presentation
Brad Boyce
Topics Covered
 Introduction
 Topology
 Connection Media
 Subnets
 Transport/Network/Routing Protocols
 Backbone Technology
 Wireless LAN Security
 Network Diagram
 Final Recommendation
Introduction
I have been hired to oversee the network upgrade for ADTECH, a software
development company with sites based in Auckland, Wellington and Christchurch.
Objectives of this upgrade include:
 Establish a WAN link between the three sites
 Upgrade the existing LAN and backbones for the three sites
 Provide wireless connectivity to the board room and staff room at the Wellington
site
 Maintain best practice.
Topology
 The network topology refers to the logical layout in which devices are connected to
each other.
 An appropriate topology will be selected for the LANs, Backbone and WAN.
 LAN topology defines how devices connect to the backbone.
 Backbone - distribution layer connects LANs to the core layer of the backbone.
 Backbone - core layer connects the distribution layer to the WAN.
 WAN provides a connection between the three sites.
LAN Topology
 Devices on the ADTECH LANs will
use a STAR topology, with each
device connecting to a central
distribution device.
Backbone Topology
 The central switches of the LANs
will themselves collect to an
upper level of switches, also
using a star topology.
 These switches collectively create
the distribution layer of the
backbone.
 This is a switched backbone
topology.
Backbone Topology
 A switched backbone at the
distribution layer provides:
 Reduced costs
 Easier management
 Greater speeds
(Fitzgerald & Dennis, 2009)
Backbone Topology
 The distribution layer switches connect to routers,
collectively forming a core layer of the backbone.
 The routers at the core layer use network layer
addresses (IP) to move messages around.
 This means messages can stay within their own LAN
unless addressed outside of it.
 This is a routed backbone topology.
WAN Topology
 The routers on the core
layer of the backbone
connect to a central router
known as the core router.
There is one core router at
each of the three ADTECH
sites.
 A fibre-optic line will be
leased to connect the core
routers at each site, in a
bus topology from
Auckland to Wellington to
Christchurch.
Connection Media
 Most LANs use Category 5 or 5e cables, which contain four pairs of wires.
 New installations tend to use the newer category 6 Ethernet cable, which supports
Gigabit speeds. (Wells, n.d.) This is the recommendation for our LANs.
 Wireless access in the Wellington office will be supplied using IEEE 802.11ac Wi-Fi
technology.
 Backwards compatibility for 802.11b/g and n will be incorporated into the
hardware.
 The WAN will used a leased fibre-optic connection.
Subnets
 Splitting up the networks at each site can drastically reduce network traffic, as
messages can stay within the same subnet unless addressed outside of it (the same
principle behind the routed backbone).
 This is usually done logically – for example a network could be split into different
subnets by department, or by floor.
 The ADTECH network has 225 workstations in Wellington, 200 in Auckland, and 50
in Christchurch.
 A single subnet could technically be used at each site (254 hosts max.), however
the recommendation would be to split each sites network by floor.
 3 subnets in Wellington
 2 subnets in Auckland
 1 subnet in Christchurch
Transport/Network/Routing Protocols
 Several packet-switched protocols were considered for this project; X.25,
Asynchronous Transfer Mode (ATM), Frame Relay and Ethernet Services.
 As the majority of our network uses Ethernet connection media, Ethernet services is
the most appropriate service protocol to use as it will require no translation.
 Ethernet services therefore provide much faster speeds, as well as error correction,
and greater compatibility. (Fitzgerald & Dennis, 2009)
Transport/Network/Routing Protocols
 Routing protocols considered include Routing Information Protocol (RIP) and Open
Shortest Path First (OSPF).
 The RIP routing protocol is a distance-vector protocol that only considers the
number of hops from source to destination when making routing decisions.
Suitable for smaller networks.
 OSPF is a Link State protocol that not only considers number of hops, but also
circuit speed, and network congestion.
 More comprehensive protocol than RIP
 Recommended for ADTECH network
Backbone Technology
As mentioned,
 Routed backbone at core layer
 Switched backbone at distribution layer
Fibre optic connection between the three sites
will be leased from another company, e.g. FX
Networks who operate a 500 GB/s fibre optic
backbone in New Zealand (shared virtually
between subscribers).
Wireless LAN Security
Three options considered for securing the wireless LANs in the Wellington office:
 Wired Equivalent Privacy (WEP)
 Wi-Fi Protected Access (WPA)
 Wi-Fi Protected Access II (WPA2)
Of the three encryption protocols, WPA2 is the newest and offers the the greatest
protection. Utilizes Advanced Encryption Standard (AES) to encrypt pre-shared keys
(PSK).
WPA2 offers an Enterprise version which allows each user to have their own password.
(Horowitz, 2009)
WPA2-AES Enterprise is the preferred security protocol for the ADTECH wireless LAN.
NetworkDiagram
Final Recommendation
 Star LAN topology
 Switched distribution layer backbone
 Routed core layer backbone
 Bus WAN topology
 Category 6 LAN cabling
 802.11ac WiFi with backwards compatibility
 Leased fibre-optic WAN
 Separate subnets per floor in each building
 Ethernet services and OSPF routing protocol
 WPA2-AES Enterprise wireless security protocol
References
Fitzgerald, J., & Dennis, A. (2009). Business Data Communications and Networking
(10th ed.). USA: John Wiley & Sons Inc.
Horowitz, M. (2009, September 8). The Best Security for Wireless Networks . Retrieved
from eSecurity Planet:
http://www.esecurityplanet.com/views/article.php/3837976/The-Best- Security-
for-Wireless-Networks.htm
Rtrifunovski. (2014, February 1). Image - Patrick Star.png - MoBrosStudios Wiki:.
Retrieved from wikia.com:
http://mobrosstudios.wikia.com/wiki/File:Patrick_Star.png

More Related Content

What's hot

Demystifying EVPN in the data center: Part 1 in 2 episode series
Demystifying EVPN in the data center: Part 1 in 2 episode seriesDemystifying EVPN in the data center: Part 1 in 2 episode series
Demystifying EVPN in the data center: Part 1 in 2 episode seriesCumulus Networks
 
Androidへのdebianインストール奮闘記
Androidへのdebianインストール奮闘記Androidへのdebianインストール奮闘記
Androidへのdebianインストール奮闘記Tomoya Kawanishi
 
FC SAN Fabric環境におけるパフォーマンストラブルの対処法
FC SAN Fabric環境におけるパフォーマンストラブルの対処法FC SAN Fabric環境におけるパフォーマンストラブルの対処法
FC SAN Fabric環境におけるパフォーマンストラブルの対処法Brocade
 
FCスイッチゾーニング設定ガイド
FCスイッチゾーニング設定ガイドFCスイッチゾーニング設定ガイド
FCスイッチゾーニング設定ガイドBrocade
 
Lab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingLab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingMuhd Mu'izuddin
 
【Interop Tokyo 2023】ShowNetにおけるジュニパーネットワークスの取り組み
【Interop Tokyo 2023】ShowNetにおけるジュニパーネットワークスの取り組み【Interop Tokyo 2023】ShowNetにおけるジュニパーネットワークスの取り組み
【Interop Tokyo 2023】ShowNetにおけるジュニパーネットワークスの取り組みJuniper Networks (日本)
 
FTTH / FTTX optimization, automatic cost optimized network design & engineering
 FTTH / FTTX optimization, automatic cost optimized network design & engineering FTTH / FTTX optimization, automatic cost optimized network design & engineering
FTTH / FTTX optimization, automatic cost optimized network design & engineeringvan den Dool Dick
 
ホワイトボックス・スイッチの期待と現実
ホワイトボックス・スイッチの期待と現実ホワイトボックス・スイッチの期待と現実
ホワイトボックス・スイッチの期待と現実IIJ
 
Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-
Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-
Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-HidekiNishizawa
 
Dockerと外部ルータを連携させる仕組みを作ってみた
Dockerと外部ルータを連携させる仕組みを作ってみたDockerと外部ルータを連携させる仕組みを作ってみた
Dockerと外部ルータを連携させる仕組みを作ってみたnpsg
 
RENAT - ネットワーク検証自動化
RENAT - ネットワーク検証自動化RENAT - ネットワーク検証自動化
RENAT - ネットワーク検証自動化HuuBachNguyen
 
L2 over L3 ecnaspsulations
L2 over L3 ecnaspsulationsL2 over L3 ecnaspsulations
L2 over L3 ecnaspsulationsMotonori Shindo
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
Adcとは?〜A10 Thunderで可能なこと〜
Adcとは?〜A10 Thunderで可能なこと〜Adcとは?〜A10 Thunderで可能なこと〜
Adcとは?〜A10 Thunderで可能なこと〜R Tamura
 
閉域網接続の技術入門
閉域網接続の技術入門閉域網接続の技術入門
閉域網接続の技術入門Masayuki Kobayashi
 

What's hot (20)

Network devices
Network devicesNetwork devices
Network devices
 
Demystifying EVPN in the data center: Part 1 in 2 episode series
Demystifying EVPN in the data center: Part 1 in 2 episode seriesDemystifying EVPN in the data center: Part 1 in 2 episode series
Demystifying EVPN in the data center: Part 1 in 2 episode series
 
Androidへのdebianインストール奮闘記
Androidへのdebianインストール奮闘記Androidへのdebianインストール奮闘記
Androidへのdebianインストール奮闘記
 
FC SAN Fabric環境におけるパフォーマンストラブルの対処法
FC SAN Fabric環境におけるパフォーマンストラブルの対処法FC SAN Fabric環境におけるパフォーマンストラブルの対処法
FC SAN Fabric環境におけるパフォーマンストラブルの対処法
 
FCスイッチゾーニング設定ガイド
FCスイッチゾーニング設定ガイドFCスイッチゾーニング設定ガイド
FCスイッチゾーニング設定ガイド
 
Lab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingLab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routing
 
VyOSでMPLS
VyOSでMPLSVyOSでMPLS
VyOSでMPLS
 
【Interop Tokyo 2023】ShowNetにおけるジュニパーネットワークスの取り組み
【Interop Tokyo 2023】ShowNetにおけるジュニパーネットワークスの取り組み【Interop Tokyo 2023】ShowNetにおけるジュニパーネットワークスの取り組み
【Interop Tokyo 2023】ShowNetにおけるジュニパーネットワークスの取り組み
 
FTTH / FTTX optimization, automatic cost optimized network design & engineering
 FTTH / FTTX optimization, automatic cost optimized network design & engineering FTTH / FTTX optimization, automatic cost optimized network design & engineering
FTTH / FTTX optimization, automatic cost optimized network design & engineering
 
ホワイトボックス・スイッチの期待と現実
ホワイトボックス・スイッチの期待と現実ホワイトボックス・スイッチの期待と現実
ホワイトボックス・スイッチの期待と現実
 
Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-
Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-
Telecom Infra Projectの取り組み -光伝送におけるハードとソフトの分離-
 
Dockerと外部ルータを連携させる仕組みを作ってみた
Dockerと外部ルータを連携させる仕組みを作ってみたDockerと外部ルータを連携させる仕組みを作ってみた
Dockerと外部ルータを連携させる仕組みを作ってみた
 
RENAT - ネットワーク検証自動化
RENAT - ネットワーク検証自動化RENAT - ネットワーク検証自動化
RENAT - ネットワーク検証自動化
 
Zigbeepresentation
ZigbeepresentationZigbeepresentation
Zigbeepresentation
 
L2 over L3 ecnaspsulations
L2 over L3 ecnaspsulationsL2 over L3 ecnaspsulations
L2 over L3 ecnaspsulations
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
 
Adcとは?〜A10 Thunderで可能なこと〜
Adcとは?〜A10 Thunderで可能なこと〜Adcとは?〜A10 Thunderで可能なこと〜
Adcとは?〜A10 Thunderで可能なこと〜
 
閉域網接続の技術入門
閉域網接続の技術入門閉域網接続の技術入門
閉域網接続の技術入門
 

Viewers also liked

#3月瘋行動 打造行動網站,掌上流量一網打盡
#3月瘋行動 打造行動網站,掌上流量一網打盡#3月瘋行動 打造行動網站,掌上流量一網打盡
#3月瘋行動 打造行動網站,掌上流量一網打盡AdWordsGreaterChina
 
Oil refining seminar attendee certificate
Oil refining seminar attendee certificateOil refining seminar attendee certificate
Oil refining seminar attendee certificateDario Aguilar
 
Past Employment UC Lecturer
Past Employment UC LecturerPast Employment UC Lecturer
Past Employment UC LecturerDario Aguilar
 
AVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONAVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONPaul Mears Phd.
 

Viewers also liked (6)

#3月瘋行動 打造行動網站,掌上流量一網打盡
#3月瘋行動 打造行動網站,掌上流量一網打盡#3月瘋行動 打造行動網站,掌上流量一網打盡
#3月瘋行動 打造行動網站,掌上流量一網打盡
 
resume
resumeresume
resume
 
Oil refining seminar attendee certificate
Oil refining seminar attendee certificateOil refining seminar attendee certificate
Oil refining seminar attendee certificate
 
Past Employment UC Lecturer
Past Employment UC LecturerPast Employment UC Lecturer
Past Employment UC Lecturer
 
Netiquette
NetiquetteNetiquette
Netiquette
 
AVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONAVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATION
 

Similar to DCN Presentation

Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
somaya akter 1834902142
somaya akter 1834902142somaya akter 1834902142
somaya akter 1834902142somayaakter
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networksTatheer Fatima
 
Computer Network Manual
Computer Network ManualComputer Network Manual
Computer Network ManualAkshayJain497
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptxstephen972973
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Best fit topology - lo1 part iv
Best fit topology - lo1 part ivBest fit topology - lo1 part iv
Best fit topology - lo1 part ivAbenezer Abiti
 

Similar to DCN Presentation (20)

Introduction to network security and lan technology
Introduction to network security and lan technologyIntroduction to network security and lan technology
Introduction to network security and lan technology
 
Technical Ethernet
Technical EthernetTechnical Ethernet
Technical Ethernet
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
somaya akter 1834902142
somaya akter 1834902142somaya akter 1834902142
somaya akter 1834902142
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
Afdx solutions an
Afdx solutions anAfdx solutions an
Afdx solutions an
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
I017554954
I017554954I017554954
I017554954
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
Computer Network Manual
Computer Network ManualComputer Network Manual
Computer Network Manual
 
IFD30104 Chapter 1
IFD30104 Chapter 1IFD30104 Chapter 1
IFD30104 Chapter 1
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Best fit topology - lo1 part iv
Best fit topology - lo1 part ivBest fit topology - lo1 part iv
Best fit topology - lo1 part iv
 

DCN Presentation

  • 1. Data Communications & Networks COMP.6104 Case Study Presentation Brad Boyce
  • 2. Topics Covered  Introduction  Topology  Connection Media  Subnets  Transport/Network/Routing Protocols  Backbone Technology  Wireless LAN Security  Network Diagram  Final Recommendation
  • 3. Introduction I have been hired to oversee the network upgrade for ADTECH, a software development company with sites based in Auckland, Wellington and Christchurch. Objectives of this upgrade include:  Establish a WAN link between the three sites  Upgrade the existing LAN and backbones for the three sites  Provide wireless connectivity to the board room and staff room at the Wellington site  Maintain best practice.
  • 4. Topology  The network topology refers to the logical layout in which devices are connected to each other.  An appropriate topology will be selected for the LANs, Backbone and WAN.  LAN topology defines how devices connect to the backbone.  Backbone - distribution layer connects LANs to the core layer of the backbone.  Backbone - core layer connects the distribution layer to the WAN.  WAN provides a connection between the three sites.
  • 5. LAN Topology  Devices on the ADTECH LANs will use a STAR topology, with each device connecting to a central distribution device.
  • 6. Backbone Topology  The central switches of the LANs will themselves collect to an upper level of switches, also using a star topology.  These switches collectively create the distribution layer of the backbone.  This is a switched backbone topology.
  • 7. Backbone Topology  A switched backbone at the distribution layer provides:  Reduced costs  Easier management  Greater speeds (Fitzgerald & Dennis, 2009)
  • 8. Backbone Topology  The distribution layer switches connect to routers, collectively forming a core layer of the backbone.  The routers at the core layer use network layer addresses (IP) to move messages around.  This means messages can stay within their own LAN unless addressed outside of it.  This is a routed backbone topology.
  • 9. WAN Topology  The routers on the core layer of the backbone connect to a central router known as the core router. There is one core router at each of the three ADTECH sites.  A fibre-optic line will be leased to connect the core routers at each site, in a bus topology from Auckland to Wellington to Christchurch.
  • 10. Connection Media  Most LANs use Category 5 or 5e cables, which contain four pairs of wires.  New installations tend to use the newer category 6 Ethernet cable, which supports Gigabit speeds. (Wells, n.d.) This is the recommendation for our LANs.  Wireless access in the Wellington office will be supplied using IEEE 802.11ac Wi-Fi technology.  Backwards compatibility for 802.11b/g and n will be incorporated into the hardware.  The WAN will used a leased fibre-optic connection.
  • 11. Subnets  Splitting up the networks at each site can drastically reduce network traffic, as messages can stay within the same subnet unless addressed outside of it (the same principle behind the routed backbone).  This is usually done logically – for example a network could be split into different subnets by department, or by floor.  The ADTECH network has 225 workstations in Wellington, 200 in Auckland, and 50 in Christchurch.  A single subnet could technically be used at each site (254 hosts max.), however the recommendation would be to split each sites network by floor.  3 subnets in Wellington  2 subnets in Auckland  1 subnet in Christchurch
  • 12. Transport/Network/Routing Protocols  Several packet-switched protocols were considered for this project; X.25, Asynchronous Transfer Mode (ATM), Frame Relay and Ethernet Services.  As the majority of our network uses Ethernet connection media, Ethernet services is the most appropriate service protocol to use as it will require no translation.  Ethernet services therefore provide much faster speeds, as well as error correction, and greater compatibility. (Fitzgerald & Dennis, 2009)
  • 13. Transport/Network/Routing Protocols  Routing protocols considered include Routing Information Protocol (RIP) and Open Shortest Path First (OSPF).  The RIP routing protocol is a distance-vector protocol that only considers the number of hops from source to destination when making routing decisions. Suitable for smaller networks.  OSPF is a Link State protocol that not only considers number of hops, but also circuit speed, and network congestion.  More comprehensive protocol than RIP  Recommended for ADTECH network
  • 14. Backbone Technology As mentioned,  Routed backbone at core layer  Switched backbone at distribution layer Fibre optic connection between the three sites will be leased from another company, e.g. FX Networks who operate a 500 GB/s fibre optic backbone in New Zealand (shared virtually between subscribers).
  • 15. Wireless LAN Security Three options considered for securing the wireless LANs in the Wellington office:  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Wi-Fi Protected Access II (WPA2) Of the three encryption protocols, WPA2 is the newest and offers the the greatest protection. Utilizes Advanced Encryption Standard (AES) to encrypt pre-shared keys (PSK). WPA2 offers an Enterprise version which allows each user to have their own password. (Horowitz, 2009) WPA2-AES Enterprise is the preferred security protocol for the ADTECH wireless LAN.
  • 17. Final Recommendation  Star LAN topology  Switched distribution layer backbone  Routed core layer backbone  Bus WAN topology  Category 6 LAN cabling  802.11ac WiFi with backwards compatibility  Leased fibre-optic WAN  Separate subnets per floor in each building  Ethernet services and OSPF routing protocol  WPA2-AES Enterprise wireless security protocol
  • 18. References Fitzgerald, J., & Dennis, A. (2009). Business Data Communications and Networking (10th ed.). USA: John Wiley & Sons Inc. Horowitz, M. (2009, September 8). The Best Security for Wireless Networks . Retrieved from eSecurity Planet: http://www.esecurityplanet.com/views/article.php/3837976/The-Best- Security- for-Wireless-Networks.htm Rtrifunovski. (2014, February 1). Image - Patrick Star.png - MoBrosStudios Wiki:. Retrieved from wikia.com: http://mobrosstudios.wikia.com/wiki/File:Patrick_Star.png