SlideShare a Scribd company logo
1 of 30
NetworkReport 1
Case Study 4 Networks
CCNA4
Simplifying IT
Consulting Firm PADDY POWER Pty Ltd.
For XYZ Pty Ltd.
This Presentation is Designed By
Brian Lawson - Jose moreu -Yiwei Yu
1/6/2014
NetworkReport 2
CCNA4: Case Study
Index
Page 3 Introduction
Page 4 The Case Study’s’ outline
Page 4 The Purpose of the design
Page 5 Technical Support Services
Page 7 Future Design
Page 9 IP Addressing
Page 12 Configuring Routers with OSPF and EIGRP
Page 12 Configuring NAT, Frame Relay, CHAP and ACLs
Page 13 Configuring GRE Tunnel
Page 14 Configuring for IPv6
Page 15
Page 16 Project Design and Deployment Process
Page 17
Page 18 Licensing - Stakeholders
Page 19
Page 20 Code of Ethics and code of conduct for XYZ Pty Ltd
Page 21
Page 22
Page 25 Conclusion
Page 26 The ACS Code Of Professional Conduct – 2012
NetworkReport 3
Introducti on
The followingdocumentationisfor XYZPty Ltd whichisCompanythat deliversendtoendsolutions
for businesscontrol andprocessimprovement. ThisCompanyoffers consultingservicesacross
Capital Markets, thisCompany’s focusisonperformance andcontrol enhancement. XYZPtyLtd
pridesthemselvesonbeingable todelivervaluable solutionsthathelp itsclientsgrow their
businessinastructuredand controlledfashion.
Our consultingfirmis PADDYPOWERPty Ltd we will be redesign the ICTinfrastructure forXYZPty
Ltd whichhave beenin existence formanyyears.ThisCompanyismade upvarioustypesof
equipmentthathasbeenacquiredfromthe purchase of differentcompaniesoverthe years ,we
have decidedtocommence workon BelfastandDerrywhichis in Area0 first.ThisArea0 isthe
back bone of the network, phase one will be implantationof new hardware whichwillsupportthe
future growthforthe XYZ Company andwill supportthe requirement of connectionBandwidthfor
the overall Company.
The expected expansion of the XYZPtyLtd will require new hardwarebeinginstalledalongwith
newnetworkoperatingsystemandcablingtolinkthe multi-areanetworkstogether.
The documentwe have preparedalongwithplans,showsthatwe have designedandimplemented
sufficientscope forthisCompany,sothatthe networkswillbe able tosupport100% growthover
the nextfive yearperiod.
An evaluationof all availablehardware andsoftware platformswere conductedinordertomake
an informeddecisiononthe mostappropriate platformwhichwill fulfill the needsof XYZPtyLtd.
We have provided aprototype forreview of the network before itisfullyimplemented,whichwill
include abrand newnetworktopology, providingthe highestdegreeof technical efficiencyaswell
as redundancy. Eachdevice inthisnetwork will be configured withroutingprotocolsthatprovide
securityandalso AccessControl List(ACL) whichwill provide completenetworksecurity forthe XYZ
Company.
The resultof our implantation istoprovide aseamlessservice inmanydifferentregionswhilenot
compromisingqualityorsecurity.We intend todeliverthe lowest possiblecostinthe redesign of
the networkinfrastructure,andtoincrease the networksbandwidthtosupplythe fasterdelivery
and mostimportantly, demonstrate ourdeepunderstandingof the solutionsrequiredforthis
Company.
NetworkReport 4
Phase 1 : Introduction to the Case Study
Followingupyourrequestinregardstoimprove anddevelopthe infrastructures for the IT system and
support for your corporate .we are in Paddy Power Pty committed to provide you with the best
available combinationsof softandhardware to provide better service and improve service reliability
for your business which it will result in increase in business revenue in the short and long time
prospective. Although , in some cases and under some budget limits and special requirements from
the corporate , we are still committed to provide the best options for our clients based on corporate
requirements and business strategies however , After Providing our clients with their needs ,
WE USUALLY RECOMMENDED A FUTURE IMAGE AND VIEW FOR THOSE SERVICES AND TECHNOLOGIES
WHICH WILL KEEP THE CLIENTS’s BUSINESS NOT ONLY UP-TO-DATE BUT ALSO IT WILL AHEAD WITH
MARKET AND BUSINESS TRENDS.
Attached is a full proposal for joining the exits IT system in the different locations and sites for your
corporate. Based on your company requirements we can summary the purpose for the attached
proposal as:
The Purpose of the design:
 To provide a clear view how the network topology will look.
 To provide full information and aspects about the intended used hardware.
 To provide technical aspects for the corporate networks and IT engineers.
 To be usedas a references in future use in case of migrating, updating, upgrade the network
system’s infrastructures.
 To be used as references to transition from IPv4 to IPv6
The Attacheddesignhasthe followingfeatures:
 The networkhas Multi area networkwhichall hascertainlevel of privacyandsecurityin
regardsto connectionsandcommutations.
 The networkhas differentroutingprotocolswhichprovidereliabilityandscalabilityaswell
.the 2 usedroutingprotocolshasverylow level of resourcesconsumingatthe maintime,
theyprovide reliability,scalabilityandeasyimplementation.
 The routingprotocolsare botheasyto troubleshootanderrorcorrection
 Both are supportingforredundancyandscalabilityaswell
NetworkReport 5
Technical Support Services:
Our Architecture network design support:
Users
Users
ServerServer
Building ABuilding B
Gateway
Cloud
Gateway
ACL
ACL
CLOUD
Remote UserRemote USer
Remote User
• Security
o Authentications
o The abilityforremote userstouse Virtual Private Network( VPN) tosecure theirconnection
to home network
o Usingchallenge-handshake authenticationprotocol (CHAP) asfirstlevel of authentication
betweenrouters
o Use Accesscontrol list(ACL) toprovide anendlevel of securityfor
 WHO : usersto accessmedia
 WHAT : whichdevice andservicescouldusersaccess
 Where : locationsandsites
NetworkReport 6
• Flexibility, Upgradeability, Scalability
o 30% of future growth
o Hardware ,software and protocol’s used are be able to upgrade
o Hardware and software whichare usedare openmanufacture sourceswhichcanbe supported
by different devices from different manufacturer
o System is totally flex to add ,move and change network aspects and services
o System Support IPv4 and IPv6
o Routing protocol upgrade for the OSPF section to the EIRGP
• Usability
o System is based on below-medium level of complexity which makes it easy to be used and
maintain.
Althoughwe have recommendedthe above designforthe includedfeaturesWhichMATCHINGFOR
THE REQUESTED and DEMANDED SERVICES,WE ACTUALLY HIGHY REGARDED A NEW DESIGN WHICH
INCLUDE:
o HighAvailability
o FaultTolerance
o Load Balancing
o Future TechnologiesandProtocols
o HighBandwidth
o CloudServices
However, Adopt the above design will result in adoption of new technologies which will add some
extra but will still long term investment in the company infrastructure.
NetworkReport 7
Our Future Design recommendation
2 Links to ISP
Belfast
Cork
Derry
Killarney
Gallway
SOHO
GISP
MPLS
ThisDesignwill provideFaulttolerance inmostsites,HighAvailability,Multi-protocoldatasupportand
transformationandsecondlinktothe ISPproviderwith high bandwidth in addition to the availability
of migration from IPv4 to IPv6 address with easy and trackball transformation .The most visible is
THERE IS NO SINGLE POINT OF FAUILUER in this design with assumption that each site will provide
redundancy (end device for each site)
NetworkReport 8
NetworkReport 9
Phase 2: Addressing the WAN
The company network topology is shown in figure 1 as below.
Figure 1 The network topology.
NetworkReport 10
The detailedaddressingplanforIPv4andIPv6 are showninthe followingtable 1.
Device Interface IP Address Subnet Mask
Belfast - ISP G0/0 56.12.108.50 255.255.255.252
2001:FEA9:2BAD:6::F/127
OSPF Area 0
OSPF Area 0
summary: 172.16.0.0/21
2001:fea9:2bad::/63
Belfast:
172.16.0.0/22
2001:fea9:2bad:1::/64
Derry:
172.16.4.0/23
2001:fea9:2bad::/64
Belfast - Derby G0/01 172.16.6.1 255.255.255.252
2001:FEA9:2BAD:6::6/127
Derby - Belfast F0/1 172.16.6.2 255.255.255.252
2001:FEA9:2BAD:6::7/127
Derby F0/0 172.16.4.1
2001:FEA9:2BAD::1/64
OSPF Area 20
OSPF Area 20
summary: 172.16.8.0/22
2001:fea9:2bad:2::/63
Cork:
172.16.8.0/22
2001:fea9:2bad:2::/64
Killarney:
172.16.10.0/24
2001:fea9:2bad:3::/64
Belfast - Cork S0/0/0 172.16.11.1 255.255.255.252
2001:FEA9:2BAD:6::2/127
Cork - Belfast S0/0/0 172.16.11.2 255.255.255.252
2001:FEA9:2BAD:6::3/127
Killarney - Cork S0/0/0 172.16.11.6 255.255.255.252
2001:FEA9:2BAD:6::5/127
Cork - Killarney S0/0/1 172.16.11.5 255.255.255.252
2001:FEA9:2BAD:6::4/127
Cork F0/0 172.16.8.1 255.255.254.0
2001:FEA9:2BAD:2::1/64
Belfast - Galway S0/0/1 172.16.14.9 255.255.255.252
2001:FEA9:2BAD:6::/127
EIGRP 10
EIGRP 10
summary:
Galway:
172.16.12.0/23
SOHO:
172.16.14.0/29
NetworkReport 11
172.16.12.0/22
2001:fea9:2bad:4::/63
2001:fea9:2bad:4::/64 2001:fea9:2bad:5::/64
Galway - Belfast S0/0/1 172.16.14.10 255.255.255.252
2001:FEA9:2BAD:6::1/127
Galway – G_ISP S0/0/0 102.68.1.10 255.255.255.252
2001:FEA9:2BAD:6::B/127
F0/0 172.16.12.1 255.255.254.0
2001:FEA9:2BAD:4::1/64
G_ISP - Galway S0/0/0 102.68.1.9 255.255.255.252
2001:FEA9:2BAD:6::A/127
G_ISP - SOHO F0/0 102.68.1.13 255.255.255.252
2001:FEA9:2BAD:6::C/127
F0/0 172.16.12.1 255.255.254.0
2001:FEA9:2BAD:4::1/64
SOHO - G_ISP F0/0 102.68.1.14 255.255.255.252
2001:FEA9:2BAD:4::1/64
SOHO - Galway F0/1 102.68.14.1 255.255.255.252
2001:FEA9:2BAD:5::1/64
Table 1 Detailed IPv4 and IPv6 addressing table.
NetworkReport 12
Configuring Routers with OSPF and EIGRP
The multi-areaOSPFroutingisconfigured on major part of the company network, where OSPF area 0
consists of Belfast and Derry and OSPF area 20 consists of Belfast, Cork and Killarney. On the other
hand,EIGRP routingisconfiguredonBelfast,Galwayand SOHO,whichisa remote site LAN connecting
to company’s internal network via GRE tunnel.
The multi-areaOSPFispreferredtobe implementedonmajorpartof the networkdue to itsdesirable
features.The multi-area OSPF can divide the large network into multiple smaller areas within which
mostof LSAsare processedlocally,thusgreatlyreducingthe exchange of unnecessary routing update
traffic among entire network. In addition, summary routes can be configured on the ABR and ASBR
routersto reduce the size of routingtablesrecordedoneachrouter.Finally, OSPF is an open standard
routing protocol. In another word, it can be used on variety of devices including Cisco and non-Cisco
routers, which enhances the flexibility of network design. Compared to OSPF, on the other hand,
EIGRP isa Cisco-preferredroutingprotocol.Itisstronglyrecommendedtobe used on Cisco devices as
all desirable features of EIGRP can be maximized while running on Cisco routers.
Configuring NAT, Frame Relay, CHAP and ACLs
The linkbetweenBelfastandCorkisrequiredtobe securedforimportantdata transmission. Then the
PPPisusedto replace HDLC to provide afirstlevel of protectionaslinkauthentication is supported by
PPP. The CHAP authentication is preferred over PAP as it offers a more secured authentication
mechanism. Unlike PAP, CHAP conducts three-way handshake and periodic challenges to make sure
the remote mode still have valid password value, which greatly limits the time of exposure to any
single attack. The other parts of the network can be also configured with security. For example, the
MD5 authentication can be enabled on both OSPF and EIGRP routing configuration to secure the
routing traffic of each link.
Frame Relay is used between Belfast and Galway as a WAN connection. Frame Relay is one of the
mostpopular WAN solutions and able to provide both cost effectiveness and flexibility. With Frame
Relay,customersdonotneedto payfor expensive dedicatedlinesbutonlythe local loopwhere virtual
circuitsare established to provide considerable flexibility in network design. However, it is possible
that Frame Relay will gradually be replaced by future technologies, for example, VPN in terms of
providing site-to-site connectivity. VPN allow organizations to use Internet or public network to
achieve site-to-site connectivity with the highest level of security. Thus, it enables even greater
flexibility, cost savings, scalability and security than Frame Relay does.
A backup link between Belfast to ISP could be necessary in order to prevent from single point of
failure.Itcan be achievedbyaddinganotherphysical cable between Belfast and ISP and configuring a
floatstaticroute with higher AD. Another solution is that default static route is configured at Galway
to directall trafficto G_ISP,which then is considered to be the secondary ISP. Then the default static
route configured on Galway must be given AD higher than 170 so that it will be only activated when
the primary link between Belfast and ISP is failed.
Web Servers are possible to be added within the network in future. The Web Servers must be
accessedbynot onlyinternal usersbutalsousers from external networks. Therefore, static NAT with
port forwardingconfigurationhastobe made to the current NATstructure in orderto support end-to-
end connectivity initialized from outside global addresses. For good practice, in addition, the Web
Serversshouldbe locatedinDemilitarizedZone (DMZ), where firewalls are used to prevent company
local network from external attacks.
ACLs are also configured to provide security and filter network traffic according to the company
policies.The configurations are made on Galway, Cork and Killarney. The detailed configure files are
presented in figure 2 correspondingly.
NetworkReport 13
Figure 2 ACLs configured file.
Configuring GRE Tunnel
The GRE tunnel isconfiguredtosetupa logicallydirect link between Galway and SOHO. Firstly, static
routing is configured at Galway and SOHO to ensure the reachability between interfaces of both
routerswhere GRE tunnel isestablished.Thenthe point-to-pointtunnel linkis given a subnet which is
a part of the company internal network. Therefore, SOHO LAN can be seamlessly connected to the
company network via EIGRP. Finally, EIGRP is configured at SOHO to establish an adjacency with
Galway via GRE tunnel logically.
The state of interfaces on SOHO router is shown in figure 3, where the tunnel 0 interface is up and
assigned appropriate IPv4 address. The routing table at SOHO router is shown in figure 4. Note that
the EIGRP via GRE tunnel configuration is not supported by Packet Tracer. Alternatively GNS3 is used
to generate the routing table, where we can see that the EIGRP works successfully via GRE tunnel as
both EIGRP internal and external routes are presented in the routing table via tunnel0 interface.
Finally, the main part of configuration file on SOHO router is given by figure 5.
NetworkReport 14
Figure 3 The state of interfaces on SOHO router.
Figure 4 The routing table at SOHO router.
Figure 5 The configuration file on SOHO router.
Configuring for IPv6
SimilartoIPv4,multi-areaOSPFandEIGRP forIPv6 are configuredtoenable routinginthe company
network.DefaultstaticroutingisconfiguredatBelfasttodirect all trafficaccessingInternettoISP.The
defaultroutingisredistributedbyOSPFandEIGRP to otherinternal routers.IPv6ACLsare also
requiredaccordingtothe same policiesonwhichIPv4ACLsare implemented.The detailedconfigure
filesforIPv6ACLsare presentedinfigure 6.
NetworkReport 15
Figure 6 Configuring ACLs for IPv6.
NetworkReport 16
Phase 2.b: Project Design and Deployment Process
Deployingnewnetworkequipment inthe PaddyPowerPtyLtdCompany will allow greaterreliability
and performance toensure informationtechnologyservicesworkatthe desiredlevel required.This
equatestolesspossibledowntime of missioncritical applicationsanddeviceswhichhelpsprevents
lostrevenue due toservice outages.
The current networkhardware isapproachingfive yearsold,4-5yearsisthe reliable lifeexpectancyof
mosthardware. Network hardware canpotentiallylastlonger,however,asthe PaddyPowerPtyLtd
Companyisexpectinggrowthwe needtoimprove the networkinfrastructure thatprovidescritical
servicesto thisnetwork. Itisadvisable toupgrade the hardware before potentialfailure becomesa
realisticpossibility.Inadditionthe current networkwasaddedtoinvariousstages andcurrentlyhas
no warrantyor vendorsupport, if a hardware componentfailsitmaybe harderto rectifythese issue.
We dobelieve inmaximizingthe returnoninvestmentforequipment, itwouldbe bestpractice to
upgrade thisnetworkwiththe appropriate hardware tomeetthe needsof thisdevelopingCompany.
We have analyzedthe currentneeds andwiththe planneddeploymentof the new routersand
switches thiswill more thancaterforthe networkrequirement fornow andinthe future forthis
developingcompany.
Finallythe new 48-portswitchisa recommendedpurchase inordertobettergraspour network
picture,dataloadand bottle necks.Itisa managedswitchwhichwill allowustosee exactlywhat
trafficiscomingand goingfromthe serversandalsoallow usto see the data comingand goingfrom
the othermanagedswitches.Thiswill allow usthe betteraddressnetworkissuesandhave a better
handle onour overall Computernetworkhealth.
Preparing and maintaining Baseline network records are essential tasks that will pay off when you
needtoimplementchangestoanetwork.Upto date documentationprovidesinformation about how
the network should look and perform, as well as where to seek help if there are problems.
Enterprisescanmeetnewservicesaggregationrequirementswithoutexpensive equipment upgrades
or radical network designs so by taking advantage of the industries most popular WAN and MAN
aggregationplatform, we have chosen the Cisco7200VXR SeriesRouter. The VSA supports up to 960Mbps
for 1400-byte packets with 1000 active tunnels. Customerswhorequire 7200 VSA or VAM2+ support should
migrate to Cisco IOS Release 12.4(15)Tx . This will be the IOS we will use so as to achieve GRE tunnel
on our links which delivers exceptional performance, modularity, and scalability.
The Hardware that we will used for the implementation of the new network requirement for Paddy
Power Company first requires an upgrade to the Belfast network with a new network router. This
router will be supporting OSPF routing protocol with the redistribution of EIGRP from the Galway
router.
For unificationof thisnetworkwe will be usingthisrouterinall locations.The connectionfrom Belfast
to Derrywill be a GigabitEthernetport,the connectionbetween Belfast and Cork will be a serial link,
also the connect between Belfast router and ISP will also be a Gigabit Ethernet port (RJ-45 and MII).
NetworkReport 17
This router supports Synchronous serial ISDN BRI, PRI, HSSI, T3, E3 as well as Ethernet 10BASE-T and
Fast Ethernet 100BASE-T and Gigabit Ethernet ports. This router uses Cisco Internetwork Operating
System Software IOS (tm) 7200 Software (C7200-IK8S-M), Version 12.4(XD7) but can be upgraded to
support GRE tunnel.
Cisco 7200VXR Series Router
Reference source:
http://www.cisco.com/c/en/us/products/collateral/routers/7200-series-
routers/product_data_sheet09186a008008872b.html
http://www.cisco.com/c/en/us/td/docs/ios/12_4/12_4x/release/notes/rn7000XD.html#wp109322
The Hardware that we will used for the switching in this network will be the Cisco Nexus 7700 F3-
Series switch, this switch supports is a low-latency, high-performance, high-density 1 and 10 Gigabit
Ethernet module design, It delivers up to 768 wire-rate for its 10 Gigabit Ethernet port.
These new Nexus 7700 switches offer industry’s highest scalability in an environmentally optimized
formfactor while maintainingoperational,feature andarchitectural consistency. Againforunification
and support we will be implementing this switch in all business locations.
The Cisco switch has introduced Application-Centric Infrastructure as the vision for Next Generation
Data Centre architecture, built for both today’s physical and virtual workloads as well as tomorrow’s
highly dynamic Cloud-based, and performance intensive big data application environments.
We chose this switch because it will support Paddy Power Pty Ltd now and for its future needs. This
switch supports a 1-Gbps SFP and 10-Gbps Enhanced SFP (RSFP+) which is required for our network
design at present.
Cisco Nexus 7700 F3-Series switch
NetworkReport 18
http://www.cisco.com/c/en/us/products/collateral/switches/nexus-7000-series-switches/datasheet-
c78-730273.html
Before the real implementation in enterprise environment, it is necessary to build modelling in lab
environmentfortestinganddebuggingthe proposedsolution,thusminimizingthe riskof the network
redistribution.
The upgrade process, including hardware change and software configuration as well as laying new
cabling, is recommended that we will implemented on off peak time and weekends when the least
disruptionwillbe generated. Lastbutnot least,all configurationsettings before upgrade are saved at
TFTP serverforbackup.Therefore,the systemcanbe easilyrecoveredif problems are incurred due to
upgrading process.
The network upgrading process might need co-operative work between networking engineers and
technicians from all companies. The work will be split into specific tasks, including hardware
installation, cabling, configuration, testing and documentation, and evenly allocated to different
working groups in each location. Regular meetings are maintained during the process to report
progress.
Licensing
Customers license the right to use Cisco intellectual property that software from Cisco. When you
purchase new hardware, you also purchase the software and the license to use it. The Hardware we
purchasedcomes withlicensedsoftware.Whenyouneedadifferentfeatureset,youneedtopurchase
the license for it. Upgrade features may be licensed separately, and special Cisco IOS features are
licensedseparately,eitheronaflatusage or per-seatbasis, dependingonthe features. For this reason
if we needto upgrade oursoftware tomeetadditional requirements additional licensing is required.
When customers download software from the Cisco.com software centre, or e-mail downloaded
software to someone, they are obligated to comply with the terms and conditions of the Cisco
Software License agreement.
The embedded Cisco software that runs on the hardware as well as Cisco standalone software is not
transferable. If you purchase used or secondary-market Cisco equipment, you must acquire a new
license from Cisco before the software can be used.
Stakeholders
A stakeholderisanyindividual or organization thatisaffectedbythe activitiesof abusiness. They may
have a direct or indirect interest in the business, and may be in contact with the business on a daily
basis, or may just occasionally.
The stakeholders include present and potential investors, employees, lenders, suppliers and other
trade creditors, customers, governments and their agencies and the public. They use financial
statementsinordertosatisfysome of theirdifferent needs for information. These needs include the
some of the following.
Employeesandtheirrepresentativegroupsare interestedininformationaboutthe stabilityand
profitabilityof theiremployers.Theyare alsointerestedininformationwhichenablesthemtoassess
NetworkReport 19
the abilityof the enterprise toprovideremuneration, retirementbenefitsandemployment
opportunities.
Customershave aninterestininformationaboutthe continuance of anenterprise,especiallywhen
theyhave a long-terminvolvementwith,orare dependenton,the enterprise.
Corporationsare motivatedtobecome more sociallyresponsible becausetheirinternal stakeholders
expectthemtounderstandandaddressthe relevant social andcommunityissue.Understandingwhat
causesare importanttoemployeesshouldbe aprioritybecause of the manyinterrelatedbusiness
benefitsthatcanbe derivedfromincreasedemployeeengagement leadingtohigherproductivity.
As part of more comprehensivecompliance andethicsprograms,manycompanieshave formulated
internal policiesrelevant tothe ethical conductof employees.Thesepoliciescanbe typicallycalleda
corporate ethicsstatement,ortheycan be more detailedpolicies typicallycalledcorporate ethics
codes.Theyare generallymeanttoidentifythe company'sexpectationsof workersandtooffer
guidance onhandlingsome of the more commonethical problems thatmightarise inthe course of
doingbusiness.
It is hopedthathavingsucha policywill leadtogreaterethical awareness,consistencyinapplication,
and the avoidance of ethical disasters.Anincreasingnumberof companiesalsorequire employeesto
attendseminarsregardingbusinessconduct,whichofteninclude discussionof the company'spolicies,
specificcase studies,andlegal requirements.Some companiesevenrequire theiremployeestosign
agreementsstatingthattheywill abidebythe company'srulesof conduct.
NetworkReport 20
THE ACS CODE OF ETHICS AND CODE OF CONDUCT FOR XYZ PTY LTD
Introduction
This Code is based on the following basic assumptions:
- Ethics among shareholders, owners, directors and management are a necessary element for
companiesinthe 21st centuryto adequatelymeet theirobjectives,to the degree that Ethics are a key
requisite in guaranteeing and balancing the rights and interests of all stakeholders involved:
Employees, clients, shareholders, suppliers and business partners and the society at large.
- Ethicspresuppose rigorouscompliance inandbythe company with applicable legislation, as well as
with the Articles of Incorporation and Regulations for internal operations, where they exist.
- Ethicswithinthe companyrequire that shareholders and owners become guarantors of compliance
in respect of obligations for directors and management.
- Even though this Code has been created with the intention of being applicable into the company.
- Ideally,the Boardof Directors is responsible for drawing up the Code of Ethics for the company and
the General Shareholders’Meetingfor approvingthatCode.Should,however, the Board also proceed
with approval, that decision must be ratified by the Shareholders’ Meeting.
Code of Ethics for XYZ Pty Ltd Shareholders and Owners
The Primacy of the Public Interest Reference to Case
In accordance with this value you will:
a) Identify those potentially impacted by your work and explicitly consider their interests;
d) Take into consideration the fact that your profession traverses many other professions, and has
implications for other social systems and organisations;
e) Endeavour to preserve the integrity, security, continuity and utility of ICT;
f) Respect the intellectual property of others;
g) Endeavour to preserve the confidentiality and privacy of the information of others.
Pleaseref to theaddendum for moreinformation
The Enhancement of Quality of Life
a) Recognise, in your work, the role that ICT can play to enhance the quality of life of people,
particularly the disadvantaged or those with disabilities;
Pleaseref to theaddendum for moreinformation
Honesty
NetworkReport 21
b) Not knowingly mislead a client or potential client as to the suitability of a product or service;
e) Qualify professional opinions which you know are based on limited knowledge or experience;
Pleaseref to theaddendum for moreinformation
Competence
a) Endeavour to provide products and services which match the operational and financial needs of
your stakeholders;
b) Not misrepresent your skills or knowledge;
d) Respect and protect your stakeholders' proprietary interests;
e) Advise your stakeholders when you believe a proposed project, product or service is not in their
best interest;
Pleaseref to theaddendum for moreinformation
Professional Development
a) Continue to upgrade your knowledge and skills;
Pleaseref to the addendum for moreinformation
Professionalism
a) Take a calm, objective, informed and knowledgeable stance on your professional work,
complementing your enthusiasm and engagement in it;
b) Take appropriate action against members who engage in behaviour contrary to this Code;
Pleaseref to theaddendum for moreinformation
In the exercise of their ownership rights, they should:
- Configure theircompanyasaninstrumentatthe service of creatingwealth,makingtheirindisputable
Objective of obtaining a profit compatible with sustainable, environmentally sound social
development,
Making certain that all activities are carried out in an ethical and responsible manner.
- Configure the companyasa mediumand long-term entity, not compromising its continuity through
an
Interest in short-term enrichment.
NetworkReport 22
- Exercise voting rights at the General Shareholders’ Meetings on an informed and responsible basis
and,
In doing so, always demand ethical behaviour from the company, including approval of the Code of
Ethics
And orchestrating effective application thereof.
- Search for a fair balance between capital and work, in such a fashion that, through their salaries,
workers receive just compensation for their work.
- Appoint as directors and management persons who meet the requisites established regarding
adequate preparation and experience, and who carry out management functions in a professional,
ethical and responsible manner.
- Define and defend the mission and values of the company in accordance with its Code of Ethics.
Directors and Management
In the exercise of their administrative and management functions, they should:
A) In relation to Management functions:
- Carry out their activities in a professional, ethical and responsible manner.
- Complyanddemandcompliance withthe Code of Ethics of the company and, to that end, make the
Code known and establish appropriate mechanisms to guarantee application. In particular there
shouldbe a body,ideallyanEthicsCommittee, made up of people with sufficient power to apply the
Code and correct infractions.
- Informownersorshareholdersperiodically and accurately as to the situation of and outlook for the
company.
- Promote effective participationbyshareholdersatthe General Meetings,especiallybyfacilitatingthe
exercise of information and voting rights.
- Comply and demand compliance with generally accepted accounting standards and principles, and
establish internal and external risk management and control systems in accordance with the
characteristics of the company.
- Keep the books and ledgers of the company in an accurate and honest manner, in order to permit
that information be obtained and decisions be taken on an informed and responsible basis.
- Provide external andinternal auditorsof the companywith all such information and explanations as
may be required to carry out their work.
CODE OF ETHICS
- Subordinate their own interests to those of the company when acting on behalf and in
representation thereof and not use corporate assets in their own benefit, except with due
transparency,priorauthorisationfromthe relevantcorporate bodyandin exchange for consideration
deemed appropriate on the market.
NetworkReport 23
- Immediately notify the administrative body as to any event or situation which would represent or
couldgive rise to a conflict between the interests of the company and the individual interests of the
director or manager, and abstain from intervening in the resolution.
- Facilitate the transparencyof andcontrol overtheirremunerationinsuch a way that it is guaranteed
to be appropriate to their level of responsibility and performance and to the characteristics of the
company.
- Maintainas confidential the background,dataanddocumentstowhichthey have access by virtue of
their functions in the company, even when they no longer carry out such functions.
- Make paymentandcomplywithdebtsincurredbythe companywithoutunjustified delay or breach,
and collect on balances due with the diligence required in each case.
- Prepare andmaintaininplace a successionplanforkeypositionswithinthe company, to ensure that
continuity of the company does not depend on the presence of any given director or manager.
- Choose theircollaboratorsandsubordinatesinaccordance withthe principles of merit and capacity,
looking only to fulfil the interests of the company.
In relation to suppliers and clients of the Company:
- Maintain ethical and licit relationships with suppliers of goods and services.
- Search for and select only suppliers whose business practices respect human dignity, are not in
breach of law and do not place the company’s reputation in danger.
- Selectsupplierson the basis of the appropriateness of their products or services, as well as of their
prices, delivery conditions and quality, not accepting or offering gifts or commissions, in cash or in
kind, whichcould alter the rules of free competition in the production and distribution of goods and
services.
- Aspire to excellence in the goods and services of the company in such a way that clients and
consumers obtain the satisfaction expected therefrom.
- Guarantee the productsand servicesof the companyanddeal quickly and efficiently with consumer
and user claims, with a view to achieving satisfaction beyond mere compliance with prevailing
legislation.
In relation to competitors of the Company:
- Not abuse a dominant or privileged market position.
- Compete ingoodfaithwithothercompanies cooperating to achieve a free market based on mutual
respect between competitors and abstaining from engaging in unfair practices.
- In particular, not take clients from other competitors employing unethical methods.
In relation to employees of the Company:
- Treat employees with dignity, respect and justice, taking into consideration their different cultural
sensitivities.
NetworkReport 24
- Notdiscriminate againstemployeesonthe groundsof race,religion,age,nationality,sex oranyother
personal or social condition different from the conditions of merit and capacity.
- Not permit any form of violence, harassment or abuse at the workplace.
- Recognise the rights of association, union membership and collective negotiation.
- Promote the professional development, training and promotion of employees.
- Link remuneration and the promotion of employees to their conditions of merit and capacity.
- Establish and communicate clear criteria and rules which maintain a balance between the rights of
the company and those of employees in hiring processes and in the separation thereof, even in the
case of a voluntary change in employee.
- Guarantee health and safety on the job, taking any such measures as are considered reasonable to
maximise prevention of occupational risk.
- Look to reconcile work at the company with the personal and family life of employees.
- Lookto achieve the occupational integration of persons with incapacities or handicaps, eliminating
barriers of all kinds in the ambit of the company in order to achieve insertion.
- Facilitate the participation of employees in the social action programmes of the company.
In relation to the civil society:
- Respect human rights and democratic institutions, and promote them wherever possible.
- Maintain the principle of political neutrality, without interfering politically in those communities
where theycarry outtheiractivities,alsoasademonstrationof respectfor the different opinions and
sensitivities of people related to the company.
- Maintain licit and respectful relationships with public authorities and institutions, not accepting or
offering gifts or commissions in cash or in kind.
- Make contributions to political parties or public institutions only in accordance with prevailing
legislation and, in any case, guaranteeing transparency.
- Collaborate with Public Entities and non-governmental entities and organisations dedicated to
improving levels of social attention for disadvantaged persons.
NetworkReport 25
C oncl usi on
The expected expansionof the XYZPtyLtd will require new hardwarebeinginstalledalongwith
newnetworkoperatingsystemandcablingtolinkthe multi-areanetworkstogether.
In conclusion, forXYZPtyLtd to be able tosetupa secure networkingenvironment, itisessentialto
make use of all networktechnologieslike, Multi-areaOSPF,EIGRP,Frame Relay,NATandPATalong
withGRE Tunnel,ACL’sandputthemall togetherasone to create a secure androbust network.
We have made othersuggestionthroughourreporttoenhance the networkinspeedandresilience
as well asredundancy.Itishighlyrecommendedthatthe XYZCompanyadoptour future design
recommendation whichwillcoverall of the above requirements.
Project Design and implantation Process in no set order,
Yiwei Yu, Brian Lawson, Jose moreu, Tarek Elwan
NetworkReport 26
THE ACS CODE OF PROFESSIONAL CONDUCT – 2012
Preamble
An essentialcharacteristicof a professionisthe needforitsmembersto abide by a code of ethics. For
the ACS, this code is established as the Code of Professional Conduct and is part of the Society's
Regulations. These Regulations apply to any ACS member who works in the field of information and
communications technology (ICT).
This Code of Professional Conduct (the Code) identifies six core ethical values and the associated
requirementsforprofessionalconduct.The Societyrequiresitsmemberstoabide bythese values,and
act with responsibility and integrity in all of their professional dealings.
Relevance to Law
The Code of Professional Conducthasrelevance toprofessional standardslegislation. Failure to abide
by the Code couldbe usedas groundsfor a claimof professional negligence.The Code may be quoted
by an expertwitnessgivinganassessmentof professional conduct. Failure to observe the Code could
also lead to disciplinary action by the ACS.
As an ACS member you must uphold and advance the honour, dignity and effectiveness of being a
professional.Thisentails,inadditiontobeingagoodcitizenandactingwithinthe law,your adherence
to the following ACS values:
1. The Primacy of the Public Interest
You will place the interests of the public above those of personal, business or sectional interests.
2. The Enhancement of Quality of Life
You will strive to enhance the quality of life of those affected by your work.
3. Honesty
You will be honest in your representation of skills, knowledge, services and products.
4. Competence
You will work competently and diligently for your stakeholders.
5. Professional Development
You will enhance your own professional development, and that of your colleagues and staff.
6. Professionalism
You will enhance the integrityof the ACSandthe respect of its members for each other. In a situation
of conflict between the values, The Primacy of the Public Interest takes precedence over the other
values.ThisCode of Professional Conductisaimedspecificallyatyouas an individual practitioner, and
isintendedasa guideline foryouracceptable professional conduct.Itisapplicabletoall ACS members
regardless of their role or specific area of expertise in the ICT industry.
NetworkReport 27
The followinglistof requirementsisnotexhaustive andshouldnotbe readas a complete definition of
acceptable professional conduct in all practical situations. The intention of the Code is to illustrate
whatconstitutesprofessionalbehaviour.Youare expected to take into account the spirit of this Code
in order to resolve ambiguous or contentious issues concerning professional conduct. The ACS can
help you resolve ethical dilemmas.
The Primacy of the Public Interest Reference to Case
In the context of this Code, the public interest takes precedence
Over personal, private and sectional interests, and any conflicts should be resolved in favour of the
public interest. In your work, you should safeguard the interests of your immediate stakeholders,
provided that these interests do not conflict with the duty and loyalty you owe to the public. The
public interest is taken to include matters of public health, safety and the environment.
In accordance with this value you will:
a) Identify those potentially impacted by your work and explicitly consider their interests;
b) Raise withstakeholdersanypotential conflictsbetweenyourprofessional activityandlegal or other
accepted public requirements;
c) Advise yourstakeholdersassoonaspossible of anyconflictsof interest or conscientious objections
that you have;
d) Take into consideration the fact that your profession traverses many other professions, and has
implications for other social systems and organisations;
e) Endeavour to preserve the integrity, security, continuity and utility of ICT;
f) Respect the intellectual property of others;
g) Endeavour to preserve the confidentiality and privacy of the information of others.
The Enhancement of Quality of Life
The developmentof ICThas hada significantimpactonsociety and our way of life. Whilst this impact
has beenbeneficialtoa verygreatextent,like all technologies,ICThasalsohadsome negative effects,
and will continue todoso.Anethical approachto your workwill helptorecognise andminimise these
adverse effects. You should promote equal access to the benefits of ICT by all members of society.
In accordance with this value you will:
a) Recognise, in your work, the role that ICT can play to enhance the quality of life of people,
particularly the disadvantaged or those with disabilities;
b) Protect and promote the health and safety of those affected by your work;
c) Understand, and give due regard to, the perceptions of those affected by your work;
NetworkReport 28
d) Attemptto increase the feelingsof personal satisfaction,competence,andcontrol of those affected
by your work.
Honesty
Do not breachpublic trust in the profession or the specific trust of your stakeholders. Observance of
utmosthonestyandintegritymustunderlie all yourprofessional decisions and actions. Circumstances
will undoubtedly arise during the course of your professional career where it may appear to be
beneficial foryoutobe deceptivein some way. This type of behaviour is not acceptable professional
conduct.
In accordance with this value you will:
a) Reject, and will not make, any offer of bribery or inducement;
b) Not knowingly mislead a client or potential client as to the suitability of a product or service;
c) Distinguish between your professional and personal opinions and advice;
d) Give realistic estimates for projects under your control;
e) Qualify professional opinions which you know are based on limited knowledge or experience;
f) give credit for work done by others where credit is due;
g) not attempt to enhance your own reputation at the expense of another person’s reputation.
Competence
Accept only such work as you believe you are competent to perform, and do not hesitate to obtain
additional expertise fromappropriately qualified individuals where advisable. You should always be
aware of yourown limitationsandnotknowinglyimplythatyouhave competenceyoudonotpossess.
Thisis distinctfromacceptingatask of whichthe successful completion requires expertise additional
to your own. You cannot possibly be knowledgeable on all facets of ICT but you should be able to
recognise when you need additional expertise and information.
In accordance with this value you will:
a) endeavour to provide products and services which match the operational and financial needs of
your stakeholders;
b) not misrepresent your skills or knowledge;
c) make yourself aware of relevant standards and legislation, and act accordingly;
d) respect and protect your stakeholders' proprietary interests;
e) advise yourstakeholderswhenyoubelieve aproposedproject,productorservice isnotin theirbest
interest;
f) accept responsibility for your work;
NetworkReport 29
g) respect, and seek when necessary, the professional expertise of colleagues in their areas of
competence.
Professional Development
Keep yourself informed of such new technologies, practices and standards as are relevant to your
work. Otherswill expectyoutoprovide special skillsand advice; and in order to do so, you must keep
your knowledge up-to-date. You should encourage your colleagues and staff to do the same. Take
actionto ensure thatyour hard-won knowledge and experience are passed on in such a way that the
recipients not only improve their own effectiveness in their present work but also become keen to
advance their capabilities and take on additional responsibilities.
In accordance with this value you will:
a) Continue to upgrade your knowledge and skills;
b) Increase your awareness of issues affecting the profession and its relationship with the public;
c) Encourage your colleagues,staff andstudentstocontinue theirownprofessionaldevelopment; and
d) Supporteducation,trainingandprofessional development in ICT that reflects the diverse needs of
individual professionals and their various career paths.
Professionalism
The ICT industryisrelativelynewandcharacterisedbyrapid change. It has not had the opportunity to
evolve overmanydecadesandacquire its own standards and legislation. The ACS is endeavouring to
improve publicconfidenceinthe ICTindustry.Itis imperative thatprofessional grade members of the
ACSmaintainprofessional standardsthatimprove andenhance the industry'simage, especially in the
workplace. All people have a right to be treated with dignity and respect. Discrimination is
unprofessional behaviour, as is any form of harassment. Members should be aware that the ACS can
helpthemresolve ethical dilemmas.Itcanalsoprovide supportfortakingappropriate action,including
whistle-blowing, if you discover an ACS member or employer engaging in unethical behaviour.
In accordance with this value you will:
a) Take a calm, objective, informed and knowledgeable stance on your professional work,
complementing your enthusiasm and engagement in it;
b) Take appropriate action against members who engage in behaviour contrary to this Code;
c) Confront attempts to limit diversity in the workplace, and ensure that opportunities for
employment,advancement,remunerationandotherworkingconditionsare based on the actual skills
and performance of employees, free of stereotypes and prejudices;
NetworkReport 30
d) note that the corporate actionsof the ACSare subjecttothisCode,andyou shoulddowhateveryou
can to ensure that the ACS and its officer bearers and staff meet this obligation;
e) neither require, nor attempt to influence, any person to take any action which would involve a
breach of this Code;
f) refrain from any conduct or action in your professional role which may tarnish the image of the
profession or detract from the good name of the ACS;
g) endeavour to extend public knowledge and understanding of ICT;
h) co-operate in advancing ICT by communication with other professionals, students and the public;
and
i) have pride inyour profession,andprotectandpromote professionalism and trustworthiness in ICT.

More Related Content

What's hot

Cisco Live! :: Content Delivery Networks (CDN)
Cisco Live! :: Content Delivery Networks (CDN)Cisco Live! :: Content Delivery Networks (CDN)
Cisco Live! :: Content Delivery Networks (CDN)Bruno Teixeira
 
Networking Technology Transformation to SDN and NFV
Networking Technology Transformation to SDN and NFVNetworking Technology Transformation to SDN and NFV
Networking Technology Transformation to SDN and NFVHimawan Nugroho
 
9th SDN Expert Group Seminar - Session1
9th SDN Expert Group Seminar - Session19th SDN Expert Group Seminar - Session1
9th SDN Expert Group Seminar - Session1NAIM Networks, Inc.
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs ExplainedAlan Percy
 
IWAN Lab Guide
IWAN Lab GuideIWAN Lab Guide
IWAN Lab Guidejww330015
 
Scalar Brocade Toronto Roadshow 2013
Scalar Brocade Toronto Roadshow 2013Scalar Brocade Toronto Roadshow 2013
Scalar Brocade Toronto Roadshow 2013patmisasi
 
PLNOG 7: Klaudiusz Staniek - MPLS a QoS - praktycznie
PLNOG 7: Klaudiusz Staniek - MPLS a QoS - praktyczniePLNOG 7: Klaudiusz Staniek - MPLS a QoS - praktycznie
PLNOG 7: Klaudiusz Staniek - MPLS a QoS - praktyczniePROIDEA
 
Iben from Spirent talks at the SDN World Congress about the importance of and...
Iben from Spirent talks at the SDN World Congress about the importance of and...Iben from Spirent talks at the SDN World Congress about the importance of and...
Iben from Spirent talks at the SDN World Congress about the importance of and...Iben Rodriguez
 
Bcmsn ccnp switch quick reference sheets --good (1)
Bcmsn ccnp  switch quick reference sheets --good (1)Bcmsn ccnp  switch quick reference sheets --good (1)
Bcmsn ccnp switch quick reference sheets --good (1)economicsvnsgu
 
9th SDN Expert Group Seminar - Session3
9th SDN Expert Group Seminar - Session39th SDN Expert Group Seminar - Session3
9th SDN Expert Group Seminar - Session3NAIM Networks, Inc.
 
Future-Proofing SD-WAN: Building on Open and Cost-Effective uCPE
Future-Proofing SD-WAN: Building on Open and Cost-Effective uCPEFuture-Proofing SD-WAN: Building on Open and Cost-Effective uCPE
Future-Proofing SD-WAN: Building on Open and Cost-Effective uCPEEnea Software AB
 
RADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press ReleaseRADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press ReleaseRonald Bartels
 

What's hot (18)

1800sg
1800sg1800sg
1800sg
 
Cisco Live! :: Content Delivery Networks (CDN)
Cisco Live! :: Content Delivery Networks (CDN)Cisco Live! :: Content Delivery Networks (CDN)
Cisco Live! :: Content Delivery Networks (CDN)
 
Pravin Naidu CV
Pravin Naidu CVPravin Naidu CV
Pravin Naidu CV
 
Networking Technology Transformation to SDN and NFV
Networking Technology Transformation to SDN and NFVNetworking Technology Transformation to SDN and NFV
Networking Technology Transformation to SDN and NFV
 
9th SDN Expert Group Seminar - Session1
9th SDN Expert Group Seminar - Session19th SDN Expert Group Seminar - Session1
9th SDN Expert Group Seminar - Session1
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
Verizon Managed SD-WAN with Cisco IWAN
Verizon Managed SD-WAN with Cisco IWAN Verizon Managed SD-WAN with Cisco IWAN
Verizon Managed SD-WAN with Cisco IWAN
 
5G Network Introduction
5G Network Introduction5G Network Introduction
5G Network Introduction
 
IWAN Lab Guide
IWAN Lab GuideIWAN Lab Guide
IWAN Lab Guide
 
Scalar Brocade Toronto Roadshow 2013
Scalar Brocade Toronto Roadshow 2013Scalar Brocade Toronto Roadshow 2013
Scalar Brocade Toronto Roadshow 2013
 
PLNOG 7: Klaudiusz Staniek - MPLS a QoS - praktycznie
PLNOG 7: Klaudiusz Staniek - MPLS a QoS - praktyczniePLNOG 7: Klaudiusz Staniek - MPLS a QoS - praktycznie
PLNOG 7: Klaudiusz Staniek - MPLS a QoS - praktycznie
 
Iben from Spirent talks at the SDN World Congress about the importance of and...
Iben from Spirent talks at the SDN World Congress about the importance of and...Iben from Spirent talks at the SDN World Congress about the importance of and...
Iben from Spirent talks at the SDN World Congress about the importance of and...
 
Bcmsn ccnp switch quick reference sheets --good (1)
Bcmsn ccnp  switch quick reference sheets --good (1)Bcmsn ccnp  switch quick reference sheets --good (1)
Bcmsn ccnp switch quick reference sheets --good (1)
 
NFV SDN for carriers
NFV SDN for carriersNFV SDN for carriers
NFV SDN for carriers
 
Henry.Resume
Henry.ResumeHenry.Resume
Henry.Resume
 
9th SDN Expert Group Seminar - Session3
9th SDN Expert Group Seminar - Session39th SDN Expert Group Seminar - Session3
9th SDN Expert Group Seminar - Session3
 
Future-Proofing SD-WAN: Building on Open and Cost-Effective uCPE
Future-Proofing SD-WAN: Building on Open and Cost-Effective uCPEFuture-Proofing SD-WAN: Building on Open and Cost-Effective uCPE
Future-Proofing SD-WAN: Building on Open and Cost-Effective uCPE
 
RADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press ReleaseRADWIN, software defined wide area network, Press Release
RADWIN, software defined wide area network, Press Release
 

Similar to CaseStudy_4_Master

Business Ready Teleworker Design Guide
Business Ready Teleworker Design GuideBusiness Ready Teleworker Design Guide
Business Ready Teleworker Design GuideJoel W. King
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld
 
IPv6 Support at NEC CEs
IPv6 Support at NEC CEsIPv6 Support at NEC CEs
IPv6 Support at NEC CEsAPNIC
 
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Canada
 
Final Project.pptx
Final Project.pptxFinal Project.pptx
Final Project.pptxsheinhtet6
 
How to use SDN to Innovate, Expand and Deliver for your business
How to use SDN to Innovate, Expand and Deliver for your businessHow to use SDN to Innovate, Expand and Deliver for your business
How to use SDN to Innovate, Expand and Deliver for your businessNapier University
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpnRajesh Porwal
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Cisco SFPOC48SR
Cisco SFPOC48SRCisco SFPOC48SR
Cisco SFPOC48SRsavomir
 
WAN Summit NYC: SDN, SD-WAN, NFV - I'm Confused!
WAN Summit NYC: SDN, SD-WAN, NFV - I'm Confused!WAN Summit NYC: SDN, SD-WAN, NFV - I'm Confused!
WAN Summit NYC: SDN, SD-WAN, NFV - I'm Confused!Ciaran Roche
 
7th SDN Expert Group Seminar - Session2
7th SDN Expert Group Seminar - Session27th SDN Expert Group Seminar - Session2
7th SDN Expert Group Seminar - Session2NAIM Networks, Inc.
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
LTE: Building next-gen application services for mobile telecoms
LTE: Building next-gen application services for mobile telecomsLTE: Building next-gen application services for mobile telecoms
LTE: Building next-gen application services for mobile telecomsNuoDB
 

Similar to CaseStudy_4_Master (20)

Business Ready Teleworker Design Guide
Business Ready Teleworker Design GuideBusiness Ready Teleworker Design Guide
Business Ready Teleworker Design Guide
 
En35793797
En35793797En35793797
En35793797
 
Public Internet WAN
Public Internet WANPublic Internet WAN
Public Internet WAN
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSX
 
IPv6 Support at NEC CEs
IPv6 Support at NEC CEsIPv6 Support at NEC CEs
IPv6 Support at NEC CEs
 
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
Mohammed alshahrani cv 2016
Mohammed alshahrani  cv 2016Mohammed alshahrani  cv 2016
Mohammed alshahrani cv 2016
 
Final Project.pptx
Final Project.pptxFinal Project.pptx
Final Project.pptx
 
How to use SDN to Innovate, Expand and Deliver for your business
How to use SDN to Innovate, Expand and Deliver for your businessHow to use SDN to Innovate, Expand and Deliver for your business
How to use SDN to Innovate, Expand and Deliver for your business
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Tharun Resume
Tharun ResumeTharun Resume
Tharun Resume
 
Cisco SFPOC48SR
Cisco SFPOC48SRCisco SFPOC48SR
Cisco SFPOC48SR
 
WAN Summit NYC: SDN, SD-WAN, NFV - I'm Confused!
WAN Summit NYC: SDN, SD-WAN, NFV - I'm Confused!WAN Summit NYC: SDN, SD-WAN, NFV - I'm Confused!
WAN Summit NYC: SDN, SD-WAN, NFV - I'm Confused!
 
7th SDN Expert Group Seminar - Session2
7th SDN Expert Group Seminar - Session27th SDN Expert Group Seminar - Session2
7th SDN Expert Group Seminar - Session2
 
Open v ran
Open v ranOpen v ran
Open v ran
 
Updated CV
Updated CVUpdated CV
Updated CV
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
LTE: Building next-gen application services for mobile telecoms
LTE: Building next-gen application services for mobile telecomsLTE: Building next-gen application services for mobile telecoms
LTE: Building next-gen application services for mobile telecoms
 

CaseStudy_4_Master

  • 1. NetworkReport 1 Case Study 4 Networks CCNA4 Simplifying IT Consulting Firm PADDY POWER Pty Ltd. For XYZ Pty Ltd. This Presentation is Designed By Brian Lawson - Jose moreu -Yiwei Yu 1/6/2014
  • 2. NetworkReport 2 CCNA4: Case Study Index Page 3 Introduction Page 4 The Case Study’s’ outline Page 4 The Purpose of the design Page 5 Technical Support Services Page 7 Future Design Page 9 IP Addressing Page 12 Configuring Routers with OSPF and EIGRP Page 12 Configuring NAT, Frame Relay, CHAP and ACLs Page 13 Configuring GRE Tunnel Page 14 Configuring for IPv6 Page 15 Page 16 Project Design and Deployment Process Page 17 Page 18 Licensing - Stakeholders Page 19 Page 20 Code of Ethics and code of conduct for XYZ Pty Ltd Page 21 Page 22 Page 25 Conclusion Page 26 The ACS Code Of Professional Conduct – 2012
  • 3. NetworkReport 3 Introducti on The followingdocumentationisfor XYZPty Ltd whichisCompanythat deliversendtoendsolutions for businesscontrol andprocessimprovement. ThisCompanyoffers consultingservicesacross Capital Markets, thisCompany’s focusisonperformance andcontrol enhancement. XYZPtyLtd pridesthemselvesonbeingable todelivervaluable solutionsthathelp itsclientsgrow their businessinastructuredand controlledfashion. Our consultingfirmis PADDYPOWERPty Ltd we will be redesign the ICTinfrastructure forXYZPty Ltd whichhave beenin existence formanyyears.ThisCompanyismade upvarioustypesof equipmentthathasbeenacquiredfromthe purchase of differentcompaniesoverthe years ,we have decidedtocommence workon BelfastandDerrywhichis in Area0 first.ThisArea0 isthe back bone of the network, phase one will be implantationof new hardware whichwillsupportthe future growthforthe XYZ Company andwill supportthe requirement of connectionBandwidthfor the overall Company. The expected expansion of the XYZPtyLtd will require new hardwarebeinginstalledalongwith newnetworkoperatingsystemandcablingtolinkthe multi-areanetworkstogether. The documentwe have preparedalongwithplans,showsthatwe have designedandimplemented sufficientscope forthisCompany,sothatthe networkswillbe able tosupport100% growthover the nextfive yearperiod. An evaluationof all availablehardware andsoftware platformswere conductedinordertomake an informeddecisiononthe mostappropriate platformwhichwill fulfill the needsof XYZPtyLtd. We have provided aprototype forreview of the network before itisfullyimplemented,whichwill include abrand newnetworktopology, providingthe highestdegreeof technical efficiencyaswell as redundancy. Eachdevice inthisnetwork will be configured withroutingprotocolsthatprovide securityandalso AccessControl List(ACL) whichwill provide completenetworksecurity forthe XYZ Company. The resultof our implantation istoprovide aseamlessservice inmanydifferentregionswhilenot compromisingqualityorsecurity.We intend todeliverthe lowest possiblecostinthe redesign of the networkinfrastructure,andtoincrease the networksbandwidthtosupplythe fasterdelivery and mostimportantly, demonstrate ourdeepunderstandingof the solutionsrequiredforthis Company.
  • 4. NetworkReport 4 Phase 1 : Introduction to the Case Study Followingupyourrequestinregardstoimprove anddevelopthe infrastructures for the IT system and support for your corporate .we are in Paddy Power Pty committed to provide you with the best available combinationsof softandhardware to provide better service and improve service reliability for your business which it will result in increase in business revenue in the short and long time prospective. Although , in some cases and under some budget limits and special requirements from the corporate , we are still committed to provide the best options for our clients based on corporate requirements and business strategies however , After Providing our clients with their needs , WE USUALLY RECOMMENDED A FUTURE IMAGE AND VIEW FOR THOSE SERVICES AND TECHNOLOGIES WHICH WILL KEEP THE CLIENTS’s BUSINESS NOT ONLY UP-TO-DATE BUT ALSO IT WILL AHEAD WITH MARKET AND BUSINESS TRENDS. Attached is a full proposal for joining the exits IT system in the different locations and sites for your corporate. Based on your company requirements we can summary the purpose for the attached proposal as: The Purpose of the design:  To provide a clear view how the network topology will look.  To provide full information and aspects about the intended used hardware.  To provide technical aspects for the corporate networks and IT engineers.  To be usedas a references in future use in case of migrating, updating, upgrade the network system’s infrastructures.  To be used as references to transition from IPv4 to IPv6 The Attacheddesignhasthe followingfeatures:  The networkhas Multi area networkwhichall hascertainlevel of privacyandsecurityin regardsto connectionsandcommutations.  The networkhas differentroutingprotocolswhichprovidereliabilityandscalabilityaswell .the 2 usedroutingprotocolshasverylow level of resourcesconsumingatthe maintime, theyprovide reliability,scalabilityandeasyimplementation.  The routingprotocolsare botheasyto troubleshootanderrorcorrection  Both are supportingforredundancyandscalabilityaswell
  • 5. NetworkReport 5 Technical Support Services: Our Architecture network design support: Users Users ServerServer Building ABuilding B Gateway Cloud Gateway ACL ACL CLOUD Remote UserRemote USer Remote User • Security o Authentications o The abilityforremote userstouse Virtual Private Network( VPN) tosecure theirconnection to home network o Usingchallenge-handshake authenticationprotocol (CHAP) asfirstlevel of authentication betweenrouters o Use Accesscontrol list(ACL) toprovide anendlevel of securityfor  WHO : usersto accessmedia  WHAT : whichdevice andservicescouldusersaccess  Where : locationsandsites
  • 6. NetworkReport 6 • Flexibility, Upgradeability, Scalability o 30% of future growth o Hardware ,software and protocol’s used are be able to upgrade o Hardware and software whichare usedare openmanufacture sourceswhichcanbe supported by different devices from different manufacturer o System is totally flex to add ,move and change network aspects and services o System Support IPv4 and IPv6 o Routing protocol upgrade for the OSPF section to the EIRGP • Usability o System is based on below-medium level of complexity which makes it easy to be used and maintain. Althoughwe have recommendedthe above designforthe includedfeaturesWhichMATCHINGFOR THE REQUESTED and DEMANDED SERVICES,WE ACTUALLY HIGHY REGARDED A NEW DESIGN WHICH INCLUDE: o HighAvailability o FaultTolerance o Load Balancing o Future TechnologiesandProtocols o HighBandwidth o CloudServices However, Adopt the above design will result in adoption of new technologies which will add some extra but will still long term investment in the company infrastructure.
  • 7. NetworkReport 7 Our Future Design recommendation 2 Links to ISP Belfast Cork Derry Killarney Gallway SOHO GISP MPLS ThisDesignwill provideFaulttolerance inmostsites,HighAvailability,Multi-protocoldatasupportand transformationandsecondlinktothe ISPproviderwith high bandwidth in addition to the availability of migration from IPv4 to IPv6 address with easy and trackball transformation .The most visible is THERE IS NO SINGLE POINT OF FAUILUER in this design with assumption that each site will provide redundancy (end device for each site)
  • 9. NetworkReport 9 Phase 2: Addressing the WAN The company network topology is shown in figure 1 as below. Figure 1 The network topology.
  • 10. NetworkReport 10 The detailedaddressingplanforIPv4andIPv6 are showninthe followingtable 1. Device Interface IP Address Subnet Mask Belfast - ISP G0/0 56.12.108.50 255.255.255.252 2001:FEA9:2BAD:6::F/127 OSPF Area 0 OSPF Area 0 summary: 172.16.0.0/21 2001:fea9:2bad::/63 Belfast: 172.16.0.0/22 2001:fea9:2bad:1::/64 Derry: 172.16.4.0/23 2001:fea9:2bad::/64 Belfast - Derby G0/01 172.16.6.1 255.255.255.252 2001:FEA9:2BAD:6::6/127 Derby - Belfast F0/1 172.16.6.2 255.255.255.252 2001:FEA9:2BAD:6::7/127 Derby F0/0 172.16.4.1 2001:FEA9:2BAD::1/64 OSPF Area 20 OSPF Area 20 summary: 172.16.8.0/22 2001:fea9:2bad:2::/63 Cork: 172.16.8.0/22 2001:fea9:2bad:2::/64 Killarney: 172.16.10.0/24 2001:fea9:2bad:3::/64 Belfast - Cork S0/0/0 172.16.11.1 255.255.255.252 2001:FEA9:2BAD:6::2/127 Cork - Belfast S0/0/0 172.16.11.2 255.255.255.252 2001:FEA9:2BAD:6::3/127 Killarney - Cork S0/0/0 172.16.11.6 255.255.255.252 2001:FEA9:2BAD:6::5/127 Cork - Killarney S0/0/1 172.16.11.5 255.255.255.252 2001:FEA9:2BAD:6::4/127 Cork F0/0 172.16.8.1 255.255.254.0 2001:FEA9:2BAD:2::1/64 Belfast - Galway S0/0/1 172.16.14.9 255.255.255.252 2001:FEA9:2BAD:6::/127 EIGRP 10 EIGRP 10 summary: Galway: 172.16.12.0/23 SOHO: 172.16.14.0/29
  • 11. NetworkReport 11 172.16.12.0/22 2001:fea9:2bad:4::/63 2001:fea9:2bad:4::/64 2001:fea9:2bad:5::/64 Galway - Belfast S0/0/1 172.16.14.10 255.255.255.252 2001:FEA9:2BAD:6::1/127 Galway – G_ISP S0/0/0 102.68.1.10 255.255.255.252 2001:FEA9:2BAD:6::B/127 F0/0 172.16.12.1 255.255.254.0 2001:FEA9:2BAD:4::1/64 G_ISP - Galway S0/0/0 102.68.1.9 255.255.255.252 2001:FEA9:2BAD:6::A/127 G_ISP - SOHO F0/0 102.68.1.13 255.255.255.252 2001:FEA9:2BAD:6::C/127 F0/0 172.16.12.1 255.255.254.0 2001:FEA9:2BAD:4::1/64 SOHO - G_ISP F0/0 102.68.1.14 255.255.255.252 2001:FEA9:2BAD:4::1/64 SOHO - Galway F0/1 102.68.14.1 255.255.255.252 2001:FEA9:2BAD:5::1/64 Table 1 Detailed IPv4 and IPv6 addressing table.
  • 12. NetworkReport 12 Configuring Routers with OSPF and EIGRP The multi-areaOSPFroutingisconfigured on major part of the company network, where OSPF area 0 consists of Belfast and Derry and OSPF area 20 consists of Belfast, Cork and Killarney. On the other hand,EIGRP routingisconfiguredonBelfast,Galwayand SOHO,whichisa remote site LAN connecting to company’s internal network via GRE tunnel. The multi-areaOSPFispreferredtobe implementedonmajorpartof the networkdue to itsdesirable features.The multi-area OSPF can divide the large network into multiple smaller areas within which mostof LSAsare processedlocally,thusgreatlyreducingthe exchange of unnecessary routing update traffic among entire network. In addition, summary routes can be configured on the ABR and ASBR routersto reduce the size of routingtablesrecordedoneachrouter.Finally, OSPF is an open standard routing protocol. In another word, it can be used on variety of devices including Cisco and non-Cisco routers, which enhances the flexibility of network design. Compared to OSPF, on the other hand, EIGRP isa Cisco-preferredroutingprotocol.Itisstronglyrecommendedtobe used on Cisco devices as all desirable features of EIGRP can be maximized while running on Cisco routers. Configuring NAT, Frame Relay, CHAP and ACLs The linkbetweenBelfastandCorkisrequiredtobe securedforimportantdata transmission. Then the PPPisusedto replace HDLC to provide afirstlevel of protectionaslinkauthentication is supported by PPP. The CHAP authentication is preferred over PAP as it offers a more secured authentication mechanism. Unlike PAP, CHAP conducts three-way handshake and periodic challenges to make sure the remote mode still have valid password value, which greatly limits the time of exposure to any single attack. The other parts of the network can be also configured with security. For example, the MD5 authentication can be enabled on both OSPF and EIGRP routing configuration to secure the routing traffic of each link. Frame Relay is used between Belfast and Galway as a WAN connection. Frame Relay is one of the mostpopular WAN solutions and able to provide both cost effectiveness and flexibility. With Frame Relay,customersdonotneedto payfor expensive dedicatedlinesbutonlythe local loopwhere virtual circuitsare established to provide considerable flexibility in network design. However, it is possible that Frame Relay will gradually be replaced by future technologies, for example, VPN in terms of providing site-to-site connectivity. VPN allow organizations to use Internet or public network to achieve site-to-site connectivity with the highest level of security. Thus, it enables even greater flexibility, cost savings, scalability and security than Frame Relay does. A backup link between Belfast to ISP could be necessary in order to prevent from single point of failure.Itcan be achievedbyaddinganotherphysical cable between Belfast and ISP and configuring a floatstaticroute with higher AD. Another solution is that default static route is configured at Galway to directall trafficto G_ISP,which then is considered to be the secondary ISP. Then the default static route configured on Galway must be given AD higher than 170 so that it will be only activated when the primary link between Belfast and ISP is failed. Web Servers are possible to be added within the network in future. The Web Servers must be accessedbynot onlyinternal usersbutalsousers from external networks. Therefore, static NAT with port forwardingconfigurationhastobe made to the current NATstructure in orderto support end-to- end connectivity initialized from outside global addresses. For good practice, in addition, the Web Serversshouldbe locatedinDemilitarizedZone (DMZ), where firewalls are used to prevent company local network from external attacks. ACLs are also configured to provide security and filter network traffic according to the company policies.The configurations are made on Galway, Cork and Killarney. The detailed configure files are presented in figure 2 correspondingly.
  • 13. NetworkReport 13 Figure 2 ACLs configured file. Configuring GRE Tunnel The GRE tunnel isconfiguredtosetupa logicallydirect link between Galway and SOHO. Firstly, static routing is configured at Galway and SOHO to ensure the reachability between interfaces of both routerswhere GRE tunnel isestablished.Thenthe point-to-pointtunnel linkis given a subnet which is a part of the company internal network. Therefore, SOHO LAN can be seamlessly connected to the company network via EIGRP. Finally, EIGRP is configured at SOHO to establish an adjacency with Galway via GRE tunnel logically. The state of interfaces on SOHO router is shown in figure 3, where the tunnel 0 interface is up and assigned appropriate IPv4 address. The routing table at SOHO router is shown in figure 4. Note that the EIGRP via GRE tunnel configuration is not supported by Packet Tracer. Alternatively GNS3 is used to generate the routing table, where we can see that the EIGRP works successfully via GRE tunnel as both EIGRP internal and external routes are presented in the routing table via tunnel0 interface. Finally, the main part of configuration file on SOHO router is given by figure 5.
  • 14. NetworkReport 14 Figure 3 The state of interfaces on SOHO router. Figure 4 The routing table at SOHO router. Figure 5 The configuration file on SOHO router. Configuring for IPv6 SimilartoIPv4,multi-areaOSPFandEIGRP forIPv6 are configuredtoenable routinginthe company network.DefaultstaticroutingisconfiguredatBelfasttodirect all trafficaccessingInternettoISP.The defaultroutingisredistributedbyOSPFandEIGRP to otherinternal routers.IPv6ACLsare also requiredaccordingtothe same policiesonwhichIPv4ACLsare implemented.The detailedconfigure filesforIPv6ACLsare presentedinfigure 6.
  • 15. NetworkReport 15 Figure 6 Configuring ACLs for IPv6.
  • 16. NetworkReport 16 Phase 2.b: Project Design and Deployment Process Deployingnewnetworkequipment inthe PaddyPowerPtyLtdCompany will allow greaterreliability and performance toensure informationtechnologyservicesworkatthe desiredlevel required.This equatestolesspossibledowntime of missioncritical applicationsanddeviceswhichhelpsprevents lostrevenue due toservice outages. The current networkhardware isapproachingfive yearsold,4-5yearsisthe reliable lifeexpectancyof mosthardware. Network hardware canpotentiallylastlonger,however,asthe PaddyPowerPtyLtd Companyisexpectinggrowthwe needtoimprove the networkinfrastructure thatprovidescritical servicesto thisnetwork. Itisadvisable toupgrade the hardware before potentialfailure becomesa realisticpossibility.Inadditionthe current networkwasaddedtoinvariousstages andcurrentlyhas no warrantyor vendorsupport, if a hardware componentfailsitmaybe harderto rectifythese issue. We dobelieve inmaximizingthe returnoninvestmentforequipment, itwouldbe bestpractice to upgrade thisnetworkwiththe appropriate hardware tomeetthe needsof thisdevelopingCompany. We have analyzedthe currentneeds andwiththe planneddeploymentof the new routersand switches thiswill more thancaterforthe networkrequirement fornow andinthe future forthis developingcompany. Finallythe new 48-portswitchisa recommendedpurchase inordertobettergraspour network picture,dataloadand bottle necks.Itisa managedswitchwhichwill allowustosee exactlywhat trafficiscomingand goingfromthe serversandalsoallow usto see the data comingand goingfrom the othermanagedswitches.Thiswill allow usthe betteraddressnetworkissuesandhave a better handle onour overall Computernetworkhealth. Preparing and maintaining Baseline network records are essential tasks that will pay off when you needtoimplementchangestoanetwork.Upto date documentationprovidesinformation about how the network should look and perform, as well as where to seek help if there are problems. Enterprisescanmeetnewservicesaggregationrequirementswithoutexpensive equipment upgrades or radical network designs so by taking advantage of the industries most popular WAN and MAN aggregationplatform, we have chosen the Cisco7200VXR SeriesRouter. The VSA supports up to 960Mbps for 1400-byte packets with 1000 active tunnels. Customerswhorequire 7200 VSA or VAM2+ support should migrate to Cisco IOS Release 12.4(15)Tx . This will be the IOS we will use so as to achieve GRE tunnel on our links which delivers exceptional performance, modularity, and scalability. The Hardware that we will used for the implementation of the new network requirement for Paddy Power Company first requires an upgrade to the Belfast network with a new network router. This router will be supporting OSPF routing protocol with the redistribution of EIGRP from the Galway router. For unificationof thisnetworkwe will be usingthisrouterinall locations.The connectionfrom Belfast to Derrywill be a GigabitEthernetport,the connectionbetween Belfast and Cork will be a serial link, also the connect between Belfast router and ISP will also be a Gigabit Ethernet port (RJ-45 and MII).
  • 17. NetworkReport 17 This router supports Synchronous serial ISDN BRI, PRI, HSSI, T3, E3 as well as Ethernet 10BASE-T and Fast Ethernet 100BASE-T and Gigabit Ethernet ports. This router uses Cisco Internetwork Operating System Software IOS (tm) 7200 Software (C7200-IK8S-M), Version 12.4(XD7) but can be upgraded to support GRE tunnel. Cisco 7200VXR Series Router Reference source: http://www.cisco.com/c/en/us/products/collateral/routers/7200-series- routers/product_data_sheet09186a008008872b.html http://www.cisco.com/c/en/us/td/docs/ios/12_4/12_4x/release/notes/rn7000XD.html#wp109322 The Hardware that we will used for the switching in this network will be the Cisco Nexus 7700 F3- Series switch, this switch supports is a low-latency, high-performance, high-density 1 and 10 Gigabit Ethernet module design, It delivers up to 768 wire-rate for its 10 Gigabit Ethernet port. These new Nexus 7700 switches offer industry’s highest scalability in an environmentally optimized formfactor while maintainingoperational,feature andarchitectural consistency. Againforunification and support we will be implementing this switch in all business locations. The Cisco switch has introduced Application-Centric Infrastructure as the vision for Next Generation Data Centre architecture, built for both today’s physical and virtual workloads as well as tomorrow’s highly dynamic Cloud-based, and performance intensive big data application environments. We chose this switch because it will support Paddy Power Pty Ltd now and for its future needs. This switch supports a 1-Gbps SFP and 10-Gbps Enhanced SFP (RSFP+) which is required for our network design at present. Cisco Nexus 7700 F3-Series switch
  • 18. NetworkReport 18 http://www.cisco.com/c/en/us/products/collateral/switches/nexus-7000-series-switches/datasheet- c78-730273.html Before the real implementation in enterprise environment, it is necessary to build modelling in lab environmentfortestinganddebuggingthe proposedsolution,thusminimizingthe riskof the network redistribution. The upgrade process, including hardware change and software configuration as well as laying new cabling, is recommended that we will implemented on off peak time and weekends when the least disruptionwillbe generated. Lastbutnot least,all configurationsettings before upgrade are saved at TFTP serverforbackup.Therefore,the systemcanbe easilyrecoveredif problems are incurred due to upgrading process. The network upgrading process might need co-operative work between networking engineers and technicians from all companies. The work will be split into specific tasks, including hardware installation, cabling, configuration, testing and documentation, and evenly allocated to different working groups in each location. Regular meetings are maintained during the process to report progress. Licensing Customers license the right to use Cisco intellectual property that software from Cisco. When you purchase new hardware, you also purchase the software and the license to use it. The Hardware we purchasedcomes withlicensedsoftware.Whenyouneedadifferentfeatureset,youneedtopurchase the license for it. Upgrade features may be licensed separately, and special Cisco IOS features are licensedseparately,eitheronaflatusage or per-seatbasis, dependingonthe features. For this reason if we needto upgrade oursoftware tomeetadditional requirements additional licensing is required. When customers download software from the Cisco.com software centre, or e-mail downloaded software to someone, they are obligated to comply with the terms and conditions of the Cisco Software License agreement. The embedded Cisco software that runs on the hardware as well as Cisco standalone software is not transferable. If you purchase used or secondary-market Cisco equipment, you must acquire a new license from Cisco before the software can be used. Stakeholders A stakeholderisanyindividual or organization thatisaffectedbythe activitiesof abusiness. They may have a direct or indirect interest in the business, and may be in contact with the business on a daily basis, or may just occasionally. The stakeholders include present and potential investors, employees, lenders, suppliers and other trade creditors, customers, governments and their agencies and the public. They use financial statementsinordertosatisfysome of theirdifferent needs for information. These needs include the some of the following. Employeesandtheirrepresentativegroupsare interestedininformationaboutthe stabilityand profitabilityof theiremployers.Theyare alsointerestedininformationwhichenablesthemtoassess
  • 19. NetworkReport 19 the abilityof the enterprise toprovideremuneration, retirementbenefitsandemployment opportunities. Customershave aninterestininformationaboutthe continuance of anenterprise,especiallywhen theyhave a long-terminvolvementwith,orare dependenton,the enterprise. Corporationsare motivatedtobecome more sociallyresponsible becausetheirinternal stakeholders expectthemtounderstandandaddressthe relevant social andcommunityissue.Understandingwhat causesare importanttoemployeesshouldbe aprioritybecause of the manyinterrelatedbusiness benefitsthatcanbe derivedfromincreasedemployeeengagement leadingtohigherproductivity. As part of more comprehensivecompliance andethicsprograms,manycompanieshave formulated internal policiesrelevant tothe ethical conductof employees.Thesepoliciescanbe typicallycalleda corporate ethicsstatement,ortheycan be more detailedpolicies typicallycalledcorporate ethics codes.Theyare generallymeanttoidentifythe company'sexpectationsof workersandtooffer guidance onhandlingsome of the more commonethical problems thatmightarise inthe course of doingbusiness. It is hopedthathavingsucha policywill leadtogreaterethical awareness,consistencyinapplication, and the avoidance of ethical disasters.Anincreasingnumberof companiesalsorequire employeesto attendseminarsregardingbusinessconduct,whichofteninclude discussionof the company'spolicies, specificcase studies,andlegal requirements.Some companiesevenrequire theiremployeestosign agreementsstatingthattheywill abidebythe company'srulesof conduct.
  • 20. NetworkReport 20 THE ACS CODE OF ETHICS AND CODE OF CONDUCT FOR XYZ PTY LTD Introduction This Code is based on the following basic assumptions: - Ethics among shareholders, owners, directors and management are a necessary element for companiesinthe 21st centuryto adequatelymeet theirobjectives,to the degree that Ethics are a key requisite in guaranteeing and balancing the rights and interests of all stakeholders involved: Employees, clients, shareholders, suppliers and business partners and the society at large. - Ethicspresuppose rigorouscompliance inandbythe company with applicable legislation, as well as with the Articles of Incorporation and Regulations for internal operations, where they exist. - Ethicswithinthe companyrequire that shareholders and owners become guarantors of compliance in respect of obligations for directors and management. - Even though this Code has been created with the intention of being applicable into the company. - Ideally,the Boardof Directors is responsible for drawing up the Code of Ethics for the company and the General Shareholders’Meetingfor approvingthatCode.Should,however, the Board also proceed with approval, that decision must be ratified by the Shareholders’ Meeting. Code of Ethics for XYZ Pty Ltd Shareholders and Owners The Primacy of the Public Interest Reference to Case In accordance with this value you will: a) Identify those potentially impacted by your work and explicitly consider their interests; d) Take into consideration the fact that your profession traverses many other professions, and has implications for other social systems and organisations; e) Endeavour to preserve the integrity, security, continuity and utility of ICT; f) Respect the intellectual property of others; g) Endeavour to preserve the confidentiality and privacy of the information of others. Pleaseref to theaddendum for moreinformation The Enhancement of Quality of Life a) Recognise, in your work, the role that ICT can play to enhance the quality of life of people, particularly the disadvantaged or those with disabilities; Pleaseref to theaddendum for moreinformation Honesty
  • 21. NetworkReport 21 b) Not knowingly mislead a client or potential client as to the suitability of a product or service; e) Qualify professional opinions which you know are based on limited knowledge or experience; Pleaseref to theaddendum for moreinformation Competence a) Endeavour to provide products and services which match the operational and financial needs of your stakeholders; b) Not misrepresent your skills or knowledge; d) Respect and protect your stakeholders' proprietary interests; e) Advise your stakeholders when you believe a proposed project, product or service is not in their best interest; Pleaseref to theaddendum for moreinformation Professional Development a) Continue to upgrade your knowledge and skills; Pleaseref to the addendum for moreinformation Professionalism a) Take a calm, objective, informed and knowledgeable stance on your professional work, complementing your enthusiasm and engagement in it; b) Take appropriate action against members who engage in behaviour contrary to this Code; Pleaseref to theaddendum for moreinformation In the exercise of their ownership rights, they should: - Configure theircompanyasaninstrumentatthe service of creatingwealth,makingtheirindisputable Objective of obtaining a profit compatible with sustainable, environmentally sound social development, Making certain that all activities are carried out in an ethical and responsible manner. - Configure the companyasa mediumand long-term entity, not compromising its continuity through an Interest in short-term enrichment.
  • 22. NetworkReport 22 - Exercise voting rights at the General Shareholders’ Meetings on an informed and responsible basis and, In doing so, always demand ethical behaviour from the company, including approval of the Code of Ethics And orchestrating effective application thereof. - Search for a fair balance between capital and work, in such a fashion that, through their salaries, workers receive just compensation for their work. - Appoint as directors and management persons who meet the requisites established regarding adequate preparation and experience, and who carry out management functions in a professional, ethical and responsible manner. - Define and defend the mission and values of the company in accordance with its Code of Ethics. Directors and Management In the exercise of their administrative and management functions, they should: A) In relation to Management functions: - Carry out their activities in a professional, ethical and responsible manner. - Complyanddemandcompliance withthe Code of Ethics of the company and, to that end, make the Code known and establish appropriate mechanisms to guarantee application. In particular there shouldbe a body,ideallyanEthicsCommittee, made up of people with sufficient power to apply the Code and correct infractions. - Informownersorshareholdersperiodically and accurately as to the situation of and outlook for the company. - Promote effective participationbyshareholdersatthe General Meetings,especiallybyfacilitatingthe exercise of information and voting rights. - Comply and demand compliance with generally accepted accounting standards and principles, and establish internal and external risk management and control systems in accordance with the characteristics of the company. - Keep the books and ledgers of the company in an accurate and honest manner, in order to permit that information be obtained and decisions be taken on an informed and responsible basis. - Provide external andinternal auditorsof the companywith all such information and explanations as may be required to carry out their work. CODE OF ETHICS - Subordinate their own interests to those of the company when acting on behalf and in representation thereof and not use corporate assets in their own benefit, except with due transparency,priorauthorisationfromthe relevantcorporate bodyandin exchange for consideration deemed appropriate on the market.
  • 23. NetworkReport 23 - Immediately notify the administrative body as to any event or situation which would represent or couldgive rise to a conflict between the interests of the company and the individual interests of the director or manager, and abstain from intervening in the resolution. - Facilitate the transparencyof andcontrol overtheirremunerationinsuch a way that it is guaranteed to be appropriate to their level of responsibility and performance and to the characteristics of the company. - Maintainas confidential the background,dataanddocumentstowhichthey have access by virtue of their functions in the company, even when they no longer carry out such functions. - Make paymentandcomplywithdebtsincurredbythe companywithoutunjustified delay or breach, and collect on balances due with the diligence required in each case. - Prepare andmaintaininplace a successionplanforkeypositionswithinthe company, to ensure that continuity of the company does not depend on the presence of any given director or manager. - Choose theircollaboratorsandsubordinatesinaccordance withthe principles of merit and capacity, looking only to fulfil the interests of the company. In relation to suppliers and clients of the Company: - Maintain ethical and licit relationships with suppliers of goods and services. - Search for and select only suppliers whose business practices respect human dignity, are not in breach of law and do not place the company’s reputation in danger. - Selectsupplierson the basis of the appropriateness of their products or services, as well as of their prices, delivery conditions and quality, not accepting or offering gifts or commissions, in cash or in kind, whichcould alter the rules of free competition in the production and distribution of goods and services. - Aspire to excellence in the goods and services of the company in such a way that clients and consumers obtain the satisfaction expected therefrom. - Guarantee the productsand servicesof the companyanddeal quickly and efficiently with consumer and user claims, with a view to achieving satisfaction beyond mere compliance with prevailing legislation. In relation to competitors of the Company: - Not abuse a dominant or privileged market position. - Compete ingoodfaithwithothercompanies cooperating to achieve a free market based on mutual respect between competitors and abstaining from engaging in unfair practices. - In particular, not take clients from other competitors employing unethical methods. In relation to employees of the Company: - Treat employees with dignity, respect and justice, taking into consideration their different cultural sensitivities.
  • 24. NetworkReport 24 - Notdiscriminate againstemployeesonthe groundsof race,religion,age,nationality,sex oranyother personal or social condition different from the conditions of merit and capacity. - Not permit any form of violence, harassment or abuse at the workplace. - Recognise the rights of association, union membership and collective negotiation. - Promote the professional development, training and promotion of employees. - Link remuneration and the promotion of employees to their conditions of merit and capacity. - Establish and communicate clear criteria and rules which maintain a balance between the rights of the company and those of employees in hiring processes and in the separation thereof, even in the case of a voluntary change in employee. - Guarantee health and safety on the job, taking any such measures as are considered reasonable to maximise prevention of occupational risk. - Look to reconcile work at the company with the personal and family life of employees. - Lookto achieve the occupational integration of persons with incapacities or handicaps, eliminating barriers of all kinds in the ambit of the company in order to achieve insertion. - Facilitate the participation of employees in the social action programmes of the company. In relation to the civil society: - Respect human rights and democratic institutions, and promote them wherever possible. - Maintain the principle of political neutrality, without interfering politically in those communities where theycarry outtheiractivities,alsoasademonstrationof respectfor the different opinions and sensitivities of people related to the company. - Maintain licit and respectful relationships with public authorities and institutions, not accepting or offering gifts or commissions in cash or in kind. - Make contributions to political parties or public institutions only in accordance with prevailing legislation and, in any case, guaranteeing transparency. - Collaborate with Public Entities and non-governmental entities and organisations dedicated to improving levels of social attention for disadvantaged persons.
  • 25. NetworkReport 25 C oncl usi on The expected expansionof the XYZPtyLtd will require new hardwarebeinginstalledalongwith newnetworkoperatingsystemandcablingtolinkthe multi-areanetworkstogether. In conclusion, forXYZPtyLtd to be able tosetupa secure networkingenvironment, itisessentialto make use of all networktechnologieslike, Multi-areaOSPF,EIGRP,Frame Relay,NATandPATalong withGRE Tunnel,ACL’sandputthemall togetherasone to create a secure androbust network. We have made othersuggestionthroughourreporttoenhance the networkinspeedandresilience as well asredundancy.Itishighlyrecommendedthatthe XYZCompanyadoptour future design recommendation whichwillcoverall of the above requirements. Project Design and implantation Process in no set order, Yiwei Yu, Brian Lawson, Jose moreu, Tarek Elwan
  • 26. NetworkReport 26 THE ACS CODE OF PROFESSIONAL CONDUCT – 2012 Preamble An essentialcharacteristicof a professionisthe needforitsmembersto abide by a code of ethics. For the ACS, this code is established as the Code of Professional Conduct and is part of the Society's Regulations. These Regulations apply to any ACS member who works in the field of information and communications technology (ICT). This Code of Professional Conduct (the Code) identifies six core ethical values and the associated requirementsforprofessionalconduct.The Societyrequiresitsmemberstoabide bythese values,and act with responsibility and integrity in all of their professional dealings. Relevance to Law The Code of Professional Conducthasrelevance toprofessional standardslegislation. Failure to abide by the Code couldbe usedas groundsfor a claimof professional negligence.The Code may be quoted by an expertwitnessgivinganassessmentof professional conduct. Failure to observe the Code could also lead to disciplinary action by the ACS. As an ACS member you must uphold and advance the honour, dignity and effectiveness of being a professional.Thisentails,inadditiontobeingagoodcitizenandactingwithinthe law,your adherence to the following ACS values: 1. The Primacy of the Public Interest You will place the interests of the public above those of personal, business or sectional interests. 2. The Enhancement of Quality of Life You will strive to enhance the quality of life of those affected by your work. 3. Honesty You will be honest in your representation of skills, knowledge, services and products. 4. Competence You will work competently and diligently for your stakeholders. 5. Professional Development You will enhance your own professional development, and that of your colleagues and staff. 6. Professionalism You will enhance the integrityof the ACSandthe respect of its members for each other. In a situation of conflict between the values, The Primacy of the Public Interest takes precedence over the other values.ThisCode of Professional Conductisaimedspecificallyatyouas an individual practitioner, and isintendedasa guideline foryouracceptable professional conduct.Itisapplicabletoall ACS members regardless of their role or specific area of expertise in the ICT industry.
  • 27. NetworkReport 27 The followinglistof requirementsisnotexhaustive andshouldnotbe readas a complete definition of acceptable professional conduct in all practical situations. The intention of the Code is to illustrate whatconstitutesprofessionalbehaviour.Youare expected to take into account the spirit of this Code in order to resolve ambiguous or contentious issues concerning professional conduct. The ACS can help you resolve ethical dilemmas. The Primacy of the Public Interest Reference to Case In the context of this Code, the public interest takes precedence Over personal, private and sectional interests, and any conflicts should be resolved in favour of the public interest. In your work, you should safeguard the interests of your immediate stakeholders, provided that these interests do not conflict with the duty and loyalty you owe to the public. The public interest is taken to include matters of public health, safety and the environment. In accordance with this value you will: a) Identify those potentially impacted by your work and explicitly consider their interests; b) Raise withstakeholdersanypotential conflictsbetweenyourprofessional activityandlegal or other accepted public requirements; c) Advise yourstakeholdersassoonaspossible of anyconflictsof interest or conscientious objections that you have; d) Take into consideration the fact that your profession traverses many other professions, and has implications for other social systems and organisations; e) Endeavour to preserve the integrity, security, continuity and utility of ICT; f) Respect the intellectual property of others; g) Endeavour to preserve the confidentiality and privacy of the information of others. The Enhancement of Quality of Life The developmentof ICThas hada significantimpactonsociety and our way of life. Whilst this impact has beenbeneficialtoa verygreatextent,like all technologies,ICThasalsohadsome negative effects, and will continue todoso.Anethical approachto your workwill helptorecognise andminimise these adverse effects. You should promote equal access to the benefits of ICT by all members of society. In accordance with this value you will: a) Recognise, in your work, the role that ICT can play to enhance the quality of life of people, particularly the disadvantaged or those with disabilities; b) Protect and promote the health and safety of those affected by your work; c) Understand, and give due regard to, the perceptions of those affected by your work;
  • 28. NetworkReport 28 d) Attemptto increase the feelingsof personal satisfaction,competence,andcontrol of those affected by your work. Honesty Do not breachpublic trust in the profession or the specific trust of your stakeholders. Observance of utmosthonestyandintegritymustunderlie all yourprofessional decisions and actions. Circumstances will undoubtedly arise during the course of your professional career where it may appear to be beneficial foryoutobe deceptivein some way. This type of behaviour is not acceptable professional conduct. In accordance with this value you will: a) Reject, and will not make, any offer of bribery or inducement; b) Not knowingly mislead a client or potential client as to the suitability of a product or service; c) Distinguish between your professional and personal opinions and advice; d) Give realistic estimates for projects under your control; e) Qualify professional opinions which you know are based on limited knowledge or experience; f) give credit for work done by others where credit is due; g) not attempt to enhance your own reputation at the expense of another person’s reputation. Competence Accept only such work as you believe you are competent to perform, and do not hesitate to obtain additional expertise fromappropriately qualified individuals where advisable. You should always be aware of yourown limitationsandnotknowinglyimplythatyouhave competenceyoudonotpossess. Thisis distinctfromacceptingatask of whichthe successful completion requires expertise additional to your own. You cannot possibly be knowledgeable on all facets of ICT but you should be able to recognise when you need additional expertise and information. In accordance with this value you will: a) endeavour to provide products and services which match the operational and financial needs of your stakeholders; b) not misrepresent your skills or knowledge; c) make yourself aware of relevant standards and legislation, and act accordingly; d) respect and protect your stakeholders' proprietary interests; e) advise yourstakeholderswhenyoubelieve aproposedproject,productorservice isnotin theirbest interest; f) accept responsibility for your work;
  • 29. NetworkReport 29 g) respect, and seek when necessary, the professional expertise of colleagues in their areas of competence. Professional Development Keep yourself informed of such new technologies, practices and standards as are relevant to your work. Otherswill expectyoutoprovide special skillsand advice; and in order to do so, you must keep your knowledge up-to-date. You should encourage your colleagues and staff to do the same. Take actionto ensure thatyour hard-won knowledge and experience are passed on in such a way that the recipients not only improve their own effectiveness in their present work but also become keen to advance their capabilities and take on additional responsibilities. In accordance with this value you will: a) Continue to upgrade your knowledge and skills; b) Increase your awareness of issues affecting the profession and its relationship with the public; c) Encourage your colleagues,staff andstudentstocontinue theirownprofessionaldevelopment; and d) Supporteducation,trainingandprofessional development in ICT that reflects the diverse needs of individual professionals and their various career paths. Professionalism The ICT industryisrelativelynewandcharacterisedbyrapid change. It has not had the opportunity to evolve overmanydecadesandacquire its own standards and legislation. The ACS is endeavouring to improve publicconfidenceinthe ICTindustry.Itis imperative thatprofessional grade members of the ACSmaintainprofessional standardsthatimprove andenhance the industry'simage, especially in the workplace. All people have a right to be treated with dignity and respect. Discrimination is unprofessional behaviour, as is any form of harassment. Members should be aware that the ACS can helpthemresolve ethical dilemmas.Itcanalsoprovide supportfortakingappropriate action,including whistle-blowing, if you discover an ACS member or employer engaging in unethical behaviour. In accordance with this value you will: a) Take a calm, objective, informed and knowledgeable stance on your professional work, complementing your enthusiasm and engagement in it; b) Take appropriate action against members who engage in behaviour contrary to this Code; c) Confront attempts to limit diversity in the workplace, and ensure that opportunities for employment,advancement,remunerationandotherworkingconditionsare based on the actual skills and performance of employees, free of stereotypes and prejudices;
  • 30. NetworkReport 30 d) note that the corporate actionsof the ACSare subjecttothisCode,andyou shoulddowhateveryou can to ensure that the ACS and its officer bearers and staff meet this obligation; e) neither require, nor attempt to influence, any person to take any action which would involve a breach of this Code; f) refrain from any conduct or action in your professional role which may tarnish the image of the profession or detract from the good name of the ACS; g) endeavour to extend public knowledge and understanding of ICT; h) co-operate in advancing ICT by communication with other professionals, students and the public; and i) have pride inyour profession,andprotectandpromote professionalism and trustworthiness in ICT.