Fast Ethernet cables are uses for interdependent connection; on the other hand, serial cables are used for the connection of central organization router with department routers.
The sole purpose to study Enterprise Network is to create business simplicity across worldwide. The side arms of successful networking are scalability, robustness, fault identification, communication, modularity, security and maintaining privacy. The key for making a network is to provide the essential tools and techniques that will offer the quality of a private/public network.
As I discussed earlier the key purpose is to create business simplicity that means creating IT/Infrastructure simplicity across the cities where an Enterprise Network is connected. Obtaining success in failure/break-down conditions is the main purpose of a network. So to achieve that requirement network designing involves certain topologies, protocols, bandwidth allocation. Topology requirement can be described as maintaining two adjacent networks against any failure in a single link or node. Protocol requirement can be described as using dynamic/static routing protocol to provide routes must be congestion free in a network. Bandwidth allocation is needed to actively allocate extra bandwidth just to maintain the working condition in a network. Design and Modification criteria is all over handed to a person called Network Administrator, who maintains and solely responsible for anything(wanted or unwanted) happens in a network.
Analyze the Customer Requirements
Characterize the Existing Network and Sites
Design the Network Topology and Solutions
Design a Network Topology
Design a Model for Network Layer Addressing and Naming
Select the Switching and Routing Protocols
Network Security Design
Network Management Design
Optimize the Network Design
Select Technologies and Devices
Test the Network Design
Document the Network Design
Fast Ethernet cables are uses for interdependent connection; on the other hand, serial cables are used for the connection of central organization router with department routers.
The sole purpose to study Enterprise Network is to create business simplicity across worldwide. The side arms of successful networking are scalability, robustness, fault identification, communication, modularity, security and maintaining privacy. The key for making a network is to provide the essential tools and techniques that will offer the quality of a private/public network.
As I discussed earlier the key purpose is to create business simplicity that means creating IT/Infrastructure simplicity across the cities where an Enterprise Network is connected. Obtaining success in failure/break-down conditions is the main purpose of a network. So to achieve that requirement network designing involves certain topologies, protocols, bandwidth allocation. Topology requirement can be described as maintaining two adjacent networks against any failure in a single link or node. Protocol requirement can be described as using dynamic/static routing protocol to provide routes must be congestion free in a network. Bandwidth allocation is needed to actively allocate extra bandwidth just to maintain the working condition in a network. Design and Modification criteria is all over handed to a person called Network Administrator, who maintains and solely responsible for anything(wanted or unwanted) happens in a network.
Analyze the Customer Requirements
Characterize the Existing Network and Sites
Design the Network Topology and Solutions
Design a Network Topology
Design a Model for Network Layer Addressing and Naming
Select the Switching and Routing Protocols
Network Security Design
Network Management Design
Optimize the Network Design
Select Technologies and Devices
Test the Network Design
Document the Network Design
This Slide's will help those guys who are looking for to study the Data Center Design . In these Slide's, you can understand the concept of raised floor, importance of raised floor, why raised floor is needed in a Data Center, and many more concepts ..
Hope it will gave you the good understanding to related topic.
This Slide's will help those guys who are looking for to study the Data Center Design . In these Slide's, you can understand the concept of raised floor, importance of raised floor, why raised floor is needed in a Data Center, and many more concepts ..
Hope it will gave you the good understanding to related topic.
tion Techs current network consists of 1 web server access.pdfadinathfashion1
tion Techs' current network consists of 1 web server (accessible by the public) atabase servers, 2
file and print servers, and 50 workstations. The web server t e, the other servers run Microsoft
Windows Server, and the workstations run M he network is connected through a series of
switches, is not physically connecte id runs Internet Protocol version 4 (IPv4). The network is
protected by a single I etwork architect, whom you work for direclly, has verified the company's
busine ned the features and functions required to meet those goals. letwork architect has asked
you to create a network design that includes the folk ent infrastructure elements gical topology that
separates the Accounting and Sales depariments undant communications ification for continuing
with IPv4 or upgrading to IPv6 of the project, perform the following tasks: duct research to
determine the best network design to ensure security of intemal le retaining public website
availability. sign a network configuration with physical and fogical topologies Identify major net
nents (e.g., servers, switches, gateways) and their locations within the private and work segments.
ude a high-level plan that ensures communications are available 24/7. commend whether to
continue using IPv4 or upgrade to IPv6, and explain why. tate a basic network diagram that
illustrales the current network and enhancements workstations to represent all workstations on the
inlemal network. The diagram will h level at this stage and include only necessary details You
must use Microsoft Visi late this design later in the project. tate a draft report dotailing all
information as supportive documentation.Cumer itfiestrusture tikmonts * Pesdundind
conminiricatiors Tasks. netansh isingre-th igelete then dengr laked the perent. 7. Cale sovoes,
whire acerigiale Required Resources - Aramer acobas Sustrission Requirements.
Riordan Manufacturing SR-rm-00-7 Analysis of WAN.docxjoellemurphey
Riordan Manufacturing SR-rm-00-7 Analysis of WAN
Running head: RIORDAN MANUFACTURING WAN ANALYSIS
1
RIORDAN MANUFACTURING WAN ANALYSIS
2
Riordan Manufacturing WAN Analysis
INTRODUCTION
Riordan Manufacturing is a large plastics manufacturer with 550 employees in four locations. The locations Riordan operates are San Jose, California, Albany, GA, Pontiac, Michigan, and Hangzhou, China. The San Jose, California facility is the corporate office and is connected to the other facilities through a Wide Area Network (WAN). Each location has a different telephone and data network. According to Moore’s law, the rate of technology advancement doubles every 24 months. Companies have difficult tasks with staying current with advancing WAN technology. Within the past several years, platform as a service (PaaS) and infrastructure as a service (IaaS) have emerged as a leading local area network (LAN) and WAN infrastructure option. Riordan has an existing WAN infrastructure that is outdated and expensive to maintain. Before Riordan can upgrade the existing WAN to the most current technology, Riordan needs understand their business goals and requirements, and evaluate the existing WAN for strengthens and weakness. Understanding the business goals and requirements will have a direct impact on the WAN technology that will be implemented.
Section II
Riordan is in the process of relocating their Hangzhou, China office to the Shanghai port area. The relocation of the office will result in significant cost savings, and will provide their operations with a more substantial urban infrastructure and will put them into a better position to market and ship their Chinese products throughout Europe and Asia. Currently they are spending over $100,000 on travel for training on the new intergraded systems; we can develop Riordan a distance learning solution so that we can provide effective training through teleconferencing. A new network infrastructure including workstations will have to be designed, purchased, installed and tested.
Their IT network is very slow and outdated, currently they are using outdate software and need to update to Windows 8 based environment and Microsoft upgrades to Office 10. The workstations need to be updated the RAM and hard drive space is inadequate. Instead of using the 8 separate printers I would add a print server and add two printers to the network so that all users can print from those two. We need to cut down on the number of switches and streamline the network, by installing a Cisco ASR 1006 with serial, Ethernet and Fiber modules as the core router and upgrading the switch to a Cisco 3750X 48 port switch you will be able to connect all servers, routers, VoIP phones, and workstations from one switch. The satellite connection and the T3 will be connected directly to the ASR 1006. All switches, routers and servers will either use a Cisco SFP-10G-LH for fiber connection and Cisco GLC-T 1000BASE-T SFP for Ethernet con ...
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
EthernetSatellite dishInternational Plastics, Inc. - CBetseyCalderon89
Ethernet
Satellite dish
�
International Plastics, Inc. - China Headquarters
Corp
Marketing
Finance
HR
R&D
Network
MAC
PRO
(15)
Dual 1.8 GB
1 Ghz 6 core
12 GB Ram
1 TB HD
27" monitors
Satellite base station
NAS
Iomega
P800M
24 Port Hub
Linksys EF2H24
WIN
Exchange
Server
WIN
Network
Server
UNIX
ERP/MRP
Server
ERP = SAP
UPS:
Serve the entire server room; additional UPS in satellite base station.
IBM
pSeries
6E4 Multipocessor
16GB RAM
1 TB HD
2 ea IBM
HS20
Blade Svrs
2 X XEON
2.8 GHz
1 GB RAM
1 GB Fiber backbone
3 ea Phaser 6700 color Printers
1000 base T
35 ea Dell
Vostro
i3 3.3 Ghz
4 GB RAM
500 GB HD
WIN 7 OS
Office 2007
12
8
8
7
2 ea 24 port switches
Cisco 2950
35 IP
Phones
Gateway/Switch
1 HP Plotter
Identical to other WIN servers
VOIP/Data
Router
T3 to
outside network
Gateway/Switch
VOIP/Data
Router
Ka Band
ATM AA1 PVC 51.8 Mb data rate, AES end-to-end
8 HP Laserjet BW printers – P3015dn
2 in each department
Ethernet
�
�
�
�
�
Disk array
�
No symbols exist on the page to display.�
Legend�
Legend Subtitle�
Symbol�
Count�
Description�
Cisco Router
2900
T3 connection to corporate
UPS
HP Laserjet Pro MFN
M425dn
NAS Disk array
Cat 5 cable
45 client computers with Windows 7 and MS office 2007
4 Network Printers
Cat 5 cabling in building
45 office computers
Dell Vostro
I3 3.3 GHz
4 GB RAM
500 MB HD
Manufacturing
Floor
48 Port patch panels
Connection to
Corp.
Fiber link for NAS
2 - HP Laserjet M602n
HP CP4225n
Color Laser Printer
Blade Server
HP – BL 460 P
Print, file, Exchange, local ERP back to home office
Cisco Catylst 3580 Ethernet switch 48 port
Cisco catalyst 3560
Ethernet switch 24 port
APC Smart-UPS
5000 VA USB & Serial 220VAC
International Plastics, Inc.
Pontiac, MI Network Diagram
Ethernet
Satellite dish
�
International Plastics, Inc. - Corporate Headquarters
Corp
Marketing
Finance
HR
R&D
Network
MAC
PRO
(15)
Dual 1.8 GB
1 Ghz 6 core
12 GB Ram
1 TB HD
27" monitors
Satellite base station
NAS
Iomega
P800M
24 Port Hub
Linksys EF2H24
WIN
Exchange
Server
WIN
Network
Server
UNIX
ERP/MRP
Server
ERP = SAP
UPS:
Serve the entire server room; additional UPS in satellite base station.
IBM
pSeries
6E4 Multipocessor
16GB RAM
1 TB HD
2 ea IBM
HS20
Blade Svrs
2 X XEON
2.8 GHz
1 GB RAM
1 GB Fiber backbone
3 ea Phaser 6700 color Printers
1000 base T
35 ea Dell
Vostro
i3 3.3 Ghz
4 GB MB RAM
GB HD
WIN 7 OS
Office 2007
12
8
8
7
2 ea 24 port switches
Cisco 2950
35 IP
Phones
Gateway/Switch
1 HP Plotter
Identical to other WIN servers
VOIP/Data
Router
T3 to
outside network
Gateway/Switch
VOIP/Data
Router
Ka Band
ATM AA1 PVC 51.8 Mb data rate, AES end-to-end
8 HP Laserjet BW P4510 Printers: 2 in each department.
2 HP color Multifunction Office Jet 8600. 1 in corporate, 1 in marketing
Ethernet
Disk array
Link builder
Firewall
Cisco Router
2900
Fiber link for NAS
24 port
100 Mbps Switches
NAS Disk array
T 3 connection to corporate
...
The Corporation Techs' current network consists of 1 web server (acces.docxLucascIqTurnere
The Corporation Techs' current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company's business goals and has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following components:
Current infrastructure elements
A logical topology that separates the Accounting and Sales departments
Redundant communications
Justification for continuing with IPv4 or upgrading to IPv6
For this part of the project, perform the following tasks:
Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.
Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.
Include a high-level plan that ensures communications are available 24/7.
Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.
Create a draft report detailing all information as supportive documentation.
Cite sources, where appropriate.
Length of report: 3-4 pages
.
International Plastics Description.docxNarrative Description.docxnormanibarber20063
International Plastics Description.docx
Narrative Descriptions of Network Diagrams
NTC/411 Version 6
1
Narrative Descriptions of Network Diagrams for International Plastics Inc.
The set of network diagrams for International Plastics Inc. consists of five diagrams. They are as follows:
1) International Plastics Inc. – Network Overview
a) This diagram shows the 4 physical locations of International Plastics Inc. interconnected by a WAN. The WAN connection between corporate headquarters and the China facility is specifically defines as a satellite link. Along with the location pictorial is a listing of the main functions taking place at that location, and also the number of current employees at that location.
2) International Plastics Inc. Corporate Headquarters
a) The network diagram for the corporate headquarters is really a composite of a number of sections: Note the backbone base for this location is 100baseT
i) The administration section. Displays the main operational functions: Corporate, HR, etc. with a computer icon that defines the current number of employees in that function, and a description of the computer. There are 36 VOIP telephones in this section.
ii) The R&D function, which has 1000baseF network backbone and is totally a MAC based environment. There are 15 employees each with their computers; the section includes 3 high-end color printers and a plotter. The 1000baseF network is connected to the corporate LAN through a switch.
iii) The servers and an NAS. The servers include WIN server, a WIN Exchange server, a UNIX server, which hosts the corporate SAP ERP SW. All the servers are IBM servers: the WIN servers are IBM HS20 blade servers and the main UNIX server is an IBM p series.
iv) An UPS is provided to prove backup power for the server room.
v) The last section is the communications environment, which has two main parts: the data link to the Satellite base station through a switch and a VOIP router to connect the two facilities with voice. The satellite operates in Ka band and is setup to handle an OC1 data rate with end-to-end encryption. The second part of the communications environment is a router to provide a T3 connection through a firewall to the outside network.
3) International Plastics Inc. – Albany, GA Network Diagram
a) The Albany network includes 20 office computers for the administration people in the facility. The local server is an HP BL460P blade server, which handles local print; file, exchange and interfaces back to the home office. A local NAS system provides local data backup. A 5KVA UPS is provides for power backup. A link to the router/firewall provides the T2 connection to the outside network. Internally the factory floor is connected to the main LAN through a 24 port Cisco switch.
4) International Plastics Inc. – Pontiac MI Network Diagram
a) The Pontiac network includes 45 office computers for the administration people in the facility. The local server is an HP BL460P blade server, which .
The first Technology driven reality competition showcasing the incredible virtualization community members and their talents. Virtually Everywhere · virtualdesignmaster.com
Network DesignScenarioThe Corporation Techs’ current network.docxdohertyjoetta
Network Design
Scenario
The Corporation Techs’ current network consists of 1 webserver (accessible by the public), 2 application servers, 2 database servers, 2file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following components:
§ Current infrastructure elements
§ A logical topology that separates the Accounting and Sales departments
§ Redundant communications
§ Justification for continuing with IPv4 or upgrading to IPv6
Tasks
For this part of the project, perform the following tasks:
1. Conduct research to determine the best network design to ensure the security of internal access while retaining public website availability.
2. Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.
3. Include a high-level plan that ensures communications are available 24/7.
4. Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
5. Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.
6. Create a draft report detailing all information as supportive documentation.
7. Cite sources, where appropriate.
Submission Requirements
Format: Microsoft Word
Citation style: APA
Length of report: 3pages
The above submission should be three pages in length and adhere to APA formatting standards along with proper references
.
IT327-1404A-01 Implementing, Managing and Mainta.docxpriestmanmable
IT327-1404A-01 Implementing, Managing and Maintaining a Network I
Phase 1 Individual Project
Michael F. Ryan Jr.
10/14/14
Contents
Week 1: Target Organization 3
Target Organization 3
Analysis and Recommendations 3
Week 2: Transmission Control Protocol/Internet Protocol (TCP/IP) Addressing and Management 4
Week 3: Fault Tolerance Plan 5
Week 4: Security Plan 6
Week 5: Network Monitoring 7
All Weeks: Network Pro Prep Toolkit 8
Week 1: Target OrganizationTarget Organization
About Ryan Computer Enterprises
Ryan Computer Enterprises formed in 2000, and provides leading business solutions. Currently there are over 8000 employees that are located throughout five states with three locations in Pennsylvania, Florida, California, Texas and New York. The administrative office currently is located in Pennsylvania. Currently there are over 500 additional employees located in the corporate headquarters. The company provides cutting edge solutions and needs USAA, JP Morgan, Goldman Sacks and other financial institutions. In 2002, Forbes magazine rated Ryan Computer Enterprises as the number one business organization for the field of technical consultation.
Major clients of Ryan Computer Enterprises are all in the field of investment banking and insurance. Some major factors of focus for the company will be improvement of business process the clientele have set in place, legacy systems and to have a set solution in place to be utilized thought their organization. Ryan Computer Enterprises has stated that our goal is align both the company and client goals.
Ryan Computer Enterprises has slowly replaced existing infrastructure over the years focusing on workstation, printer, switch and routers. Some areas of interest that go beyond the physical infrastructure are application upgrades. The applications that are in questions for upgrades are DBMS and other various apps such as Office 365. It has been over 2 years since the last upgrade to the IT system has been conducted and in order to provide better security and stability it has been decided that specific facets that have been listed must be upgraded as well as servers and the use of cloud technology must be implemented to allow for virtual storage of information. Other technology that should be visited is the addition of WAPs through out the facilities this allows the vendors and employees to use their mobile devices and other wireless items as well as the clientele.
The last item for discussion that will be addressed as an upgrade will be the addition of remote access. Having VPN capabilities allows Ryan Computer Enterprises to better facilitate troubleshooting and adds to the functionality of its employees. All email services as well as server access allow an employee to better assist with technical work as well as giving the clients the ability to conduct business wherever they might be located.
Metrics that are used to identify some of the issues are based on multiple factors but some ...
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
1. 1
For Help Contact Information:
Harinath Reddy
Phone: +91-9502542081(IND) (Whats App, Viber)
phone: +1-2089086040 (US)
Email: harinath.infotech@gmail.com
Network Design Project: Case study of
Everlast and Riddell Sport
2. 2
Table of Contents
1. Introduction................................................................................................................................3
2. Existing and Future network design and problems.........................................................................3
2.1 Existing network design issues..............................................................................................4
2.2 Proposed network design.....................................................................................................7
3. Network architecture of proposed network diagram.....................................................................8
4. Everlast Corporate Intranet connections.......................................................................................9
5. Virtualized server environment..................................................................................................11
6. Storage utilization issues............................................................................................................12
7. IP addressing plan .....................................................................................................................14
8. LAN Connection Media..............................................................................................................16
9. Website Migration Issues...........................................................................................................18
10. Switching back to site ............................................................................................................19
11. Network security requirements..............................................................................................21
References.......................................................................................................................................22
3. 3
1. Introduction
Aim of the current report is to propose a complex network design environment, while discussing
the key network infrastructure requirements, LAN connections, Server, workstations, routers and
security. Case study of Everlast and Riddell sport is considered over the current network design
and it is assumed that, this proposal is developed to meet the future network enhancements of the
existing network of Everlast and adopt the complex design to meet the business and IT needs of
both the companies. From the case study problem given it is clear that, Everlast purchase another
company, Riddell sport and the main concern is to integrate and form a separate network and
LAN connectivity, such that networking requirements of both the companies will be solved
against the current problem associated. Riddell sport has a website www.riddellsport.com and
Everlast still lacks wen applications and thus this network design also considers the website,
domain and the corresponding hosting activities. It is assumed that a new domain and website
named www.everlast.com will be setup and now the current network consultant team is assigned
the job to review the existing network design and propose the future design and the key network
design is done with OPNET modeler and Cisco standard IP address allocation, domain
allocation, workstation and server configuration and the corresponding procedure is as explained.
2. Existing and Future network design and problems
4. 4
2.1 Existing network design issues
From the case study of Everlast and Riddell sport following existing design considerations are
reviewed
Prior to the new proposed network design, Everlast has two building, where the corporate
office building was operated with 4 floors. First floor contains 30 workstations and they
are connected to a single switch and second floor contains 65 workstations, where 35 of
them support Engineering and 30 of them support HR departments respectively.
Corporate database applications are accessed via 6 servers and Email applications are
accessed via 4 physical servers and these two servers are also connected to same switch,
where the first floor workstations are connected. Additionally another router is also
connected to the switch and it is assumed that the server storage capacity is 2TB, out of
which 90% of the utilization is noticed.
Third and Fourth floor are empty as of now and are just used for storage, where the
manufacturing operations are supported by 12 different physical servers and the existing
problem with these servers is that, they are out of support and suffered with frequent
hardware failures. Thus now the network consultant team is advised to deploy cloud
based solutions to get rid of the existing hardware and server failures.
Riddell sport also has two buildings, where one acts as office building and other serves
the manufacturing needs over different locations. Office building has 2 floors and 20
workstations and they are connected to one switch via a single router on the first floor.
Second floor has the webhosting services, where load balancing is handled by 6 web
servers and 6 database servers. Due to the geographical constraints, building are located
faraway and thus proper virtualization of the hardware is required in this context and it is
suggested to deploy cloud based solutions
Network diagram of the existing network of Everlast Company over Philadelphia and Dallas are
as shown below and is developed using Microsoft Visio tool
6. 6
Fig 2.1.2: Existing network of Dallas office
From the above two network diagrams it is clear that, two networks at Dallas and Philadelphia
are designed using MS Visio tool. For the first network over Philadelphia, three floors are
designed based on the network architecture, where first floor is composed of 20 workstations for
HR department and they interconnected via LAN and is connected using Ethernet cabling.
Second floor is composed of a four important servers, where the first server represents the
application server and rest of the three servers are used to represent the web server, which are
connected to the Ethernet cabling and thus connected to the first floor as well. Third floor is
composed of main network components like web development team workstations, where the
entire network is connected to the Everlast network via the VPN cloud.
When the case with Dallas office network is considered, a typical 2 floor plan, where the first
floor has 20 workstations connected to each other via Ethernet LAN and second floor holds the
application and web servers respectively. All these servers are connected to the Admin control
Mainframe system and thus connected to the manufacturing site using typical VPN cloud
connectivity. For both the Philadelphia and Dallas office a single router and switch are used for
the required internal and external connectivity as shown in the network design. Actual design
flaws and the proposed network design for the Riddell and Everlast is as discussed below
7. 7
2.2 Proposed network design
Following are the key aspects of proposed design challenges to the network consultant team and
ideas of both Everlast and Riddell sport companies
Current office building of Everlast and the corresponding operations are expanded to four
floors, where the HR team operations are moved to the 4th floor and a separate LAN setup
is used in this context.
Existing Riddell office will be moved to the current office building of Everlast and the
required interconnections will be done to integrate the current corporate operations
Corporate connectivity is enabled with new network connection infrastructure, where
additional internet backup is added in case of failures and the existing manufacturing
building will continue with the current operations with 12 workstations each
Hosting services to the Riddell domain will be shifted to the new location, where the
corresponding domain and server configurations will be done and both the domains of
Everlast and Riddell will be facilitated in this context.
Network administration will be done using additional 12 workstations and third floor of
Everlast building will be equipped with 10 more LAN workstations, which will be used
for both engineering and website development activities.
Unauthorized network access will be protected using the firewall routers, where the
current routers will be replaced.
Everlast intranet will be allocated Class B and Class C IP addressing, where the required
traffic capacity for LAN-to-LAN connectivity is given using the link configurations and
supports almost 1.5 Mbps.
Based on the existing network issues and proposed network goals, required corporate network of
Everlast and Riddell will be integrated and created, where the basic network connections are
simulated using MS Visio the proposed network design is as shown below
8. 8
3. Network architecture of proposed network diagram
Based on the existing network and proposed network design it can be analyzed that,
configuration of additional LAN, servers, workstations, routers, switches and firewall need to be
done at the corporate office of Everlast intranet and internet level. Both the routers are connected
to the Ethernet switch and as per case study it is clear that HR department and Engineering
departments operate from the three floors and it is assumed over the current network design that,
four applications are used by both the departments and they are Email, Database, Print and Http
(Web)
All the four applications are created over the application configuration object shown in
the above network design and the profiles of the respective applications are configured
over the profile configuration object, by which the desired application traffic is floated
across the proposed intranet of Everlast
Email and Database backup is done over these servers with a time interval of 100sec and
the corresponding values are configured over profile configurations
Database application server and Print server are connected to the first router, to which the
first two floors are connected and thus this design assumes that workstations of first two
floors use the database and print applications, where the TCP traffic is integrated with the
respective application traffic
Email application server and HTTP (Web) application server are connected to the second
router, to which the third floor of the building is connected and this design assumes that
third floor users or workstations will generate and support the respective applications,
where the CBR traffic is integrated with the respective application traffic(Nitnaware,
2010) and the proposed network of four floors is as shown below
9. 9
Fig 3.1: Final proposed network with 4 floors
4. Everlast Corporate Intranet connections
Based on the assumptions and case study network constraints, it is clear that, with the existing
issues of the current design, external network architecture aspects are considered to create the
desired intranet. From the case study it is clear that, there are 4 floors over the corporate building
and 3 floors are configured with the workstations, application servers, and routers and switch
respectively. Now the 4th floor is added with the HR department users and the respective intranet
network design with the current network design changes is as shown below
10. 10
Fig 4.1: Everlast corporate intranet and manufacturing site connections
Both the offices of Philadelphia and Dallas and the manufacturing sites are connected via the
intranet. Firewall router is added to the current corporate network, where the web and application
server are connected via the MPLS VPN connectivity server. External router is connected to the
Dallas subsidiary office and the corresponding manufacturing site, as shown in the above
network design. 10BaseT LAN object shown in the above network diagram are used to represent
floors of the corporate office building and at the initial network design considered, first two
floors of the building are connected to one router and the third floor of the building is connected
to the other.
Two switches are connected the Hub and a separate instructor PC is also installed to the 4th floor
of Everlast, which acts as the administration site. Within the IP address range allocated to the
workstations, number of required clients are added to each of the switch and entire architecture is
connected to the external cloud network, as shown in the above network diagram. Now the
required external connections are supported via the internet based cloud i.e. IP32Cloud object as
shown in the above. As the current design focus on the network integration of Riddell, external
11. 11
applications like VoIP and Video Conferencing with the respective connections are added to the
4th floor HR department employees.
5. Virtualized server environment
As mentioned over the key issues of the current network of Everlast and Riddell, it is clear that,
due to the hardware failures and the required infrastructure support, hardware and server support
can be migrated to a typical virtualized server environment. From the literature proposed in this
context, virtualized server penetration will always save 50% of the workload on the current
hardware and server configuration used. Cloud based solutions can be used to virtualize the
infrastructure requirements of both Everlast and Riddell, where additional security and business
requirements can be handled without any extra throughput or bandwidth requirements to the
current network design (Zissis, 2012). Security is the main concern while moving the current
server and hardware to the cloud environment and in this context, the key issues considered are
as listed below
Security concerns of client
Security concerns of applications servers like database, email, print and Http
Anti-virus for the current workstations over all the buildings and the respective floors
Server isolation performance will be evaluated against the client consumption metrics
and thus in this context, following aspects will be considered over the server
virtualization over cloud process
o VMware ESXi and vSphere hypervisor will be used for required virtual appliance
for server environment
o Virtual appliance for the client access will be provided using the deployment
models of Xen hypervisor and Citrix XenServer
o Data storage and load issues on the virtual server cloud will be handled using the
Microsoft Hyper-V hypervisor
12. 12
Entire virtualization server using the cloud solution will be done complex policy
management and the corresponding issues are as listed
o F-Secure Policy Manager interface and configuration which will support both the
virtual Windows and Linux environment (Katsaros, 2009)
Thus the proposed virtual server using cloud based solution is as shown below
Fig 5.1: Proposed virtualization server architecture of Everlast and Riddell (Katsaros,
2009)
6. Storage utilization issues
From the given current case of Everlast and Riddell network design; there are ample storage
utilization issues against providing the required capabilities to the clients from various buildings.
13. 13
As it is assumed that, there are four important applications like Email, Http, Print and Database
over the four floors and additional workstations added to the corporate network, following
features of storage utilization solutions are considered
Open architecture can used to solve the current storage utilization issues and from the
above proposed virtualization server environment, following network storage aspects will
be considered
o Network storage protocols like iSCSI, FCoE and FC will be utilized for better
storage access via the proposed open architecture
o Virtual and Physical server environments will be configured with the protocols as
listed above
o Couple of complex enterprise operating systems support will be utilized to
support the storage requirements and will include the full versions and patches of
Microsoft Windows, AIX, HP-UX and Solaris (Druschel, 2010)
Data mobility models will be integrated over the virtual server environment configuration
done and as explained above. Required data of both the Everlast and Riddell will be
moved randomly over the SAN array for more replication and security integration. With
this level of data mobility and migrations, more number of application users and end-to-
end computing requirements will be handled. Equipment required in this context will be
ordered based on the current budget constraints and the choice can be made over
equipment end-of lease and class storage application options (Salehi, 2007)
Data replication against the WAN optimization technique will be adopted to resolve the
complex networking storage utilization problems. Any-to-any WAN optimization
technique by replicating the desired data on the vendor site can be adopted in this context.
MicroSan technology will be configured with the current storage utilization requirements,
where the extreme data traffic will be reduced to 95% against the bandwidth costs and the
respective monthly plans.
Stretched clustering technique is another important option available in this context, HA
(High Availability) configuration will be enabled. In general HA configuration can be
used to site-to-site disaster problems with the level of recovery options available based on
the actual latency requirements i.e. up to 5mi. Thus clustering can stretch geographically
14. 14
up to 100 kilometer using the HA configuration technique and thus a better protection
mechanism can be integrated with the current storage utilization architecture.
Support from VMware will also be used to solve the issues associated with storage
servers on the Everlast, where the required configurations will be done using the VMware
site recovery manager against the number of disk arrays utilized against the VMware
Hardware Certification List processing
Extended support of VAAI will be integrated with VMware and thus the wide range of
storage arrays and the corresponding protocols will be enabled for better data mobility
and disparate storage environment.
Complex data storage utilization technologies like Automated DR and RecoverTrac will
be configured over the data arrays for automating the key tasks against the recovering
boundaries of business data and IT data as well. P2V (Physical to Virtual) and V2P
(Virtual-to-Physical) and V2V (Virtual-to-Virtual) storage recovery configurations will
be done to support varying network and storage issues (Foster, 2002).
Logical storage capacity of 3 TB to 500TB will be supported over the virtual storage
configuration and the required connectivity to the remote data storage server will be
established with iSCSI
Required download specifications will be enabled against the typical standards of NSS
(Network Storage Server) Gateway and NSS Virtual Appliance.
7. IP addressing plan
IP addressing plays the main role in defining the required class of IP addresses, subnet mask and
addressing of virtual machines and the required schema followed for Everlast and Riddell
companies is as discussed. Private IP addressing schema will be adopted for the current network
design as it is restricted to limited subnets, workstations and servers configured over the
buildings and the respective floors as discussed in the network design above. Required private
address to all the workstations over the subnets will be done using the Class A and Class B
private address range. Class B block set with in the range 189.16.0.0 to 189.31.255.255 against
16 private address blocks will be utilized in this context, where a total of 1048576 addresses will
15. 15
be available by which all the workstations and servers will be assigned the required IPV4
addressing scheme (Sun, 2004).
Now the Class A private address block to the new set of floors over the Everlast buildings will be
done based on the 24 bit block set, where it is assumed that the IP address from the range of
10.0.0.0 to 10.255.255.255 along with the subnet masking will be allocated to the HR and
Engineering departments respectively and thus 16777215 private individual workstations can be
allocated with the respective Class A IP address. With the these public IP addresses allocation a
secured intranet connectivity among all the workstations and servers can be done and can’t be
accessed via the external internet due to the private Class B and Class IP addressing schema used
in this context. IP address blocks and the respective subnet mask configuration done for the
corresponding locations is shown in the below table
Philadelphia VLAN Subnet
First Floor All the workstations 10.10.10.0/12
Second Floor Email and Database server 10.10.11.0/12
Third Floor Application Servers 10.10.12.0/12
Fourth Floor VLAN Private Cloud 10.10.13.0/12
Dallas VLAN Subnet
First Floor All the workstations 10.10.11.0/12
Second Floor Email and Database server 10.10.12.0/12
Third Floor Application servers 10.10.13.0/12
Fourth Floor Switch and Router connections 10.10.14.0/12
16. 16
Fig 7.1: IP address allocation methodology (Culler, 2007)
To access the Everlast and Riddell network from the public internet, current Class A and Class B
IP addressing done and thus always public Class IP addressing scheme is required in this context.
To meet the requirements of growing business conditions of the companies and deploy the public
networks, DMZ server configuration will be adopted to provide the required public internet
access. Public IP addressing schema will used to provide access to the external components like
Mails severs, DNS Servers, Web servers and other data servers, where the main constraint
considered here is to provide static IP address to the respective servers as it will again become
tedious job of the servers location change during course of time. Either static IP address
allocation or ISP automatic allocation will be adopted and configured based on the future plans
of network design (Culler, 2007). Part of Class C IP addresses will be purchased to provide
public internet access to the external users, where the required block of IP addresses will vary
within the range of 5, 10 and 25, where 256 variant class C configurations will be used in this
context. Traditional subnet settings will be done using the Class C network IP addressing, where
almost 254 addresses are split into 8 subnets those are allocated to 30 hosts respectively. VLSM
(Variable Length Subnet Masking) methodology will be followed to selecting the actual subnet
masking procedures and following routing protocols will be implemented (Fahiem, 2007)
OSPF (Open Shortest Path First)
EIGRP (Enhanced Interior Gateway Routing Protocol)
BGP 4(Border Gateway Protocol)
RIP 2 (Routing Information Protocol)
8. LAN Connection Media
Choosing LAN connection media against the required network design plays the key role in
accessing the further infrastructure and networking requirements as well. In general there variant
17. 17
types of LAN media connections are available and were used for connecting the Ethernet
workstations, servers, routers and switches and thus Ethernet LAN connections are used over the
proposed network design. Thus initial Ethernet LAN connection requirements will be met using
the below physical layer options
802.3ae will be used against meeting the 10 Gigabit Ethernet
802.3u will be used against meeting the Fast Ethernet requirements
802.3ab will be used against meeting the Gigabit Ethernet over UTP
802.3z will be used against meeting the Gigabit Ethernet over Fiber (Chae, 2002)
All these Ethernet LAN cabling will be done against the typical OSI (Open System
Interconnection) model standards and the possible physical layer deployment that can be done
over the proposed Ethernet is as shown below
Fig 8.1: Ethernet Physical Layer architecture (Chae, 2002)
When the initial design constraints are ready against deploying the required Ethernet LAN
deployment more infrastructures, cost and controlling aspects are considered. Following Ethernet
technologies will be used over connecting the respective building, floors and the offices
10Mbps Ethernet speed will be configured at the access layer requirements and thus
optimize the LAN connectivity performance
18. 18
Network devices and the access layer will be connected with Gigabit Ethernet, where
segmented level traffic aggregations can be done
Fast Ethernet will be deployed to avoid the associated bottleneck problems with client-
server performance and thus always an effective solution can be provided against slow
networks
Required connections between the application core and distributed layer of the current
network will be done using Gigabit Ethernet links, where dual links among the routers
and switches will also be done at this level
Switches and backbone network will be connected using the 10 Gigabit Ethernet, as it is
always required to implement fastest media at this level to support the complex switch
conditions (Maltz, 2009)
Thus based on the Ethernet connectivity requirements analyzed, the actual connection media that
will be used for the proposed network design is as listed
100BaseFX to connect the servers and routers
1000BaseT to connect the buildings and intranet cloud
1000BaseLX to connect the intranet to the public internet
10Base2 to connect the workstations and the routers
10BaseT to connect the servers and routers (Fossaceca, 2008)
9. Website Migration Issues and DSN Changes
Website migration is one of the complex issues while hosting the DSN server against meeting
the business needs of any organization. In general website migration from one host to other
consumer constraints against fast transfer, downtime and load balancing issues are considered
and these issues will be analyzed and resolved using the below mechanism for the current
network design proposal
19. 19
To avoid the downtime of the website where the risks like loss of files and database, all
the required content of the current website to the new host prior to cancellation
All the required backup files will be downloaded to a virtualized server over cloud
environment, where the popular website control panel tools like PleskPanel and cPanel
will used in this context and thus, data backup and restoration can be done very quickly
Main page of the current website like public.html and the respective folders will be
floated over the associated subdomains and this type of backup will be done using the
MYSQL databases.
Restore and Backup will be done at two levels like to the home directory and MySQL
directory based on the number of backup download pages on the current website hosting
process
Security constraints against website migration will be handled using the database backup
file analysis, where the files containing the information of usernames and passwords will
be deleted over the new hosting site location (Wang, 2009).
To accomplish the changes with the DNS server, Everlast will use the new address
www.everlast.com and it an arbitrary IP address within the range 25.123.21.44 is
allocated to the corporate network of Philadelphia’s gateway
“CNAME” command of UNIX will be used to change the DNS and static IP addresses of
both the Riddell sport and Everlast, such that, the URL entry will be automatically
redirected to www.riddellsport.com and www.everlast.com respectively
Once the webpages, file, information and database is migrated to the new host, now the
new name servers will be assigned to these attributes respectively. Once the propagation
process is completed, any changes to the new website will be done and the corresponding
discussion is as given below
10. Switching back to site
20. 20
In case of website fail or malfunction, it is always required to switch back to the old website,
where the actual hosting is done. This can be done using manually by using some of the tools
and the common procedure followed in this context is as listed below
Duplicator plugins available will be downloaded and installed, where once the
installation is activated required site package of the new and old website can be done
Any sort of future information in form of messages in case of website failure will be
added to the duplicator interface panel.
Now the duplicator plugin that is installed will scan all the files related to server, database
and other files and will detect the suspicious files and those won’t be reloaded in case of
website failure
A new and dedicated server will be configured to store the required information and zip
files of the current website and the IP address schema added will load the corresponding
server in case of current website failure and during the switching process (Wo, 2008)
Now the site installer will run and enable the required functionality and a sample
snapshot of the Wordpress duplicator is as shown below
Fig 10.1: Duplicator plugin configuration and installation process (Wo, 2008)
21. 21
11. Testing the Website Migrationissues
Whenever the primary website is migrated from a location to another location, lot of issues need
to be considered and tested, which include the testing of both the primary and backup sites as
well. All the incoming traffic to the websites is analyzed prior to the actual migration process,
where the respective channels are tested to estimate the overall migration process. Typical binary
GATE models can be used, where ON and OFF states of the website are indicated with 1 and 0
respectively. Multiple GATE conditions can be used in this context to analyze the required
hosting services for both the locations. Switching among the sites of Dallas and Philadelphia will
be done using the new domain configurations done for Everlast Company and thus the required
public and private configurations will be done at the GATE switching conditions. Two GATES
can be used in this context, where first GATE with 0 or ON conditions will represent Dallas and
GATE with 1 or OFF will represent the Philadelphia locations respectively.
12. Network security requirements
As the current network of Everlast and Riddell is composed of database, email, print and Http
applications being deployed over number of workstations, server, routers and switches, providing
network security is one of the important network design issues (Gurung, 2001). It is assumed that
firewall based protection will be used to protect the network and the current Ethernet routers will
be replaced with the Firewall routers and the required configuration that will be done in this
context is as shown below
22. 22
Fig 11.1: Firewall based protection added to the current network (Gurung, 2001)
Protection of network is always required when connecting to the external internet as the chances
of various attacks is high and thus in this context, one of the existing routers will be replaced
with firewall router SonicWALL 200 with IP address 10.120.16.1 as shown in the above figure
(Gurung, 2001)
References
Chang-Joon Chae. (2002). Optical CSMA/CD media access scheme for Ethernet over
passive optical network. Photonics Technology Letters, IEEE . 14 (5), p99-112
Culler. (2007). Extending IP to Low-Power, Wireless Personal Area Networks. Internet
Computing, IEEE . 12 (4), p50-72
23. 23
Dimitrios Zissis. (2012). Addressing cloud computing security issues. Future Generation
Computer Systems. 28 (3), p16-23.
Fahiem, M. (2007). IP Address Space Management using Aggregated Fixed Length
Subnet Masking. Electrical Engineering, 2007. ICEE '07. International Conference
on, 10(1), 16-29.
Fossaceca. (2008). The PathStar access server: Facilitating carrier-scale packet telephony.
Bell Labs Technical Journal . 3 (4), P16-19
Foster. (2002). Decoupling computation and data scheduling in distributed data-intensive
applications. High Performance Distributed Computing, 2002. HPDC-11 2002.
Proceedings. 11th IEEE International Symposium on. 11 (1), p71-82.
Gurung. (2001). Automatic management of network security policy. DARPA Information
Survivability Conference & Exposition II, 2001. DISCEX '01. Proceedings. 2 (1), p116-
123
Katsaros. (2009). Cloud Computing: Distributed Internet Computing for IT and Scientific
Research. Internet Computing, IEEE . 13 (5), p54-59
Maltz, D. (2009). VL2: A scalable and flexible data center network. Proceedings of the
ACM SIGCOMM 2009 Conference on Data Communication, 51(2), 9-17
Nitnaware, D. (2010). Performance Evaluation of Energy Consumption of Reactive
Protocols under Self- Similar Traffic. International Journal of Computer Science &
Communication,1(1), 16-23
Peter Druschel. (2010). Storage management and caching in PAST, a large-scale,
persistent peer-to-peer storage utility. Proceedings of the eighteenth ACM symposium on
Operating systems principles. 12 (6), p212-218
Qing Bo Wang. (2009). GreenCloud: a new architecture for green data center.
Proceedings of the 6th international conference industry session on Autonomic
computing and communications industry session. 10 (3), p29-28.
Salehi, A. (2007). Infrastructure for Data Processing in Large-Scale Interconnected
Sensor Networks. Mobile Data Management, 2007 International Conference on, 36(8),
12-20
24. 24
Tianyu Wo . (2008). HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine
Live Migration across Networks. High Assurance Systems Engineering Symposium,
2008. HASE 2008. 11th IEEE. 3 (1), p10-25.
Yuan Sun. (2004). A study of dynamic addressing techniques in mobile ad hoc networks.
Wireless Communications and Mobile Computing . 4 (2), p89-92.
#NetworkDesignAssignmentHelp
#CyberSecurityAssignment
#AssignmentHelp
#ManagementAssignmentHelp
#AssignmentsHelp
#ProjectsHelp
#HomeworkHelp
#DissertationsHelp
#ThesisHelp
#AcademicAvenue
#AcademicsHelp
#FrustratedWithAssignments
#MarketingAssignmentHelp
#ResearchProposalHelp
#CaseStudyHelp
#ResearchReportHelp
#SurveyHelp