The Florida Association of Nonprofits (FANO) has requested a network design to connect their 13 employees and volunteers across two floors of an office building. The proposed network includes wired and wireless connectivity using Cat5e cabling, servers to host their website, email, files and applications, firewalls and routers for security, and 45 computers and printers. The estimated budget for the full network implementation is $86,846.04. Diagrams in the appendices show the physical layout and logical design of the proposed network.
THIS IS A PROJECT DONE BY USING SMALL ELECTRONICS COMPONENTS AND BY DOING THIS WE CAN SEE THE FADING OF LED BY UP AND DOWN AND FOR THIS WE MADE REPORT IN A SPECIFIED WAY AND IN THIS IS WE SHOWN EVERY STEP BRIEFLY HOW TO DO THE PROJECT AND THE RESULTS ARE ALSO COMING AND THIS PROJECT IS USEFUL FOR MANY TO DO PROJECTS
DEFENSE IN DEPTH6IntroductionThe objective of this papLinaCovington707
DEFENSE IN DEPTH
6
Introduction
The objective of this paper is to visually display a defense in depth model and explain features that will encourage an overall layered defense tactic to strategically mitigate against potential threats. The network is comprised of a corporate site in Chicago where all servers are located to include: Web server, file server, print server, mail server, and ftp server. This connection to the Internet has a speed of 50mbps with 300 employees that have access to the Internet, as well as local and corporate resources. There is also one remote site that is 8 miles away with 20 employees that need access to all resources at corporate as well as an Internet connection with the limitation of 3mbps. In this design all network devices will be utilized to include: routers, switches, hubs, firewalls, VPN’s, and proxies. Along with the devices being displayed the interconnections between these devices will be shown, the end user (client) devices (desktops, laptops), and the Internet cloud, which will generically be shown to represent the network’s interface to the Internet.
In addition to the design this discussion will review the flow of data throughout the network to reveal security features that create that in depth design to protect any organization with similar requirements. I will first review the network diagram with physical features, locations, and Internet speeds; then discuss in depth, security features from each of the seven network domains (user, workstation, Local Area network (LAN), LAN-to-Wide Area Network (WAN), Remote Access, WAN, and Systems/Applications) and how they will be incorporated throughout the design and infrastructure of the network.
The objective is to implement these features to enforce the confidentiality, integrity, availability, privacy, authenticity, authorization, non-repudiation, and accounting. (Stewart, J. M., 2011).
Network Design, Data Flow, and Security Features
The network design features the corporate headquarters site in Chicago that includes within the Information Technical (IT) department is a database server, an FTP server, application server, web server, email server, print server, and 30 workstations. The database server utilizes role-based access features as well as two-factor authentication for server and user access (Common Access Card and username/password). The FTP server utilizes the TCP protocols and is within the internal network with additional firewall rules, routing policies that limit open ports, and internal training on how to locate potential threats for the IT department to monitor. The Webserver must be held in the DMZ to allow additional port access to utilize the Internet. The email and print servers are also located within the internal network.
Outside of the IT Department, this organization has six departments that are on three floors that include45 workstations and 5 printers per department. Each department is interconnected to corporate resources ...
THIS IS A PROJECT DONE BY USING SMALL ELECTRONICS COMPONENTS AND BY DOING THIS WE CAN SEE THE FADING OF LED BY UP AND DOWN AND FOR THIS WE MADE REPORT IN A SPECIFIED WAY AND IN THIS IS WE SHOWN EVERY STEP BRIEFLY HOW TO DO THE PROJECT AND THE RESULTS ARE ALSO COMING AND THIS PROJECT IS USEFUL FOR MANY TO DO PROJECTS
DEFENSE IN DEPTH6IntroductionThe objective of this papLinaCovington707
DEFENSE IN DEPTH
6
Introduction
The objective of this paper is to visually display a defense in depth model and explain features that will encourage an overall layered defense tactic to strategically mitigate against potential threats. The network is comprised of a corporate site in Chicago where all servers are located to include: Web server, file server, print server, mail server, and ftp server. This connection to the Internet has a speed of 50mbps with 300 employees that have access to the Internet, as well as local and corporate resources. There is also one remote site that is 8 miles away with 20 employees that need access to all resources at corporate as well as an Internet connection with the limitation of 3mbps. In this design all network devices will be utilized to include: routers, switches, hubs, firewalls, VPN’s, and proxies. Along with the devices being displayed the interconnections between these devices will be shown, the end user (client) devices (desktops, laptops), and the Internet cloud, which will generically be shown to represent the network’s interface to the Internet.
In addition to the design this discussion will review the flow of data throughout the network to reveal security features that create that in depth design to protect any organization with similar requirements. I will first review the network diagram with physical features, locations, and Internet speeds; then discuss in depth, security features from each of the seven network domains (user, workstation, Local Area network (LAN), LAN-to-Wide Area Network (WAN), Remote Access, WAN, and Systems/Applications) and how they will be incorporated throughout the design and infrastructure of the network.
The objective is to implement these features to enforce the confidentiality, integrity, availability, privacy, authenticity, authorization, non-repudiation, and accounting. (Stewart, J. M., 2011).
Network Design, Data Flow, and Security Features
The network design features the corporate headquarters site in Chicago that includes within the Information Technical (IT) department is a database server, an FTP server, application server, web server, email server, print server, and 30 workstations. The database server utilizes role-based access features as well as two-factor authentication for server and user access (Common Access Card and username/password). The FTP server utilizes the TCP protocols and is within the internal network with additional firewall rules, routing policies that limit open ports, and internal training on how to locate potential threats for the IT department to monitor. The Webserver must be held in the DMZ to allow additional port access to utilize the Internet. The email and print servers are also located within the internal network.
Outside of the IT Department, this organization has six departments that are on three floors that include45 workstations and 5 printers per department. Each department is interconnected to corporate resources ...
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxtodd581
Running head: NETWORK INFRASTRUCTURE AND SECURITY
1
NETWORK INFRASTRUCTURE AND SECURITY
2
Project Deliverable 5: Network Infrastructure and Security
CIS 499 – Information Systems Capstone
November 25, 2018
Project Scope
The project will comprise of a network design to meet Acme Corporation network infrastructure requirements. The network should accommodate occasional guest users of up to 10 users. The network design will incorporate an FTP server that will use for sharing files. The project should involve separate subnet for guest and LAN networks; the guest network should be restricted to access only FTP service on the FTP server while all other access to the LAN network will be blocked. The project will also involve IP Network Design as well as identification and configuration details of the hardware utilized (Switches and Routers). Included in the network design is the implementation of a Wireless LAN (WLAN) that minimizes the management effort to configure and manage while allowing effective data transmission between the Wireless Application Protocols (WAPs).
Network design
The network will use a star topology where it provides centralized handling of the network and its’ associated security. Each of the floors of the building will have a central server which host switches that link the different rooms via ethernet cables. Each of the rooms will have a switch that is linked to the central server's router. The servers will be linked via fiber optic cables. The ethernet cables will be utilized for connecting individual devices to their associated switches. The network design will involve the utilization of both wired and wireless media. The wireless media will allow for a network connection for portable devices like tablets, cell phones, and laptops.
The switch links allow the traffic getting into the Acme’s LAN from the MAN not to be congested. As more tablets are utilized in the company, the WLAN bandwidth increases significantly to each room. This requires that the WAPs supporting the 802.11n protocol as well as faster 802.11ac standard require additional power. As a result, switches with PoE+ give the required power. These Switches utilize the existing Category-6 cable (Ethernet cables) that allow for remote administration and configuration (Karris, 2009).
Virtual LANs (VLAN) will be used to enables the network administrator to group users into shared broadcast domains irrespective of their physical position in the internetwork. For instance, computer devices utilized by employees on two different floors may be placed on the same VLAN. The staff has their VLAN while the Guest VLAN is used by guests when using wireless access points.
The company's network perimeter that detaches it from the Internet comprises of two border core routers. The border routers should then link to the Virtual Private Network (VPN) Gateway. The Routers link to the servers, wireless access points and switches as well as the LAN (internal network)..
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxglendar3
Running head: NETWORK INFRASTRUCTURE AND SECURITY
1
NETWORK INFRASTRUCTURE AND SECURITY
2
Project Deliverable 5: Network Infrastructure and Security
CIS 499 – Information Systems Capstone
November 25, 2018
Project Scope
The project will comprise of a network design to meet Acme Corporation network infrastructure requirements. The network should accommodate occasional guest users of up to 10 users. The network design will incorporate an FTP server that will use for sharing files. The project should involve separate subnet for guest and LAN networks; the guest network should be restricted to access only FTP service on the FTP server while all other access to the LAN network will be blocked. The project will also involve IP Network Design as well as identification and configuration details of the hardware utilized (Switches and Routers). Included in the network design is the implementation of a Wireless LAN (WLAN) that minimizes the management effort to configure and manage while allowing effective data transmission between the Wireless Application Protocols (WAPs).
Network design
The network will use a star topology where it provides centralized handling of the network and its’ associated security. Each of the floors of the building will have a central server which host switches that link the different rooms via ethernet cables. Each of the rooms will have a switch that is linked to the central server's router. The servers will be linked via fiber optic cables. The ethernet cables will be utilized for connecting individual devices to their associated switches. The network design will involve the utilization of both wired and wireless media. The wireless media will allow for a network connection for portable devices like tablets, cell phones, and laptops.
The switch links allow the traffic getting into the Acme’s LAN from the MAN not to be congested. As more tablets are utilized in the company, the WLAN bandwidth increases significantly to each room. This requires that the WAPs supporting the 802.11n protocol as well as faster 802.11ac standard require additional power. As a result, switches with PoE+ give the required power. These Switches utilize the existing Category-6 cable (Ethernet cables) that allow for remote administration and configuration (Karris, 2009).
Virtual LANs (VLAN) will be used to enables the network administrator to group users into shared broadcast domains irrespective of their physical position in the internetwork. For instance, computer devices utilized by employees on two different floors may be placed on the same VLAN. The staff has their VLAN while the Guest VLAN is used by guests when using wireless access points.
The company's network perimeter that detaches it from the Internet comprises of two border core routers. The border routers should then link to the Virtual Private Network (VPN) Gateway. The Routers link to the servers, wireless access points and switches as well as the LAN (internal network)..
9-1 Final Project Submission Network Analysis and Archit.docxsleeperharwell
9-1 Final Project Submission Network Analysis and Architecture Evaluation
Tiffany McLean
IT 640
December 2, 2018
Corley Hughes
Running head: 9-1 FINAL PROJECT SUBMISSION NETWORK ANALYSIS AND
1
9-1 FINAL PROJECT SUBMISSION NETWORK ANALYSIS AND
2
9-1 Final Project Submission Network Analysis and Architecture Evaluation
Introduction
SNHUEnergy is an organization which operates in the US, it is a medium sized organization with 110 employees and operates in Memphis and Dallas. The organization is looking forward to expanding its communication reach. This paper will analyze the current network architecture to determine the important changes which ought to be done to prepare the organization for future growth. This paper will also evaluate the traffic patterns to determine the critical aspects of the organization.
Network Applications
As seen from physical design diagram, Memphis location is the smallest location with only 30 employees, Memphis Local Area Connection deals with operations and billing. In addition to this, the Memphis location has two servers only; one for operation and one billing. Two work-stations are also available which are for video conferencing, and VOIP Phone system. Also, in this workstation, there is one router and one switch. The router is used to connect to the Dallas office remotely.
The Dallas office is the largest location with 90+ employees. The location handles four applications which are Payroll, HR, Accounting, and Email. There is a total of three workstations with four servers. The first server is an email server, the second server hosts payroll, accounting, and HR applications, and the other two are one for Video conferencing and another one for VOIP system. Lastly, Dallas location is equipped with one router, two switches, and one firewall.
Key Components with the appropriate OSI Network Layer
The table below identifies the key components with the appropriate OSI network layer:
Table 1: Key components with the appropriate OSI network layer
Email
SMTP
Application Layer of the OSI model
Stand Alone Applications such as HR/Payroll/ Accounting
SET, SSL
Session Layer/Network layer/ Application Layer/ Transport Layer
VOIP
TCP/IP
Network layer/ Transport Layer
File Transfer
TCP/IP
Network layer/ Transport Layer
Video conferencing
TCP/IP
Network Layer/ Transport Layer (Kenyon, 2016)
Role and Functions of the Key Components
There three components that have been utilized and are described below:
· Router: Router is one of the networking devices which is used to forward data packets in a computer network. A router is used to perform traffic directing functions. The Dallas router is used to connect the whole organization to the wide area network. The two routers are dynamic routers which are designed to discover routes automatically.
· Firewall: One firewall has been utilized in this scenario. The major role of the firewall is to protect the organization from threats and Denial of Service type of attac.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Module name is Networks 512 As the demand for faster and .pdffreddysarabia1
Module name is Networks 512
As the demand for faster and more efficient high-performance computers grows, so do the
dimensions of the form factors that house them. Computer engineers have been tasked for years
with the difficult task of incorporating increasingly powerful computers into and onto
increasingly smaller chassis and printed circuit boards (PCBs), primarily to meet a growing
demand for more reliable, affordable, size-conscious, energy-efficient, and cost-effective
computer systems. This is why the world of embedded systems continues to see boundary-
pushing size, weight, power, and cost developments. 2.1 Use your knowledge of embedded
systems and devices to answer the question below. 2.1.1 What are embedded systems? 2.1.2
What are the various kinds of embedded systems? 2.1.3 What is the difference between soft and
hard real-time embedded systems?
device may require on both the serial and network sides of a connection. Should the device
always be connected to a specific host or PC? Is it possible that multiple hosts or network
devices will want or need to connect to the newly networked serial device? Are there any
specific requirements for an application that requires the serial device to reject a network
connection under certain conditions? The bottom line is that a server must be able to service a
wide range of application requirements while also meeting all of the demands of those
applications. Discuss how device servers are used to improve the usability of various
applications such as: Data Collection, Factory/Industrial Automation, Security Systems, Bar
Code Readers and Point-of-Sale Scanners, Medical Applications, M2M Wireless
Communication/Networking. (30)
1. An extensive telecommunications infrastructure is provided by a structured cabling system,
which is a complete system of cabling and related components. This infrastructure is used for a
variety of purposes, including phone service provision and data transmission across computer
networks. It shouldn't be hardware-reliant. A structured cabling system is further defined in
terms of ownership. At the termination of the service provider (SP), the structured cabling
system starts. The demarcation point (demarc) or network interface device is at this location
(NID). For instance, in the establishment of a telephone system, the SP provides one or more
service lines (per customer requirements). At the line of demarcation, the SP joins the service
lines. 1.1 Explain the significance of structured cabling and the advantages of structured cabling.
(10) 1.2 As a network architecture, you are tasked with designing a network for a six-story office
building, with each floor connecting 5 computers in 5 offices and having a wireless access point
to connect wireless devices. Design a network plan for the building using your knowledge of
structured cabling and various network devices, labeling all the hardware in devices and cabling.
(20)
A specialized network-based hardware device designe.
IT327-1404A-01 Implementing, Managing and Mainta.docxpriestmanmable
IT327-1404A-01 Implementing, Managing and Maintaining a Network I
Phase 1 Individual Project
Michael F. Ryan Jr.
10/14/14
Contents
Week 1: Target Organization 3
Target Organization 3
Analysis and Recommendations 3
Week 2: Transmission Control Protocol/Internet Protocol (TCP/IP) Addressing and Management 4
Week 3: Fault Tolerance Plan 5
Week 4: Security Plan 6
Week 5: Network Monitoring 7
All Weeks: Network Pro Prep Toolkit 8
Week 1: Target OrganizationTarget Organization
About Ryan Computer Enterprises
Ryan Computer Enterprises formed in 2000, and provides leading business solutions. Currently there are over 8000 employees that are located throughout five states with three locations in Pennsylvania, Florida, California, Texas and New York. The administrative office currently is located in Pennsylvania. Currently there are over 500 additional employees located in the corporate headquarters. The company provides cutting edge solutions and needs USAA, JP Morgan, Goldman Sacks and other financial institutions. In 2002, Forbes magazine rated Ryan Computer Enterprises as the number one business organization for the field of technical consultation.
Major clients of Ryan Computer Enterprises are all in the field of investment banking and insurance. Some major factors of focus for the company will be improvement of business process the clientele have set in place, legacy systems and to have a set solution in place to be utilized thought their organization. Ryan Computer Enterprises has stated that our goal is align both the company and client goals.
Ryan Computer Enterprises has slowly replaced existing infrastructure over the years focusing on workstation, printer, switch and routers. Some areas of interest that go beyond the physical infrastructure are application upgrades. The applications that are in questions for upgrades are DBMS and other various apps such as Office 365. It has been over 2 years since the last upgrade to the IT system has been conducted and in order to provide better security and stability it has been decided that specific facets that have been listed must be upgraded as well as servers and the use of cloud technology must be implemented to allow for virtual storage of information. Other technology that should be visited is the addition of WAPs through out the facilities this allows the vendors and employees to use their mobile devices and other wireless items as well as the clientele.
The last item for discussion that will be addressed as an upgrade will be the addition of remote access. Having VPN capabilities allows Ryan Computer Enterprises to better facilitate troubleshooting and adds to the functionality of its employees. All email services as well as server access allow an employee to better assist with technical work as well as giving the clients the ability to conduct business wherever they might be located.
Metrics that are used to identify some of the issues are based on multiple factors but some ...
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxericbrooks84875
WWTC Office Layout Diagram.html
Background Information for World-Wide Trading Company
World-Wide Trading (WWTC) is a large online broker firm in the Hong Kong. The trading company has a staff of 9,000 who are scattered around the globe. Due to aggressive growth in business, they want to establish a regional office in New York City. They leased the entire floor of a building on Wall Street. You were hired as the director of the IT Department. The President of the company asked you to set up the state of the art network by December 15, 2013. He shared with you the organizational structure and a list of the staff. You hired a consultant to test the network infrastructure and power requirement at WWTC office space. The consultant reported that the network infrastructure is solid and gigabit network can be set up on existing network wiring. Also, the existing power supply will meet their current and future demand. The President has reiterated these business goals.
Business and Technical Goals
· Increaserevenue from 10 billion to 40 billion by the year 2015
· Reduce the operating cost from 30 to 15 percent by the year 2015 by using an automated system for buying and selling.
· Provide secure means of customer purchase and payment over Internet.
· Allow employee to attach their notebook computers to the WWTC network and Internet services.
· Provide state of the art VoIP and Data Network
· Provide faster Network services
· Provide fast and secure wireless services in the lobby and two large conference rooms (100x60)
On the basis of these business goals, you prepared a RFP to solicit a proposal for designing and implementing a fast, reliable and secure network.
The purpose of this Request for Proposal is to solicit from qualified vendors proposals for a
secure and fast network to ensure proper operation of the network.
To prepare a design for a state of the art network at the Wall Street location of World-Wide Trading.
Propose a Network design that solves the current security audit problems (see security sections), to meet business and technical goals.
Provide a modular, scalable and network.
Provide redundancy at building core layer and building distribution layer and access layer and at workstation level to avoid failure at one point. For Building Access layer provide redundant uplinks connection to Building Distribution layer.
Select appropriate Cisco switch model for each part of your enterprise campus model design from the Cisco Products Link, listed below and use the following assumptions in your selection process.
Selecting the Access layers switches:
0. Provide one port to each device
0. Make provision for 100% growth
Server farm switches
· Assume 6 NIC cards in each server and one NIC card uses one port of switch
· Dual processors and dual power supply
Propose an IP addressing redesign that optimizes IP addressing and IP routing (including the use of route summarization). Provide migration provision to IPv6 protocol in fut.
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxpicklesvalery
Supportive Security Policies in SOHO
Topic: SUPPORTIVE SECURITY POLICIES IN SOHO
NETWORKING
It is a supportive system of sharing information and services among individuals and groups having a common interest.
A local-area network (LAN) is basically defined as two or more computers connected by a structured wire system for the purpose of sharing resources and files. In this chapter we will explain the various ‘structured wire systems’ that the Network Engineer will deal with during the course of their job. Wireless LANs are becoming more and more popular, but even these devices rely on some amount of physical wires in most cases.
REQUIREMENTS
Network Adapter
A computer needs a network adapter to connect to a network. It converts computer data into electronic signals. It listens for silence on the network cable and applies the data to it when it has an opportunity. The network access element of its job is called Media Access Control, or MAC. The physical address of every computer on a network is called its MAC address. The MAC address is the network adapter's serial number. Most computers are shipped with the network adapter integrated into the motherboard. However, early PCs didn't include this function and computer owners had to buy it separately and fit it into an expansion slot on the motherboard. These were called "network cards" because they were sold on a separate card. Although network adapters are now integrated, the name network card is still used. The wireless equivalent is called a Wireless Network Interface Controller.
Network Medium
Wired networks need cable. The most common form of cable used in networks is called the "Unshielded Twisted Pair." In PC shops, it is generally just referred to as "network cable" or "Ethernet cable." Ethernet is the most widely implemented set of standards for the physical properties of networks. UTP is so closely identified with Ethernet that it is often given that name. Other cable types used for networks are twin-axial, Shielded Twisted Pair and single-mode and multi-mode fiber optic cable. Wireless networks don't need cable; they send data on radio waves generated by the WNIC.
Cable Connectors
In wired networks, the most common form of connector is the RJ45. Every computer with networking capabilities has an RJ45 port. This is sometimes called a "network port" or an "Ethernet port." The RJ45 plug looks like a slightly larger telephone plug and connects the Unshielded Twisted Pair or the Shielded Twisted Pair cable.
Power Supply
Both wired and wireless networks need a power supply. A wireless network uses the current to generate radio waves. A cabled network sends data interpreted as an electronic pulse.
Hub/Switch/Router
In wired networks, one computer cannot connect to many others without some form of splitter. A hub is little more than a splitter. It repeats any signals coming into one of its ports out onto all its other ports. A cable leads from each port to one computer. A switch ...
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxtodd581
Running head: NETWORK INFRASTRUCTURE AND SECURITY
1
NETWORK INFRASTRUCTURE AND SECURITY
2
Project Deliverable 5: Network Infrastructure and Security
CIS 499 – Information Systems Capstone
November 25, 2018
Project Scope
The project will comprise of a network design to meet Acme Corporation network infrastructure requirements. The network should accommodate occasional guest users of up to 10 users. The network design will incorporate an FTP server that will use for sharing files. The project should involve separate subnet for guest and LAN networks; the guest network should be restricted to access only FTP service on the FTP server while all other access to the LAN network will be blocked. The project will also involve IP Network Design as well as identification and configuration details of the hardware utilized (Switches and Routers). Included in the network design is the implementation of a Wireless LAN (WLAN) that minimizes the management effort to configure and manage while allowing effective data transmission between the Wireless Application Protocols (WAPs).
Network design
The network will use a star topology where it provides centralized handling of the network and its’ associated security. Each of the floors of the building will have a central server which host switches that link the different rooms via ethernet cables. Each of the rooms will have a switch that is linked to the central server's router. The servers will be linked via fiber optic cables. The ethernet cables will be utilized for connecting individual devices to their associated switches. The network design will involve the utilization of both wired and wireless media. The wireless media will allow for a network connection for portable devices like tablets, cell phones, and laptops.
The switch links allow the traffic getting into the Acme’s LAN from the MAN not to be congested. As more tablets are utilized in the company, the WLAN bandwidth increases significantly to each room. This requires that the WAPs supporting the 802.11n protocol as well as faster 802.11ac standard require additional power. As a result, switches with PoE+ give the required power. These Switches utilize the existing Category-6 cable (Ethernet cables) that allow for remote administration and configuration (Karris, 2009).
Virtual LANs (VLAN) will be used to enables the network administrator to group users into shared broadcast domains irrespective of their physical position in the internetwork. For instance, computer devices utilized by employees on two different floors may be placed on the same VLAN. The staff has their VLAN while the Guest VLAN is used by guests when using wireless access points.
The company's network perimeter that detaches it from the Internet comprises of two border core routers. The border routers should then link to the Virtual Private Network (VPN) Gateway. The Routers link to the servers, wireless access points and switches as well as the LAN (internal network)..
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxglendar3
Running head: NETWORK INFRASTRUCTURE AND SECURITY
1
NETWORK INFRASTRUCTURE AND SECURITY
2
Project Deliverable 5: Network Infrastructure and Security
CIS 499 – Information Systems Capstone
November 25, 2018
Project Scope
The project will comprise of a network design to meet Acme Corporation network infrastructure requirements. The network should accommodate occasional guest users of up to 10 users. The network design will incorporate an FTP server that will use for sharing files. The project should involve separate subnet for guest and LAN networks; the guest network should be restricted to access only FTP service on the FTP server while all other access to the LAN network will be blocked. The project will also involve IP Network Design as well as identification and configuration details of the hardware utilized (Switches and Routers). Included in the network design is the implementation of a Wireless LAN (WLAN) that minimizes the management effort to configure and manage while allowing effective data transmission between the Wireless Application Protocols (WAPs).
Network design
The network will use a star topology where it provides centralized handling of the network and its’ associated security. Each of the floors of the building will have a central server which host switches that link the different rooms via ethernet cables. Each of the rooms will have a switch that is linked to the central server's router. The servers will be linked via fiber optic cables. The ethernet cables will be utilized for connecting individual devices to their associated switches. The network design will involve the utilization of both wired and wireless media. The wireless media will allow for a network connection for portable devices like tablets, cell phones, and laptops.
The switch links allow the traffic getting into the Acme’s LAN from the MAN not to be congested. As more tablets are utilized in the company, the WLAN bandwidth increases significantly to each room. This requires that the WAPs supporting the 802.11n protocol as well as faster 802.11ac standard require additional power. As a result, switches with PoE+ give the required power. These Switches utilize the existing Category-6 cable (Ethernet cables) that allow for remote administration and configuration (Karris, 2009).
Virtual LANs (VLAN) will be used to enables the network administrator to group users into shared broadcast domains irrespective of their physical position in the internetwork. For instance, computer devices utilized by employees on two different floors may be placed on the same VLAN. The staff has their VLAN while the Guest VLAN is used by guests when using wireless access points.
The company's network perimeter that detaches it from the Internet comprises of two border core routers. The border routers should then link to the Virtual Private Network (VPN) Gateway. The Routers link to the servers, wireless access points and switches as well as the LAN (internal network)..
9-1 Final Project Submission Network Analysis and Archit.docxsleeperharwell
9-1 Final Project Submission Network Analysis and Architecture Evaluation
Tiffany McLean
IT 640
December 2, 2018
Corley Hughes
Running head: 9-1 FINAL PROJECT SUBMISSION NETWORK ANALYSIS AND
1
9-1 FINAL PROJECT SUBMISSION NETWORK ANALYSIS AND
2
9-1 Final Project Submission Network Analysis and Architecture Evaluation
Introduction
SNHUEnergy is an organization which operates in the US, it is a medium sized organization with 110 employees and operates in Memphis and Dallas. The organization is looking forward to expanding its communication reach. This paper will analyze the current network architecture to determine the important changes which ought to be done to prepare the organization for future growth. This paper will also evaluate the traffic patterns to determine the critical aspects of the organization.
Network Applications
As seen from physical design diagram, Memphis location is the smallest location with only 30 employees, Memphis Local Area Connection deals with operations and billing. In addition to this, the Memphis location has two servers only; one for operation and one billing. Two work-stations are also available which are for video conferencing, and VOIP Phone system. Also, in this workstation, there is one router and one switch. The router is used to connect to the Dallas office remotely.
The Dallas office is the largest location with 90+ employees. The location handles four applications which are Payroll, HR, Accounting, and Email. There is a total of three workstations with four servers. The first server is an email server, the second server hosts payroll, accounting, and HR applications, and the other two are one for Video conferencing and another one for VOIP system. Lastly, Dallas location is equipped with one router, two switches, and one firewall.
Key Components with the appropriate OSI Network Layer
The table below identifies the key components with the appropriate OSI network layer:
Table 1: Key components with the appropriate OSI network layer
Email
SMTP
Application Layer of the OSI model
Stand Alone Applications such as HR/Payroll/ Accounting
SET, SSL
Session Layer/Network layer/ Application Layer/ Transport Layer
VOIP
TCP/IP
Network layer/ Transport Layer
File Transfer
TCP/IP
Network layer/ Transport Layer
Video conferencing
TCP/IP
Network Layer/ Transport Layer (Kenyon, 2016)
Role and Functions of the Key Components
There three components that have been utilized and are described below:
· Router: Router is one of the networking devices which is used to forward data packets in a computer network. A router is used to perform traffic directing functions. The Dallas router is used to connect the whole organization to the wide area network. The two routers are dynamic routers which are designed to discover routes automatically.
· Firewall: One firewall has been utilized in this scenario. The major role of the firewall is to protect the organization from threats and Denial of Service type of attac.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Module name is Networks 512 As the demand for faster and .pdffreddysarabia1
Module name is Networks 512
As the demand for faster and more efficient high-performance computers grows, so do the
dimensions of the form factors that house them. Computer engineers have been tasked for years
with the difficult task of incorporating increasingly powerful computers into and onto
increasingly smaller chassis and printed circuit boards (PCBs), primarily to meet a growing
demand for more reliable, affordable, size-conscious, energy-efficient, and cost-effective
computer systems. This is why the world of embedded systems continues to see boundary-
pushing size, weight, power, and cost developments. 2.1 Use your knowledge of embedded
systems and devices to answer the question below. 2.1.1 What are embedded systems? 2.1.2
What are the various kinds of embedded systems? 2.1.3 What is the difference between soft and
hard real-time embedded systems?
device may require on both the serial and network sides of a connection. Should the device
always be connected to a specific host or PC? Is it possible that multiple hosts or network
devices will want or need to connect to the newly networked serial device? Are there any
specific requirements for an application that requires the serial device to reject a network
connection under certain conditions? The bottom line is that a server must be able to service a
wide range of application requirements while also meeting all of the demands of those
applications. Discuss how device servers are used to improve the usability of various
applications such as: Data Collection, Factory/Industrial Automation, Security Systems, Bar
Code Readers and Point-of-Sale Scanners, Medical Applications, M2M Wireless
Communication/Networking. (30)
1. An extensive telecommunications infrastructure is provided by a structured cabling system,
which is a complete system of cabling and related components. This infrastructure is used for a
variety of purposes, including phone service provision and data transmission across computer
networks. It shouldn't be hardware-reliant. A structured cabling system is further defined in
terms of ownership. At the termination of the service provider (SP), the structured cabling
system starts. The demarcation point (demarc) or network interface device is at this location
(NID). For instance, in the establishment of a telephone system, the SP provides one or more
service lines (per customer requirements). At the line of demarcation, the SP joins the service
lines. 1.1 Explain the significance of structured cabling and the advantages of structured cabling.
(10) 1.2 As a network architecture, you are tasked with designing a network for a six-story office
building, with each floor connecting 5 computers in 5 offices and having a wireless access point
to connect wireless devices. Design a network plan for the building using your knowledge of
structured cabling and various network devices, labeling all the hardware in devices and cabling.
(20)
A specialized network-based hardware device designe.
IT327-1404A-01 Implementing, Managing and Mainta.docxpriestmanmable
IT327-1404A-01 Implementing, Managing and Maintaining a Network I
Phase 1 Individual Project
Michael F. Ryan Jr.
10/14/14
Contents
Week 1: Target Organization 3
Target Organization 3
Analysis and Recommendations 3
Week 2: Transmission Control Protocol/Internet Protocol (TCP/IP) Addressing and Management 4
Week 3: Fault Tolerance Plan 5
Week 4: Security Plan 6
Week 5: Network Monitoring 7
All Weeks: Network Pro Prep Toolkit 8
Week 1: Target OrganizationTarget Organization
About Ryan Computer Enterprises
Ryan Computer Enterprises formed in 2000, and provides leading business solutions. Currently there are over 8000 employees that are located throughout five states with three locations in Pennsylvania, Florida, California, Texas and New York. The administrative office currently is located in Pennsylvania. Currently there are over 500 additional employees located in the corporate headquarters. The company provides cutting edge solutions and needs USAA, JP Morgan, Goldman Sacks and other financial institutions. In 2002, Forbes magazine rated Ryan Computer Enterprises as the number one business organization for the field of technical consultation.
Major clients of Ryan Computer Enterprises are all in the field of investment banking and insurance. Some major factors of focus for the company will be improvement of business process the clientele have set in place, legacy systems and to have a set solution in place to be utilized thought their organization. Ryan Computer Enterprises has stated that our goal is align both the company and client goals.
Ryan Computer Enterprises has slowly replaced existing infrastructure over the years focusing on workstation, printer, switch and routers. Some areas of interest that go beyond the physical infrastructure are application upgrades. The applications that are in questions for upgrades are DBMS and other various apps such as Office 365. It has been over 2 years since the last upgrade to the IT system has been conducted and in order to provide better security and stability it has been decided that specific facets that have been listed must be upgraded as well as servers and the use of cloud technology must be implemented to allow for virtual storage of information. Other technology that should be visited is the addition of WAPs through out the facilities this allows the vendors and employees to use their mobile devices and other wireless items as well as the clientele.
The last item for discussion that will be addressed as an upgrade will be the addition of remote access. Having VPN capabilities allows Ryan Computer Enterprises to better facilitate troubleshooting and adds to the functionality of its employees. All email services as well as server access allow an employee to better assist with technical work as well as giving the clients the ability to conduct business wherever they might be located.
Metrics that are used to identify some of the issues are based on multiple factors but some ...
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxericbrooks84875
WWTC Office Layout Diagram.html
Background Information for World-Wide Trading Company
World-Wide Trading (WWTC) is a large online broker firm in the Hong Kong. The trading company has a staff of 9,000 who are scattered around the globe. Due to aggressive growth in business, they want to establish a regional office in New York City. They leased the entire floor of a building on Wall Street. You were hired as the director of the IT Department. The President of the company asked you to set up the state of the art network by December 15, 2013. He shared with you the organizational structure and a list of the staff. You hired a consultant to test the network infrastructure and power requirement at WWTC office space. The consultant reported that the network infrastructure is solid and gigabit network can be set up on existing network wiring. Also, the existing power supply will meet their current and future demand. The President has reiterated these business goals.
Business and Technical Goals
· Increaserevenue from 10 billion to 40 billion by the year 2015
· Reduce the operating cost from 30 to 15 percent by the year 2015 by using an automated system for buying and selling.
· Provide secure means of customer purchase and payment over Internet.
· Allow employee to attach their notebook computers to the WWTC network and Internet services.
· Provide state of the art VoIP and Data Network
· Provide faster Network services
· Provide fast and secure wireless services in the lobby and two large conference rooms (100x60)
On the basis of these business goals, you prepared a RFP to solicit a proposal for designing and implementing a fast, reliable and secure network.
The purpose of this Request for Proposal is to solicit from qualified vendors proposals for a
secure and fast network to ensure proper operation of the network.
To prepare a design for a state of the art network at the Wall Street location of World-Wide Trading.
Propose a Network design that solves the current security audit problems (see security sections), to meet business and technical goals.
Provide a modular, scalable and network.
Provide redundancy at building core layer and building distribution layer and access layer and at workstation level to avoid failure at one point. For Building Access layer provide redundant uplinks connection to Building Distribution layer.
Select appropriate Cisco switch model for each part of your enterprise campus model design from the Cisco Products Link, listed below and use the following assumptions in your selection process.
Selecting the Access layers switches:
0. Provide one port to each device
0. Make provision for 100% growth
Server farm switches
· Assume 6 NIC cards in each server and one NIC card uses one port of switch
· Dual processors and dual power supply
Propose an IP addressing redesign that optimizes IP addressing and IP routing (including the use of route summarization). Provide migration provision to IPv6 protocol in fut.
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxpicklesvalery
Supportive Security Policies in SOHO
Topic: SUPPORTIVE SECURITY POLICIES IN SOHO
NETWORKING
It is a supportive system of sharing information and services among individuals and groups having a common interest.
A local-area network (LAN) is basically defined as two or more computers connected by a structured wire system for the purpose of sharing resources and files. In this chapter we will explain the various ‘structured wire systems’ that the Network Engineer will deal with during the course of their job. Wireless LANs are becoming more and more popular, but even these devices rely on some amount of physical wires in most cases.
REQUIREMENTS
Network Adapter
A computer needs a network adapter to connect to a network. It converts computer data into electronic signals. It listens for silence on the network cable and applies the data to it when it has an opportunity. The network access element of its job is called Media Access Control, or MAC. The physical address of every computer on a network is called its MAC address. The MAC address is the network adapter's serial number. Most computers are shipped with the network adapter integrated into the motherboard. However, early PCs didn't include this function and computer owners had to buy it separately and fit it into an expansion slot on the motherboard. These were called "network cards" because they were sold on a separate card. Although network adapters are now integrated, the name network card is still used. The wireless equivalent is called a Wireless Network Interface Controller.
Network Medium
Wired networks need cable. The most common form of cable used in networks is called the "Unshielded Twisted Pair." In PC shops, it is generally just referred to as "network cable" or "Ethernet cable." Ethernet is the most widely implemented set of standards for the physical properties of networks. UTP is so closely identified with Ethernet that it is often given that name. Other cable types used for networks are twin-axial, Shielded Twisted Pair and single-mode and multi-mode fiber optic cable. Wireless networks don't need cable; they send data on radio waves generated by the WNIC.
Cable Connectors
In wired networks, the most common form of connector is the RJ45. Every computer with networking capabilities has an RJ45 port. This is sometimes called a "network port" or an "Ethernet port." The RJ45 plug looks like a slightly larger telephone plug and connects the Unshielded Twisted Pair or the Shielded Twisted Pair cable.
Power Supply
Both wired and wireless networks need a power supply. A wireless network uses the current to generate radio waves. A cabled network sends data interpreted as an electronic pulse.
Hub/Switch/Router
In wired networks, one computer cannot connect to many others without some form of splitter. A hub is little more than a splitter. It repeats any signals coming into one of its ports out onto all its other ports. A cable leads from each port to one computer. A switch ...
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
1. Network Design Project for Florida Association of Nonprofits
Introduction to Networks & Telecommunications
LIS 4482
December 4, 2020
Burton Boyd, Jennifer Nichols, Austen Willingham, Peter Cummings
2. Executive Summary
The Florida Association of Nonprofits (FANO) would like a cost effective way to
connect their organization throughout the building. The number of core employees is thirteen,
however, they have quite a few volunteers that come in to help out and utilize office space. The
leasing company offered them some older computers that they would like to integrate into their
system. They would like to have the network and every computer set up based on the varying
departments within their organization. The offices they have leased are on two floors of the same
building and they are requiring us to install the appropriate technologies so the entire
organization is connected seamlessly.
The Florida Association of Nonprofits mission is to enhance the well-being of all people
in the communities of Florida by building the capacity of the nonprofit sector. Florida Nonprofits
assist Florida’s more than 50,000 charities to reach their mission by strengthening their
leadership, management, financial, and public policy capacity. Their team consists of one
President CEO, and twelve full time staff with extra space needed for the myriad of volunteers
needed to help run their organization. The space required to house their servers needs to be fairly
large to support their website, email and data.
They have asked that their communication between offices and floors be stream-lined.
They would like their mail server housed within their office complex for the convenience of
connecting with each other and their clients. They also host a website from their server with
internet access so the public can view their mission and explore their organization.
Written Description
The facility will house the minimum requirements needed to efficiently produce the
expected amount of data transfer and quality connection to outside resources. This will include
3. the Cat 5e cabling to provide efficient and reliable data transfer to the network systems. We will
be housing everything internally such as the web server, mail server, database server, application
server, FTP server, and print server for the site. Routers and switches will be set up in the server
room with the rest of the main hardware for the network.
The network we will be building consists of three different subnets. The DMZ subnet will
be behind the external firewall with the other two subnets behind the internal firewall to help
protect them from outside harm that can come from the Internet. One subnet will be used
internally for the servers that house storage, printer management, and application hosting. The
other internal subnet houses the workstation of the organization’s employees. There will be a
system administrator that would be in charge of managing the three switches in the building, the
two routers and the two physical firewalls. (Please, refer to Appendix A to view the physical
network created.)
The distribution of the computers, monitors, routers, switches, servers, and firewalls are
shown in the Appendix A layout for the first and fifth floors. Printers are connected through the
print server throughout the building and everything else is physically connected to the network.
Data must pass through the firewalls in order to get to certain parts of the network. Cat5e cable
connects all of the devices with each other making the physical network.
The logical view of the network is shown in Appendix B. Here it shows the type of
devices in the network along with their correlating IP addresses. The demarcation point is
located on the first floor in a room labeled “demarc point”. The diagram shows what the devices
may look like in real life and includes the connection between them. The network has a
hierarchical outline that depicts the flow. The Internet is at the top of the diagram and can
connect to any user around the world. It flows down through the firewalls and goes further into
4. the network as the connection goes along. The inner parts of the network are more vulnerable so
they need to be protected more than other parts of the network.
The breakdown of the costs to setting up the network from ground up are shown in
Appendix C. The majority of the costs for setting up this network will be covered by FANO,
although some of the computers and monitors were donated to them. Here you can see the
breakdown of all the devices, hardware and software needed to operate the network efficiently.
The grand total of the project comes to just under $87,000. This is currently only an estimate for
the cost of the project.
Network Policies
1.
In non-profit networks there are several network protocols that are used. These network
protocols are utilized to ensure rules are fulfilled for the data to transfer properly. As an example,
a Simple Mail Transfer Protocol (SMTP) is a protocol designed to transfer emails between
systems. A client using SMTP can send emails and also recieve notifications from another client.
The protocol is located on port 25 aboard the server and it can emanate to each port within the
computers in the network. Also, we have Post Office Protocol (POP3), which is a protocol
designed to retrieve and hold an individual’s mail by their internet server.
2.
The extended network policies we are implementing include web server monitoring to
maintain security by denying access to specific websites. This will ensure that we maintain the
utmost secure environment, and this access list will also deny use of bandwidth heavy sites to
further improve network connectivity.
5. Security Policies
Florida Association of Nonprofits prides itself on its ability to work with a vast amount of
non-profits within the state. Because of this organizations work with a vast group of non-profit
organizations the need for security is of the utmost importance when working with these
organizations. With this information in mind, this organization will follow a policy of least
access, which means that users will be segmented from each different zone of the network to
ensure a more secure allocation of resources. They will also be implementing a two factor
authentication on all desktops and devices connected to the network.
DisasterRecovery Policy
The disaster recovery policy for FANO’s network is having separate cold sites for
emergency services. This will allow the company operations to continue in the case of a cyber
attack or a natural disaster. The storage will be backed up nightly to an offsite location, so if the
servers get destroyed for any reason, FANO will have the ability to recover quickly.
All of our servers will also be connected to a generator to allow ample time to backup
data to another storage facility or to the cloud servers. There will be two UPS units; one will
backup the other incase one runs out of power before the backup generator powers up. All forty-
five computers and the printers will be plugged into surge protectors which will be plugged into
the electrical outlet in the walls.
Budget
6. The budget for FANO encapsulated in Appendix C: Bill of Materials. Along with the materials
purchased, there were eighteen desktop computers left behind by the previous tenant that the
leasing company has graciously given FANO. We wiped their harddrives with DBAN to ensure
the security and integrity of the new network system. In addition to the desktop computers, there
were 9 LCD monitors that were kept to lower the cost to FANO. By hosting their own web
servers and email servers we were able to cut the costs down of having a third party monitor and
secure their network. The planned implementation of security throughout the network allows us
to spread the security to our web and email servers to protect them, as well. By purchasing larger
hardware than is needed for FANO currently, it allows room to expand in the future without
having to upgrade their systems or hardware to meet FANO’s growing needs.
Appendix A: Physical Network Diagram
Displayed below is our physical network diagram...
9. Appendix C: Bill of Materials
The Bill of Materials for this network…
10. Item Quantity
Price by
Unit
Total
Storage Server (8 drives,
2TB Each)
1 Areca ARC-4038X 80TB 8-Bay
RAID Array (8 x 10TB) with PCIe
RAID controller NAS Server
$6,699.00
$6,699.00
DNS Server 1 Areca ARC-4038X 80TB 8-Bay
RAID Array (8 x 10TB) with PCIe
RAID controller NAS Server
$6,699.00 $6,699.00
Web Hosting Server 1 Areca ARC-4038X 80TB 8-Bay
RAID Array (8 x 10TB) with PCIe
RAID controller NAS Server
$6,699.00 $6,699.00
Email Hosting Server 1 Areca ARC-4038X 80TB 8-Bay
RAID Array (8 x 10TB) with PCIe
RAID controller NAS Server
$6,699.00 $6,699.00
Application Server 1 Areca ARC-4038X 80TB 8-Bay
RAID Array (8 x 10TB) with PCIe
RAID controller NAS Server
$6,699.00 $6,699.00
Print Server 1 Areca ARC-4038X 80TB 8-Bay
RAID Array (8 x 10TB) with PCIe
RAID controller NAS Server
$6,699.00 $6,699.00
FTP Server 1 Areca ARC-4038X 80TB 8-Bay
RAID Array (8 x 10TB) with PCIe
RAID controller NAS Server
$6,699.00
$6,699.000
11. Switch 3 NETGEAR ProSAFE Plus Switch - 8
Ethernet Ports
$64.99
$194.97
Router 2 Ubiquiti ERLite-3 Edgemax
EdgeRouter Lite-3 3x Gigabit LAN
Ports
$95.99
$191.98
Firewall 2 CISCO ASA 5505 Other Firewall $355.99
$711.98
Computers 32 Dell Towers (With Contract) $750.00
$24,000
Monitors 36 Dell Monitors (With Contract) $40.00
$1440.00
CAT 5E Cable 500 ft. $34.11
$34.11
Microsoft Office Business
Premium
Office 365 for 45 Users for a Year $15.00/User
$675.00
DBAN DBAN Software
FREE FREE
Windows 10 45 Microsoft Windows 10 Pro $199.00
$8,995.00
Web Server Software (Comes with Windows 7 Professional)
FREE FREE
Air Conditioning Unit Industrial Portable Air Conditioner w/
Heat,
1.5 Ton 16,800BTU Cool, 18,500BTU
Heat, 115V
$3,750.00
$3,750.00
12. Server Rack 3 Middle Atlantic Solid Security Door
SSDR- 8
$106.50 $319.50
Komodo Edit Komodo IDE
FREE
FREE
TOTAL = $86,846.04
13. References
Lastname, C. (2008). Title of the source without caps except Proper Nouns or: First word
after colon. The Journal or Publication Italicized and Capped, Vol#(Issue#), Page
numbers.
Lastname, O. (2010). Online journal using DOI or digital object identifier. Main Online
Journal Name, Vol#(Issue#), 159-192. doi: 10.1000/182
Lastname, W. (2009). If there is no DOI use the URL of the main website referenced.
Article Without DOI Reference, Vol#(Issue#), 166-212. Retrieved from
http://www.example.com