Networking Technologies Needed To Connect Offices Computer Science Essay

Published:

ABSTRACT

ELECTRONSRUS company business is good and they decided to expand their business by moving to a new building site which is 5 miles away from the existing old office site. So it requires a design and develops a detailed report which provides and gives the necessary networking technologies which should be deployed for this company which makes it to very high standard and performance based company using the new IT infrastructure linking the old office to support their customers. By keeping in mind the plan sheet of the building premises, core idea, requirements, complete list of the operations and the needs of the company. Every network architecture design must be carried out in three stages namely Research, Testing and Implementation.

INTRODUCTION

In order to design and develop a detail report, first we have to do the complete research study on the given plan sheet of the building which will help us to design a network model by selecting the suitable network technology, hardware, software and network management needs based on the basic of the requirements of the client. The detail explanation of the network design of the each individual department of the company and explained below and the research is carried in such a way by keeping in view that the company would be expanding further in future. After the research study the network design is made and we should carry out various types of tests on the design using normal network testing methods, the testing should be done with heavy loads of data by using large number of clients with which the design implementation will become easy. Once after the testing stage, the network design must implement on the real environment site and test it with number of ways for any real time errors before the actual implementation of the design.

I. REQUIREMENTS ANALYSIS

Lady using a tablet
Lady using a tablet

Professional

Essay Writers

Lady Using Tablet

Get your grade
or your money back

using our Essay Writing Service!

Essay Writing Service

The overall site consists of four buildings namely Admin Office, Design Office, Store Building and Manufacturing Plant. Printers on each floor and each building are implemented for general printing purpose.

ADMIN OFFICE:

First floor 60 staff members we need 60 hosts. For the further future expansion of the company, we require modular switch device for connecting all hosts which can be upgraded. There is a need for internet on this floor and the bandwidth of the internet would be low for this department. It is better to provide wireless internet access on this floor because the work of the department is dealing with the customers and guests and they can easily connect to the internet.

The middle floor HR and purchasing department 60 staff 60 hosts. On this floor we will install a separate backup server because data on this floor has to be backed up efficiently. This is the floor that to be connected with the old building and the link is established with the configuration of switch over the WAN.

Ground floor IT department 60 members 60 hosts. A printer and a wireless access point are implemented on this floor. As it is IT department, it is suggested that the data centre and the entire server is setup on this floor for easy monitoring and maintenance.

DESIGN OFFICE:

Design office has two floors with150 design engineers and 75 sales and marketing people. These people work on huge set of files and needs to backup these data files regularly, so complete dedicated backup server is required. High configuration hosts are required because of high level applications which need high processor speed and RAM memory for easy processing. Sales and marketing needs 75 hosts with normal configuration. Here Cisco modulars switch with 2 VALN's is used, one for design department and other for sales and marketing. It is connected directly to data server in the admin office which avoids network flow blockages at peak times.

STORES BUILDING:

Stores building have four floors with an average of 5 staff members per floor. Since the work is less and not much data exchange between them, so backup is carried on by Admin office server to reduce cost of design.

MANUFACTURING PLANT:

Manufacturing plant is single floor building with 120 production operatives working on heavy electrical cutting machines and arc welders. The building consists of manufacturing, testing and the area manager office. 4-5 hosts for both the manufacturing and testing unit which might not operative all the time. Each of the area managers is associated with a host port. In this building, a single switch is implemented with wireless access point to connect to the internet.

EXTERNAL ACCESS:

Lady using a tablet
Lady using a tablet

Comprehensive

Writing Services

Lady Using Tablet

Plagiarism-free
Always on Time

Marked to Standard

Order Now

The design provides general internet access to all staff members and clients of the company. For efficient business deals, the manager should be in a position to access some important data from the office server from a clients place or even if when they are remote from the site. Access to the company intranet for sales and marketing staff is provided. For protecting the data and the IP addresses, access control lists can be implemented. When the staffs are remote from the site, access to the company intranet is provided by using virtual private network (VPN). Generally VPN are installed to provide the remote access to a secure organization network and it is preferred over the normal large distance leased telephone lines due to its high cost. The access to the old site and the access from the old site to the new site intranet are provided by using the fiber optics remote access method for the fast data transfer rate.

II. NETWORK TOPOLOGY

Network topology is defined as physical and logical inter connection of nodes, links and various peripheral devices. It is physical layout of the connected devices. Various types of network topologies can be designed based on number of hosts, data transfer speed, bandwidth and network usage.

Types of Network Topologies:

Bus Topology:

Bus networks are the most basic form and it serves as the backbone of the topologies. It is a simple topology which uses a single cable to connect the host for the communication. It is easy to implement and it is the cheapest which is generally used for Ethernet networks.

Ring Topology:

In ring topology, each and every device is surrounded by two devices. In this topology, the messages are broadcasted only in one direction either clockwise or anti-clockwise and it as no starting or ending point.

Mesh Topology:

Each of the hosts in the network are interconnected to one another. So transmissions are distributed, no failure even if anyone of the connection goes down. It allows a large number of hosts to be connected and is typically used for large networks.

Star Topology:

A star network consists of a centralized device to which all other devices are connected. Adding new devises is simple. It is easy to implement and cable faults are independent to the network failure. It is easy to mix with other topologies [1].

Fig 1. Representation of all topologies

TABLE I

COMPARISION OF ALL TOPOLOGIES

Topology

Installation

Maintenance

Cost

Work

Bandwidth

Reliability

BUS

Simple

Moderate

Low

Moderate

Average

Moderate

Ring

Simple

Low

Low

Moderate

Low

Moderate

Mesh

Complex

High

High

Good

High

High

Star

Easy

High

Low

Excellent

High

Excellent

After examining the above comparison table of topologies, it is easy to judge that star topology is the best among all other topologies in all categories of comparison.

Therefore for the company intranet implementation it is better to use star topology. In this star topology, for the centre connection point a hub, switch or access point is used. The main reason for using this topology is

Less cabling

No network break down if anyone of the cable fails and

offers high bandwidth.

In this network topology, we use unshielded twisted pair ethernet (UTP) or a shielded UTP. For connecting all the departments to the switches in the data centre we will use fiber optics cable.

Physical and logical topology of the network:

The topology consists of a distribution server with fire wall and all the buildings are connected to this server. It also consists of two routers, one for old building and other for new building which are connected with the serial cable to the distribution switch. It also consists of two other servers in admin building and the design building, four access points, three Cisco catalyst switches, two Cisco modular switches and printers.

Lady using a tablet
Lady using a tablet

This Essay is

a Student's Work

Lady Using Tablet

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Examples of our work

Fig 2. Representation o the ELECTRONSRUS stat network topology design

III. HARDWARE

Cisco UCS C250 M1 Blade Server:

Cisco UCS C250 M1 Blade Server is a high performance, memory-intensive, two-socket, 2 RU rack-mount server. It is designed to increase performance and capacity for demanding virtualization and large data set workloads including data management systems, modelling and simulation application. It will also reduce the cost of smaller memory footprints. It is build for virtualized workloads in enterprise data centres, service provider environments and virtual desktop hosting.

The main features of this server are as follows:

Up to 8 internal small for factor (SFF), SAS, SATA drivers up to 4 TB total

Four integrated Gb Ethernet ports and two 10/100 Mbps Ethernet management ports

Front and back panel interface with video, two USB and service ports

Increased reliability, availability, and serviceability through optional dual-redundant power supplies and front panel-accessible hot-swap cooling fans

Cisco 3845 integrated services Router:

This router is used as the default gateway for connecting the old building and providing the internet to the new site. The Cisco 3845 integrated services router provides the following support:

Wired-speed performance for concurrent services such as security and voice, and advance services at full T3/E3 rate

Increased density through high-speed four WAN interface card slots

Support for majority of existing AIM, NM, WIC and VIC

Integrated GE ports with copper and fiber support

Support of on-board encryption security and support of up to 2500 VPN tunnels with the ACM-HP/1-PLUS modules

Antivirus defence support through Network Ad control (NAC)

Intrusion prevention as well as stateful Cisco ISO firewall support

Cisco Catalyst 4507R Switch:

This switch is used to connect all the buildings. It is a cost-effective modular switch which delivers a high performance, high secure and mobile user experience for enterprise. The main features include collaboration, operational efficiency, security, resiliency investment protection and energy wise with a focus on lowering the total cost of ownership.

Seven total Number of Slots and two Supervisor Engine Slots with Supervisor Engine II-Plus, II-Plus-10GE,IV, V, V- 10GE, and 6-E for Redundancy.

Line Card Slots: 5 Supply Bays: 2 Fan Tray Bays: 1

Location of 19-inch Rack-Mount2 and Location of 23-inch Rack-Mount is front

Cisco Catalyst 2975 Series Switch:

It is stackable, fixed-configuration, intelligent ethernet switch with Power over Ethernet (PoE) and Gigabyte Ethernet connectivity. It is used to connect all the hosts in the floor.

The main features of the Cisco Catalyst 2975 Series Switch are as follows:

Integrated security, including network admission control (NAC)

Enhanced quality of service (QoS)

Resilience to deliver intelligent services for the network edge

Eight 10/100/1000 PoE ports and four small form factor (SFP) pluggable uplinks

High speed stacking for up to 9 switches

Cisco 521 wireless express Access point:

The Cisco 521 wireless express access point is a single-band 802.11g access point ideal for the small or medium sized businesses.

The main features of Cisco 521 wireless express Access point are as follows:

Standards-based, enterprise-class security

Exceptional range and productivity

Simultaneous air monitoring and traffic delivery

Simplified management with the Cisco configuration assistant

Dell Precision T7500 workstation :

The workstations for the design engineering staff must be of high configuration as they will work on huge data file which require high configuration processors. So, only for the design engineering workstation we will use Dell Precision T7500 workstation. It is designed for maximum performance and scalability on large data sets and complex multi-threaded applications.

The features of Dell Precision T7500 workstation are as follows:

It is with next generation Intel Xeon X5500

Massive memory scalability up to 192 Gb of DDR3 registered ECC memory

Dual native PCle X16 graphics slots for outstanding graphics performance

Up to 8 Mb of shared cache

It uses Intel 5520 chipset

Dell Inspiron 546 workstation:

For all other workstation we need a normal configuration hosts because the work done on these workstation are less. So, for the remaining workstations we will use Dell Inspiron 546 workstations.

The main features of Dell Inspiron 546 workstation are as follows:

It uses ADM Athlon II X2 240 processor with 2.8 GHz speed and 2 Mb cache

2 Gb dual channel DDR2, SDRAM at 800 MHz-2 DIMMS

160 Gb serial ATA hard drive (7200 RPM) with data burst cache

Expandable PCL slots

McAfee Unified Threat Management (UTM) Firewall:

It is the integrated multi function network security appliance for small and medium scale businesses. It protects against known and unknown threats using intrusion prevention, firewall and VPN's.

Benefits and features of UTM are as follows:

Create a secure distributed enterprise

Leverage a scalable VPN appliance

Centralize firewall management

Gain flexibility of deployment

Intrusion detection and threat mitigation

RH45 and Fiber Optics cables:

For connecting the workstations and devices in the entire network RJ45 patch cables are used as it is advantageous for high density installation. And for connecting the old site we use fiber optics cable from router to the switch for high speed data transfer. Media convertors such as FC, ST, and SC are used for connecting the fiber optics to the terminal equipment.

IV. SOFTWARES

On the backup server and proxy server use Windows Server 2008 for the standard and professional usage.

For all the workstations use Windows XP Professional as it support each and every software and hardware than in any other operating system.

All the Cisco components use the Cisco IOS software which is the world's premier network infrastructure software and these devices are already inbuilt with the essential security software.

On all the workstations use the latest full version of McAfee Total Protection system security as an anti-virus program.

Finally for the design engineering workstations use fully licensed latest versions of Auto-CAD, Photoshop CS and other clients' application specific software's.

V. INTERNET CONNECTION

For each and every department there is the need to access internet. On a whole there are about 450 hosts which need internet connection. There is generally a lot of data transfer from one department to the other department which are must. So, in order to achieve all these requirements it is better to go for a leased British Telecom (BT) internet line connection with a speed of 40-50 Mbps is perfect requirement form this intranet.

VI. REMOTE ACCESS FOR REPRESENTATIVES AND TO EXISTING OFFICE

In a particular time, the company representatives are on a go or always on field meeting for business proposals with clients and want to access any important data from the company server. So, to connecting the remote access for the representatives from the client field we configure VPN based services on the staff laptops. This configuration must be always secure with the various access schemas for the data protection.

As the offices is shifted to the new site, there is a need to connect with the old site where lots of information is still stored there and the data need to be accessed on the new site for the business propose. In order to achieve this, use the Ethernet Private Circuit connection provided by the BT for the exchange of data through the internet between the two sites.

VII. SECURITY

Use Access control list (ACL) on the router for the security purpose such as gaining the unauthorized access to the network and it is based on the number of t he staff.

Use confidential access key for the wireless access points so that any unauthorized used cannot use it.

For the VPN, use the encryption of authentication and traffic through the network for protecting the data which is transferred over the air.

All the servers must be secured as they must be backed up every time not to lose any data.

On all the workstations use the latest and full version anti-virus program and internet security program for security.

The entire network must be monitored by the IT department for detecting any unauthorized activates in the network and to find any break downs on the network.

VIII. NETWORK MANAGEMENT

Network management is defined as a service which consists of various types of tools, devices and application to help the human network manger in monitoring and maintaining the networks. It refers to the methods, tools, procedures and activates that are associated to the maintenance, provisioning, operation and administration of the networked systems. It will monitor the network to find the faults, keep track the resources and how they are assigned with the network. It is concerned with the performing upgrades and repairs, deals with the resource configuration to support a given task.

Cisco Works Campus Manager:

In this we will use a Cisco Works Campus Manager as the network management tool and the main features of this are as follows:

User tracking and end-host tracking with dynamic updating capability

Discrepancy and best practices reporting

Topology services

Complete VLAN, private VLAN (PVLAN), and VLAN Trunking Protocol (VTP) management

Spanning-tree management and visualization

Path analysis