StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Infrastructure Improvement - Case Study Example

Cite this document
Summary
This analysis "Network Infrastructure Improvement" tries to provide a permanent and sustainable solution to technological improvements of the DoD by first analyzing the existing IT and telecom applications and services, the network architecture, the existing business needs…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful

Extract of sample "Network Infrastructure Improvement"

Running Header: Network infrastructure improvement Customer Inserts His/her Name Customer Inserts Grade Course Customer Inserts Tutor’s Name 25, 11, 2013 Introduction In the business world, technologies provide competitive advantage if timely adopted and deployed. Technologies help in reducing inefficiencies and closing gaps that increase business cost. In the DoD, technologies are employed in order to maintain secure communication in various places. This is important for national security. Despite the need to maintain the latest technologies, the DoD is unable to match with this need because of the budget restriction, a factor that is forcing it to work with available technologies which have been used for a while. This analysis tries to provide a permanent and sustainable solution to technological improvements of the DoD by first analyzing the existing IT and telecom applications and services, the network architecture, the existing business needs and recommended changes in the network with budget constrain consideration. Description of the current major IT and Telecom applications and services used by the DoD According to Ghosh (2002, p.74) the current network infrastructure of the DoD is isolated from the public ATM network infrastructure. Internally the DoD maintains four may separate and isolated networks which are used to carry Top Secret, Secret, Confidential and unclassified traffic. Maintaining a separate and isolated network is expensive. Despite the public ATM being viewed as not secure, continued user of isolated network is increasingly prohibitive to the DoD. The inability of the DoD to utilize the public network is running counter to the current atmosphere of dual use and economies of scale. The internal network is also subject to possible network intrusions, there is a possibility of external intrusion through physical network interruption, hacking of the network infrastructure (Wong, 2009). The DoD employs the Time-division Multiplexing (TDM) technology as a dominant method of data transfer. The TDM is accomplished by compressing multiple data streams to a single signal which is done by separating the signal into many segments, with each having a very short duration (time burst). At the receiving end, each data stream is reassembled based on the timing. At the source, the main communication link component is referred to as a multiplexer. It is responsible for combining all the base signal bands from different users in order to be transmitted in one channel (Wong, 2009). At the end, the receiver contains a demultiplexer which essentially does the opposite of the multiplexer, it breaks down the single conglomerate signal into many and separate base band signals for each receiver to have their respective data/information meant for them. The pentagon uses this traditional means of signal transmission because it is secure, flexible, cost effective and easy to accomplish within an isolated network infrastructure. It is flexible in the sense that the bandwidth usage can be regulated and optimized at the same time. In fact, the internet employs the TDM (Awuku & Anim, 2012). The DoD also employs fiber option backbones and also connects to different areas via fiber option because of the fiber’s security and speed of data transfer. The DoD employs Wavelength Division Multiplexing (WDM) as its fiber technology, the rationale for the WDM is to enhance data transfer in the fiber between two nodes or links. WDM is capable of both voice and data transfer since the multiplexing is done on the signal wavelength. WDM also facilitates transport via IP, SONET/SDH and ATM with speeds of up to 40Mbs. Network architecture of the DoD Typical network architecture of the DoD looks like the diagram below, the connection to different areas is isolated. The connection is via T1/E1 connection (1 T1/E1 will typically carry 2.0 Mb of data per second), TDM can rides over IP and areas with ISDN also rides over IP. IP allows easy information routing different networks within the Metropolitan Network Area. Every station, the Pentagon in DC, Mark center in Alexandria Va, NGA headquarters, in Springfield VA and DIA. Logically, the router allows routing of information from one area to the other, there is a firewall working with the router in order to filter unwanted network packets or intrusion into the network by unknown or unrecognized users. The packetBank-TDM is essentially a circuit switched technology (Awuku & Anim, 2012). The TDM standards for Time Division Multiplexing, which essentially allows wide communication through burst of time frame allocated to every user in order to optimize the existing bandwidth. The TDM connects to the PBX; the PBX allows communication (Voice) with users within the premises. The LAN of the four areas is essentially made of Ethernet switches, with connection via Ethernet cables (Cat 5). The LANs are created physically to allow resource sharing such as connection to printers and databases. Within the premises, physical network is preferred because of the security concerns. The servers are also located in all the areas, with the Pentagon containing most of these servers. The four regional offices can share files stored in databases and services equally with credentials and log in details required every time an individual logs in to the network. For the purposes of enhanced security, the DoD has enabled facial and finger log in to areas categorized as sensitive (Iniewski, McCrosky & Minoli, 2008). These technologies are also monitored for security and management purposes remotely as shown in the diagram below. The internal network of the DoD links to the Public Switched Network (PSTN) via a secure and monitored router connection. Current IT vs business needs Technology is dynamic and improves frequently as new ways of handling data and voice flock the market. Despite this, it is not economical to be adapting all the new technologies because they come with an additional cost. Most businesses analyze the value of the technology before adapting it for internal and external usage. Technology that brings competitive advantage is welcomed while those that only add expenses and are done in order to keep at par with other players in the industry as expenses. For the DoD, it is evident that its technologies as old and need integration of other helpful new technologies, this is however a challenge because of the budget constrain that the DoD is facing (Awuku & Anim, 2012). Limited budget calls for better strategies of managing technological issues. It limits the technologies that can be adapted to the existing network infrastructure. In order to do this, there is one transformational change that would be the most appropriate in addressing the evident DoD issues. This transformational change would be to use the existing infrastructure and improve on it with alternative technologies that would improve communication process internally within the MAN and outside. This is the most preferred and the most inexpensive approach that would benefit the DoD with its limited budget. In fact, technologies normally grow out of the existing network infrastructure because of the cost implication of a new infrastructure, this is the easiest approach. The same would be recommended for the DoD. The DoD will therefore analyze the existing network infrastructure, especially the techniques employed in data transmission, both voice and data in order to recommend economical ways of enhancing data transmission with regard to the existing needs of the users. Based on the available budget, the DoD can benefit from a number of technologies which are already in use in the market (Wong, 2009). Recommended changes in the current network While the DoD network security and confidentiality is imperative, adaptation of new technologies is also necessary and unavoidable. The security of the U.S. is as important as sustainable food programs. The rationale for this is because one cannot exist without the other. There must be security assurance before people can settle to feast. The current over-dependence on the TDM is not sustainable especially when efficiency and easy information transfer from one point to the other is considered. The DoD must upgrade its network and telecommunications in order to keep at par with the evolving technology (Awuku & Anim, 2012). One of the ways of accomplishing this is by taking advantage of the existing TDM infrastructure by integrating VoIP technologies throughout its major offices in the country. Connecting the existing TDM PBX through a T1/E1 link with the assistance of the AudioCodecs Mediant Gateway will be important in integrating new technologies into the existing TDM network, the rationale for this recommendation is basically based on the evident budget restriction of the DoD. By only having AudioCodecs Mediant Gateway, the entire region can have VoIP capability with almost negligible cost. It is worthwile to note that in limited budget constrain demands the usage of the available network infrastructure, by riding on IP network over the existing TDM infrastructure would be highly welcomed solely because of the cost convenience. The exisitng TDM links to the PSTN which offers a wider variables to the VoIP recommended (Wong, 2009). The other recommendation that is by far sophisticated but also equivalently essential to the DoD is the concept of Mixed-network use, wherein the DoD network infrastructure and the public network infrastructure will be coalesced into a single unified network which will be responsible for all the four types of traffic, securely and efficiently without network compromise. In this scenario, all the links common to the DoD as well as the public network will be recognized as joint-use. The only implementation that will involve the DoD is the jurisdiction by the military for solely the purpose of protection (Awuku & Anim, 2012). The concept of mixed use is as a result of the user-level security on demand principle, a fundamental of the security framework as well as the basic characteristic of the ATM networks. In order to fully appreciate this concept, it is worth to analyze the current DoD network infrastructure, the secure DoD network is essentially categorized into three network constituents, the Top Secret, Secret and Confidential levels of classification. There exist the risk of misrouting problem in the existing network, there is a challenge of a possible interception of classified data by unauthorized parties and possibilities of unauthorized encryption devices exist, malicious disruption of secured network resources by means of disruption of protected network resources also exist. There is a possibility of denial through software viruses and bombs. Integrating the DoD classified traffic with public unclassified traffic will pose a risk but such integration can work if effective measures to secure the information is enhanced. Such integration will demand a joint-use nodes and links that are common to both networks in order to protect their asset security. The military can secure the communication channel used for both public and military communication (Rouskas, 2009). As evident, the DoD employs WDM as its core fiber technology, this can be enhanced by replacing this technology with a more effective one, Dense Wavelength Division Multiplexing (DWDM). DWDM essentially works by combining and transmitting a number of signals at the same time but at varying wavelengths on the same fiber. This technology allows a single fiber to be transformed into multiple virtual fibers in order to allow increased traffic carriage. As an example, if eight OC-48 signals are multiplexed in a single fiber, the resulting carrying capacity of 2.5Gb/s would be increased to 20Gb/s. The DWDM is also able to transform a single fiber to transmit data at speeds up to 400Gb/s. The main advantage of the DWDM is its protocol and its independent bit-rate. DWDM also allows transmission of data in SONE/SDH, IP, ATM and Ethernet. From a QoS point of view, DWDM based networks is economical of responding to traffic needs as well as protocol alterations (Iniewski, McCrosky & Minoli, 2008). DWDM is therefore recommended for backbone fiber-based traffic of the DoD because it is economical but more effective as compared to the WDM technology currently employed. The cost of adapting DWDM is lesser than $20,000 but the resulting traffic increase will be unparalleled as this is the latest fiber technology that is transforming the way signals are being transmitted in fiber optic. In a mixed network, a multiplexer and demultiplexer will be employed at the source and at the destination respectively in order to secure information meant for the DoD. Addition of AudioCodecs Mediant Gateway will cost less than $100,000 and usage of public ATM will cost $50,000. Summary of the results and findings As evident, the current network infrastructure of the DoD is isolated from the public ATM. It is mainly made of four distinct and separate networks, Top Secret, Secret, Confidential and unclassified traffic. Running an independent network is expensive and is increasingly prohibitive to the DoD. Utilizing the public network will save on the cost despite the risk of network intrusion. The internal separate network is also not as secure as it is supposed to be. The DoD also uses TDM as a main method of data transfer. TDM is an important technology and it helps in carrying multiple signals from one point to the other. The WDM employed in the fiber backbone is also playing an important role in enhancing the speeds of data transfer from one point to the other. The DoD network architecture is mainly composed of T1/E1 links responsible for data transmission from one place to the other. TDM rides over IP and ISDN also rides over IP. A router is used to link the four separate headquarters. The current DoD infrastructure demands changes that are economical since it is bound by the budgetary constraints which are limiting it in acquisition of new technologies and even adoption of the existing more reliable technologies. The DoD needs to efficiently and securely maintain its communication within and outside its MAN in order to ensure the security of the U.S. citizens (Awuku & Anim, 2012). Conclusion and recommendation Based on the findings of the DoD network, there are a number of recommendations proposed with consideration of the budget constrain evident in the DoD. The first recommendation is taking advantage of the existing TDM infrastructure by integrating VoIP technologies in all of the major offices in the country. It is possible to connect the TDM PBX through T1/E1 links by using AudioCodecs Mediant Gateway. The cost incurred in accomplishing this is almost negligible. The other recommendation is the deployment of Mixed-network use whre the DoD will share its network with the public infrastructure but given the mandate to man the network for possible intrusion of classified information being transmitted through the public domain network. Employing public network means reduced cost incurred in traffic transmission which is essential considering the DoD budget constrain. The other implementation that will highly benefit th DoD is the introduction of the DWDM in replacement of the existing WDM fiber backbone technology. The DWDM will increase the capabilities of the existing fiber network in the DoD infrastructure. It will facilitate increased bandwidth because with DWDM, it is possible to multiplex multiple signals into one fiber and transmit data for long distances. DWDM is economical in th sense that the source and the destination will be varied through improvement of the signal adaptation process. In conclusion, the recommendations given to the DoD are cost effective, reliable and possible. It also considers the importance of the information integrity of classified information that touches on national security. The recommendations given are mainly focused on the current network infrastructure and what can be done in order to enhance DoD communication process with a limited budget. References Awuku, K., & Anim, G.B. (2012). Design of an Appropriate Network Infrastructure to Support Research and Educational Network Using Ghana Telecom University College and University of Ghana. New York, NY: GRIN Verlag. Ghosh, S. (2002). Principles of Secure Network Systems Design. New York, NY: Springer. pp. 74-79. Iniewski, K., McCrosky C., & Minoli, D.(2008). Network Infrastructure and Architecture: Designing High-Availability Networks. New Jersey, NJ: John Wiley & Sons. Rouskas, G.N.(2009). Internet Tiered Services: Theory, Economics, and Quality of Service. New Jersey, NJ: Springer. Wong, A.(2009). Network Infrastructure Security. New York, NY: Springer. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Infrastructure Improvement Case Study Example | Topics and Well Written Essays - 2500 words, n.d.)
Network Infrastructure Improvement Case Study Example | Topics and Well Written Essays - 2500 words. https://studentshare.org/information-technology/2051207-network-and-telecom
(Network Infrastructure Improvement Case Study Example | Topics and Well Written Essays - 2500 Words)
Network Infrastructure Improvement Case Study Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/information-technology/2051207-network-and-telecom.
“Network Infrastructure Improvement Case Study Example | Topics and Well Written Essays - 2500 Words”. https://studentshare.org/information-technology/2051207-network-and-telecom.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Infrastructure Improvement

Local community improvement proposal

… Name: Course: Tutor: Date: Local community improvement proposal Introduction Community is definite as a assemblage of people leaving in a particular local area.... People have different views to improve the local community, but all of these views must be in accordance to the need of the community in order to achieve some improvement to the community.... Factors that will improve the development of a local area improvement of security in the local area One needs to know that environment upon which a person live plays a prominent role in determine the development of a local community; it may be in terms of security or safety....
3 Pages (750 words) Essay

Providing Integrated Telecommunication Infrastructure for Three Merged Companies

The ultimate purpose of the project, Providing Integrated Telecommunication infrastructure for Three Merged Companies, is providing integrated telecommunication infrastructure for three merged companies: TV broadcasting company, radio broadcasting company, and publishing company.... Integrated telecommunication infrastructure for the three companies includes hardware.... nbsp;Moskowitz defines a virtual private network (VPN) as a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network....
6 Pages (1500 words) Essay

Benefits of Infrastructure Projects for its Rational Determination

This is because the environmental demands in the 21st Century are getting more and more complex, with each passing day, and it is becoming… infrastructure plays a pivotal role in improving the standards of public services and in the maintainence of high levels of build environment.... The fact remains that the implementation and execution of infrastructure developmental projects have remained uppermost in the hands of their planners and executors, but they have not considered its implications nor pondered over the necessary ways in which these projects could provide long time succor and increased standard of living for the masses effected by these projects or the ultimate beneficiaries of these efforts....
10 Pages (2500 words) Essay

30 Year Plan of the Greater Adelaide

Priorities of the use of land for employment and housing alongside infrastructure and long-term transport plans are set aside.... Importantly, the well-developed transport network of the Greater Adelaide owes its success to the towns planning where the bus and train services are balanced and operated by contracting transit companies for effectiveness (Cervero, 1998, p 363)....
7 Pages (1750 words) Essay

IT Infrastructure of Virgin Atlantic Airways

These systems facilitate VAA with a centralized console that monitors all servers, network infrastructure and applications.... The second step and last steps were the improvement and integration of services in VAA (Cameron par 12).... The paper "IT infrastructure of Virgin Atlantic Airways" highlights that Hewlett-Packard information scientists introduced a new service management program that would monitor VAA's critical business procedures, which consist of various applications, infrastructure events, and problem management....
2 Pages (500 words) Case Study

New Business Model and Technology Specifications

This paper presents the process of improvement by implementing information technology at Arabtec Construction, L.... This paper presents a detailed analysis of the IS and network technology implementation at Arabtec Construction, L.... The main intention of this research is to specify an IS and new network technology-based platform for corporate operations, communication, and data transfer....
6 Pages (1500 words) Case Study

The Impact of the Markeaton Street's Infrastructure on the Citizens

The paper “The Impact of the Markeaton Street's infrastructure on the Citizens» summarizes humans' satisfaction with the number of infrastructure facilities, and dissatisfaction with the area pollution due to the abundance of private transport with a lack of public one, the roadway narrowness, etc.... hellip; infrastructure is backbone of the development of any country.... infrastructure is a term architect, engineers, and urban planners use to describe essential facilities, services, and organizational structures....
12 Pages (3000 words) Coursework

Business to Business System and Its Possible Improvement

he main task of Business-to-Business systems is to identify specific areas of the organization that require improvement.... B2B applications interact with other components in the system and within a network hence, their relationship is regarded as peer-to-peer.... … IntroductionWith the advent of the Internet and e-commerce, there are various organizations, which have established systems that can be used to improve certain areas of work....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us