StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Infrastructure - Assignment Example

Cite this document
Summary
The paper "Network Infrastructure" tells us about Designing a comprehensive network infrastructure for a geographically dispersed retail company. The company’s details include: Two headquarters in Salford and London, 100 locations, and the main business is retailing of clothing…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
Network Infrastructure
Read Text Preview

Extract of sample "Network Infrastructure"

DESIGNING A COMPREHENSIVE NETWORK INFRASTRUCTURE FOR A GEOGRAPHICALLY DISPERSED RETAIL COMPANY 2007 TABLE OF CONTENTS Page PAGE . . . . . . . . . 1 TABLE OF CONTENTS . . . . . . . . 2 1. INTRODUCTION . . . . . . . . 3 2. NEEDS ANALYSIS . . . . . . . . 5 2.1. Analysis of company's networking needs . . . . 5 2.1.1. Business requirements . . . . 5 2.1.2. Technical specifications . . . . . 6 2.2. Analysis of intranetworking and all necessary connectivity . 7 2.3. Analysis of appropriateness of the backup, failsafe and load balancing solutions . . . . . . . 10 3. PROPOSED NETWORK INFRASTRUCTURE SOLUTIONS . 11 4. TECHNICAL ISSUES AND CONCERNS . . . . . 17 4.1. Critically discuss systems integration issues . . . 17 4.2. Critically discuss systems maintenance issues . . . 17 4.3. Analysis of the future changes . . . . . 18 5. APPLICATION OF ANY THEORETICAL FRAMEWORK, MODEL OR GUIDELINES . . . . . . . 18 6. REFERENCES . . . . . . . . . 19 1. INTRODUCTION 1.1. Problem/Scenario The company's details include: Two headquarters in Salford and London, 100 locations (point of sales), and the main business is retailing of clothing. The top management of the company is not sure about all the networking functionality they might need either now or in future. Therefore, your task is to identify the main needs in functionality and present them in your report. The estimated total budget for this project is 95,000. Please consider that ambiguity of this scenario gives you a freedom of choice and should be seen as a basis for your creativity. The existing network infrastructure consists of standalone LANs in both headquarters and not networked computer systems in other locations. The Internet access is limited to a shared ISDN line in each of the headquarters and a dial-up access in the point of sales, the web presence and e-mail support are outsourced to Yahoo Small Business Services. All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company's data. The both headquarters have an urge in establishing reliable and cost-effective printing solutions. Notes: Demonstrate a clear and holistic approach towards addressing the company's factual needs while designing an appropriate networking infrastructure. All solutions and hardware choices you have made during your design should be highlighted and justified. 1.2. Drawing of existing scenario using DIA software Figure 1. Existing network infrastructure solution 2. NEEDS ANALYSIS The purpose of the needs analysis is to analyze the business objectives and produce requirements for a network infrastructure to be used in the proposed network infrastructure solution. The proposed network infrastructure solution follows in Section 3. 2.1. Analysis of company's networking needs 2.1.1. Business objectives or requirements 1. To establish interconnection of standalone local area networks (LANs) in both headquarters. 2. To establish local area networks (LANs) in other locations. 3. To upgrade internet connection in both headquarters to a wireless broadband internet connection. 4. To establish local area networks (LANs) in each point of sale (POS) locations. 5. To upgrade internet connection in each point of sale (POS) locations to a wireless broadband internet connection. 6. To maintain the outsourcing of web presence and e-mail services to Yahoo Small Business Services (SBS). 7. To reduce the use of numerous usernames and passwords to one username and one password per client computer. 8. To outsource company's enterprise resource planning system (ERP) and databases. 9. To establish remote access to company's enterprise resource planning (ERP) and databases. 10. To establish reliable and cost effective printing solutions. 2.1.2. Technical specifications 1. Implement interconnection to standalone local area networks (LANs) in both headquarters. 2. Implement local area networks (LANs) in other locations. 3. Implement upgrading of internet connection in both headquarters to a wireless broadband internet connection. 4. Implement local area networks (LANs) in each point of sale (POS) locations. 5. Implement upgrading of internet connection in each point of sale (POS) locations to a wireless broadband internet connection. 6. Implement maintenance of outsourcing of web presence and e-mail services to Yahoo Small Business Services (SBS). 7. Implement reduction to one username and one password per client computer. 8. Implement outsourcing of enterprise resource planning system (ERP) and databases. 9. Implement remote access to company's enterprise resource planning (ERP) and databases. 10. Implement reliable and cost effective printing solutions. 2.2. Analysis of intranetworking and all necessary connectivity The best type of connection between offices and points of sales for a geographically spread retail company is by using a broadband internet connection technology and implementing an outsourced virtual private network (VPN) solution hosted in an outsourced dedicated host server located in the host company premises. According to Wikipedia contributors (2007), wireless broadband internet access, often shortened to "broadband internet" or just "broadband", is a high data-transmission rate Internet connection. Wireless broadband internet access became a rapidly developing market in many areas in the early 2000s; one study found that broadband internet usage in the United States grew from 6% in June 2000 to over 30% in 2003. Modern consumer broadband implementations, up to 30 Mbit/s, are several hundred times faster than those available at the time the internet first became popular (such as ISDN and 56 kbit/s) while costing less than ISDN and sometimes no more than 56 kbit/s, though performance and costs vary widely between countries. "Broadband" in this context refers to the relatively high available bitrate, when compared to systems such as dial-up with lower bitrates (which could be referred to as narrowband). (Wikipedia contributors, 2007) According to Virtual Private Network Consortium (2006), a virtual private network (VPN) is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunnelling protocol and security procedures. A virtual private network can be contrasted with a system of owned or leased lines that can only be used by one company. The main purpose of a VPN is to give the company the same capabilities as private leased lines at much lower cost by using the shared public infrastructure. Phone companies have provided private shared resources for voice messages for over a decade. A virtual private network makes it possible to have the same protected sharing of public resources for data. Companies today are looking at using a private virtual network for both extranets and wide-area intranets. The three important VPN technologies are described as follows: trusted VPNs, secure VPNs, and hybrid VPNs. It is important to note that secure VPNs and trusted VPNs are not technically related, and can co-exist in a single service package. (Virtual Private Network Consortium, 2006) Before the Internet became nearly-universal, a virtual private network consisted of one or more circuits leased from a communications provider. Each leased circuit acted like a single wire in a network that was controlled by customer. The communications vendor would sometimes also help manage the customer's network, but the basic idea was that a customer could use these leased circuits in the same way that they used physical cables in their local network. (Virtual Private Network Consortium, 2006) The privacy afforded by these legacy VPNs was only that the communications provider assured the customer that no one else would use the same circuit. This allowed customers to have their own IP addressing and their own security policies. A leased circuit ran through one or more communications switches, any of which could be compromised by someone wanting to observe the network traffic. The VPN customer trusted the VPN provider to maintain the integrity of the circuits and to use the best available business practices to avoid snooping of the network traffic. Thus, these are called trusted VPNs. (Virtual Private Network Consortium, 2006) As the Internet became more popular as a corporate communications medium, security became much more of a pressing issue for both customers and providers. Seeing that trusted VPNs offered no real security, vendors started to create protocols that would allow traffic to be encrypted at the edge of one network or at the originating computer, moved over the Internet like any other data, and then decrypted when it reached the corporate network or a receiving computer. This encrypted traffic acts like it is in a tunnel between the two networks: even if an attacker can see the traffic, they cannot read it, and they cannot change the traffic without the changes being seen by the receiving party and therefore rejected. Networks that are constructed using encryption are called secure VPNs. (Virtual Private Network Consortium, 2006) More recently, service providers have begun to offer a new type of trusted VPNs, this time using the Internet instead of the raw telephone system as the substrate for communications. These new trusted VPNs still do not offer security, but they give customers a way to easily create network segments for wide area networks (WANs). In addition, trusted VPN segments can be controlled from a single place, and often come with guaranteed quality-of-service (QoS) from the provider. (Virtual Private Network Consortium, 2006) A secure VPN can be run as part of a trusted VPN, creating a third type of VPN that is very new on the market: hybrid VPNs. The secure parts of a hybrid VPN might be controlled by the customer (such as by using secure VPN equipment on their sites) or by the same provider that provides the trusted part of the hybrid VPN. Sometimes an entire hybrid VPN is secured with the secure VPN, but more commonly, only a part of a hybrid VPN is secure. (Virtual Private Network Consortium, 2006) According to Microsoft Corporation (2003), the following are the ways of sharing existing resources using the virtual private network (VPN): 1. Remote access over the Internet - VPNs provide remote access to organization resources over the public Internet, while maintaining privacy of information. 2. Connecting networks over the Internet - there are two methods for using VPNs to connect local area networks at remote sites: 1. Using dedicated lines to connect a branch office to an organization LAN. 2. Using a dial-up line to connect a branch office to the Internet. 2.3. Analysis of appropriateness of the backup, failsafe and load balancing solutions Back-up solutions and the schedule for archiving is done automatically by the dedicated host server as part of its solutions package. The load-balancing solution is built-in an outsourced dedicated host server services from a host company, and there's no need for it to be implemented in-house. The absence of connection to the company's enterprise resource planning (ERP) and databases is a remote possibility for an outsourced dedicated host server services since the host company implements a redundant array of inexpensive disks (RAID) solution, other solutions and techniques to make sure that their hosting services will be at all times up and running, thus makes the service fault tolerant. 3. PROPOSED NETWORK INFRASTRUCTURE SOLUTION The task at hand is designing a comprehensive network infrastructure for a geographically spread retail company. The type of business currently being considered is a retailing business. A shared database or an enterprise resource planning (ERP) solution is needed to store and distribute information about logistics, stocks, supply chain management, and others. The enterprise resource planning (ERP) server will be outsourced and hosted in a dedicated host server from a host company with services favourable to the company. A remote access to the company data using virtual private network (VPN) with a remote authentication dial-in user service (RADIUS) will be implemented. Database organisation and synchronisation will not to be considered an issue since the company will be using only one enterprise resource planning (ERP) and database system hosted in a dedicated host server located in host company premises. A considerable help, improvement or benefit will be brought about by the change of existing network infrastructure towards the existing way of doing business. It will contribute more efficiency to the company, in dealing company clients and everyday transactions. It will also make the company more effective, in applying the company's strategic use of the Information and Communication Technology (ICT). Outsourced virtual private networking (VPN) solutions is best suited for a company running network infrastructure for a geographically spread retail business. A cost-effective printing solution is a must in every company. This may be implemented by using a laser printer attached in each of the headquarters (HQ) and other location servers. The network laser printer will be responsible for all the printing needs of each of the headquarters (HQ) or locations. The hardware technical descriptions and costs will be easily obtained in the computer centre/store in the locality where each of the headquarters (HQ) and other locations are situated. It will be managed, administered and accessed through the Internet using an outsourced virtual private network (VPN) solution. A remote authentication dial-in user service (RADIUS) will be implemented as part of the security of the virtual private network (VPN). According to Microsoft Corporation (2003), the remote authentication dial-in user service (RADIUS) protocol is a popular method for managing remote user authentication and authorization. RADIUS is a lightweight, UDP-based protocol. RADIUS servers can be located anywhere on the Internet and provide authentication (including PPP PAP, CHAP, MS-CHAP v2, and EAP) and authentication for access servers such as NASes and VPN servers. In addition, RADIUS servers can provide a proxy service to forward authentication requests to distant RADIUS servers. Many ISPs have agreements to allow roaming subscribers to use local services from the nearest ISP for dial-up access to the Internet. These roaming alliances take advantage of the RADIUS proxy service. If an ISP recognizes a user name as being a subscriber to a remote network, the ISP uses a RADIUS proxy to forward the access request to the appropriate network. (Microsoft Corporation, 2003) 3.1. Drawing of a proposed solution as a network diagram using a DIA Software Figure 2. Proposed network infrastructure solution Definition of Network Terms Internet - A worldwide, publicly accessible network of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked web pages and other documents of the world wide web. Internet service provider (ISP) - A business that provides Internet access to individuals and businesses. Broadband internet access - is often shortened to "broadband internet" or just "broadband", is a high data-transmission rate Internet connection. Wireless broadband internet access became a rapidly developing market in many areas in the early 2000s; one study found that broadband internet usage in the United States grew from 6% in June 2000 to over 30% in 2003. Firewall - A protective mechanism, usually a combination of hardware and software, designed to act as a barrier, keeping external networks, such as the Internet, completely separate from an internal network. Firewalls forbid access to anyone but individuals authorized to use the network. Server - A computer or device on a network that manages network resources. For example, a file server is a computer and storage device dedicated to storing files. Any user on the network can store files on the server. A print server is a computer that manages one or more printers, and a network server is a computer that manages network traffic. A database server is a computer system that processes database queries. Servers are often dedicated, meaning that they perform no other tasks besides their server tasks. On multiprocessing operating systems, however, a single computer can execute several programs at once. A server in this case could refer to the program that is managing resources rather than the entire computer. Hub - A hardware device to which nodes connect on star-wired networks. Hubs can be passive, active, or intelligent, depending on how they operate. A passive hub simply acts as a connection point; an active hub both acts as a connection point and has the ability to regenerate signals; an intelligent hub is one with additional capabilities, such as the ability to configure the network. Switch - A network device capable of forwarding packets directly to the ports associated with particular network addresses. Client/server network- A LAN built around the division of nodes into client machines (users) and server computers that function as providers of services and resources. Servers on a client/server network commonly perform some of the processing work (called back-end processing) for client machines-for example, sorting through a database before delivering only the record(s) requested by the client. Compare peer-to-peer network. Outsourced services-To seek resources outside of an organizational structure, usually to save money and/or exploit the skills of another entity. Typically used in terms of the business world, outsourcing often entails an enterprise using another company, such as a consultancy or application service provider, to provide a service that the enterprise can provide for itself, yet it is cheaper to utilize a third-party's resources. For example, an enterprise might outsource its IT management because it is cheaper to contract a third-party to do so than it would be to build its own in-house IT management team. Or a company might outsource all of its data storage needs because it does not want to buy and maintain its own data storage devices. Or, a business might outsource its human resources tasks to a third-party instead of having its own dedicated human resources staff. 4. TECHNICAL ISSUES AND CONCERNS 4.1. Critically discuss systems integration issues In the proposed network infrastructure solution, a virtual private network (VPN) is known to be compatible with network address translation (NAT) since the virtual private network (VPN) solution is outsourced, the network address translation (NAT) does not propose any problem. 4.2. Critically discuss systems maintenance issues In connecting to the wide area network (WAN), a wireless broadband internet connected to the internet service provider (ISP) is needed along with the wireless broadband antenna to be connected to each of the headquarters (HQ) server. In connecting to the local area network (LAN), a fast ethernet hub or switch should be connected to each of the headquarters (HQ) server using a cross-over unshielded twisted pair (UTP) cable category 5 with RJ-45 connectors in both ends. A fast ethernet hub or switch will be connected to each of the client computers using a straight-through unshielded twisted pair (UTP) category 5 cables with RJ-45 connectors in both ends. The maintenance and upgrade of the point-of-sale (POS) terminals will be done once the local area network (LAN) for each headquarters (HQ) and other locations are already established. The maintenance of the dedicated host server services will be done jointly by the host company and the in-house systems administrators. The upgrades of the firmwares are done simultaneously and automatically whenever there's an upgrade or renewal of the services being subscribed for in the hosted services. 4.3. Analysis of the future changes Gradual in-house network infrastructure implementation and training of IT staff will address the future expansion of the company's network. The increasing number of users/computers, size of database and e-mail addresses and activities will be gradually implemented in-house depending upon the future availability of funds. 5. APPLICATION OF ANY THEORETICAL FRAMEWORK, MODEL OR GUIDELINES The technology to be used in the proposed network infrastructure solution will be the following: an outsourced virtual private network (VPN) solution, an outsourced enterprise resource planning (ERP) solution, and an outsourced database solution. The type of internet connection to be used between the internet service providers (ISP) and the intranet or local area network (LAN) in both headquarters (HQ) and other locations is the wireless broadband internet connection. Client-server architecture will be utilised in the company's intranet or local area networks (LAN). A wired server-hub/switch-client connection will be using the unshielded twisted pair (UTP) category 5 cable and RJ-45 connectors. Fast ethernet hub/switch and a fast ethernet network interface card (NIC) will be also used as part of the local area network (LAN). 7. REFERENCES Microsoft Corporation (2003). Microsoft Windows Server 2003: Virtual Private Networking with Windows Server 2003: Overview. [nl]: Microsoft Corporation Microsoft Corporation (2003). Microsoft Windows Server 2003: Virtual Private Networking with Windows Server 2003: Interoperability. [nl]: Microsoft Corporation Microsoft Corporation (2003). Microsoft Windows Server 2003: Connecting Remote Users to Your Network with Windows Server 2003: [nl]: Microsoft Corporation Tanenbaum, Andrew S. (2003). Computer Networks. 4th ed. New Jersey: Pearson/Prentice-Hall. http://www.microsoft.com/en/us/default.aspx http://en.wikipedia.org/wiki/Internet http://www.microsoft.com/technet/prodtechnol/visio/visio2002/plan/glossary.mspx#EZFAE http://www.webopedia.com/TERM/s/server.html http://www.webopedia.com/TERM/o/outsource.html http://www.vpnc.org/vpn-technologies.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Infrastructure Assignment Example | Topics and Well Written Essays - 3000 words”, n.d.)
Retrieved de https://studentshare.org/technology/1532636-network-infrastructure
(Network Infrastructure Assignment Example | Topics and Well Written Essays - 3000 Words)
https://studentshare.org/technology/1532636-network-infrastructure.
“Network Infrastructure Assignment Example | Topics and Well Written Essays - 3000 Words”, n.d. https://studentshare.org/technology/1532636-network-infrastructure.
  • Cited: 1 times

CHECK THESE SAMPLES OF Network Infrastructure

Windows Sharepoint Services

Network Infrastructure Planning Name: Course: Lecturer: Date: Introduction Microsoft has developed a powerful public cloud that can be used to achieve some computing objectives in various methods.... This is referred to as infrastructure as a service.... In infrastructure as a service, the company outsources the computing infrastructure to another company which offers infrastructure as a service services.... The service providers invest heavily on the computing infrastructure therefore house, maintain and run them....
4 Pages (1000 words) Research Paper

Network Infrastructure Assignment

This paper ''Network Infrastructure Assignment'' tells that The top management of the company is not sure about all the networking functionality they might need either now or in the future.... The existing Network Infrastructure consists of standalone LANs in both headquarters and not networked computer systems in other locations.... The purpose of the needs analysis is to analyze the business objectives and produce requirements for a Network Infrastructure to be used in the proposed Network Infrastructure solution....
12 Pages (3000 words) Assignment

Network Infrastructure Basics

The paper "Network Infrastructure Basics" describes that the network and sharing center is a tool like a network mapping and network location that allows viewing and specific additional settings and profiling of networks.... The application can also be used for network connectivity troubleshooting issues.... hellip; Protocols are sets of standards that facilitate communication between network hosts.... It is usually used in home computers, but in some cases, it is used as a business or the Internet network....
4 Pages (1000 words) Assignment

Network Infrastructure Basics

The paper "Network Infrastructure Basics" describes that for this LAB the author had to select a cheap option for the simple connectivity with the Gigabit Ethernet Network.... Network Infrastructure BasicsLab 4.... Networking infrastructure for Pervasive Computing: Enabling Technologies & System.... Amongst the given option Cat 5 was the cheapest one and can do the required connectivity between the user and network.... nbsp;… A point to be noted here is that Cat5 cable can also be used for this network but was not available in the items list....
2 Pages (500 words) Assignment

Network Infrastructure Basics in the LAB

Network Infrastructure BasicsLab 6.... Networking infrastructure for Pervasive Computing: Enabling Technologies & System.... The requirements in this LAB were that the author had to install a wireless network card in the PC in which a built-in Ethernet Card was already present.... 1a wireless network adaptor amongst the given has all the required functionalities in it that include frequency of 5.... Summary The requirements in this LAB were that I had to install a wireless network card in the PC in which a built in Ethernet Card was already present....
2 Pages (500 words) Assignment

A Comprehensive Network Infrastructure

In the paper “A Comprehensive Network Infrastructure” the author analyses the retailing of clothing.... nbsp;… The author states that the existing Network Infrastructure consists of standalone LANs in both headquarters and not networked computer systems in other locations.... he purpose of the needs analysis is to analyze the business objectives and produce requirements for a Network Infrastructure to be used in the proposed Network Infrastructure solution....
12 Pages (3000 words) Assignment

Network Infrastructure and Security

"Network Infrastructure and Security" paper states that virtualization and cloud computing are used in an immense manner with the aim of ascertaining that resources are used appropriately.... The policies as well as regulations are required to be in compliance with Federal along with State law for better administration of Network Infrastructure and information technology resources.... Network Infrastructure signifies the computer network with the assistance of which data is transferred within the network node....
5 Pages (1250 words) Essay

Network Infrastructure Improvement

This analysis "Network Infrastructure Improvement" tries to provide a permanent and sustainable solution to technological improvements of the DoD by first analyzing the existing IT and telecom applications and services, the network architecture, the existing business needs.... 4), the current Network Infrastructure of the DoD is isolated from the public ATM Network Infrastructure.... The internal network is also subject to possible network intrusions, there is a possibility of external intrusion through physical network interruption, hacking of the Network Infrastructure (Wong, 2009)....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us