StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Infrastructure for Segments within the Enterprise - Term Paper Example

Cite this document
Summary
This paper 'Network Infrastructure for Segments within the Enterprise' tells that Our organization’s network proposal assures significant cost savings by deploying the appropriate technology extracted by a reliable risk assessment and cost-benefit analysis for the network. Stakeholders will trust data and their investments…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Network Infrastructure for Segments within the Enterprise
Read Text Preview

Extract of sample "Network Infrastructure for Segments within the Enterprise"

Full Paper Executive Overview Our organization’s network proposal assures significant cost savings by deploying the appropriatetechnology extracted by a solid risk assessment and cost benefit analysis for the network. For this reason, stakeholders will trust data and their investments, as the network proposal is strategically aligned with current and potentially planned new business objectives, seeking for future expansions of the computer network. Moreover, for addressing security, a comprehensive information security risk assessment is conducted that identifies critical assets and vulnerable points of the computer network. Likewise, adequate security controls that are considered within the network proposal are also justified by the cost. For instance, if an asset requires a security control that costs more than the asset value, the controls are discarded and alternate cost justified countermeasures are implemented to ensure all identified vulnerabilities are addressed and taken care of. Furthermore, the justified cost along with the appropriate use of technical excellence, network configuration, network products, security appliances, applications, and support will deliver value to the organization. For ensuring business continuity, redundant data connectivity links and alternate configurations are performed within each connectivity hub for addressing network service downtimes. For addressing network scalability, next generation network (NGN) supported hardware is considered for ensuring significant cost savings. Therefore, due to all these benefits, stakeholders can trust us for value delivery and better Return on Investment (ROI) for the budgeted amount. DNS Scheme For a new DNS scheme, a new zone should be configured on the internal DNS server that may resemble every domain of the organization. Likewise, configuring the zone on the internal DNS will allow the network administrator to manage and make it redundantly distinct. The configuration of the following zones must be performed: Woodgrovebank.com Asia.woodgrovebank.com Emea.woodgroovebank.com However, for addressing the requirement of establishing zones on external DNS server, only one domain will be configured, i.e. woodgrove.com, as it is the only domain that maintains and holds external records. Moreover, a replica of domain DNS zone will be maintained at every hub site. However, the central hub site for each domain will maintain a replica of DNS zones of other domains. Hub Site Zones New York WoodgroveBank.com Emea.WoodgroveBank.com Asia.WoodgroveBank.com Miami WoodgroveBank.com Seattle WoodgroveBank.com Toronto WoodgroveBank.com London WoodgroveBank.com Emea.WoodgroveBank.com Asia.WoodgroveBank.com Tokyo WoodgroveBank.com Emea.WoodgroveBank.com Asia.WoodgroveBank.com Beijing Asia.WoodgroveBank.com Paris Emea.WoodgroveBank.com Lisbon Asia.WoodgroveBank.com For every domain on the computer network, there is also a requirement of configuring a local zone, as it will sanction the configuration of secure and dynamic updates. Likewise, Microsoft Active directory has an embedded default functionality of replicating integrated zones to all the domain controllers within the same domain (Jones & Rouse, 2003). As every instance is playing a role of a primary zone, all the available domain controllers are granted for dynamic updates. Hub Site Zones New York WoodgroveBank.com (Active Directory unified) Emea.WoodgroveBank.com (secondary) Asia.WoodgroveBank.com (secondary) Miami WoodgroveBank.com (Active Directory unified) Seattle WoodgroveBank.com (Active Directory unified) Toronto WoodgroveBank.com (Active Directory unified) London WoodgroveBank.com (Active Directory unified) Emea.WoodgroveBank.com (secondary) Asia.WoodgroveBank.com (secondary) Tokyo WoodgroveBank.com (Active Directory unified) Emea.WoodgroveBank.com (secondary) Asia.WoodgroveBank.com (secondary) Beijing Asia.WoodgroveBank.com Paris Emea.WoodgroveBank.com (Active Directory unified) Lisbon Asia.WoodgroveBank.com (Active Directory unified) IP/DHCP Scheme For the convenient use of IP addressing, we will use 10.0.0.0/8 subnet for this scenario, as it will provide the required allocation of IPv4 addressing. However, for remote offices or branches, we will assign a class C subnet mask, as there is no requirement of allocating so many IP addresses at branches. The subnet mask for a class C network will be 255.255.255.0. Moreover, for hub branches, we will allocate a class B subnet, as they need IP addresses for internal use and for the branches that connect to the hub branches. The class B network address will be 255.255.0.0. Furthermore, for allocating subnet mask for branches in New York, Miami, and Toronto, we will perform sub netting that will allocate the adequate size of address spaces required and at the same time give space for network expansion options in the future. Likewise, five bits of the second octet of a 32bit IP address will allow connecting 32 hub branches in each division. Moreover, by utilizing 3 bits of the second octet of a 32 bit IP address, we can expand the network capacity for supporting 8 divisions. Consequently, the subnet mask for all branches in North America can be assigned with the network address 10.32.0.0/11. File and Print Services For ensuring value delivery, WAN acceleration techniques will be preferred that will enhance the speed for file transmission within Wide Area Networks of the organization. However, specialized hardware modules are required for this purpose, and Windows Server 2008 provides an alternate solution via SMB 2.0. Moreover, for addressing security issues, access-based enumeration prevents unauthorized access to these files shared by the Distributed File System (DFS). Distributer file system is the most widely adopted method for sharing data across corporate networks while maintaining only a single legitimate location (“AUUG Conference Proceedings”, 1994). Moreover, for maintaining backups for the DFS, the backup server located in the New York hub branch will be used for storing backups of the region, as data backup coming from all the hub branches will be stored on this server. Apart from implementing DFS, to ensure high availability of these files, failover clustering can also be considered, but it is not a cost effective solution. For printing services, we will configure and deploy network-based printing services, as they are considered to be the most cost-effective option. Moreover, by incorporating windows server printing console, centralized management can be carried out by the network administration staff of the bank. Virtualization Virtualization is a technology that provides an opportunity to establish multiple instances of the same operating system running on a single hardware (Cerling & Buller, 2010). The newly implemented hardware for the Woodgrove Bank will be utilized by establishing multiple instances of an operating system for each region running on a single hardware platform. For this reason, significant cost will be saved through virtualization technology. Apart from saving hardware and software cost, virtualization will also provide convenient server management, utilizing server resources to its full potential and eliminating a need for a space in the data center, total cost of ownership and electricity. One of the core objectives for the newly designed network for Woodgrove Bank requires high availability of mission critical services, live backups, and live migration of data within the network. Microsoft hyper V supports all these functions, as the presence of Woodgrove Bank is located in several countries; ‘Microsoft Hyper V’ supports geographically dispersed clusters. Moreover, we will virtualize our core servers to utilize new hardware, and testing is an essential part of the process. Microsoft Hyper V provides a rich Windows Management Interface that will operate automatically to assist in the testing process of the virtual servers and applications. Furthermore, as regards administering a virtual server environment for the Woodgrove Bank, there are situations when servers need to be replaced within the network with no downtime at all for assuring high availability. Microsoft Hyper V supports failover clustering that enables virtual drive resources to be the part of resource groups that can be easily swapped between the network nodes in the failover cluster (Savill, 2009). Security For addressing network security of Woodgrove Bank, a team is required. Likewise, a team is required to execute the security plan that will include roles of all members, such as stakeholders, security managers, security developers, testers, and end users. The next step is to identify threats and their impact on the network that is followed by a risk assessment plan that incorporates cost/benefit analysis as per the allocated security budget. Lastly, policies can be made to administratively control and secure the environment. Moreover, for securing the wireless network, WPA2 encryption standard will be recommended, as it is the best encryption standard to date. References AUUG conference proceedings (1994). Retrieved from http://books.google.com.pk/books?id=Zju3xMaLsGcC&pg=PA196&dq=Distributed+File+System+definition&hl=en&sa=X&ei=IRbyT6i5EcamrAfIluW9DQ&ved=0CEUQ6AEwAw#v=onepage&q=Distributed File System definition&f=false Cerling, T., & Buller, J. L. (2010). Mastering Microsoft virtualization. Indianapolis, Ind.: Wiley Pub. Jones, D., & Rouse, Mark. (2003). Microsoft Windows server 2003: Delta guide. Indianapolis, IN: Sams. Savill, J. (2009). New hyper-V features in windows server 2008 R2. Windows IT Pro, 15(12), 57-60. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Infrastructure for Segments within the Enterprise Term Paper Example | Topics and Well Written Essays - 1250 words, n.d.)
Network Infrastructure for Segments within the Enterprise Term Paper Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/information-technology/1777769-network-infrastructure-for-segments-within-an-enterprise
(Network Infrastructure for Segments Within the Enterprise Term Paper Example | Topics and Well Written Essays - 1250 Words)
Network Infrastructure for Segments Within the Enterprise Term Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1777769-network-infrastructure-for-segments-within-an-enterprise.
“Network Infrastructure for Segments Within the Enterprise Term Paper Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/information-technology/1777769-network-infrastructure-for-segments-within-an-enterprise.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Infrastructure for Segments within the Enterprise

The Working Ways for Setting a Flexible Workforce

This way the suppliers and the enterprise can enjoy gains and profits.... They postulated that in a manufacturing enterprise, the “purchasing agent will negotiate with the supply agent for price, quality, delivery time and supplying quota” (Yang and Zhenghzou 2007)....
9 Pages (2250 words) Assignment

Use of BOTNET in Server Service Attacks

The compromised zombie army is invaded by a Trojan, which is known as a remote application that installs itself within the system memory or kernel and provides data or connectivity to the hacker.... botnets Ziff Davis enterprise.... (Ghazali & Hassan, 2011) research on DDoS attacks has revealed vulnerabilities not only in the network architecture or infrastructure, but also in the protocol specifications along with Internet.... hellip; Robot network or BOTNET is also known as a 'Zombie army' and is considered as a group of computers that are compromised and controlled by the hacker to attack a specific target....
3 Pages (750 words) Essay

Convergence of Physical and Information Security

This leads to double work and double protective working towards the protection of the overall network and infrastructure.... In such scenarios the physical security is largely in need of technology in order to make the overall network of organizations more secure, less cumbersome and more reliable at the same time leading to more customers satisfaction and ultimately more gains and productivity....
11 Pages (2750 words) Research Paper

E-business and Application Service Provider

Commonly used ASPs include: enterprise resource planning applications, e-commerce, customer relationship management, productivity applications, e-mail, and unified messaging services.... Commonly used ASPs include enterprise resource planning applications, e-commerce, customer relationship management, productivity applications, e-mail, and unified messaging services....
12 Pages (3000 words) Essay

IP PBX - a Great Component to Be Integrated into the Organization

The IP PBX is owned by the enterprise.... network connectivity is an important aspect that needs to be effectively provided for any organization.... This paper "IP PBX  - a Great Component to Be Integrated into the Organization" focuses on new developments that have been made it possible to replace the hardware-based PBX and other features tied with the solutions provided - conferencing and collaboration, applications programming interface, etc....
7 Pages (1750 words) Case Study

Virtual Private Networks

"Virtual Private Networks" paper is about setting up a Virtual Private Network test network infrastructure.... The network is meant to connect together remote users by ensuring security such that any individual who intercepts the encrypted data is unable to read it.... In the setup wizard for routing and the remote access services, make a selection of virtual private network server from the common configurations list.... rrangement for the Virtual Private network test lab is shown by the following illustration: There is a segment of the network that represents a corporate intranet as well as another segment of the network that represents the internet....
5 Pages (1250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us