StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Advanced Network Management and Design - Coursework Example

Cite this document
Summary
This coursework "Advanced Network Management and Design" focuses on an IT service Upgrade Announcement that was made for making the Graystone Industries computer network resilient and compatible with current trends. Several solutions to cater business needs are addressed.  …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Advanced Network Management and Design
Read Text Preview

Extract of sample "Advanced Network Management and Design"

Network Topology As per the scenario for Gray stone Industries, we have two sites i.e. Caprica and Gemenon. Each one of these sites must require a star topology for the LAN, as it is the most commonly used topology that saves cost. The star topology allows the primary supply of Gray stone Industries resources and services and can handle the system management and problem solving projects from a single platform. Likewise, star topology provides security features and enhanced system protection for Graystone Industries. The costs saving characteristics of star topology are justified by administration of computer network on a single platform. To manage information security and monitoring back-up techniques, the centralized administrative platform is for better problem solving and management. Network Cables For implementing the local network for Graystone Industries and the new Caprica and Gemenon sites, CAT 5 cable is the best suitable option. It facilitates both speech and data transmitting and CAT-5 is in the form of turned sets. This cable includes four cable color sets, linking the network node with RJ 45 connections.CAT-5 facilitates up to 100 to 1000 MHz rates of speed in a ‘full duplex’ method (Category 5 Cable. 2007). The Caprica and Gemenon require high traffic of voice and data, as the organization has offices all over the world. Secondly, the management team and 270+ employees will be communication within these two offices. CAT 5 will suffice data communication demands of high end middleware and directory services. However, there is a limitation of installing a switch after every 100 meters within the premises. Network Devices A router is considered to be a core device in terms of routing data packets to the desired network locations of Graystone Industries. Router joins two or more networks with different subnets, allowing the systems to communicate on an enterprise level (Peterson, L, & Davie, B 2007). For Caprica and Gemenon sites, a data connection is required, as it can be established by incorporating MPLS over PSTN. Rationally the router develops a redirecting database between Caprica and Gemenon, where it stores all the details of these network locations. For example, the information bundle source and destination is stored in the redirecting database. The system manager can statically determine the system details which are known as ‘static routes’. The powerful redirecting protocol is used for the automated of trading information packages with other routers in a system. The selection requirements of the router depend on the system specifications. The information transmitting evaluate, which is also known as the maximum transmitting unit (MTU) is also considered for optimal system performance. To cater the requirements of Gray stone Industries, the current situation, the router must assistance information and voice transmitting, redundancy and security measures will be handled by ‘cisco’ 3845 incorporated service wireless router. For the Gray stone Industries, the cisco 3845 Incorporated Solutions Wireless router offers concentrated productivity on the LAN. These services include such security and improved communication for clients. The cisco 3845 ISR involves effective ‘Wide Area Network’ WAN that helps to provide maximum security. The router provides over 90 sections. Moreover, these sections are designed to provide extraordinary services in terms of exchanging and connecting two networks on the two sites that separated by river banks (IONESCU, A 2014). Paying attention to the cost that needs to be reasonable, as well as the router facilitates all the services to the clients over Ethernet (POE). Likewise, it is the latest technological innovation that is developed via information, speech and energy on standard CAT 5 Ethernet abilities. Moreover, this technological innovation provides energy to the devices that are connected through the similar system. In fact, the security aspect is enhanced, as the router has built in features for the information security. The router also facilitates up to 2500 Exclusive Private Network channels in order to establish connections with the websites hosted globally. However, the AIM-HPII-PLUS component is required to provide backup VPN competency in the router. In addition, VPN is further defined as the security provider along with the cisco VPN technological innovation. The ‘cisco’ VPN has turned out to be a reliable name in the industry in order to establish distant connections such as, distant workplaces, distant users and distant websites in a more secure manner. The VPN is most widely used to provide solutions regarding distant connections for the clients. It is most cost saving service provided by cisco to the Graystone industries (PSTN) (, cisco 3845 Incorporated Solutions Wireless router - cisco Systems). IP Addressing Issues The static IP addressing on the Gray stone Industries computer network is not a flexible option, as it may create many issues. The first issue is the assignment of one IP address in two computers at the same time. As the configuration settings are in the control of end users, there may be a possibility of configuring two IP addresses at the same time on two different computers. As a result, both the computers will not able to perform data transmission and will become useless until the issue is resolved. Moreover, there will be no accountability of the employees using the network resources and services, as the created logs will not identify any specific employee. As a result, inadequate monitoring of network resources and data will not be possible. Moreover, granting and restricting services can be carried out on IP addresses, if any employee changes two to three IP addresses per day, the granted or denied access of different services will not be valuable at all (Ailin, Z 2014). Recommended Solution The solution for this issue is the provision of Dynamic host configuration protocol along with the deployment of Microsoft Active Directory services. However, prior to deploying Microsoft active directory, a domain environment must be created. The DHCP will ensure that there are no duplicate IP addresses on the network. Moreover, it also provides adequate use of network resources, as the defined IP pool will allow an IP address only when required. This may minimize the traffic on the network at all times. Furthermore, a cost effective way of restricting IP configuration settings is an administrative account on very workstation local settings. The employees will only be provided a limited access, as their accounts will be created as ‘Power Users’ (Guerin, L 2015). Application Management of the Network Accessing the server directly will impose risks to the server, as it will considered as a critical asset that is making applications operational in the networked environment of Gray stone Industries. If the application is dependent to execute only on the server than a virtual instance of a server can be created on another system from where users can access and execute applications. Sharing Data As mentioned earlier in the report, domain environment must be created. Likewise, active directory will be installed on Windows 2008. After installing Microsoft Active Directory, it will provide comprehensive file access management options for the internal as well as external network. After deploying the domain environment, the second site of Gray stone Industries will be connected to the same domain controller that is located in the main site. Managing Active Directory functions for the domain Windows 2008 Domains is operational by utilizing a multiple master design with limited master operations available on a master domain controller. Likewise, the purpose is to balance the load on a domain controller, however, there are some operations that can only be executed on a Master controller (Active directory functions ). Moreover, Flexible Single Master Operations (FSMO) that is executed on a sole controller. Likewise an administrator examines and identify operations that can be carried out on the master controller. Some of the FSMO operation types consist of (CASADO, M, FOSTER, N, & GUHA, A 2014): “Schema Master - Makes changes to the database schema. Applications may remotely connect to the schema master. Domain Naming Master - Adds or removes domains to or from the forest. PDC Emulator - When Active Directory is in mixed mode, the computer Active Directory is on acts as a Windows NT PDC. The first server that becomes a Windows 2000 domain controller takes the role of PDC emulator by default. Functions pewrformed by the PDC emulator: Relative ID Master (RID Master) - All objects have a Security Identifier (SID) and a domain SID. The RID assigns relative IDs to each domain controller. Infrastructure Master - Updates group membership information when users from other domains are moved or renamed. If you transfer this function, it should not be transferred to the domain controller that is the global catalog server. If this is done, the Infrastructure Master will not function” VPNs The suggested solution incorporates Windows 2008 server that provides powerful features for implementing a Virtual private network for Gray stone Industries. As the primary site will establish a VPN server, the secondary site will dial to the VPN server for establishing connectivity. However, user credentials must be provided for gaining access to network services. Microsoft Windows 2008 server provides a direct access service that is a replacement of remote access. The primary function of direct access is to maintain remote access connectivity, virtual meetings and telecommuters separate from using the VPN. Moreover, the direct access service can robustly connect the users instantly regardless of time and location. Furthermore, it provides a similar degree of security. In addition, this service can also be used for updating patches to all the workstations on the Gray stone Industries network. The authentication mechanism utilizes a multi-factor authentication methodology and with the support of IPv6, split tunnel-routing and encryption techniques can be applied to minimize network data broadcast. The Demilitarized Zone (DMZ) The demilitarized zone needs to be defined for Greystone industries, as the offices in Europe are facing security issues. The functions as a part of firewall program settings to be able to protect the regional community systems. If a Demilitarized zone is designed on the whole system or on particular work stations, they are known to be in a Demilitarized zone. Moreover, the zone also helps work stations that are designed behind the firewall program to initialize demand that are regarded as outgoing traffic to the Demilitarized zone. The performance of Demilitarized zone is similar to a proxy server, as the work stations designed in Demilitarized zone communicate with the public systems. Furthermore, the primary benefit for a Demilitarized zone for Greystone Industries is that it defends the LAN for both the sites (Hathway, M, & IOS, P 2014). Furthermore, the drawbacks associated with Demilitarized zone are not important, but one issue can be outlined, as the segregation may make a stress for the system management because Demilitarized zone needs regular up-dates and servicing. Moreover, the components cost is high and needs devoted components to be able to apply Demilitarized zone within the system. Implementation has a change, individual firewall program and IDS etc. Provision of Web-based applications An intranet server will host the in-house applications that will be accessible by the internal staff of the Gray stone Industries only. Moreover, for synchronizing the application to the other site of Gray stone Industries, the application will then be considered as Extranet. Likewise, Windows Server 2008 provides many features to manage in-house intranet applications. Justification of Recommended Solutions IP addressing issues will be rectified by the deployment and configuration of Dynamic Host Configuration Protocol (DHCP), as it is the most cost effective solution. Likewise, Dynamic Host Configuration Protocol (DHCP) is a communications protocol that facilitates network administrators to manage and automate assignment of IP addresses from a single point in a network. Moreover, every network component seeking for an IP address assignment, DHCP handles this assignment by automatically issuing them to the available active nodes on the network. However, the second option incorporates an existence of a domain environment. A domain controller operating from Windows Server 2008 is configured to be considered as an Active directory server. Likewise, multi master replication is utilized by Active directory that may result in a writable database for all the domain controllers for a domain along with hardware and software infrastructure update. This concludes that the network administrators or system administrators can connect any domain controller for adding, deleting, resetting passwords or perform any other maintenance tasks. Likewise, after making changes to the specific domain, all the other domains residing within the network will be updated. Moreover, each server sole is discussed along with the features that are available by installing Microsoft Windows 2008 server (Hoang, T 2012. Executive Summary For making the Gray stone Industries computer network resilient and compatible with current trends and technologies, an IT service Upgrade Announcement was made. Likewise, the primary objectives are a) Improving IT services and increasing collaboration enterprise-wide (throughout the organization). b) Reducing operating cost. c) Obtaining effective risk management for the protection of data. Following with methodology for implementing the IT service upgrade plan, primary tasks were distributed in to stages. Likewise, these stages discussed the overall cost, awareness in employees and illustration of poster. Lastly, several solutions to cater business needs were addressed and rectified justified with cost benefit analysis. In addition, for taking major stakeholders in confidence, some of the factors that were considered are Identification of major stakeholders, Identification of changes that needs to be performed in which tasks and how they will be performed, Identification of the likely concerns of the modifications associated with stakeholder requirements i.e. time, capabilities, resources, status, values and satisfaction, examining the required changes in terms of broad relational factors including apprehensive relationship in between groups or individuals associated with the stakeholders and to determine whether the stakeholder will identify the change either procedurally or distributive. References Peterson, L, & Davie, B 2007, Computer Networks [Electronic Resource] : A Systems Approach / Larry L. Peterson & Bruce S. Davie, n.p.: Amsterdam ; Boston : Morgan Kaufmann, c2007., AVC Book Catalog, EBSCOhost, viewed 10 March 2015. Hathway, M, & IOS, P 2014, Best Practices In Computer Network Defense : Incident Detection And Response, Amsterdam: IOS Press, eBook Collection (EBSCOhost), EBSCOhost, viewed 10 March 2015. CASADO, M, FOSTER, N, & GUHA, A 2014, Abstractions for Software- Defined Networks, Communications Of The ACM, 57, 10, pp. 86-95, Business Source Complete, EBSCOhost, viewed 10 March 2015. Hoang, T 2012, Computer Networks, The Internet And Next Generation Networks : A Protocol-Based And Architecture-Based Perspective, Frankfurt am Main: P. Lang, eBook Collection (EBSCOhost), EBSCOhost, viewed 10 March 2015. Guerin, L 2015, CHAPTER 2: Computers and Software, Smart Policies For Workplace Technologies, pp. 25-38, Small Business Reference Center, EBSCOhost, viewed 10 March 2015. IONESCU, A 2014, SECURITY OF COMPUTER NETWORKS IMPLEMENTED IN UNIVERSITIES AND BUSINESS ENVIRONMENT, Hyperion International Journal Of Econophysics & New Economy, 7, 2, pp. 305-326, Academic Search Complete, EBSCOhost, viewed 10 March 2015. Ailin, Z 2014, Discussion and research of computer network security, Journal Of Chemical & Pharmaceutical Research, 6, 7, pp. 780-783, Academic Search Complete, EBSCOhost, viewed 10 March 2015. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Advanced Network Management and Design Coursework Example | Topics and Well Written Essays - 2250 words, n.d.)
Advanced Network Management and Design Coursework Example | Topics and Well Written Essays - 2250 words. https://studentshare.org/information-technology/1862694-advanced-network-management-and-design-graystone-industries
(Advanced Network Management and Design Coursework Example | Topics and Well Written Essays - 2250 Words)
Advanced Network Management and Design Coursework Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/information-technology/1862694-advanced-network-management-and-design-graystone-industries.
“Advanced Network Management and Design Coursework Example | Topics and Well Written Essays - 2250 Words”. https://studentshare.org/information-technology/1862694-advanced-network-management-and-design-graystone-industries.
  • Cited: 0 times

CHECK THESE SAMPLES OF Advanced Network Management and Design

Advances in Wireless Networks

This report outlines the specification and design of the new network.... Introduction In this report I am going to specify a new controller-based wireless LAN design for University of Iland.... This specification report will present a comprehensive analysis and specification of new wireless network technology, its requirements, design, systems, equipment and computations required for the establishment of LAN network at University of Iland.... There are many subject groups within the school such as Networks, Artificial Intelligence, Systems Analysis, design and Informatics, Software engineering and E-Business....
10 Pages (2500 words) Essay

Local Area Network Design/ Network fundamental

For effective network design, the needs to be switch located on each floor.... They are stored in unorganized way which can be a great issue when it comes to file management issues.... After careful assignment and management of the various applications, there is delivery of satisfactory perfomance across the entire LAN.... Report on Local Area network/network Fundamentals Name: XXXXX Professor: XXXXX Institution: XXXXX Course: XXXXX Date: XXXXX Current LAN network problems Ageing Cabinets/ traffic issues Despite the current network being wired with the CAT 5 cabling, the current cabinets that hold the patch panels need replacement....
5 Pages (1250 words) Assignment

ACE Network Design

8) and the decision once made on topology and network media is seldom changed or it might be very expensive to change this decision at a later stage to cater network management or optimization issues.... This report will present a detailed network infrastructure design to accommodate all business and technological needs of the network, a diagrammatic overview of the topological layout of network infrastructure devices.... The importance of networks has increased leaps and bounds in last two decades and organizations have to design and maintain networks that best suit their corporate requirements....
9 Pages (2250 words) Essay

Internetworking Technology Paper

Full Paper Title Name University Internetworking Before constructing the network, star topology is considered for the design of the network, as it provides centralized administration and management with the integration of Microsoft's directory services and domain controllers.... hellip; For redundancy to ensure continuous network connectivity and operations, certain technologies are incorporated within the design of the network.... , as shown below will demonstrate every aspect of the Local area network design....
3 Pages (750 words) Essay

Computer Network Security

information security management is not addressed to the optimal level.... Some of the management controls that are implemented by the information security manager are IT governance, Risk management, monitoring Key Process Indicators (KPI) and Key Goal Indicators (KGI).... Similarly, as per network dictionary, Intrusion detection system is defined as “Intrusion detection system (IDS) is a type of security management system for computers and networks....
5 Pages (1250 words) Case Study

Network Security as a Business Benefit

The paper "network Security as a Business Benefit" develops the assumption every organization needs its own proper security system to maintain its reputation.... Once a reliable system is built everything that goes on with the network can be evaluated with respect to that policy.... hellip; network can be defined as 'any set of interlinking lines resembling a net, for example, 'a network of Roads '.... Any interconnected system can be termed as a network....
6 Pages (1500 words) Case Study

Understanding of Network

hellip; In doing this, it is vital that connections have to be created by which each member could relate to everyone in a particular way, leading to spatial interactions and design practices to be formulated (Burke and Tierney, 2007).... The presence of mobile gadgets, created to enhance communication is in reality tries to augment the full potential of the management context.... In the presence of these advantages, companies, organizations and individuals learn to appreciate the fact that in the management context there must have many things that need to be considered when a network has to be taken into account....
6 Pages (1500 words) Essay

Global Environment for Network Innovation By NSF

One of the main goals of GENI is to change the nature of networked and distributed systems design, to integrate precise theoretical understanding with compelling and thorough experimental validation (Peterson n.... he importance is given on enabling researchers to experiment with essential network designs in a way that is far more realistic than they can today.... It is a revolution in network based systems.... In fact GENI planning efforts are presently organized around multidusiblinary area, basically linked with architecture, the backbone network, distributed services, wireless/mobile/sensor subnetworks, and research coordination amongst these (Wikipedia n....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us