StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Growth of Electronic Connectivity - Assignment Example

Cite this document
Summary
"Equipment for the Growth of Electronic Connectivity" paper states that business information system networks have transformed themselves into must-have media. This requires that any organization that relies on implementing these technologies should have an understanding of the involved technologies…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful

Extract of sample "Growth of Electronic Connectivity"

Networking Table of Contents PART 1 Introduction …………………….…………………………………….3 Network Requirements ………………………………………………4 Equipments used ……………………………………………………..4 PART 2 Schematic representation ……………………………………………12 Internet troubleshooting ……………………………………………..19 Conclusion ……………………………………………………………..24 References ………………………………………………………………25 PART1 Introduction Over the lat two decades organizations across the globe have witnessed dramatic changes in their business operations. These changes are as a result of the evolving technological landscape that have ushered new ways of performing transactions. This has given birth to the networks and subsequently the Internet hence electronic commerce. As a result more transactions are now being conducted electronically whereby deals are today being closed at the touch of a button. These changes have affected how enterprises are operating and therefore technology is redefining company’s profile. The information superhighway has introduced a new turf for organizations to compete and more entities are also going global at the same time to grow their revenues. Connectivity has never been as important as it is today. This growth of electronic connectivity is forcing enterprises to be always connected so that they can continue to stay relevant and compete effectively with their competitors. For instance, traditional text based transaction systems have in return been replaced by web-based applications which boasts of multimedia contents. New technologies which are related to connectivity such as the internet have therefore metamorphosed as mandatory subjects not only for the Management Information Systems (MIS) personnel but also for the Chief Executive Officers (CEO’s), and Transmission Control Protocol/ Internet Protocol (TCP/IP) has become a buzzword overnight. Network Requirements The company’s large computing requirements require very sophisticated networking equipments. This requires a breakdown of all the media and machines that are required. Item Description Quantity Required 1 Siemon cat 6e networking cable 500 meters 2 RJ 45 Clips 100 pieces 3 Wireless print servers 5 units 4 48 port networking switches 8 units 5 Wireless internet router 3 units 6 Wireless internet radio 2 units 7 Servers 4 units 8 Client workstations (personal computers) 35 units 9 Wireless Access point 5 units 10 Firewall 3 units Equipments used Siemon cat 6 e network cabling media Here we are proposing to use Siemon Z-MAX 6A UTP cabling technology. The media comes with PCB-based smart plugs patented technology, with optimized outlets, reduced cable diameter, high density patch panels, and the cable also boast of outstanding ISO performance requirements for category 6A/class EA which also includes critical alien cross talk parameters (Siemon, 2011). Siemon cat 6e is also optimized for alien cross talk elimination. This has been made possible by the Diagonal IDC alignment which maximizes outlet to outlet pair separation to achieve AXT performance in high density environments. The cable also boast of reduced diameter which results in smaller and more flexible design that reduces the demands for larger pathways sizing. Benefits of Siemon Z-Max 6A UTP The cable has a high density 48 port which provides flexibility hence maximizing rack/cabinet space while maintaining excellent alien crosstalk isolation They also boast of the industry’s fastest termination time which accelerates the projects towards their completion date They have guided tool based termination process which significantly enhances systems scalability and robustness The field terminated outlets are easily snapped into patch panels which enables rapid deployment of systems The cables outlet and modular cord color coding provides the capability to code and customize the Siemon cabling system Wireless Print server (Cisco-Linksys WPS54GU2 Wireless-G Print Server for USB 2.0) Wireless print servers enable printer(s) to be shared conveniently across a network either through cabling or via wi-fi. A print server will enable a USB or a parallel printer to be connected directly to the network hence eliminating the need for dedicating a machine to perform printing task. By having a print server, the network is freed up of the “print share PC” hence an additional machine does not need to be on all the times, and also going by the fact that the printing bottle neck are eliminated, the PC will be left to perform more useful work. The print server will be directly connected to the network by 10/100 Ethernet cable, or it can be done wirelessly over 54Mbps wireless (802.11a/b/g) connections. With the wireless option, the printers can be placed wherever the organization wants them to be. Print servers come with a host of advantages because they lower the administrative and management workloads. A print server will enable the business administrator to manage and control access to each printer that s deployed in the office environment. With print server technology, it is possible to grant print permission to every individual in the group because there are features which allow users to print documents, pause, resume, start, or even cancel their documents (Cisco, 2011). With the manage document permission it is possible to control job settings for all documents, and clients computer jobs are quickly spooled to the print server compared to a printer without a print server. According to (Hewlett Packard, 2009) other business sense associated with deploying a wireless print server on the network is Reduced cost: The organization does not have to acquire a printer for every desk because employees can share and print from the same printer from any where in the office. Mobile workforce: Employees on business trips or those working form satellite offices can easily print without having a physical cable directly connected to the computer system Security: Wireless networks can also be as safe as wired system provided that few security measures are put in place Clean workspaces: By going wireless it means that the office is free from clutter and cords, there is also reduction of costs associated with non-cable network, and users can also print from anywhere in the office, not only from their desk. Networking Switches (Cisco SGE2010 48-port Gigabit Switch) Network switches helps to connect different network segments. These devices processes and routes data at the data link layer (layer 2) of the OSI model. We are going to use managed switches because they have their own IP addresses, come with a telnet, a web based interface for monitoring and securing access to each port on the switch. With managed switches, system administrators will control the network together with all the traffic flowing through it (Proactive, 2011). Benefits of using managed switches for large enterprises Virtual Local Area Network Isolation of traffic between groups of ports Controlling access tot eh various VLAN groups Bandwidth limiting You can set the maximum bandwidth rate for each port It is possible to prevent unnecessary communication traffic from overwhelming devices Quality of Service It is possible to prioritize messages Simple network Management Protocol IT is easy to monitor the switch port parameters Port Mirroring It is possible to troubleshoot errors Messages can be monitored for their contents Trunking Redundancy The relay contacts, Flashing LEDs and SNMP traps will help to quickly identify any broken links With Trunking it is possible to achieve more bandwidth between switches Cisco SGE2010 has the capability to maximize network availability by incorporating fully redundant stacking and dual firmware images. IT also boast of integrated security and authorization features which prevent unauthorized access to the networks critical information, and the additional Quality of Service (QAS) functionality will bolster the video and voice communication (Cisco, 2011). Additional features of Cisco SGE 2010 Secure encrypted management (SSH & SSL). Enhanced security that protects against man in the middle attacks (ARP inspection, IP Source Guard, DHCP Snooping, STP Root Guard). Resilient stacking for web-based management of up to four supported switches at once. Wireless Internet Router (Cisco Linksys E3000) This gadget is going to assist to forward data packets between computer networks. I is normally connected to two or more data lines from different networks. When data packets come in one of the lines, the router gadget will read the address information in the packet to determine the ultimate destination. A router has two separate but somehow related functionalities, these include: Ensuring that information does not go where it is not needed Ensuring that information travels to its intended destination In order to perform these functionalities, the router is designed to deal with these two separate computer networks because it has to join two different networks by passing information form one network to another. Routers also protect networks from one another by preventing unnecessary traffic from spilling over to the other (CNET, 2011). In our proposed network we are going to use the E3000 from Cisco because it delivers a true dual-band, Gigabit Ethernet, long range, NAS functionality, web interface, and has an aesthetically compact design (Smallnet, 2011). Key features Static and dynamic routing DHCP, Static, PPPOE, PPTP, L2TP, and Telstra cable WAN types SPI firewall, multicast, WAN ping, Java, Active X and cooking blocking Single port forwarding and port range forwarding and triggered ports HTPS administration access, remote management with IP range restriction and port setting Access restrictions with deny or allow based policies with clients lists and schedule Storage Server (DELL POWERVAULT MD1000 DAS DIRECT ATTACHED STORAGE 6 X 600GB 15K RPM S) A file server is a dedicated machine on the network that is responsible for the central storage and management of data files so that other systems within the network can access the files stored in it. With file servers, it is possible for users to share information over the network without physically transferring files by external storage medium. File servers offer security which limit access to files related to specific user groups. For instance, in large enterprises such tasks are usually delegated to directory services such as Novell e-Directory, or Microsoft’s active directory. These servers then treat users, systems, and other applications as distinct but related to entities on networks and grant access based on user or group credentials. Features of proposed system Hard drive (s) 6X dell 600 GB 15K RPM SAS 3.5 Inch Hard Drives EMM: 2X enclosure management modules Dimensions: 3U Rack, 13.11 X 44.63 X 48.01 CM (5.16 X 17.57 X 18.9 INCHES). Other Servers The rest of the servers such as the domain controllers and internet servers we will use HP Proliant DL180 G6 605664005 2U rack mount. The systems come with 8 hot swappable 3.5 inch bays which enable users to quickly and easily add and remove drives (compusa.com). Features Dual Intel Xeon X5660 2.8 GHz processor 24GB DDR3 RAM Wireless Access Points (D-Link DWL-2100AP High Speed 2.4GHz (802.11g) Wireless 108Mbps Access Point) These are gadgets which enable wireless devices to connect to wired networks using wi-fi, Bluetooth or other related standards. The gadgets act as configured nodes on wireless local area networks and they transmit and receive WLN radio signals. D link airplus has the capability to deliver transfer rates of up to 15X faster than standard 802.11b courtesy of new technologies such as packet bursting, Fast Frame, Compression & Encryption, and Turbo Mode. With these technologies it is possible to achieve a throughput which is high enough to handle video/audio streaming and bandwidth intense applications (D-Link, 2011). The device also has capabilities to support network configurations and real time network trafficking. Features Up to 108Mbps SNMP Management software bundled with it Works with point to point bridge, point to multipoint bridge, repeater, and wireless client. Firewall (Barracuda BYF210A1 210 Web Filter Firewall) These are gadgets that are designed to either permit or deny network transmissions based on some set criteria or rules, and mainly used to protect systems in a network from unauthorized access while at the same time permitting legitimate flow of information. With Barracudas BYF210A1 210 firewall system it is possible to control the network and instill internet usage policies by simply blocking access to websites which are not related tot eh enterprise. The organizations will in return benefit from more productivity from their employees and less repairs arising from damaged computer systems (Newegg, 2011). PART 2 Schematic representation We are going to begin implementing the networking from the router where internet connection enters into the ACE network. In the first diagram, there is the basic network connectivity diagram that depicts how the network is set up. We have the satellite receiver that is used to receive and send data to and from the main office block, there is also the wireless router, that will be used for wireless internet access, there is also the main office firewall which will protect the entire network, and finally there is also the workgroup switch that will also act as the entire network infrastructure switch. Diagram 1 Fig 1.0 Diagram depicting the main communication gadgets that connects the entire network Diagram 2 is showing the network architecture for the 15 administration machines. To begin with, there is the 48 port network switch which connects to the main workgroup switch in diagram 1. The 48 network switch in diagram 2 then enhances connectivity in diagram 2 where it seamlessly integrates the wireless print server, the wireless access points, and the 15 administration machines. Fig 2.0 network architecture of the 15 administration machines Diagram 3 In the third diagram we have the server room which is going to host a 48 port Ethernet switch that connects directly to the workgroup switch in diagram 1. The Ethernet switch in the server room is connecting the file server, the intellectual property, the engineering server, and the domain controller. Fig 3.0 server room network architecture Diagram 4 This shows the structure of the mechanical engineering workstations with 5 machines. There is the Ethernet switch that connects directly to the workgroup switch. The particular switch in diagram 4 connects the wireless print server, the wireless access point, two Ethernet printers, and 5 mechanical workstations. Fig 4.0 Mechanical engineering workshop network architecture Diagram 5 This is the network diagram of the software engineering workstations. This particular network connects tot eh rest of the enterprise network through its 48 port Ethernet switch that is seamlessly connected to the main workgroup switch. The rest of the machines and components in the software engineering workstation units are connected to the 48 port Ethernet switch that is deployed inside the software engineering workstations. There are three network ready printers connected to this network because f the intensity of the amount of work that is normally involved in such an environment. Fig 5.0 software engineering workstation network architecture Prototyping workshop There is also the prototyping workshop which also has a 48 port Ethernet switch. This device then connects other machines such as workstations, laser cutters, CNC mills, and the rapid prototyping machine within the prototyping workshop. Fig 6.0 prototyping workshop network architecture Boardroom Network Finally there is the boardroom network set up which is very simple. It begins with a 48 port network switch that connects a wireless print server, wireless access point, and the network printer together. Through the access point, it is possible to access the network wirelessly from any wi-fi enabled laptop system as long as you are in the board room. The boardrooms 48 port Ethernet switch also connects directly to the main enterprise workgroup switch so that resources such as internet can be shared across the office block without incurring huge costs associated with acquiring internet bandwidth separately. Fig 7.0 Boardroom Network architecture Internet Troubleshooting In the figure below a router is providing access for two LANS to the internet. The Machines on the LAN to the right diagram have access without any problem but the machines to the LEFT LAN can communicate properly but none has access to the internet. Fig 8.0 Company LAN architecture Possible Scenarios Most of the network issues experienced by computer operators mostly fall into three main categories, these are the network can’t connect, there is a dropped connection, and poor network performance. Some of the issues which can cause problems when a device tries to communicate with a server on the internet can be related to: The server is not correctly functioning or it has been temporarily removed from the internet The internet browser is not configured correctly The TCP/IP configuration for the ISP is not correct The ISP Domain Name Service (DNS) server is not properly functioning The host files residing in System drive:\Windows, System_drive:\Windows\System32\Drivers, and System drive:\Program Files\Network Ice\Black Ice directories may be damaged or corrupted Trying a good known server Incase the network cannot establish a connection with a specific server on the internet, it is advisable to try and connect to the Google website by using its fully qualified domain name (FQDN). FQDN are normally made up of the host name (in our case Google) and the domain name (.com). In case you can connect to the Google website through FQDN, then the networks TCP/IP configuration is correct. Incase there are problems connecting to some websites but can connect other websites then the problem might be with the ISP. If the network cannot completely connect to any website, then there is likely to be an issue with the Internet Browser configuration, or with the TCP/IP configuration for the ISP’s dial up connection. Incorrect Browser Configuration The network administrator has to ensure that the available internet browsers configurations are correctly configured to connect through the Internet via the dial up connection to the ISP and that the internet browser are not configured to connect through the internet via a proxy server. This is so because proxy servers act as firewall components which present single network addresses to external sites In order to verify whether the internet browsers are using proxy servers, just click on LAN settings. Also to verify these settings, open internet explorer and click on internet options, and on the tool menu, click on connections tab and view settings related to your ISP. Confirm the Internet Protocol (IP) Address Incase the ISP has issued a static IP address, it is advisable to confirm whether the TCP/IP configuration existing on the second network is the exact as it was issued by the ISP. This can be done in the following steps 1. Connecting to the ISP via the ipconfig/all command 2. Following the command is going to display Windows TCP/IP settings for all the network adapters and modem connections. The modem connection address will be displayed as “NDISWAN x adapter” where x represents a number. The default gateway for the NDISWAN x adapter is the same as the IP address. Incase the IP address being displayed for the dial up connection to the ISP does not match the IP address that your ISP issued, change the IP address to reflect the one which matches what the ISP issues Turn on the option of using the default gateway on the Remote Network Because the machines are connecting to the local network by using network adapters, and at the same time connecting he tie ISP by using a modem, it is advisable to configure the dial up connection so that the routing conflicts are resolved in favor of the dial up connection to the ISP. TCP/IP configuration This can either be manually or automated. When automating you only need to scan the system, and the network diagnostics will gather information and perform automated troubleshooting on the network connection. Manual troubleshooting You can use the IPConfig tool to verify the information This can be achieved by running the IPConfig/all command in order to determine the host computer configuration information such as the IP address, subnet mask, and the default gateway. If the local IP address is returned as 169.254.y.z with a subnet mask of 255.255.0.0, then the TCP/IP is configured automatically and has no default gateway for the interface. Incase the IP address is returned as 0.0.0.0 the DHCP media sensing feature override turned on because the network adapter has just detected lack of connection to the network or the TCP/IP detected an IP address that duplicates a manually configured IP address. Incase there is no TCP/IP configuration issues then you may Use Ping tool in testing connectivity This ping tool will assist to verify IP-Level connectivity. The ping utility will send an ICMP echo request message to a destination host. Ping can also be used to isolate network hardware problems and incompatible configurations. Incase the IP stack is not responding then the problem may be that: TCP drivers may be corrupted Malfunctioning network adapter There is a service interfering with the IP The administrator may then proceed and ping the IP address of the local computer in order to verify that the machine has been correctly added to the network. Incase the ping fails, the issue might be with the network adapter, router, or gateway device. Because also the ping uses the name resolution in resolving a name into an IP address, then incase an administrator successfully pings an IP address but cannot ping the computer name, then there must be a problem with the host name resolution and not with the network connectivity. Using path ping tool to verify routes These particular tools will assist to detect packet loss over multiple hop paths in order to verify routers on the way to the destination are properly operating. Using ARP tool to clear the ARP cache Incase it is becoming difficult to ping the loop back address (127.0.0.1) together with the networks IP address, but it proving difficult to ping any other IP address, an administrator can then use the Arp tool to clear the Address Resolution Protocol (ARP) cache. Verifying the default gateway Gateway address should always be on the same network as the local host, otherwise messages from host machines cannot be forwarded outside local network. If default gateway exists on same network as the local host, the administrator should ensure that default gateway address being used is correct, and it should be a router enabled to forward IP datagram’s. Using Tracert tool in verifying communications Incase the default gateway set up is correct the administrator can ping the remote host in order to ensure that network to network communications are correctly functioning. In case communication is malfunctioning, the administrator can use the tracert tool to trace the paths of the destination. Administrators can take advantage of vendor designated appropriates facilities in order to examine the IP routing table. Verifying the internet protocol security You have to check the IPSec policies which can deter traffic to flow. This can be achieved by turning off the IPSEC services in the services snap-in. Verify Packet Filtering Packet filtering may deter networks from flowing. This can be achieved by pinging an address by using the DNS name and the NetBIOS computer name, r the machines IP address. Incase ping succeeds; packet filtering options are likely to be mis-configured or too restrictive. Packet filtering may turn off tools such as remote administration. Conclusion Business information system networks have transformed themselves as a must have media for any business success. This requires that any organization that relies to implement these technologies should have a thorough understanding of all the technologies that are involved. It requires that the latest technologies should be implemented, and at the same time the organization should only go for people who clearly understand the business requirements. This is s\necessary so as to reduce downtime while eliminating bottlenecks because these same networks are prone to various disasters. It is in view of these facts that all mission critical networks are implemented with the most scalable approach. References Cisco ,2011, Cisco SGE2010 48-port Gigabit Switch Retrieved 22nd November 2011 from http://www.cisco.com/en/US/products/ps9984/index.html Cisco ,2012), Wireless-G Print Server for USB 2.0 (WPS54GU2 Retrieved 22nd December, 2012 from http://homesupport.cisco.com/en-us/wireless/lbc/WPS54GU2?referrer=www.linksysbycisco.com Cnet, 2011, Cisco Linksys E3000. Retrieved 22nd December 2011 from http://reviews.cnet.com/routers/cisco-linksys-e3000/4505-3319_7-34041744.html CompUSA, 2011, HP Proliant DL 180 G6 2U Rack mount Server. Retrieved 22nd November 2011 from http://www.compusa.com/applications/SearchTools/item-details.asp?EdpNo=7025026&CatId=7195 Dlink, 2011, DWL-2100AP HIGH SPEED 2.4GHZ (802.11G) WIRELESS 108 MBPS ACCESS POINT. Retrieved 22nd November 2011 from http://www.dlink.com/products/?pid=292 Hewlett Packard (HP),2009, Wireless Printing Guide – Business Benefits. Retrieved 22nd December, 2012 from http://www.hp.com/sbso/productivity/howto/wirelessprinting/benifits-wirelessprinting.pdf Newegg, 2011, Barracuda Web Filter 210 – Firewall – EN, FAST EN -1U – rack mountable. Retrieved 22nd December 2011 from http://www.newegg.com/Product/Product.aspx?Item=N82E16833354002 Proactive IT Services, 2011, What are the benefits of Managed Switches for Large Business and Unmanaged Switches for Small Business?. Retrieved 22nd November 2011 from http://www.proactiveitservices.com.au/blog/what-are-the-benefits-of-managed-switches-for-large-business-and-unmanaged-switches-for-small-business Siemon, 2011,. Siemon Z-MAX 6A UTP Category 6A System. Retrieved 22nd December, 2011 from http://www.siemon.com/us/category6a/zmax-6a-utp.asp Small net, 2011, Cisco Linksys E3000 High Performance Wireless-N Router Reviewed. Retrieved 22nd December 2011 from http://www.smallnetbuilder.com/wireless/wireless-reviews/31134-cisco-linksys-e3000-high-performance-wireless-n-router-reviewed Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Example | Topics and Well Written Essays - 4039 words, n.d.)
Network Example | Topics and Well Written Essays - 4039 words. https://studentshare.org/logic-programming/2046883-network
(Network Example | Topics and Well Written Essays - 4039 Words)
Network Example | Topics and Well Written Essays - 4039 Words. https://studentshare.org/logic-programming/2046883-network.
“Network Example | Topics and Well Written Essays - 4039 Words”. https://studentshare.org/logic-programming/2046883-network.
  • Cited: 0 times

CHECK THESE SAMPLES OF Growth of Electronic Connectivity

Optical Fiber and WLAN

Wireless Ethernet networks were accepted several years ago, as traditional connectivity solutions were replaced by robust wireless connectivity solutions.... Wireless Networks ... GA abbreviated as next generation access network technology is been motivated by Nielsen's Law concluding the usage of Internet access bandwidth increasing almost double for every 21 months....
12 Pages (3000 words) Essay

Charging of a 6-12V lead acid battery through the use of a solar panel

INTRODUCTION Introduction This introduction chapter will include the summary of the whole project.... This chapter includes the synopsis of the project itself, including its aim and detailed objectives.... Project Overview During the 1973 Middle East war, the world of energy disaster influenced the interest of developing countries in studying the solar system....
16 Pages (4000 words) Essay

Surface and Interface States of Ga Compound

Given that gallium compounds are widely used in fabrication of devices used in the application of various electronic devices, understand the properties of the gallium compounds at the surface state and interface state is imperative.... Surface states of materials can be defined as the electronic states that are found at the material's surface.... The changes of the electronic band structure to vacuum from the bulk materials are caused by the surface material termination....
25 Pages (6250 words) Research Paper

Processing, properties and applications of silicon carbide

This approach offers the possibility of large quantity synthesis of SiC of adequate quality that it suitable for electronic application and for use in other applications.... This term paper investigates the processing, properties and applications of silicon carbide.... ... ... ... The unique properties of silicon carbide have made it the material of choice in many industrial as well as everyday applications....
7 Pages (1750 words) Term Paper

Pentacene-Based Organic MIS Structures

Generally, organic electronic devices can be fabricated at a low price and low temperature due to the flexible nature of the organic electronic materials, which are the conductive polymers, used in these devices, which are not attainable from their inorganic counterparts such as silicon, copper, etc.... In this paper, we will specifically discuss the molecular structure and the electronic properties of the organic metal-insulator-semi-conductor (MIS) structures which are based on the organic material called, Pentacene....
12 Pages (3000 words) Essay

Properties of an element

Silver is used in the making of socks and foot ware since it inhibits the growth of fungi and bacteria thus reducing odors.... Therefore, some electronic products make use of silver for its superior conductivity and immunity to rusting (Silverinstitute.... rg/site/silver-in-industry/electronic/ [Accessed 13 Jun....
2 Pages (500 words) Essay

The Perspective of Using Carbon Nanotube in Everyday Life

The review 'The Perspective of Using Carbon Nanotube in Everyday Life' speaks about the greater practicality of this technology than other revolutionary scientific research and discusses whether it can, for example, become a safe and practical material for wrinkles and not soiled clothes.... ... ...
32 Pages (8000 words) Literature review

Properties Carbon Nanotubes

This essay "Properties Carbon Nanotubes" draws attention to nanotechnology.... Nanotechnology is one of the sophisticated techniques to achieve an easy and comfortable future.... The use of carbon in nanostructured forms of fullerenes and carbon nanotubes are important innovations in nanotechnology....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us