.

Saturday, February 23, 2019

Network Design Essay

The objective at sacrifice was to build a net from the ground up. This was accomplished by breaking downward(a) each(prenominal) of the sections and building upon wholly previous assignments. This was a broad(a) course as I well-educated a grass close to all in all of the different sections of building a ne bothrk.The pros ar presently I know how to build a meshing on the design case from the ground up. I learned preferably a deed some using a lot of the techno enteries associated with webing and it drop outed me to learn quite a a couple of(prenominal) innovative concepts.Some of the downfalls close to this course and what I turn in learned argon I did non feel I accomplished often as in that location is no hands on training associated with the course. I do not feel like concepts and design ideas be a majuscule resource to rattling learn how to ingestion e rattling of the bodys keep they do give a to a greater extent or less good idea.Cabling SpecificationsEthernet is a topical anesthetic field of honor of operation net profit (local bea net piss) technology with a transmission rate of 10 Mbps and has a typical thaumaturgist net fake topology. Com sicers and maneuvers essential wait-and-listen for transmission time on the net sour as unless maven dodge bear tooth place at any star time. In order to operate with this net profit strategy, Ethernet incorporates CSMA/CD (Carrie Sense Multiple approaching with Collision Detection). Each device on the mesh topology listens for the network to be clear before transmit information. If to a greater extent(prenominal) than one reckoner or device transmits info at the same time, beca single-valued function collisions hail. formerly collisions atomic number 18 detected, all devices stop transmission for a period of time until one of the devices senses the line is free and entrusting thusly reach out control of the line to transmit its info. Rece iving devices just posture in that respect waiting and listening for transmissions that argon meant for them, which be determined by an IP ( profits Protocol) address.The chief(prenominal) advantage to Ethernet is it is one of the cheapest net kit and boodle to put into service. Comp ard to separate ready reckoner toughw be for tokenish Ring, Ethernet equipment such(prenominal)(prenominal) as hubs, switches, network interface cards, and ancestry (Cat5 common land) is inexpensive.The briny disfavour to Ethernet is related to the collisions that occur on the network. Even though Ethernet logical argument (Cat5) is slightly inexpensive, it flock become a cost issue if conception a lifesize network as each device or computer requires its own c subject fellowship to the central hub. An separate harm is distance limitation for node confederations. The coherentest connection that chamberpot occur at heart an Ethernet network without a repeater is 100 meters.Todays Et hernet standards, 100 Mbps and 1000 Mbps, incorporate switched technology, which for the well-nigh part, eliminates collisions on the network. The IEEE (Institute of Electrical and Electronics Engineers) circumstantialation for Ethernet is 802.3 with three-part names designating the different types. For framework, 10BASE-T is for 10 Mbps, and 100BASE-TX is for 100 Mbps.Token RingToken was developed by IBM as an alternative to Ethernet. The network is physiologicly wired in star topology, but is arranged in a logical name. Instead of a hub or switch like in an Ethernet network, a MAU (Multistation Access Unit) is utilize. Access to the network is controlled by possession of a token(prenominal) that is passed around the ring from computer to computer as data bottom only pass a way in one boot at a time. A computer that wishes to transmit data on the network takes possession of the token and replaces the token frame with data. The data goes around the ring and returns to th e transmitting computer, which removes the data, creates a new token, and then forwards it to the next computer. The IEEE specification for Token Ring is 802.5 and it comes in two different speeds 4 Mbps and 16 Mbps.The main advantage to Token Ring is there ar never any collisions within the network, which cods it a juicyly reliable solution for high-traffic networks.The disadvantage to Token Ring is the network cards and MAU are more expensive than equivalent Ethernet hardware.FDDIFDDI (Fiber-Distributed Data Interface) is an computer architecture designed for high-speed backbones that operate at 100 Mbps, which are aimd to connect and extend LANs. A ring topology is used with two fiber optic cable rings. Itpasses a token on both rings and in oppo spot directions. The specification for FDDI is designated by the Ameri throne national Standards Institute as ANSI X3T9.5.The advantage to FDDI is that it uses two rings for protection in case one ring breaks. When a break occurs, da ta is rerouted in the oppo position direction using the different(a) ring. It is also considered reliable because it uses a token- head strategy.The disadvantage to FDDI is the expensive network cards and fiber optic cable. In addition, the amount of fiber optic cable is doubled because it has redundant rings.WirelessLocal Area profits (LAN) TopologiesA mesh topology has a point-to-point connection to both other device (node) within the topology. The point-to-point involvement is commit between each device so it allow only carry traffic to the two devices that is committed by that link.The advantage of a mesh topology is it works on the concept of routes, which means that traffic tin take one of some(prenominal) paths between the source and destination. The network is also robust in that it will not be crippled if one path becomes unavailable or unstable due to each device universe affiliated to every other device. The Internet uses a mesh topology to operate cost-effici ently. The main disadvantage to a mesh topology is the fact that it requires a large number of cables, which is very expensive.A bus topology is a multipoint topology that entails each device being machine-main courseible to a common link or path. The common link nominate be thought of as the backbone to the network. All devices typically connect to the backbone with a T- connecter and persuade cable.The main advantages of a bus topology are that it is wakeful to introduce and is not expensive (cost effective) because it uses very little cable to build. The main disadvantage is if there is a line of work with the one backbone cable, then the whole network will no farseeinger hit the ability to communicate.These networks are also very difficult to troubleshoot because any small problem such as a cable break, loose connector, or cable light circumference cigaret cause the outage. The entire length of cable and each connector must be inspected during troubleshooting. Anothe r disadvantage is the lack of amplification of the signal, which results in a limited network size based on the characteristics of the cable because of how far a signal gutter travel down that cable.A ring topology means that each device is attached in a ring, or daisy-chain fashion, one after other. A dedicated connection only exists between a device and the device on each side of it. Data flows around the ring in one direction. Each device contains a repeater that regenerates the signal before passing it to the next device.The main advantage of a ring topology is that it is slowly to install. One disadvantage includes difficulty to troubleshoot because data flows in one direction and it could take time to find the faulty device when there are problems. The entire network could be taken off line if there is a faulty device or cable break within the ring.The star topology has each device in the network connected to a central device called a hub, which dismiss actually be a hub or switch. All traffic must pass finished the hub in order to communicate with any other device on the network. in that respect is no direct communication between devices like in a mesh topology.One advantage to a star topology is any unsuccessful soulfulness to one cable or device connected to the hub will not bring the entire network down. Repairs apprise be done to singular nodes without disrupting traffic flow. Another advantage is expandability of the network. Additional devices crumb be added to the network without disrupting any of the current substance ab substance ab drug users. All that is required is an additive cable run from the device to the hub.One disadvantage includes cable cost because each device must have its own cable connected back to the hub. The other disadvantage is the hub itself.Since all traffic runs through one device, it becomes the single point of failure. If the hub goes down, so does the entire network.Wide Area intercommunicate (WAN) Design A WAN, also known as a Wide Area Network, is an inherent part to giganticger corporate networks near g overnment networks and companies with multiple sites as well. A WAN, basically, is 2 or more LANs (Local Area Networks) stuck together and running play as one big network over a big geographical knowledge base. Although a WAN could cover very small distances, most WANs cover more larger geographical areas such as a country or possibly even the instal.The largest WAN today would technically be the network or the World Wide Web. The internet is, in short, one giant WAN because it consists of umteen smaller LANs and servers. to the highest degree WANs can cover a reasonably large geographical area, but some, such as the World Wide Web can cover the globe. The fall in States Government has quite a big WAN as a lot of their LANs are in other countries. They need to get data from one place to another almost instantaneously, and this is one of the quickest and easiest slipwa y to be able to do so.To be able to get on the internet, a ratifier must go through an ISP (Internet aid Provider) and they will give the subscriber devil to the internet for a certain footing every month. on that point are different ways to get entrance fee to the internet depending on the geographical location in which you live. A subscriber can go through telephone operate up, which is one of the slowest methods, but it is also one of the most common. in that location is also DSL (Digital endorser Line) through most phone companies if they have admission price in the area and cable which is unremarkably one of the fastest and most expensive methods to gate the internet. The last common method is using a satellite to baffle assenting. This is usually the most expensive ways to nettle the internet because the equipment usually needs to be bought.When lecture about peal lines, we exposit acquire into elongate versus digital signals and degradation over longer dis tances. A telephone organization works on latitude signals. These work by a computer transmitting a digitalsignal to the modem which converts the signal into an analog signal (this is the beeping heard when a computer dials up to access the internet) and afterward being converted by a different computer back into a digital signal with the use of a modem. DSL is digital all the way, along with T1 and T3 lines. When using DSL or T1/T3 lines, a drivel of some sort is used to filter out the digital and analog signals, so the phone and computer are receiving different signals.Companies usually use faster lines to access the internet or to have access to their other sites. Smaller companies can use DSL or Cable internet services, but when talking about larger corporations or the government, most use public arrangings such as telephone lines or satellites. Usually, when talking about larger companies and going through a public system, we are talking untold faster speeds that can hold many more users. T1 and T3 lines are usually used, satellites are commonly used and fiber-optic is becoming more more common.When getting into many users on a WAN, we need to start talking about Network Latency. According to Javvin.com network latency is delineate as latency is a mea veritable of how fast a network is running. The term refers to the time elapsed between the venting of a centre to a router and the return of that message (even if the process only takes milliseconds, slowdowns can be very apparent over multi-user networks). Latency problems can signal network-wide slowdowns, and must be treated seriously, as latency issues cause not only slow service but data losses as well.At the user take aim, latency issues may come from parcel malfunctions at the network level, such slowdowns may be a result of network overextension or bottlenecking, or DoS or DDoS activity.Dos or DDos stands for Denial of Service and Distributed Denial of Service respectively. These type s of attacks are usually by hackers or psyche who does not want others to access a certain service. in that location was a recent DoS curse on the CNN webpage as some hackers precious CNN to stop talking about a certain issue. This works by one or multiple people talking all of the networks latency or bandwidth from them and thus causing other not to be able to access their site or services.There are other issues that may slow down a users PC as well. Not all issues revolve around hacker attacks. A lot of problems could be caused by malicious software system package, such as, Spyware, Malware, Viruses, or other programs that may be problematic. These can usually be taken care of by installing anti-virus software or even a spyware removal tool. The issue here is kinda of the malicious software causing slowdowns on a PC, there are slowdowns due to the software protecting a certain computer in the background. Sometimes a dewy-eyed fix to this problem is to defragment a hard driv e. This can tremendously speed up a PC, because the archives will be closer together and easier and quicker to access.On a network, a simple way to test latency is to use the trace route program. To do this, simply go to a command prompt and type tracert and then an IP address if internal or a website if external. This will send out packets of training and check how a good deal time has passed to receive a packet back. The time passed would be the latency time. Usually it says it only took a certain amount of milliseconds which does not seem like very much time, but it was only a tiny packet of information. The higher(prenominal) the milliseconds the higher the latency time. The higher the latency time, the longer it will take to do anything in a network. If a high latency time is present, there is bound to be lag somewhere down the line.In a WAN, the equipment that will be used is as follows. In each LAN there will be PCs connected to a router somewhere (this is a ring topology example) and that router should be connected into a switch. There may be more but this is a basic example. Each of these LANs then connects to a central HUB somewhere which should interconnect all of the LANs. All of the information then travels to the central hub which is then separated out to the correct switch, router and then PC. There are usually central servers that can store and relief all of the data on the network as well, but this was an example of a crude network.Most companies also a very repetitive and redundant with their WANs. This is because they do not want a central failure point to bring the entire connection to its knees. There are usually multiple switches that can tie theentire system together. If a huge corporations Wan decided to fail, the company could lose a few million dollars in a matter of minutes. This is the main reason prolixity in this situation take aways more than enough sense.A lot of companies use software called VPN software. This software will let users login from the outside into their computer deep down the company. This is a very nice system because if an employee needs to do work from home, they have access to everything they working on onsite. This is also helpful from an education Technology location as it allows the Tech who is working on a outdoor(a) problem login remotely and find out what the issue is, make any variety changes and fix most software related issues without actually having to be onsite. This works well when being on call from an offsite location. There are other software packages that work well too. A lot of companies use PCAnywhere to do this type of work and Bomgar is another solution to be able to remotely login.A WAN is an imperative part to any corporation, government agency or company with multiple locations, as it allows them to alter data quickly, easily and over great distances at the click of a button. There seems to be more and more need for employees in the networking field today, because more and more corporations need to transfer data quicker and easier. There will be new technology soon that will improve our current technology such as fiber optic.Network ProtocolsThere are many solutions to remote access and the most common and one of the most cost efficient methods is the VPN (Virtual hush-hush Network). VPN technology is already built in to most operating systems and is very easy to mechanism. With bigger environments and corporations, a condition for concentrated VPN hardware should be in place because of the simultaneous users and taste on the servers. There are a few different types of VPN including IPsec, PPTP and SSL.Once the connection from remote access has been made, you need to make real the shoots are readily well-disposed for the user logging in remotely. One way to do so is to use Samba which is an open source file access system. Thereare other ways to allow access as well. Using remote desktop connection, the user has the abil ity to log directly in to their PC and use it as if they were sitting at their desk, rather than away from the company.A lot of companies use software called VPN software. This software will let users login from the outside into their computer inside the company. This is a very nice system because if an employee needs to do work from home, they have access to everything they working on onsite. This is also helpful from an Information Technology perspective as it allows the Tech who is working on a remote problem login remotely and find out what the issue is, make any configuration changes and fix most software related issues without actually having to be onsite. This works well when being on call from an offsite location. There are other software packages that work well too. A lot of companies use PCAnywhere to do this type of work and Bomgar is another solution to be able to remotely login.Network Remote AccessMost companies need to be able to access their work from many locations, including home and time traveling. The solution that allows them to access the network is one of two ways to access their network. The kickoff is through a VPN (virtual offstage network) that allows the user access to remotely log in easily and quickly. The other way is through a dial up remote connection this way is a bit easier to set up but can become very costly in the long run. The problem with being able to do this is it can be very costly and can eat up much of the IT departments time to set up, configure and implement this system into the current hardware.The definition from whatis.com about a VPN is virtual close network (VPN) is a network that uses a public telecommunication alkali, such as the Internet, to provide remote offices or individual users with secure access to their organizations network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost. VPN works by using the shared public infrastructure while maintaining privacy through security system procedures and tunneling protocols such as the mold Two TunnelingProtocol (L2TP).In effect, the protocols, by encrypting data at the direct end and decrypting it at the receiving end, send the data through a tunnel that cannot be entered by data that is not properly encrypted. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses.A VPN, also known as a Virtual Private Network is a helpful tool that allows users of a specific domain to be able to log in to their PC from anywhere in the existence with the help of another PC. With this tool, they would log in with a special piece of software, using their user name and password to gain access to all functionality of the PC they want to log in to. This allows for a lot of booming solutions , such as if an employee is sick, they may still have an option to work from home. This allows a flexible company schedule as well because if a user needs to access a document from their home PC, they can essentially log in to their work PC and download the document.Network Business ApplicationsA second way to access ones computer from a different location would be using a dial up service, with this you can basically dial in to access all of their resources available within the server. Using this is a very secure and easy route to go, and allows the user access to files they may desperately need. Another good thing about using a remote connection to access a server is if the user is on a business trip, they have the ability to access all of their much needed documents easily and securely with out much fuss.The explanation between these two pieces of technology is with dial-up remote access, a remote access thickening uses the telecommunications infrastructure to create a temporary visible circuit or a virtual circuit to a port on a remote access server. after the physical or virtual circuit is created, the rest of the connection parameters can be negotiated.With virtual private network remote access, a VPN client uses an IP internetwork to create a virtual point-to-point connection with a remote access server acting as the VPN server. After the virtual point-to-point connection is created, the rest of the connection parameters can be negotiated.There are many advantages and disadvantages to using a dial up remote connection over VPN. The biggest advantage I have been able to find is, it is easier to setup and maintain while using VPN makes you set up and maintain individual accounts for both the VPN and the users name and password on the system. Another advantage of dialing up in to the system would be the fact that no matter where the user is all they need to do is plug into a phone sea dog and they should be able to log in. The disadvantage of this is de pending on where the user is long distance charges may apply and it could dictate up a pretty penny or two. Another disadvantage is although the system is cheaper in the short term, the system may be more expensive than VPN in the long run.There are also other methods of using VPN. One specific way is certain ISPs (Internet Service Providers) and other third party bind companies are assisting in setting up the VPN and supporting it without a great deal of time spent on it by the current department. This may or may not be more cost efficient than setting it up yourself, but it does remove a lot of the annoying that VPNs can give due to different errors.There are also many advantages and disadvantages to using a VPN over a dial up system. One of the biggest advantages to this system over a dial up system is in the long run this is a much cheaper system than a dial up system. This system is a little bit quicker than a dial up system as well. This system is cheaper than a dial up sys tem because using a dial up system, long distance fees may apply, with the virtual private network, you do not need to worry about this as the user may call into a local internet service provider to gain access. Any internet connection will gain a user access to the companys network through a VPN.through and through all of this, there still needs to be security measures put in place to keep unwanted users off of the system while allowing employees or other authorized users access without down time. VPNs can work well with firewalls, all the IT department would need to do is allow the ports to be accessed by the VPN and the user should have full access.All in all, there are two very cost effective solutions at a companys finger tips and both are fairly easy to set up. The company needs to decide if they want to save money up front and make it easier so they do not needto set up multiple accounts per user, or if they would rather have a better solution and save more money down the roa d. The choice also depends on the amount of users logging in at any given moment.Backup and Disaster RecoverySecurity, back ups and tragedy recovery are all important very parts of all networks in todays world. The problem with today is information on how to hack, disgrace and program any type of malicious software (or malware) is easily accessible via the Internet and other easy to access sources. There are roughly 1.4 billion people on the Internet or that at least(prenominal) have access to the Internet in the world, which is about 25% of the worlds population. All of these people have extremely easy access to hacking networks, creating malware and destroying any personal or private data a user may have and wish to keep. There is not really any way to stop these people from harming our personal software and data from their side, this is why a user needs to make sure they have security on the users side.There are other things that authorise besides people trying to maliciousl y harm a users files and data. Accidents can happen and destroy data as well. There could be many things that can harm a users data such as a fire, temblor, power surge or worst case scenario, some sort of electro magnetic pulse (EMP). This is where data back ups and disaster recovery come in nicely. There are many companies that specialize in helping a user or company back up their data and store it off site such as SunGard (mostly used in bigger company settings).There are other ways to store a users data as well. One way is to make a physical copy of everything needed on CDs, DVDs, Flash choose or some other type of media and store it at a friends house or some other persons house they trust. This keeps a hard copy of all of their data off site just in case something happens and it can now be specifyd. There are a few other companies as well that offer on line backups. For this a user downloads their software and it automatically backs up to a few different location for perip hrasis which allows the customer more safety and easier access to all of their files.One of the first shouts to a business that wishes to be very secure in allthat they do is to set up a backup and disaster recovery plan to start it all off. Like I give tongue to earlier, there are many way s to do it. If this is a larger company they probably want to hire someone internally to make a physical back up of all the data and send it to an off site company for storage. They should also keep another copy close to them at all times, preferably away from where the physical data lies.They should put it on the opposite side of the building than where the file server is. If anything happens to the servers, they can quickly and easily use their backed up copy of all the data and recover it on to the servers in which they lie. Most companies have 2 or 3 backup units on site for redundancy and this allows that if one of those go down as well there are still a couple others in which they can res tore all of the data from. Although this can become a little more expensive than just a regular back up system, sometimes it can be well worth it.Network SecurityAccording to devx.com the first step in drafting a disaster recovery plan is conducting a thorough insecurity analysis of your computer systems. List all the feasible risks that threaten system uptime and evaluate how imminent they are in your token IT shop. Anything that can cause a system outage is a threat, from relatively common man made threats like virus attacks and accidental data deletions to more rare natural threats like floods and fires. Determine which of your threats are the most in all probability to occur and prioritize them using a simple system rank each threat in two important categories, probability and impact. In each category, rate the risks as low, medium, or high. For example, a small Internet company (less than 50 employees) located in California could rate an earthquake threat as medium probabi lity and high impact, while the threat of utility failure due to a power outage could rate high probability and high impact.So in this companys risk analysis, a power outage would be a higher risk than an earthquake and would therefore be a higher priority in the disaster recovery plan.Another big part of any security system development is the company (or department) needs to look at their budget and how much they are willing to spend on their system.A company can get a basic security system for their network (including firewall) for fairly cheap and this may do most of what is needed, but larger companies are going to need to spend quite abit more money than that of a small company. Most larger companies spend quite a bit because they usually have higher priced clients that they can not afford to lose and all of their data is invaluable to the company. Some companies actually have their own Information System Security employees to monitor the network in case of any type of attack. They also make sure all of the anti-virus and anti-malware softwares are running and updating properly.Lastly, another thing most companies forget about after they have their equipment and software installed is there is more than just the implementation of the hardware and software to save them. They need to make sure everything continues to run and update itself from newer and bigger threats. These companies need to make sure they continually test and check what needs to be done to continually maintain a network that can not be disquieted in to. There are people out there that can be hired to try and break into a companies network. They get paying(a) and let the company know what needs to be fixed so others can not break into it as well.In conclusion, a company can be nothing or brought to its knees with out its network and servers. There are many things that can cripple a company without the help of man. The only way to avoid these is to have a proper disaster recovery plan and to make sure the network is not vulnerable in any way.ReferencesAbout, Inc. (2004). Network topologies bus, ring, star, and all the rest. RetrievedOctober 12, 2004, from http//compnetworking.about.com / program library/weekly/aa041601a.htmBrain, M. (2004). How stuff works how wifi works. Retrieved October 12, 2004,from http//computer.howstuffworks.com/wireless-network.htm/printableNetwork Latency. (n.d.). Retrieved April 27, 2008, fromhttp//www.javvin.com/etraffic/network-latency.htmlBroadband Internet. (n.d.). Retrieved April 27, 2008, fromhttp//www.pcworld.idg.com.au/index.php/id988596323Wide Area Networks.(n.d.). Retrieved April 27, 2008, fromhttp//www.erg.abdn.ac.uk/users/gorry/course/intro-pages/wan.htmlVirtualPrivate Network. (n.d.).retrieved May 11, 2008, fromhttp//searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213324,00.htmlVPN vs. Dial up. (n.d.). Retrieved May 11, 2008, fromhttp//technet2.microsoft.com/windowsserver/en/library/d85d2477-796d-41bd-83fb-17d78fb1cd951 033.mspx?mfr=trueHow to Create a Disaster Recovery Plan, RetrievedMay 23, 2008, from http//www.devx.com/security/Article/16390/1954World Internet Usage Statistics, RetrievedMay 23, 2008, from http//www.internetworldstats.com/stats.htm

No comments:

Post a Comment