Computer Network Design Project Essay Example
Computer Network Design Project Essay Example

Computer Network Design Project Essay Example

Available Only on StudyHippo
  • Pages: 14 (3624 words)
  • Published: January 8, 2018
  • Type: Project
View Entire Sample
Text preview

The company has its main headquarters in Illinois and additional facilities in four other states. Each facility or office consists of four main departments: maintenance, accounting, receiving, and shipping. To effectively manage these departments across multiple locations, access to data, programs, and applications is required through a Local Area Network (LAN), a Wide Area Network (WAN), and remote access.

The goals of the network, both LANA and WAN, are to create a secure and easily expandable network that enables real-time data transfer. When planning the LANA for Cacophonic INC, various factors were considered. The main concerns were the integrity and accessibility of data on the network, as well as the ease of expanding it. Additionally, it was determined that each department should be able to share peripheral devices like scanners, copiers, and printers.

"justify">
To ensure efficient setup, each facility will utilize a star topology for its LANA (Local Area Network). In the case of Cacophonic Inc., their LANA will consist of Cat 5 e and abases-T cables, providing necessary speed and integrity for the network design. Additionally, this layout enables easy expansion, management, and supports future company goals. When it comes to connecting the facilities through a WAN (Wide Area Network), it is crucial to consider the WAN requirements.

Cacophonic Inc. has certain requirements for their WAN. Firstly, each facility needs to be connected to the WAN to provide access to financial data for accountants at headquarters. The WAN should support approximately 40 users at a time, with each user spending about an hour on the WAN. Additionally, due to constant data access, a synchronous connection is needed between each facility's LANA. Taking thes

View entire sample
Join StudyHippo to see entire essay

factors into account, a SODS connection is considered the optimal choice for Cacophonic Inc.'s WAN.

Data security is crucial for Cacophonic Inc., especially when accessing sensitive data off-site. To address this, security measures are implemented to enable secure viewing of the data. A VPN is utilized for remote network access, ensuring that only authorized clients can connect to the organization's LANA. These authenticated VPN connections provided by Vans enable Sophocles Inc. to connect to its branch offices over a public network while maintaining secure communications.

With these specifications in place, Cacophonic Inc. can facilitate network growth and ensure continued accessibility for uninterrupted production in various circumstances.

The growth and security of the network will be limited by the financial resources allocated to it. When constructing the Cacophonic Inc. network, the cabling contractor must adhere to the following checklist:

- Use Category E Cable to connect all devices to the central hub porterhouses RAJA. Ensure that the Category E cable segments are no longer than 100 meters in length.
- Use T cable to connect all hubs to the Embosses RAJA. Ensure that the T cable segments do not exceed 100 meters in length.
- Topographically INC is an organization specializing in aircraft maintenance with headquarters in Illinois and facilities in four other states.

Each facility or office is primarily made up of four departments: maintenance, accounting, receiving, and shipping. Each department further consists of specialty groups to enhance work production. To facilitate seamless operations, it is essential to establish a Local Area Network (LAN) for Cacophonic 'NC. This LAN will enable constant sharing of data, programs, and various applications across departments. When planning the LAN, it is crucial to consider

factors such as maintaining the integrity and accessibility of network data and ensuring the network is easily expandable.

The data requirements of each department's specialty groups include the need for both sharing and saving data in accessible locations. For example, accounting positions need access to shipping and receiving data to keep financial records up-to-date. However, the shipping and receiving departments do not need access to the accounting department's data. To achieve this, a central storage unit or server dedicated to data and file sharing among all four departments can be utilized.

Cacophonic INC has specified that data accessibility over the network is crucial. In addition, daily backups of department-specific data are required, and all financial data should be saved indefinitely in a secure location. Furthermore, each department should be able to share peripheral devices such as scanners, copiers, and printers. Cacophonic INC also wants to provide external access to the LANA for employees who are traveling or away from the facility.

To ensure security, it is important to implement both internal and external authentication processes for every employee. Cacophonic 'No's LANA should also plan for potential expansion needs in order to support future devices. One of the main worries among Cacophonic employees is the sharing of data between departments, even if there is a network segment failure. According to Walton (1990), network topology pertains to the arrangement or structure of interconnections within a computer network that links all microcomputers and other computer devices.

When it comes to network topologies, there are three most commonly used (Halberd, 2005); these topologies are: bus, ring, and star. However, based off of the specifications mentioned above, the most effective

topology to be used in each of the Cacophonic INC offices would be the star topology. The star topology is a network that uses a central unit, often referred to as a hub or switch, to host a set of cables that radiate out from the hub to each node or workstation on the network (Halberd, 2005, p. 43). According to Cisco Systems, Inc. Intertwining Technology Handbook (n. . ):A hub is a physical layer device that connects multiple user stations, each via a dedicatedly. Electrical interconnections are established inside the hub. Hubs are used to create physical star network while maintaining the logical bus or ring configuration of the LANA. Income respects, a hub functions as a multipart repeater. ('1 20)So instead of each station being directly connected to one another, such as in a standard bus or ring topology, a star topology allows for each device on the network to have a point to point connection with the central hub.

The main advantage of employing the star topology is that it decreases the likelihood of network failure as every device linked to the network is directly connected to the central hub. Therefore, if any individual network connection becomes faulty (cut or damaged), only that specific connection is affected (Halberd, 2005, p. 45). When the star topology is implemented in a bus-based network, where an Ethernet connection is used, the central hub replicates all received transmissions from any connected node to all other nodes on the network.

Hence, in a star topology, all connected nodes communicate with each other through the central pub only. If a network segment fails, the node connected to the

central hub will be isolated, while the other nodes will continue functioning properly, but won't be able to communicate with the isolated node. If any individual node connection malfunctions, it won't affect the other nodes. However, if the central hub fails, the entire network will be affected (Technocrat, 2006).

The star topology offers the advantage of reducing network failure and is also the most easily expandable. It relies on the number of ports a hub has and can be expanded by connecting additional hubs to the central hub using patch cables. These additional hubs are called patch panels. To add a new device, like a printer or workstation, it can simply be connected to the central hub or the patch panel.

However, the setup for the LANA topology in Cacophonic INC. will be relatively simple. Each node will be connected to the hub with its own cable, resulting in a star topology. This layout is the best choice because it allows for easy expansion and accessibility. The different departments in Cacophonic Inc.'s offices will be connected to each other using the star topology LANA. These connections will terminate at separate network devices that are located in an intermediate distribution frame closet (DID).

The DIF closets on the network will be connected to a main distribution frame closet (MAD) via a switch. The MAD closet contains the switch responsible for connecting to the network's router. This setup offers the advantage of compatibility with different cabling options. In Cacophonic Inc.'s star topology LAN, Cat 5e and abases-T cables will be utilized. Cat 5 cabling supports data transfer rates of 100 megabits per second, enabling the use of

abases-T Ethernet, also known as Fast Ethernet.

The network design for Cacophonic Inc. will be supported by Cat e and abases-T cables to ensure speed and integrity. These cables are the best options due to the company's close network layout, which also allows for future network expansion and management in line with its goals. Cacophonic Inc. has a total of five offices, including its headquarters in Illinois and four other offices located in different states.

Each location is divided into four main departments and further into specialty groups. To facilitate data sharing and access within each group and department, star topology LANAs will be installed in all locations. However, the headquarters will need to connect to each location daily, particularly for the accounting system. To achieve this, a Wide Area Network (WAN) will be utilized to connect the Lana groups over long distances.

WANs are used to connect offices within the same city or to connect local offices to facilities worldwide. According to Cisco (n.d.), a WAN is a broad geographic data communications network that utilizes transmission facilities provided by common carriers. WAN technologies operate at the physical, data link, and network layers of the Circumference model. Connect to any of the other four offices' WAN to monitor financial data.

By enabling accountants to exchange data more rapidly than traditional methods like mail or email, Cacophonic Inc. aims to create a sense of proximity among accountants. The key factors in building Cacophonic Inc.'s WAN involve understanding the requirements and determining the fitting technology to achieve them.

Requirements: All five locations need to be able to connect, or rather be connected to the WAN to

allow the accountants at headquarters access to all financial data. Must allow for approximately 40 users at any given time on the WAN that use the WAN for approximately an hour at a time. The amount of data being transferred and shared does not usually exceed that of 1 JOB. The accounting application software that Cacophonic Inc. uses requires an encoding rate of 40 Kbps. Due to constant accessing of the data, a synchronous connection will need to be established between each of Cacophonic Inc.'s Lana. Bandwidth Calc determines the requirements listed, it states that the data accounting application software that is used requires an encoding rate of 40 Kbps. So to calculate the total data transfer, the following calculation is used: First calculate he data transfer per minute. 040 Kbps multiplied by 60 seconds per minute = 2,400 kilobits per minute. Next the kilobits per minute need to be multiplied by the average time on the WAN. 02,400 kilobits per minute multiplied by 60 minutes = 144,000 kilobits. Convert the total kilobits to kilobytes. 144000 kilobits divided by 8 bits per byte = 18,000 kilobytes. Convert the total kilobytes to megabytes. 09,000 kilobytes divided by 1 ,024 = 17.58 Mambo, to calculate the required WAN connection bandwidth, the following calculations are used. First multiply the maximum concurrent users by the encoding rate.

When designing a WAN, it is important to take into account the available services and determine the suitable connection type. The conversion from 1,600 Kbps to megabits per second is achieved by dividing it by 1,024, resulting in 1.563 Mbps.

A WAN connection encompasses various components like cables, switches, and routers on

the physical level. It also includes the methods employed for transmitting data on the data link layer and the network layer. Warren Wheaton (2000) categorized three types of WAN connections commonly provided by carriers: circuit switched connections, dedicated connections, and packet switched or cell switched connections. Additionally, Halberd (2005) mentions Digital Subscriber Line (DSL) as another type of connection.

Circuit Switched Connection refers to the transmission of data streams and datagrams over dedicated physical circuits. Telephone companies utilize circuit switching for providing asynchronous dial-in and Integrated Services Digital Network (KIDS) services (Wheaton, 2000, Para. 3). However, due to their limited bandwidth, circuit-switched connections are not recommended for Cacophonic Inc.'s WAN. On the other hand, dedicated connections, unlike circuit switched connections, use point-to-point serial connections to establish a fixed or permanent connection with a remote network.

Dedicated connections are impressive because they can achieve speeds up to 44.736 Mbps over a public carrier's network. They require less overhead than other types of connections, making communication between two locations easier. With their low overhead and high bandwidth, dedicated connections are ideal for companies in need of WAN connections with a large bandwidth. Typically, dedicated connections are the highest in performance compared to other options.

Packet switched or cell switched connections, also called compassionately-switched or cell-switched connections, are point-to-point connections that allow data to travel through a public carrier's network. These types of connections offer higher bandwidths compared to circuit-switching connections but at a lower cost than dedicated connections. Examples of packet-switched and cell-switched networks include Frame Relay (packet switched), X.5 (also packet switched), and Asynchronous Transfer Mode (ATM) which is cell switched.

One type of connection that guarantees

high-speed data transfer for office-to-office connectivity is DSSSL. Additionally, DSSSL runs over traditional twisted pair copper wire, making it accessible in most areas. Despite being more expensive than standard dial-up, DSL remains affordable for most small businesses.

When choosing a DSL connection, there are various options to consider:
- Asymmetric DSL (ADDS): allows receiving up to 8 Mbps of data and sending up to 1 Mbps.
- High-speed DSL (HEADS): supports connections ranging from 768 Kbps to 2.048 Mbps between two sites.
- Rate-adaptive DSL (RADAR): enables receiving between 600 Kbps to Mbps of data and sending between 128 Kbps to 1 Mbps of data.
- Symmetric DSL (SODS): offers bidirectional connectivity with data transfer speeds ranging from 160 Kbps to 2.048 Mbps.

Cacophonic Inc. has opted for a SODS connection as their WAN solution. This choice is based on the fact that SODS meets their data transfer speed requirements and is cost-effective, utilizing existing telephone lines. Additionally, SODS provides an open and constant connection. To establish this DSL connection over LANA, Cacophonic Inc. will need an ISP-provided DSL router for each location. Access routers are also utilized to connect multiple Lanas and serve as gateways to the WAN. It is important for Cacophonic Inc. to establish an enterprise-wide account with an ISP in order to maintain a constant connection, enabling effective monitoring of daily financial data at each location within the company headquarters.

Overall, Cacophonic Inc.'s chosen connectivity option for their WAN is a SODS connection

The reason for choosing this option is because it is not only the most cost-effective for Cacophonic Inc., but the SODS also provides the required bandwidths to meet the network requirements. Network Remote Access refers

to the technologies that connect a computer in a remote location to a network, transparently. In simpler terms, remote access methods are used to connect devices on different networks. One such method allows users to access their computers from another computer over the Internet, LANA, or phone connection.

There are two methods available to gain access to the organization's network on a computer from a remote location: Dial-Up and Virtual Private Networks (VPNs). Dial-Up remote access utilizes the telecommunications infrastructure to establish a temporary physical or virtual circuit to a remote access server port connected to the corporate network (Microsoft, 2003, Para. 2). However, this method necessitates the use of woo modems.

The client utilizes a single modem, connected to their computer, to establish a connection with a telephone-line and dial into an Sip's node. Once connected, they can establish a secure modem-to-modem link with the remote server's modem at a different location. This link allows for a secure connection through an authentication or authorization process involving LANA and operating system protocols. On the other hand, Vans offer a more active form of security by encrypting or encapsulating data for transmission through an unsecured network. This is achieved through protocols installed on both the remote access client's device and the organization's remote access server. Therefore, by using the VPN method, a VPN client can establish a virtual point-to-point connection with a remote access server at another location using any IP network. In essence, a VPN is an encrypted communications network tunneled through another network and assigned to a specific network using designated protocols.

Although both methods provide a secure connection over an unsecured network,

their approaches to achieving this security vary. Unlike dial-up remote access, which requires explicit security features like authentication or authorization, a VPN establishes a secure tunnel network with encryption. Consequently, Cacophonic Inc. has chosen to implement a VPN in order to facilitate private connections over the Internet to its network.

The Cacophonic Inc. Network plans to use a VPN for accessing the network remotely. However, it is crucial to analyze the VPN remote access in detail. There are two methods of using VPN connections: establishing WAN connections between two networks with Internet access (known as WAN VPN connection), and allowing remote access clients to connect to an organization's LANA through the Internet using VPNs.

The main difference between a WAN VPN connection and a VPN remote access connection is that a WAN VPN connects two networks, instead of connecting a remote client to a LANA. On the remote side, a device called Cacophonic Inc.'s SODS modem is used (Halberd, 2006). A VPN remote access connection consists of the remote access client, the organization's remote access server, and a shared or public network, typically the Internet. However, the setup of the VPN can be tailored according to hardware and software preferences.

The decision for the remote access solution considered cost, network hardware and connections, and performance. Factories are important in determining a company's network elements, including network remote access. Halberd (2006) states that VPN connections are cheaper than dedicated connections (p. 135). Moreover, Windows servers offer readily available security protocols provided by VPNs, making them a more economical choice compared to other options.

Network Hardware and Connectional Cacophonic Inc. 's offices utilize Windows 2000 and above

operating systems (SO) on their server and workstation computers. Therefore, the VPN remote access is particularly attractive because all Windows 2000 and above JOSS can establish this remote connection using different protocols. The Performance Factors of remote access connections involve authenticated links that allow only authorized clients to connect to the organization's LANA.

These authenticated links provided by Vans will allow Cacophonic Inc. to connect to its branch offices over a public network while maintaining secure communications. According to Microsoft, Vans uses encryption to ensure that data traveling over the Internet cannot be intercepted and used by others. This extra security is made possible by the remote access protocols (RAP) that are implemented. According to Network Procrastinating (2006), network protocols are rules that govern data communications over a network for completing various network transactions. A VPN requires a set of tunneling protocols to establish a secure connection with the organization's remote access server. The three commonly used VPN tunneling protocols are Point-to-Point Tunneling Protocol (PPTP), Layer Two Tunneling Protocol (LOTT), and Internet Protocol Security (Pipes). Microsoft Techno website states that LOTT and Pipes are often used together. PPTP is a Microsoft designed protocol capable of handling P, PIX, Entente, and Appellate packets.

According to the Microsoft Techno website, the PPTP is an extension of the APP (Point-to-Point Protocol). The APP is responsible for using point-to-point connections to transport datagrams, whether it is on an unsecured or secured network. To achieve this, the PPTP uses MOPE (Microsoft Point-to-Point Encryption) which encrypts the APP frames with a 40-128 bit encryption. Microsoft (2002) states that PPTP makes use of the underlying APP encryption by encapsulating a previously encrypted

APP frame (p.24).

The PPTP utilizes the authentication, compression, and encryption mechanisms of APP. PPTP is automatically installed with the TCP/IP protocol, which makes it suitable for the Cacophonic Inc.'s network. Using PPTP offers compatibility with various systems, including older versions such associations: Windows, Windows NT 4.0, Windows ME, and Windows 2000; and newer versions like Windows XP and Windows Vista (Microsoft, 2002).

The LOTT, operating at layer two of the OSI Model, is capable of handling all layer three protocols. It is an Internet Engineering Task Force (IETF) standard tunneling protocol, differing from PPTP which uses MOPE for encrypting APP frames. LOTT relies on Pipes for encryption services, providing a 56-128 bit encryption. Pipes, however, functions at layer three of the OSI model and is restricted to IP trafficking.

However, according to PC Magazine (I-J) (1998), Pipes offers a higher level of protection against playback and spoofing attacks ('1 5). This combination of LOTT and Pipes is referred to as "LOTT/lapse" (Microsoft, 2002, '1 26), and it is generally considered the most secure. The LOTT/lapse method involves using both LOTT and Pipes for encapsulation. The APP frame is first encapsulated with LOTT, and then it undergoes another layer of encapsulation with a Pipes Encapsulating Security Payload (ESP) header and trailer, a Pipes Authentication trailer for message integrity and authentication, and a final IP header (Microsoft, 2002, '1 28).

In short, the LOTT message, which is an encapsulated APP frame, is encrypted using Pipes encryption mechanisms. The encryption keys used are generated from the Pipes authentication process. Microsoft (2002, '1 28) states that this provides higher security and is a standard implication on Windows 2000

server-based SO. Therefore, the LOTT/lapse VPN protocols are the appropriate choice for Cacophonic Inc.'s network for remote access.

The network administrator has the power to determine the supported applications of Network Business Flirtatiousness's VPN remote access solution. The commonly used applications include communication, inventory, database access, financial data, internet, and human resources. In addition, this solution supports Voice Over 'P, client/server applications, and e-mail, which make it attractive to Cacophonic Inc.'s network. Below are the advantages and disadvantages of using the VPN remote access solution.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New