Monday, April 15, 2019
IP address Final Essay Example for Free
IP address Final Essay unbalanced propose ltnamegt Axia College The ACME Manufacturing company, headquartered in Atlanta, Georgia, is growing at a fast pace. Located at the Atlanta campus ar two offices, one houses the operations, marketing, administration, and accounting sections. The different building has offices for the engineering and sales departments. ACME is spread passim the United States with offices in New York, Chicago, and Phoenix. They come also youthfully acquired a facility in China.With the recent expansion, ACME pass on need a new wide area interlock ( disgusted) and a state-of-the-art phone system to ensure the company operates at optimal levels. To make administration of the ACME WAN easier the electronic network should be designed using the star topology. With this configuration, to for each one one branch office will have only a direct connection back to the headquarters in Atlanta. The type of connection to each location stateside ignore vary on the size of the remote office. I would recommend going with a minimum of a full T1 line or even a T3.The China location posterior be machine-accessible via a satellite connection leased by the company. The following figure is a graphical representation of the WAN configuration. Atlanta T1 T1 T1 New York Phoenix Chicago China Satellite WAN Layout for ACME Manufacturing IP Ranges For modeling purposes, lets assume ACME is using a sort out B network address for example 192. 168. x. x. To help bread and butter the individual departments separate, the network administration will need to configure a few subnets. Each subnet on the network will be a VLAN, or virtual local area network.In order for us to have the proper cadence of subnets, the subnet mask will be gravel to 255. 255. 240. 0. This will give ACME a maximum of 16 subnets and 4,094 hosts in each subnet. Hardware Requirements New Cisco switches and routers will supply the routing necessary for Acmes data. Cisco Catalyst switches will provide VLAN functionality these switches can accept broadcast packets and forward them only through the ports that are designated by the VLAN configuration this enhances security by keeping interdepartmental traffic from reaching other departments.Using VTP, every last(predicate) VLANs will only need to be configured from the switch acting as the VTP server. The Cisco routers will define broadcast domains and will use the link-state routing protocol OSPF that works well with the IP addressing scheme in use. STP, configured on the Cisco switches, will allow us to build surplusage into the network and avoid data loops (Regan, 2004). Wireless technologies promote productivity by allowing network users to remain connected to the network when using wireless devices. The installation of wireless access points will grant high-speed network connectivity to wireless devices.Because Acme will be leasing dedicated network media, a CSU/DSU will be needful to terminate those lines at each of the distribution locations and at the headquarters building. CSUs/DSUs also place digital signals on the line, control transmission strength, support loopback tests, and synchronize the timing received on the line. Leased lines require a different frame type to be used for data than is regularly used in a LAN environment a CSU/DSU also converts LAN frames into frames usable on the leased lines (Regan, 2004). TelephonyWith all of the new technology sprouting up daily, and the cost of long distance calls dropping, a feasible issue would be to install a private branch exchange (PBX) at each location. But with the growth of China into the companys holdings, a voice over internet protocol (VoIP) system would be the better choice to avoid international charges. With a VoIP system, each location can be set up on a three or four digit dialing plan so users can communicate easier. For example, John in Atlanta can dial a four digit fall and reach Chang in China. SecurityAf ter the infrastructure is set up and the network is online, the security of the network is the most important job of the network team. By keeping all devices up to date with the current security patches, anti-virus, and spyware removal tools will help eliminate malicious bugs from infecting your system. By installing firewalls at each location and only opening the ports needed for email, http, ftp, etc will keep hackers out of your system and your data safe. lay out up a policy that forces users to change their passwords every 90 days using an alpha-numeric and special typesetters case code.Even going as far as adding a PKI system to your login will help keep your network limited to authorized users. References Regan, P. E. (2004). Wide area networks. Upper Saddle River, N. J. Pearson/Prentice Hall. Ou, G. (2006, June 28). IP subnetting make easy. Retrieved August 2, 2010, from TechRepublic http//articles. techrepublic. com. com/5100-10878_11-6089187. html Yudkowsky, C. (2002, J uly). Voice Over IP vs PBX. Retrieved August 2, 2010, from VoIP News http//www. voip-news. com/byte2. htm
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment