Network Consultation for Design IT (Coursework Sample)
his assignment contains two (2) Sections: Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files in order to complete this assignment.
The owners of DesignIT, who recently purchased 56'x36' space for their expanding business, have asked you to place a bid on a consulting job. DesignIT is a graphic arts company that, up until now, had contracted work out to temporary design services. The new space will allow them to hire two (2) full time designers and a receptionist.
Description of space purchased:
4 Cubicles
1 Office
1 Server room
1 Reception desk
1 Conference room
DesignIT plans to relocate three (3) servers already configured as follows:
1 Web Server – Microsoft IIS Server
1 File Server – Microsoft Server 2008
1 Server – Server 2008 Small Business Server
DesignIT has requested that the design include the following:
High speed Internet access
Firewall
Antivirus / malware protection
Six (6) computers
Three (3) color laser printers
Wireless access for portable devices
DesignIT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance.
Section 1: Network Consultation Proposal
(Microsoft Word)
Create a cost analysis, and develop a proposal for the company.
Write an five to seven (5-7) page proposal in which you:
Recommend one (1) suitable network design.
Suggest one (1) network architecture.
Suggest LAN and Wireless LAN (WLAN) wiring considerations.
Recommend hardware options and costs.
Suggest security considerations for:
Firewall
Antivirus software
Recommend software options and costs.
Outline the labor costs, equipment costs, and service costs for your suggested design in table format.
Identify the single point of failure, and recommend potential mitigation strategies.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
1.0 Introduction
The proposal design is intended to serve six users with access to 3 laser printers. The design should also provide wireless access for portable devices. The configuration should provide high-speed internet access to all users. The design also implements protection from malware by installing up to date antivirus and provision of firewall protection. To achieve this, we will require a switch and a router. The switch will be essential in connecting the six computers, printers and the servers in the network. With the switch this connected devices will be able to share information and enhance communication between the devices. The switch is, therefore, an essential component of this network (FernaÌndez & MaÌrquez, 2012).
We will also need the router since we are dealing with few users; one router will be enough. The router connects the office network to the Internet. With the routers in place, the connected devices can share one internet connection (Shouhong, 2014). The router is also essential in that it provides security of information against possible threats.
2.0 Network design
The suitable network design for this network uses the hierarchical model. This is for purposes of enhancing performance and scalability of the network. The hierarchical design also provides an easy framework for maintaining the network. Since LAN switches use the IEEE 802.1 standard algorithm, it reduces redundancy of LAN segments. This algorithm is also useful in that it creates a redundant link should the main link experience problems. This will ensure fault tolerance of the network. For the servers, redundant DHCP servers are the most suitable for this network. Since it’s a small network, the servers should be placed in the distribution layer as there is less competition for server services. The router should be configured to forward requests to the servers from the end users (FernaÌndez & MaÌrquez, 2012).
Sometimes server redundancy may be impossible, to counter this we recommend for duplexing of file servers storage devices. This is possible by implementing features that allow separate disk controllers to control two different hard drives (FernaÌndez & MaÌrquez, 2012).
The six computers should be configured to access the routers so as to access remote services. One method of doing this is implementing the IP workstation protocol that sends address resolution protocols to locate a remote station. Here the router responds by providing the data link layer address (FernaÌndez & MaÌrquez, 2012).
The other method is the use of the Cisco hot standby router protocol. This software enables IP users to communicate within the network even when the router is not available. This is normally possible for routers in the distribution or the access layer.
3.0 Network Architecture
The network architecture will consist of the devices provided which includes the routers, the three servers, a switch, the computers, network cables and the three printers. The other requirement is the network management software and applications that will monitor and control the communication of the devices. The management system provides for a workstation responsible for the processing activity. For our network, the most suitable architecture is the distributed monitoring (Shouhong, 2014).
With the distributed monitoring, the network management systems are distributed across the network devices. The model utilizes hierarchical distributed mechanism where the management systems act by sending data to a more powerful centralized system using the manager of the managers (MoM) model (FernaÌndez & MaÌrquez, 2012). The distributed system filters data then sends it to the centralized system. This helps reduce data flows into the network. Distributed architecture has the capability of gathering data in case the network devices fail. This ensures operations are not halted.
4.0 LAN and Wireless LAN (WLAN) wiring considerations
For Local Area Network, the interface will be provided by the network interface card commonly known as NIC inside the connected computers. The network cable will connect to the NIC, which is wired to a switch. The switch will then provide a platform through which the computers connect to printers and the servers to the internet (Shouhong, 2014). For wireless connection, the requirements are a wireless network interface card (the WNIC) which is usually integrated with the hardware of a wireless device. The WNIC will communicate with wireless access point devices by use of radio frequency signals. The wireless devices are connected to a port on the switch.
Since we have few users, the best wired and wireless access will be the small site design. This makes use of a single access switch. It minimizes costs of operation and the number of devices and features required. The design allows for a converged or centralized wireless access using software such as the Flex-Connect software, or other cloud managed features (Shouhong , 2014).
5.0 Firewall implementation
Firewall is an essential component of the network architecture. The firewall can either be hardware devices or software that will protect the network from unauthorized access. They are especially essential in preventing access to a private network from outsiders (Rybaczyk, 2004). The firewall works by examining the content of data passing through the intranet to ensure they meet the specified security standards. For the design IT network, we propose two types of firewall that are suitable for implementation.
The internet
the router
The Firewall
The servers and user in the network connection
5.1 Packet filtering firewall
This firewall operates by filtering data based on the source addresses as well as packet options. With packet filtering, there is the option of using routers that require manual configuration. There is also the option of dynamic filtering where the router will dynamically change the filtering rules as per observed events. The firewall can be used as an access point through which administrators do logins or implement access control measures. This type of a firewall can also act as a network address translators due to the operation of the traffic i.e. the direction through which traffic moves (Rybaczyk, 2004).
4.1 Proxy Firewalls
The types of firewalls are more secure regarding network security than other models of firewalls. Proxy firewall operates differently from other firewalls. They do not block access to the private network. However, they require that the computers in the network establish connections with the proxy (Rybaczyk, 2004).Here the proxy acts as an intermediary and will, therefore, request for network connection in place of the packet access. Proxy prevents direct connections between network devices of on either side of the firewall. This, therefore, prevents the attacker from accessing the private network and even makes it hard for the attackers to identify the location of the other devices. Proxy servers are more intensive than other types of the firewall; they, however, limit the speed and the functionality of the network devices.
5.0 Antivirus implementation
It is important that network is protected from malicious ware such as viruses, worms and Trojan horses that pose a security threat for company information. Malicious wares delete or alter data, and they also take up useful computer resources. Some of the risk factors associated with the virus and other malware are loss or replication of data; emails are also susceptible to virus where they attach themselves and spread throughout email communications (Rybaczyk, 2004). They can also result in serious downtime of network devices. To curb this, every compute...
Other Topics:
- Solar EnergyDescription: Notably, renewable energy is fronted as an alternative for deleterious sources of energy such as fossil fuels...1 page/≈275 words| 5 Sources | APA | Technology | Coursework |
- Intrusion Detection SystemDescription: Data is critical in any existing functioning organization. It is the cornerstone of the running operation within the technical firm...3 pages/≈825 words| 5 Sources | APA | Technology | Coursework |
- Database Design Project Document ShellDescription: The phase includes activities that are focused towards identifying the required features and the preferred operations procedures for the database. ...8 pages/≈2200 words| 13 Sources | APA | Technology | Coursework |