Preview

INDP Final Project

Powerful Essays
Open Document
Open Document
1793 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
INDP Final Project
Integrative Network Design Project
Tye Worthington
NTC/362
March 16, 2015
Tom Krawczyk
Integrative Network Design Project
Riordan is a global plastics manufacturing company with three branches in the United State and one in China. The Riordan network is divided into four locations San Jose, CA, Pontiac, MI, Albany, GA, and Hangzhou, China. The corporate headquarters located in San Jose and the China branch are connected by a 51.8 Mbps Ka band (K-above) WAN satellite connection operating in the 26.5-40 GHz range with AES end-to-end encryption. The only down fall with using Ka band is weather susceptibilities (Sala, Zennaro, Sokol, Miao, Spousta, & Chan, 2013), which could cause problems with communications between China and the office in San Jose. The other branches of Riordan are connected with T2 leased lines from the local ISP’s in the respective cities, the San Jose branch has a T3 or a 45Mbps link to the other two branches. The leased lines give Riordan an unshared link to the internet and to the other branches. Unshared simply means the T2 the equivalent of 4 T1s or 6Mbps are not shared with other customers. (U-Verse Offical Site, 2015)
Riordan corporate office is divided into several different departments Marketing, Finance, Corp, and is the main Research and Development department of the organization. Riordan will not make drastic changes to the network just upgrades to the LAN at the respective branches. The 100BaseT backbone can support 100 Mbps to the departments and the 1Gbps fiber backbone in the R&D department can handle the information traversing in and out of that department. Upgrading the hardware in the corporate office will completed during the down hours of the San Jose branch so work will not be interrupted. The 24 port HUB will be taken off the network and replaced with a switch supporting the NAS and the three servers. Replacing the HUB will separate the collision domains and help the flow of traffic to and from the server area. The



References: Banathy, A., Panozzo, G., Gordy, A., & Senese, J. (2013, July). A Layered Approach to Network Security. Retrieved from http://www.industrial-ip.org/en/knowledge-center/solutions/security-and-compliance/a-layered-approach-to-network-security Beal, V. (2015, March). DDoS attack - Distributed Denial of Service. Retrieved from http://www.webopedia.com/TERM/D/DDoS_attack.html CISCO.com. (2015, March). Cisco Catalyst 3560 Series Switches Data Sheet. Retrieved from http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3560-series-switches/product_data_sheet09186a00801f3d7d.html CISCO.com. (2015, March). Cisco Integrated Services Routers Generation 2. Retrieved from http://www.cisco.com/c/en/us/products/collateral/routers/1900-series-integrated-services-routers-isr/ordering_guide_c07_557736.html Clark, J. (2012, October 17). What Is a Mantrap and Do You Need One? Retrieved from http://www.datacenterjournal.com/design/what-is-a-mantrap-and-do-you-need-one/ Infosec Institue. (2015, March). CISSP Domain – Physical and Environmental Security. Retrieved from http://resources.infosecinstitute.com/cissp-domain-physical-and-environmental-security/ Klinder, B. (2015, March). How to design environmental controls for a server room. Retrieved from http://searchwindowsserver.techtarget.com/news/1046216/How-to-design-environmental-controls-for-a-server-room Microsoft.com. (2015, March). Windows Server Update Services. Retrieved from https://technet.microsoft.com/en-us/windowsserver/bb332157 Rouse, M. (2015 March). DMZ (demilitarized zone). Retrieved from http://searchsecurity.techtarget.com/definition/DMZ U-Verse Offical Site. (2015, March). Leased lines (T1, T2, T3). Retrieved from http://en.kioskea.net/contents/691-leased-lines-t1-t2-t3

You May Also Find These Documents Helpful

  • Better Essays

    The amount of property and equipment the company has on file for the years for 2013 and 2012 are $72, 414 and $66,657 respectively. The property and equipment are stated at cost. The depreciation is computed using the straight-line method and the recorded accumulated depreciation for 2013 was $42,574. Comcast capitalizes the costs associated with improvements that extend asset lives and expense repairs and maintenance cost as incurred (Comcast Corporation Annual Report on Form 10-K, 2013).…

    • 2152 Words
    • 7 Pages
    Better Essays
  • Better Essays

    INDP Final Project

    • 3551 Words
    • 12 Pages

    * The administrative departments run off of a 1000 Base-T Ethernet provided by a CAT 6 cable…

    • 3551 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    The proposed network is designed to serve DesignIT which consist 56’x36’ office space, 4 cubicles, 1 office, 1 server room, 1 receptionist desk and 1 conference room.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Netw410 Week2

    • 716 Words
    • 3 Pages

    The actual business goals for this project is to offer new and better services and support, open the network to key constituents, build relationships and information accessibility to a new level, as a basis for the network organizational model, avoid business disruption caused by network security problems, avoid business disruption caused by natural and unnatural disaster, modernize outdated technologies and reduce telecommunications and network costs, including overhead associated with separate networks for voice, data and video.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    When developing a multi-layered security plan, you must look at each of the seven domains of the IT infrastructure and increase security on each of those domains. Increasing the security on each of those seven domains will increase the overall security of the system and create a multi-layered security plan.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Travel Agency, Inc. is a large travel firm that was founded in 1999. They pride themselves on personal relationships along with fast and accurate customer service. Travel Agency, Inc. currently has five locations in Los Angeles, New York, Atlanta, Dallas and Chicago. Travel Agency, Inc. is looking to cut down on operating costs and focus on expanding their business. Part of this growth process is to switch to a telecommuting business model. The original business model consisted of workers in dedicated call centers. This is costly due to other travel agencies having lower overhead through utilization of self-service websites. By eliminating the overhead cost of a building rental, Travel Agency, Inc. will create flexibility, better customer service, and increased productivity. This also creates a home-based virtual office environment. This will help…

    • 9550 Words
    • 35 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Cited: "How to choose the best Linux server for your business." How to choose the best Linux server for your business. http://www.itworld.com/operating-systems/372236/how-choose-best-linux-server-your-business (accessed January 12, 2014).…

    • 1335 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    A layered security strategy will encompass Rouge protocols such as Bit mining and P2P, Unauthorized network scanning and probing, and unauthorized access to the network.…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure …

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    References: Denning, S. (2011, 7 23). How Do You Change An Organizational Culture? Retrieved from Forbes: http://www.forbes.com/sites/stevedenning/2011/07/23/how-do-you-change-an-organizational-culture/. Retrieved September 3, 2014.…

    • 2266 Words
    • 6 Pages
    Powerful Essays