Explain the types of physical network devices used

Assignment Help Computer Networking
Reference no: EM131602449

Assignment

Overview

Within an organization, the dependability of network infrastructures has become less of a want and more of a need. Without a fully developed communication architecture around business growth, efficiencies, and competitive advantage, many companies will find themselves underperforming. Network connectivity used to be considered a luxury for many businesses, but it has recently become a critical piece of an organization. The fundamental understanding of how networks play such a big role in the success of a company has to be assessed from the basic approach of the advancement in Transmission Control Protocol/Internet Protocol (TCP/IP) communication and the functionality of the Open Systems Interconnection (OSI) model.

Understanding how a network communicates is key to understanding how your corporate applications and services work within the business. Your understanding around the concepts of IP communication, devices used to communicate, and the traffic that is continually passed between devices is the first key to gaining the understanding of network infrastructure. The knowledge you develop through this course will help build on your basic understanding of network infrastructures and the components that are critical to the success of any business communication architecture.

For your final project, you will assume the role of a network consultant for an organization looking to expand its communication reach. You have been be tasked with analyzing the current network architecture of the organization and determining any key changes that should occur as the organization prepares for future growth. You will evaluate traffic patterns to determine critical aspects of your business and provide basic insight into what should be done to the network from a capability aspect and from a security viewpoint as the organization prepares for future growth. Ultimately, you will recommend a design for the future network architecture of the organization.

Before beginning your project, read the Final Project Scenariodocument about SNHUEnergy Inc., an organization that is looking to expand its operations. Then, review all of the logical and physical design diagrams as well as the Wireshark capture showing the traffic patterns of the organization's current network. These files are provided below:

• Milestone One Physical Diagram - Current
• Final Project Physical Diagram - Current
• Memphis Office Logical Design - Current
• Physical Network Design Example
• Logical Network Design Example
• Dallas Office Logical Design - Current
• Traffic Flow Wireshark Capture

Prompt

Imagine that you are a newly hired network consultant for SNHUEnergy Inc. The leadership team at the organization has asked you to create a network analysis and architecture evaluation on the current network. Your report will also include design recommendations for the organization's future network architecture, including basic recommendations to mitigate any potential performance or security issues.

Specifically, the following critical elements must be addressed:

I. Executive Summary: Provide a high-level overview of the contents of your report for the leadership team. Include your findings around data traffic flows, applications impacted, and the overall network and security recommendations for the future needs of the organization.

II. Current Network Architecture: In this section, you will analyze the information provided in the SNHUEnergy Inc. scenario to provide high-level assumptions about the design of the network.

A. Identify the network applications that are a part of the current network.

B. Describe how the current network is designed by explaining how the different layers of the Open Systems Interconnection (OSI) model relate to each other within the network.

C. Develop a visual representation of an end-to-end path flow of the existing network by creating a Visio diagram showing the output of the traffic flows. Use the provided logical network design example as a guide for creating your diagram, and include your diagram with your submission.

D. Explain the types of physical network devices used in connecting all devices across the organization based on what you know from the scenario.

E. Identify the critical traffic patterns currently used by the organization, supported by examples. Use the provided Wireshark capture to guide your response.

F. Describe the traffic patterns that the organization's critical applications take across the infrastructure from office to office.

Remember, the organization's critical applications were specified in the scenario.

G. Describe the potential performance issues that may occur within the current network if no changes are made to support the organization's expansion. Provide examples to support your response.

H. Describe the potential security issues that may occur within the current network if no changes are made to support the organization's expansion. Provide examples to support your response.

III. Future Network Architecture

A. Determine the future communication needs of the organization based on what you know from the scenario.

B. Describe in detail a network architecture that would be appropriate for supporting the ultimate growth of the organization and defend how this recommended network would improve communication across the company.

C. Develop a visual representation of your recommended network architecture by creating a Visio diagram. Use the provided physical network design example as a guide for creating your diagram, and include your diagram with your submission.

IV. Planning and Security

A. Recommend the best approach to mitigate the potential performance and security issues that you previously identified, and defend your response.

B. Recommend a network management tool to implement into the future network and explain its potential benefit to the organization.

C. Recommend types of security devices that you would implement into the existing network, and explain how the devices would mitigate potential security issues.

D. Explain the changes that need to be made to existing devices on the network in order to successfully integrate the security devices into the future network design.

E. Describe specific challenges that the organization might face as it attempts to implement the future network, and recommend ways to mitigate those challenges.

F. Concisely explain the overall risk for the network and the organization of not keeping security services up to standard.

Attachment:- Attachments.rar

Reference no: EM131602449

Questions Cloud

Venture capital and venture capital firm : Describe the difference between venture capital, a venture capital firm, and a venture capitalist.
Explain the acceleration due to gravity : The acceleration due to gravity, g, varies with height above the surface of the earth, in a certain way. If you go down below the surface of the earth.
What are the components of comprehensive budget : What are the components of a comprehensive budget and what is the purpose of each component?
The first step in establishing liability : Elements of negligence must be proven to establish malpractice: duty, breach of duty, damages and causation.
Explain the types of physical network devices used : Explain the types of physical network devices used in connecting all devices across the organization based on what you know from the scenario.
Problem related to the chlorofluorocarbons : Chlorofluorocarbons (CFCs) were used as propellants in spray cans until their build up in the atmosphere started destroying the ozone.
Internetworking for contemporary organisations : Analyse and discuss the significance of internetworking for contemporary organisations - Draw architectural internetworking design for the business in Netsim.
Sketch the derivative of the given function : Sometimes, odd behavior can be hidden beneath the surface of a rather normal-looking function.
What kind of power did the two parties bring to the conflict : What kind of power did the two parties bring to the conflict. Do you think that the federal government's resolution of the standoff

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd