Verified Document

Technical Document For Hans Tech Essay

The LWAP will be distributed to all the facilities through the WLS. Typically, WLS will be installed to assist in providing the traffic tunnel and failover authentication. To enhance the security of the WLAN, the company will install the encryption system at the wireless access point, the encryption protocols will contain WPA/WPA2, and there will be an AES encryption at all the wireless access point using the 802.1 X authentication. The company will redesign the local backbone infrastructure in order to increase the network bandwidth. There would be 100 BASE-T4 cabling to the 7 Cisco 2613 routers. The cabling system will assist the company to achieve efficient network connectivity for future growth. The 100 BASE-FX (fiber) cabling will be attached to the Cisco 7507 routers, which will assist in achieving more expansion capabilities and higher performances. The existing network will be worked into 2 Cisco 5500 Catalyst switches using the separate fiber cabling. The company will achieve a significant increase in the network bandwidth in the New York infrastructure with 100 BASE-FX cabling.

1.7: Current Network Utilization

The company will be able to utilize the network through the LAN and WAN. The company will achieve a QoS (Quality of Service) across the WAN router. To support the real-time traffic, the BestLinks will use the highest priority queue, and the network utilization is described below:

WAN Queue

Traffic Description

DSCP (Diffserv Code Point)

Minimum Reserved Bandwidth

5

Real Time

Voice Over IP

46 -- EF (Expedited Forwarding)

10%

4

Call Signaling

Video Over IP signaling Voice over IP signaling

26 - AF31(Assured Forwarding)

24 -- CS3(Class Selector 3)

40%

3

Critical Data

Interactive Video

High Priority Data

32 -- CS4 (Class Selector 4)

34 -- AF41(Assured Forwarding)

18 -- AF21 (Assured Forwarding)

40%

2

Low Priority Data

10 -- AF11 (Assured Forwarding)

16%

1

Scavenger class

8 -- C31 (Class Selector 1)

4%

0

Best Effort Queue

0 -- No setting

Unused BW

1.8: Current Network Availability

The Network connection will be established through LANs at New York and Chicago centers. There would be a network connection between New York Center and Chicago center using the WAN connectivity. The company will need to test the network availability to understand whether the network has been really established. The network availability will involve testing the current internet connection, availability of over IP (VoIP) to understand whether there could be call success through the internet. Moreover, the extent the company has been able to achieve data transfer and retrieval over the two centers will be tested to develop the network availability. The company will also test the network availability to determine the number of packet loss within a month. (Cisco, 2012).

Jiang & Schulzrinne (2003) define the network availability as the number of times that the network has been available for use. The network system will be configured to achieve 99.99% availability. There would be integration of Cisco resilient to reduce the effect of outages within the company network system as well as achieving the operational excellence.

1.9: Delay and Response Times

The delay with the implementation of the project will be affected by the budget, technical personnel and availability of the technical materials. Within the contemporary technology environment, there is shortage of it (Information Technology) personnel to manage the project after the project implementation. The company will need to train technical personnel to manage the implementation of the project. The delay of the project will also be affected by the project budget. Hans Tech will need to fund the implementation of the project and since Hans Tech is a publicly owned company, the Board of directors will need to approve the funds that will be used for the project implementation and the approval by the board of director may take up to three months.

The project implementation will start on the 1 November 2012 and would end on the 30 September 2013.Project stakeholders will minimize the changes of the project requirements. During the project implementation, the critical tasks will be implemented first and the project implementation is presented in the table below:

Preliminary Activities

Engaging the BestLink Communication Expert Solutions

4 weeks

Information Security risk Assessment

2-week

Drafting the document of Information Security Policy

Business Continuity Plan

2 weeks

Hardware & Software Procurement, which include the servers, firewalls, cable, workstations, and anti-virus.

5 weeks

New York LAN Upgrade

Installation of 2 Cisco 7507 at each segment and are configured accordingly

10 days

Installation and configuration of Cisco 3750E/3560E switches and Cisco routers.

5 days

Configuration of workstations and end user LANs

5 weeks

Creating of the videoconferencing network segment and associated equipment.

5 days

Installing and configuring 2 Cisco Multiplexers

3 days

UPS installation

2 days

Installing the Cisco security appliances.

2 day

Configuring IPS and IDS to enhance the network security

2 days

Creating a secure external mail server and web server

6 days

Chicago LAN Upgrade

Cisco 6509 Installation at each segment as well as configuration

3 days

Configuration and Installation of Cisco Catalysts Cisco 3560E / 3750 Eswitches.

5 days

Configuring end user workstations and LANs

3 days

Creating and deploying the videoconferencing network segment and the associated equipment

6 days

UPS installation

4 days

Installing IPS and IDS for network security

The firewall will be used to block unwanted traffic from the reaching the network. (Chen, Horng, & Yang 2008).
Part 2:

Summary

The document provides the network system for Hans Tech Limited. The company intends to open another business unit at Chicago. Since Hans Tech intends to establish a communication links between the two centers, the company will need to upgrade the existing network technology as well integrating the WAN technology to achieve the network connectivity between the two centers. The WAN connectivity will be established through the (EIGRP) Enhanced Interior Gateway Routing Protocol and the BestLink will assist in establishing efficient and effective network connection. The project implementation plan will take up approximately 12 months to complete. The project implementation will enhance the following value for Hans Tech Limited:

Enhancing the company competitive market advantages

Enhancing state-of-the-art operation centers for New York and Chicago centres

Delivering the latest and best network support

Delivering database system

High-speed network connectivity for Chicago and New York

Unparalleled communication at each site.

Scalable and efficient Local Area Network at each center

High-level firewall network security for the two centers

Flawless WAN interfaces to offer network connectivity for the two centers

Secured extranet and internet connections

Installation of anti-virus software for all laptops and desktops

The successful completion of this project will support other technical projects to achieve the following objectives:

Understanding the strategy to create effective and efficient network document.

Understanding the strategy to connect WAN over LAN

Assist in designing high level network reliability

Assist in designing document to achieve a latest technology network support

Understanding the strategy to provide the network security.

References

Cisco (2011). Product Overview. Cisco Inc. USA.

Cisco (2012). Cisco Network Availability and Operations Optimization Service. Cisco System Inc.

Chen, T. Horng, G. & Yang, C.(2008).Public Key Authentication Schemes for Local Area. Informaticia.19(1):3-16.

Guillen, P. E. & Chacon, D. A (2009). VoIP Networks Performance Analysis with Encryption Systems. World Academy of Science, Engineering & Technology. 58: 688-695.

IBM (2010). Setting up a Local Area Network. International Business Machine. USA.

Jiang, W. & Schulzrinne, H. (2003). Assessment of VoIP Service Availability in the Current Internet. he College of Information Sciences and Technology.

Khalil, K. Hand, J.J. & Mariswamy, M. (1995).Methodologies for Characteristics Traffic in Wide Area Network: Analysis and Benchmarking. International Journal of Communication. 8:117-127.

Murhammer M, W, et al., (1999), IP Network Design Guide, IBM Corporation, International Technical Support Organization, International Business Machine.

IBM as/400

Token-ring

Monitor

Tower System

Tower box

Laser printer

Tape Storage

Router

DSU/CSU

FTP

Modem

Laptop computer

MPLS

BGP

Backup

Network

Ciscoworks Blue

AS/400

Server Farm 3

Cisco ASA 5540 Firewall

Figure 4.8.2 Proposed Fairfax Site Diagram

IBM as/400

Token-ring

Tower System

Tower box

Laser printer

Tape Storage

Router

DSU/CSU

Amiga

FTP

Laptop computer

Modem

Backup

Network

AS/400

Server Farm 4

Workstation

Workstation

WirelessLaser printer

Figure 4.8.2 Proposed Fairfax Site Diagram

Sources used in this document:
References

Cisco (2011). Product Overview. Cisco Inc. USA.

Cisco (2012). Cisco Network Availability and Operations Optimization Service. Cisco System Inc.

Chen, T. Horng, G. & Yang, C.(2008).Public Key Authentication Schemes for Local Area. Informaticia.19(1):3-16.

Guillen, P. E. & Chacon, D. A (2009). VoIP Networks Performance Analysis with Encryption Systems. World Academy of Science, Engineering & Technology. 58: 688-695.
Cite this Document:
Copy Bibliography Citation

Related Documents

Ben Jonson Intertextualities: The Influence
Words: 22973 Length: 80 Document Type: Essay

" James a.S. McPeek further blames Jonson for this corruption: "No one can read this dainty song to Celia without feeling that Jonson is indecorous in putting it in the mouth of such a thoroughgoing scoundrel as Volpone." Shelburne asserts that the usual view of Jonson's use of the Catullan poem is distorted by an insufficient understanding of Catullus' carmina, which comes from critics' willingness to adhere to a conventional -- yet incorrect

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now