• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  • Level: GCSE
  • Subject: ICT
  • Word count: 4978

Cisco Threaded Case Study Report

Extracts from this document...

Introduction

Network Design & Modelling V Washington School District Wide Area Network Cisco Threaded Case Study Report Khayam Asghar Michael Clarke Contents Project Overview............................................................3 Requirements Analysis......................................................3 Design Considerations......................................................5 Two-Layer Hierarchical Model.............................................5 Hardware Specifications for Regional Hubs..............................6 Extra Redundancy.............................................................7 Internet Connection Specifications.........................................7 WAN Connection Specifications for Individual School locations.... 7 Physical Security.............................................................8 Logical Security...............................................................8 Summary.......................................................................9 Appendix A - Washington School District WAN Logical Plan... ..10 Appendix B - Detail View of Data Centre Hub.........................11 Appendix C - Detail View of Shaw Butte Hub.........................12 Appendix D - Detail View of Service Centre Hub.....................13 Appendix E - LAN/WAN Integration Logical Plan ..................14 Appendix F - Washington School District Addressing...............15 Appendix G - Washington School District Access Lists..............16 Appendix H - Router Configurations....................................17 Appendix I - Access Lists.................................................19 Appendix J - PPP, IPX and TCP/IP Protocols..........................20 Appendix K -Frame Relay and ISDN...................................22 Bibliography................................................................24 Disc containing PowerPoint Presentation.............................. Project Overview The Washington School District is seeking to implement a Wide Area network (WAN) that will provide data connectivity to all of its school sites. The School District seeks to provide Internet connectivity to each site while limiting the types of security problems that might go along with such access. Upon implementation of the WAN, the school district will begin to automate its administrative and curricular processes through the installation of a series of LAN-based servers. The School District expects that all solutions for their WAN implementation will remain viable and operative for seven (7) to ten (10) years. To that effect all network designs must account for a minimum of 2x (times) growth in the WAN core throughput and 10x (times) growth in the District Internet Connect throughput. Upon initial implementation, any host computer in the network must be able to accomplish 1.0 Mbps throughput while any server host must be able to accomplish a throughput of 100 Mbps. Additionally, all network designs are constrained to the use of OSI layer 3&4 protocols TCP/IP and Novell IPX. ...read more.

Middle

You can also use access lists to decide which types of traffic are forwarded or blocked at the router interfaces. For example, you can permit e-mail traffic to be routed, but at the same time block all Telnet traffic. * Establish a protective net of filters to detect and eradicate viruses - covering workstations (PCs), servers, and gateways. Ensuring that virus signatures are kept up-to-date. * Make sure that back-ups are run regularly, that files can be restored from those backups. * Enable logging for important system level events and for services and proxies, and set up a log archiving facility. * Install a double firewall and enhance the firewall rule sets to block most sources of malicious traffic. Taking into account the external threats therefore the Internet connectivity shall utilize a double firewall implementation with all Internet-exposed applications residing on a public backbone network. In this implementation all connections initiated from the Internet into the schools private network will be refused. In the district security model the network will be divided into three (3) logical network classifications, Administrative, curriculum and external with secured interconnections between them. * Separate Administrative and Student networks via a VLAN network set-up * Limit FTP and Telnet access into district and within schools Summary The WAN proposal makes use of a hierarchical approach to networking and divides the WAN into 3 layers- Core, Distribution, and access layers. These layers are split from each other in regard to their functions. The core provides for a fast, redundant, connection between the core WAN hubs. The distribution layer gives individual local school locations access to the WAN district core services, and the local schools access to school location LANs. Using this tiered design allows many advantages such as easier implementation of services, scalability, predictability and manageability. Such an approach also allows for a wider range of protocol support while making it easier to isolate and troubleshoot problems within the network. ...read more.

Conclusion

Frame Relay is called a non-broadcast multi-access technology because it has no broadcast channel. Broadcasts are transmitted through Frame Relay by sending packets to all network destinations. Frame Relay is a cost-effective alternative to point-to-point WAN designs. Each site can be connected to every other by a virtual circuit The router needs only one physical interface to the carrier. Frame Relay service is offered through a permanent virtual circuit (PVC). A data-link connection identifier (DLCI) identifies the PVC. The DLCI number is a local identifier between the DTE and DCE that identifies the logical circuit between the source and destination devices. There are really only two things required to implement ISDN to a site, an ISDN capable router and the remote user software. The router will usually be on the service provider's side and the remote user software will be on the users side. There are five major devices in the implementation of ISDN: 1. Terminal Equipment 1 (TE1) - Designates a device that is compatible with the ISDN network. A TE1 connects to a Network Termination or either Type 1 or Type 2. 2. Terminal Equipment 2 (TE2) - Designates a device that is not compatible with ISDN and requires a Terminal Adapter. 3. Terminal Adapter (TA) - Converts standard electrical signals into the form used by ISDN so that non-ISDN devices can connect to the ISDN network. 4. Network Termination Type 1 (NT1) - Connects 4-wire ISDN subscriber wiring to the conventional 2-wire local loop facility. 5. Network Termination Type 2 (NT2) - Directs traffic to and from different subscribe devices and the NT1. The NT2 is an intelligent device that performs switching and concentrating. As well as four major reference points: R - References the point (connection) that is a non-ISDN compatible device and a Terminal Adapter. S - References the points that connect into the NT2, or customer-switching device. It is the interface that enables calls between the various customer premises equipment. T - Electrically identical to the S interface, it references the outbound connection from the NT2 to the ISDN network. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    Caching/ pre-fetching: It is the only way of supporting partially disconnected web browsers. The user can go offline and still browse through the cached content. 3. What is WAP? Simply describe the functions of each layer in WAP protocol stack.

  2. ICT Systems in Everyday Life: Your Local Community

    High definition projectors and computer servers will be installed to show mainly British and specialist films. Clearly, digital technology has already taken over much of the home entertainment market. It seems strange, then, that the vast majority of theatrical motion pictures are shot and distributed on celluloid film, just like they were more than a century ago.

  1. Information Security.

    Still there are risks associated with opining up your system . In the aftermath of the worm, question have been raised about how the virus spread how it was contained and what steps if any are needed to increase Internet security.

  2. special needs

    With email you can write as much as you wish and do other tasks at the same time. For example one can be writing up an Email and at the same time view other websites. Email enables one to sit In one position and communicate, so for those ill-fated people

  1. Free essay

    Impact of ICT in Community

    The software converts on screen display to speech. The soft ware enables you to do all the different features I have listed below: The Hal Screen Reading Software meets Mary needs: * Easy browsing of Internet web pages and other applications even where there is little or no keyboard access.

  2. A report on how ICT affects me as an individual, and other members of ...

    read and find out what it says without needing to see it directly. Disadvantages are that they need the special software which may be expensive to buy. If the software has a fault then they are unable to use it.

  1. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    6.2.2 Haggling Pricing strategy Although not new in the real world, it has come to the net world. This pricing model is a one-to-one exchange that potential customer personally negotiate or haggle a price with SK-II by means of an intelligent software agent.

  2. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    It was stated that ''the ad for Gossard G-strings, generated 20,000 replies.'' Also the research company Gartner G2 says: ''SMS interaction with television programmes is set to double in the next year.'' Using SMS to interact with TV took off with ratings successes such as Big brother, where viewerd could send SMS to vote for contestants.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work