• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  • Level: GCSE
  • Subject: ICT
  • Word count: 4978

Cisco Threaded Case Study Report

Extracts from this document...

Introduction

Network Design & Modelling V Washington School District Wide Area Network Cisco Threaded Case Study Report Khayam Asghar Michael Clarke Contents Project Overview............................................................3 Requirements Analysis......................................................3 Design Considerations......................................................5 Two-Layer Hierarchical Model.............................................5 Hardware Specifications for Regional Hubs..............................6 Extra Redundancy.............................................................7 Internet Connection Specifications.........................................7 WAN Connection Specifications for Individual School locations.... 7 Physical Security.............................................................8 Logical Security...............................................................8 Summary.......................................................................9 Appendix A - Washington School District WAN Logical Plan... ..10 Appendix B - Detail View of Data Centre Hub.........................11 Appendix C - Detail View of Shaw Butte Hub.........................12 Appendix D - Detail View of Service Centre Hub.....................13 Appendix E - LAN/WAN Integration Logical Plan ..................14 Appendix F - Washington School District Addressing...............15 Appendix G - Washington School District Access Lists..............16 Appendix H - Router Configurations....................................17 Appendix I - Access Lists.................................................19 Appendix J - PPP, IPX and TCP/IP Protocols..........................20 Appendix K -Frame Relay and ISDN...................................22 Bibliography................................................................24 Disc containing PowerPoint Presentation.............................. Project Overview The Washington School District is seeking to implement a Wide Area network (WAN) that will provide data connectivity to all of its school sites. The School District seeks to provide Internet connectivity to each site while limiting the types of security problems that might go along with such access. Upon implementation of the WAN, the school district will begin to automate its administrative and curricular processes through the installation of a series of LAN-based servers. The School District expects that all solutions for their WAN implementation will remain viable and operative for seven (7) to ten (10) years. To that effect all network designs must account for a minimum of 2x (times) growth in the WAN core throughput and 10x (times) growth in the District Internet Connect throughput. Upon initial implementation, any host computer in the network must be able to accomplish 1.0 Mbps throughput while any server host must be able to accomplish a throughput of 100 Mbps. Additionally, all network designs are constrained to the use of OSI layer 3&4 protocols TCP/IP and Novell IPX. ...read more.

Middle

You can also use access lists to decide which types of traffic are forwarded or blocked at the router interfaces. For example, you can permit e-mail traffic to be routed, but at the same time block all Telnet traffic. * Establish a protective net of filters to detect and eradicate viruses - covering workstations (PCs), servers, and gateways. Ensuring that virus signatures are kept up-to-date. * Make sure that back-ups are run regularly, that files can be restored from those backups. * Enable logging for important system level events and for services and proxies, and set up a log archiving facility. * Install a double firewall and enhance the firewall rule sets to block most sources of malicious traffic. Taking into account the external threats therefore the Internet connectivity shall utilize a double firewall implementation with all Internet-exposed applications residing on a public backbone network. In this implementation all connections initiated from the Internet into the schools private network will be refused. In the district security model the network will be divided into three (3) logical network classifications, Administrative, curriculum and external with secured interconnections between them. * Separate Administrative and Student networks via a VLAN network set-up * Limit FTP and Telnet access into district and within schools Summary The WAN proposal makes use of a hierarchical approach to networking and divides the WAN into 3 layers- Core, Distribution, and access layers. These layers are split from each other in regard to their functions. The core provides for a fast, redundant, connection between the core WAN hubs. The distribution layer gives individual local school locations access to the WAN district core services, and the local schools access to school location LANs. Using this tiered design allows many advantages such as easier implementation of services, scalability, predictability and manageability. Such an approach also allows for a wider range of protocol support while making it easier to isolate and troubleshoot problems within the network. ...read more.

Conclusion

Frame Relay is called a non-broadcast multi-access technology because it has no broadcast channel. Broadcasts are transmitted through Frame Relay by sending packets to all network destinations. Frame Relay is a cost-effective alternative to point-to-point WAN designs. Each site can be connected to every other by a virtual circuit The router needs only one physical interface to the carrier. Frame Relay service is offered through a permanent virtual circuit (PVC). A data-link connection identifier (DLCI) identifies the PVC. The DLCI number is a local identifier between the DTE and DCE that identifies the logical circuit between the source and destination devices. There are really only two things required to implement ISDN to a site, an ISDN capable router and the remote user software. The router will usually be on the service provider's side and the remote user software will be on the users side. There are five major devices in the implementation of ISDN: 1. Terminal Equipment 1 (TE1) - Designates a device that is compatible with the ISDN network. A TE1 connects to a Network Termination or either Type 1 or Type 2. 2. Terminal Equipment 2 (TE2) - Designates a device that is not compatible with ISDN and requires a Terminal Adapter. 3. Terminal Adapter (TA) - Converts standard electrical signals into the form used by ISDN so that non-ISDN devices can connect to the ISDN network. 4. Network Termination Type 1 (NT1) - Connects 4-wire ISDN subscriber wiring to the conventional 2-wire local loop facility. 5. Network Termination Type 2 (NT2) - Directs traffic to and from different subscribe devices and the NT1. The NT2 is an intelligent device that performs switching and concentrating. As well as four major reference points: R - References the point (connection) that is a non-ISDN compatible device and a Terminal Adapter. S - References the points that connect into the NT2, or customer-switching device. It is the interface that enables calls between the various customer premises equipment. T - Electrically identical to the S interface, it references the outbound connection from the NT2 to the ISDN network. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    Caching/ pre-fetching: It is the only way of supporting partially disconnected web browsers. The user can go offline and still browse through the cached content. 3. What is WAP? Simply describe the functions of each layer in WAP protocol stack.

  2. ICT Systems in Everyday Life: Your Local Community

    Of course, the technology has improved over the years, but it's still based on the same basic principles. The reason is simple: Up until recently, nothing could come close to the image quality of projected film. But things are starting to change.

  1. special needs

    People, who are powerless to go out, normally suffer from physical disability because they are not equal to move as ordinary people, every body has the need of going shopping, however one who is unfit to do so, can use the internet to purchase any thing they desire.

  2. Free essay

    Impact of ICT in Community

    There are several reasons for this as first of all she uses it in her Personal Life, Social and Work related. Hal Reading Software helps Mary make her work of the best level. The Software doesn't take too much stress because the program is reading all the work on the computer for her when Mary is at Work.

  1. A report on how ICT affects me as an individual, and other members of ...

    and travel information " GPS Internet is used in public libraries for research and access to public records. Usually a library will now have all their books and resources linked to an online catalogue which covers the whole country. Members can request a title and have it order to a branch in their county.

  2. Information Security.

    It is impossible to make a widespread network physically secure, therefore security measures depend on information Techniques such as cryptography. No data can be made secure without physical protection of some sort, of the equipment The effect of good design is to concentrate the need for physical security not to circumvent it entirely.

  1. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    Cybergold, it's web site being www.cybergold.com, which was one of the first online marketing incentive companies to allow individuals to earn and spend money on the internet. Cybergold rewards online customers when they make online purchases, download free software, register online service or simply visit a web site by actual cash starting at 50 cents.

  2. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    ''Capital radio listeners for example can get a copy of the music playlist by text. The users of SMS will be able to send text messages from their TV or mobile and get the replies back to their TV. (Guardian online, October 17th 2002, pp.4-5)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work