• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  • Level: GCSE
  • Subject: ICT
  • Word count: 4978

Cisco Threaded Case Study Report

Extracts from this document...

Introduction

Network Design & Modelling V Washington School District Wide Area Network Cisco Threaded Case Study Report Khayam Asghar Michael Clarke Contents Project Overview............................................................3 Requirements Analysis......................................................3 Design Considerations......................................................5 Two-Layer Hierarchical Model.............................................5 Hardware Specifications for Regional Hubs..............................6 Extra Redundancy.............................................................7 Internet Connection Specifications.........................................7 WAN Connection Specifications for Individual School locations.... 7 Physical Security.............................................................8 Logical Security...............................................................8 Summary.......................................................................9 Appendix A - Washington School District WAN Logical Plan... ..10 Appendix B - Detail View of Data Centre Hub.........................11 Appendix C - Detail View of Shaw Butte Hub.........................12 Appendix D - Detail View of Service Centre Hub.....................13 Appendix E - LAN/WAN Integration Logical Plan ..................14 Appendix F - Washington School District Addressing...............15 Appendix G - Washington School District Access Lists..............16 Appendix H - Router Configurations....................................17 Appendix I - Access Lists.................................................19 Appendix J - PPP, IPX and TCP/IP Protocols..........................20 Appendix K -Frame Relay and ISDN...................................22 Bibliography................................................................24 Disc containing PowerPoint Presentation.............................. Project Overview The Washington School District is seeking to implement a Wide Area network (WAN) that will provide data connectivity to all of its school sites. The School District seeks to provide Internet connectivity to each site while limiting the types of security problems that might go along with such access. Upon implementation of the WAN, the school district will begin to automate its administrative and curricular processes through the installation of a series of LAN-based servers. The School District expects that all solutions for their WAN implementation will remain viable and operative for seven (7) to ten (10) years. To that effect all network designs must account for a minimum of 2x (times) growth in the WAN core throughput and 10x (times) growth in the District Internet Connect throughput. Upon initial implementation, any host computer in the network must be able to accomplish 1.0 Mbps throughput while any server host must be able to accomplish a throughput of 100 Mbps. Additionally, all network designs are constrained to the use of OSI layer 3&4 protocols TCP/IP and Novell IPX. ...read more.

Middle

You can also use access lists to decide which types of traffic are forwarded or blocked at the router interfaces. For example, you can permit e-mail traffic to be routed, but at the same time block all Telnet traffic. * Establish a protective net of filters to detect and eradicate viruses - covering workstations (PCs), servers, and gateways. Ensuring that virus signatures are kept up-to-date. * Make sure that back-ups are run regularly, that files can be restored from those backups. * Enable logging for important system level events and for services and proxies, and set up a log archiving facility. * Install a double firewall and enhance the firewall rule sets to block most sources of malicious traffic. Taking into account the external threats therefore the Internet connectivity shall utilize a double firewall implementation with all Internet-exposed applications residing on a public backbone network. In this implementation all connections initiated from the Internet into the schools private network will be refused. In the district security model the network will be divided into three (3) logical network classifications, Administrative, curriculum and external with secured interconnections between them. * Separate Administrative and Student networks via a VLAN network set-up * Limit FTP and Telnet access into district and within schools Summary The WAN proposal makes use of a hierarchical approach to networking and divides the WAN into 3 layers- Core, Distribution, and access layers. These layers are split from each other in regard to their functions. The core provides for a fast, redundant, connection between the core WAN hubs. The distribution layer gives individual local school locations access to the WAN district core services, and the local schools access to school location LANs. Using this tiered design allows many advantages such as easier implementation of services, scalability, predictability and manageability. Such an approach also allows for a wider range of protocol support while making it easier to isolate and troubleshoot problems within the network. ...read more.

Conclusion

Frame Relay is called a non-broadcast multi-access technology because it has no broadcast channel. Broadcasts are transmitted through Frame Relay by sending packets to all network destinations. Frame Relay is a cost-effective alternative to point-to-point WAN designs. Each site can be connected to every other by a virtual circuit The router needs only one physical interface to the carrier. Frame Relay service is offered through a permanent virtual circuit (PVC). A data-link connection identifier (DLCI) identifies the PVC. The DLCI number is a local identifier between the DTE and DCE that identifies the logical circuit between the source and destination devices. There are really only two things required to implement ISDN to a site, an ISDN capable router and the remote user software. The router will usually be on the service provider's side and the remote user software will be on the users side. There are five major devices in the implementation of ISDN: 1. Terminal Equipment 1 (TE1) - Designates a device that is compatible with the ISDN network. A TE1 connects to a Network Termination or either Type 1 or Type 2. 2. Terminal Equipment 2 (TE2) - Designates a device that is not compatible with ISDN and requires a Terminal Adapter. 3. Terminal Adapter (TA) - Converts standard electrical signals into the form used by ISDN so that non-ISDN devices can connect to the ISDN network. 4. Network Termination Type 1 (NT1) - Connects 4-wire ISDN subscriber wiring to the conventional 2-wire local loop facility. 5. Network Termination Type 2 (NT2) - Directs traffic to and from different subscribe devices and the NT1. The NT2 is an intelligent device that performs switching and concentrating. As well as four major reference points: R - References the point (connection) that is a non-ISDN compatible device and a Terminal Adapter. S - References the points that connect into the NT2, or customer-switching device. It is the interface that enables calls between the various customer premises equipment. T - Electrically identical to the S interface, it references the outbound connection from the NT2 to the ISDN network. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    Caching/ pre-fetching: It is the only way of supporting partially disconnected web browsers. The user can go offline and still browse through the cached content. 3. What is WAP? Simply describe the functions of each layer in WAP protocol stack.

  2. ICT Systems in Everyday Life: Your Local Community

    Second, our movie will look like news footage, not a normal theatrical film. Conventional video has a completely different look from film, and just about anybody can tell the difference in a second. Film and video differ a lot in image clarity, depth of focus and colour range, but the biggest contrast is frame rate.

  1. Information Security.

    With good design, the security then depends on the people who operate the system and carry out its security -related procedures. In a well-designed system it should be clear who is being trusted and to what extent, but there is no way to make the system proof against, unlimited deceit.

  2. Free essay

    Impact of ICT in Community

    It allows you to browse the Internet without a mouse. Hal Screen Reading Software announces graphics labels automatically and reads through frames and tables quickly and accurately. 3. Why does Mary use the technology? Hal Screen Reading is a program for people who are blind.

  1. Unit 23: Investigating Communications and Networks

    are referred to as the postmaster. Most mail servers are designed to operate without any manual intervention during normal operation. * Printer server: If you have a printer to share between multiple computers, you most likely want a printer server.

  2. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    The phone uses the Symbian operating system, which at present time it only reaches to Nokia 7650 handset. In order to view the video clips, ''users first have to download an Oplayer player. They send an SMS to Oplayo, then after receiving a message, download the player via GPRS.

  1. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    an order number will be emailed to customers following checkout and confirmation. To protect customer personal information. SK-II will stores all customer data (name, address, credit card number, order information, etc.) on dedicated, secure servers to protect against unauthorized access.

  2. OCR GCSE Business & Communication Task 7 Report

    It shows clear texts, which are underlined by a simple, but effective, line. My logo shows a meaning towards my company mood and behaviour by it being in a horizontal position, which means it's easier to read. You can relate to it in this way as we can relate to writing regularly.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work