• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  • Level: GCSE
  • Subject: ICT
  • Word count: 4978

Cisco Threaded Case Study Report

Extracts from this document...

Introduction

Network Design & Modelling V Washington School District Wide Area Network Cisco Threaded Case Study Report Khayam Asghar Michael Clarke Contents Project Overview............................................................3 Requirements Analysis......................................................3 Design Considerations......................................................5 Two-Layer Hierarchical Model.............................................5 Hardware Specifications for Regional Hubs..............................6 Extra Redundancy.............................................................7 Internet Connection Specifications.........................................7 WAN Connection Specifications for Individual School locations.... 7 Physical Security.............................................................8 Logical Security...............................................................8 Summary.......................................................................9 Appendix A - Washington School District WAN Logical Plan... ..10 Appendix B - Detail View of Data Centre Hub.........................11 Appendix C - Detail View of Shaw Butte Hub.........................12 Appendix D - Detail View of Service Centre Hub.....................13 Appendix E - LAN/WAN Integration Logical Plan ..................14 Appendix F - Washington School District Addressing...............15 Appendix G - Washington School District Access Lists..............16 Appendix H - Router Configurations....................................17 Appendix I - Access Lists.................................................19 Appendix J - PPP, IPX and TCP/IP Protocols..........................20 Appendix K -Frame Relay and ISDN...................................22 Bibliography................................................................24 Disc containing PowerPoint Presentation.............................. Project Overview The Washington School District is seeking to implement a Wide Area network (WAN) that will provide data connectivity to all of its school sites. The School District seeks to provide Internet connectivity to each site while limiting the types of security problems that might go along with such access. Upon implementation of the WAN, the school district will begin to automate its administrative and curricular processes through the installation of a series of LAN-based servers. The School District expects that all solutions for their WAN implementation will remain viable and operative for seven (7) to ten (10) years. To that effect all network designs must account for a minimum of 2x (times) growth in the WAN core throughput and 10x (times) growth in the District Internet Connect throughput. Upon initial implementation, any host computer in the network must be able to accomplish 1.0 Mbps throughput while any server host must be able to accomplish a throughput of 100 Mbps. Additionally, all network designs are constrained to the use of OSI layer 3&4 protocols TCP/IP and Novell IPX. ...read more.

Middle

You can also use access lists to decide which types of traffic are forwarded or blocked at the router interfaces. For example, you can permit e-mail traffic to be routed, but at the same time block all Telnet traffic. * Establish a protective net of filters to detect and eradicate viruses - covering workstations (PCs), servers, and gateways. Ensuring that virus signatures are kept up-to-date. * Make sure that back-ups are run regularly, that files can be restored from those backups. * Enable logging for important system level events and for services and proxies, and set up a log archiving facility. * Install a double firewall and enhance the firewall rule sets to block most sources of malicious traffic. Taking into account the external threats therefore the Internet connectivity shall utilize a double firewall implementation with all Internet-exposed applications residing on a public backbone network. In this implementation all connections initiated from the Internet into the schools private network will be refused. In the district security model the network will be divided into three (3) logical network classifications, Administrative, curriculum and external with secured interconnections between them. * Separate Administrative and Student networks via a VLAN network set-up * Limit FTP and Telnet access into district and within schools Summary The WAN proposal makes use of a hierarchical approach to networking and divides the WAN into 3 layers- Core, Distribution, and access layers. These layers are split from each other in regard to their functions. The core provides for a fast, redundant, connection between the core WAN hubs. The distribution layer gives individual local school locations access to the WAN district core services, and the local schools access to school location LANs. Using this tiered design allows many advantages such as easier implementation of services, scalability, predictability and manageability. Such an approach also allows for a wider range of protocol support while making it easier to isolate and troubleshoot problems within the network. ...read more.

Conclusion

Frame Relay is called a non-broadcast multi-access technology because it has no broadcast channel. Broadcasts are transmitted through Frame Relay by sending packets to all network destinations. Frame Relay is a cost-effective alternative to point-to-point WAN designs. Each site can be connected to every other by a virtual circuit The router needs only one physical interface to the carrier. Frame Relay service is offered through a permanent virtual circuit (PVC). A data-link connection identifier (DLCI) identifies the PVC. The DLCI number is a local identifier between the DTE and DCE that identifies the logical circuit between the source and destination devices. There are really only two things required to implement ISDN to a site, an ISDN capable router and the remote user software. The router will usually be on the service provider's side and the remote user software will be on the users side. There are five major devices in the implementation of ISDN: 1. Terminal Equipment 1 (TE1) - Designates a device that is compatible with the ISDN network. A TE1 connects to a Network Termination or either Type 1 or Type 2. 2. Terminal Equipment 2 (TE2) - Designates a device that is not compatible with ISDN and requires a Terminal Adapter. 3. Terminal Adapter (TA) - Converts standard electrical signals into the form used by ISDN so that non-ISDN devices can connect to the ISDN network. 4. Network Termination Type 1 (NT1) - Connects 4-wire ISDN subscriber wiring to the conventional 2-wire local loop facility. 5. Network Termination Type 2 (NT2) - Directs traffic to and from different subscribe devices and the NT1. The NT2 is an intelligent device that performs switching and concentrating. As well as four major reference points: R - References the point (connection) that is a non-ISDN compatible device and a Terminal Adapter. S - References the points that connect into the NT2, or customer-switching device. It is the interface that enables calls between the various customer premises equipment. T - Electrically identical to the S interface, it references the outbound connection from the NT2 to the ISDN network. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    Caching/ pre-fetching: It is the only way of supporting partially disconnected web browsers. The user can go offline and still browse through the cached content. 3. What is WAP? Simply describe the functions of each layer in WAP protocol stack.

  2. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    * Classification techniques assign people (or whatever the data represents) to classes determined by the analyst. A simple example would be to analyze data on customers and non-customers who had either visited the web site or not. This simple example could easily be represented by a 2 X 2 table,

  1. This report gives the clear idea about current statistical situation in e-learning trends.Task 2 ...

    28% Time to market for the organisation's products or service 9% None of the above The choice for frequently selected has to do with speed improving the time to competency for the organizations employees 56 percent. Organization measure the effectiveness of its blended learning programs 75% Had a positive learning

  2. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    technology which allows the transfer of data between the Internet and the mobile phones could come into play. From BBC News web site (2002) it was found that using mobile phones to connect to the Internet is proving more popular with the consumers.

  1. special needs

    The joy stick works with electrical power and is a very crucial hardware which Maria uses in her life. The Wheelchair is meeting her personal, social and professional needs. Maria Korelli's- Personnel use of her electronic wheelchair. The electronic wheelchair is an extensively important specialized technology which Maria uses and

  2. ICT Report 3A

    > Some models can be very expensive and so difficult to replace. > Viewing pictures or video on such small screens tend to strain the eyes. How my iPod meet my needs Personal: Whilst travelling on buses or trains or walking or queuing I need some form of entertainment to keep me amused and to mask the boring reality.

  1. Production Log.

    Originally I had planned to use Forte as the font for the text but it was too fancy and wasn't very suitable for my site so I changed to Cooper Black, which is again a bold but soft font which is easy on the eyes.

  2. Internet Protocol V6

    field' contains the IP version, which was used to create the datagram, e.g. Ipv4. The 'IHL' (intermediate header length) field specifies the actual length of the header in multiples of 32-bit words. The 'TOS'' (type of service) field specifies the priority level of the data being transmitted.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work