• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  • Level: GCSE
  • Subject: ICT
  • Word count: 4978

Cisco Threaded Case Study Report

Extracts from this document...

Introduction

Network Design & Modelling V Washington School District Wide Area Network Cisco Threaded Case Study Report Khayam Asghar Michael Clarke Contents Project Overview............................................................3 Requirements Analysis......................................................3 Design Considerations......................................................5 Two-Layer Hierarchical Model.............................................5 Hardware Specifications for Regional Hubs..............................6 Extra Redundancy.............................................................7 Internet Connection Specifications.........................................7 WAN Connection Specifications for Individual School locations.... 7 Physical Security.............................................................8 Logical Security...............................................................8 Summary.......................................................................9 Appendix A - Washington School District WAN Logical Plan... ..10 Appendix B - Detail View of Data Centre Hub.........................11 Appendix C - Detail View of Shaw Butte Hub.........................12 Appendix D - Detail View of Service Centre Hub.....................13 Appendix E - LAN/WAN Integration Logical Plan ..................14 Appendix F - Washington School District Addressing...............15 Appendix G - Washington School District Access Lists..............16 Appendix H - Router Configurations....................................17 Appendix I - Access Lists.................................................19 Appendix J - PPP, IPX and TCP/IP Protocols..........................20 Appendix K -Frame Relay and ISDN...................................22 Bibliography................................................................24 Disc containing PowerPoint Presentation.............................. Project Overview The Washington School District is seeking to implement a Wide Area network (WAN) that will provide data connectivity to all of its school sites. The School District seeks to provide Internet connectivity to each site while limiting the types of security problems that might go along with such access. Upon implementation of the WAN, the school district will begin to automate its administrative and curricular processes through the installation of a series of LAN-based servers. The School District expects that all solutions for their WAN implementation will remain viable and operative for seven (7) to ten (10) years. To that effect all network designs must account for a minimum of 2x (times) growth in the WAN core throughput and 10x (times) growth in the District Internet Connect throughput. Upon initial implementation, any host computer in the network must be able to accomplish 1.0 Mbps throughput while any server host must be able to accomplish a throughput of 100 Mbps. Additionally, all network designs are constrained to the use of OSI layer 3&4 protocols TCP/IP and Novell IPX. ...read more.

Middle

You can also use access lists to decide which types of traffic are forwarded or blocked at the router interfaces. For example, you can permit e-mail traffic to be routed, but at the same time block all Telnet traffic. * Establish a protective net of filters to detect and eradicate viruses - covering workstations (PCs), servers, and gateways. Ensuring that virus signatures are kept up-to-date. * Make sure that back-ups are run regularly, that files can be restored from those backups. * Enable logging for important system level events and for services and proxies, and set up a log archiving facility. * Install a double firewall and enhance the firewall rule sets to block most sources of malicious traffic. Taking into account the external threats therefore the Internet connectivity shall utilize a double firewall implementation with all Internet-exposed applications residing on a public backbone network. In this implementation all connections initiated from the Internet into the schools private network will be refused. In the district security model the network will be divided into three (3) logical network classifications, Administrative, curriculum and external with secured interconnections between them. * Separate Administrative and Student networks via a VLAN network set-up * Limit FTP and Telnet access into district and within schools Summary The WAN proposal makes use of a hierarchical approach to networking and divides the WAN into 3 layers- Core, Distribution, and access layers. These layers are split from each other in regard to their functions. The core provides for a fast, redundant, connection between the core WAN hubs. The distribution layer gives individual local school locations access to the WAN district core services, and the local schools access to school location LANs. Using this tiered design allows many advantages such as easier implementation of services, scalability, predictability and manageability. Such an approach also allows for a wider range of protocol support while making it easier to isolate and troubleshoot problems within the network. ...read more.

Conclusion

Frame Relay is called a non-broadcast multi-access technology because it has no broadcast channel. Broadcasts are transmitted through Frame Relay by sending packets to all network destinations. Frame Relay is a cost-effective alternative to point-to-point WAN designs. Each site can be connected to every other by a virtual circuit The router needs only one physical interface to the carrier. Frame Relay service is offered through a permanent virtual circuit (PVC). A data-link connection identifier (DLCI) identifies the PVC. The DLCI number is a local identifier between the DTE and DCE that identifies the logical circuit between the source and destination devices. There are really only two things required to implement ISDN to a site, an ISDN capable router and the remote user software. The router will usually be on the service provider's side and the remote user software will be on the users side. There are five major devices in the implementation of ISDN: 1. Terminal Equipment 1 (TE1) - Designates a device that is compatible with the ISDN network. A TE1 connects to a Network Termination or either Type 1 or Type 2. 2. Terminal Equipment 2 (TE2) - Designates a device that is not compatible with ISDN and requires a Terminal Adapter. 3. Terminal Adapter (TA) - Converts standard electrical signals into the form used by ISDN so that non-ISDN devices can connect to the ISDN network. 4. Network Termination Type 1 (NT1) - Connects 4-wire ISDN subscriber wiring to the conventional 2-wire local loop facility. 5. Network Termination Type 2 (NT2) - Directs traffic to and from different subscribe devices and the NT1. The NT2 is an intelligent device that performs switching and concentrating. As well as four major reference points: R - References the point (connection) that is a non-ISDN compatible device and a Terminal Adapter. S - References the points that connect into the NT2, or customer-switching device. It is the interface that enables calls between the various customer premises equipment. T - Electrically identical to the S interface, it references the outbound connection from the NT2 to the ISDN network. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    Caching/ pre-fetching: It is the only way of supporting partially disconnected web browsers. The user can go offline and still browse through the cached content. 3. What is WAP? Simply describe the functions of each layer in WAP protocol stack.

  2. ICT Systems in Everyday Life: Your Local Community

    Analog technology (such as and audio tape) loses information in transmission, and generally degrades with each viewing. Digital information is also a lot more flexible than analog information. A computer can manipulate bytes of data very easily, but it can't do much with a streaming analog signal.

  1. OCR GCSE Business & Communication Task 7 Report

    I insured my company obliged by these two acts. To solve these issues involved within the Display Screen Directive (1992) and the Health & Safety Act (1974) companies can ensure regular breaks for consistent computer workers, change of activity to vary workers jobs.

  2. A report on how ICT affects me as an individual, and other members of ...

    When I visited the Greenpeace website they were trying to raise awareness about the ship sailing through the Irish Sea using plutonium. Without ICT communications, this news may now have reached us yet. The Internet also has many other uses, which affects people.

  1. MUJI - company overview

    They also have some social gathering during special festivals so as to enhance good relations between staffs. For the weaknesses, I think that the advertisement to the mass media is not enough, MUJI doesn't advertise on the TV, radio, buses, that many companies will do such as Marks and Spencer, John Lewis, Gap etc.

  2. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    Products Examples of providing rich Content information: www.iSyndicate.com www.screamingmedia.com 6.4.2 Partner with net-based training companies to provide cosmetic training to net surfers Firms like notHarvard.com (www.notharvard.com) build compelling eduCommerce courseware for online stores.14 6.4.3 Rich Content can generate more sales reference cases * Micron PC has a partnership with Ziff-Davis Education.

  1. Information Security.

    one box of modest size, physically strong and designed to destroy its stored secrets when it is opened. This is called a tamper- resistant module and it is a central element of many systems which this book will describe Security and people The owners of a system depend for its

  2. special needs

    is the only category of specialized technology that Maria is using in her every day life because of the reason that she doesn't require the assistance of additional specialized technology, as her main downfall is that she cannot walk. Electric wheelchairs are designed to move when the operator does not have the strength to do so herself.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work