IST Group Project PDF

Title IST Group Project
Author Jackie Huang
Course Networking And Telecommunications
Institution The Pennsylvania State University
Pages 19
File Size 908.8 KB
File Type PDF
Total Downloads 9
Total Views 155

Summary

Group work homework for networking design ...


Description

1

Payton DuLong, Amanda Doyne, John Quirk, Seunga Heo, & Ze Cheng Huang IT Infrastructure Design: Identifying Uses September 15, 2019 Computer networks would allow all the different devices and regions to be connected to each other and the Internet. TrendyWidgets H.Q. could look at the total company performance and by region. Networks would allow better communication between the different offices and regions. This communication would cover products, employees, and customer data. Computer networks would allow data to be easily moved and can allow quick analysis of data. Good computer networking enhances corporate operations and improves the chances of the company to grow. For the United States Region, TrendyWidgets will need a network that can support Administrative, Finance, Human Resources, IT, and Marketing departments with 300 employees. For the Amsterdam office, network capabilities for the organization’s service center and database services is required, this office house 100 employees. The Mumbai office houses the organization’s call center and houses 200 employees. The Mumbai office will need networks that can handle phone calls. Finally, the Singapore office network needs to support marketing and service centers for the Asia Pacific region while also housing 200 employees.

2

Payton DuLong, Amanda Doyne, John Quirk, Seunga Heo, & Ze Cheng Huang IT Infrastructure Design: Media Selection September 15, 2019

1. For the Tampa Office, there can be wirelesses routers for each of the four floors. Where the telecommunications closet is, fiber optic cables would be used to connect to the data center on the fourth floor. For the Amsterdam Office, there would be wirelesses routers on the first floor. The second floor would need fiber optic wires for its needed capabilities. The fiber optic cables would link the routers on the two floors to the servers housing the backup data base. The Mumbai Office would have wireless routers for both floors. There would be fiber optic cables to connect the routers on each floor to a server. The Singapore Office would have wireless routers for the three floors. The server center would have fiber optic cables and connect all the routers. There would be a total of at least ten wireless routers. The price for wireless routers can range from about $100-$500. The cost of fiber optic cables range about $1-$6 per foot ($3.20 - 19.20 per meter). Required for Each Office: Office:

Quantity:

Price:

Tampa

30,000 meters minimum

$96,000 – $576,000

Amsterdam

10,000 meters minimum

$32,000 - $192,000

Mumbai

20,000 meters minimum

$64,000 - $384,000

Singapore

20,000 meters minimum

$64,000 – $384,000

Total:

80,000 meters

$256,000 - $1,536,000

3

Routers

10

$1,000 - $5,000

TOTAL ESTIMATED COST (MATERIALS) FOR PROJECT: $257,000 – $1,541,000 2. To connect all the different offices together, we can use fiber optic cables. Fiber Optic cables would be best for this application because they allow for the transferring of signals over long distances at a high rate of speed. There is also less of a need for extensive signal boosters that can cut on costs.

4

Payton DuLong, Amanda Doyne, John Quirk, Seunga Heo, & Ze Cheng Huang IT Infrastructure Design: Ethernet Diagram September 22, 2019

5

Payton DuLong, Amanda Doyne, John Quirk, Seunga Heo, & Ze Cheng Huang IT Infrastructure Design: Estimating CIDR Requirements September 22, 2019 1. There are 300 employees in the US, 100 employees in Amsterdam, 200 employees in Mumbai, and 200 employees in Singapore. The total number of employees at TrendyWidgets is 800. However, each employee does not use only one device. Some employees may use several devices. Therefore, we assume that each of the employees will need at least two devices and it will need at least 1600 up to over 2000 IP addresses. 2. The CIDR address-book size that is suitable for TrendyWidgets is a /21 address book. The /21 address book size uses 21 bits for the network portion of the IP Address, leaving 11 (32-21=11) bits free for the host portion of the IP Address. This would allow for 2,048 individual addresses on the network. This is determined by taking the 11 free bits and raising 2 to its power (2^11), resulting in 2,048. This size of address book allows for more IP Addresses on the network than what is currently required but the next size down would not have enough capacity for TrendyWidgets to operate. The /21 size address book allows for TrendyWidgets to expand and add devices and addresses as they need, currently TrendyWidgets needs space for between 1,600 and 2,000 IP Addresses.

6

Payton DuLong, Amanda Doyne, John Quirk, Seunga Heo, & Ze Cheng Huang IT Infrastructure Design: Estimating Data Requirements October 6, 2019 1. [((3,000 bytes/1person) * 100 people) / (3 minutes * (60 seconds/1minute))] * [8 bits/1 byte] = 13,333.3 = 13.3 Kbps (0.013 Mbps) 2. 200 people * (31.5 Kbps/1 person) = 6,300,000 = 6.3 Mbps 3. Total data is 31900 bits per second, 1.27% of this is data the rest is voice.

7

Payton DuLong, Amanda Doyne, John Quirk, Seunga Heo, & Ze Cheng Huang IT Infrastructure Design: Identifying Market Leaders October 13, 2019 The application category Information and Resource Sharing

the market-leading software application in the category Google Business Cloud

Serve Web Page

Apache

Speedy Interpersonal Communication

Samepage

the strengths of the selected software application. Google Business Cloud is one of the biggest cloud company in the world. The reputation of Google is believable first of all, and it is also a futureproof infrastructure. Google Business Cloud is secure, global, high-performance, and cost effective. In addition, Google Business Cloud is seriously Powerful Data & Analytics. It helps to find answers faster and build better product. Lastly, it is serverless, just code. We thought that Apache can be a good software they could use. Apache is the world largest open source foundation written with different computer languages. The ASF provides an established framework for intellectual property and financial contributions that simultaneously limits potential legal exposure for our project committers. Samepage is a collaboration software program that combines team chat, video conferencing, screen sharing, task management, file sharing, and real-time document collaboration in a single cloud-based collaborative workspace.

8

E-commerce

Shopify

VoIP

Ring Central

Samepage creates cross-team comms channels, Co-author meeting agendas & motes Plan and manage projects & task lists Share ideas, files, & updates in real time Shopify is a global ecommerce company that helps to start a business, sell the products, market your business and manage everything of your business. This company had over 800,000 businesses from 175 countries. This one platform is with all the ecommerce and point of sale features you need to start, run, and grow your business. Ring Central is top rated business VoIP software provider in 2019. Ring Central provides all in one communication services such as integration, phone system, call recording and so forth. Strengths of Ring Central is affordable, simple to setup and use and any device anywhere anytime. The service is 30% or more with all-inclusive monthly pricing from a single provider. In addition, it is easy to set up and use is with any devices.

9

10

Payton DuLong, Amanda Doyne, John Quirk, Seunga Heo, & Ze Cheng Huang IT Infrastructure Design: Start Infrastructure Diagram October 20, 2019

1. Any communication through the Internet outside of the company’s LAN, at a specific office, will require an external IP address.

11

Payton DuLong, Amanda Doyne, John Quirk, Seunga Heo, & Ze Cheng Huang IT Infrastructure Design: Failover October 27, 2019

12

Payton DuLong, Amanda Doyne, John Quirk, Seunga Heo, & Ze Cheng Huang IT Infrastructure Design: Subnet Design November 3, 2019 1. Tampa: Subnet in Spectrum - 173.168.249.187/13

Amsterdam: Subnet in XS4ALL - 194.109.6.93/16 Mumbai: Subnet in ion - 202.122.21.108/20 Singapore: Subnet in Singtel - 203.126.100.199/18 2.

3.

13

14

Payton DuLong, Amanda Doyne, John Quirk, Seunga Heo, & Ze Cheng Huang IT Infrastructure Design: WAN Design November 10, 2019

1.

2. ATM would be the best technology to use because it transfers all form of traffic including voice, data, and video. 3.

15

16

Payton DuLong, Amanda Doyne, John Quirk, Seunga Heo, & Ze Cheng Huang IT Infrastructure Design: Adding Security November 17, 2019 1. A firewall is a necessary component to the IT infrastructure of any network whether it be for a personal network or for a large organization. In the case of TrendyWidgets, a firewall is beneficial to them because it can help protect their network from intrusions and protects the data and information that is keeps within its systems. Firewalls are able to filter incoming packets and only also legitimate access within the system. For TrendyWidgets, having adequate security for all its networks and systems at its offices across the globe can add validity and trustworthiness to its reputation, allowing for growth in business as the consumer feels that they are conducting business with a responsible party.

2. VPNs would be helpful in securing traffic that flows through the WAN because in a remote access VPN, a secure tunnel is established between the user’s device and the organization’s network, with the requirement of authentication services such as a password, tokens, etc., and may even require multistep authentication. This secure tunnel connection is then shut off when the user is finished with the task, minimizing the risk of

17

intrusion and unauthorized access to the data.

3. The Amsterdam office is a data service center, so the best security is necessary to protect all valuable data that is being stored within the network. The recommended encryption technology for all wireless transfers of data is CCMP or Counter-mode with Cipher-block chaining message authentication code protocol. This protocol is also called WPA2 and is considered the best currently for the encryption of data over wireless networks. For all other encryption SSH, Secure Shell and VPN technology can be used elsewhere.

18

19

Payton DuLong, Amanda Doyne, John Quirk, Seunga Heo, & Ze Cheng Huang IT Infrastructure Design: Using the Cloud November 24, 2019

1....


Similar Free PDFs