ABC Sporting Goods Network Design Proposal by: Ed Allen Justin Caldwell Lou Maccarone.

Slides:



Advertisements
Similar presentations
To ensure quality instruction and educational success, NVC Information Technology is committed to delivering high quality technical leadership, resources,
Advertisements

Company Equipment Upgrade Proposal. The Current Situation  It has been five years since Alt-F4 Inc. has upgraded any of it’s equipment.  200 Computers.
Internet, Intranet and Extranets
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Wi-Fi Structures.
Lesson 14 – DESIGNING A NETWORK. Assessing Network needs Meeting Network needs OVERVIEW.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Virtual Data Systems, Inc. Value Proposition of IP Telephony Voice over IP Technologies.
Let’s Get Set Up By Michael Crawford. Situation at Hand Basic Needs ◦ Budget of $25-50,000 ◦ Connection to an ISP to access internet Security ◦ Network.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Network Proposal SMG C OMPUTER S YSTEMS. I NTRODUCTION  The network I recommend to suit your business is called a star network.  The star network will.
By: Amy Simon  What happened to my student’s project?  Why can’t I access my lesson in the computer lab?  I know I saved it… somewhere…  WHERE DID.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Networking Components Christopher Biles LTEC Assignment 3.
1 Project # 2 Steve Klesper Tom Ondick Garry Meadows Aaron Hurt Tim Wade.
Unleashing Mobile Broadband WiPipe Central MANAGED SERVICES Secure, Manage, & Maintain the Edge of the 3G/4G Network.
Chapter 7: Using Windows Servers to Share Information.
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Chapter 9: Novell NetWare
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Exploring the Network.
Dual WAN Router Brand & Marketing MGMT Dept DrayTek Corp Vigor2912 Series 14 th Jan Based on f/w RC4.
1 1 Hosted Network Security EarthLink Complete™ Data.
Networks.
Computers Are Your Future Eleventh Edition
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
The Intranet.
Epworth Villa Tony Gaeddert Network Administrator Men’s Coffee August 5, 2002 Computers and Technologies.
Network Operating Systems : Tasks and Examples Instructor: Dr. Najla Al-Nabhan
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Introduction TO Network Administration
Granite Banc, Inc. Maralee Viox. Designing and Implementing a Local Area Network Granite Banc, Inc.
Creating and Managing Networks CSC February, 1999.
May07-02: Parking Meter Clint Hertz: Team Leader Austyn Trace: Communications Nick Hollander Christian Baldus.
Introduction to Networking
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
LO2 Understand the key components used in networking.
Introduction to Networking. What is a Network? Discuss in groups.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Thepul Ginige Lecture-5 Implementation of Information System Part - I Thepul Ginige.
CISCO INDIA MARKETPLACE Bringing Cisco Customers and Partners Together.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Dr. Pipat Sookavatana. IT for Business Communication and Information Exchange Web access File and Printer Sharing Information Access Advertisement.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Chapter 7: Using Windows Servers
Chapter 7. Identifying Assets and Activities to Be Protected
The Intranet.
Unit 27: Network Operating Systems
أساسيات تقنية المعلومات
Virtual Private Network
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
John Thomas Dimitropoulos Team and website: Lostoneprodigy.com
INTERNET SECURITY.
Presentation transcript:

ABC Sporting Goods Network Design Proposal by: Ed Allen Justin Caldwell Lou Maccarone

Our Goal as Network Engineers Our Goal- To create a network for ABC Sporting Goods that meets and exceeds the needs of the business using a reliable, cost effective, upgradeable, and simple network solution.

Network Diagram Sales Accounting Inventory Acct Phones Sales PhonesInv Phones 3-Com Switch Cisco Router T1 Line to ISP NBX 25 VoIP Ethernet Power Source To PSTN Analog Phone Line DSL Modem 3-Com Switch DSL Router/Firewall Business DSL Analog Phone Lines 56k between Sales and Inv

Top Down Approach Business Layer Connect all of the computers in order to better communicate and work more efficiently. Set up a web presence so that sales can be made via the Internet. Give ABC Sporting Goods the ability to have network access remotely.

Top Down Approach Application Layer We will use the following applications due to the their reliability and ease of use All servers will run a UNIX derivative OS Web server will use Apache Samba will be our network sharing utility Workstations will use a Windows environment Our database solution will be MySQL A variety of other software will be used as well; Network monitors, SNMP management, servers and clients, and independent software suites

Top Down Approach Data Layer - Sales Sales data will consist of: Database exchanges Transaction processing TP indicator data Customer Information Network traffic Web traffic Department specific data

Top Down Approach Data Layer - Accounting Accounting data will consist of: Database exchanges Employee information Payroll Business finance information Web traffic Department specific data

Top Down Approach Data Layer - Inventory Inventory data consists of: Inventory amounts Sales data Web traffic

Top Down Approach Network Layer - Sales Sales network consists of: Communication between the other company branches is necessary Communication to the Internet Communication with the file server and printer Remote access for mobile salespersons

Top Down Approach Network Layer - Accounting Accounting network consists of: Communication between the other company branches Communication to the Internet Communication with the file server and printer

Top Down Approach Network Layer - Inventory Inventory network consists of: Communication between the other company branches Communication to the Internet Communication with the file server and printer

Top Down Approach Technology Layer - Sales Sales technology consists of: A robust Dell file server VoIP technology for telephony Ethernet printing SpeakEasy T1 Internet access Ethernet LAN Remote network access 56k access to Inventory

Top Down Approach Technology Layer - Accounting Accounting technology consists of: Ethernet LAN A robust Dell file server VoIP technology for telephony Ethernet printing SpeakEasy T1 Internet access

Top Down Approach Technology Layer - Inventory Inventory technology consists of: A robust Dell file server Standard PSTN access TCP/IP printing SpeakEasy Business DSL Internet access Ethernet LAN 56k to Sales

Network Management – Fault Management 24/7 Network monitoring All network problems logged Problem Ticket system

Power Management Powerware 2kVA UPS Protects equipment from power surges, spikes, and other damaging power anomolies Provides data reliability and security Provides enough power to run the servers for minutes Can run the NBX 25 for 2-4 hours

Configuration Management Only those who need to configure the network will be allowed to through secure login Remote Configuration Network component description library

Performance Management 24/7 Network Performance Monitoring Shift all found bottlenecks Forecast possible improvements and disasters

Security Management Extensive use of Firewalls to block outside intrusions Secure logins for employees and admins Monitor network for security breaches Encryption

Accounting Management Network Statistics Usage Quotas

Network Security - Assets Customer Information Employee Information Sales Information Accounting Information

Threats Outside sources Floods Fires Hackers Employees

Vulnerabilities Employee access Modem pool Internet Website

Risks Biggest Risks Employee Information Accounting Information Credit Card Information

Protective Measures Encryption IPSec Firewall Authorization Virus Protection UNIX servers

Cost Analysis ItemQuantityPriceTotal Price Dell Sales ServerX1$2400 HP Laser Ethernet PrinterX2$900$1800 Dell Sales WorkstationsX5$850$4250 3Com SuperStack3 SwitchX2$1100$2200 US Robotics Network Cards X5$13$65 Cisco 1760 RouterX1$1900 Linksys Cable/DSL RouterX1$ ft Cat6 Network CableX2$180$360 3Com NBX 1102 phoneX2$300$600 3Com NBX-25X1$1500 3Com NBX pk Bundle X2$1300$2600 3Com Ethernet power source X1$600 Powerware 2KVA UPSX1$2400 Total Cost$20855

Conclusion Meets and exceeds all business needs Easily upgradeable Simple to operate, fix, and manage Reliable Cost Effective