H. Generic Network Template Motor Vehicle Administration State Police (Commercial Vehicle Enforcement) CVISN Core Infrastructure Systems Motor Fuel Tax.

Slides:



Advertisements
Similar presentations
Kansas CVISN Program Plan
Advertisements

CVISN Guide to Credentials Administration: Appendix C Operational Scenarios and Functional Thread Diagrams C - 1 Appendix C Operational Scenarios and Functional.
v3.1 CIS151 Module 2 JEOPARDY K. MartinG. Valencia.
Office of Research and Information Technology International Border Crossing Program Electronic Screening Transportation Border Working Group April 17,
The Kansas CVISN Plan CVISN Program Update March 20, 2002.
IFTA/IRP Joint Session Encouraging Cooperation Between IRP and IFTA Processes Joy Prenger, Missouri Mary Jo Pointer, Missouri.
Wisconsin’s Top Level Design CVISN Design Workshop May 30 – June 1, 2001 New Orleans, LA.
Florida CVISN Top-Level Design. Florida CVISN Top-Level Design Presentation Outline Program Organization CVISN Task Team Initial Projects Florida Exceptions.
Presented by Serge Kpan LTEC Network Systems Administration 1.
IS Network and Telecommunications Risks
Networks Adapting Computers to Telecommunications Media.
EE 4272Spring, 2003 EE4272: Computer Networks Instructor: Tricia Chigan Dept.: Elec. & Comp. Eng. Spring, 2003.
Basic Computer Networks Configurations School of Business Eastern Illinois University © Abdou Illia, Spring 2007 Week 1, Thursday 1/10/2007)
Lesson 5 – Understanding Network Hardware. Repeaters Hubs and concentrators Bridges Routers Switches Gateways Firewalls Short-haul modems OVERVIEW.
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
Internetworking Devices that connect networks are called Internetworking devices. A segment is a network which does not contain Internetworking devices.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
System Components Hardware overview for Apollo ACS.
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
Networking Hardware and Components By: Sean Bell.
Basic Networking Components
The Basics of Networking. Rick Graziani What is networking? Communication! An interconnection of computers and other devices: –Printers.
1 WHY NEED NETWORKING? - Access to remote information - Person-to-person communication - Cooperative work online - Resource sharing.
NETWORKING COMPONENTS By Scott H. Bowers. HUB A hub can be easily mistaken for a switch, physically there are no defining characteristics, both have power.
 Computer Networking Computer Networking  Networking terminology Networking terminology  Client Server Model Client Server Model  Types of Networks.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Unit 1—Computer Basics Lesson 7 Networks.
Ch 11. Integrated Architecture for Wireless Myungchul Kim
1 Understanding the TCP/IP Protocol Suite Industry standard Enables enterprise networking and connectivity.
Input slides/figures for June 2000 ITS/CVO Roadmap.
Chapter 17 - Internetworking: Concepts, Architecture, and Protocols 1. Internetworking concepts 2. Router 3. protocol for internetworking 4. TCP/ IP layering.
Guide to Credentials Administration: Appendix B PRISM and CVISN B - 1 Appendix B PRISM and CVISN - Explaining the Relationship.
N ETWORKING C OMPONENTS A-3 LTEC 4550 by Joe Garcia.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
S305 – Network Infrastructure Chapter 6 Local Area Network.
How computer’s are linked together.
Network Communications Chapter 14 LAN Interconnection Devices.
25-Oct-15Network Layer Connecting Devices Networks do not normally operate in isolation.They are connected to one another using connecting devices. The.
Basic Computer Networks Configurations School of Business Eastern Illinois University © Abdou Illia, Fall 2009 (August 27th, 2009)
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
LAN Devices  Purposes: Dividing the network into subnets Dividing the network into subnets Joining two networks together Joining two networks together.
Transportation leadership you can trust. presented to presented by Cambridge Systematics, Inc. Federal CVO Initiatives Overview Plus… Approaches to Enabling.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
William Stallings Data and Computer Communications
Unified Carrier Registration Best Practices and MCMIS Survey of States National Conference of State Transportation Specialists June 9, 2008.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 16 Introduction to Networks and the Internet.
August 12-13San Antonio, Texas 2015 Annual Business Meeting Information Technology Advisory Committee (ITAC) 2015 Report to Membership Scott Miller (KS),
A - Complete Top-Level Design and Scenarios Page A A. B. C. D. E. F. A. _________ Operational Scenario: _______________________________.
ITI-510 Computer Networks ITI 510 – Computer Networks Meeting 6 Rutgers University Center for Applied Computer Technologies Instructor: Chris Uriarte.
Network Programming Chapter 1 Networking Concepts and Protocols.
Networking Components WILLIAM NELSON LTEC HUB  Device that operated on Layer 1 of the OSI stack.  All I/O flows out all other ports besides the.
How a State Documents Deployment of CVISN Core Capabilities 95 MARYLAND INTERSTATE 29 CVISNCVISN September 2003.
FMCSA Homeland Security Activities Update Presentation to: ITS America CVFM Presented by: Jeff Secrist Federal Motor Carrier Safety Administration August.
Internet Infrastructure Min Ding Smeal College of Business Administration Pennsylvania State University.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Networking Components
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
Threaded Case Study Acacia School Project Project Members: Md. Shafayet Hossain Md. Shakhawat Hossain Md. Moniruzzaman Md. Maksudur Rahman.
11 MAINTAINING A NETWORK INFRASTRUCTURE Chapter 9.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
Some Network Commands n Some useful network commands –ping –finger –nslookup –tracert –ipconfig.
Input slides/figures for June 2000 ITS/CVO Roadmap
IFTA Managers’ and Law Enforcement Workshop October 2011
Local Area and Wide Area Networks
Lecture 6: TCP/IP Networking By: Adal Alashban
Delaware Division of Motor Vehicles
Basic Computer Networks Configurations
Local Area and Wide Area Networks
Presentation transcript:

H. Generic Network Template Motor Vehicle Administration State Police (Commercial Vehicle Enforcement) CVISN Core Infrastructure Systems Motor Fuel Tax Division Public Utility Commission (Transportation Division) Inspections (ASPEN) IRP Carrier Systems SAFER MCMIS IRP Clearinghouse IFTA Clearinghouse Credentialing System Carrier Registration & Permitting Treasury: Mainframe DB IFTA Registration & IFTA Tax Processing CAPRI SAFETYNET Licensing & Titling Intrastate Registration AAMVAnet Frame Relay (TCP/IP) AAMVAnet SNA Gateway (token ring) sensors CDLIS Licensing & Insurance Web Site Firewalls Gateway Credentialing Interface, All MVA LSIs, E-Screening Enrollment CVIEW Dedicated dial-up Dial-up Existing Proposed dial-up TCP/IP Ethernet BackboneSNA Ethernet Backbone SNAEthernet Backbone Firewall Internet Internet Tools RF Link Roadside Operations Sensor/ Driver Comm Screening Repeater AAMVAnet CSN (TCP/IP) Firewall

Network Template - Instructions The network template shows how your state allocates the major functions to computers, and how those computers are connected using various kinds of network technologies. Make one diagram for your Current Network configuration, and another for your Proposed Network configuration. To make your master network template, review the generic network template. Tailor the generic network template to your state. Start by including all the computers and networks that support the systems you included in your current systems inventory. Next, be sure that the existing major functions on your system design template are allocated to some computer on the network and design template. As necessary, add computers and network components. If you don’t know what kind of computer or what networking technology you’ll use, put in a placeholder. The drawing will mature as you work through the design process. This template is used to show network connections, as well as the allocation of software products to computers. Proposed new computers and network connections can be added. As you make decisions, show which network protocols you’ve selected for each segment. The diagram can be used to verify how two or more systems are connected physically, and where network “translations” are needed. It can also show where potential bottlenecks exist. On the network template, each small box represents a computer system. The state should show all the computer systems that support (or will support) the CVISN project functions. List the major functions (software applications) handled by that computer inside the box. Group the small boxes into large boxes according to the state agency or facility that is responsible for the computers. Show LANs and WANs as lines connecting the computers. We recommend that you adopt some convention for distinguishing between existing and proposed computers and connections. For instance, you might make existing computers white, and new ones shaded. You might show existing connections as solid lines and new ones as dashed. Different dashed line types can be used to indicate different network protocols, if you like. Every function box on your state system design template should be allocated to some computer on this template. This includes each of the individual LSI boxes. Often for credentials-related products, the LSIs are small applications running on the same computer as the Credentialing Interface. LMs are modifications to existing systems, and usually are not shown as separately allocated functions on the network template.