Solus Technologies Your practical IT solution.. Solus Techs Associates  Dimitrios Foutsis – Project Leader – Hardware Specialist  Faizal Mohamed – Server.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Hosted Revolution Ltd Hosted Exchange October 2009 V2.01.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
 SONA ENTERPRISE was founded in 2008 as a manufacturer and developer of high performance, versatile wireless solutions for Wireless Internet Service.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ROYAL PALM NETWORK PROJECT John Healy Tom Jamieson
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
A Guide to major network components
Diploma in Information Technology Principles of Information Systems and Data Management Classroom Local Area Network & Internet.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Microsoft Proxy Server 2.0 By Helen Sarian Nam Trieu Roy Chau Nancy Trang Xiao Xia Ren.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Virtual Private Network
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Computerized Networking of HIV Providers Networking Fundamentals Presented by: Tom Lang – LCG Technologies Corp. May 8, 2003.
Cisco PIX 515E Firewall. Overview What a PIX Firewall can do Adaptive Security Algorithm Address Translation Cut-Through Proxy Access Control Network.
Network LANscape Servers & Equipment Found In a Typical Local Area Network (LAN) By George Squillace New Horizons of MichiganGeorge Squillace MCT, MCSE,
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Barracuda Load Balancer Server Availability and Scalability.
MikroTik Experience Overview - Wireless ISP Solutions
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
1 Pertemuan 3 Networking Terminology. Discussion Topics Data networks Network history Networking devices Network topology Network protocols Local-area.
1 WHY NEED NETWORKING? - Access to remote information - Person-to-person communication - Cooperative work online - Resource sharing.
Zak Lowman Shaquille Wilkins. $10,000 Budget Server  Hardware HP ProLiant ML 100 G6  Intel Xeon X3430 Processor (4 core, 2.40 GHz)  2GB DDR3 RAM 
IT Infrastructure Chap 1: Definition
Internet Engineering Course Network Design. Internet Engineering Course; Sharif University of Technology Contents Define and analyse an organization network.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
How to compare Commercial Router with Consumer Routers.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Chapter 1 Introduction to Networking
Instructor Materials Chapter 1: LAN Design
Chapter 1: Exploring the Network
Wireless IP products: GWN series
CONNECTING TO THE INTERNET
NG/VITA Strategy & Architecture Tony Shoot December 19, 2006
Module 2: Configure Network Intrusion Detection and Prevention
Welcome! Thank you for joining us. We’ll get started in a few minutes.
3.1 Types of Servers.
Technology Architecture Guidebook
Module 5 - Switches CCNA 3 version 3.0.
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network
Professional Network Services
AbbottLink™ - IP Address Overview
Chapter 10: Advanced Cisco Adaptive Security Appliance
Cengage Learning: Computer Networking from LANs to WANs
Cloud Computing LegalRun Solutions Why It’s Right for You!
Topic 12: Virtual Private Networks
Presentation transcript:

Solus Technologies Your practical IT solution.

Solus Techs Associates  Dimitrios Foutsis – Project Leader – Hardware Specialist  Faizal Mohamed – Server Specialist  Obeidur Reza – Recovery Specialist  Tony Ng – Software Specialist

Solus Techs Overview  focus on providing the highest quality of service in networking needs to small-medium business  network infrastructure implementation, system integration with security and network administration  offered to be the best network solution for Ehome Brokerage firm  continue to have very good reputation around north america

Our Agenda  Main Topics Include:  Network Scalability  Network Security  Network Redundancy & Manageability  Ehome’s Network design solution

Network Scalability

 How well a solution will work when the size of the problem increases  Design/document a network for future needs  Increase Reliability and Redundancy

Current Systems Environment Windows 3.1  Outdated/no network support 486/Pentium based  unable to provide the processing power required by apps. No mobile users  Inconvenience Localized Backup  Inefficient and time consuming T1 to ISP  Insufficient to host a website No client support page  Man power needed 10MB co-ax backbone  Inadequate for streaming apps

Systems Requirements Windows NT4.0  New/built in network support Intel based  Gives network greater processing power. Users on the run  Able to access office computer from remote location Reliable backup  Maximize efficiency  Use ISDN for systems backup 3 T1 & 1 T3 to ISP  40 http OPS/T1 300 http OPS/T3 Support site  Easy for customers for any information

Systems Requirements(WS) Cost EffectiveHigh End  Intel Celeron 1.0Ghz  128MB SDRAM  20GB IDE 5200rpm HD  Integrated Sound/Video  24X CD-ROM  Intel PIV 1.7Ghz  256MB SDRAM  40GB IDE 7200rpm HD  ATI 32mb Vcard  512 Sound blaster Live  48X CD-ROM  Workstation

Systems Requirements(SWT)  Cisco Catalyst 6000 Switch  delivers high-performance, multi later switching solution for Enterprise/ISP networks  delivers exceptional scalability and high- availability  need 16 for each departments

Systems Requirements(RTR)  Cisco series router 6500 series - Cisco Express Forwarding(CEF) allows for increased scalability and performance to meet the future requirement for large enterprise networks - need 2 for our network 3600 series - Multi service access platforms for medium and large sized offices and smaller ISPs. - need 2 for our diagram

Network Security

 Greater security will be applied to Ehome’s new Toronto branch location  Apply Security policy for all branch employees, maximize security from internal or external individual(s)  Server will be placed in secure segment  Set Firewall prevent un-authorized intruders

Web Security  Using Network Address Translation, hides our internal IP address to the world(internet)  NAT allows all workstation to be connected to the internet while using their own internal IP address  NAT translates internal private IP address to legal public IP address

Cisco PIX 525 Firewall  designed specifically for secure, high- performance protection.  Strongest Security  Extremely reliable  Amazing flexibility  280,000 simultaneous connection

Cisco Works 2000  The LAN Management Solution offers advanced management of the Catalyst multi layer switches.  The Routed WAN Management Solution provides monitoring, traffic management, and access control to administer the routed infrastructure of multi service network

Cisco Works 2000  The Service Management Solution manages and monitors service-level agreements  The VPN/Security Management Solution optimizes VPN performance and security administration

Network Redundancy

 Disaster usually occurs unexpectedly  Implement Redundant Design so that it will be able to handle any amount of network downtime

Ehome Redundant Design Solution

Financial Report

DeviceQuantityUnit $Total Cisco 7200 Router 2$20,000.00$40, Cisco 6500 Router 2$16,000.00$32, Cisco 6000 Switch 16$12,000.00$256,000.00

Financial Report Cont DeviceQuantityUnit $Total Cisco PIX 525 1$12, T13$2,000.00$6, T31$60,000.00

Financial Report Cont Total amount for major networking equipment $406, price doesn’t include workstation/other additional accessory charges/labor charges

Questions/Thank you