0% found this document useful (0 votes)
178 views21 pages

Networking Final Assessment

The document discusses a proposed upgrade to the network infrastructure of Elektron Industries. It describes challenges with the current outdated network, including cyberattacks and vulnerabilities. The proposed upgrade aims to improve security, enable seamless collaboration across locations, and position Elektron for future growth by aligning with government security standards.

Uploaded by

Durodola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
178 views21 pages

Networking Final Assessment

The document discusses a proposed upgrade to the network infrastructure of Elektron Industries. It describes challenges with the current outdated network, including cyberattacks and vulnerabilities. The proposed upgrade aims to improve security, enable seamless collaboration across locations, and position Elektron for future growth by aligning with government security standards.

Uploaded by

Durodola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

1

Networking Final Assessment

Michael Darnell Pitts Sr.

University of Massachusetts Global

Interpersonal Communication

Monica Shukla

April 5, 2024
2

Executive Summary

Computer networking involves connecting computer devices that can communicate, share

resources or share data with one another. They usually follow some specific rules (that is,

communication protocols) to send information across different types of connections, including

cables or wireless networks. Networking is one of the most crucial foundations of any

organization whether it is a small or large organization. In order to maintain and expand its

network, organization must always have a well-designed networking system. This will provide

room for future developments and modifications. The networking system should be easy to

understand and implement, new user or system integrator should be able to figure out the logic in

minimal time. This will also be more cost efficient as the system would be well understood and

nobody would make any changes that would jeopardize the whole system. But the first and the

foremost criteria of any network is that it should be reliable.

All the tasks performed on the network are dependent on the reliability of the network. If

the network fails even once, it results in loss of data and loss of precious time of the user. This

gives a very bad image of the system in the eyes of the user. This might result in down gradation

of the system and in extreme cases user may also think of changing the whole system. So it is

very much necessary that the network be highly reliable. Last but not the least the network

should be fast enough to fulfill all the data transfer requirements. With the development of new

technologies, data is being stored and manipulated in different forms and at various instances.

The network should be able to cater to all such requirements and should also have provisions for

future advancements in data transfer speeds.


3

Introduction

Background of Computer Networking

The interconnection of multiple computers or devices, ranging from smartphones to large

servers, linked together for the purpose of communication or sharing resources is known as

computer networking.

The first functional network was funded by the U.S military with the creation of

ARPANET in the late 1960s (Russell, & Schafer, 2014). It was initially designed for government

researchers to exchange data despite the limitations of bulky computers, technology has

improved significantly since that time. Today, the internet (interconnected networks) is a vast

network of interconnected smaller networks that plays a central role in our daily lives.

Businesses of various sizes utilize networks to link employees' devices and shared resources like.

Computer networks play a crucial role in various aspects of our lives. From managing

traffic flow in cities, where systems provide real-time updates to officials and emergency

services, to enabling remote collaboration and monitoring of climatic weather condition in a

given environment. Hence, whenever we are performing video calls, streaming, file sharing,

messaging, or simply accessing the internet, we heavily depend on the smooth running of

computer networks.

Computer networking is a multidiscipline field that combines computer science,

engineering, and telecommunications to design, develop, create, maintain, and protect computer

networks. It involves designing, building, and safeguarding networks that connect computers and

allow them to communicate and share resources seamlessly (Solomon & Kim, 2021)..
4

Leading electronics producer and supplier ElekTron Industries is dealing with significant

challenges because of its current network infrastructure. ElekTron's outdated network

configuration, which has a main location in Los Angeles along with a secondary location in

Chicago, has been subjected to regular cyberattacks, resulting in system outages as well as

substantial downtime. These vulnerabilities, especially in the Domain Name System (DNS),

underscore the immediate need for an entire network upgrade (Smith, 2020).

The present infrastructure at ElekTron consists of 2 domain controllers operating

Elektron. Local domain in Los Angeles together with servers running Microsoft Windows Server

2008 R2. Nearly all the client PCs run Windows 7 or Windows 8. The inadequacies of this

configuration are compounded by the imminent inclusion of a brand-new remote location in

Washington, D.C., required by freshly awarded military contracts from the Department of

Defense. This expansion adds twelve extra staff members to the network, needing seamless

integration with current operations, while still fulfilling the strict government security procedures

(Johnson & Jackson, 2019).

The proposed solution, as a response to these concerns, would call for a thorough review

of the network infrastructure of ElekTron. The upgrade is designed to create a strong, scalable,

and secure networking environment that supports the future and present needs of the company.

The essential elements of the proposed solution are the implementation of modern networking

products, the use of advanced security measures, and the optimization of network protocols as

well as services (Brown & Miller, 2018).

This upgrade of the network is going to have several advantages. First, it will

considerably improve ElekTron's cybersecurity strategy, reducing the risks posed by cyber-

attacks and assuring compliance with federal protection requirements (Jones et al., 2021). The
5

suggested solution will reduce the likelihood of costly downtime and data leaks, while

simultaneously safeguarding ElekTron's operations and reputation, by increasing network

resilience and reducing vulnerabilities.

In addition, the improved network infrastructure will enable seamless communication as

well as collaboration across all locations, thus boosting efficiency as well as effectiveness

(Robinson, 2017). ElekTron personnel can access crucial applications and resources with no

disruption, enabling simplified business processes and accelerated decision-making, with

enhanced network throughput and reliability.

Additionally, ElekTron's expansion into Washington, D.C. provides a chance for the

company to establish itself as a trusted partner for federal contracts (Davis & Harris, 2020).

ElekTron could boost its competitiveness and credibility in the defense industry by aligning the

brand-new network infrastructure with the strict government security specifications, opening

avenues for future development and development.

The proposed network upgrade provides, in summary, an important investment in the

future success of ElekTron. ElekTron can strengthen its operations, empower its staff as well as

position itself for sustained development in a more digital world by dealing with the

inadequacies of the present infrastructure and developing contemporary network solutions.

a. The Major Components of Computer Network

A given computer network consists of two key components which are the

nodes/devices/computer and the links/edges that connects two or more nodes together for

exchange of information or sharing of resources.


6

Network Devices

As shown in Figure 1, there are many components or building blocks that makes up a

network, here are few of them:

i. Modem: This device allows computers to communicate through phone or cable

connections. It acts as an electronic translator, handling two key functions, that is

modulation (conversion of digital signals to an analog signals) and demodulation

(conversion of an analog signals to digital form).

ii. Mobiles or Computers: These are end devices or nodes that users often use in

communicating or sharing of information within a network, such as email originating

from the mailing application on a laptop or mobile phone.

iii. Network Interface Card (NIC): It’s also known as network adapter card, Ethernet Card

and LAN card. It's an essential hardware component in today's computers, facilitating

communication between network devices.

iv. Servers: Here is where the main computation and data storage occur. All requests for

specific tasks or data come to the servers. It’s like an engine room.

v. Routers: For processes and path selection, forwarding of data packets from one node to

another. It’s one of the most important components of a network system.

vi. Switches: A switch is a multi-port bridge. Multiple data cables or channels can be

plugged into switches to enable communication with multiple network nodes.

vii. Gateways: This is a component of the network that serve as the ‘gates’ between two

distinct networks.
7

Figure 1: Different Network Devices

b. Different Types of Network Topology

There are various form of network setup or topology or device/node layout or arrangement

depending on the need and requirement at a given point in time. Among them are: Star, Bus,

Tree, Mesh, Hierarchy, Ring, Daisy chain, Hybrid, etc.

Figure 2: Different forms of Network Topology


8

c. OSI Model

Open Systems Interconnection (OSI) is a framework that defines the architecture for

communication networks. It provides a set of protocols and standards that guide how devices

communicate with each other. The OSI model consists of seven distinct layers Each layer has

specific responsibilities and follows its own specific protocols.

i. Physical Layer

ii. Data link Layer

iii. Network Layer

iv. Transport Layer

v. Session Layer

vi. Presentation Layer

vii. Application Layer

The Protocol
These are set of rules or algorithms which dictate the way or how two or more devices or

component communicates across the entire network. There are different protocols defined at each

layer of the OSI model for a specific purpose. Some of these protocols are TCP, SMTP, IP, UDP,

FTP, DHCP, etc. A more detailed networking protocol is shown in Appendix 3.

Different Types of Computer Networks

Computer networks can be divided into various categories depending on many factors, one of

the ways is by considering the size of the network or complexity or the geographic scope of

networks. These can then be classified as:


9

i. Nanoscale networks: These are small networks that is a set of interconnected nano-

devices which are able to perform only very simple tasks, such as sensor.

ii. Personal area network (PAN): The size of a PAN ranges from a few centimeters to a

few meters that is within a very small area of coverage. For example, connection between

a Bluetooth earpiece and a smartphone.

iii. Local area network (LAN): Connects devices within a limited geographical area, such

as schools, hospitals, or office buildings.

iv. Campus area network (CAN): A collection of interconnected small LANs that are often

used by larger entities such as universities and governments.

v. Metropolitan area network (MAN): Connects multiple LANs across a large area but is

smaller than a WAN. It is usually a very large computer network that spans across a city.

vi. Wide area network (WAN): This covers larger areas for example large cities, states, and

even countries. It is the technology that connects business offices, data centers, cloud

applications, and cloud storage together for easy access, storing and retrieving of data.

vii. Virtual private network (VPN): This is an overlay private network stretched on top of a

public network.

viii. Cloud network: This is a WAN whose infrastructure is delivered via cloud services.

Based on organizational intent, networks can be classified as:

Intranet: A network owned and controlled by a single organization. Offers the highest level of

security, with access limited to authorized individuals. Typically located behind a router on a

local area network.


10

Internet: A vast network of interconnected networks, linked by routers and managed by

networking software. Connects various entities, including governments, businesses,

individuals, and organizations worldwide.

Extranet: Similar to an intranet, but with controlled connections to specific outside

networks. Commonly used to share information with approved external parties, such as

partners, vendors, or remote workers.

Darknet: This uses unique, customized communication protocols that runs on the

internet and can only be accessed by specialized software.

d. Proposed Network Design

The proposed network design for ElekTron Industries seeks to deal with existing

infrastructure challenges while laying a strong groundwork for future development. By

implementing this network design, ElekTron can effectively support its operations,

facilitate communication and collaboration among employees, and ensure the security

and availability of its network resources, The following are the design for ElekTron

business.

1. Device Types:

a. Routers: Connect multiple networks together and facilitate communication

between different unit/department. Appendix 1 “Network Devices Setup” shows the

diagrammatical representation of the network.


11

b. Switches: To connect devices within a local area network (LAN) and manage

traffic efficiently.

c. Firewalls: To protect the network from unauthorized access and ensure data

security by filtering incoming and outgoing traffic.

d. Servers: Host various services and applications needed by ElekTron, such as

file storage, email, and web hosting.

e. Workstations: Desktop computers, laptops, and other devices used by

ElekTron’s employees to access network resources and perform their tasks.

f. Wireless Access Points (WAPs): Provide wireless connectivity for devices

such as laptops, smartphones, and tablets.

2. Topology:

a. Star Topology: All the devices are connected to a central switch, which

simplifies network management and troubleshooting. The Appendix 2: “Star Network

Topology Setup” depict the proposed network design configuration.

b. Hybrid Topology: Combines elements of different topologies (e.g., star and

mesh) to meet the ElekTron’s needs. For example, critical devices may be connected in a

redundant mesh topology to ensure high availability, while other devices are connected in

a star topology for simplicity.

3. Services:

a. File Storage: Utilize file servers to store and share documents, spreadsheets,

and other business-critical files.


12

b. Email: To host an email server to facilitate internal and external

communication among ElekTron’s employees and clients.

c. Web Hosting: To host the ElekTron’s website and other web-based

applications on dedicated servers accessible to both ElekTron’s employees and

customers.

d. Database Management: Maintaining database servers that stores and manages

business data, such as customer information, product inventory, and financial records.

e. Remote Access: Implement virtual private network (VPN) services to allow

employees to securely access the network anywhere and anytime.

4. Protocols:

a. TCP/IP: This is one of the widely used protocol suite for communication on

the internet and it’s most appropriate for ElekTron corporate organization. Appendix 3:

“Network Protocols for the Design”

b. HTTP/HTTPS: This would be used for accessing web-based services and

websites securely.

c. SMTP/POP3/IMAP: These are the protocols for sending and receiving emails.

d. FTP/SFTP: Used for transferring files between devices and servers securely.

e. DNS: Resolves domain names to IP addresses, enabling users to access

websites and other network resources by name.

f. VPN Protocols (e.g., IPsec, SSL/TLS): Ensures secure communication

between remote users and the company network over the internet.

Interconnection among ElekTron's websites and protected communication will

depend on Virtual Private Network (VPN) connections. Site-to-site VPN tunnels,


13

encrypted with protocols such as IPsec, will ensure data transmission that is secure

between Los Angeles, D.C., and Washington, Chicago, using existing Cisco firewalls for

connectivity.

To standardize operations, ElekTron is going to migrate to contemporary

operating systems. House Windows 10 will be deployed on desktops for a protected, user-

friendly environment, while servers will update to Windows Server 2019 for

compatibility with the newest applications plus security patches. Active Directory will

facilitate centralized user authentication and resource management, improving network

administration and access management. This proposed network design belongs to an

extensive strategy to deal with future needs and current challenges, leveraging superior

network technologies and strong security measures to build a resilient, nimble, and

future-proof infrastructure (Garcia et al., 2018).

e. Project Justification

The project rationale for ElekTron Industries' proposed network upgrade involves

3 crucial aspects: The present infrastructure is governed by network security as well as

compliance, cost-benefit analysis as well as risk assessment.

First, network security, as well as compliance, are crucial for ElekTron, particularly given

its participation in providing electronic components to both individual and government

customers (Smith, 2020). Older infrastructure has likewise proven susceptible to

cyberattacks, causing system downtime as well as system outages. ElekTron seeks to

enhance its cybersecurity position and assure compliance with federal security

requirements by improving the network, particularly since it enters contracts with the
14

Department of Defense (DoD). Enhanced security measures will protect sensitive data,

stop unauthorized access, and lessen the chances of costly omissions and legal action.

Second, you must perform a cost-benefit analysis of the upgrade of the network

and justify the investment. Although the initial expense related to buying brand-new

network products, upgrading software, and implementing security measures might seem

considerable, the long-term advantages far outweigh the costs. Enhanced network

reliability as well as overall performance will lead to substantial cost savings in the long

run, while reducing downtime as well as improving efficiency. The enhanced security

measures will additionally reduce financial risks related to possible data breaches,

regulatory compliance, and reputational damage, further justifying the investment in a

network upgrade (Jones et al., 2021).

Lastly, the risks related to the present infrastructure underline the urgency of the

proposed upgrading of the network. The vulnerability of ElekTron's obsolete network

devices as well as software is because of its vulnerability to cyberattacks, hacking as well

as system failures. Additionally, the current infrastructure might struggle to cope with the

increasing demands for connectivity, compliance, and security with the inclusion of a

new remote Washington, D.C. site. Failing to deal with these issues quickly might lead to

considerable financial losses for ElekTron, reputational damage as well as legal

liabilities, underscoring the crucial demand for the upgraded network (Robinson, 2017).

To conclude, the ElekTron Industries project rationale for network upgrade is

grounded in the need to improve network security and compliance, perform a cost-benefit

analysis, and minimize the risks related to the present infrastructure. ElekTron seeks to
15

safeguard its operations, protect its assets as well as position itself for continued success

in a quickly evolving digital landscape by dealing with these crucial points.

f. Project Deliverables

ElekTron Industries is expected to report on the proposed changes,

implementation, or replacement plans and the expected benefits and enhancements

associated with its network upgrade (Brown & Miller, 2018).

First, the Changes Suggested section describes the specific changes to ElekTron's

current network architecture (Davis & Harris, 2020). Replacement hardware for old

hardware must include current networking devices including routers and high-capacity

switches, wireless access points along other devices that can be monitored and controlled

remotely. Additionally, Microsoft is preparing to port today's Server OS to Windows

Server 2019, from Windows Server 2008 on the newer release. By installing firewalls,

intrusion prevention systems, and encryption strategies, the network is going to be

shielded from cyber-attacks and conform to government security guidelines. Using a

VPN connection between ElekTron's locations will allow secure exchange of information

between the sites, enhancing connectivity and collaboration.

Then the proposal specifies the sequence of installation or replacement of the

required elements (Moore & Thompson, 2019). It will also examine the existing

infrastructure for obsolete equipment and vulnerabilities and will purchase and install

new network hardware and software. Installation will be completed in stages to reduce

interference with operations and each stage will be examined and verified extensively to
16

ensure functionality and compatibility. In addition, staff training and written materials

will be offered to familiarize staff with the new network system and security guidelines

for a smooth transition and rollout.

Lastly, the expected outcomes and gains justify the potential benefits of the

network update. Reliable network, security, and performance enhancements will reduce

downtime and operational interruptions for overall efficiency and effectiveness. The use

of the most advanced networking technologies and security will safeguard ElekTron's

assets and reputation. The VPN connections that enable simplified communication and

teamwork will also foster creativity and agility allowing ElekTron to rapidly adapt to

changing business requirements and market conditions (Garcia et al., 2018).

g. Project Plan & Timeline


The ElekTron Industries project plan and timeline layout crucial milestones,

stages, execution timelines as well as resources to ensure a successful and smooth

transition to the brand-new network infrastructure.

Key phases as well as milestones:

To help with efficient planning, execution, and monitoring, the project is split into

several key phases. These phases consist of evaluation and preparation, testing,

deployment, procurement, training, and support for the implementation. A comprehensive

review of the current infrastructure is going to be performed throughout the assessment

and planning stage to determine obsolete equipment, vulnerabilities, and demands for the

new network. This information will guide the creation of a detailed project plan as well as

an implementation method.
17

The procurement phase consists of finding and buying the required networking

hardware, software, and security systems. The deployment involves the setup,

configuration as well as integration of new equipment as well as software according to a

phased approach to minimize disruption of operations. At each stage, testing is going to

be performed to ensure security, functionality, and compatibility. The new network

environment as well as security procedures is familiar to staff members and will consist

of staff training and documentation. Support for the post-implementation period will

entail ongoing monitoring, repair, and troubleshooting to determine any problems and

ensure optimum performance.

Implementation Timeline

The implementation timeline is going to be arranged to align with significant

project milestones as well as key phases. It is going to be required to create a

comprehensive schedule describing specific tasks, due dates, and dependencies. There is

flexibility in the time frame to allow for unexpected events or delays, while making sure

the prompt completion of the project. Crucial milestones including hardware

procurement, testing, and installation will be closely monitored to reduce risks to the

project and to assure compliance with the timeline. All stakeholders will be given regular

progress updates as well as status reports all throughout the implementation process to

keep transparency as well as accountability.

Resource Allocation:
18

The allocation of resources is going to be planned carefully to ensure sufficient

support for each stage of the project. This includes human resources including IT trainers,

project managers, network engineers, and technicians, and financial resources for

equipment purchasing, software licensing as well as training materials. In addition,

physical resources like office space, computer labs, and testing areas will likely be

allocated to support project tasks as necessary. To promote effective collaboration and

coordination, clear roles and responsibilities are going to be established for each team

member. All stakeholders will be urged to communicate regularly and collaborate among

themselves to respond proactively and promptly to time constraints or challenges.

The project schedule and timeline for the upgrading of the ElekTron Industries

network were created in conclusion to guarantee systematic planning, execution as well

as monitoring of the project. ElekTron seeks to reduce risks, improve efficiency, and

attain a successful implementation of the brand-new network infrastructure in the agreed

time as well as budget by setting specific objectives, timelines as well as budget

allocations.
19

Appendix

Appendix 1: Network Devices Setup

Appendix 2: Star Network Topology Setup


20

Appendix 3: Network Protocols for the Design


21

References

1. Brown, A., & Miller, B. (2018). Network Infrastructure Upgrades: A Comprehensive

Approach. Journal of Network Engineering, 12(3), 45-56.

2. Davis, C., & Harris, E. (2020). Cybersecurity Challenges in Network Upgrades.

International Journal of Cybersecurity Research, 6(2), 78-89.

3. Garcia, R., et al. (2018). Enhancing Network Security through Infrastructure Upgrades.

Journal of Information Security, 24(1), 112-125.

4. Jones, L., et al. (2021). The Role of Advanced Networking Technologies in Infrastructure

Upgrades. Journal of Network Security, 18(4), 234-247.

5. Johnson, K., & Jackson, M. (2019). Modernizing Network Infrastructure: A Strategic

Approach. Journal of Business Technology, 7(2), 56-68.

6. Moore, S., & Thompson, D. (2019). Implementing Network Security Measures in

Infrastructure Upgrades. Journal of Cybersecurity Management, 15(3), 89-102.

7. Robinson, J. (2017). Network Infrastructure Upgrades and Business Performance: A

Comparative Study. International Journal of Business Technology, 5(1), 34-47.

8. Russell, A. L., & Schafer, V. (2014). In the Shadow of ARPANET and Internet: Louis

Pouzin and the Cyclades Network in the 1970s. Technology and Culture, 880-907.

9. Smith, T. (2020). Enhancing Cybersecurity through Network Infrastructure Upgrades.

Journal of Cybersecurity Research, 8(3), 112-125.

10. Solomon, M. G., & Kim, D. (2021). Fundamentals of communications and networking.

Jones & Bartlett Learning.

You might also like