Networking Final Assessment
Networking Final Assessment
Interpersonal Communication
Monica Shukla
April 5, 2024
2
Executive Summary
Computer networking involves connecting computer devices that can communicate, share
resources or share data with one another. They usually follow some specific rules (that is,
cables or wireless networks. Networking is one of the most crucial foundations of any
organization whether it is a small or large organization. In order to maintain and expand its
network, organization must always have a well-designed networking system. This will provide
room for future developments and modifications. The networking system should be easy to
understand and implement, new user or system integrator should be able to figure out the logic in
minimal time. This will also be more cost efficient as the system would be well understood and
nobody would make any changes that would jeopardize the whole system. But the first and the
All the tasks performed on the network are dependent on the reliability of the network. If
the network fails even once, it results in loss of data and loss of precious time of the user. This
gives a very bad image of the system in the eyes of the user. This might result in down gradation
of the system and in extreme cases user may also think of changing the whole system. So it is
very much necessary that the network be highly reliable. Last but not the least the network
should be fast enough to fulfill all the data transfer requirements. With the development of new
technologies, data is being stored and manipulated in different forms and at various instances.
The network should be able to cater to all such requirements and should also have provisions for
Introduction
servers, linked together for the purpose of communication or sharing resources is known as
computer networking.
The first functional network was funded by the U.S military with the creation of
ARPANET in the late 1960s (Russell, & Schafer, 2014). It was initially designed for government
researchers to exchange data despite the limitations of bulky computers, technology has
improved significantly since that time. Today, the internet (interconnected networks) is a vast
network of interconnected smaller networks that plays a central role in our daily lives.
Businesses of various sizes utilize networks to link employees' devices and shared resources like.
Computer networks play a crucial role in various aspects of our lives. From managing
traffic flow in cities, where systems provide real-time updates to officials and emergency
given environment. Hence, whenever we are performing video calls, streaming, file sharing,
messaging, or simply accessing the internet, we heavily depend on the smooth running of
computer networks.
engineering, and telecommunications to design, develop, create, maintain, and protect computer
networks. It involves designing, building, and safeguarding networks that connect computers and
allow them to communicate and share resources seamlessly (Solomon & Kim, 2021)..
4
Leading electronics producer and supplier ElekTron Industries is dealing with significant
configuration, which has a main location in Los Angeles along with a secondary location in
Chicago, has been subjected to regular cyberattacks, resulting in system outages as well as
substantial downtime. These vulnerabilities, especially in the Domain Name System (DNS),
underscore the immediate need for an entire network upgrade (Smith, 2020).
Elektron. Local domain in Los Angeles together with servers running Microsoft Windows Server
2008 R2. Nearly all the client PCs run Windows 7 or Windows 8. The inadequacies of this
Washington, D.C., required by freshly awarded military contracts from the Department of
Defense. This expansion adds twelve extra staff members to the network, needing seamless
integration with current operations, while still fulfilling the strict government security procedures
The proposed solution, as a response to these concerns, would call for a thorough review
of the network infrastructure of ElekTron. The upgrade is designed to create a strong, scalable,
and secure networking environment that supports the future and present needs of the company.
The essential elements of the proposed solution are the implementation of modern networking
products, the use of advanced security measures, and the optimization of network protocols as
This upgrade of the network is going to have several advantages. First, it will
considerably improve ElekTron's cybersecurity strategy, reducing the risks posed by cyber-
attacks and assuring compliance with federal protection requirements (Jones et al., 2021). The
5
suggested solution will reduce the likelihood of costly downtime and data leaks, while
well as collaboration across all locations, thus boosting efficiency as well as effectiveness
(Robinson, 2017). ElekTron personnel can access crucial applications and resources with no
Additionally, ElekTron's expansion into Washington, D.C. provides a chance for the
company to establish itself as a trusted partner for federal contracts (Davis & Harris, 2020).
ElekTron could boost its competitiveness and credibility in the defense industry by aligning the
brand-new network infrastructure with the strict government security specifications, opening
future success of ElekTron. ElekTron can strengthen its operations, empower its staff as well as
position itself for sustained development in a more digital world by dealing with the
A given computer network consists of two key components which are the
nodes/devices/computer and the links/edges that connects two or more nodes together for
Network Devices
As shown in Figure 1, there are many components or building blocks that makes up a
ii. Mobiles or Computers: These are end devices or nodes that users often use in
iii. Network Interface Card (NIC): It’s also known as network adapter card, Ethernet Card
and LAN card. It's an essential hardware component in today's computers, facilitating
iv. Servers: Here is where the main computation and data storage occur. All requests for
specific tasks or data come to the servers. It’s like an engine room.
v. Routers: For processes and path selection, forwarding of data packets from one node to
vi. Switches: A switch is a multi-port bridge. Multiple data cables or channels can be
vii. Gateways: This is a component of the network that serve as the ‘gates’ between two
distinct networks.
7
There are various form of network setup or topology or device/node layout or arrangement
depending on the need and requirement at a given point in time. Among them are: Star, Bus,
c. OSI Model
Open Systems Interconnection (OSI) is a framework that defines the architecture for
communication networks. It provides a set of protocols and standards that guide how devices
communicate with each other. The OSI model consists of seven distinct layers Each layer has
i. Physical Layer
v. Session Layer
The Protocol
These are set of rules or algorithms which dictate the way or how two or more devices or
component communicates across the entire network. There are different protocols defined at each
layer of the OSI model for a specific purpose. Some of these protocols are TCP, SMTP, IP, UDP,
Computer networks can be divided into various categories depending on many factors, one of
the ways is by considering the size of the network or complexity or the geographic scope of
i. Nanoscale networks: These are small networks that is a set of interconnected nano-
devices which are able to perform only very simple tasks, such as sensor.
ii. Personal area network (PAN): The size of a PAN ranges from a few centimeters to a
few meters that is within a very small area of coverage. For example, connection between
iii. Local area network (LAN): Connects devices within a limited geographical area, such
iv. Campus area network (CAN): A collection of interconnected small LANs that are often
v. Metropolitan area network (MAN): Connects multiple LANs across a large area but is
smaller than a WAN. It is usually a very large computer network that spans across a city.
vi. Wide area network (WAN): This covers larger areas for example large cities, states, and
even countries. It is the technology that connects business offices, data centers, cloud
applications, and cloud storage together for easy access, storing and retrieving of data.
vii. Virtual private network (VPN): This is an overlay private network stretched on top of a
public network.
viii. Cloud network: This is a WAN whose infrastructure is delivered via cloud services.
Intranet: A network owned and controlled by a single organization. Offers the highest level of
security, with access limited to authorized individuals. Typically located behind a router on a
networks. Commonly used to share information with approved external parties, such as
Darknet: This uses unique, customized communication protocols that runs on the
The proposed network design for ElekTron Industries seeks to deal with existing
implementing this network design, ElekTron can effectively support its operations,
facilitate communication and collaboration among employees, and ensure the security
and availability of its network resources, The following are the design for ElekTron
business.
1. Device Types:
b. Switches: To connect devices within a local area network (LAN) and manage
traffic efficiently.
c. Firewalls: To protect the network from unauthorized access and ensure data
2. Topology:
a. Star Topology: All the devices are connected to a central switch, which
mesh) to meet the ElekTron’s needs. For example, critical devices may be connected in a
redundant mesh topology to ensure high availability, while other devices are connected in
3. Services:
a. File Storage: Utilize file servers to store and share documents, spreadsheets,
customers.
business data, such as customer information, product inventory, and financial records.
4. Protocols:
a. TCP/IP: This is one of the widely used protocol suite for communication on
the internet and it’s most appropriate for ElekTron corporate organization. Appendix 3:
websites securely.
c. SMTP/POP3/IMAP: These are the protocols for sending and receiving emails.
d. FTP/SFTP: Used for transferring files between devices and servers securely.
between remote users and the company network over the internet.
encrypted with protocols such as IPsec, will ensure data transmission that is secure
between Los Angeles, D.C., and Washington, Chicago, using existing Cisco firewalls for
connectivity.
operating systems. House Windows 10 will be deployed on desktops for a protected, user-
friendly environment, while servers will update to Windows Server 2019 for
compatibility with the newest applications plus security patches. Active Directory will
extensive strategy to deal with future needs and current challenges, leveraging superior
network technologies and strong security measures to build a resilient, nimble, and
e. Project Justification
The project rationale for ElekTron Industries' proposed network upgrade involves
First, network security, as well as compliance, are crucial for ElekTron, particularly given
enhance its cybersecurity position and assure compliance with federal security
requirements by improving the network, particularly since it enters contracts with the
14
Department of Defense (DoD). Enhanced security measures will protect sensitive data,
stop unauthorized access, and lessen the chances of costly omissions and legal action.
Second, you must perform a cost-benefit analysis of the upgrade of the network
and justify the investment. Although the initial expense related to buying brand-new
network products, upgrading software, and implementing security measures might seem
considerable, the long-term advantages far outweigh the costs. Enhanced network
reliability as well as overall performance will lead to substantial cost savings in the long
run, while reducing downtime as well as improving efficiency. The enhanced security
measures will additionally reduce financial risks related to possible data breaches,
Lastly, the risks related to the present infrastructure underline the urgency of the
as system failures. Additionally, the current infrastructure might struggle to cope with the
increasing demands for connectivity, compliance, and security with the inclusion of a
new remote Washington, D.C. site. Failing to deal with these issues quickly might lead to
liabilities, underscoring the crucial demand for the upgraded network (Robinson, 2017).
grounded in the need to improve network security and compliance, perform a cost-benefit
analysis, and minimize the risks related to the present infrastructure. ElekTron seeks to
15
safeguard its operations, protect its assets as well as position itself for continued success
f. Project Deliverables
First, the Changes Suggested section describes the specific changes to ElekTron's
current network architecture (Davis & Harris, 2020). Replacement hardware for old
hardware must include current networking devices including routers and high-capacity
switches, wireless access points along other devices that can be monitored and controlled
Server 2019, from Windows Server 2008 on the newer release. By installing firewalls,
VPN connection between ElekTron's locations will allow secure exchange of information
required elements (Moore & Thompson, 2019). It will also examine the existing
infrastructure for obsolete equipment and vulnerabilities and will purchase and install
new network hardware and software. Installation will be completed in stages to reduce
interference with operations and each stage will be examined and verified extensively to
16
ensure functionality and compatibility. In addition, staff training and written materials
will be offered to familiarize staff with the new network system and security guidelines
Lastly, the expected outcomes and gains justify the potential benefits of the
network update. Reliable network, security, and performance enhancements will reduce
downtime and operational interruptions for overall efficiency and effectiveness. The use
of the most advanced networking technologies and security will safeguard ElekTron's
assets and reputation. The VPN connections that enable simplified communication and
teamwork will also foster creativity and agility allowing ElekTron to rapidly adapt to
To help with efficient planning, execution, and monitoring, the project is split into
several key phases. These phases consist of evaluation and preparation, testing,
and planning stage to determine obsolete equipment, vulnerabilities, and demands for the
new network. This information will guide the creation of a detailed project plan as well as
an implementation method.
17
The procurement phase consists of finding and buying the required networking
hardware, software, and security systems. The deployment involves the setup,
environment as well as security procedures is familiar to staff members and will consist
of staff training and documentation. Support for the post-implementation period will
entail ongoing monitoring, repair, and troubleshooting to determine any problems and
Implementation Timeline
comprehensive schedule describing specific tasks, due dates, and dependencies. There is
flexibility in the time frame to allow for unexpected events or delays, while making sure
procurement, testing, and installation will be closely monitored to reduce risks to the
project and to assure compliance with the timeline. All stakeholders will be given regular
progress updates as well as status reports all throughout the implementation process to
Resource Allocation:
18
support for each stage of the project. This includes human resources including IT trainers,
project managers, network engineers, and technicians, and financial resources for
physical resources like office space, computer labs, and testing areas will likely be
coordination, clear roles and responsibilities are going to be established for each team
member. All stakeholders will be urged to communicate regularly and collaborate among
The project schedule and timeline for the upgrading of the ElekTron Industries
as monitoring of the project. ElekTron seeks to reduce risks, improve efficiency, and
allocations.
19
Appendix
References
3. Garcia, R., et al. (2018). Enhancing Network Security through Infrastructure Upgrades.
4. Jones, L., et al. (2021). The Role of Advanced Networking Technologies in Infrastructure
8. Russell, A. L., & Schafer, V. (2014). In the Shadow of ARPANET and Internet: Louis
Pouzin and the Cyclades Network in the 1970s. Technology and Culture, 880-907.
10. Solomon, M. G., & Kim, D. (2021). Fundamentals of communications and networking.