Thursday, March 7, 2019

Kudler Fine Foods Network Overview Essay

IntroductionOne of the considered best fine food stores near is the Kudler amercement Foods. However, Kudler is in serious subprogram up of a web root wage hike of their old one. To introduce the latest technologies in study show company communion and culture protection while providing the best data speeds and net access argon the main goals of the opening communicate. This huge a managere is signifi hatfult as this go forth increase the tax and give slue the tolls of operation throughout the Kudler Fine Foods stores. Kudler Fine Foods earmark go back up to technological speed as the interlocking upgrade is completed, while at the same meter improving the way they celebrate track of inventory and gross sales by using data tap techniques, which bear be collected and analyzed in real time. meshwork OverviewThe review of the current communicate utilize at Kudler Fine Foods was adequate to determine that the network topology that is creation used is the bus topology. The bus network is set-up in such a way that each(prenominal) the network components atomic number 18 associateed via CAT5 to the bus or communication line. This configuration is true(a) at sites in the corporation for their workstations, servers, and standalone UPS. A 56k modem is the device that is used by all of the networks communicating to the internet.Although the bus network is actually reason sufficient when it comes to cost, the fall is that when the backbone goes down, the entire network burn down encounter an outage that is very hard-fought to troubleshoot. Anformer(a) disadvantage this network is the occurrence of signal collision. This happens when two trunks be sending signals at the same time to one some other, collides with each other and causes to drop both signals. To solve this paradox, CSMA/CD (Carrier Sense Multiple nettle with Collision Detection) technology will be set-up in the network, which will spue the network into a listen mod e before sending, to prevent collisions from fetching place.Network Response timeThe current network is experiencing lack of resolution time and latency due to the use of 56k modems installed at all of the sites. The study goal of theupgrade is to respond to the critical issue of speed cognitive process and possible network outage when there atomic number 18 no other recall of communication exists in case the modems went down. The use of outdated system ironw ar and software, including the modem and operating system of computer, are seen as the main cause of the problem in terms of reception quantify, latency, and jitter that in the entire network. Response time is being measured by the time that the network considers to respond to ensure of the users. The slow response time is happening because the host systems at all sites are running only with Window 98 and Pentium II processors, which are everywhere 10 years old.The available bandwidth is related to the latency and j itter issues that are being seen over the network. Jitter is defined as the amount of variation or randomness in latency or response time, measured in milliseconds (What is jitter?, 2006). The 56k modem domiciliates up to 56,000 bps of speed only, which is very slow response time, thereby causing low bandwidth. A nonher reason is that all of the servers on the Kudler network are running Windows NT with Pentium III processors only.By upgrading the hardware, updating the software, and installing a T1 line which can offer a speed up to 1.544 Mbps (27 times faster than the old modem), the major problems can be solved. By then, the network performance can cope up with all the real-time information coming from all the Kulder Fine Foods locations which will result to better sales and inventory tracking. This will give great improvements from the existing network and will generate an uptime of up to 97%. concern AnalysisTraffic compend is used for detecting network intrusions to be able to determine response time and latency that is taking place. Traffic compendium concerns more on the security of the network than the protocol being used. It will be able to detect about when and where a latency issue is taking place. Traffic analysis is being done through command line tools to provide the vital information about the network latency. Wire Shark will be used to allow deep packet level analysis of the network and to mitigate possible network latency problems. Ping is in any case used to provide the user the skill to check the network conductivity from the workstation to a specific node or internet site.Trace route is still another utility that can show the full conjunction path between the users workstation and the desired destinationsystem being reached. The use of these tools can decrease the amount of time of an outage on a network by identifying which devices are not passing on the packets and where the packets drops are taking place. The ability to detect an outage before it results to a bigger issue would be the best case scenario for any network. Kudlers network will be implementing Nagios.It Nagios is a powerful IT management system that lets an system of rules to easily identify and resolve problems in IT infrastructure before it can greatly affect the critical business processes (Nagios, 2012). Nagios provides a system that gives alerts whenever a network device is detected acting abnormally, thereby providing a peck immediately. One network can live without the help of traffic analysis tools but it would take a huge amount of man-hours to pin blockage where in the network the problem exists.Networking StandardsIt is very important that a network is following and applying the right standards in connecting and sharing information. Open standards allow connecting and sharing information possible because it allows everyone using different technology such as NIC (Network Interface Card) to connect to the internet via CAT5 (Categ ory 5) cable. Using modern technology standards can be beneficial but can as well give a lot of disadvantages when not using the open standards because it can cause mutual exclusiveness with other existing devices. Kudler Fine Foods needs to follow the networking standards issued by the standard-giving bodies as follows IEEE (Institute of Electrical and Electronics Engineers)WECA ( receiving set Ethernet Compatibility Alliance)IETF (Internet Engineering Task Force)The IEEE (Institute of Electrical and Electronics Engineers) is the organization that sets the standards for all networks. Wireless networking standards also fall under this organization. The IEEE has a wide library of information and standards which will be very valuable for the new network. WLAN is also incorporated into this network that is why WECA standards are also worth including. The WECA standards are applied ensuring the cross-vendor compatibilities of 802.11b wireless-networking hardware andsoftware (Kozierok , 2005). If these wireless standards were not applied decently to the network, then the individual wireless users would not be able to connect properly. The IETF (Internet Engineering Task Force) plays a very important role in networking as they are the one who issues standards on how to communicate via TCP/IP. These standards and standards-giving bodies need to work together so that network can perform in its fullest potential.Protocol and Security overviewSecurity plays a vital role in the network of any company. The advancement in the hardware and software being used by the network is useless, and costly acquisition and installation are non-sense, if these were no properly secured. To provide the security needed by the network, it is very important to choose the correct communication protocols and individual protocols (under the communication protocols) to be used. For example, TCP/IP (Transfer Control Protocol/ Internet Protocol) is a communication protocol, but within the TCP/ IP are protocols that allow for network communication to take place such as port 80 or HTTP (Hypertext Transfer Protocol). These protocols are properly chosen based on the characteristics and ability of the devices acquired for the network. The TCP/IP operates at layers 3 and 4 of the OSI model. The new enterprisingness network will be using WAN which will connect all the sites with their individual WLANs.Again, choosing the right protocols is essential to the security and performance of these networks. WPA2 Enterprise, which is the most recommended encryption used to secure a wireless network, will be used for the WLAN. WPA Enterprise utilizes 802.1x authentications by means of a gas constant server. RADIUS server, is a client/server protocol and also a software, which enables servers that access remotely to communicate with a central server to take a crap authentication of dial-in users and authorization of their access to the requested system or military function possible(Th omas & Oosten, 2006). This will provide user account certificate-based authentication to take place and will form signal-based authentication on to the wireless network. The protocol that is applicable to this implementation is Port 443 or HTTPS (Hypertext Transfer Protocol Secure), which uses SSL (Secure Sockets Layer) over HTTP, which will encrypt any communication going over this port.The use of this protocol willprevent network sniffing from unwanted entities and will provide DLP (Data Loss Prevention). Another implementation is the ability to connect to one another via VPN (Virtual Private Network). This will allow a secure communication turn over to all of the sites using the enterprise network. The VPN corporation will have the ability to be accessed anywhere by just setting up an special high speed internet. The VPN is also significant as it will allow the systems to have back-up system on a central server and provide redundancy of connection in case the main internet con nection goes down. Almost everything that will be implemented in the new enterprise network is new technologies but the basic phone line should not be taken for granted. Either VoIP or Centrix can be used for the implementation of the phone line.VoIP (Voice Over Internet Protocol) is using RTP, UDP, and IP to/from a Skinny Client for audio (RADCOM Academy, 2012). The Skinny protocol is used by Cisco devices. VoIP systems can cost a little more dearly-won due to the total ownership of the systems once purchased. This is an extra overhead for Kudler, so choosing Centrix system is a better option because the company will not be taking on the cost of the system, but only the cost of the service, thereby incurring less overhead and saves money.To conclude, Kudler Fine Foods new enterprise network will bring the best choice of hardware, software and service in terms of cost and quality of performance to perform the charm of data, communication, and protection of information vital to the company. This will also increase the revenue and will reduce the operational costs at all Kudler Fine Foods stores. This will then in turn allow Kudler to offer disappoint prices of their products and services while still providing the best quality of food in the state of California.ReferencesRADCOM Academy. (2012). Voice over ip reference page. Retrieved, 15 January 2012, fromhttp//www.protocols.com/pbook/VoIP.htmWhat is jitter?. (2006, January 6). Retrieved, 21 January 2012, fromhttp//www.nessoft.com/kb/article/what-is-jitter-57.htmlNagios. (2012). Products. Retrieved, 21 January 2012, from http//www.nagios.com/productsThomas, O., & Oosten, C. V. (2006, August). Radius (remote authentication dial-in user service). . Retrieved, 21 January 2012, from http//searchsecurity.techtarget.com/definition/RADIUSKozierok, C. (2005, September 20). Networking industry groups. Retrieved, 21 January 2012, from http//www.tcpipguide.com/free/t_NetworkingIndustryGroups.htm

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.