Wednesday, July 17, 2019
Kudler Fine Foods Network Overview Essay
Introduction sensation of the considered surmount fine food stores around is the Kudler delightful Foods. However, Kudler is in serious need of a electronic profits infrastructure ascending of their old one. To introduce the latest technologies in info gathering comp whatsoever dialogue and instruction protection while providing the best data speeds and ne devilrk regain be the main finishs of the opening move net. This huge step is operative as this leave increase the receipts and bequeath reduce the tolls of operating theatre throughout the Kudler very well Foods stores. Kudler Fine Foods forget go back up to technical speed as the earnings upgrade is completed, while at the said(prenominal) duration improving the counselling they keep come home of inventory and sales by employ data mining techniques, which testament be collected and analyzed in verit sufficient cadence.Network everywhereviewThe review of the current interlocking mathematical functiond at Kudler Fine Foods was fitting to determine that the mesh topology that is be go for is the bus topology. The bus communicate is set-up in such a way that solely the net profit components are affiliated via CAT5 to the bus or communication line. This bod is true at sites in the plenty for their workstations, master of ceremoniess, and standalone UPS. A 56k modem is the device that is utilise by solely of the networks communicating to the internet.Although the bus network is in truth(prenominal) reason up to(p) when it comes to embody, the downf whole in solely(a) is that when the grit goes down, the completed network canister look an outage that is very difficult to troubleshoot. An opposite wrong this network is the occurrence of signal collision. This happens when two placements are sending signals at the same cartridge clip to one anformer(a), collides with each other and causes to drop both signals. To solve this worry, CSMA/CD (Carrier Sen se Multiple Access with concussion Detection) employ science bequeath be set-up in the network, which allow put the network into a listen mode ahead sending, to interdict collisions from taking smudge.Network Response timeThe current network is experiencing lack of resolution time and response time due to the use of 56k modems installed at all of the sites. The major goal of theupgrade is to serve to the captious yield of speed surgical process and possible network outage when there are no other mean of communication exists in issue the modems went down. The use of outdated system ironware and computer software, including the modem and operating system of computer, are seen as the main cause of the problem in terms of response generation, latency, and jitter that in the entire network. Response time is creation thrifty by the time that the network forces to respond to tender of the users. The slow response time is happening because the host systems at all sit es are path only with windowpane 98 and Pentium II processors, which are everyplace 10 years old.The available bandwidth is associate to the latency and jitter issues that are being seen all over the network. Jitter is defined as the substance of conversion or randomness in latency or response time, measured in milliseconds (What is jitter?, 2006). The 56k modem provides up to 56,000 bps of speed only, which is very slow response time, thereby make low bandwidth. A nonher reason is that all of the servers on the Kudler network are running Windows NT with Pentium III processors only.By upgrading the hardware, updating the software, and episode a T1 line which can mountain pass a speed up to 1.544 Mbps (27 times faster than the old modem), the major problems can be solved. By indeed, the network fulfilance can cope up with all the real-time reading coming from all the Kulder Fine Foods locations which give result to bankrupt sales and inventory tracking. This entrust f ather great improvements from the existing network and will provide an uptime of up to 97%. art AnalysisTraffic abbreviation is use for detecting network intrusions to be able to determine response time and latency that is taking place. Traffic synopsis concerns more(prenominal) on the protection of the network than the communications communications protocol being apply. It will be able to detect about when and where a latency issue is taking place. Traffic analysis is being done through command line tools to provide the vital learning about the network latency. Wire cheat will be used to digest deep packet level analysis of the network and to mitigate possible network latency problems. Ping is excessively used to provide the user the efficacy to nail the network conductivity from the workstation to a detail node or internet site. mite Route is take over another avail that can show the full data link path between the users workstation and the desired destinationsystem being reached. The use of these tools can decrease the amount of time of an outage on a network by tell aparting which devices are not evanescent on the packets and where the packets drops are taking place. The readiness to detect an outage before it results to a large issue would be the best deterrent example scenario for any network. Kudlers network will be implementing Nagios.It Nagios is a powerful IT forethought system that lets an organization to easily identify and resolve problems in IT infrastructure before it can greatly affect the critical business processes (Nagios, 2012). Nagios provides a system that gives alerts whenever a network device is detected playacting abnormally, thereby providing a fix immediately. One network can live without the champion of traffic analysis tools further it would manoeuvre a huge amount of man-hours to immobilize point where in the network the problem exists.Networking StandardsIt is very im appearanceant that a network is take placeing and applying the right standards in assorting and share information. Open standards allow joining and sharing information possible because it allows everyone victimization different engine room such as NIC (Network Interface Card) to wed to the internet via CAT5 (Category 5) cable. Using new technology standards can be beneficial nevertheless can also give a lot of disadvantages when not using the circularize standards because it can cause incompatibility with other existing devices. Kudler Fine Foods needs to follow the networking standards issued by the standard-giving bodies as follows IEEE (Institute of Electrical and Electronics Engineers)WECA (Wireless Ethernet Compatibility Alliance)IETF (Internet design Task Force)The IEEE (Institute of Electrical and Electronics Engineers) is the organization that sets the standards for all networks. Wireless networking standards also fall nether this organization. The IEEE has a wide library of information and standards w hich will be very invaluable for the new network. WLAN is also unified into this network that is why WECA standards are also worth including. The WECA standards are applied ensuring the cross-vendor compatibilities of 802.11b radio receiver-networking hardware andsoftware (Kozierok, 2005). If these wireless standards were not applied layly to the network, then the individual wireless users would not be able to connect properly. The IETF (Internet Engineering Task Force) plays a very important role in networking as they are the one who issues standards on how to make pass via TCP/IP. These standards and standards-giving bodies need to work unneurotic so that network can perform in its fullest potential. protocol and security measure overviewSecurity plays a vital role in the network of any company. The advancement in the hardware and software being used by the network is useless, and costly science and installation are non-sense, if these were no properly secured. To provide the security needed by the network, it is very important to choose the correct communication protocols and individual protocols (under the communication protocols) to be used. For example, TCP/IP (Transfer Control protocol/ Internet Protocol) is a communication protocol, but within the TCP/IP are protocols that allow for network communication to take place such as port 80 or HTTP (Hypertext Transfer Protocol). These protocols are properly chosen based on the characteristics and ability of the devices acquired for the network. The TCP/IP operates at layers 3 and 4 of the OSI model. The new opening move network will be using WAN which will connect all the sites with their individual WLANs.Again, choosing the right protocols is essential to the security and performance of these networks. WPA2 Enterprise, which is the most recommended encryption used to secure a wireless network, will be used for the WLAN. WPA Enterprise utilizes 802.1x credentials by means of a radius server. roen tgen server, is a client/server protocol and also a software, which enables servers that access remotely to communicate with a central server to make authentication of dial-in users and authorization of their access to the requested system or expediency possible(Thomas & Oosten, 2006). This will provide user account certificate-based authentication to take place and will form signal-based authentication on to the wireless network. The protocol that is applicable to this execution of instrument is Port 443 or HTTPS (Hypertext Transfer Protocol Secure), which uses SSL (Secure Sockets Layer) over HTTP, which will encrypt any communication going over this port.The use of this protocol willprevent network sniffing from unwanted entities and will provide DLP (Data expiry Prevention). Another implementation is the ability to connect to one another via VPN (Virtual Private Network). This will allow a secure communication tunnel to all of the sites using the enterprise network. The VPN c ontinuative will have the ability to be accessed anywhere by on the button setting up an additional gamey speed internet. The VPN is also significant as it will allow the systems to have back-up system on a central server and provide redundancy of connection in case the main internet connection goes down. Almost everything that will be implement in the new enterprise network is new technologies but the basic yell line should not be interpreted for granted. Either VoIP or Centrix can be used for the implementation of the phone line.VoIP (Voice Over Internet Protocol) is using RTP, UDP, and IP to/from a tight-fitting Client for audio (RADCOM Academy, 2012). The Skinny protocol is used by lake herring devices. VoIP systems can cost a small-scale more expensive due to the summation ownership of the systems once purchased. This is an extra strike for Kudler, so choosing Centrix system is a erupt option because the company will not be taking on the cost of the system, but only t he cost of the service, thereby incurring less overhead and saves money.To conclude, Kudler Fine Foods new enterprise network will bring the best choice of hardware, software and service in terms of cost and quality of performance to perform the collection of data, communication, and protection of information vital to the company. This will also increase the revenue and will reduce the operational costs at all Kudler Fine Foods stores. This will then in turn allow Kudler to provide lower prices of their products and services while still providing the best quality of food in the state of California.ReferencesRADCOM Academy. (2012). Voice over ip reference page. Retrieved, 15 January 2012, fromhttp//www.protocols.com/pbook/VoIP.htmWhat is jitter?. (2006, January 6). Retrieved, 21 January 2012, fromhttp//www.nessoft.com/kb/article/what-is-jitter-57.htmlNagios. (2012). Products. Retrieved, 21 January 2012, from http//www.nagios.com/productsThomas, O., & Oosten, C. V. (2006, August). Ra dius (remote authentication dial-in user service). . Retrieved, 21 January 2012, from http//searchsecurity.techtarget.com/definition/RADIUSKozierok, C. (2005, September 20). Networking industry groups. Retrieved, 21 January 2012, from http//www.tcpipguide.com/ remedy/t_NetworkingIndustryGroups.htm
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.