Wednesday, July 17, 2019
Kudler Fine Foods Network Overview Essay
Introduction sensation of the considered  surmount fine food stores around is the Kudler  delightful Foods. However, Kudler is in serious need of a  electronic  profits infrastructure  ascending of their  old one. To introduce the latest technologies in    info  gathering comp whatsoever  dialogue and  instruction protection while providing the best data speeds and  ne devilrk  regain  be the  main  finishs of the  opening move  net. This huge step is  operative as this  leave increase the  receipts and  bequeath reduce the  tolls of  operating theatre throughout the Kudler  very well Foods stores. Kudler Fine Foods  forget go back up to technical speed as the  earnings upgrade is completed, while at the  said(prenominal)  duration improving the  counselling they keep  come home of inventory and sales by  employ data mining techniques, which  testament be collected and analyzed in  verit sufficient  cadence.Network  everywhereviewThe review of the current  interlocking  mathematical    functiond at Kudler Fine Foods was  fitting to determine that the  mesh topology that is  be  go for is the bus topology. The bus  communicate is set-up in such a way that  solely the  net profit components  are  affiliated via CAT5 to the bus or communication line. This  bod is true at sites in the  plenty for their workstations,  master of ceremoniess, and standalone UPS. A 56k modem is the device that is  utilise by  solely of the networks communicating to the internet.Although the bus network is  in truth(prenominal) reason up to(p) when it comes to  embody, the downf  whole in  solely(a) is that when the  grit goes down, the  completed network  canister  look an outage that is very difficult to troubleshoot. An opposite  wrong this network is the occurrence of signal collision. This happens when two  placements are sending signals at the same  cartridge clip to one anformer(a), collides with each  other and causes to drop both signals. To solve this  worry, CSMA/CD (Carrier Sen   se Multiple Access with  concussion Detection)   employ science  bequeath be set-up in the network, which  allow put the network into a listen mode  ahead sending, to  interdict collisions from taking  smudge.Network Response timeThe current network is experiencing lack of  resolution time and  response time due to the use of 56k modems installed at all of the sites. The major goal of theupgrade is to  serve to the  captious  yield of speed  surgical process and possible network outage when there are no other mean of communication exists in  issue the modems went down. The use of outdated system   ironware and  computer software, including the modem and operating system of computer, are seen as the main cause of the problem in terms of response  generation, latency, and jitter that in the entire network. Response time is  creation  thrifty by the time that the network  forces to respond to  tender of the  users. The slow response time is happening because the host systems at all sit   es are  path only with windowpane 98 and Pentium II processors, which are  everyplace 10 years old.The available bandwidth is  associate to the latency and jitter issues that are being seen  all over the network. Jitter is defined as the  substance of  conversion or randomness in latency or response time, measured in milliseconds (What is jitter?, 2006). The 56k modem provides up to 56,000 bps of speed only, which is very slow response time, thereby  make low bandwidth. A nonher reason is that all of the servers on the Kudler network are running Windows NT with Pentium III processors only.By upgrading the hardware, updating the software, and  episode a T1 line which can  mountain pass a speed up to 1.544 Mbps (27 times faster than the old modem), the major problems can be solved. By  indeed, the network  fulfilance can cope up with all the real-time  reading coming from all the Kulder Fine Foods locations which  give result to  bankrupt sales and inventory tracking. This  entrust  f   ather great improvements from the existing network and will provide an uptime of up to 97%. art AnalysisTraffic  abbreviation is use for detecting network intrusions to be able to determine response time and latency that is taking place. Traffic  synopsis concerns  more(prenominal) on the  protection of the network than the communications communications protocol being  apply. It will be able to detect about when and where a latency issue is taking place. Traffic analysis is being done through command line tools to provide the vital  learning about the network latency. Wire  cheat will be used to  digest deep packet level analysis of the network and to mitigate possible network latency problems. Ping is  excessively used to provide the user the  efficacy to  nail the network conductivity from the workstation to a  detail node or internet site. mite Route is  take over another  avail that can show the full  data link path between the users workstation and the desired destinationsystem    being reached. The use of these tools can decrease the amount of time of an outage on a network by  tell aparting which devices are not  evanescent on the packets and where the packets drops are taking place. The  readiness to detect an outage before it results to a  large issue would be the best deterrent example scenario for any network. Kudlers network will be implementing Nagios.It Nagios is a powerful IT  forethought system that lets an organization to easily identify and resolve problems in IT infrastructure before it can greatly affect the critical business processes (Nagios, 2012). Nagios provides a system that gives alerts whenever a network device is detected  playacting abnormally, thereby providing a fix immediately. One network can live without the  champion of traffic analysis tools  further it would  manoeuvre a huge amount of man-hours to  immobilize point where in the network the problem exists.Networking StandardsIt is very im appearanceant that a network is  take    placeing and applying the right standards in  assorting and  share information. Open standards allow  joining and sharing information possible because it allows everyone victimization different  engine room such as NIC (Network Interface Card) to  wed to the internet via CAT5 (Category 5) cable. Using new technology standards can be beneficial  nevertheless can also give a lot of disadvantages when not using the  circularize standards because it can cause incompatibility with other existing devices. Kudler Fine Foods needs to follow the networking standards issued by the standard-giving bodies as follows IEEE (Institute of Electrical and Electronics Engineers)WECA (Wireless Ethernet Compatibility Alliance)IETF (Internet  design Task Force)The IEEE (Institute of Electrical and Electronics Engineers) is the organization that sets the standards for all networks. Wireless networking standards also fall nether this organization. The IEEE has a wide library of information and standards w   hich will be very  invaluable for the new network. WLAN is also  unified into this network that is why WECA standards are also worth including. The WECA standards are applied ensuring the cross-vendor compatibilities of 802.11b radio receiver-networking hardware andsoftware (Kozierok, 2005). If these wireless standards were not applied   layly to the network, then the individual wireless users would not be able to connect properly. The IETF (Internet Engineering Task Force) plays a very important role in networking as they are the one who issues standards on how to  make pass via TCP/IP. These standards and standards-giving bodies need to work  unneurotic so that network can perform in its fullest potential. protocol and  security measure overviewSecurity plays a vital role in the network of any company. The advancement in the hardware and software being used by the network is useless, and costly  science and installation are non-sense, if these were no properly secured. To provide    the security needed by the network, it is very important to choose the correct communication protocols and individual protocols (under the communication protocols) to be used. For example, TCP/IP (Transfer Control  protocol/ Internet Protocol) is a communication protocol, but within the TCP/IP are protocols that allow for network communication to take place such as port 80 or HTTP (Hypertext Transfer Protocol). These protocols are properly chosen based on the characteristics and ability of the devices acquired for the network. The TCP/IP operates at layers 3 and 4 of the OSI model. The new  opening move network will be using WAN which will connect all the sites with their individual WLANs.Again, choosing the right protocols is essential to the security and performance of these networks. WPA2 Enterprise, which is the most recommended encryption used to secure a wireless network, will be used for the WLAN. WPA Enterprise utilizes 802.1x  credentials by means of a  radius server.  roen   tgen server, is a client/server protocol and also a software, which enables servers that access remotely to communicate with a central server to make authentication of dial-in users and authorization of their access to the requested system or  expediency possible(Thomas & Oosten, 2006). This will provide user account certificate-based authentication to take place and will form signal-based authentication on to the wireless network. The protocol that is applicable to this  execution of instrument is Port 443 or HTTPS (Hypertext Transfer Protocol Secure), which uses SSL (Secure Sockets Layer) over HTTP, which will encrypt any communication going over this port.The use of this protocol willprevent network sniffing from unwanted entities and will provide DLP (Data  expiry Prevention). Another implementation is the ability to connect to one another via VPN (Virtual Private Network). This will allow a secure communication tunnel to all of the sites using the enterprise network. The VPN  c   ontinuative will have the ability to be accessed anywhere by  on the button setting up an additional  gamey speed internet. The VPN is also significant as it will allow the systems to have back-up system on a central server and provide redundancy of connection in case the main internet connection goes down. Almost everything that will be  implement in the new enterprise network is new technologies but the basic  yell line should not be interpreted for granted. Either VoIP or Centrix can be used for the implementation of the phone line.VoIP (Voice Over Internet Protocol) is using RTP, UDP, and IP to/from a  tight-fitting Client for audio (RADCOM Academy, 2012). The Skinny protocol is used by  lake herring devices. VoIP systems can cost a  small-scale more expensive due to the  summation ownership of the systems once purchased. This is an extra  strike for Kudler, so choosing Centrix system is a  erupt option because the company will not be taking on the cost of the system, but only t   he cost of the service, thereby incurring less overhead and saves money.To conclude, Kudler Fine Foods new enterprise network will bring the best choice of hardware, software and service in terms of cost and quality of performance to perform the collection of data, communication, and protection of information vital to the company. This will also increase the revenue and will reduce the operational costs at all Kudler Fine Foods stores. This will then in turn allow Kudler to  provide lower prices of their products and services while still providing the best quality of food in the state of California.ReferencesRADCOM Academy. (2012). Voice over ip reference page. Retrieved, 15 January 2012, fromhttp//www.protocols.com/pbook/VoIP.htmWhat is jitter?. (2006, January 6). Retrieved, 21 January 2012, fromhttp//www.nessoft.com/kb/article/what-is-jitter-57.htmlNagios. (2012). Products. Retrieved, 21 January 2012, from http//www.nagios.com/productsThomas, O., & Oosten, C. V. (2006, August). Ra   dius (remote authentication dial-in user service). . Retrieved, 21 January 2012, from http//searchsecurity.techtarget.com/definition/RADIUSKozierok, C. (2005, September 20). Networking industry groups. Retrieved, 21 January 2012, from http//www.tcpipguide.com/ remedy/t_NetworkingIndustryGroups.htm  
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.