KFF Network Design Final
Transcript of KFF Network Design Final
Running Head: KFF NETWORK DESIGN 1
KFF Network Design
Emanuel Hernandez
NTC/362
September 23, 2012
Eddie Horton
KFF NETWORK DESIGN 2
KFF Network Design
Kudler Fine Foods (KFF) uses a linear bus topology consisting of a main run of cable
made of a terminator at each end. The file server, workstations and peripherals are all connected
to the linear cable. Under the architecture of network used, it is easy to connect peripheral or a
computer to the linear bus and it saves costs involved in purchasing cables (Cisco Inc., 2000).
However, there are high data transfer rates due to use of Ethernet but if the linear cable breaks, it
halts the entire network.
KFF’s network allows sharing of resources such as printer, modems and CD-ROM,
which makes it cheaper to set up the network and save on costs. Also, networked computers are
able to share centralized key computer programs such as inventory spreadsheets allowing users
to have the same program as opposed to copies of the program hence they can work on the
program simultaneously. Additionally, the network supports automated unattended backup of
contents and valuables that make it easy to backup essential files without wasting time.
Use of Ethernet in KFF ensures that computers listen to the cable before transmitting data
through the network (Cisco Inc., 2000). Ethernet uses carrier sense multiple access method
which allows computers to send information based on network traffic; if the network is clear,
Ethernet allows data transmission, if not, the sending computer is put on a waiting mode and
prompted to resend the data after sometime. In this kind of network, Ethernet only transmits data
at a speed of 10 megabits per second; this speed is very slow.
Evaluate the current network topology
KFF uses an out dated network topology which suffers the disadvantage of complete
breakdown in case the backbone linear cable breaks. The Bus topology is limited to
accommodating only a few computer and peripheral components and if a component fails, then
KFF NETWORK DESIGN 3
the entire string fails. In this type of network, it is hard to determine the source cause of a
problem in case it occurs thus time consuming in terms of problem identification and resolution.
However, the bus network topology enjoys fast real time data communication and simple remote
monitoring and management of components. The design is cheap and easy to configure.
In terms of reliability, the bus topology is not reliable at all. This arises from data
transmission style where data is propagated in form of electrical pulses. Basically, when a node
transmits a series of electrical pulses, the pulses travel in all directions along the carrier cable and
they continue traveling until they find a component to absorb them or they weaken in such a
manner that they are undetectable. If a signal encounters the end of a cable, it bounces back until
it is absorbed. Therefore, from transmission, data signals are relayed across transportation
medium and are expected to travel to both ends of the bus hence making it essential to check the
signals to prevent continuous bouncing back that would prevent other computers from sending
data. We can avert this situation using logical bus topology where data sent is addressed to a
specific machine. This method breaks down data into manageable chunks and transmits the data
to specified computers. However, only one machine (node) at a time can successfully send data.
With this type of topology, we expect KFF network users to share the available amount
of transmission time to avoid slowing down network performance (Reinhold, 1990).
Additionally, all nodes ought to be passive; they should be listening to sent commands to allow
efficiency in case on one computer breakdown. In the passive mode, if a node fails it is likely
that all other node will continue functioning as opposed to the active mode where if one fails,
then all the rest also fail.
Describe the standards applicable to this project
KFF NETWORK DESIGN 4
The standards of network applicable to this project will be based on network
specifications laid out by ISO D1S7498 that consists of seven layers as discussed below:
Physical layer: this is the lowest level of network components that specifies mechanical
and electrical details of communication. As discussed above, KFF uses bus topology which uses
Ethernet that supports use of coaxial cable, twisted pair cable or fiber cable. KFF uses fiber cable
which is the fasted transmitting cable among the three. This supports electrical signals which are
digital.
Data link layer: This layer determines the formats of messages being transmitted and
how data is addressed to detect and correct errors. In order to eliminate bouncing back of
messages in the network, data addressing is used. This ensures that data sent is specified to a
given machine using data headers that specify a machine address. The flow and control of
network resources is controlled over the server machine. Address Resolution Protocol (ARP) is
used.
Network layer: the network layer defines routing and logical addressing where
procedures for encapsulation for message into packets is established. Internet Protocol (IP)
addressing is enforced at this stage (Reinhold, 1990).
Transport layer: this layer handles delivery of information from one computer to
another thus under the transport layer there is flow control which manages the way data is
transmitted from one component to another. This allows sending devices to send manageable
data at the receiving end. Other applications on this layer include error detection and recovery as
well as establishing virtual circuits. The standard protocol in KFF is TCP
KFF NETWORK DESIGN 5
Session layer: This layer is responsible for managing communications in terms of
sessions, and organizing requests and transmission services. The standard protocol to be used in
KFF is SQL
Presentation layer: this layer ensures compatibility of data transmitted among
communicating devices in KFF’s network. It ensures data encoded can be readily decoded at the
receiving machine. The standard used is ASCII.
Application layer: KFF ought to use file transfer protocol (FTP) in identifying
communication patterns and determining resource availability.
Importance of communication protocols.
Communication protocols define a set of rules or standards that must be achieved when
transferring data from one device to another. Mainly, protocols are use to allow exchange and
transmitting of data in interconnected networks (Kang and John, 2009). Therefore,
communication protocols lay out guidelines onto how computers and communication devices
will share and exchange information through a standardized way. In information systems, the
following summarizes the importance of communication protocols:
Ensures formatting of information into binary codes
They help to ensure that information is broken up into manageable units before
transmission.
Oversees synchronization of data during transmission period thus averting any possible
communication conflicts.
Over networks, there is need for uniformity of data between the senders and recipient
hence protocols intervene in coding and decoding data in a standardized manner.
They help in enforcing information security during transmittal period.
KFF NETWORK DESIGN 6
Used in applying error detection and correction mechanisms.
There are many protocols in information systems which are hierarchical in nature and are
divided into layers which define a specific function. Such protocols include TCP/IP protocol
suite and OSI reference model which ensure data acquisition interoperability (Aksoy and
Laura, nd).
Protocols used on the design
TCP/IP protocol
Distributed network protocol
Rationale for adopting the above protocols
TCP/IP protocol is supported by many software applications and has universally accepted
terms: it is popular. In TCP, data is divided into manageable bits and the protocol ensures that
secure and appropriate routines are in place to oversee data correctly arrives to its destination.
Then IP enforces logical addressing and routing of data which brings in the reliability factor
(Kang and John, 2009). TCP/IP supports ASCII standards that help in formatting information
transmitted into a range of supported formats such as JPEG, text and MP3 standards among
others.
Distributed network protocol on the other hand supports communication in process
automation systems and supports peer-to-peer and master-to-slave communications. Above all,
this protocol is reliable in terms of security; it contains secure authentication features and does
not require heavy infrastructure.
Cost wise, both protocols are fairly affordable to implement due to fair infrastructural
costs (Aksoy and Laura, nd). Other features that make these protocols appropriate include both
KFF NETWORK DESIGN 7
are open protocols, they support interoperability between different platforms and they can be
optimized.
Overall network architecture.
According to our design, the adopted network architecture defines secure, interpretable
infrastructure that provides reliable and open-standard based communication for distribution of
information. The architecture also defines technologies required to support communications
between various client machines and servers on the network (Chris, 2003). There are established
network standards that coordinate secure implementation of network architecture as well as
supporting traditional data such as voice and video. The architecture is based on open standards
that are industry wide approved and specify how information processing resources convey data
and interconnected. The used network architecture components include wire-based using fiber
optic and wireless technologies using satellite technology. The network protocols employed
include TCP/IP, distributed network protocol and open short path first protocol.
Usefulness of a traffic analysis.
Information generated from traffic analysis can help one to figure out the needs and
requirements to upgrade their network to handle more data. Also, it helps to monitor activities on
the network thus one can detect instances of attacks, probably trace the attacks or even put in
place appropriate measures to counter the attacks. Similarly, traffic analysis helps in figuring out
the capacity limits a given network can handle and hence determining the required resources to
be put in place in relation to effectiveness and costs. Therefore, traffic analysis is useful for
ensuring the following:
Network security
Billing verification
KFF NETWORK DESIGN 8
Engineering the network
determining chargeback
Latency, response time, and jitter
Latency: This refers to delays incurred in processing of network data. In networks,
latency is measured using network tolls such as ping tests that determine the time it takes a
network packet to travel from source to destination node and back. A low latency defines a
system that experiences short delay times while high latency defines systems that experience
long delays. Systems suffering from high latency are said to be unreliable and slow thus are
inefficient.
Response time: Refers to time taken to establish communication on a networked
computer system. This is the time between and end of an inquiry and the beginning of a
response. Low response times indicate efficient network performance while long response time
indicate unreliable network performances.
Jitter: this refers to variation in packet transit delay arising from queuing and
serialization effects along the path of transmission. Mostly, these delays are propagated by traffic
congestion due to the size of bandwidth used and speed of transmission paths in place. In
congested links, higher levels of jitters are likely to occur. Therefore, higher levels of jitters
cause data transmission to be slow hence lowering the network performance.
Effect of data rates on each part of the network.
Network cabling: Speed of information transmission on cables greatly impacts on the
overall network performance. It signals the amount of time data is expected to travel from sender
node to receiver node. High data speeds are preferable since they help avert congestion on the
KFF NETWORK DESIGN 9
network as well as make performance efficient. Therefore, in our design, we shall use high speed
network cables such as the fiber optic for optimal network performance.
Wireless network communication: In wireless environment, data speeds are higher than
in wired networks. This implies that traffic within wireless resource is quite manageable and the
overall network performance reliable.
Network adapter cards: Data speed in network adapters affect the time in which the
adapters prepare data from computer for the network cable. This also influences time incurred in
sending data to another computer and the flow of data between the computer and cabling system.
High data speeds therefore contribute to faster network adapter card functionality in terms of
sending and receiving information.
Strategies to ensure the availability of network access in switched and routed networks.
Identifying all the network requirements
Designing a hierarchical network
Using routers and multilayer switches that combine routing and switching in the same
device
Employing the use of high-speed links
Use open short path first protocol which scales well in networked resources
Employing load balancing technique.
Hardware and software required to secure linear bus architecture against electronic
threats
KFF NETWORK DESIGN 10
Kudler Fine Foods (KFF) uses Ethernet cabling prone to electronic attacks and needs to
be secured from such threats. In the linear bus model, there is need to use hardware that will help
boost security such as firewall and routers. Firewalls are like filters which will help KFF monitor
data traffic in its network (Reinhold, 1990). This in turn helps detect unusual traffic and filter
them off. From the role of firewall, all unnecessary ports will be blocked and only traffic from
known ports will be transmitted. Therefore, firewall will monitor incoming requests to prevent
known attacks from reaching KFF’s server. The firewall will be patched regularly to detect
newest types of attacks. Also to be used is a router with a strong administrator password. The
router will be placed on the outer-most gate linking to the internet. The router therefore will be
blocking unauthorized and undesired traffic between the networks. To complete security
enhancement from a hardware point of view, KFF will use switches in their network to ease
network administration.
The above hardware components will be used in the linear bus topology in the order of
router, firewall and switch from data incoming from the internet as shown below:
KFF NETWORK DESIGN 11
Software resources to be used will involve software capable of detecting and eliminating
threats as well as those capable of filtering undesired network traffic. For instance, expected
threats within KFF network include spoofing, sniffing, information gathering and denial of
service attacks among others (Reinhold, 1990). To secure the network from such threats security
software on the router can be configured to inspect and encrypt network contents as well as block
and control traffic on KFF’s network. Network access control and intrusion detection and
prevention management system software will help KFF monitor and block attack from within
and outside their main network. Through monitoring using intrusion detection software, network
administrator at KFF will be able to filter the detected threat, address it and block it. Similarly,
the software will help in averting traffic crises such as decongesting data on Ethernet and
sequencing encrypted information for delivery. Backup software will also be used to store
important data at automated times.
Router-Firewall-Switch
KFF NETWORK DESIGN 12
Local Area Networks, Wide Area Networks, Wireless Technologies
Local Area Network (LAN) is a data communication medium that is characterized by
hosting all sites on the same link. LAN is confined to one location, usually a small area, therefore
considered small and discrete. LANs interconnect devices operating within network interface
layer where they exchange IP data grams from the internet layer. In a LAN network resources
are connected such as work stations and printers (Goleniewski, 2007). LANs services include
protocol identification, delimitation, bit level integrity checking and addressing. LAN uses
Ethernet and token ring which use cabling technology.
Wide Area Networks (WAN) are networks that span a large geographical region with
long-distance links interconnected together at various points by nodes which perform routing and
switching functions (Goleniewski, 2007). The nodes are responsible for moving frames from one
link to another and directing them through interlinked local networks. They are extended LANs
that depend on heavy cabling such as use of fiber optic. WANs support both synchronous and
asynchronous operations and are divided into point-to-point links and non-broadcast multiple
access.
Wireless networks on the other hand refer to networks that are not connected with cables.
Wireless networks span both local area and wide area networks. In local area, wireless
technology uses radio waves to connect devices such as computers to the internet. Unlike wired
networks, wireless technology can be accessed from hotspots hence are convenient in terms of
mobility and easy to setup, expandable and friendly in terms of cost since they eliminate cabling
costs (Goleniewski, 2007).
Concepts and building blocks of today’s data communication networks
KFF NETWORK DESIGN 13
Data communications in the present world has been integrated from traditional
mechanism of information exchange which was slow and time consuming, to fast, reliable and
secure exchange of data using sophisticated mediums. Such include TCP/IP and OSI model
frameworks used in all kinds of networks. Both hardware and software have been built to
enhance security in authenticity of data and communication channels. Some of the important
components of data communication include cables and optic means used to relay data, routers
and firewalls used to monitor data traffic on the network and switches used to administrate the
network. Network cabling involves use of data cables and connectors that carry electronic signals
from one network to another and to network interface cards (Bryan, 2004). Cables include unshielded
twisted pair cable, shielded twisted pair cable that are susceptible to radio and electrical interference, coaxial cable that consists of a
single copper conductor at its center and is not susceptible to interference. Fiber optic cable consists of a center glass that transmits
light signals and is very fast in terms of data transmission. Different protocols in data communication used different cables that
transmit data in different speeds. They are as analyzed in the table below:
Protocol Cable Speed Topology
Ethernet Coaxial, twisted pair,
fiber
10MBPS Star, linear bus and
tree topologies
Fast Ethernet Fiber, twisted pair 100MBPS Star
Local talk Twisted pair 23MBPS Linear bus
Token ring Twisted pair 16MBPS Star wired
ATM Twisted pair, fiber 155-2488 Linear bus, tree and
star topologies
Other components of data communication include server and host computers, client
computers and circuits. Routers, firewalls and switches are used to enhance security in networks
KFF NETWORK DESIGN 14
against attacks from within and outside a given network. These security components vary in
configuration according to sensitivity and sizes of network.
The KFF integrated network has been developed to meet efficient and reliable
communication requirements including security enhancement and information delivery. The
designed KFF network has adopted network architecture that defines secure, interpretable
infrastructure that provides reliable and open-standard based communication for distribution of
information. The architecture also defines technologies required to support communications
between various client machines and servers on the network (Chris, 2003). There are established
network standards that coordinate secure implementation of network architecture as well as
supporting traditional data such as voice and video. The architecture is based on open standards
that are industry wide approved and specify how information processing resources convey data
and interconnected. The used network architecture components include wire-based using fiber
optic and wireless technologies using satellite technology. The network protocols employed
include TCP/IP, distributed network protocol and open short path first protocol. Security
implementation has been done using a switch and a firewall for all information from and into the
KFF’s server. Internal security measures include use of routers to monitor and control traffic
flow. The overall network design is as shown below:
KFF NETWORK DESIGN 15
Time plan for the design of KFF’s Network
Activity / Time Week one Week two Week three Week four Week fiveNetwork identification and problem evaluationEvaluating best communication protocols and communication devices required
KFF NETWORK DESIGN 16
Identifying all network requirements and analyzing security requirementsDesigning an appropriate networkEvaluating the integrated network
Design approach and rationale
The integrated network design has been adopted from analysis meant to determine KFF’s
data and communication requirement. The new design addresses fast, reliable, efficient and
secure protocols that ensure delivery of communication from one work station to another and to
the server. The integrated design has put into consideration flexibility factor where users can
access communication via the KFF’s network through wireless hotspots. The design has
eliminated use of cables to save on costs and space (Panko, 2011). Based on communication
speeds, wireless LANs will offer the desired fast data transfer rates of up to 1522 MBPS which is
sufficient for KFF and does not require future expansion.
Analysis of the integrated network
Security: the integrated KFF’s network has tight traffic monitoring and control
mechanisms that incorporate filtering, blocking and analysis of data passing through the
company’s communication channels. A switch has been used to filter content from the internet
while a firewall has been adopted to block malicious and unknown content from reaching KFF’s
server. Routers are used to control and monitor traffic within the wireless LAN.
KFF NETWORK DESIGN 17
Backup: There are three backup facilities that oversee information is backed up on a
daily basis. This ensures all information is secure from failures resulting from system crush,
power surge, fire and theft. The backups are located in different locations in order to avert a
situation where the three are susceptible to similar fate.
Communication speeds: Wireless communication is used for fast delivery of data
packets from one client computer to another and to the server machine (Goleniewski, 2007). The
wireless speed is 1522MBPS which eliminates possibilities of traffic accumulation. The new
design uses open communication protocols for reliability and effectiveness.
Cost: KFF’s integrated network design meets friendly cost requirements as use of
wireless technologies is affordable.
Data requirements
A wireless LAN supporting data speeds of up to 1522MBPS and operates on a TCP/IP
protocol is extremely fast enough to support any operation undertaken by KFF. Since
information is broken down into packets, time required to breakdown and reconstruct the packets
are insignificant considering the transmission speeds. There is efficiency is transmission given
that communication channels do not breakdown. Another advantage of the integrated design is
the ability to tune and adjust bandwidth required at a particular time. The network administrator
monitors bandwidth and regulates its usage according to requirements of a given time.
Physical and electronic threats
The integrated network has addressed physical and electronic threats in a broad scope.
However, some threats are hard to totally control such as natural calamities, fire disaster, and
system failure, evolution of new undetectable threats such as viruses, wear and tear and
obsoleteness of technology. Some are controllable and require thorough monitoring and analysis
KFF NETWORK DESIGN 18
such as failure, obsoleteness, viruses and wear. Such will need regular system updating, use of
virus and spyware control software and regular servicing (Reinhold, 1990). On the other hand,
fire outbreak is a disaster and can be controlled via precautions, monitoring and guarding the
KFF’s perimeter using surveillance systems and physical guards. In case of a fire outbreak, KFF
is equipped with fire fighting equipments and its servers are stationed in fireproof premises.
Security measures and policies are in place to ensure that users and employees adhere to
protective policies that protect their lives and the company’s properties. The policies are
elaborate and quite straight to the point (Chris, 2003). Any breeches lead to penalties and
prosecution where appropriate. In order to safeguard all resources, adherence to the policies is
encouraged and people expected to act responsibly.
There are detection systems in place to sense and automatically control the main system
such that it shuts down, alerts employees via an alarm system and takes appropriate measures.
For instance, fire detection system will detect temperature changes, turn on cooling systems, if it
doesn’t work it alerts people of possible threat and avails fire fighting equipments. All other
detection systems work in a similar manner; they are tuned to trying to solve the situation other
than just alerting workers.
Surveillance within KFF’s perimeter helps to monitor all activities thus can help identify
unusual activities hence also help in detecting threats. Punishment for any propagated
misconduct towards the KFF’s network is documented within the network policy and is not
compromised whatsoever.
Conclusion
KFF NETWORK DESIGN 19
The overall integrated network addresses all KFF’s network requirements and
recommends shift to the new design. Challenges purported in the integrated design are
controllable and manageable.
KFF NETWORK DESIGN 20
References
Aksoy P. and Laura D. (nd) Information Technology in Theory: Communication protocols
Bryan E. (2004) A Professional Guide to Data Communication in a TCP/IP World. ISBN 1-
58053-909-2
Chris C., (2003) Arizona Enterprise Architecture: Guiding Arizona to Ever Improving Citizen
Service. Government Information technology Agency
Cisco Inc. (2000) Internetwork design Guide: internetworking Design Basics. Retrieved from
http://www.cisco.com/univercd/cc/td/doc/cisintwk/idg4/nd2002.htm
Goleniewski, L. (2007). Telecommunications essentials: Wireless communication basics (2nd
ed.) Boston, MA: Pearson
Kang D and John R., (2009) Compartmentalization of Protocols in SCADA communication.
International journal of Advanced Science and Technology, Vol. 8.
Panko, R. R., & Panko, J. L. (2011). Business data networks and telecommunication (8th ed.)
Upper Saddle River, NJ: Prentice Hall
Reinhold N., (1990) Network Topology Optimization: The Art and Science of Network Design
ISBN -10:0442238193
Sekar K., and Dey S. (2008) Dynamically Configurable Bus Topologies for High-Performance
on-chip communication. Volume 16 issue 10.