Premium Essay

Virtual Network Design

In:

Submitted By jgale5
Words 1703
Pages 7
Project 2: Virtual Network Design

Jaime Galena ITCS-408 Mr. Shu 12-12-14

Western Dynamics is a midsized specialty manufacturing company. They have decided that a virtualized environment would help reduce costs and provide for a smaller carbon foot print. As the company’s first step in this direction, they have decided to move two of their current physical domain controllers into a virtualized environment. The company expects this system to reduce network traffic and improve throughput between virtual servers and desktop clients.
The current environment of Western Dynamics has physical machines for the Dynamic Host Control Protocol (DHCP), Domain Name Services (DNS), and Active Directory. They have recently purchased a new Quad Core computer with two Network Interface Cards (NIC) and 8 GB of RAM. This hardware should be capable of meeting the requirements necessary to run all three servers in one box. This is how the network currently looks, and how the proposed network will look like.

Current network
Router
Router

AD Server
AD Server
DNS Server
DNS Server
DHCP Server
DHCP Server

Switch
Switch

Printer
Printer

Printer
Printer

Switch
Switch
Switch
Switch

Group of 100 workstations
Group of 100 workstations
Group of 75 workstations
Group of 75 workstations

Virtualized
Virtualized
Proposed network
Router
Router
DHCP DNS
AD
Server
DHCP DNS
AD
Server

Switch
Switch

Printer
Printer

Printer
Printer

Switch
Switch
Switch
Switch

Group of 100 workstations
Group of 100 workstations
Group of 75 workstations
Group of 75 workstations

DHCP 10.0.1.2
DHCP RANGES:
10.0.75.1-10.0.75.126
10.0.100.0-10.0.100.126
DNS 10.0.1.3
AD 10.0.1.4
OS: Windows Server 2008
10.0.1.1
DHCP 10.0.1.2
DHCP RANGES:
10.0.75.1-10.0.75.126

Similar Documents

Free Essay

Network Design for Remote Monitoring

...Windows networked environment to facilitate the remote monitoring of neuro-surgeries. As a consultant I was approached by XYZ-Monitoring to assist in the design of a network from the ground up that would support the remote monitoring of neuro-surgeries using Cadwell Laboratories’ Cascade system. XYZ-Monitoring (herein referred to as XYZ) wanted a Windows network that would be integrated with their existing Cisco ASA firewall device. XYZ wanted to use a virtualized environment because they had a limited budget for new hardware. They needed a secure solution that would meet HIPAA requirement concerning the security of patient data. XYZ requires all users to connect to their environment through a VPN connection bound to the Cisco ASA firewall. They have three user groups that will need to have access to the environment; however, they have multiple clients that need to remain separated when connected to the network. Given these requirements by XYZ, it was clear they wanted an Active Directory integrated environment so that users would be grouped by job function and by client. XYZ would need at least three high level Organizational Units (OUs), one for each job function; they would also potentially need an OU for each client. They would need Group Policy Objects (GPOs) to provide ease of administration once the design was complete as well as provide access policies to the environment based on job function. Provided with these requirements, background information and expectations...

Words: 5873 - Pages: 24

Premium Essay

Network Design for Acme Manufacturing

...Running head: NETWORK DESIGN FOR ACME Network Design for Acme Manufacturing Learning Team A: [your team members] University of Phoenix Intro To WAN Technologies NTC/242 Acme Manufacturing Network Design Introduction As a network consultant hired by Acme Manufacturing, the company has asked Team A to develop a new networking design for their expanding business. The description below describes the key steps involved in developing a WAN for Acme Manufacturing. The company has six different buildings in six different locations throughout the world which need to be networked collectively. All the remote locations need to be able to communicate effectively with the main headquarters which is located in Atlanta, Georgia. The two buildings which house the headquarters are located across the street from each other. One building is used solely for corporate operations while the other building is used for staffing the sales and engineering department. Network Topology The best choice for the company would be to use a LAN with routers and Ethernet cables. This is a logical choice because the speeds of the network will be far superior and will help to reduce the total cost of the network. The three distribution buildings are located in Chicago, Phoenix, and New York. It is not feasible to run cabling to theses locations due to cost, so using T3 leased lines to communicate is the recommended method to connect the buildings with headquarters...

Words: 1444 - Pages: 6

Premium Essay

Network Design

...April 4th 2011 ACME Network Design Anthony G, Buddy W, Anthony P, & Ryan O University of Phoenix Mike Kanfer Introduction As a network consultant hired by Acme Manufacturing, the company has asked Team A to develop a new networking design for Acme’s expanding business. The description below describes the key steps involved in developing a WAN for Acme Manufacturing. The company has six different buildings in six different locations throughout the world that needs to be networked collectively.   All the remote locations need to communicate effectively with the main headquarters that is in Atlanta, Georgia. The two buildings that house the headquarters are located across from each other. One building is used solely for corporate operations whereas the other building is for staffing the sales and engineering department. PBX vs VOIP PBX (Private Branch Exchange) is a system that has been around for a while. This allows users to communicate to other users in an office, even without an outside line connected. In a normal environment, the user would have to dial a specific number (or code) to access an outside line. In this way an end user could dial a number that would stay internally. A PBX also allows the users to share the lines that are accessible to the company. If a customer were to call the company on the main line, the receptionist could transfer that call to the salesperson. PBX systems also allow for many other features such as: Voice mail, Caller ID, Programmable...

Words: 2572 - Pages: 11

Free Essay

Computer Science

...carrier (IXC). As the LECs move into the long distance market and IXCs move into the local telephone market, this distinction may disappear. 3. Explain how cloud architecture works. Cloud architecture is represented as a cloud with connection points. Users of circuit switched services lease the connection points (e.g., telephone lines) into the common carrier’s network, which is called the cloud. This architecture is very flexible and hides its internal details. Circuits can be established as needed between any computers attached to the cloud at any point. However, data can only be transmitted while a circuit is established, and only to the one location it connects to. These designs are simpler for the organization because they hide the common carrier’s burner of network design and management inside the cloud. Network managers do not need to worry about the amount of traffic sent between each computer, they just need to specify the amount of traffic entering and leaving each computer and buy the appropriate size and number of connections into the PSTN. Cloud-based designs...

Words: 1686 - Pages: 7

Premium Essay

Networking Architecture

...Network technology has come forward as an important component of IT infrastructure. Within the healthcare industry, the value of an efficient and stable network is immeasurable. The challenge in most industries, especially healthcare, is address security concerns and the rights of the patience. Patton-Fuller Community Hospital, located in the City of Kelsey, is a fully function hospital servicing the local area since 1975. Recently, The Chief Executive Officer (CEO) of Patton-Fuller Community Hospital expressed the desire to design an upgrade to the current network architecture. This design will include upgrades to hardware components and software components. This proposal will discuss and summarize the current network structure, propose an upgrade design to meet future challenges while addressing network security and compliance; more specifically, the transfer and confidentiality of patient records information. Patton Fuller Community Hospital – Current Network The current networking architecture of the Patton-Fuller Community Hospital can be broken down into two major sections. Today the two major backbones of the network include a 1000 Base T using CAT6 cable which provides network access to many administrative and operational areas of the facility. Executive management, Human Resources, Operations, Facilities, Finance, as well as the IT data center are all connected directly to this side of the network backbone. The hospital side is connected via 1000 Base F which...

Words: 1760 - Pages: 8

Premium Essay

Acme Manufacturing Network Plan

...Acme Manufacturing Network Plan Ann Johnson IT/242 October 23, 2011 David Edwards Acme Manufacturing Network Plan Acme Manufacturing needs a new network plan implemented for corporate, three distribution centers in Chicago, Phoenix, and New York, and is expecting to expand with a new facility in China. A successful network design provides future growth within the organization. Meetings are scheduled weekly in the main Atlanta Headquarters conference room with the facilities from Phoenix, New York, Chicago, and China attending via telecommunications. The network plan will include the type of cabling needed for each facility, the equipment used to connect the different facilities, and the installation of Voice over IP (VoIP) and Virtual Local Area Networks (VLANs). Security measures are needed including firewalls and a backup plan. The lines required to carry the traffic on the network are leased T1 lines and a satellite connected overseas. T1 leased lines are used for the Atlanta, Phoenix, New York, and Chicago offices. China connects through a satellite service. A Virtual Private Network (VPN) connects wireless users to their designated department through mobile devices. Routers are used to direct communication between LANs and are needed at each department. Voice over IP (VoIP) has opened possibilities for more interactive communication across WAN networks. VoIP bypasses the need of conventional telephone hardware by transmitting voice over the existing data line...

Words: 1193 - Pages: 5

Free Essay

Firewall Security Project

...……………………………………..9 Project Scope...……………………………………..……………………………………10 References…………………………………………..……………………………………13 Executive Summary The objective of this paper is to educate both the senior management of Allen & Bose Insurance Inc. on the network security threats that exist with our current network design. The enclosed report presents an analysis on Allen & Bose Insurance Services current security posture and highlights the issues we have face over the past year as well as industry best practices and recommended updates we should make to our network security design that will protect the organization from the myriad of security threats that are out there. Introduction/Background and History Allen & Bose Insurance Services has become a dynamic and intricate player in the automotive and home insurance market. The company has grown from 25 employees in one office to over 225 employees in 3 offices. In the early days the computer systems that were used were on a close network of networked computing systems and the systems were freely accessible because security was not a major concern. As the company began to grow and the closed network was connected to multiple local and remote networks via the internet; network intrusions from both internal and external users have become increasingly frequency an on more than a few occasion has limited or halt the business ability to function...

Words: 1848 - Pages: 8

Premium Essay

Nt2580

...about deploying a SAN at each branch office, since each office uses data, audio, video and graphic files that are shared by staff at each location. The SAN may incorporate NAS devices which we have evaluated with different vendors. As we conducted a further research in order to provide you with more detail specifications on SAN and NAS solutions, we were able to come up with the following information design in a form of questions and answers. What is required to implement a SAN and /or NAS?  Storage-area networks (SANs) are composed of computers and remote storage devices. The computers are typically connected to the remote storage devices using SCSI over Fibre Channel (see Figure 1). Other implementations of SAN exist, but this is the most common. In a SAN, all the storage appears local, just as if the remote disk were directly connected to the computer and physically located inside the computer chassis. Network-attached storage (NAS) devices appear to the user as a remote drive letter or are named remote storage device. Typically, the operating system employs a protocol such as Network File System (NFS) or Common Internet File System (CIFS) to discover, log in, and transfer content to and from a storage device. NFS and CIFS both communicate over Ethernet. The user typically enters a username and password, and then is granted access to a particular device. Figure 1. SAN and NAS use different protocols and transports. Click here to see an enlarged diagram. Read more:  http://broadcastengineering...

Words: 7132 - Pages: 29

Free Essay

Ccna Routing

...Routing and Switching Course Outline CCENT Introduction to Networks Routing & Switching Essentials Scaling Networks Connecting Networks CCNA CCNA 1 – Introduction to Networks This course introduces the architecture, structure, functions, components, and models of the Internet and other computer networks. The principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes. Chapter 1 2 3 4 5 6 7 8 9 10 11 Topic Exploring the Network Configuring a Network Operating System Network Protocols and Communications Network Access Ethernet Network Layer Transport Layer IP Addressing Subnetting IP Networks Application Layer It’s a Network Students who complete Introduction to Networks will be able to perform the following functions:  Understand and describe the devices and services used to support communications in data networks and the Internet  Understand and describe the role of protocol layers in data networks  Understand and describe the importance of addressing and naming schemes at various layers of data networks in IPv4 and IPv6 environments  Design, calculate, and apply subnet masks and addresses to fulfill given requirements in IPv4 and IPv6 networks  Explain fundamental Ethernet concepts such as media, services...

Words: 1022 - Pages: 5

Premium Essay

It Management - It560

...IT Management IT560-01 Unit 1 Assignment Donald Harris Kaplan University Table of Contents Introduction 3 Internet Competition 3 Organizational Strategy 4 Virtual Employee Productivity Measurement 4 Virtual Employee Connection 6 Virtual Employee Telecommunication 6 Cloud Computing 6 Other Considerations 7 References 8 Introduction In becoming the I.T. Manager for ‘The Best Widget, Inc.’, there are multiple aspects of this multinational organization that must be taken into account from a technology standpoint – specifically, the virtual segment of the business. With respect to evaluation of the virtual organization, there are six primary considerations that should be evaluated. These conditions entail the following: Internet Competition, Organizational Strategy, Remote Employee Considerations (Including productivity measurement, infrastructure, and telecommunications), and Cloud Computing. In addition to these core topics, other items must be evaluated prior to implementing a virtual organization. These considerations will also be evaluated below. Internet Competition In leveraging the available power of the internet, today’s businesses can greatly enhance their advantage over the competition, especially ‘The Best Widget, Inc.’. Of particular interest are two areas that can aid ‘The Best Widget, Inc.’ with respect to their competitive advantage. These two areas are those of competition research and advertising. Through internet...

Words: 1620 - Pages: 7

Free Essay

Nkn History

...benefits to the knowledge community and mankind at large. Knowledge Network (NKN) project is aimed at establishing a strong and robust internal Indian network which will be capable of providing secure and reliable connectivity. Using NKN, all vibrant institutions with vision and passion will be able to transcend space and time limitations in accessing information and knowledge and derive the associated benefits for themselves and for the society. Establishing NKN is a significant step towards ushering in a knowledge revolution in the country with connectivity to 1500+ institutions. NKN is intended to connect all the knowledge and research institutions in the country using high bandwidth / low latency network. Globally, frontier research and innovation are shifting towards multidisciplinary and collaborative paradigm and require substantial communication and computational power. In India, NKN with its multi-gigabit capability aims to connect all universities, research institutions, libraries, laboratories, healthcare and agricultural institutions across the country to address such paradigm shift. The leading mission oriented agencies in the fields of nuclear, space and defence research are also part of NKN. By facilitating the flow of information and knowledge, the network addresses the critical issue of access and create a new paradigm of collaboration to enrich the research efforts in the country. The network design is based on a proactive approach that takes into account the future...

Words: 1383 - Pages: 6

Free Essay

Nas for Organization

...NETWORK-ATTACHED STORAGE FOR SMALL COMPANIES Case: Design Foundation Finland LAHTI UNIVERSITY OF APPLIED SCIENCES Degree Programme in Business Information Technology Bachelor Thesis Autumn 2012 Jari-Pekka Koivisto Lahti University of Applied Sciences Degree Programme in Business Information Technology KOIVISTO, JARI-PEKKA: Network-attached storage for small companies Case: Design Foundation Finland Thesis in Degree Programme in Business Information Technology, 56 pages, 11 pages of appendices Autumn 2012 ABSTRACT This study focuses on finding the proper solution to create Network-attached storage (NAS) for a small company. This study was commissioned by Design Foundation Finland, aiming to improve the security and the management of the information. This research will be aiming to find the proper way to design and implement a network storage, which will be used as the main data storage within the company for creating an ideal solution for data maintenance, security and ease of access to all the data of the foundation. The outcome of the thesis is a solution, which is created from scratch, offering a design and implementation of an NAS in a small company with a relatively small budget. The case foundation is located in Lahti. The foundation was established in 2009, aimed to improve and support the education (of design), as well as research and development of design. Design Foundation Finland also has an own R&D group to improve the design of Finnish products in several...

Words: 10025 - Pages: 41

Premium Essay

Virtual Private Network

...Virtual Private Network IS 311 Dr. Gray Tuesday 7pm November 19, 2002 By: Germaine Bacon Lizzi Beduya Jun Mitsuoka Betty Huang Juliet Polintan Table of Contents I. Introduction ……………………………………………….. 1 - 2 II. VPN Topology……………………………………………... 2 - 3 III. Types of VPNs……………………………………………... 3 - 5 IV. Components of VPNs………………………………………. 5 - 7 V. Productivity and Cost Benefit…………………………….... 7 - 9 VI. Quality of Service………………………………………….. 9 VII. The Future of VPN……………………………………….... 9 - 11 VIII. Conclusion…………………………………………………. 11 IX. Bibliography………………………………………………...12 - 13 X. Questions……………………………………………………14 Introduction Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there. Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them. Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently...

Words: 4870 - Pages: 20

Premium Essay

Capstone

...GROUP 2 PROJECT PART 1: DESIGNING A NETWORK PART 2: TYPES OF EQUIPMENT PART 3: PROTOCOL CHOICES PART 4: COMPANY PHONE SYSTEM PART 5: SECURITY PROPOSAL Project scenario: ABC Company with worldwide offices in the U.S. (San Francisco, Detroit, Washington, Indianapolis, and Tampa), Europe (Paris, Liverpool), Japan (Tokyo), and South America (Sao Paulo), is engaged in the development of audio and video special effects for the entertainment and advertising industry. The main design centers are in San Francisco, Detroit, Paris, Tokyo, and Sao Paulo. Corporate Headquarters are in San Francisco. The remaining offices are sales offices. Consider the company to operate on a 24x7 basis, because it is global. To meet the goals of this scenario, Group 2, made up of the members below, have been assigned the following tasks in designing a network structure for this project: 1. Sean Dillon: Project Manager, Contributor; Editor Parts 1, 2, 3, 4 and 5; Submitter. 2. Denzel Chatman: Project Contributor; Section 3. Parts 1, 2, 3, 4 and 5. 3. Christopher Foster: Project Contributor; Section 1-A. Part 1; Part 2; Part 3; Part 4; Part 5. 4. William Collado Cancel: Project Contributor; Section 1-E. Part 1; Part 2; Part 3; Part 4; Part 5; Microsoft Project Editor. 5. Alex Graves: Project Contributor; Section 1-B. Part 1; Part 2; Part 3; Part 4; Part 5. 6. Mark Fortune: Project Contributor; Section 1-C. Part 1;...

Words: 10833 - Pages: 44

Premium Essay

Virtual Private Network

...Virtual Private Network IS 311 Dr. Gray Tuesday 7pm November 19, 2002 By: Germaine Bacon Lizzi Beduya Jun Mitsuoka Betty Huang Juliet Polintan Table of Contents I. Introduction ……………………………………………….. 1 - 2 II. VPN Topology……………………………………………... 2 - 3 III. Types of VPNs……………………………………………... 3 - 5 IV. Components of VPNs………………………………………. 5 - 7 V. Productivity and Cost Benefit…………………………….... 7 - 9 VI. Quality of Service………………………………………….. 9 VII. The Future of VPN……………………………………….... 9 - 11 VIII. Conclusion…………………………………………………. 11 IX. Bibliography………………………………………………...12 - 13 X. Questions……………………………………………………14 Introduction Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there. Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them. Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently...

Words: 4870 - Pages: 20