Free Essay

Network Implementation

In: Computers and Technology

Submitted By marysol63
Words 2004
Pages 9
| | | | |

| | | | |

Network Implementation Plan
Network Implementation Plan

Table of Contents Implementing IPv6 3
Great Clips: Implementing a Network Plan
Configuring IPv6 on a Juniper Router Network Infrastructure Design 6
Installing Ubuntu on Virtual Box Linux Networking 9
Linux Network Commands Analyzing Network Traffic 14
Network Sniffer Applications: Compare and Contrast
Installing Wireshark: Running a TCP Packet Trace Network Security 16
Access Control Lists (ACL)
ACL Command Examples
To configure an ACL on a router
To configure an ACL on a switch References 18

Implementing IPv6
Great Clips: Implementing a Network Plan

Great Clips is a hair salon franchise through the United States and Canada. The first salon opened in 1982 and the first franchise opened in 1983 both in the state of Minnesota. In 1988, there were 150 franchises and by 2014, there are now well over 3000. Because of this tremendous growth, I have selected this company for which I will implement a network plan that will support seamless sharing and connection between various company locations.

The routing protocols for IPv6 are similar to IPv4 but have been adjusted accordingly. There are two forms of routing protocols, Distance Vector routing and Link-State routing protocols. Distance Vector rules consider distance between nodes and the number of hops data must travel through before it reaches its destination. Distance Vector protocols require very little configuration and are popular among small to midsize organizations. Common Distance Vector protocols are Routing Information Protocol (RIP) and Boarder Gateway Protocol (BGP) which is the standard routing protocol used for the internet. RIP includes authentication to verify source, it needs a network address and number of hops (max of 15 hops) and is very automatic. BGP is used by all ISPs, is very flexible, allows for internal and external and allows multiple links to the same network.

Link-State routing protocols govern how information is passed between routers by determining the best paths of available connections. Routing protocols in this category include Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (IS-IS). OSPF will govern that data will follow the shortest, the most cost-effective and reliable path. This protocol is typically used on large networks and can be grouped logically into areas. ISIS is not as popular as OSPF but is typically implemented in large scale networks such as ISPs.

Configuring IPv6 on a Juniper Router

You configure IPv6 on a Juniper Network router much like you do with IPv4. For router interfaces to support IPv6, they must be configured to specific properties, types and addresses. Interface family type inet6 and logical interface protocol families must be configured as well. Below is an example of the steps to configure IPv6 on a Juniper Network.

2001:db8::1/128 2001:db8::5/128

A E 2001:db8:0:1::/64

Log into your device running Junos OS and the CLI

Step 1: Enter configuration mode
Upon logging in, you will be in operation mode: “user@host>”
You must get into configuration mode by enter “configure” “user@host> configure”
This changes to “user@host#” when place in configuration mode.

Step 2: Edit interfaces
“[edit interfaces ] Fe-1/2/0 unit 1 description to –E
Fe1/2/0 unit 1 family inet6 address
2001:db8:0:1:2a0:a502:0:1da/64
Unit 1 family inet6 address 2001:db8::1/128 primary
2001:db7::2/128
2001:db87::3/128
Device A
[edit routing-options]
Set rib inet6.0 static route 2001:db8::5/128 next-hop
2001:db8:0:1:2a0:a502:0:19da
[edit interfaces] user@host# commit
Device E
Fe-1/2/0 unit 25 description to –A
Fe-1/2/0 unit 25 family inet6 address
2001:db8:0:1:2a0:a502:0:19da/64
2001:db8::5/128
[edit routing-options]
Set routing-options rib inet6.0 static route ::/0 next-hop
2001:db8:0:1:2a0:a502:0:1da
[edit] user@host# commit” (Configuring IPv6 Static Routes, 2012)

Network Infrastructure Design
Installing Ubuntu on Virtual Box

Linux Networking
Linux Network Commands

The ifconfig command is a system admin tool used for network interface configuration. Using this command, a report is generated listing all running and recognized network interfaces on the system. Also listed are configurations such as IP addresses, net masks, broadcast addresses, gateway and the status of the loopback.
The ifconfig command can be used to troubleshoot networking issues by allowing a view of all network settings, all network interfaces, enabling and disabling network interfaces, assigning IP addresses and net masks among other capabilities.
Examples:
ifconfig –a: displays all information for active and inactive interfaces on the network ifconfig eth0 netmask : allows admin to define a net mask for a specific interface ifconfig eth0 broadcast: allows admin to set certain broadcast address for a specific interface ifdown and ifup are additional troubleshooting commands used for interface configurations allowing the administrator to shutdown or bring back online a specific interface. This is extremely helpful in the event of a malicious attack.
The nslookup command is a query command used to find information about a named domain. Running this command will provide the IP address for a specific domain name. This search can also be reversed, using the IP address to search for the domain name. This command is helpful when troubleshooting DNS servers.
Example:
Nslookup www.google.com
The ping command is a basic command that lets the administrator test for network connectivity. Using the ping command, the administrator can send a test packet of data to a certain host on a network in an attempt to get a reply and to determine how long it takes for the data to be exchanged.
Example:
Ping 192.168.1.122
The File Transfer Protocol is a program allowing users to transfer data to and from remote network sites. It is the fastest and most easy way to send files from your machine to another machine.
The Domain Name System is used on Linux to resolve computer IP addresses into readable host names. Users would never be able to remember computer IP addresses; however they have an easier time remember names such as Google. It can also do the reverse and convert a name into an IP. This is important because the IP address is used to route information, not the readable name.
The SSH application on Linux is used for logging into a machine remotely for administration and work through secure encrypted communication channels.

Analyzing Network Traffic
Network Sniffer Applications: Compare and Contrast
A program that works to intercept, track and log traffic over an interface is known as a network analyzer or sniffer. The sniffer captures the packets of data streaming through the network and decodes the data being sent. These tools can be very helpful for troubleshooting network problems, detecting network intrusions and misuse, monitoring utilizations and debugging along with other additional capabilities. A sniffer would be very helpful in a scenario where a user suspects computer attacks against their network firewall. Using a sniffer, the user could analyze the data packets being sent to the network to determine if they are legit or not. There are quite a handful of different applications and software sniffer tools available in the marketplace today. Let’s look at just two of them, Cain and Abel and Wireshark.
Cain and Abel is a graphical user interface (GUI), created by Massimiliano Montoro and Wireshark, formually Ethereal, is both a command-line interface and GUI both provided free for downloading but whereas Cain and Abel is a freeware, usually with restrictions, Wireshark is a General Public License freeware allowing more freedom. Cain and Abel works on Windows operating systems only and Wireshark works on Windows, OS, Linux, BSDs, Solaris, AIX, HP-UX, IRIX, Tru64 and UNIX. Cain and Abel, a well documented tool, has the ability to analyze routing protocols, recover, decode and/or crack encrypted passwords and record VoIP conversations. Wireshark has the ability to capture packets live and/or read in a file of previously captured packets. Additionally, the interactive interface allows the user to dig deep into the details of the packet as well as reconstruct the flow of a TCP session. I think based upon the research findings comparing and contrasting these two tools, I think the vast versatility that comes with Wireshark makes it a better tool than that of Cain and Abel.
Installing Wireshark: Running a TCP Packet Trace

Network Security
Access Control Lists (ACL)
Access Control Lists (ACL) are the rules governing the flow of traffic on the network by specifying which traffic is allowed to flow in and/or which traffic is allowed to flow out. The rules are set regarding different traffic attributes found in the data packets such as source and destination IP addresses and MAC addresses, port information and protocols. When a data packet is received, the attributes are thoroughly scanned and compared against the ACL, looking for rules that will either allow or prohibit the packet to enter the network. Because of this, ACLs are able to provide a fundamental level of network security by blocking unauthorized traffic and restricting data.
ACLs are created using commands or statements that specify which attributes are permitted and which ones are denied. The attributes are specified in the order in which the list should appear in the ACL using a top-down approach since the ACL reviews the packets from top to bottom. ACLs are applied to interfaces, so you can have an ACL for the outbound interface and/or for the inbound interface. ACLs can be standard, extended or named. Standard ACLs match source addresses, extended ACLs can include additional information such as ports, TCP and UDP information and named ACLs use specified names and numbered lines.
For example: ACL 180
Config access-list 180 permit tcp 192.167.77.0.0.0.0.255 192.167.77.3.0.0.0.0
TCP packet to 192.167.78.1 will be rejected because it is not within the specificed range of the ACL.
TCP packet to 192.167.77.2 will be accepted because it is within the specified range of the ACL.
ACL Command Examples
There are many commands that can be used for ACL implementations. Such commands are:
Config access-list permit
Config access-list deny
Config clear access-list
Config show access-list

To configure an ACL on a router
Example: deny traffic from 192.167.77.3.0.0.0.0
Open the router terminal
En
Conf t
#access-list
<1-99 for standard list>
#access-list 50
#access list 50 de
#access list 50 deny 192.167.77.3.0.0.0.0
To configure an ACL on a switch
Example: permit traffic from 192.167.77.3.0.0.0.0
Open Command prompt
En
Switch#conf t
Switch#(config)#access-list 50
Switch#(config)#access-list 50 permit 192.167.77.3.0.0.0.0

References
Beasley, J. S., & Nilkaew, P. (2013). A Practical Guide to Advanced Networking. Pearson IT Certification.
Cain and Abel (software). (2014, 09 27). Retrieved 12 15, 2014, from Wikipedia: http://en.wikipedia.org/wiki/Cain_and_Abel_%28software%29
Configuring IPv6 Static Routes. (2012, 08 10). Retrieved 11 24, 2014, from Juniper: https://www.juniper.net/documentation/en_US/junos12.1/topics/example/policy-ipv6-static-routes.html
How to install Ubuntu 14.4 LTS on Virtubal box. (2014, 05 14). Retrieved 12 02, 2014, from YouTube: https://www.youtube.com/watch?v=QkJmahizwO4
Methods of Network Access Security. (n.d.). Retrieved 12 22, 2014, from Exam Collection: http://www.examcollection.com/certification-training/methods-of-network-access-security.html
SecTools.Org: Top 125 Network Security Tools. (n.d.). Retrieved 12 15, 2014, from SecTools: http://sectools.org/tag/sniffers/
Wilson, T. (2012, 05 16). Securing Networks: Access Control LIsts (ACL). Retrieved 12 22, 2014, from Pluralsight Blog: http://blog.pluralsight.com/access-control-list-concepts
Wireshark. (2014, 12 1). Retrieved 12 15, 2014, from Wikepedia: http://en.wikipedia.org/wiki/Wireshark

Similar Documents

Premium Essay

It Implementation

...IT Project Implementation Failures Within this document you will find the answers to your questions. Such as how the implementation process works and why some IT projects tend to fail. The implementation process will be explained in detail so that the roles and responsibilities are understood. There will also be a brief overview of how an organization can minimize the occurrences and effects of it failures. IT Implementation The implementation process begins after the system has been assigned and everyone has access to it. This process is a huge priority for our team and especially valued by the senior executives. When our organization implements a new health care information system we make sure that plenty of time and resources are set aside to give it as much attention as needed to complete the process. The first few steps of the process are crucial, organizing the implementation team and identify a system champion, determine the projects scope and expectations and establish and institute a project plan. In these first few steps there can be major failure, leading to costly overruns, unsatisfied users, delays and more. Fundamentals Missed In the case study “Memorial Health System CPOE Implementation” there was several fundamental activities that were not completed. When planning out the process Fred Dryer and Joe Roberts did not evaluate the time money or even staff that would be needed to complete the implementation process. The men wanted to get the board’s......

Words: 686 - Pages: 3

Premium Essay

Network

...Situation in which the Project Exists:   This project is for a residential data communication network.   The proposed network is designed to connect 2 workstations and 1 printer.   It will provide internet access as well as multiple email addresses.   The client has approved an initial investment of $5,000 to implement the networking project.   The two workstations will be two HP Pavilion Laptops with AMD Turion II Dual Core Mobile processor, each for $529.99.   The printer will be a PIXMA Wireless multifunction printer/copier/scanner for $99.   The client desires to have a mobile network with the ability to work virtually anywhere in the house.   The laptops both come with internal wireless adapters, 500gbytes of hard drive space, and they feature 2 processing cores with 2.2GHz processor speed per core.   For multitasking power the laptops come with 4GB DDR2 DIMM memory, expandable to 8GB.   The wireless printer prints up to 26ppm in black, and up to 17 ppm in color.   It also prints, copies and scans for convenience.   The printer also has built-in memory card slots that support various card capacities and sizes.   The network will be designed to accommodate the client’s mobility needs and business/operational objectives.   We have decided to implement a wireless LAN Architecture to provide the customer with maximum mobility.   We have decided to use the Verizon FiOs Network which comes with a wireless router, and downloads up to 50 Mbps and uploads up to 20 Mbps for......

Words: 782 - Pages: 4

Free Essay

Implementation and Analysis of a Wide Area Network

...IMPLEMENTATION AND ANALYSIS OF A WIDE AREA NETWOK (A FEASIBILITY REPORT) BY ISAIAH ADEBAYO STUDENT’S NAME WITH 3121658 STUDENT’S NUMBER COMPUTER SYSTEMS AND NETWORKING ENGINEERING (CSN)-FULL TIME SUBMITTED TO: DR VINCENT SIYAU (SUPERVISOR) TABLE OF CONTENTS CHAPTER ONE 1.0 AIM.............................................................................................................................Page 3 1.1 OBJECTIVES.............................................................................................................Page 3 1.2 INTRODUCTION......................................................................................................Page 4 1.3 EQUIPMENTS USED............................................................................................... Page 4 CHAPTER TWO 2.0 METHODS AND PROCEDURES............................................................................Page 5 2.1 PRESENT NETWORK OVERVIEW........................................................................Page 5 2.2 MAIN OFFICE NETWORK......................................................................................Page 7 2.3 SUBNET OFFICE NETWORK.................................................................................Page 7 2.4 BUSY NETWORK SCENARIO...............................................................................Page 7 CHAPTHER THREE 3.0 PROPOSED NETWORK SCENARIO....................................................

Words: 1948 - Pages: 8

Premium Essay

Implementation

...The Nature of Strategy Implementation Successful strategy formulation does not guarantee successful startegy implementation. It is always more difficult to do something (strategy implementation) than to say you are going to do it (strategy formulation). Although inextricably linked, startegy implementation is fundamentally different from strategy fromulation. Strategy formulation and implementation can be contrasted in the following ways: * Strategy formulation is positioning forces before the action. * Strategy implementation is managing forces during the action. * Strategy formulation focuses on effectiveness. * Strategy implementation focuses in efficiency. * Strategy formulation is primarily an intellectual process. * Strategy implementation is primarily an operational process. * Strategy formulation requires good intuitive and analytical skills. * Strategy implementation requires special motivation and leadeship skills. * Strategy formulation requires coordination among a few individuals. * Strategy implementation requires coordination among many individuals. Management perspectives Implementation problems can arise because of the shift in responsibility, especially if SF decisions come as a surprise to middle- and lower-level managers. Therefore, it is essential to involve divisional and functional managers in strategy-formulation activities. Management Issues Central to Strategy Implementation * Establish annual......

Words: 540 - Pages: 3

Free Essay

Network

...13 Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network Xu Huang, Shirantha Wijesekera and Dharmendra Sharma University of Canberra Australia 1. Introduction Wireless security is becoming increasingly important as wireless applications and systems are widely adopted. Numerous organizations have already installed or are busy in installing “wireless local area networks” (WLANs). These networks, based on the IEEE 802.11 standard, are very easy to deploy and inexpensive. Wi-Fi allows LANs to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. As of 2007 wireless network adapters are built into most modern laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in ever more devices. Wi-Fi has become widespread in corporate infrastructures, which also helps with the deployment of RFID technology that can piggyback on Wi-Fi. WiFi is a global set of standards, unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world. Other important trends in wireless adoptions are including the introduction of wireless email with devices such as the Blackberry and The Palm VII, rampant digital cell phone use, including the use of short message service (SMWS), and the advent of Bluetooth devices. But the risks associated with the adoption of wireless networking are only now coming to light. A number of impressive......

Words: 6431 - Pages: 26

Premium Essay

It Implementation

...IT Project Implementation Failures Tykeshia James HCS483 February04, 2013 Linda Mesko IT Project Implementation Failures The typical implementation process or plan includes the following, “workflow and process analysis the organization needs to identify opportunities for improvement and as appropriate effect those changes. Identify sources of data including interfaces to other systems, redesign physical location as needed. Then comes the system installation determine system configuration, order and install hardware, prepare computer room upgrade or implement IT infrastructure, customize software test, retest, and test again. Next, the organization should have staff training so that they are up to date on the new system procedure manuals should be updated as well so if the occasion arises the staff can refer to the information. After this the data needs to be converted and system testing. Finally, preparation for go-live date select a date when patient volume is relatively low ensures sufficient staff is on hand. Setup mechanism for reporting and correcting problems and issues review and effect process reengineering. () During the implementation process there should be an organized implementation team and a system champion. The implementation team is responsible for planning, coordinating, budgeting and managing the new system. The team should include an IT professional with technical database and network administration expertise. They will be responsible for......

Words: 441 - Pages: 2

Premium Essay

It Implementation

...IT Project Implementation Failures HCS/245 September 16th, 2013 Marc Magill Project Implementation A typical IT Implementation process normally follows SDLC process. SDLC refers to Standard Development Life-Cycle. Below are the standard SDLC phases: 1) Initiation Phase 2) System Concept Development 3) Planning 4) Requirements Analysis 5) Design 6) Development 7) Integration & Testing 8) Implementation 9) Operations & Maintenance 10) Disposition Any project starts with an Initiation phase when a Business or Project Sponsor identifies a use case or need or opportunity to achieve some of the company’s strategic goal. Based on this proposal will be created. System Concept Development phase where we define the scope, business requirements trace matrix, Cost Benefit Analysis, Risk Management Plan and if the proposal can be feasible and define an approach. This is the phase where you identify all stakeholders and socialize the project for its approval. Planning phase is where you do vendor selection; create project management plan, project schedule and any other planning documents. Budget plan, Resource plan will also be defined in planning phase. Disposition provides end of system activities and lessons learned and close the project. Requirements Analysis is where you work closely with business users and understands their needs, develop user needs and create a detail functional design document and get approval from all stakeholders. Design phase......

Words: 803 - Pages: 4

Premium Essay

Network

... fwuashie@ug.edu.gh Nationality  : GhanaianDate of Birth: 22nd June, 1981 | | ------------------------------------------------- Profile I am industrious, goal-oriented, focused and ambitious person with Computer Hardware & Networking, and Microsoft Certified System Engineering background. I have a dedicated insight into the needs and views of others, and the ability to identify issues or crisis areas and form inventive information technology solutions. My areas of strength include; Networking and System Administration/Security Objectives I aspire to become a Network Systems Security Analyst and Database Administrator and to work in a demanding, competitive, fulfilling and an exciting environment to bring out the best in me. ------------------------------------------------- Education And Professional Qualification Certification Status | Credential | Certification / Version | | Date Achieved | | Ubiquiti airMAX & Unifi Wi-Fi Training | airMAX Certified & Unifi Wi-Fi | | April 12, 2013 | | Modules: * Understanding Wireless Communication * Active Server Pages * Link Planning and ManagementMicrosoft Certified Technology Specialist | Administrator. * Ubiquiti Protocols and Technologies * Hands-on UniFi Campus WIFI Course * RF......

Words: 774 - Pages: 4

Free Essay

Implementation and Evaluation of Wireless Mesh Networks on Manet Routing Protocols

...June 2013 Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols Shashi Bhushan1,Anil Saroliya2 ,Vijander Singh3 Research Scholar, Computer Science, Amity University, Jaipur, India 1 Assistant Professor, Computer Science, Amity University, Jaipur, India 2 Senior Lecturer, Computer Science, Amity University, Jaipur, India 3 Abstract—Wireless Mesh Network (WMN) is a kind of network which is made up of Mesh router and Mesh clients where Mesh router having lesser mobility and form the heart of WMNs. In this paper, Wireless Mesh Network over MANET implemented using routing protocols such as AODV, DSR. In this work NS-2.34 simulator is used for simulations. Various measurements and calculations were figure out in this work like throughput, Average end-end delay, PDR, NRL and Routing packets in Random way point mobility model. WMN have features such as self configuration, self healing and low cost of equipment. This work specifically aims to study the performance of routing protocols in a wireless mesh network, where static mesh routers and mobile clients participate together to implement networks functionality such as routing and packet forwarding in different mobility scenarios Keywords- Ad hoc Network, Routing Protocols, Wireless Mesh Network, Performance, Throughput, PDR, NRL and Routing packets in Random way point mobility model, Simulation on Network simulator NS-2, AODV,DSR , Routing Overhead. I. INTRODUCTION A Mobile Ad-hoc network (MANET)......

Words: 4335 - Pages: 18

Free Essay

On Implementation of Elliptic Curve Cryptography and Self-Certified Public Key Cryptosystems in Wireless Mesh Networks

...On Implementation of Elliptic Curve Cryptography and Self-Certified Public Key Cryptosystems in Wireless Mesh Networks A B.Tech Project Report submitted in fulfilment of the requirements for the Degree of Bachelor of Technology Submitted by K Bharadwaj Sharma 07010219 M Krishna Chaitanya 07010228 Under the Guidance of Dr.Ratnajit Bhattacharjee Department of Electronics and Electrical Engineering Indian Institute of Technology Guwahati Guwahati-781039, Assam i Candidate’s Declaration I hereby declare that the work which is being reported in this thesis entitled “ On Implementation of Elliptic Curve Cryptography and self-certified public key cryptosystems in Wireless Mesh Networks “ in partial fulfilment of the requirements for the award of the Degree of Bachelor of Technology, submitted in the Department of Electronics and Communication Engineering, Indian Institute of Technology Guwahati, is a record of my own work carried out during my thesis work under the supervision of Dr.Ratnajit Bhattacharjee, Associate Professor, Department of EEE, IIT Guwahati. The matter entitled in this thesis has not been submitted elsewhere for the award of any other degree. Place: Guwahati Date: 21st April, 2011 This is to certify that the above statement made by the candidate is correct to the best of my knowledge. April,2011 IIT Guwahati ` Supervisor: Dr. Ratnajit Bhattacharjee Associate Professor Dept. of EEE IIT Guwahati ii ACKNOWLEDGEMENT First and foremost...

Words: 7761 - Pages: 32

Premium Essay

Network

...Network Design Following the acquisition of new premises comprising a two-story office in Adeplhi, Maryland this provides UMUC with the ability to revise and improve their network topology accordingly and ensure that not only is connectivity provided in a consistent fashion but also to provide the required security for information accordingly. One of the fundamental requirements is to ensure that data is segregated in terms of staff and students so this will require the creation of dedicated subnets accordingly to follow through and implement the solution, while there is also a requirement to provide wireless connectivity for students in the lobby area. Given that there is a specific opportunity to develop a comprehensive infrastructure it is important that the fundamental basis in terms of cabling is of a sufficiently high quality to support current and future operational requirements. Due to the size of the building there would be limitations if using Cat 5 based Ethernet cables for example and so therefore there should be a requirement to utilize Cat 6 based Ethernet as this will support a maximum cable length in excess of 300 ft without there being any connectivity or performance issues (Mitchell, 2014). Each of the two floors will have a designated server room that is designed to provide a central point of connectivity for all locations on that floor, and each of the rooms on the first and second floor will require a certain number of data ports based on their expected......

Words: 1451 - Pages: 6

Premium Essay

Implementation

...Name Instructor Class Date Implementation Rehearsal must be considered in plan implementation because you have to make sure you practice your plan to see if it is planned out enough and to see if it will work. You should always rehearse a plan before making it official so you can weed out any mistakes or bad ideas. Maintenance must be considered in plan implementation because if you have any errors, you need a way to fix them quickly. Just like buying a used car, you need maintenance every once in a while to fix things that aren’t working right. Benchmarking must be considered in plan implementation because you should always evaluate your plan for mistakes and make sure it is as good as other plans. It’s all about competition in this world, and if your plan isn’t as good as others, you will have some problems in your business. If your plan doesn’t pass the test, it will not work and needs to be fixed. Assurance and Audit must be considered in plan implementation because it helps to assure that your plan can be fixed and molded into the best plan it can be. All of the errors are removed to perfect the plan with assurance audit. Not only is it a good idea to make sure others within the company inspect your plan for a second opinion, but it is also a good idea that you also inspect your plan personally also. You are the one that created it and you are the one that knows what’s best for it and what needs to stay and what needs to go. Reference Reference: ......

Words: 293 - Pages: 2

Premium Essay

Voip Network Service Implementation

...VOIP NETWORK SERVICE IMPLEMENTATION TABLE OF CONTENTS - Executive Summary------------------------------------------------------------------------ 1 - Introduction--------------------------------------------------------------------------------- 2 - What is Voip-------------------------------------------------------------------------------- 3 - How Voip Works-------------------------------------------------------------------------- 4 - Advantages and Requirements for Voip------------------------------------------------ 6 - Disadvantages of Voip-------------------------------------------------------------------- 7 - Voice Over IP Solutions------------------------------------------------------------------10 - Conclusion----------------------------------------------------------------------------------12 - References----------------------------------------------------------------------------------13 EXECUTIVE SUMMARY The term “Voice over Internet Protocol” (VoIP) describes the transport of voice over IP based networks; it is a generic term that covers deployments ranging in complexity from hobbyists using the internet to get free phone calls on a peer to peer basis, to full scale PSTN replacement networks. In carrier networks VoIP has been mainly deployed in enterprise networks or as a trunking technology to reduce transport costs in......

Words: 2981 - Pages: 12

Premium Essay

Networks

...Chapter 1 Analyzing Business Goals and Constraints This chapter serves as an introduction to the rest of the book by describing top-down network design. The first section explains how to use a systematic, top-down process when designing computer networks for your customers. Depending on your job, your customers might consist of other departments within your company, those to whom you are trying to sell products, or clients of your consulting business. After describing the methodology, this chapter focuses on the first step in top-down network design: analyzing your customer’s business goals. Business goals include the capability to run network applications to meet corporate business objectives, and the need to work within business constraints, such as budgets, limited networking personnel, and tight timeframes. This chapter also covers an important business constraint that some people call the eighth layer of the Open System Interconnection (OSI) reference model: workplace politics. To ensure the success of your network design project, you should gain an understanding of any corporate politics and policies at your customer’s site that could affect your project. The chapter concludes with a checklist to help you determine if you have addressed the business issues in a network design project. Using a Top-Down Network Design Methodology According to Albert Einstein: 000200010270745975 “The world we’ve made as a result of the level of thinking we have......

Words: 8812 - Pages: 36

Free Essay

Network

...INTRODUCTION The term MANET (Mobile Adhoc Network)refers to a multihop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time , without using any kind of fixed wired infrastructure. MNET are actually self organizing and adaptive networks that can be formed and deformed on-the-fly without the need of any centralized administration. As for other packet data networks, one –to-one communication in a MANET is achieved by unicast routing each single packet. Routing in MANET is challenging due to the constraints existing on the transmission bandwidth battery power and CPU time and the requirement to cope with the frequent topological changes resulting from the mobility of the nodes. Nodes of a MANET cooperate in the task of routing packets to destination nodes since each node of the network is able to communicate only with those nodes located within its transmission radius R, while the source and destination nodes can be located at a distance much higher than R. A first attempt to cope with the mobility is to use the specific techniques aimed to tailoring the conventional routing protocols to the mobile environment while preserving their nature. For this reason the protocol designed around such techniques are referred to as table-driven or proactive protocols. To guarantee that routing tables are up to date and reflect the actual network topology, nodes running a protocol......

Words: 2723 - Pages: 11