Business connectivity is very essential in the globalised world. Productivity is increased in any business where computers and hence users are connected through a network that is much easier and secure. Some of the benefits realized through connectivity are the ability to share information with different users who are geographically dispersed amongst different locations. File sharing as well as instant messaging is made possible through connectivity. These desires are what drive Acme manufacturing to venture into the networked environment. Acme manufacturing has branches in most parts of the united stated as well as new branch I china. It is essential that information sharing is realized between these branches and the headquarters. Not only can information sharing be achieved in this case but also other resource sharing like hardware (Kozierok, 2005). WAN therefore would prove useful if all the branches are connected and thus information and other resource sharing are made easier. This report therefore discuses some of the technologies and design that Acme should use in the implementation of its intended WAN network
Description of scenario
Acme has companies distributed all over the country and in China. The headquarters, located in Georgia, monitors all the activities in all the branches, which include those in New York, Chicago and Phoenix not forgetting the new branch in China. The management also has departments which are semi-autonomous in its operations and hence the need for logical separation of the networks in these departments. These departments include corporate operations, marketing, administrative staff, and accounting
Technologies used in the design
There are network technologies, which will be used in the design of the WAN network. Most offices or departments use the LAN type of network, which makes it difficult to access other departments or branch networks. Routers will be used in all departments and branches. Routers will serve the main purpose of routing data packets to the desired destinations. In order to protect information from external attacks and access, firewalls will be used in all connections. Firewalls will provide a mechanism to prevent unwanted information from entering or leaving the network (Kozierok, 2005). The headquarters will have switches installed instead of hubs. Switches are more efficient than hubs since they offer collision domain break up, a characteristic that cannot be realized in hubs. Switches further more allow utilization of full bandwidth for transmission as opposed to hubs, which divides the bandwidth between equipments present, thereby leading to congestion in one transmission and under utilization in another.
Connecting from head office to other branches
In order to connect form the head office in Georgia to other branches in New York and even china, there are a number of options available. The company could choose to purchase dark fiber through ISDN or ADSL connection. This however could be very expensive and unrealistic given the fact that one of the branches is overseas. ADSL2 is preferred due to its chap nature. WAN connectivity for this company therefore can be achieved by use of Virtual Private Networks services, which can be obtained by purchasing IP VPN from a service provider. The advantage of VPN is that it allows secure network establishment, which runs side by side with other public networks like the internet. The IP address scheme used should be able to handle many domains and thus IPV64 would prove the most appropriate address for the network. Interdepartmental IP addresses could be made public, that is, accessible within the department but made private or in accessible to other networks.
Connection between departments
In order to establish a connection between the different departments in the company, there is need for implementation of a proper VLAN. Due to the rapid expansion and location considerations, the best way to ensure access to normal service from different locations is to subnet the network. Each department like corporate operations, marketing, administrative staff, and accounting will each have a subnet (Davis, 2002). The same subnets should exist on every single switch. Having each subnet embedded in each switch will allow routing of traffic from different departments thus control bandwidth. The different activities done by the departments will form a basis for division of the VLAN network. VLAN Trunking protocol specified by IEEE 802.1Q is the preferred protocol of use. It introduces fast access speed in the network. In addition to that, it also allows management of different VLANs among multiple switches (Davis, 2002).
VoIP would be the best protocol to be used in the network as it allows easy teleconferencing with people in various company branches. For routing protocols, interior gateway routing protocols would be used at each router connecting to a subnet. Such protocols would include OSPF and IS-IS. Other protocols can be applied based on path vector or distance vector would include RIP, IGRP and EIGRP. At connections leading outside the branch, an exterior gateway protocols could be used (Davis, 2002).
In order to ensure the security of the networks, each department will be required to have a domain name to log onto. This will make sure that each system user has a username to log onto the system. Antivirus also plays a very important role in securing the network. A well maintained an updated antivirus will ensure that each machine is protected from malicious software. Each of the networks should furthermore be protected by a firewall to ensure that information that is not wanted does not enter nor leave the network. The implementation of internal network is also hidden behind routers. All firewall's and routers have been protected with passwords only known to employee from network administration department (Lammle, 2007).
Davis, P. (2002). Securing and Controlling Cisco Routers. CRC Press.
Kozierok, C. (2005, September 20). The Advantages (Benefits) of Networking. Retrieved October 13, 2009, from http://www.tcpipguide.com/free/t_TheAdvantagesBenefitsofNetworking.htm
Lammle, T. (2007). CCNA: Cisco Certified Network Associate Study Guide: Exam 640-802. John Wiley and Sons.
The project will commence with logical representation of the whole organisational network. The expansion issues will have to be taken into consideration as per the organisation’s requirements. It is good to have the design on-hand before setting out on the ground. This will help in determining the errors and the bottlenecks that will be experienced. In this design, Acme has their requirements and all of these requirements have been put in place. All network users have been considered regarding the mode in which they will be accessing the network. This is where the network has been subdivided into segments, where there are users that use wireless networks, and the ones who will use wired connectivity. On the other hand, security has been put into consideration. With cyber crime taking toll in today’s cyber world, this is becoming important.