Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Essay:
6: Existing Cable and Wireless Design
The company will establish wireless access using the LWAP (lightweight access point). The LWAP will be distributed to all the facilities through the WLS. Typically, WLS will be installed to assist in providing the traffic tunnel and failover authentication. To enhance the security of the WLAN, the company will install the encryption system at the wireless access point, the encryption protocols will contain WPA/WPA2, and there will be an AES encryption at all the wireless access point using the 802.1 X authentication.
The company will redesign the local backbone infrastructure in order to increase the network bandwidth. There would be 100 BASE-T4 cabling to the 7 Cisco 2613 routers. The cabling system will assist the company to achieve efficient network connectivity for future growth. The 100 BASE-FX (fiber) cabling will be attached to the Cisco 7507 routers, which will assist in achieving more expansion capabilities and higher performances. The existing network will be worked into 2 Cisco 5500 Catalyst switches using the separate fiber cabling. The company will achieve a significant increase in the network bandwidth in the New York infrastructure with 100 BASE-FX cabling.
1.7: Current Network Utilization
The company will be able to utilize the network through the LAN and WAN. The company will achieve a QoS (Quality of Service) across the WAN router. To support the real-time traffic, the BestLinks will use the highest priority queue, and the network utilization is described below:
DSCP (Diffserv Code Point)
Minimum Reserved Bandwidth
Voice Over IP
46 -- EF (Expedited Forwarding)
Video Over IP signaling Voice over IP signaling
26 - AF31(Assured Forwarding)
24 -- CS3(Class Selector 3)
High Priority Data
32 -- CS4 (Class Selector 4)
34 -- AF41(Assured Forwarding)
18 -- AF21 (Assured Forwarding)
Low Priority Data
10 -- AF11 (Assured Forwarding)
8 -- C31 (Class Selector 1)
Best Effort Queue
0 -- No setting
1.8: Current Network Availability
The Network connection will be established through LANs at New York and Chicago centers. There would be a network connection between New York Center and Chicago center using the WAN connectivity. The company will need to test the network availability to understand whether the network has been really established. The network availability will involve testing the current internet connection, availability of over IP (VoIP) to understand whether there could be call success through the internet. Moreover, the extent the company has been able to achieve data transfer and retrieval over the two centers will be tested to develop the network availability. The company will also test the network availability to determine the number of packet loss within a month. (Cisco, 2012).
Jiang & Schulzrinne (2003) define the network availability as the number of times that the network has been available for use. The network system will be configured to achieve 99.99% availability. There would be integration of Cisco resilient to reduce the effect of outages within the company network system as well as achieving the operational excellence.
1.9: Delay and Response Times
The delay with the implementation of the project will be affected by the budget, technical personnel and availability of the technical materials. Within the contemporary technology environment, there is shortage of it (Information Technology) personnel to manage the project after the project implementation. The company will need to train technical personnel to manage the implementation of the project. The delay of the project will also be affected by the project budget. Hans Tech will need to fund the implementation of the project and since Hans Tech is a publicly owned company, the Board of directors will need to approve the funds that will be used for the project implementation and the approval by the board of director may take up to three months.
The project implementation will start on the 1 November 2012 and would end on the 30 September 2013.Project stakeholders will minimize the changes of the project requirements. During the project implementation, the critical tasks will be implemented first and the project implementation is presented in the table below:
Engaging the BestLink Communication Expert Solutions
Information Security risk Assessment
Drafting the document of Information Security Policy
Business Continuity Plan
Hardware & Software Procurement, which include the servers, firewalls, cable, workstations, and anti-virus.
New York LAN Upgrade
Installation of 2 Cisco 7507 at each segment and are configured accordingly
Installation and configuration of Cisco 3750E/3560E switches and Cisco routers.
Configuration of workstations and end user LANs
Creating of the videoconferencing network segment and associated equipment.
Installing and configuring 2 Cisco Multiplexers
Installing the Cisco security appliances.
Configuring IPS and IDS to enhance the network security
Creating a secure external mail server and web server
Chicago LAN Upgrade
Cisco 6509 Installation at each segment as well as configuration
Configuration and Installation of Cisco Catalysts Cisco 3560E / 3750 Eswitches.
Configuring end user workstations and LANs
Creating and deploying the videoconferencing network segment and the associated equipment
Installing IPS and IDS for network security
Creating a secure external mail and server web server
WAN Connectivity to LAN
Installation of Cisco 7507 router
Connecting Cisco 7507 to the 6509E switch
Back-up connectivity with 45 Mbit/s DS3 to Chicago center
Back-up connectivity with 45 Mbit/s DS3 to Chicago
Installation of IDF with separate 3 subnets layers
Selection of EIGRP (Enhanced Interior Gateway Routing Protocol)
Linking the EIGRP routing to WAN routers
Wireless Local Area Network (WLAN)
Installation of WLC (Wireless LAN controller)
The installation of encryption protocols for WPA2/WEP
Encryption support with 802.1X authentication
The table reveals as/400 server plans.
Bestlinks as/400 Server Projections
Total as/400 servers
18 November 2012
30 December 2012
30 February 2013
30 May 2013
31 July 2013
31 August 2013
31 September 2013
1.10: Status of Major Routers, Switches and Firewalls
The company will make the major routers, Switches and Firewalls available before the project implementation.
The project pre-requisites will be as follows:
Chicago facility will be ready which include major routers, Switches and Firewalls.
There will be a configuration of LAN at least at 3-server farm and 40 workstations.
There will be an establishment of LAN to WAN connectivity
There would be configuration of firewall to enhance network security. The firewall will be used to block unwanted traffic from the reaching the network. (Chen, Horng, & Yang 2008).
The document provides the network system for Hans Tech Limited. The company intends to open another business unit at Chicago. Since Hans Tech intends to establish a communication links between the two centers, the company will need to upgrade the existing network technology as well integrating the WAN technology to achieve the network connectivity between the two centers. The WAN connectivity will be established through the (EIGRP) Enhanced Interior Gateway Routing Protocol and the BestLink will assist in establishing efficient and effective network connection. The project implementation plan will take up approximately 12 months to complete. The project implementation will enhance the following value for Hans Tech Limited:
Enhancing the company competitive market advantages
Enhancing state-of-the-art operation centers for New York and Chicago centres
Delivering the latest and best network support
Delivering database system
High-speed network connectivity for Chicago and New York
Unparalleled communication at each site.
Scalable and efficient Local Area Network at each center
High-level firewall network security for the two centers
Flawless WAN interfaces to offer network connectivity for the two centers
Secured extranet and internet connections
Installation of anti-virus software for all laptops and desktops
The successful completion of this project will support other technical projects to achieve the following objectives:
Understanding the strategy to create effective and efficient network document.
Understanding the strategy to connect WAN over LAN
Assist in designing high level network reliability
Assist in designing document to…[continue]
"Technical Document For Hans Tech" (2012, July 19) Retrieved October 26, 2016, from http://www.paperdue.com/essay/technical-document-for-hans-tech-72998
"Technical Document For Hans Tech" 19 July 2012. Web.26 October. 2016. <http://www.paperdue.com/essay/technical-document-for-hans-tech-72998>
"Technical Document For Hans Tech", 19 July 2012, Accessed.26 October. 2016, http://www.paperdue.com/essay/technical-document-for-hans-tech-72998
" James a.S. McPeek further blames Jonson for this corruption: "No one can read this dainty song to Celia without feeling that Jonson is indecorous in putting it in the mouth of such a thoroughgoing scoundrel as Volpone." Shelburne asserts that the usual view of Jonson's use of the Catullan poem is distorted by an insufficient understanding of Catullus' carmina, which comes from critics' willingness to adhere to a conventional -- yet incorrect