Analysis of the Old System
The DBS PLC Insurance Ltd. Company is looking to expand the use of their technology so the delivery of the service for their customers. In addition to this, the organization is also looking to improve the communication of the staffs of the company both internally and externally. For the improvements in the system the organization would like to improve their network setup.
This report contains the details of the improvement of the network layout of the company. The report consists of the analysis of the old system, advantage and disadvantage of the new network and a new network design of the system.
For the analysis of the old system the information about the old system is to be gathered. In the present system the overall operations are handled by the managing director and the finance manager of the company. In addition to this, there are a number of department of the organization. The Account department makes use of 6 staffs for the organization and the sales department consists of 25 employees. The employees are on-road co-ordinators and additionally the human resource department also employs 3 people – one human resource manager and two clerks. The office is located near a business park near the M50 and N11 junctions. In addition to this, it is also known that company is also looking to expand its business to North Cork. Further network information about the organization is provided below:
The managing director is provided with a laptop but he has no access to the network that would provide him with the access to the systems in the headquarters of the company. He would also like to monitor the day to day operations of the organization.
The machine provided to the finance manager configured with a 800MHz Pentium III processor. The machine is linked to the network however the manager has to spend time in worrying about the network security, viruses, spam, and staff using the Internet for personal interests.
Accounts:
The accounts department has a 100 MHz Sparc Unix based computer which is connected to the payroll and clients’ accounts. The system also has a 10 GB disc and a DAT drive required for the backups of the system. The network consists of single modern PC and it is linked with the modem that is used for the bank transfers and enquiries. In addition this, it has been informed by the company that they are looking to use a system that would be connecting the networlk to the internet so that the customers would be provided the option to access the accounts.
New Network Design and Advantages
Sales Department:
The sales department have a stand-alone PC running Windows ’98 shared by the Sales manager and the marketing coordinator. In addition to this, it is also known that a small color inject printer is also connected to the network. The internet services are to be activated in the system so that the communication in between the organization and the employees of the organization is increased to a great exent.
Administration:
The administration department has a peer-to-peer network that connects 5 PCs to the network. The administration manager also has a PC that is connected to the network and the manager and the manager looks over the network and the processes of the network. He also has a laser printer connected to his system. The machine is running windows 2000 however the system is not efficient enough. The machine is also used for handling all the important mails for the company.
Human Resource:
The human resource office is entirely a paper based office with no new network setup for the office. Additionally it is also known that the organization have acquired an office that would provide the organization with an additional area to implement some part of their network.
The new network would provide the organization with all the required features and the network design is done according to the need of the organization. The data storing and security options in the network have been improved to a great level. Following are the advantages of the system:
Firstly, due to the introduction of firewall the network would be secured to a great level.
The wireless router would also provide wireless access to the internet within the organization.
The database server in the new network would be providing the organization to store important details in the system of the organization.
In addition to the advantages of the system there are some disadvantages to the new network layout:
- The cost of implementation of the new network would be very high and the time required for the implantation would be very high.
- In addition to this, the new network would be able to make very limited use of the old systems of the peripherals that were used.
The network would be making use of the 7 layer model or the OSI model. The 7 layers of the model are Application, presentation, session, transport, network, data link and physical layer. The application layer is required for the end user of the company that are management, employees and the clients of the company are the end users. This would help them in sending emails. The presentation layer is used for the encryption and decryption. This would help in the access control of the network. The session layer is used for the connection to the network. This would help the managers and staffs of the company to log in to the network. The transport layer is responsible for the error recovery and flow control. This would help in the back up of data and database system of the organization. The network layer would help organization to access the internet. The data link layer would help in the connections in between the switches and hubs in the network. The physical layer would help in the identification of the machines and help in deciding the topology of the network.
Disadvantages of the New Network Layout
The different type of networks are MAN, WAN and LAN where MAN is Metropolitan Area network, WAN is wide area network and LAN is Local Area Network. The table described below shows the comparison in between them:
LAN |
MAN |
WAN |
A LAN (local area network) is a group of computers and network devices connected together, usually within the same building. By definition, the connections must be high speed and relatively inexpensive. |
A MAN (metropolitan area network) is a larger network that usually spans several buildings in the same city or town. |
A WAN (wide area network), in comparison to a MAN, is not restricted to a geographical location, although it might be confined within the bounds of a state or country. A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or accessible to the public. The technology is high speed and relatively expensive. |
e.g., token ring or Ethernet |
The IUB network is an example of a MAN |
The Internet is an example of a worldwide public WAN. |
The different kinds of network topologies are Mesh Topology, Star Topology, Ring Topology, Tree Topology and Bus Topology.
Bus Topology |
Ring Topology |
Star Topology |
Tree Topology |
Mesh Topology |
Bus Topology uses one cable. All the peripheral devices are connected in series to that cable. A special device, called terminator, is attached at the cable’s start and end points, to stop network signals so they do not break down the cable. |
The Ring Topology connects the network’s nodes in a circular chain, with each node connected to the next. The last node connected to the first, completing the ring. Each node examines data as it travels through the ring. If data —known as a token — is not addressed to the node examining it, that node passes it to the next node. |
Star Topology probably the most common topology. In star network, all nodes are connected to a device called hub and communicate through it. Data packets travel through the hub and are sent to attach nodes, eventually reaching their destinations. Some hubs – known as intelligent hubs- can monitor traffic and help prevent collisions. |
Tree Topology is the combination of the characteristics of a star topology and a bus topology. In this topology, a star -configured workstation in a group are connected to cable which acts as a linear bus backbone. The tree bus can connect only with the hub device directly. It has a central hub acts as a root of a tree of a network device. It has a central root node which is connected to one or more nodes present in the lower hierarchical topology. |
Mesh Topology is the least used network topology and the most expensive to implement. In mesh environment, a cable runs from every computer to every other computer. If you have four computers, you must have six cables—three coming from each computer to the other computers. |
Advantage Of Bus Topology is that it uses the less cabling of any topology. |
There is no danger of collisions because only one packet of data travels the ring at a time. |
Advantages of Star Topology is that in a star topology a broken connection between a node and the hub does not affect the rest of the network. |
Point to point wiring for every segment is the main advantage. It is also supported by most of the hardware and software vendors. |
The big advantage to this arrangement is that data can never fail to be delivered. If any of the connection goes down, there are other ways to route the data to its destination. |
Disadvantage Of Bus Topology is that extra circuitry ad software are used to keep data packets from colliding with one another. A broken connection can bring down all part of the network. |
If the ring is broken, however, the entire network is unable to communicate. |
If the hub is lost, however all the nodes connected to that hub are unable to communicate. |
The type of the cabling limits the overall length of each segment. When the backbone line breaks, it leads to the breakdown of the complete segment. Tree topology becomes more difficulty to configure and wire in comparison to the other topologies. |
Most expensive network as large amount of cabling is required. Expensive hardware and software is needed to implement this network. |
The different type of operating systems are client-server and peer to peer network operating systems. The differences in between the different network operating systems are:
- The noticeable difference between the client-server network and the peer-to-peer network is that in a client-server network, the designated clients request for services, and the servers provide them (data flows from server to client), but in peer-to-peer network, peers act as both service providers and service consumers at the same time (data flows within peers).
- The client-server network requires a central security database which stores blocks of shared data as a backup, but the peer-peer network does not need or have a central security database, as each peer contains its data.
- The purpose of a client-server network is to share information securely. In the case of a peer-to-peer network, connecting the peers are more important as its purpose is hardware sharing.
- In the client-server network, as there is a single server for multiple clients, the chance of occurrence of bottleneck effect is high. But as the servers are distributed in the peer-to-peer network, the bottleneck effect is comparatively less here.
- In a client-server network, the server contains a list of user names and passwords for authenticating the clients. The client has to provide the correct username and password to log in to the network and to establish a connection between the server and the client. Even after the connection is established, the client can only access data which the server has authorized. Whereas, in a peer-to-peer network, the peers (users) are free to create network share points on their computers. As there is no central security, there is no control over who shares what in the network. The only security in a peer-to-peer network is at the share level. When a Peer makes a network share, they might implement no security, meaning no authentication is needed for anyone to access the share. Or, they might implement security and provide read-only privilege to some and complete access to other. This arrangement might sound secure, but it isn’t. The computer with the shared data does not check on who is trying to access the data. Anyone can access the shared data with the correct password.
The network operating system selected for discussion in this report is LANtastic network operating system. The LANtastic has a built in modem and internet access sharing and state of art Internet connections. It also has a very efficient interface and memory handling technique. It support cross platform and shared access internet gateway. It supports client-server architecture. The operating system is a cross platform tool and supports sharing file to the others in the network and also can be connected to the printers, CD-ROMS and application through the enterprise.
References
Berde, P., Gerola, M., Hart, J., Higuchi, Y., Kobayashi, M., Koide, T., Lantz, B., O’Connor, B., Radoslavov, P., Snow, W. and Parulkar, G., 2014, August. ONOS: towards an open, distributed SDN OS. In Proceedings of the third workshop on Hot topics in software defined networking (pp. 1-6). ACM.
Berman, M., Chase, J.S., Landweber, L., Nakao, A., Ott, M., Raychaudhuri, D., Ricci, R. and Seskar, I., 2014. GENI: A federated testbed for innovative network experiments. Computer Networks, 61, pp.5-23.
Feamster, N., Rexford, J. and Zegura, E., 2014. The road to SDN: an intellectual history of programmable networks. ACM SIGCOMM Computer Communication Review, 44(2), pp.87-98.
Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S. and Uhlig, S., 2015. Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), pp.14-76.
Liang, C. and Yu, F.R., 2015. Wireless network virtualization: A survey, some research issues and challenges. IEEE Communications Surveys & Tutorials, 17(1), pp.358-380.
Mijumbi, R., Serrat, J., Gorricho, J.L., Bouten, N., De Turck, F. and Boutaba, R., 2016. Network function virtualization: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials, 18(1), pp.236-262.
Nunes, B.A.A., Mendonca, M., Nguyen, X.N., Obraczka, K. and Turletti, T., 2014. A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications Surveys & Tutorials, 16(3), pp.1617-1634.
Shin, S., Song, Y., Lee, T., Lee, S., Chung, J., Porras, P., Yegneswaran, V., Noh, J. and Kang, B.B., 2014, November. Rosemary: A robust, secure, and high-performance network operating system. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (pp. 78-89). ACM.
Singh, A., Ong, J., Agarwal, A., Anderson, G., Armistead, A., Bannon, R., Boving, S., Desai, G., Felderman, B., Germano, P. and Kanagala, A., 2015, August. Jupiter rising: A decade of clos topologies and centralized control in google’s datacenter network. In ACM SIGCOMM computer communication review (Vol. 45, No. 4, pp. 183-197). ACM.
Wang, B., Zheng, Y., Lou, W. and Hou, Y.T., 2015. DDoS attack protection in the era of cloud computing and software-defined networking. Computer Networks, 81, pp.308-319.