Vous êtes sur la page 1sur 19


KFF Network Design Emanuel Hernandez NTC/362 September 23, 2012 Eddie Horton


KFF Network Design Kudler Fine Foods (KFF) uses a linear bus topology consisting of a main run of cable made of a terminator at each end. The file server, workstations and peripherals are all connected to the linear cable. Under the architecture of network used, it is easy to connect peripheral or a computer to the linear bus and it saves costs involved in purchasing cables (Cisco Inc., 2000). However, there are high data transfer rates due to use of Ethernet but if the linear cable breaks, it halts the entire network. KFFs network allows sharing of resources such as printer, modems and CD-ROM, which makes it cheaper to set up the network and save on costs. Also, networked computers are able to share centralized key computer programs such as inventory spreadsheets allowing users to have the same program as opposed to copies of the program hence they can work on the program simultaneously. Additionally, the network supports automated unattended backup of contents and valuables that make it easy to backup essential files without wasting time. Use of Ethernet in KFF ensures that computers listen to the cable before transmitting data through the network (Cisco Inc., 2000). Ethernet uses carrier sense multiple access method which allows computers to send information based on network traffic; if the network is clear, Ethernet allows data transmission, if not, the sending computer is put on a waiting mode and prompted to resend the data after sometime. In this kind of network, Ethernet only transmits data at a speed of 10 megabits per second; this speed is very slow. Evaluate the current network topology KFF uses an out dated network topology which suffers the disadvantage of complete breakdown in case the backbone linear cable breaks. The Bus topology is limited to accommodating only a few computer and peripheral components and if a component fails, then the


entire string fails. In this type of network, it is hard to determine the source cause of a problem in case it occurs thus time consuming in terms of problem identification and resolution. However, the bus network topology enjoys fast real time data communication and simple remote monitoring and management of components. The design is cheap and easy to configure. In terms of reliability, the bus topology is not reliable at all. This arises from data transmission style where data is propagated in form of electrical pulses. Basically, when a node transmits a series of electrical pulses, the pulses travel in all directions along the carrier cable and they continue traveling until they find a component to absorb them or they weaken in such a manner that they are undetectable. If a signal encounters the end of a cable, it bounces back until it is absorbed. Therefore, from transmission, data signals are relayed across transportation medium and are expected to travel to both ends of the bus hence making it essential to check the signals to prevent continuous bouncing back that would prevent other computers from sending data. We can avert this situation using logical bus topology where data sent is addressed to a specific machine. This method breaks down data into manageable chunks and transmits the data to specified computers. However, only one machine (node) at a time can successfully send data. With

this type of topology, we expect KFF network users to share the available amount of transmission time to avoid slowing down network performance (Reinhold, 1990). Additionally, all nodes ought to be passive; they should be listening to sent commands to allow efficiency in case on one computer breakdown. In the passive mode, if a node fails it is likely that all other node will continue functioning as opposed to the active mode where if one fails, then all the rest also fail. Describe the standards applicable to this project The standards of network applicable to this project will be based on network specifications laid out by ISO D1S7498 that consists of seven layers as discussed below:


Physical layer: this is the lowest level of network components that specifies mechanical and electrical details of communication. As discussed above, KFF uses bus topology which uses Ethernet that supports use of coaxial cable, twisted pair cable or fiber cable. KFF uses fiber cable which is the fasted transmitting cable among the three. This supports electrical signals which are digital. Data link layer: This layer determines the formats of messages being transmitted and how data is addressed to detect and correct errors. In order to eliminate bouncing back of messages in the network, data addressing is used. This ensures that data sent is specified to a given machine using data headers that specify a machine address. The flow and control of network resources is controlled over the server machine. Address Resolution Protocol (ARP) is used. Network layer: the network layer defines routing and logical addressing where procedures for encapsulation for message into packets is established. Internet Protocol (IP) addressing is enforced at this stage (Reinhold, 1990). Transport layer: this layer handles delivery of information from one computer to another thus under the transport layer there is flow control which manages the way data is transmitted from one component to another. This allows sending devices to send manageable data at the receiving end. Other applications on this layer include error detection and recovery as well as establishing virtual circuits. The standard protocol in KFF is TCP Session layer: This layer is responsible for managing communications in terms of sessions, and organizing requests and transmission services. The standard protocol to be used in KFF is SQL Presentation layer: this layer ensures compatibility of data transmitted among communicating devices in KFFs network. It ensures data encoded can be readily decoded at the receiving machine. The standard used is ASCII.

KFF NETWORK DESIGN Application layer: KFF ought to use file transfer protocol (FTP) in identifying communication patterns and determining resource availability. Importance of communication protocols.

Communication protocols define a set of rules or standards that must be achieved when transferring data from one device to another. Mainly, protocols are use to allow exchange and transmitting of data in interconnected networks (Kang and John, 2009). Therefore, communication protocols lay out guidelines onto how computers and communication devices will share and exchange information through a standardized way. In information systems, the following summarizes the importance of communication protocols: Ensures formatting of information into binary codes They help to ensure that information is broken up into manageable units before transmission. Oversees synchronization of data during transmission period thus averting any possible communication conflicts. Over networks, there is need for uniformity of data between the senders and recipient hence protocols intervene in coding and decoding data in a standardized manner. They help in enforcing information security during transmittal period. Used in applying error detection and correction mechanisms. There are many protocols in information systems which are hierarchical in nature and are divided into layers which define a specific function. Such protocols include TCP/IP protocol suite and OSI reference model which ensure data acquisition interoperability (Aksoy and Laura, nd). Protocols used on the design

KFF NETWORK DESIGN TCP/IP protocol Distributed network protocol

Rationale for adopting the above protocols TCP/IP protocol is supported by many software applications and has universally accepted terms: it is popular. In TCP, data is divided into manageable bits and the protocol ensures that secure and appropriate routines are in place to oversee data correctly arrives to its destination. Then IP enforces logical addressing and routing of data which brings in the reliability factor (Kang and John, 2009). TCP/IP supports ASCII standards that help in formatting information transmitted into a range of supported formats such as JPEG, text and MP3 standards among others. Distributed network protocol on the other hand supports communication in process automation systems and supports peer-to-peer and master-to-slave communications. Above all, this protocol is reliable in terms of security; it contains secure authentication features and does not require heavy infrastructure. Cost wise, both protocols are fairly affordable to implement due to fair infrastructural costs (Aksoy and Laura, nd). Other features that make these protocols appropriate include both are open protocols, they support interoperability between different platforms and they can be optimized. Overall network architecture. According to our design, the adopted network architecture defines secure, interpretable infrastructure that provides reliable and open-standard based communication for distribution of information. The architecture also defines technologies required to support communications between various client machines and servers on the network (Chris, 2003). There are established network standards that coordinate secure implementation of network architecture as well as supporting traditional data such as voice and video. The architecture is based on open standards


that are industry wide approved and specify how information processing resources convey data and interconnected. The used network architecture components include wire-based using fiber optic and wireless technologies using satellite technology. The network protocols employed include TCP/IP, distributed network protocol and open short path first protocol. Usefulness of a traffic analysis. Information generated from traffic analysis can help one to figure out the needs and requirements to upgrade their network to handle more data. Also, it helps to monitor activities on the network thus one can detect instances of attacks, probably trace the attacks or even put in place appropriate measures to counter the attacks. Similarly, traffic analysis helps in figuring out the capacity limits a given network can handle and hence determining the required resources to be put in place in relation to effectiveness and costs. Therefore, traffic analysis is useful for ensuring the following: Network security Billing verification Engineering the network determining chargeback

Latency, response time, and jitter Latency: This refers to delays incurred in processing of network data. In networks, latency is measured using network tolls such as ping tests that determine the time it takes a network packet to travel from source to destination node and back. A low latency defines a system that experiences short delay times while high latency defines systems that experience long delays. Systems suffering from high latency are said to be unreliable and slow thus are inefficient.


Response time: Refers to time taken to establish communication on a networked computer system. This is the time between and end of an inquiry and the beginning of a response. Low response times indicate efficient network performance while long response time indicate unreliable network performances. Jitter: this refers to variation in packet transit delay arising from queuing and serialization effects along the path of transmission. Mostly, these delays are propagated by traffic congestion due to the size of bandwidth used and speed of transmission paths in place. In congested links, higher levels of jitters are likely to occur. Therefore, higher levels of jitters cause data transmission to be slow hence lowering the network performance. Effect of data rates on each part of the network. Network cabling: Speed of information transmission on cables greatly impacts on the overall network performance. It signals the amount of time data is expected to travel from sender node to receiver node. High data speeds are preferable since they help avert congestion on the network as well as make performance efficient. Therefore, in our design, we shall use high speed network cables such as the fiber optic for optimal network performance. Wireless network communication: In wireless environment, data speeds are higher than in wired networks. This implies that traffic within wireless resource is quite manageable and the overall network performance reliable. Network adapter cards: Data speed in network adapters affect the time in which the adapters prepare data from computer for the network cable. This also influences time incurred in sending data to another computer and the flow of data between the computer and cabling system. High data speeds therefore contribute to faster network adapter card functionality in terms of sending and receiving information.


Strategies to ensure the availability of network access in switched and routed networks.

Identifying all the network requirements Designing a hierarchical network Using routers and multilayer switches that combine routing and switching in the same device

Employing the use of high-speed links Use open short path first protocol which scales well in networked resources Employing load balancing technique.

Hardware and software required to secure linear bus architecture against electronic threats Kudler Fine Foods (KFF) uses Ethernet cabling prone to electronic attacks and needs to be secured from such threats. In the linear bus model, there is need to use hardware that will help boost security such as firewall and routers. Firewalls are like filters which will help KFF monitor data traffic in its network (Reinhold, 1990). This in turn helps detect unusual traffic and filter them off. From the role of firewall, all unnecessary ports will be blocked and only traffic from known ports will be transmitted. Therefore, firewall will monitor incoming requests to prevent known attacks from reaching KFFs server. The firewall will be patched regularly to detect newest types of attacks. Also to be used is a router with a strong administrator password. The router will be placed on the outer-most gate linking to the internet. The router therefore will be blocking unauthorized and undesired traffic between the networks. To complete security enhancement from a hardware point of view, KFF will use switches in their network to ease network administration.



The above hardware components will be used in the linear bus topology in the order of router, firewall and switch from data incoming from the internet as shown below:


Software resources to be used will involve software capable of detecting and eliminating threats as well as those capable of filtering undesired network traffic. For instance, expected threats within KFF network include spoofing, sniffing, information gathering and denial of service attacks among others (Reinhold, 1990). To secure the network from such threats security software on the router can be configured to inspect and encrypt network contents as well as block and control traffic on KFFs network. Network access control and intrusion detection and prevention management system software will help KFF monitor and block attack from within and outside their main network. Through monitoring using intrusion detection software, network administrator at KFF will be able to filter the detected threat, address it and block it. Similarly, the software will help in averting traffic crises such as decongesting data on Ethernet and sequencing encrypted



information for delivery. Backup software will also be used to store important data at automated times. Local Area Networks, Wide Area Networks, Wireless Technologies Local Area Network (LAN) is a data communication medium that is characterized by hosting all sites on the same link. LAN is confined to one location, usually a small area, therefore considered small and discrete. LANs interconnect devices operating within network interface layer where they exchange IP data grams from the internet layer. In a LAN network resources are connected such as work stations and printers (Goleniewski, 2007). LANs services include protocol identification, delimitation, bit level integrity checking and addressing. LAN uses Ethernet and token ring which use cabling technology. Wide Area Networks (WAN) are networks that span a large geographical region with longdistance links interconnected together at various points by nodes which perform routing and switching functions (Goleniewski, 2007). The nodes are responsible for moving frames from one link to another and directing them through interlinked local networks. They are extended LANs that depend on heavy cabling such as use of fiber optic. WANs support both synchronous and asynchronous operations and are divided into point-to-point links and non-broadcast multiple access. Wireless networks on the other hand refer to networks that are not connected with cables. Wireless networks span both local area and wide area networks. In local area, wireless technology uses radio waves to connect devices such as computers to the internet. Unlike wired networks, wireless technology can be accessed from hotspots hence are convenient in terms of mobility and easy to setup, expandable and friendly in terms of cost since they eliminate cabling costs (Goleniewski, 2007).

KFF NETWORK DESIGN Concepts and building blocks of todays data communication networks


Data communications in the present world has been integrated from traditional mechanism of information exchange which was slow and time consuming, to fast, reliable and secure exchange of data using sophisticated mediums. Such include TCP/IP and OSI model frameworks used in all kinds of networks. Both hardware and software have been built to enhance security in authenticity of data and communication channels. Some of the important components of data communication include cables and optic means used to relay data, routers and firewalls used to monitor data traffic on the network and switches used to administrate the network. Network cabling involves use of data cables and connectors that carry electronic signals from one network to another and to network interface cards (Bryan, 2004). Cables include unshielded twisted pair cable, shielded twisted pair cable that are susceptible to radio and electrical interference, coaxial cable that consists of a single copper conductor at its center and is not susceptible to interference. Fiber optic cable consists of a center glass that transmits light signals and is very fast in terms of data transmission. Different protocols in data communication used different cables that transmit data in different speeds. They are as analyzed in the table below: Protocol Ethernet Fast Ethernet Local talk Token ring ATM Cable Coaxial, twisted pair, fiber Fiber, twisted pair Twisted pair Twisted pair Twisted pair, fiber Speed 10MBPS 100MBPS 23MBPS 16MBPS 155-2488 Topology Star, linear bus and tree topologies Star Linear bus Star wired Linear bus, tree and star topologies Other components of data communication include server and host computers, client computers and circuits. Routers, firewalls and switches are used to enhance security in networks



against attacks from within and outside a given network. These security components vary in configuration according to sensitivity and sizes of network.

The KFF integrated network has been developed to meet efficient and reliable communication requirements including security enhancement and information delivery. The designed KFF network has adopted network architecture that defines secure, interpretable infrastructure that provides reliable and open-standard based communication for distribution of information. The architecture also defines technologies required to support communications between various client machines and servers on the network (Chris, 2003). There are established network standards that coordinate secure implementation of network architecture as well as supporting traditional data such as voice and video. The architecture is based on open standards that are industry wide approved and specify how information processing resources convey data and interconnected. The used network architecture components include wire-based using fiber optic and wireless technologies using satellite technology. The network protocols employed include TCP/IP, distributed network protocol and open short path first protocol. Security implementation has been done using a switch and a firewall for all information from and into the KFFs server. Internal security measures include use of routers to monitor and control traffic flow. The overall network design is as shown below:



Time plan for the design of KFFs Network Activity / Time Network identification and problem evaluation Evaluating best communication protocols and communication devices required Week one Week two Week three Week four Week five

KFF NETWORK DESIGN Identifying all network requirements and analyzing security requirements Designing an appropriate network Evaluating the integrated network Design approach and rationale


The integrated network design has been adopted from analysis meant to determine KFFs data and communication requirement. The new design addresses fast, reliable, efficient and secure protocols that ensure delivery of communication from one work station to another and to the server. The integrated design has put into consideration flexibility factor where users can access communication via the KFFs network through wireless hotspots. The design has eliminated use of cables to save on costs and space (Panko, 2011). Based on communication speeds, wireless LANs will offer the desired fast data transfer rates of up to 1522 MBPS which is sufficient for KFF and does not require future expansion. Analysis of the integrated network Security: the integrated KFFs network has tight traffic monitoring and control mechanisms that incorporate filtering, blocking and analysis of data passing through the companys communication channels. A switch has been used to filter content from the internet while a firewall has been adopted to block malicious and unknown content from reaching KFFs server. Routers are used to control and monitor traffic within the wireless LAN.



Backup: There are three backup facilities that oversee information is backed up on a daily basis. This ensures all information is secure from failures resulting from system crush, power surge, fire and theft. The backups are located in different locations in order to avert a situation where the three are susceptible to similar fate. Communication speeds: Wireless communication is used for fast delivery of data packets from one client computer to another and to the server machine (Goleniewski, 2007). The wireless speed is 1522MBPS which eliminates possibilities of traffic accumulation. The new design uses open communication protocols for reliability and effectiveness. Cost: KFFs integrated network design meets friendly cost requirements as use of wireless technologies is affordable. Data requirements A wireless LAN supporting data speeds of up to 1522MBPS and operates on a TCP/IP protocol is extremely fast enough to support any operation undertaken by KFF. Since information is broken down into packets, time required to breakdown and reconstruct the packets are insignificant considering the transmission speeds. There is efficiency is transmission given that communication channels do not breakdown. Another advantage of the integrated design is the ability to tune and adjust bandwidth required at a particular time. The network administrator monitors bandwidth and regulates its usage according to requirements of a given time. Physical and electronic threats The integrated network has addressed physical and electronic threats in a broad scope. However, some threats are hard to totally control such as natural calamities, fire disaster, and system failure, evolution of new undetectable threats such as viruses, wear and tear and obsoleteness of technology. Some are controllable and require thorough monitoring and analysis



such as failure, obsoleteness, viruses and wear. Such will need regular system updating, use of virus and spyware control software and regular servicing (Reinhold, 1990). On the other hand, fire outbreak is a disaster and can be controlled via precautions, monitoring and guarding the KFFs perimeter using surveillance systems and physical guards. In case of a fire outbreak, KFF is equipped with fire fighting equipments and its servers are stationed in fireproof premises. Security measures and policies are in place to ensure that users and employees adhere to protective policies that protect their lives and the companys properties. The policies are elaborate and quite straight to the point (Chris, 2003). Any breeches lead to penalties and prosecution where appropriate. In order to safeguard all resources, adherence to the policies is encouraged and people expected to act responsibly. There are detection systems in place to sense and automatically control the main system such that it shuts down, alerts employees via an alarm system and takes appropriate measures. For instance, fire detection system will detect temperature changes, turn on cooling systems, if it doesnt work it alerts people of possible threat and avails fire fighting equipments. All other detection systems work in a similar manner; they are tuned to trying to solve the situation other than just alerting workers. Surveillance within KFFs perimeter helps to monitor all activities thus can help identify unusual activities hence also help in detecting threats. Punishment for any propagated misconduct towards the KFFs network is documented within the network policy and is not compromised whatsoever. Conclusion



The overall integrated network addresses all KFFs network requirements and recommends shift to the new design. Challenges purported in the integrated design are controllable and manageable.



References Aksoy P. and Laura D. (nd) Information Technology in Theory: Communication protocols Bryan E. (2004) A Professional Guide to Data Communication in a TCP/IP World. ISBN 158053-909-2 Chris C., (2003) Arizona Enterprise Architecture: Guiding Arizona to Ever Improving Citizen Service. Government Information technology Agency Cisco Inc. (2000) Internetwork design Guide: internetworking Design Basics. Retrieved from http://www.cisco.com/univercd/cc/td/doc/cisintwk/idg4/nd2002.htm Goleniewski, L. (2007). Telecommunications essentials: Wireless communication basics (2nd ed.) Boston, MA: Pearson Kang D and John R., (2009) Compartmentalization of Protocols in SCADA communication. International journal of Advanced Science and Technology, Vol. 8. Panko, R. R., & Panko, J. L. (2011). Business data networks and telecommunication (8th ed.) Upper Saddle River, NJ: Prentice Hall Reinhold N., (1990) Network Topology Optimization: The Art and Science of Network Design ISBN -10:0442238193 Sekar K., and Dey S. (2008) Dynamically Configurable Bus Topologies for High-Performance on-chip communication. Volume 16 issue 10.