introduction to network management emily hegge...

12
Introduction to Network Management Emily Hegge CTU Online IT245-1201A-03: Introduction to Network Management Cheryl Garvin 1/16/2012

Upload: nguyenthuan

Post on 28-Mar-2018

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Introduction to Network Management Emily Hegge …brkada.com/graphics/works/networking.pdfIntroduction to Network Management Emily Hegge CTU Online ...  Samiullah, . …

Introduction to Network Management

Emily Hegge

CTU Online

IT245-1201A-03: Introduction to Network Management

Cheryl Garvin

1/16/2012

Page 2: Introduction to Network Management Emily Hegge …brkada.com/graphics/works/networking.pdfIntroduction to Network Management Emily Hegge CTU Online ...  Samiullah, . …

Table of Contents Target Organization ...................................................................................................................................... 3

Network Architecture ................................................................................................................................... 4

Network Model ............................................................................................................................................. 7

Network Security .......................................................................................................................................... 9

Network Protocols ...................................................................................................................................... 10

Network Management ................................................................................................................................ 11

References .................................................................................................................................................. 12

Page 3: Introduction to Network Management Emily Hegge …brkada.com/graphics/works/networking.pdfIntroduction to Network Management Emily Hegge CTU Online ...  Samiullah, . …

Target Organization

Bumpin N’ Grindin Auto is a car dealership with a mechanic shop as well. The dealership

sells and buys cars. The mechanic shop inspects used cars and fixes them before they go on the

lot for sell. The mechanic shop also does work on cars that customers have purchased due to the

businesses warranty policy. The dealership has two locations as well as online sales. The main

location is in Sioux Falls SD and a smaller branch located in Mitchell SD. The type of data

transmitted between the two locations includes employee hours and commissions, sales, and

inventory. The main office handles all of the financials such as employees pay checks. There is

an online site also available for sells of cars to help expand the potential buyers without having

to relocate. Plus in a smaller community it makes it easier for people in the surrounding towns to

see what’s available without having to drive all the way to the dealership which might potentially

keep more customers from coming in.

The main store in Sioux Falls consists of 8 Employees. There is the main boss who is

also the owner and he sells cars, three more employees who sell cars, three mechanics, and one

secretary. The Mitchell location has 6 employees which consist of the boss who also sells cars,

two more employees who sell cars, two mechanics, and a secretary. Overall between the two

locations there are a total of 14 employees. The dealership also has 11 computers. The computers

are delegated one to each boss, one for each employee who sells cars, one for each secretary, and

one for each mechanic shop. There are also four printers one for each mechanic shop and one for

each dealership.

Page 4: Introduction to Network Management Emily Hegge …brkada.com/graphics/works/networking.pdfIntroduction to Network Management Emily Hegge CTU Online ...  Samiullah, . …

Network Architecture

The network architecture at Bumpin N’ Grindin Auto is mostly a wireless network. The

network consists of a router which is 802.11n compliant. The router is connected to the internet

through a wire and a server which is connected to the router through and ethernet cable. The rest

of the office is set up wirelessly. Between the two offices there are a total of 11 workstations all

set up wirelessly using network adaptors or NICs which are installed to the motherboard. There

are also a total of four printers between the two buildings which are also wireless. There are two

printers in each location one for the main office and one for the mechanics. The routers use three

antenas which allows for MIMO (multiple input/multiple output) so that more than one user can

send data at the same time unlike older versions.

Page 5: Introduction to Network Management Emily Hegge …brkada.com/graphics/works/networking.pdfIntroduction to Network Management Emily Hegge CTU Online ...  Samiullah, . …
Page 6: Introduction to Network Management Emily Hegge …brkada.com/graphics/works/networking.pdfIntroduction to Network Management Emily Hegge CTU Online ...  Samiullah, . …
Page 7: Introduction to Network Management Emily Hegge …brkada.com/graphics/works/networking.pdfIntroduction to Network Management Emily Hegge CTU Online ...  Samiullah, . …

Network Model

The network uses the TCP/IP model. The TCP/IP model has four layers to it. These

layers consist of application, transport, internet, and network access. Each layer has its own

functions and protocols and interacts with different hardware and software. Also because this

network is wireless a routable protocol is needed for transmission of data.

Application layer: This is the layer that the users interact with. This layer chooses what

protocols to use and starts building the packet. At this layer encryption and compression also

takes place. The hardware this layer uses is the computer. Protocols for this layer would be

Telnet, FTP, TFTP, HTTP, SMTP, DHCP, DNS, RIP, SNMP, and NFS. FTP or File Transfer

Protocol would be used to send information such as employee payroll from the Mitchell store to

the Sioux Falls store also telnet maybe uses to send this information to the Sioux Falls stores

server. HTTP could be used to look at the stores online site and to show customers cars that they

may have at the other store. Simple Mail Transfer Protocol (SMTP) would be used to send

emails between the bosses or employees to keep everyone informed of any changes and company

info.

Transport layer: The transport layer opens the lines of communications while adding

more specified information such as port number and checking for errors. The two protocols are

TCP and UDP. TCP makes sure that the lines of communication are open before sending data

and requires an acknowledgment of receipt and if it does not receive one it resends the data. UDP

assumes the data will arrive safely while it is faster it is also unreliable. TCP would be used

when saving data such as sales to the server to insure the lines are clear and that the server

receives the data.

Internet layer: Adds information such as the IP address and what IP version is being used.

Also determines the time to live meaning how many routers it may bounce through before being

Page 8: Introduction to Network Management Emily Hegge …brkada.com/graphics/works/networking.pdfIntroduction to Network Management Emily Hegge CTU Online ...  Samiullah, . …

discarded. The hardware used at this layer would be a router. Protocols for this layer include IP,

ICMP, IGMP, ARP, RIP, OSPF, EIGRP, and BRG. All data flows through IP and IP is used by

all the protocols in all layers. When sending an email IP adds the IP address for the receiver and

the sender if there is a problem ICMP or Internet Control Message Protocol gives a message that

there was an error and the data was not sent.

Network layer: At this layer the mac address for the computers is added then the data is

sent out over the wire. The hardware for this layer would be the NIC or network interface card

and if the company were to expand a network access point may be added which would also be

used by this layer.

Page 9: Introduction to Network Management Emily Hegge …brkada.com/graphics/works/networking.pdfIntroduction to Network Management Emily Hegge CTU Online ...  Samiullah, . …

Network Security

Page 10: Introduction to Network Management Emily Hegge …brkada.com/graphics/works/networking.pdfIntroduction to Network Management Emily Hegge CTU Online ...  Samiullah, . …

Network Protocols

. FTP or File Transfer Protocol would be used to send information such as employee payroll

from the Mitchell store to the Sioux Falls store also telnet maybe uses to send this information to

the Sioux Falls stores server. DHCP or Dynamic Host Configuration Protocol would be used to

allow access to the internet. This would be needed to check the sales of the online website as

well as HTTP. HTTP could also be used to look at the stores online site and to show customers

cars that they may have at the other store. Simple Mail Transfer Protocol (SMTP) would be used

to send emails between the bosses or employees to keep everyone informed of any changes and

company info. TCP would be used when saving data such as sales to the server to insure the lines

are clear and that the server receives the data. All data flows through IP and IP is used by all the

protocols in all layers. When sending an email IP adds the IP address for the receiver and the

sender if there is a problem ICMP or Internet Control Message Protocol gives a message that

there was an error and the data was not sent.

Page 11: Introduction to Network Management Emily Hegge …brkada.com/graphics/works/networking.pdfIntroduction to Network Management Emily Hegge CTU Online ...  Samiullah, . …

Network Management

The active directory is set up with a functional domain. These functions are split up by

the secretary’s, bosses, car salesmen, and mechanics. Each functional domain also has differing

security levels. The bosses have full access; secretaries have medium access and car salesmen as

well as mechanics have lower access. A third party company handles the updating of software,

hardware and checks on security. The network is also set up to alert the bosses if there are any

security concerns so that they may contact the third party to come in and check it out. All

employees are trained in some security problems. They are taught not to download suspicious

files or open suspicious emails. Also all trash is shredded when possible and garbage bins are

kept in a locked area to keep out dumpster divers. Special software is used to secure emails. This

software encrypts the emails allowing only those with the key to have access to them. If not

opened within a certain time frame the emails are then terminated. All purchases made online are

kept secure through using paypal. Files that are sent over the network are also protected through

the use of Kerberos which requires that there be a key in order to unencrypt and access the files.

Page 12: Introduction to Network Management Emily Hegge …brkada.com/graphics/works/networking.pdfIntroduction to Network Management Emily Hegge CTU Online ...  Samiullah, . …

References

Advantages and Disadvantages of WLANs. (n.d.). Retrieved January 23, 2012, from

http://www.wireless-center.net/Wi-Fi-Security/Advantages-and-Disadvantages-of-

WLANs.html

Comparison between TCP/IP and OSI. (n.d.). In mniSecu.com. Retrieved January 29,

2012, from http://www.omnisecu.com/tcpip/tcpip-model.htm

Getting to Know the OSI Model for the CCNA Exam. (n.d.). In Dummies.Com. Retrieved

January 29, 2012, from http://www.dummies.com/how-to/content/getting-to-know-the-osi-

model-for-the-ccna-exam.html

Kozierok, C. M. (2005, September 20). TCP/IP Architecture and the TCP/IP Model. In

The TCP/IP Guide. Retrieved January 29, 2012, from

http://www.tcpipguide.com/free/t_TCPIPArchitectureandtheTCPIPModel-2.htm

Mitchell, B. (n.d.). How Can I Get 300 Mbps Speed on My 802.11n Network?. In

About.Com. Retrieved January 23, 2012, from

http://compnetworking.about.com/od/wireless/f/80211n-300-mbps.htm

Mitchell, B. (n.d.). What is Wireless Computer Networking?. In About.Com. Retrieved

January 23, 2012, from http://compnetworking.about.com/cs/wireless/f/whatiswireless.htm

Mitchell, B. (n.d.). Wireless Product Equipment - Network Routers, Access Points,

Adapters and More . In About.Com. Retrieved January 23, 2012, from

http://compnetworking.about.com/od/wireless/ss/wirelessgear.htm

Samiullah, . (2009, April 14). Difference between OSI model and TCP/IP model. In

Scribd. Retrieved January 29, 2012, from http://www.scribd.com/doc/14206202/Difference-

Between-OSI-and-TCPIP-Models

Tyson, J. (n.d.). How OSI Works. In howstuffworks. Retrieved January 29, 2012, from

http://computer.howstuffworks.com/osi1.htm