New Network Infrastructure For ICT Company Information Technology Essay

Published: November 30, 2015 Words: 2022

Introduction

ICT Resources Malaysia Public Limited Company is the supplier of business equipment and office supplies of its kind in South East. The company owns a 3storey building and currently has already grown to a level where they now have resources of 40 staff and this figure is still growing. They have developed and spread their business to 3 strategic locations throughout South East Asia with more upcoming offices in other locations planned for 2011. These new offices will incorporate the retail concept coupled with local sales offices.

As a consultant, this report is introducing the new network infrastructure for ICT Company to reduce the cost and increase the efficiency, based that to increase competitiveness.

Assumption

LCT Company is consisting of 6 departments which are

Human Resource Department,

Accounting Department,

Marketing Department,

Customer Support Department,

Sales Department

IT Department.

Totally there are about 40 persons within the managers, secretaries, and receptionists.

Before the owner investments into the business, the current network used a bus topology within the office and poor equipment for the employees.

Problem Identification

At present, ICT Company is going to build the network infrastructure and the current equipments are in a terrible situation that cannot private a good working environment for employees although the number of employees is expecting to grow.

There are 4 main problems should be expected with the network:

Insecurity Network

Ineffective network control

Inefficient file sharing and collaboration

Low productivity

Weak Network Security

Computer virus

Computer viruses are very common on computers; Viruses chances computer configuration and spread to other computers by infecting files on a file system or a network file system that is accessed by other computers. Virus becomes very performance and security prone.

Network Security

If there is no firewall installed, it will be allow any computers to be able to connect to the network, a number of hubs are connect between computers, it is not easy to detect if anything anomalous.

Ineffective network control

Computer and network control

The employees will get so much freedom if there is no restriction; control the computers and network to prevent employees spend their time on personal use or searching Internet instead of working by company's computers.

Inefficient file sharing and collaboration

Inefficient file sharing and remote access

File sharing usage is low, and employees can only use pen drives and emails to share; It must has a file sharing between different sites within the company.

Low productivity

Limited equipments cannot satisfy the job requirement

It has not enough equipment to private help, such printers, faxes, projectors and multi-function devices

Internal mail service

The employees need to have more customizable controls on the email service.

Wireless connection

It should be has a support for wireless connection at the moment, If there is anything needs, it is necessary to have a wireless connection for employees and clients.

Proposed Solutions

The proposed solution consists of advantages and disadvantages of having a network, transmission media selection, peer-to-peer network or a client/server network, and type of network topology, etc. It also includes some important parts to make a better network.

Advantages of having a network

In an organization, each employee uses a computer in the office, if a company has more than twenty employees in each department, it will also have more than twenty computers, you can do a number of things that cannot be done without a network connection, someone can connect to host computers for things like email, news, library searches, it also can access other Internet service connecting to computers at other institutions if authorized. Image one employee uses his computer A to make a document file, he cannot without using a pen drive to get his work if he changes his computer A to computer B. It wasn't long ago that each machine required its own additional peripherals such as printers. With a network environment it can be afford to purchase a higher quality single unit and share it among the other computers in the network.

Hence having a network is not only important to share internet connection, share files, and also important to manage user accounts, implement security policy, and improve the efficiency of the employees and better utilize IT resources.

Disadvantages of having a network

Firstly, it needs more invest in the equipment, services and software, and it need to hire the professional to setup, maintain, fix, and manage the network.

Secondly the employees need more skills to use the network; sometime it may run the risk of affecting the efficiency of the existing business operation.

Meanwhile having a network means that it is more subjected to attack and run the risk of confidential files being stolen, such as network faults could lead to loss of resources and cause loss of data.

VPN

VPN is a network technology uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.VPN provides the organization with the same capabilities, but at a much lower cost. It uses some form of encryption and have strong user authentication. Essentially a VPN is a form of WAN.

VLAN

Virtual LAN (VLAN) is used in ICTR. VLAN can regardless of their physical location; segregate a network into smaller individual networks with individual broadcast domains. A VLAN allows for hosts to be grouped together even if they are not located on the same network switch. By utilizing VLAN, ICTR can be able to have more control for the network; for example, the administrator can set VLAN 1 for the marketing department, VLAN 3 for HR department, and VLAN 3 for accounting department and so on.

Client/server network

Peer-to-peer network

Peer-to-peer network is appropriate for very small businesses use. It can support about ten clients before it is subjected to some serious performance and management problems.

Client/server network

Different with Peer-to-peer, client/server can control what a user can do on the computer, what files the users can accessed in the network, once it has been accessed, users may access only those resources that the network administrator allows them to access.

This is the reason why client/server is more suitable than peer-to-peer for the network. Client/server privates more security network, easy to managed network and improve the efficiency of the network.

Network topology

ICT Company utilizes star topology. Each device has a dedicated point-to-point link only to a central controller by switches, star is easy to install and reconfigure, less cabling needs to be addition, moves, and deletion involve only one connection between the devices and switch, and it has no disruptions to the network when connecting or removing devices. Star is more robustness, if one link fails, only that link is affected.

Transmission media

For transmission media, the coaxial cable is recommended. Coaxial cable is an electrical cable with an inner conductor surrounded by a flexible, tubular insulating layer, surrounded by a tubular conducting shield. It is recommended because coaxial cable can be run with fewer boosts from repeaters for longer distances between network nodes than either STP or UTP cable. Repeaters regenerate the signals in a network so that they can cover longer distances than twisted-pair cable, it is also less expensive than fiber-optic cable, it has been used for many years for all types of data communication, and this technology is well known.

Hubs and Switches

Uses hubs to connect computers increases the security risks of network spoofing, it also immensely compromise the performance of the network by having too many half duplex and grouping too many hosts into the same collision domains.

The solution is to replace the hubs by switches, by using switches, it separates the collision domains, let the network run on full duplex instead of half duplex, so that improves the performance of the network, and at the same time improve the security of the network.

VLAN Tagging (IEEE 802.1Q)

IEEE 802.1Q defines the meaning of a virtual LAN (VLAN) with respect to the specific conceptual model underpinning bridging at the Media Access Control layer and to the IEEE 802.1D spanning tree protocol. This protocol allows nodes on different VLANs to communicate with one another through a network switch with Network Layer capabilities, or a router.

DHCP service

The reason to use Dynamic Host Configuration Protocol (DHCP) server is it is easy to manage. DHCP is a computer networking protocol used by hosts to retrieve IP address assignments and other configuration information such as DNS IP address. A device can have a different IP address every time it connects to the network.

DHCP can be manual and dynamic. IP is assigned by the system administrator DHCP delivers the assigned IP address to the client when it is manually. Automatic is DHCP assigns permanent IP address to a client.

Mail Server

The ICT Company will install a mail server; the mail server can be handle all incoming and outgoing emails pass through the network. As from the security point of view, setting up an internal mail service will help to keep company's emails inside the company, reduce the risk of information leaks.

Firewall server

The introduction of a firewall server is crucial for improving the company's network security to provide better network filtering and control.

A Firewall can be used in both software and hardware. The firewall will examine the secure when each message enters or leaves the intranet.

Some of the firewall techniques are recommended to be used are:

Packet filter: Packet filtering examines each packet pass through the network and accepts or blocks it based on user-defined rules.

Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established.

Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers.

Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

With proper configuration, the firewall server is expected to help to reduce the chance of computer viruses, filter unwanted websites, and control what kind of internet services can be used in the company.

FTP server

In order to improve the efficiency of file sharing across the company, FTP server is recommended.

File Transfer Protocol (FTP) is a standard networking protocol for copying files from one host to another over a TCP/IP-based network, such as the Internet. FTP is built on client-server architecture. FTP allows anonymous user access, but it also can be used in conjunction with the Active Directory authentication to increase security for uploading and download files.

With the FTP server, ICTR will be able to create central repositories for file sharing across the company regardless the location; it provides good security and more options for file sharing.

Summary

To tackle the existing problems, the according solutions are:

Weak Network Security

VPN, VLAN, Firewall.

Ineffective network control

VLAN, DHCP, VLAN Tagging

Inefficient file sharing and collaboration

FTP; VLAN Tagging

Technology stagnant slows down productivity

Wireless Access Point, Mail server,

Implementation Plan

In this section, more detailed implementation of the solution will be explained.

Network topology

In the network topology Server room, Managers and secretaries, Receptionists, and Each of the 6 departments have its own VLAN:

Name:

VLAN

IP

Server Room

100

192.168.1.1

Managers and secretaries

200

192.168.2.1/24

HR Department

300

192.168.3.1/24

Accounting Department

400

192.168.4.1/24

Marketing Department

500

192.168.5.1/24

Support Department

600

192.168.6.1/24

Sales Department

700

192.168.7.1/24

IT Department.

800

192.168.8.1/24

Receptionists

1000

192.168.10.1/24

Equipment

Name

Quantity

Office computer

40

Audio device

40

Microphones

40

LCD projectors

4

Printer

10

Multi-function device

6

Floor plan

1st floor

2nd floor

3rd floor

Limitation

One of the things will not change over this network overhaul is the Internet speed, as it mainly depends on the connection with the ISP.

As the complexity of the system increases, it requires more skilful administrator to maintain the system, such as the Active Directory. Also in order to maintain competitive advantages, organization is suggested to periodic review on their system on regular basis.

For more granule control over network security hardware firewall should be considered, for example, the new hardware firewall from Cisco can provide packet filter at a very low level, so that it can block bit torrent and other specific network data.