introduction to network management emily hegge...
TRANSCRIPT
Introduction to Network Management
Emily Hegge
CTU Online
IT245-1201A-03: Introduction to Network Management
Cheryl Garvin
1/16/2012
Table of Contents Target Organization ...................................................................................................................................... 3
Network Architecture ................................................................................................................................... 4
Network Model ............................................................................................................................................. 7
Network Security .......................................................................................................................................... 9
Network Protocols ...................................................................................................................................... 10
Network Management ................................................................................................................................ 11
References .................................................................................................................................................. 12
Target Organization
Bumpin N’ Grindin Auto is a car dealership with a mechanic shop as well. The dealership
sells and buys cars. The mechanic shop inspects used cars and fixes them before they go on the
lot for sell. The mechanic shop also does work on cars that customers have purchased due to the
businesses warranty policy. The dealership has two locations as well as online sales. The main
location is in Sioux Falls SD and a smaller branch located in Mitchell SD. The type of data
transmitted between the two locations includes employee hours and commissions, sales, and
inventory. The main office handles all of the financials such as employees pay checks. There is
an online site also available for sells of cars to help expand the potential buyers without having
to relocate. Plus in a smaller community it makes it easier for people in the surrounding towns to
see what’s available without having to drive all the way to the dealership which might potentially
keep more customers from coming in.
The main store in Sioux Falls consists of 8 Employees. There is the main boss who is
also the owner and he sells cars, three more employees who sell cars, three mechanics, and one
secretary. The Mitchell location has 6 employees which consist of the boss who also sells cars,
two more employees who sell cars, two mechanics, and a secretary. Overall between the two
locations there are a total of 14 employees. The dealership also has 11 computers. The computers
are delegated one to each boss, one for each employee who sells cars, one for each secretary, and
one for each mechanic shop. There are also four printers one for each mechanic shop and one for
each dealership.
Network Architecture
The network architecture at Bumpin N’ Grindin Auto is mostly a wireless network. The
network consists of a router which is 802.11n compliant. The router is connected to the internet
through a wire and a server which is connected to the router through and ethernet cable. The rest
of the office is set up wirelessly. Between the two offices there are a total of 11 workstations all
set up wirelessly using network adaptors or NICs which are installed to the motherboard. There
are also a total of four printers between the two buildings which are also wireless. There are two
printers in each location one for the main office and one for the mechanics. The routers use three
antenas which allows for MIMO (multiple input/multiple output) so that more than one user can
send data at the same time unlike older versions.
Network Model
The network uses the TCP/IP model. The TCP/IP model has four layers to it. These
layers consist of application, transport, internet, and network access. Each layer has its own
functions and protocols and interacts with different hardware and software. Also because this
network is wireless a routable protocol is needed for transmission of data.
Application layer: This is the layer that the users interact with. This layer chooses what
protocols to use and starts building the packet. At this layer encryption and compression also
takes place. The hardware this layer uses is the computer. Protocols for this layer would be
Telnet, FTP, TFTP, HTTP, SMTP, DHCP, DNS, RIP, SNMP, and NFS. FTP or File Transfer
Protocol would be used to send information such as employee payroll from the Mitchell store to
the Sioux Falls store also telnet maybe uses to send this information to the Sioux Falls stores
server. HTTP could be used to look at the stores online site and to show customers cars that they
may have at the other store. Simple Mail Transfer Protocol (SMTP) would be used to send
emails between the bosses or employees to keep everyone informed of any changes and company
info.
Transport layer: The transport layer opens the lines of communications while adding
more specified information such as port number and checking for errors. The two protocols are
TCP and UDP. TCP makes sure that the lines of communication are open before sending data
and requires an acknowledgment of receipt and if it does not receive one it resends the data. UDP
assumes the data will arrive safely while it is faster it is also unreliable. TCP would be used
when saving data such as sales to the server to insure the lines are clear and that the server
receives the data.
Internet layer: Adds information such as the IP address and what IP version is being used.
Also determines the time to live meaning how many routers it may bounce through before being
discarded. The hardware used at this layer would be a router. Protocols for this layer include IP,
ICMP, IGMP, ARP, RIP, OSPF, EIGRP, and BRG. All data flows through IP and IP is used by
all the protocols in all layers. When sending an email IP adds the IP address for the receiver and
the sender if there is a problem ICMP or Internet Control Message Protocol gives a message that
there was an error and the data was not sent.
Network layer: At this layer the mac address for the computers is added then the data is
sent out over the wire. The hardware for this layer would be the NIC or network interface card
and if the company were to expand a network access point may be added which would also be
used by this layer.
Network Security
Network Protocols
. FTP or File Transfer Protocol would be used to send information such as employee payroll
from the Mitchell store to the Sioux Falls store also telnet maybe uses to send this information to
the Sioux Falls stores server. DHCP or Dynamic Host Configuration Protocol would be used to
allow access to the internet. This would be needed to check the sales of the online website as
well as HTTP. HTTP could also be used to look at the stores online site and to show customers
cars that they may have at the other store. Simple Mail Transfer Protocol (SMTP) would be used
to send emails between the bosses or employees to keep everyone informed of any changes and
company info. TCP would be used when saving data such as sales to the server to insure the lines
are clear and that the server receives the data. All data flows through IP and IP is used by all the
protocols in all layers. When sending an email IP adds the IP address for the receiver and the
sender if there is a problem ICMP or Internet Control Message Protocol gives a message that
there was an error and the data was not sent.
Network Management
The active directory is set up with a functional domain. These functions are split up by
the secretary’s, bosses, car salesmen, and mechanics. Each functional domain also has differing
security levels. The bosses have full access; secretaries have medium access and car salesmen as
well as mechanics have lower access. A third party company handles the updating of software,
hardware and checks on security. The network is also set up to alert the bosses if there are any
security concerns so that they may contact the third party to come in and check it out. All
employees are trained in some security problems. They are taught not to download suspicious
files or open suspicious emails. Also all trash is shredded when possible and garbage bins are
kept in a locked area to keep out dumpster divers. Special software is used to secure emails. This
software encrypts the emails allowing only those with the key to have access to them. If not
opened within a certain time frame the emails are then terminated. All purchases made online are
kept secure through using paypal. Files that are sent over the network are also protected through
the use of Kerberos which requires that there be a key in order to unencrypt and access the files.
References
Advantages and Disadvantages of WLANs. (n.d.). Retrieved January 23, 2012, from
http://www.wireless-center.net/Wi-Fi-Security/Advantages-and-Disadvantages-of-
WLANs.html
Comparison between TCP/IP and OSI. (n.d.). In mniSecu.com. Retrieved January 29,
2012, from http://www.omnisecu.com/tcpip/tcpip-model.htm
Getting to Know the OSI Model for the CCNA Exam. (n.d.). In Dummies.Com. Retrieved
January 29, 2012, from http://www.dummies.com/how-to/content/getting-to-know-the-osi-
model-for-the-ccna-exam.html
Kozierok, C. M. (2005, September 20). TCP/IP Architecture and the TCP/IP Model. In
The TCP/IP Guide. Retrieved January 29, 2012, from
http://www.tcpipguide.com/free/t_TCPIPArchitectureandtheTCPIPModel-2.htm
Mitchell, B. (n.d.). How Can I Get 300 Mbps Speed on My 802.11n Network?. In
About.Com. Retrieved January 23, 2012, from
http://compnetworking.about.com/od/wireless/f/80211n-300-mbps.htm
Mitchell, B. (n.d.). What is Wireless Computer Networking?. In About.Com. Retrieved
January 23, 2012, from http://compnetworking.about.com/cs/wireless/f/whatiswireless.htm
Mitchell, B. (n.d.). Wireless Product Equipment - Network Routers, Access Points,
Adapters and More . In About.Com. Retrieved January 23, 2012, from
http://compnetworking.about.com/od/wireless/ss/wirelessgear.htm
Samiullah, . (2009, April 14). Difference between OSI model and TCP/IP model. In
Scribd. Retrieved January 29, 2012, from http://www.scribd.com/doc/14206202/Difference-
Between-OSI-and-TCPIP-Models
Tyson, J. (n.d.). How OSI Works. In howstuffworks. Retrieved January 29, 2012, from
http://computer.howstuffworks.com/osi1.htm