IT 640 SNHU Computer Science Current Network Architecture Analysis

User Generated

pneby99711987

Computer Science

IT 640

Southern New Hampshire University

IT

Description

Unformatted Attachment Preview

IT 640 Milestone Two Guidelines and Rubric Current Network Architecture Overview: Network architecture refers to the layout of the network, consisting of the hardware, software, connectivity, communication protocols, and mode of transmission such as wired or wireless. For the second milestone, you will provide a high-level overview of the SNHUEnergy Inc. network architecture. You will evaluate traffic patterns to determine critical aspects of your business and provide basic insight into what should be done to the network from a capability aspect as well as a security viewpoint. Finally, you will develop a visual representation of an end-to-end path flow of the existing network by creating a Visio diagram showing the output of the traffic flows. Prompt: In this section, you will analyze the information provided on SNHUEnergy Inc. in the Final Project Scenario document to provide a high-level assumption for the design of the network. To complete this assignment, you must address the following critical elements:       Based on what you know from the scenario, explain the types of physical network devices used in connecting all devices across the organization. Identify the critical traffic patterns currently used by the organization, supported by examples. Use the Traffic Flow Wireshark Capture document to guide your response. o Service (Voice over Internet Protocol [VoIP]) o Application (Structured Query Language [SQL]) o Network management o Other opportunities not specified above Describe the traffic patterns that the organization’s critical applications take across the infrastructure from office to office. Remember, the organization’s critical applications were specified in the scenario. Describe the potential performance issues that may occur within the current network if no changes are made to support the organization’s expansion. Provide examples to support your response. Describe the potential security issues that may occur within the current network if no changes are made to support the organization’s expansion. Provide examples to support your response. Develop a visual representation of an end-to-end path flow of the existing network by creating a Visio diagram showing the output of the traffic flows. Use the provided Logical Network Design Example file as a guide for creating your diagram, and include your diagram with your submission. Rubric Guidelines for Submission: Review each critical element and designate a bold subheading for each element followed by your review of the current network architecture. Include an introduction for this assignment that aligns with your analysis from the first milestone. Make sure your submission aligns with the current APA standards. Upload your Visio diagram as a separate file to complete this milestone. Critical Elements Physical Network Devices Critical Traffic Patterns Proficient (100%) Explains the types of physical network devices used in connecting all devices across the organization Identifies the critical traffic patterns currently used by the organization, supported by examples Patterns Across the Infrastructure Describes the traffic patterns that the critical applications take across the infrastructure from office to office Performance Issues Describes the potential performance issues that may occur within the current network if no changes are made to support the organization’s expansion and provides examples to support response Security Issues Describes the potential security issues that may occur within the current network if no changes are made to support the organization’s expansion and provides examples to support response Visual Representation Develops a visual representation of an endto-end path flow of the existing network by creating a Visio diagram showing the output of the traffic flows Needs Improvement (70%) Explains the types of physical network devices used in connecting all devices across the organization, but response is cursory or contains inaccuracies Identifies the critical traffic patterns currently used by the organization but does not provide examples, or examples provided are inappropriate, or response contains inaccuracies Describes the traffic patterns that the critical applications take across the infrastructure from office to office, but description is cursory or illogical or contains inaccuracies Describes the potential performance issues that may occur within the current network if no changes are made to support the organization’s expansion but does not provide examples, or examples provided are inappropriate, or description is illogical or contains inaccuracies Describes the potential security issues that may occur within the current network if no changes are made to support the organization’s expansion but does not provide examples, or examples provided are inappropriate, or description is illogical or contains inaccuracies Develops a visual representation of an endto-end path flow of the existing network by creating a Visio diagram showing the output of the traffic flows, but diagram is illogical or contains inaccuracies Not Evident (0%) Does not explain the types of physical network devices used in connecting all devices across the organization Value 15 Does not identify the critical traffic patterns currently used by the organization 15 Does not describe the traffic patterns that the critical applications take across the infrastructure from office to office 15 Does not describe the potential performance issues that may occur within the current network if no changes are made to support the organization’s expansion 15 Does not describe the potential security issues that may occur within the current network if no changes are made to support the organization’s expansion 15 Does not develop a visual representation of an end-to-end path flow of the existing network 25 Total 100% IT 640 Final Project Scenario Imagine that you are a newly hired network consultant for SNHUEnergy Inc., a quickly growing oil and gas company that has decided to expand its operation and begin developing a more efficient approach to its use of the currently available technology. As a consultant for the company, you will evaluate the current network architecture, determine any key changes that should occur, and recommend a highlevel design for future growth. The leadership team within the company has made a major commitment to the board of directors that they will begin an initiative to create a communication architecture that will allow the company to grow for the next ten years. You have been assigned the task of addressing the overall framework for the architecture and evaluating the basic structure of the network, its communication paths, and the type of traffic utilized. You will also begin to develop a basic security plan in an effort to mitigate any risk the company currently has to internal and external factors. SNHUEnergy Inc. is a medium-sized oil and gas company that is focused on the discovery and drilling of oil-based products. It wants to grow from company solely focused on exploration into a company that also provides the transportation and refinement of its discoveries. This is a big step for the company, and it wants to make sure the communication infrastructure is ready to deliver in the next 12 to 18 months. The company is currently headquartered in Dallas, Texas, and operates small facilities in the central United States. The total employee count is 120 across the organization, but this will grow by 50% each year for the next two years. Initially, you will evaluate the current logical and physical design of the network to determine the network connectivity, the traffic patterns of the organization, and what would need to occur to enable the business to grow. The network infrastructure consists of a single building with multiple floors and different divisions (human resources, IT, accounting, and operations and payroll). The company will develop a plan to expand to three additional regional offices in Kansas City and Houston. You will be asked to take the initial design and determine what traffic will need to communicate at each office and which security parameters will need to exist as the company grows. This work will consist of understanding the connectivity and traffic traversing internally and externally and developing a plan to enable end-users to access the correct communication to the key critical applications (i.e., human resources, email, and Voice over Internet Protocol [VoIP]) across the company. The infrastructure consists of network routers, switches, and firewall equipment that currently connect all the users to the internet internally and externally. All the connectivity between the users is Transmission Control Protocol/Internet Protocol (TCP/IP) traffic, which is utilized by data, voice, and video applications across the organization. In the future, the company will extend these services across the wide area network (WAN) by using TCP/IP communication processes.
Purchase answer to see full attachment
Explanation & Answer:
3 pages
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: MILESTONE- CURRENT NETWORK ARCHITECTURE

Name
Milestone Two – Network Architecture
Course
Instructor
Date

1

MILESTONE- CURRENT NETWORK ARCHITECTURE

2

Physical Network Devices
One can define the physical network devices as the devices that assist in facilitating the
interaction and communication amid devices on the network of computers. Certain numerous
physical devices on the SNHUenergy Inc., used for connecting devices across the organization
include the VOIP, the servers, the wireless access point (WAP), the router, the devices for
firewalls, and the Switches. These devices allow the connection across the organization for
communicating and performing the business operations’ functions.
Critical Traffic Patterns
The captured data bits/frame and database access demands are basically included in the
data that flows over the network. With the help of the chart, frame 2283 with 1728 bits (216
bytes) can be identified on wire showing that 1728 bits (216 bytes) of information is captured for
every second of transferring of communication via the IP/TCP/FTP. For the communication
traffic, the destination port number for User diagram protocol (UDP) is 65534, along with 52220
as the number for the source port. From the traffic patterns, it can be clearly deduced that most
exchange of communication occurs with the help of the SSH, RTP, TCP and MYSQL network
traditions.
The following assumptions can be made with the help of the traffic pattern from the
capture of Wireshark traffic flow:
a.) Service: For transmitting and receiving data with the help of RTP, configurations for
VOIP se...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Content
Related Tags