Wednesday , November 20 2019
Home / Research Papers / IT/Technology / Network Proposal Example For Western Count Bank

Network Proposal Example For Western Count Bank

Advanced Networking Proposal and Network Diagrams – Proposal

 Table of Contents

  • Executive Summary ———————————————————————-
  • Project Plan ——————————————————————————-
  • Components/Network Configurations——————————————————–
  • Network Operating System ——————————————————————–
  • Data Communication Media ——————————————————————-
  • Common Carriers and Service Usage ———————————————————
  • Hardware Needs ——————————————————————————–
  • IT Policy ——————————————————————————————
  • Network Diagram ——————————————————————————-
  • Budget ————————————————————————————-
  • References ———————————————————————————

1) Executive Summary

The Western Count Bank is exponentially growing in size on a Daily basis. However, the bank equipment with old computers approximately five years old has presented problems with the active employees. Moreover, customers and employees have been uncomfortable with some of services offered by bank such as unwitting breakdowns in their systems, lack of support to online banking, and lack of support to mobility. An unreliable networking scheme has attributed to the comprehensive reliance of personal connection between computers for sharing of the ink jet printer. The Western County Bank also only has two routers, one for connection to the Wide Area Network and another for internet connection. This has led to inconveniences in company operations as attributed recently when the routers were under maintenance hence denying the employees access the internet. Owing to this problem, the bank intends to refurbish the networking scheme by introducing redundant connections between the wide area network and the internet connections to avoid occurrence of such problems in future. It also intends to keep its ARIN-assigned (American Registry for Internet Numbers) public Internet Protocol (IP) block and use two internet service providers to ensure network connection reliability. Another problem faced by the bank is that the network routers not only breakdown, but also have problems with minimal filtering in the OSI layers 2-4 of the network. This has prompted the bank to implement security products that can filter OSI layers and ensure that the seven layers of the OSI remain protected from common network attacks. The bank also intends to have a datacenter that has client’s information and applications that every employee can easily access. The Bank also intends to incorporate measures that will ensure that Employees can easily share laser printers and that the datacenter has enough storage capacity for both the current and future operations of the company. The purchased multiprotocol storage area network (SAN) arrays will provide this service.

The Western County Bank intends to implement a simple guest wireless access point in their main office protected through simple pre-shared key authentication and provides internet access in the headquarters database to any interfacing apps. Moreover, each employee will possess a company email, which employees may use for financial purposes accessible by outside systems and networks through an internet connection. In addition to upgrading equipment and implementing a network, the bank intends to have an integrated authentication through Microsoft Active Directory (AD) infrastructure that will establish employee authentication before delegating network access to any mobile device. Lastly, the bank faces limited power supply especially in locations wireless access points are to be deployed. The solution for this problem will involve implementation of Power over Ethernet (PoE) at the access layer of the switched infrastructure.

Implementing this network proposal assures the bank of a reliable renewal from their previous computer systems and network infrastructure. Firstly, old operation systems will undergo complete reinstallation and vital information maintained in the new network system. Following this is the creation of new configurations and network designs that conform to the standards set by the company detailed in occasions of rolling out new computers layouts, connection equipment, and peripherals. When the configuration and design is established, a suitable network Operating system will be selected to control, manage, and share the company apps and information. The configurations, design and network operating systems form the key components of a prosperous network. Therefore, the wide and the local area network, types of media communication, and components will undergo examination and documentation in the network design phase to establish how the different parts of the network link and function. The new network services will be managed by corporate IT policy compiled by company network consultants, directors and owners. Lastly, the budget penned at the end of this proposal should give the West County Bank a rough estimate of the work time and network installation costs.

2) Project Plan

  • Components/ Network Configuration

The West County Bank raises the question: “is there a need for the network?” clearly, the network needs to be established if the organization is to fulfill their intentions of using a network that can share apps, information, or software and particularly, to achieve the notion of utilizing a datacenter. A logical network topology setup with the provided information and the intentions of the company would require the utilization of a star topology. Star topology, utilizing a server-based network scheme, will provide access to centrally polled accounts and file storage servers enabling easier, cardinal access hence allowing the staffs use single account authentications (Newman, 2010). Employees need to have access to all services and files simultaneously. This calls for utilizing a server, which will process several requests of similar data without deterioration in its performance. This design will also allow client computers, server, and laser printers to be linked to a cardinal switch that can share data across the local area network (LAN) and the wide area network (WAN). Redundant routers, connected to a modem, will give access to the wide area network and the internet source ISP (Tian et.al, 2004). The server purposes will include hosting the bank’s database of client files, a server for various desired printers, and hosting all employees’ bank e-mail accounts. Nevertheless, despite the star topology ability to provide the staff with enhanced and flexible network architecture for a formidable working environment, it remains susceptible to probable downfalls. Physically wiring the system to link the various computers utilizing star topology requires extra workforce and cabling for installation.  Requirement of the cabling to run via tight enclosures, ceilings, or under the carpet can be strenuous and time consuming. Considering the growth rate encompassed for West County Bank necessitated by employment of a server-based network, it should suffice for the difficulties involved in the setup and utilization of the new network.

  • Network Operating System

The star topology network, client computers, and the server configuration management and governance will be designated to Microsoft’s latest edition of server operating system that is Windows Server 2008 Enterprise Edition. With the implementation of the Windows 2008 server, along with windows operating systems for the network terminals, the networks services of the bank, its office production apps, security software, and specialization software will operate effectively for the bank staff. This will ensure compatibility with programs such as windows based elective services that include SQL 2005, Exchange Server 2007, or share point server. Productivity programs of the office such as spreadsheets, word processors, and presentation software will be availed for staff use with the installment of Microsoft’s Office 2007 suite. Operating systems of Microsoft and their programs work perfectly and possess high-level file compatibility. Third-party business software for accounting such as Sage Simply Accounting, MYOB Business essentials, works well across networks based on windows and with software for Office Productivity.

  • Data Communication Media

Updating the computer equipment will also encompass implementation of new communication media. CAT6 Ethernet cable best suit the specs of the new computers, network equipment, and servers. All the new units have gigabit transfer compatible NICs (network interface cards) and because CAT6 is the only UTP (unshielded twisted pair) cable that can handle gigabit transfer, it is the best choice for the communication media. Gigabit network cards and CAT6 cables will allow the management and employees access to files, server resources, and provide a reliable channel for communication to business agendas. Stationary computers of the bank Utilizing CAT6 cabling enjoy comprehensive network access (Tian et.al, 2004). The main office and the other two branch offices will have a wireless access network to meet the needs of the employees who carry laptops and tablets and other guests who might come for consultancy and auditions. Simple pre-shared key authentication will provide security for the wireless network that gives access to the internet and other interfacing apps in the datacenter. The wireless access points will enhance the business’s laptops and tablets mobility capabilities. Employees with tablets and laptops, while in office, will chose to either connect to the wireless network or plug CAT6 UTP cables to access the network resources of the business.

  • Common Carriers and Services Usage

Every staff is set to be equipped with a computer that is connected to the network to necessitate access and use of office resource and communications. Two internet service providers will install the internet access of the bank. The selected services will be supplied a business connection speeds of 10Mbps for download and 2Mbps for Upload. The network access will be accessible only to the management and the staff with no exception to the outside public. Business employees as arbitrators between clients and the bank’s services will handle any services or requests by clients. The staff will access the services of the company via their laptop, tablet, or workstations, link to the server that contains the desired information, and use the company software to meet the requests of the client. All employees will be required to possess login passwords for their accounts to give them clearance to access client/bank information. The staff will then select the best software to complete the client request with software installed either on their personal laptop or on network software.

  • Hardware Needs

The new proposal is a server-client network that primarily relies on the main server and its given service. The chosen hardware for the network configuration is from Dell’s business solutions. Dell’s PowerEdge 2800 III will manage the resource and the services of the bank. This server normally utilizes an 8 GB 677 MHz RAM, two Intel 2.0GHz Xeon Quad Core processors, and a storage of two 500GB SATA 3Gbps HDD (hard disk drives). Storage of the server will be supported by the already purchased multiprotocol storage area network (SAN) array. The disk arrays will ensure that the bank does exhaust storage space by consecutively replacing full disks. With these configurations and specs, the server will have the ability to process many request simultaneously for all the bank’s employees with slight or no loss in performance. Dell’s OptiPlex 755computers will replace the old stationary computers used by employees. Every computer will be equipped with Widows Vista Business, which utilizes 2 GB 667 MHz DDR2 RAM,  2.33 core 2 Duo processor, and an 80GB SATA 3Gbps HDD. These computers together with the server and the desktop towers have expandable memory slots for future upgrades. Laptops availed for employee mobile services are Latitude D630 generations that have 4GB RAM 667 MHz RAM, Intel 2.2 GHz Core 2 Duo processors, and 320 GB storage capacity. Their high RAM capacity essentially had little significance to operation specifications but only provided relevance to the computers of the present age. To receive internet connection from local ISP, two D-Link Gigabit routers will be put between the internet access media and backbone switch. This backbone switch will manage and control all the local network traffic and will be a combination of four Dell PowerConnect 2724 48-port Gigabit switches. All the tablets, laptops and personal Smartphones connect to a wireless access point, Linksys for instance, to access the internet and network services. Four switches were picked to support 1 server, 3 wireless access points, 3 laser printers, 2 Dell Color Laser 3110cn, 50 laptops and computers, and still have excess ports available for any upgrade required in future.

Due to limited power supply faced by the bank, especially in areas that wireless networks are to be deployed, the various networks switches mentioned above are PoE enabled. This implies that the need for power will be catered for and employees do not have to connect their devices to a power source and at the same time to the cables (Tian & Cox, 2004).

  • Corporate IT Policy

Network resource and internet availability for any business, specifically businesses dealing with personal and customer data, are key tools to assist in business operations. However, networks are susceptible and require constant control and monitoring (Riles, 2001). Internet access of the business will be availed by two local ISPs to ensure business efficiency and to ensure that resources of the network will be open to its management and staff with no constraints related to time of application. This does not mean that the network is not going to be checked but rather creates an environment suitable for the staff in their work place. Monitoring network and transfer of data will be done to preserve the integrity of customer data, protect employee wellbeing, and maintain integrity of operating business systems. The bank staff will use the internet during working hours to serve business operations, but during breaks or after working hours, they are allowed to utilize the internet for their own desires. Management and employee emails will undergo intense checking before authentication. In fact, management and employee authentication will be done via Microsoft Active Directory (AD) infrastructure. This also applies to their mobile devices to mitigate security concerns. Emails will firstly undergo complete scan of any attachments to locate the possibility of any threats towards the banking system before allowing employees read the contents of the email. Every employee has the responsibility to inform the IT management in case the employee receives questionable email.

Security is essential especially in the deployment of any network having an internet connection. The latest protection and bandwidth checking software will be used to ensure that unauthorized third parties do not access bank information and data files (Peterson & Davie, 2011). The preferred software for this task is the Microsoft Active Directory (AD). The management and the staff will have passwords and user accounts with administrative rights and specific security clearance. Only the IT manager will have full control and access to client/strict bank information. There is needs for a backup system to cater for any outages in the network. The most vital information requiring back up is on the bank’s older computers since loss of information as delicate as banking information could bring problems to the organization. Since the bank wants to utilize the new network as a system facilitating the staff gain access and share resources, the information will be stored on the central server (Riles, 2001). Cloud computing will also be adopted by the bank for storage of its vital information and avoid problems that come with outages (Riles, 2001).

The server and information systems will undergo a weekly backup of system configurations and information. This length of the chosen period was short because it is easier to perform system rollback as compared to long period rollbacks. Employees and client accounts will be stored on servers in both local and remote locations. Finally, Western County Bank is interested in integrating their main internal web-based application with a “Software as a Service” (SaaS) provider that specializes in online banking services. The web-based application was designed to easily integrate into a cloud-computing environment.

Software as a Service and Virtualization is a key trend in many businesses today. Businesses are virtualizing their operations to way a tame cybercrime that is on the rise. In addition to cloud computing, the network topology will allow for virtualization and online banking services provided by a SaaS company of choice (Antonakos & Mansfield, 2009).

Network Diagram

The diagram below is a basic layout of how the new network system will appear and operate. However, the diagram does not illustrate the actual measurements and positions of the equipment. Routers displayed do not show the redundancy that the new network intends implement. The connections correctly show the network peripherals and computers, however, the laptop and desktop computers are all directly linked. The illustration below shows only some computers to prevent consumption of large space.

Network Proposal Example For Western Count Bank - Network Diagram

Budget

The proposed budget for the new rollout will include the cost of the software, hardware, labor, and external resources. The budget includes a five-week time span for complete installation.

Week 1
  • Oder software, network peripherals, hardware, and internet services
  • Information backup form old computers
  • Start office organization to conform to the bank’s new network
Week 2
  • Arrival of ordered materials
  • Removal of old computers and other hardware at the discretion of the bank
  • Installation of internet by two ISPs
Week 3
  • Setting up and configuration server and backbone network setups
  • Wiring the backbone switches to workstations and wireless access points for laptops, tablets and Smartphones
Week 4
  • Installation of computers and laptops with Operating Systems, software, and other configurations
  • Linking all computers to network and testing
Week 5
  • Training IT managers on the usage of specific network set ups
  • Training employees too
  • Finalizing and troubleshooting any possible issues and cleaning p any excess materials

The cost for training employees and installation will be averaged at $150 dollars per hour. There will be 35 hours per week spent on network installation. This generates 175 total hours, and the cost of the total services is $ 26250.

Software  and Hardware DescriptionCost Per UnitTotal Cost
2 Dell PowerEdge 2900 III Servers w/

Windows Server 2008

w/30 CALS and Symantec

Multi-Server Security Suite

$7,833$15,666
35 Dell OptiPlex 755 Desktop

Computers w/Windows Vista Business

licenses & Microsoft Office 2007

$1,849$64,715
15 Dell Latitude D630 Laptops

w/Windows Vista Business licenses

$1,735$26,025
4 PowerConnect 2724

24 Gigabit Ports

$369$1,476
2 D-Link Gigabit Router$90.50$181.0
3 Linksys Wireless-N Access Point$155.99$467.97
2 Dell 3110cn Color Laser Printer

w/Network Ready Capabilities

$549$1,098
2000ft. CAT6 Ethernet Cable$298$298
QuickBooks Enterprise Solutions

50 Users

$7,000$7,000
Sage Enterprise Simply Accounting$2,000$2,000
Two Cable Internet Access Initial Startup

& then $160 per month

$180.00$180
Total

(including $26250 installation services)

$145,356.97
References
  • Antonakos, J. L., & Mansfield, K. C. (2009). Computer networking for LANs to WANs: Hardware, software and security. Clifton Park, N.Y: Cengage Delmar Learning.
  • Newman, M. E. J. (2010). Networks: An introduction. Oxford: Oxford University Press.
  • Peterson, L. L., & Davie, B. S. (2011). Computer networks: A systems approach. Burlington: Elsevier Science.
  • Riles, A. (2001). The network inside out. Ann Arbor [Mich.: University of Michigan Press.
  • Tian, K. Q., & Cox, D. C. (2004). Mobility management in wireless networks: Data replication strategies and applications. Dordrecht: Kluwer.

Leave a Reply

Your email address will not be published. Required fields are marked *