123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

Networking

Profile Picture
By Author: Sherry Roberts
Total Articles: 81
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Introduction
Everlast is one of the leading U.S. sportswear manufacturing companies referred to as the ‘Dry Fit’. Recently the firm has purchased another company called Riddell Sports, Inc. that located in Dallas, TX that involves in the manufacturing line of the athletic wear known as "Lite n’ Dry". Riddell Sports’ offices need to add to the new Everlast commercial wide area network. Riddell Sports possess an already existing website whereas Everlast does not have one (Dean, 2013). As a result, Everlast has decided to move the web hosting activities for Dallas to Philadelphia as well as re-design the website to be inclusive of both Riddell and Everlast products. The new domain name and will be set up for Everlast Athletics as an alias to the already existing domain name . The group assignment that we are handling plays the role of addressing the network concerns, as well as the security deliberations in the establishment of the systems (Stewart, 2008).
1.0 Network diagrams
The currently proposed LANs for Everlast along with Riddell Sports, and the WAN that connects the organizational joints are as ...
... revealed in the two structures below.
1.1 The Philadelphia office as well as the manufacturing site

1.2 The manufacturing site and the Dallas office

2.0 Corporate Intranet for Everlast
From the proposed network structures, the connections of Everlast’s principal offices at Philadelphia as well as the secondary office at Dallas are connected via internet VPN services. NPLS technology also has the aptitude to be used concurrently with internet VPN services. The group also offers the proposal that a gate established at Philadelphia and will play the function of routing outside website users to their destination. For instance, if a user is determined to reach or locate information on the Everlast Athletics office in Dallas, the gate will initially direct the user to the chief web server at Everlast. Once at the primary server, the gate will redirect them towards the Riddell Sports web site at Dallas (Smith, 2011).

3.0 IP Addressing Plan
Philadelphia VLAN Subnet
1st Floor Workstation VLAN 10.10.13.0/25
2nd Floor VLAN 14: Database and e-mail 10.10.14.0/25(0.10)
2nd Floor VLAN 15: Servers 10.10.15.0/25(0.2 0.3 0.4)
3rd Floor VLAN 16 10.10.16.025
Dallas VLAN Subnet
1st Floor Workstation VLAN 10.10.13.0/25
2nd Floor VLAN 14: Database and e-mail 10.10.14.0/25 (0.11)

Philadelphia public IP: 22.168.20.24- Philadelphia gateway address
Static public IP: 22.168.20.23- Dallas gateway address
4.0 Media for the LAN connections in assorted Locations
The Media, as well as devices, entail the hardware or physical fundamentals of the network. Three examples of the physical media consist of metallic, copper wires or fiber optic cable, within cables, as well as wireless media. The media, as well as a scheme for the connection of LANS in the diverse locations and interconnection of LANS, are specified as follows (Smith, 2011).

E1.4 10.10.16.1/25

The features of LAN connection encompass the variables below:
• The configuration of the NAT is for the web server traffic
• Configuration of the Router map for backup WAN line
• Deployment of the access list as well as the Firewall policy for security enhancement


workstation
 Eth05- trunk port - MP1 (Switch)
The connection of the Cable
• We have CAT 5 crossed over between switches
• The connection between switches is gigabytes 1000Mbps; T-I between external uses; and fast Ethernet 100MBPS between computer to switch.
• The connection of the CAT5 is straight through all devices
5.0 DNS modifications
Following the Domain Name System (DNS) modifications, we are going to put the following recommends to the Everlast Athletics for their consideration:
We recommend that the company needs to espouse its new DNS address as . The assigning of the address should be the company’s static public IP address, which is the IP: 22.168.20.24- for the Philadelphia gateway (White, 2012).
The latest domain should buy from a third-party company that offers web domain services, after which the new domain registration to the company’s web servers. The modification of the static address of Everlast athletics will take the ‘CNAME’ unix/bing dominion to redirect readily to (Kizza, 2009).
6.0. Migration of the Dallas Files to Philadelphia
During the data migration process, Everlast will make use of cloud backup services that have purchased from a merchant (Thomas, 2011). The principal ambition will be to transfer data from Riddell Sports to Everlast devoid of any downtime. The customer will have the advantage since they will get precise information with diminutive or no loss of services from the cloud. Once through with data migration, the company ceases to utilize the cloud services. The companies that have now merged will begin using indistinguishable servers in order to coordinate data in the future. The storage of the data will take the form of an SQL database. In the new arrangement, Everlast will play the role of the principal database since it is the headquarters of the company while Dallas will be the secondary database or backup. The monitoring of the data databases will be via the use of a modus operandi known as server mirroring, frequently used in the cases of indistinguishable servers (Thomas, 2011).
7.0. Testing of the Primary Website before Migration as well as testing the Backup Website after Migration
The application of GATE is on the occasions a company wants to test the chief website preceding to migration, as well as the backup web site subsequent to the migration. The role of GATE is in the channeling of the incoming traffic to whichever of the company websites. The testing of GATE is as either on or off, with binary digits 1 for on and 0 for off the table below indicates
GATE0 Off Dallas
GATE1 On Philadelphia

On the first occasion, Everlast athletics is going to have a blueprint of its website as well as develop a database for its principal website at Philadelphia. The company’s new domain will be . The sustaining hosting services to use will be from the Dallas and will move to Philadelphia. Once the completion of the process is confirmed, web hosting files are subsequently uploaded to Dallas website. The testing of the website is then via a user view proceeding to migration. The gate is switched on for Philadelphia website at the same time as it is kept off for Dallas. Before the migration juncture, users will be directed to the Philadelphia website when they are using the company’s public IP address (Dean, 2013).
The preceding evaluation is after the competition of the migration. The test organization is similar to the pre-test scenario as shown in the table.
GATE 0 OFF Philadelphia
GATE 1 ON Dallas

Upon the DATA transfer to the chief location system, the secondary database is kept as the firm’s backup system. When the gate opened to the secondary site location, the gate to the primary site location is closed. Preceding the migration, should the user hit the public address of Everlast athletics, the search involuntarily redirected to the new address (Kizza, 2009).


8.0. Switching to the Backup Site
The principal hosting location for Everlast athletics is Philadelphia where the web server hosts data from Philadelphia and redirects backup data to the Dallas location via server mirroring. The two locations normally are under automatic evaluation by the backup server having a dedicated IP address. On the occasion, that there is a breakdown of the principal database, the user will not lose services from the host server. The retrieving of the data from the Dallas backup database took place and redirected to Philadelphia via the use of identical servers or server mirroring. The method frequently referred to as the called failover. In the case of a malfunction or when the primary server breaks down, the backup or mirror server stands in for the primary server. Through the failover method, the users as well as the application servers redirected to the mirror server (Thomas, 2011). The monitoring script that runs on the monitoring server or mirror server helps in the binding of the secondary IP of the primary server and takes over all functions of the primary server without resulting in downtime. In conducting tests for the functioning of the mirror server, the principal server in Philadelphia is switched off. The user then evaluates the Everlast athletics website via the secondary backup in Dallas which acts as a failover mechanism for the website (White, 2012).
9.0 Approach to Network Security for Everlast athletics
For the rationales of the security of the network, the team recommends definite measures. We propose the amalgamation of one firewall on the side of primary hosting site in Philadelphia. The proposed firewall encapsulates the accountability of routing data traffic from both Philadelphia as well as Dallas centers. One firewall is adequate to the provision of maintenance as well as monitoring for the entire network of the new Everlast athletics company (White, 2012). The provision of an Ethernet cable within the building connects server workstations directly to the switch. On the other hand, the database and email hosting servers are not connected to the servers, thus making them the intranet and separated from the outside world. The attribute is a crucial security aspect for the network security model proposed for the new Everlast athletics network. The other attribute that we recommend is the provision of the individual VLAN for the whole network across Philadelphia and Dallas (Kundu, 2008).
10. Group Project Roles
The group’s organizational roles are five which encompass the following roles being played by each group member classified as follows
Team Leader
The work of the team leader is in the scheduling group meetings as well as to maintaining the group on pathway. The role played by the team leader is similar to that of the project manager plays in many IT organizations. In addition, the team leader is personally responsible for responding to questions related to question 8 and 10 of the project during the presentation.
Lead Technical Resource
The lead technical resource has the responsibility for the development of the network diagram as well as IP address for the group project. The role is much like the senior technical resource manager in most IT organizations. The members will be personally responsible for providing responses to questions number 3 and 9 in the project presentation.

Paper Coordinator
The coordinator collects the contribution from all team members for the purpose of compiling the entire paper for presentation purposes. The role of the paper coordinator resembles the role performed by the Technical Writer in IT organizations. In the project presentation, the paper coordinator will provide responses to questions related to the project questions number 4 and 5 (Goodrich, 2010).
Presentation Coordinator
The coordinator takes the responsibility incorporating contributions from all members of the team as well as organizing the main points in the form of the PowerPoint slides. The role of the presentation coordinator is to act as a bridge between technical writer and supervisor or manager in most IT organizations. The presentation coordinator will be individually responsible for providing responses to project questions number one and two during the project presentation.
Spokesperson
The spokesperson, whose responsibility is to provision of a brief prolog of each group member during the presentation. Additionally, the group spokesperson manages the presentation, keeping the presentation on track including time management. This role resembles the functions or responsibilities of the position of a manager or supervisor in a majority of IT organizations. In relation to the presentation itself, the group’s spokesperson is in charge of questions number 6 and 7. Therefore, the person will provide responses to questions related to the two project-questions during the presentation.

References
Dean, T. (2013). Network+ Guide to Networks. Boston, MA: Course Technology
Goodrich, M.T. & Tamassia, R. (2010). Introduction to Computer Security. Boston, MA: Addison-Wesley
Kizza, J.M. (2009). Computer Network Security. Springer, NY: Springer
Kundu, S. (2008). Fundamentals of Computer Networks. PHI Learning


Sherry Roberts is the author of this paper. A senior editor at Melda Research in best research paper writing service. If you need a similar paper you can place your order for a custom research paper from affordable custom research papers services.

Total Views: 188Word Count: 1928See All articles From Author

Add Comment

Education Articles

1. Decoding Project Management Certifications: Pmp Or Capm?
Author: Myank

2. Best School In Rohini
Author: Sanchit Arora

3. Exploring The Foundations Of Islamic Learning: From Qur'anic Studies To Jurisprudence
Author: faizalkhan1393

4. Jain University Online Bcom
Author: Collegetour

5. Mastering Digital Marketing: Unlocking The Power Of Salesforce Marketing Cloud With Proximsoft
Author: proximsoft

6. Horizon Scholar: Your Source For Personalized University Selection Guidance
Author: Horizon Scholar

7. Advancing Knowledge: Machine Learning Research Proposal Services In Kisumu, Kenya
Author: elaine

8. A Guide To Ms In Business Analytics In Canada
Author: Shilpa Arora

9. The Psychology Of Learning: Understanding Cognitive Processes And Educational Strategies
Author: anwarkhan45314

10. Data Analytics Online Training Hyderabad | Data Analytics Training
Author: Teja

11. Curricular Innovation In Education: Adapting To The Changing Needs Of Students
Author: amankhan99101

12. The Heartbeat Of Windsor Gardens Primary School
Author: Avenues College

13. Buy Research Proposal In Nairobi, Kenya: A Comprehensive Guide
Author: elaine

14. Empowering Minds: Exploring Counseling Techniques For Personal Growth And Healing
Author: abdulshaikh5253

15. Exploring Earth's Extremes: From Antarctica To The Sahara Desert
Author: Madhu Yadav

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: