Sie sind auf Seite 1von 14

Network Infrastructure 1

Running header: NETWORK INFRASTRUTURE


Network Infrastructure U!grading and the ase of "uff#an Trucking
$e%ta &'(: )a#es *Wi%%+ ,ason- .au% /ro!%eh II- $etricia oardes-
A%e0ander Rodrigue1- and ,iche%%e Wa%ker
Uni2ersit3 of .hoeni0
NT &'(
Ste!hen O#og4ehin
Fe4ruar3 5&- 5((6
Network Infrastructure 5
Introduction to "uff#an Trucking
"uff#an Trucking is a trans!ortation co#!an3- o!erating at 7 sites nationwide8 1-7((
e#!%o3ees work at the hu4s- which are %ocated in /a3onne- N)- 9os Ange%es- A- and St8 9ouis-
,O: in addition- the cor!orate office and centra% #aintenance faci%it3 for ;(( road tractors e0ists
in %e2e%and- O"8 K8 "uff#an- a nati2e of %e2e%and- O"- started "uff#an Trucking in 1<&'
with one tractor=trai%er8 Wor%d War II !ro2ided growth for the co#!an3- as the co#!an3 assisted
in the de#and for carrier ser2ices in the trans!ortation of goods fro# ,idwestern factories to
!orts on the East oast8 ontract works e0ists 4etween the U8S8 >o2ern#ent and "uff#an
Trucking to this da3 !ri#ari%3 4ecause of their %o3a% su!!ort during Wor%d War II8
"uff#an Trucking continued to grow fro# interna% sa%es and the ac?uisition of fi2e Eastern
regiona% carriers8 This growth has ena4%ed "uff#an Trucking to continue to 4e !ri2ate%3 he%d8
$ue to this sustained growth "uff#an has deter#ined that an u!grade to the co#!an3 IT
infrastructure is needed in order to #anage costs and re#ain co#!etiti2e8 First on the !riorit3 is
the u!grade of the cor!orate networks- which e0ist at fi2e sites throughout the United States8 The
current state of the network is a #is#atched co%%ection of !rotoco%s- to!o%ogies- hardware- and
software usage 43 "uff#an networks8 $is!arities e0ist 4etween the !%ant side of the site and the
office side of each site- whi%e none of the sites works together to e0change infor#ation8 None of
the sites i#!%e#ent firewa%%s and on%3 two of the sites run software to !ro2ide a 4arrier 4etween
the Internet and the cor!orate 9AN8 Other !ro4%e#s are e2ident with the e0isting network
infrastructure at "uff#an Trucking8 $e%ta &'( wi%% e0a#ine the current state of the network
infrastructure of "uff#an@s networks: e0a#ine the reasoning 4ehind using the current network
to!o%ogies- !rotoco%s- and securit3 #easures: identif3 the 2arious t3!es of network !rotoco%s-
Network Infrastructure &
to!o%ogies- and securit3 #easures- inc%uding the ad2antages and disad2antages of each: and the
reco##endations for the u!dating of the !rotoco%s on the "uff#an enter!rise8
The I#!ortance of Network .rotoco%s
A.rotoco%s define the standards for co##unication 4etween network de2icesB *$ean-
5(((- !8 '&+8 .rotoco%s go2ern how networks co##unicate: without the use of !rotoco%s- data
cou%d not tra2erse a network 4ecause it wou%d not know where to go or how to get to its
destination8 The #ost co##on%3 used !rotoco%s inc%ude T.CI. and I.DCS.D: other t3!es of
!rotoco%s inc%ude Net/IOS Enhance User Interface *Net/EUI+ and A!!%eTa%k8 Network securit3
de!ends on the !ro!er usage of !rotoco%s within the network structure8 A!!%ications and
hardware de!end u!on the OSI ,ode% and the !rotoco%s i#!%e#ented at each %a3er to !ro!er%3
trans!ort data across the network8
Identifying Protocols
"uff#an Trucking is using I.DCS.D !rotoco%s 4ecause it has No2e%%@s Netware network
o!erating s3ste# 7811 at its ,issouri and Ohio offices8 These !rotoco%s are su!!orted 43 No2e%%8
It is a%so using A!!%eTa%k at its Ohio and ,issouri offices 4ecause the ,arketing $e!art#ents
ha2e se2en ,A workstations !erfor#ing gra!hics and design work8 The a%ifornia *office E
!%ant+- New )erse3 *office+- Ohio *!%ant+- and ,issouri *!%ant+ %ocations are running T.CI.8
A!!%e Ta%k is a !ro!rietar3 !rotoco% suite that was de2e%o!ed 43 A!!%e or!oration8 $ata is
#o2ed as a datagra# and !articu%ar !rotoco%s use !articu%ar datagra# structures8 Trans#ission
ontro% .rotoco% *T.+ is one of the core !rotoco%s of the Internet !rotoco% suite- often referred
to as T.CI.8 Using T.- a!!%ications on networked hosts can create connections to one another-
o2er which the3 can e0change strea#s of data8 I. is a data=oriented !rotoco% used for
co##unicating data across a !acket=switched network8 It is a Network %a3er !rotoco% and is
Network Infrastructure 7
enca!su%ated in a $ata 9ink %a3er !rotoco%8 I.D !rotoco% !erfor#s networking addressing and
network routing at the Network 9a3er8 S.D !rotoco% !ro2ides connection=oriented !acket
de%i2er3 at the Trans!ort 9a3er8
Rationale for the Adoption of Existing Protocols
"uff#an Trucking o#!an3@s rationa%i1ation for the use of its network !rotoco%s:
T.CI.- I.DCS.D- and A!!%eTa%k wou%d !ro4a4%3 4e the a!!%ications and o!erating s3ste#s that
are 4eing run on its s3ste#s8 These network !rotoco%s wou%d a%so 4e suita4%e 4ecause the
addresses of the different de2ices- such as routers- co#!uters- ti#e=ser2ers- !rinters- Internet fa0
#achines- and so#e te%e!hones wi%% ha2e to 4e read8
TCP/IP
The "uff#an Trucking o#!an3 is using T.CI. at those s!ecified %ocations 4ecause of
the ad2antages that these !rotoco%s offer8 T.CI. is routa4%e and su!!orts Fust a4out a%% #odern
o!erating s3ste#s8 T.CI. is used as a traffic contro%%er for %arge !ri2ate networks8 Shou%d
"uff#an decide to e0!and- these !rotoco%s wou%d 4e idea% for the !ur!ose8 T.CI. connects
dissi#i%ar s3ste#s: this is a needed ad2antage for "uff#an 4ecause it has different t3!es of
s3ste#s8 T.CI. !ro2ides a ro4ust- sca%ea4%e- and cross=!%atfor# c%ientCser2er fra#ework8
"owe2er- T.CI. is cost%3 and has undesira4%e sharing and 4eha2ior8 Securit3 concerns a%so
occur in a T.CI. network8 T.CI. is cost%3 and has undesira4%e sharing and 4eha2ior8 There are
a%so so#e securit3 concerns8 According to Feinstein *1<<<+- AT. has %ots of features 3ou don@t
needB: in addition- he states that AT. has no 4%ock 4oundaries: 3ou #ust create 3our ownB *!ar8
7+8 E2en though the NOS does #ost of the work in configuring T.CI. configuration-
ad#inistrators sti%% ha2e to configure the address of at %east one network node *$oering and
Si#!son- 5((1- !8 1&5+8
Network Infrastructure G
IPX/SPX
I.DCS.D is fast- high%3 esta4%ished and works with T.CI.8 These !rotoco%s ena4%e fi%e
and !rinter sharing on Window o!erating s3ste#s8 One ad2antage to using I.DCS.D is that
nodes are auto#atica%%3 configured on the network- as o!!osed to an ad#inistrator ha2ing to
configure at %east one I. node on a T.CI. network *$oering and Si#!son- 5((1- !8 1&5+8 One of
the reasons "uff#an is using the# is 4ecause the3 are good for s#a%% to #ediu# networks8
I.DCS.D is not designed for enter!rise en2iron#ent and has no standardi1ation of network
nu#4ers8 In #u%ti!rotoco% networks running 4oth T.CI. and I.DCS.D- Netware 9oada4%e
,odu%es #ust 4e i#!%e#ented for the network to co##unicate with T.CI. !ackets *!8 1&1+8
Netware networks running I.DCS.D a%so re%3 hea2i%3 on 4roadcast traffic for ser2ice ad2ertising-
router %ocation- and network condition u!dates8
Appletalk
Origina%%3 de2e%o!ed 43 A!!%e to run on ,acintosh workstations- A!!%eta%k uses !eer=to=
!eer networking to Foin .s together on a network8 A!!%eTa%k was de2e%o!ed after the creation
of the OSI #ode%- so its %a3ers coordinate with the %a3ers of the OSI #ode% to effecti2e%3 route
network traffic8 An ad2antage of using A!!%eTa%k is in the use of 1ones and the fact that an
A!!%eTa%k Hone is not restricted in na#ing con2ention- un%ike T.CI. and I.DCS.D8 A
disad2antage of the !rotoco% is A!!%eTa%k is not suited for %arge- internetwork en2iron#ents8
NetBEI
,icrosoft ac?uired Net/IOS fro# I/, and incor!orated it in its Windows for
Workgrou!s- Windows <G- and Windows NT o!erating s3ste#s: ,icrosoft ca%%ed it the Net/IOS
Enhanced User Interface- or Net/EUI8 Net/EUI Ais a fast and efficient !rotoco% that consu#es
few network resources- !ro2ides e0ce%%ent error correction- and re?uires %itt%e configurationB
Network Infrastructure '
*$ean- 5(((- !8 ;5+8 "owe2er- Net/EUI can on%3 su!!ort 5G7 connections and is not a routa4%e
!rotoco%- 4ecause of the %ack of a Network %a3er8
Network to!o%ogies of "uff#an Trucking
When i#!%e#enting a network- a !erson #ust understand where a%% of the co#!onents
are !%aced in the !ro!osed network8 Understanding the to!o%og3- or %a3out of the network- is
i#!ortant in !ro2iding a so%id network 4ase8 A to!o%og3 is defined- according to To#sho- et a%-
*5((7+- as Athe 4asic !h3sica% %a3out of a networkB *!8 '1<+8 "owe2er- how the nodes on the
network co##unicate with each other is known as a to!o%og3- as we%%: this is known as the
network@s %ogica% to!o%og38 "uff#an Trucking incor!orates different to!o%ogies in its cor!orate
network: for e0a#!%e- the to!o%ogies that e0ist at the different sites inc%ude Token Ring to!o%og3-
star to!o%og3- and 4us to!o%og38 The different to!o%ogies a%%ow the different nodes on the
network at each site to co##unicate through the !h3sica% co#!onents that co#!ose the o2era%%
network8
B!s Topology
The 4us to!o%og3 is A43 far the si#!%est and at one ti#e was the #ost co##on #ethod of
connecting co#!utersB *To#sho- et8 a%- 5((7- !8 7<+8 A sing%e ca4%e seg#ent connects a%% nodes
of the network and !ro2ides a #aFor f%aw in using this to!o%og38 The networks in "uff#an
Trucking that e#!%o3 the use of the 4us to!o%og3 inc%ude the 9os Ange%es office network and the
New )erse3 office network8
The ad2antages of the 4us to!o%og3 inc%ude its: 1+ si#!%icit3 and re%ia4i%it3- 5+
ine0!ensi2e ca4%ing that is eas3 to work with and e0tend- and &+ uses ca4%e econo#ica%%3
4ecause a%% nodes are arranged in a %ine8 A hu4 or !atch !ane% is often used to connect a%% of the
network nodes: howe2er- hu4s and !atch !ane%s do not !ossess the a4i%it3 to route the traffic to
Network Infrastructure 6
the !ro!er node8 "u4s on%3 strengthen the signa% and #o2e the signa% onto the rest of the
network8 The disad2antages of using a 4us to!o%og3 are 1+ hea23 traffic negati2e%3 i#!acts
network through!ut- 5+ a !ro4%e# with an3 ca4%e ha%ts network traffic- and &+ !ro4%e#s on the
network are often difficu%t to iso%ate8 The hu4 to!o%og3 is one of the o%dest and #ost re%ia4%e- 3et
the to!o%og3 is not idea% for a 4us3 networking en2iron#ent8
Ring topology
The ne0t network to!o%og3- of which the entire %e2e%and network *office and !%ant+ and
the entire St8 9ouis network *office and !%ant+ use- is the ring to!o%og38 The ad2antages of the
ring to!o%og3 inc%ude the fact that e?ua% access is a2ai%a4%e to a%% nodes and stead3 network
!erfor#ance8 The disad2antages outweigh the 4enefits and inc%ude: 1+ network outage caused 43
sing%e co#!uter- 5+ difficu%t3 iso%ating network !ro4%e#s- and &+ adding and re#o2ing
co#!uters disru!ts network o!erations8
Star topology
The need for the centra%i1ation of network infor#ation on ser2ers %ed to the ad2ent of the
star to!o%og38 %ient=ser2er architectures 4enefit #ost fro# this t3!e of to!o%og3 4ecause of the
centra%i1ation of network resources8 The star to!o%og3 is the #ost !o!u%ar 4ecause it is Aeas3 to
add new co#!uters or #odif3 the networkB *To#sho- et a%- 5((7- !8 '1+8 In addition- network
#onitoring and #anage#ent 4enefits fro# the centra%i1ation of network resources8 Fina%%3- a
network outage is not caused 43 the fai%ure of a sing%e co#!uter or ca4%e on the network8
I#!%e#enting a star to!o%og3 re?uires #ore ca4%e: #ore ca4%e e?ua%s #ore cost in
u!grading the network8 The centra%i1ation of resources is a%so a disad2antage 4ecause- if a hu4 or
switch fai%s- the entire network fai%s8
Network Infrastructure ;
Network Securit3: E0a#ining !ro4%e#s and offering so%utions
Network securit3 is #ore i#!ortant toda3 than at an3 ti#e !re2ious%3: networks #o2e
%arger a#ounts of data *often secure date+- hackers can gain access 43 2arious #eans- and e2en
e#!%o3ees can co#!ro#ise the o2era%% securit3 of the network8 A co#!an3 can tighten its
o2era%% securit3 43 ensuring that a%% cor!orate offices and !%ants !ossess the sa#e t3!e of
networking !rotoco%s- network o!erating s3ste# *NOS+- ca4%ing- and network e?ui!#ent8
"uff#an needs to e0a#ine the current state of its networks *4oth offices and !%ants+- identif3
securit3 needs- ad2antages and disad2antages of 2arious securit3 a!!roaches- and reco##end
the o!ti#a% co#4ination of ca4%ing- NOS- !rotoco%s- and network e?ui!#ent8
The c!rrent state of "!ff#an Tr!cking$s net%ork
The current state of the network at "uff#an Trucking is a #is#atched arra3 of NOS-
!rotoco%s- ca4%ing- and networking e?ui!#ent8 A%% sites use different ca4%ing- to!o%ogies- and
o!erating s3ste#s: this can cause !ro4%e#s with securit3 4ecause of the %ack of si#i%arit38
Another !ro4%e# e0isting at a%% sites is the %ack of a !h3sica% firewa%%8 The networks of "uff#an
Trucking contain no consistenc38 On%3 two of the sites contain Norton Anti=2irus Software- so#e
contain at & ca4%ing whi%e others contain at G ca4%ing- o%d NOS are used at #ore than ha%f of
the sites- and the !rotoco%s 2ar3 fro# No2e%%@s I.DCS.D !rotoco% to the standard T.CI.8 So#e
of the networks do not ha2e firewa%%s to kee! out hackers- whi%e others contain either du#4
ter#ina%s or W3se ter#ina%s *s#art ter#ina%s+8 The inconsistenc3 in a%% of the a4o2e areas wi%%
%ead to network 4reak=ins and infi%trations 43 the outside wor%d8 The on%3 network that contains a
#easure of safet3 is the 9os Ange%es !%ant: the reason wh3 is the i#!%e#entation of the Star
To!o%og3- use of routers containing 4ui%t=in firewa%%s- and Windows 5((( Ser2er as its NOS8 The
Network Infrastructure <
ne0t %ogica% ste! is to address the issues on "uff#an@s networks and co#4ining the networks to
for# a strong- secure- and consistent network throughout the "uff#an enter!rise8
&hat needs to 'e changed and %hy(
One of the #ost i#!ortant characteristics of so%id IT infrastructure is consistenc38 The
.s that are the #ost anti?uated shou%d 4e re!%aced with #ode%s with faster !rocessors and
%arger storage ca!acities: in addition- the .s shou%d a%% use Windows D. .rofessiona% as the
standard OS8 The ser2ers #ust uti%i1e at %east Windows 5((( Ser2er *if not Windows 5((&
Ser2er+ in order to !ro2ide the #ost current securit3 standards and networking !rotoco%s8
Windows &81 and Windows <; do not !ossess the ca!a4i%it3 of o!erating efficient%3 and secure%3
on ser2er=c%ient network architecture8 The ne0t change arises fro# the !h3sica% infrastructure of
the networks8 at & ca4%ing su!!orts data transfer rates u! to 1' ,4!s- according to .a%#er and
Sinc%air *5((&+- whi%e Aategor3 Ge and ategor3 ' twisted=!air ca4%es are a !o!u%ar choice for
new ca4%e insta%%ations 4ecause the3 ha2e high=s!eed networking ca!a4i%ities of u! to 1(((
,4!sB *!8 1(;+8 When giga4it standards co#e to fruition in networked en2iron#ents- the ca4%ing
wi%% su!!ort the current standards8 The consistenc3 of the connections 4etween %ocations the
internet a%%ows for efficient data and 2oice co##unications: in contrast- the use of AO9 dia%=u!
at the a%ifornia site- whi%e uti%i1ing a fractured T1 at the ,issouri and Ohio !%ants does not
a%%ow for #a0i#i1ed data and 2oice transfer8 Another issue with the e0isting network is the
!%ace#ent of the We4 ser2er at the a%ifornia !%ant: co#!ro#ised network connecti2it3 and
s!eed on the o2era%% network e0ists 4ecause of the through!ut %e2e% of the different offices and
!%ants within the network8 Since the 2arious sites o!erate inde!endent%3- an outage at a s!ecific
site wi%% not i#!act the other sites: howe2er- co##unications 4etween the site that is down and
the transfer of networked de2ices *such as ser2ers+ wi%% 4e co#!ro#ised 4ecause of the outage8
Network Infrastructure 1(
Ad)antages of sec!rity feat!re i#ple#entation
,an3 ad2antages e0ist with the u!grade of the "uff#an Trucking8 These ad2antages
inc%ude the fo%%owing:
18 entra%i1e user accounts- securit3- and access contro%s si#!%if3
network ad#inistration8 This #eans that a%% contro%s reside on
the ser2er- rather than 2arious !ieces of networked e?ui!#ent8
58 ,ore !owerfu% e?ui!#ent #eans #ore efficient access to
network resources8 ,ore !rocessors e0ist on ser2ers- which
!ro2ides #ore co#!uting !ower and a%%ows #u%ti!%e accesses
to resources without co#!ro#ising network s!eed8
&8 A sing%e !assword for network %ogon de%i2ers access to a%%
resources8 This is through the use of Windows 5(((C5((&
Ser2er and a%%ows a user to 4e%ong to 2arious grou!s- whi%e
on%3 using one !assword for access to the resources he or she
re?uires8
78 Ser2er=4ased networking #akes the #ost sense for networks
with 1( or #ore users or an3 networks where resources are
used hea2i%38
*To#sho- Titte%- and )ohnson- 5((7- !!8 1& I 17+8
G8 at ' ca4%ing a%%ows for through!ut s!eeds that e0ceed at &
ca4%ing8 This t3!e of ca4%ing is a%so recogni1ed for use on
Ethernet=4ased- Star to!o%og3 networks8
'8 Use of Windows D. .rofessiona% a%%ows for the users to
co##unicate efficient%3 on the network and a%%ows different
sites to co##unicate with issues with co#!ati4i%it38 In
addition- D. .rofessiona% is sti%% su!!orted 43 ,icrosoft
through the use of its Windows U!date feature8
The use of a Star To!o%og3- Ethernet=4ased- Windows 5((( or 5((& Ser2er en2iron#ent !ro2ides
"uff#an with securit3 against hackers8 The use of at ' ca4%ing not on%3 !ro2ides #ore
through!ut on the cor!orate network toda3- 4ut wi%% !ro2ide sca%a4i%it3 to the network when
1>4!s through!ut is achie2ed on cor!orate networks8 Windows D. .rofessiona% a%so !ro2ides
2arious %e2e%s of securit3 to co#!%e#ent the use of Windows 5((( or 5((& Ser2er8 "owe2er-
with the ad2antages of u!grading the network are the disad2antages of uti%i1ing certain features8
Network Infrastructure 11
The disad)antages of sec!rity feat!res
Network ad#inistrators find nu#erous reasons to i#!%e#ent #an3 securit3 features on
their networks: howe2er- disad2antages to certain features that shou%d increase securit3 !ossess
disad2antages8 ,an3 !oints on a network e0ist that #a3 4e co#!ro#ised 43 an interna% threat or
a hacker8 The network wou%d 4e unusa4%e if the ser2er fai%ed- es!ecia%%3 when the ser2er is the
centra% node in the Star to!o%og38 An increase in e0!enses is incurred through the use of
co#!%e0- s!ecia%=!ur!ose ser2er software8 at '- whi%e !ro2iding the 4est shie%ding fro# outside
e%ectro#agnetic interference- is not i##une fro# so#eone !h3sica%%3 !atching into the ca4%ing:
the on%3 t3!e of ca4%e that is tota%%3 secure is fi4er=o!tic ca4%ing8 Windows o!erating s3ste#s are
not co#!%ete%3 i##une fro# securit3 threats 4ecause hackers can e0!%oit !ro4%e#s within
Windows code to i%%ega%%3 access .s and !ossi4%3 ser2ers8 .ro4%e#s with ser2er=4ased
networks are a neg%igi4%e risk- as ser2er=4ased networks are #ore secure than !eer=to=!eer
networks8 A%so- the t3!e of ca4%ing !ro2ides securit3 fro# e%ectro#agnetic interference *E,I+-
and the !rotoco%s a%so !ro2ide a #easure of securit3 at a%% %e2e%s of the OSI ,ode%8
Reco##endations for the network at "uff#an Trucking
U!grading each site@s Internet u!%ink to a fu%%3 functiona% T=1 %ine is the first ste!- if the
site has not a%read3 con2erted to this t3!e of connection8 The 4andwidth of a T=1 %ine wi%%
!ro2ide continuous co##unication 4etween sites- as we%% as the tracking s3ste# and its
re%ationa% data4ases8 A SUJ$SU #ode# wi%% con2ert the ana%og T=1 %ines into a digita% %ine for
the Firewa%%8 A isco .i0 firewa%% wi%% 4e !%aced at the 4order of each site to !rotect it against
an3 unauthori1ed users or unwanted traffic8 Two se!arate network interface cards *NIs+ on the
.i0 wi%% connect to two isco &65G routers8 The new 4ack4one has 4een designed to !ro2ide
#a0i#u# u!ti#e for the organi1ation 43 !ro2iding due% !aths for data to take8 These two
Network Infrastructure 15
routers wi%% 4e interconnected- and using a hot stand43 routing !rotoco% *"SR.+8 "SR. a%%ows
one of those routers to 4e %a4e%ed as the !ri#ar3 and the other a secondar38 The !ri#ar3 hand%es
a%% traffic unti% *for an3 reason+ it goes down8 In that situation- the secondar3 *which is
constant%3 !u%%ing a current configuration fi%e fro# the !ri#ar3+ wou%d rea%i1e that the !ri#ar3 is
down- %oad the !ri#ar3 ser2er@s configuration *I. addresses and a%%+ and 4egin !assing traffic-
%ea2ing %itt%e or no downti#e8 At this !oint the infrastructure 4reaks into two directions8 The
first is a due% *fu%%3 redundant+ !ath to user workstations- !rinters- I. !hones- U.CRFI$
Trans!onders- etc8 This !ath interconnects two isco 7; !ort 5<G(T switches8 The second !ath
fro# the routers !oints to the sites ser2er far#8 This !ath was a%so designed for due%
functiona%it3- uti%i1ing two isco 57 !ort 5<G(s8 Each ser2er in the ser2er far# wi%% ha2e two
NIs8 One wi%% 4e the !ri#ar3 *acti2e+- connected to one 5<G(- and the other wi%% 4e a fai%o2er
NI connected to the other 5<G(8 Ado!tion of this #ethod of networking #ini#i1es downti#e8
The t3!e of ser2ers in the ser2er far# wi%% de!end on whether the site is the cor!orate
head?uarters or Fust a #anufacturing site8 The head?uarters in %e2e%and wi%% ha2e the fo%%owing
ser2ers:
Network Attached Storage *NAS+
9arge Orac%e $ata4ase
Fi%e and .rint Ser2er
E0change Ser2er
or!orate We4 ser2er *User tracking+
ategor3 ' Shie%d Twisted .air ca4%ing wi%% connect a%% de2ices in the new infrastructure to one
another8 The e0tensi2e research of the 2arious networking !rotoco%s gi2es us the confidence of
reco##ending T.CI. as the !rotoco% uti%i1ed throughout the "uff#an network8 T.CI. is fast
4eco#ing the #ost !o!u%ar network !rotoco% 4ecause of its %ow cost and it a4i%it3 to
co##unicate 4etween a #u%titude of dissi#i%ar !%atfor#s8 It is a de facto standard on the Internet
Network Infrastructure 1&
and is co##on%3 the !rotoco% of choice for 9ANs8 onfiguration is e0tensi2e 4ut can 4e offset
43 the use of ,icrosoft network o!erating s3ste#s- such as Ser2er 5(((C5((& and D.
.rofessiona%8 With the e0tensi2e research into the 2arious to!o%ogies- $e%ta &'( reco##ends the
transition of the different sites o2er to the star to!o%og38 The addition of #ore network nodes wi%%
not disru!t the network and #aintenance is si#!%e8 Fau%t to%erance is !%aced on such a to!o%og3-
to ensure that the nodes are !ro!er%3 routed in the case of an outage8 In addition- one of the sites
a%read3 i#!%e#ents the star to!o%og3- which #akes u!grades as eas3 as re!%acing ca4%ing and
re!%acing hu4s with switches and routers8
Figure 1-1: New backbone and network infrastructure for each site of Huffman Trucking.
Network Infrastructure 17
References
$ean- T8 *5(((+8 Net%ork* +!ide to Net%orks, /oston: ourse Techno%og38
$oering- $8 E Si#!son- T8 *5((1+8 No)ell Net%are -,./-,/0 Net%ork Ad#inistration *Enhanced
Edition+8 /oston: ourse Techno%og38
Feinstein- A8 *1<<<+8 TCP )s, 1P for file transfer, Retrie2ed Fe4ruar3 57- 5((6- fro# the
we4site: htt!:CCwww=#ae8engr8ucf8eduCKa#4roseC
9anno- S8 *5((6+8 2!nda#entals of Net%orking, Retrie2ed Fe4ruar3 57- 5((6- fro# the we4site:
htt!:CCwww84ra1os!ort8eduCKs%annenCnetessCcha!1&8ht#
.a%#er- ,8 E Sinc%air- R8/8 *5((&+8 +!ide to 1esigning and I#ple#enting 3ocal and &ide Area
Net%orks *5
nd
Ed8+8 Retrie2ed fro# the Uni2ersit3 of .hoeni0- Week One- Resource-
NT&'( I Network and Te%eco##unications once!ts We4site:
htt!s:CCeca#!us8!hoeni08eduCsecureCresourceCresource8as!
To#sho- >8- Titte%- E8- E )ohnson- $8 *5((7+8 +!ide to Net%orking Essentials *7
th
Ed8+8 Retrie2ed
fro# the Uni2ersit3 of .hoeni0- Week One- Resource- NT&'( I Network and
Te%eco##unications once!ts We4site:
htt!s:CCeca#!us8!hoeni08eduCsecureCresourceCresource8as!
Wiki!edia8 *5((6+8 3ocal area net%ork, Retrie2ed Fe4ruar3 57- 5((6- fro# the we4site:
htt!:CCen8wiki!edia8orgCwikiC9oca%LareaLnetwork

Das könnte Ihnen auch gefallen