...You are experienced in information management and its benefits and challenges. You manage online accounts across multiple mobile devices and computers—and social media, texts, photos, videos, music, docs, address books, events, downloads, and other content that make up your digital library. Not being able to transfer and synchronize whenever you add a device or app is annoying and inefficient. To simplify add-ons, upgrades, sharing, and access, you might leverage cloud services such as iTunes, Instagram, Diigo, and Box.net. At some point, a user may want to start over with the latest mobile device—and re-organize everything to make dealing with information and devices easier. That's a glimpse at the information management situations facing organizations today—and why a plan is needed to guide, control, and govern IT growth. As with building construction (e.g., Figure 2.1), blueprints and models help guide and govern IT assets. Image from book Figure 2.1: Blueprints and models, like those used for building construction, are needed to guide and govern an enterprise's IT assets. To better reflect organizational content, the term information management is used instead of data management. The most potentially valuable and challenging type is human information—the semistructured or unstructured content generated by humans from social media, mobile devices, search engines, and sensors as well as texts, images, audio, and video. To function in the big, cloudy, mobile and social world...
Words: 1268 - Pages: 6
...IP/MPLS-Based VPNs Layer-3 vs. Layer-2 IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents WHITE PAPER 1. 2. 3. 4. 5. 6. Objective ..................................................................................................................... 3 Target Audience .......................................................................................................... 3 Pre-Requisites.............................................................................................................. 3 Introduction ................................................................................................................. 3 MPLS Layer-3 VPNs .................................................................................................. 4 MPLS Layer-2 VPNs .................................................................................................. 7 6.1. Point-to-Point Connectivity ................................................................................. 8 6.2. Multi-Point Connectivity...................................................................................... 9 7. Which Way to Go: The Layer-3 or The Layer-2 Way.............................................. 12 8. Summary ................................................................................................................... 15 FOUNDRY NETWORKS Page 2 of 16 IP/MPLS-Based VPNs Layer-3 vs. Layer-2 WHITE PAPER 1. Objective To give the reader an insight into the pros...
Words: 5621 - Pages: 23
...Solution Scope Our network solution will be MPLS IP VPN; MPLS IP VPN is a fast, packet data transport service that uses high speed switching architecture instead of the typical routers. This type of network will be a change from your traditional network; it will make sure that packet-forwarding decisions are made solely on the contents of this label, without examining the packets. It will also allow all individuals to create end-to-end circuits across any type of transport medium, while using any protocol. MPLS will allow distinct VPNs to use the same address space in turn can also be allocated for private address space. The way this happens is due to its ability in adding a 64-bit route distinguisher (RD) to each IPv4 route, making VPN-unique addresses also unique in the MPLS...
Words: 926 - Pages: 4
...Structure of WAN After much deliberation it has been decided that all ABC Company’s (ABC) main design centers in: San Francisco, Detroit, Paris, Tokyo and Sao Paulo and sales offices in: Washington, Indianapolis, Tampa and Liverpool, will each have their own Local Area Network (LAN) setup. These LAN’s will be designed to best facilitate their intranet needs and will have the inclusion of internet access. Each site will include switches and routers with other networked devices and will be designed off Star topology. The Star Topology is a common network configuration in which workstations and other network devices connect to a single point called the hub. (Exforsys, 2008) We will be installing Fiber optic cabling in all the main building design centers including San Francisco, Detroit, Paris, Tokyo, and Sao Paulo. The rest of the sales offices be taken into consideration since there are plans of opening other sale offices as the business continues to grow. The fiber optic will run from the backbone cabling, vertical cabling, and horizontal cabling. It will run to the telecommunication closet connecting to the switches. The fiber optic cabling will help provide the necessary speed for all the workstations and expansion for future growth. The connections from device to device will be done through a Layer 3 switches. A layer 3 switch is a high performance device that differs very little from routers. The layer 3 switch has the same IP routing table for lookups and it forms...
Words: 1234 - Pages: 5
...ABSTRACT When designing project for a top level enterprise-wide telecommunications network for ABC Company (ABC) with worldwide offices in the U.S. (San Francisco, Detroit, Washington, Indianapolis, Tampa), Europe (Paris, Liverpool), Japan (Tokyo), and South America (Sao Paulo), is engaged in the development of audio and video special effects for the entertainment and advertising industry. It is imperative as team member to work diligently and closely to deliver a quality project on time for the company. We [must] keep in mind as well to meet some technical customer requirements, keep the network managed and running at its best performance, and ensure that the network is pretty secure. The design for this network begins by designing the local network, at each of the provided locations, and then connecting all the offices together in an effective Wide Area Network (WAN) Design. The network design will include both voice and data sharing. Microsoft Project will be used as a tool to organize and manage the complete project, and it will include budget and schedule. We also must remember that the main design centers are in San Francisco, Detroit, Paris, Tokyo, and Sao Paulo, with Corporate Headquarters lodged in San Francisco. The remaining offices are used as sales offices. Consider the company to operate on a 24 hours a day and 7 days a week basis, because it is global. It has been said, that with the advent of globalization, WAN has become a major artery for communication...
Words: 1405 - Pages: 6
...Technical Writing Project Cover Sheet Capstone Project Name: | Managed Service Provider Migration | Student Name: | xxxxxxx | Degree Program: | Bachelor of Science IT, Network Emphasis | Student Mentor Name: | xxxxxxxx | Table of Contents Capstone Introduction 1 Review of Other Work 3 Project Rationale 8 Systems Analysis and Methodology 10 Goals and Objectives 14 Project Deliverables 16 Project Plan and Timelines 21 Project Development 22 Accomplishments 26 Conclusion 26 References 28 Appendix: 29 Capstone Introduction With the rising costs of running a business and the goals to increase profits, organizations are constantly looking at ways to reduce operating expenses. In the technology realm of an organization, reduction of costs can be achieved by streamlining processes and automation. Another option that can be explored within organizations to reduce costs is the outsourcing of their technology departments to a manage service provider. Organizations are looking into options to utilize technology to reduce costs by migrating their technology to a 3rd party to managed their infrastructure. Concordia is mid-sized bank based out of California that has a wide area network consisting of 125 branch offices spread out through California and the surrounding states. Concordia has implemented a project to get out of the information technology area so that they can focus on their core principles of the banking industry. Concordia preferred to...
Words: 8397 - Pages: 34
...transmitted from different devices simultaneously. This topology can withstand high traffic. 2) Even if one of the components fails there is always an alternative present. So data transfer doesn’t get affected. 3) Expansion and modification in topology can be done without disrupting other nodes. Disadvantages 1) There are high chances of redundancy in many of the network connections 2) Overall cost of this network is extremely high 3) The set-up and maintenance is very difficult Partially Meshed Topology: * What are the pros and cons of using multiprotocols in a network? Explain in detail. Some pros are that it can: Improve Uptime – by sending data over an alternative path in less than 50 milliseconds (if one exists). MPLS also reduces the amount of manual intervention your network provider has to do to create a WAN, reducing the likelihood of human error bringing down your circuit. Create Scalable IP...
Words: 631 - Pages: 3
...Contents I. Introduction ……………………………………………….. 1 - 2 II. VPN Topology……………………………………………... 2 - 3 III. Types of VPNs……………………………………………... 3 - 5 IV. Components of VPNs………………………………………. 5 - 7 V. Productivity and Cost Benefit…………………………….... 7 - 9 VI. Quality of Service………………………………………….. 9 VII. The Future of VPN……………………………………….... 9 - 11 VIII. Conclusion…………………………………………………. 11 IX. Bibliography………………………………………………...12 - 13 X. Questions……………………………………………………14 Introduction Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there. Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them. Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently. The term VPN has been associated in the past with such remote connectivity services as the (PSTN), Public Switched Telephone Network but VPN networks have finally started to be linked with IP-based data networking...
Words: 4870 - Pages: 20
...Running head: NETWORK DESIGN FOR ACME Network Design for Acme Manufacturing Learning Team A: [your team members] University of Phoenix Intro To WAN Technologies NTC/242 Acme Manufacturing Network Design Introduction As a network consultant hired by Acme Manufacturing, the company has asked Team A to develop a new networking design for their expanding business. The description below describes the key steps involved in developing a WAN for Acme Manufacturing. The company has six different buildings in six different locations throughout the world which need to be networked collectively. All the remote locations need to be able to communicate effectively with the main headquarters which is located in Atlanta, Georgia. The two buildings which house the headquarters are located across the street from each other. One building is used solely for corporate operations while the other building is used for staffing the sales and engineering department. Network Topology The best choice for the company would be to use a LAN with routers and Ethernet cables. This is a logical choice because the speeds of the network will be far superior and will help to reduce the total cost of the network. The three distribution buildings are located in Chicago, Phoenix, and New York. It is not feasible to run cabling to theses locations due to cost, so using T3 leased lines to communicate is the recommended method to connect the buildings with headquarters...
Words: 1444 - Pages: 6
...Contents I. Introduction ……………………………………………….. 1 - 2 II. VPN Topology……………………………………………... 2 - 3 III. Types of VPNs……………………………………………... 3 - 5 IV. Components of VPNs………………………………………. 5 - 7 V. Productivity and Cost Benefit…………………………….... 7 - 9 VI. Quality of Service………………………………………….. 9 VII. The Future of VPN……………………………………….... 9 - 11 VIII. Conclusion…………………………………………………. 11 IX. Bibliography………………………………………………...12 - 13 X. Questions……………………………………………………14 Introduction Virtual. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there. Private. Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them. Network. A network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently. The term VPN has been associated in the past with such remote connectivity services as the (PSTN), Public Switched Telephone Network but VPN networks have finally started to be linked with IP-based data networking...
Words: 4870 - Pages: 20
...EXECUTIVE SUMMARY MPLS, or Multiprotocol Label Switching, is a next generation, more intelligent nnetwork that will enable companies to expand their current infrastructures to do a wide variety of services. Since MPLS is independent of access technologies, it will allow subscribers to access differing access links without changing their current environment. MPLS takes the control of IP routing and combines it with layer 2 switching to give a seamless solution to the many needs of companies today (Semeria, 1999). The goal of MPLS was to standardize protocols that used label-swapping forwarding techniques to support unicast and multicast routing (Yuan, 2002). Many ISP networks today are built using an overlay model, in which IP’s topologies run independent of layer 2 switch topology, such as ATM and Frame Relay (Semeria, 1999). MPLS took advantage of the rapid advances in semiconductor components and focused on separating the routing and forwarding problems from each other; layer 2 switches provide high-speed connectivity, while IP routers, interconnected by a mesh of layer 2 circuits, provide intelligence to forward IP datagrams (Semeria, 1999). With these two topologies combined, you are able to get a fast, intelligent network. MPLS is used by many network operators today because it can support a diverse legacy system as well as modernize them for next-generation applications (Cisco, 2013). Because of its many uses, MPLS can be used to facilitate many different forms of...
Words: 1246 - Pages: 5
...Data Communication Concepts I Instructions: Insert your answer after each question in a bold red typeface. When complete, attach the document as your submission for this assignment. You may name your answers document any name you choose. Once I score your document it will be named [Last Name][First Name], and returned to you as an attachment to my feedback. When your answer consists of a list of items, please enter only one list-item per line. This helps speed the scoring process. Name: ________Hugo Tinoco sanchez ___________ Assignment Questions: Describe the responsibilities and scope of authority for each of the following government organizations. You may need to review the discussion on the ITU from chapter one: ITU Responsible for issues that involve information and communication technologies. Coordinates global use of the radio spectrum. Based around improving telecommunication infrastructure around the world. FCC b. An agency which regulates interstate and international communications by radio, tv, wire, satellite and cable in all 50 states, D. of Columbia and U.S territories. Media regulations for new technologies. PUC c. Regulates communications with individual state border lines. Unlike the FCC which is country wide, and ITU which is globe world wide. The textbook states that “a CSU/DSU is the WAN equivalent of a NIC in a LAN”. This is where the CSU/DSU is located in the connectivity path, but this does not explain...
Words: 1443 - Pages: 6
...Frame Relay Migration to MPLS Frame Relay is a standardized wide area network technology that specifies the physical and logical link layers of digital telecommunications channels using a packet switching methodology. Multiprotocol Label Switching (MPLS) is a mechanism in high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table. Frame Relay aimed to make more efficient use of existing physical resources as clients were unlikely to be utilizing a data service 100 percent of the time. In more recent years, Frame Relay has acquired a bad reputation in some markets because of excessive bandwidth overbooking by these telcos. Telcos often sell Frame Relay to businesses looking for a cheaper alternative to dedicated lines; its use in different geographic areas depended greatly on governmental and telecommunication companies' policies. Many customers are likely to migrate from Frame Relay to MPLS over IP or Ethernet within the next two years, which in many cases will reduce costs and improve manageability and performance of their wide area networks. Multiprotocol Label Switching (MPLS) enables Enterprises and Service Providers to build next-generation intelligent networks that deliver a wide variety of advanced, value-added services over a single infrastructure. This economical solution can be integrated seamlessly over any existing infrastructure...
Words: 755 - Pages: 4
...the AT&T website will have a listing for these services somewhere on the home page. Right now, from the AT&T home page, select the menu item that says Business. Under it, select the menu item that says Enterprise Business. On this page, look for Network Services. The Network Service page will show all of the services that AT&T can provide to a large business to connect their sites to each other, to other organizations, and to their customers. Thinking back to the basic networking courses you have taken, read these service descriptions, and then answer these questions. 1. What is a VPN as you understand it (before reading AT&T’s description)? (5 points) VPN (Virtual Private Network) allows for users to be able to connect to a private network over a public network medium such as the internet. 2. What is a VPN as AT&T describes it? (5 points) AT&T describes VPN as a highly secure...
Words: 706 - Pages: 3
...where there are no service provider networks? VPN WiMAX cable VSAT* 3 Which network scenario will require the use of a WAN? Employees need to access web pages that are hosted on the corporate web servers in the DMZ within their building. Employees need to connect to the corporate email server through a VPN while traveling.* Employee workstations need to obtain dynamically assigned IP addresses. Employees in the branch office need to share files with the headquarters office that is located in a separate building on the same campus network. 4 Which two technologies use the PSTN network to provide an Internet connection? (Choose two.) ATM ISDN* Frame Relay MPLS dialup* 5 Which geographic scope requirement would be considered a distributed WAN scope? regional one-to-one global local one-to-many many-to-many* 6 What are two advantages of packet switching over circuit switching? (Choose two.) A connection through the service provider network is established quickly before communications start. There are fewer delays in the data communications processes. The communication costs are lower. Multiple pairs of nodes can communicate over the same network channel.* A dedicated secure circuit is established between each pair of communicating nodes. 7 Which connectivity method would be best for a corporate employee who works from home two days a week, but needs secure access to internal corporate databases? VPN* WiMAX DSL cable 8 Place the options in...
Words: 834 - Pages: 4