Roadster Corp Network Management Case Study Project

User Generated

fueninav04

Computer Science

Description

*** PLAGIARISM IS NOT ACCEPTABLE AND APA FORMAT ONLY ***

WE ALREADY COMPLETED WEEK 1 .SO START WITH WEEK 2 .

INSTRUCTIONS:

  • Research Paper in in APA format. Plagiarism is not acceptable. (Please consider this top priority).
  • For all Activities (2-5) complete instructions are attached in beginning of the each paper activity. All instructions or tasks must be addressed.( Try to address all the information specified in each task )
  • Paper must be included all the references and in-text citations. The references must Not older than 3 to 5 years.
  • Also complete the final presentation mentioned in activity5.

Unformatted Attachment Preview

PROJECT DESCRIPTION As part of the final project, you will develop a comprehensive plan to manage, optimize, and troubleshoot an enterprise wide network for Roadster Corp., a fictitious leading car manufacturing giant. You'll analyze Roadster Corp.'s requirements and existing infrastructure to recommend the approach that Roadster Corp. should take to resolve its issues. You'll complete this assignment in five weeks. Each week, you'll work on a small component of the project. By the end of Week 5, you'll have a comprehensive plan developed for Roadster Corp. DESCRIPTION OF THE COMPANY/CASE Roadster Corp. is a leading car manufacturing giant with a worldwide presence. Currently, the company has offices in 15 locations across the globe and headquarters in the U.S. The company has five regional offices in strategic geographical locations, five manufacturing plants, and five sales and marketing offices spread across the globe. With a recent increase in demands and sales, the company has established three more branches leading to congestion on the company's existing network. There has also been a series of intrusions and breaches in the last 8-9 months. In the near future, the company plans to add three more offices, but the current state of network performance has discouraged the company to expand further. The company anticipates that the network might virtually collapse. Assume that the company has hired you as a network administrator to manage, optimize, and troubleshoot its enterprise-wide network. Specifications for designing the network are: • • • • • Assume that the company headquarters has 18 servers including Enterprise Resource Planning (ERP), mail, application, and database. Assume that each location has 10 servers, 50 desktops, and 12 printers. Assume that all the locations are connected through Cisco routers. Assume that each of the locations has Cisco switches to create a LAN. Assume that an ERP application is running on the network because of the variation in the locations of branches. Based on the description given, you will perform the following tasks as a weekly final project assignment: Week 2 Project Project - Project Design Network design is considered a key element in network management. It is no longer acceptable just to design and implement a network that optimally services the needs of the organization today. In the design phase, you anticipate the future requirements and take into account scalability of design and technology choices. This week, you will revise the project plan you created in Week 1 for Roadster Corp. to incorporate specific network design elements. Based on Roadster Corp.'s requirements, develop a design document that recommends the various tools and technologies that will be used to address Roadster Corp.'s networking requirements. Your design document should include the following elements: • Hardware and software components • Tools to be used • Technologies used and how they will keep pace with growth • Security concerns • Performance concerns For each element, the design document should justify how it will address Roadster Corp.'s specific requirements. The document should also identify and address any security or performance concerns. Week 3 Project Project – SNMP Elements In Week 2, you identified the tools and technologies you would be using to address Roadster Corp.'s networking issues. This week, you'll focus on how the SNMP protocol will be used to manage the proposed design. Based on Roadster Corp.'s requirements, extend the design document you created in Week 2 to include the strategy for implementing SNMP elements. The design document should focus on: • SNMP agents • SNMP traps • SNMP security • MIB object For each element, the design document should specify how it will be used to address Roadster Corp.'s specific requirements. Week 4 Project Project – RMON Probes In Week 3, you included the SNMP elements to implement the connectionless communication between Roadster Corp.'s network devices. This week, you'll focus on how RMON probes capture information to monitor the traffic and how the information will be used for the management of the overall environment. Based on Roadster Corp.'s requirements, extend your design document to include RMON probes and identify: • The locations where these probes will be added and state the reasons for this placement. • The parameters that will be monitored and reported by these probes. • The process of communication between the network management stations and these probes. The document should provide the information that RMON probes will capture and should explain how it can be used for managing the overall environment. Week 5 Project Project – Test Plan In Week 4, you planned how the RMON probes will be used to capture information and monitor Roadster Corp.'s network traffic. This week, you will identify the various activities that should be performed to ensure that the proposed solution will fulfill Roadster Corp.'s requirements. Develop a test plan document for Roadster Corp. The test plan should include the activities to test the following elements: • Software components • Hardware components • Protocols Make sure that you specify manual or automated testing for the activities to be performed. While working on the test plan, consider testing as working in different parallel dimensions. Focus on dimensions including: • Feature testing • Corner case testing • Interface testing • Random testing • Directed testing Make sure your test plan is not limited to only these dimensions. In addition, your test plan should identify the error reporting mechanisms and the personnel responsible for each activity. Final Presentation You will have now developed a comprehensive plan to manage, optimize, and troubleshoot the enterprise-wide network of Roadster Corp. In this last part, you will collate your findings and present an analysis in the form of a PowerPoint presentation. The presentation should: • State Roadster Corp.'s requirements. • Identify the approach for the plan. • Present the proposed business solution. • Identify the resources and budgetary requirements. • Identify the security and performance concerns, if any. The presentation should also support your choices with appropriate rationales and explain how the solution addresses Roadster Corp.'s requirements. Create the presentation of approximately 10–12 slides.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

The files below contain complete work of your assignment. Kindly let me know if you need any clarification.

Running Head: NETWORK MANAGEMENT PROJECT OUTLINE

Network Management Project Outline
Name
Institutional Affiliation
Date

1

NETWORK MANAGEMENT PROJECT OUTLINE

2

Network Design
Introduction
Thesis statement: Network design is key in every network since it shows how different
components are interconnected. It is also used during troubleshooting and expansion of the
network. In other words, network design helps in understanding the network of an organization.
For this reason, the design should provide useful information about the network architecture and
it should be easy to understand.
Hardware and software components
Answer
Tools
Answer
Architecture
Answer
Technologies used
Answer
Security concerns
Answer
Performance concerns
Answer

NETWORK MANAGEMENT PROJECT OUTLINE

Network Management
Introduction
Answer
Requirements
Answer
Resources
Answer
Budget
Answer
Milestones
Answer
Risks
Answer

3

NETWORK MANAGEMENT PROJECT OUTLINE

SNMP Elements
Introduction
Answer
SNMP agents
Answer
SNMP traps
Answer
SNMP security
Answer
MIB object
Answer
SNMP Installation
Answer

4

NETWORK MANAGEMENT PROJECT OUTLINE

RMON Probes
Introduction
Answer
Location of probes
Answer
Monitored Parameters
Answer
Communication Process
Answer
Information to be captured
Answer

5

NETWORK MANAGEMENT PROJECT OUTLINE

Test Plan
Introduction
Answer
Hardware Components Testing
Answer
Software Components Testing
Answer
Integration Testing
Answer
Protocols Tests
Answer
Corner Case Testing
Answer
Acceptance Testing
Answer

6

NETWORK MANAGEMENT PROJECT OUTLINE

References
List of referenced work.

7


Running Head: NETWORK MANAGEMENT PROJECT

Network Management Project
Name
Institutional Affiliation
Date

1

NETWORK MANAGEMENT PROJECT

2

Network Design
Introduction
Network design is key in every network since it shows how different components are
interconnected. It is also used during troubleshooting and expansion of the network. In other
words, network design helps in understanding the network of an organization. For this reason,
the design should provide useful information about the network architecture and it should be
easy to understand.
Hardware and software components
The following are the hardware components to be used:
Dell Server Hardware
The server hardware will be responsible for running operating systems that will host most of the
software. For example, the firewalls will run on the server hardware. Other operating systems
such as Fedora Server and Windows Server 2012 R will rely on the same to function.
Cable modems
The modems will convert optical signals from fiber cables or analog signals from the satellite to
digital data understandable by computers. These modems are crucial since they are the main
entry to the internet. They are provided by the Internet Service Provider.
Routers
Routers are responsible for routing network traffic between the public network and private
network. They also direct network to the DMZ in case of suspicious activities or unwanted traffic
(Peisert et al., 2017). Routers are key in separating networks in the organization.

NETWORK MANAGEMENT PROJECT

3

Switches
Switches extend the number of connections points. They provide a quick way of directly
connecting hosts. They are plug and play devices and require little or no configuration.
Wireless Access Points
Wireless access points broadcast Wi-Fi network which is accessible by mobile devices such as
smartphones and laptops. Access points are important in offices since most of the current devices
are wireless. By having wireless devices the offices will have a quick way of connecting devices.
The following are the software components to be used:
Fedora Server/ Windows Server 2012 R
The server hardware relies on the operating system so that it can run various services. Fedora
Server and Windows Server 2012 R provide several tools which are useful in network
management. Operating systems also provide a platform for installing other tools such as DNS.
Services such as mail protocols, storage, web services, and others will run from these platforms.
pfSense
pfSense is a standalone firewall useful in filtering the network. The firewall rules have to be
configured for the firewall to be effective. The good thing with pfSense is that it does not require
an operating system so that it can run from it. It uses UNIX like architecture with only firewall
operations which makes it fast in a network set up.
Tools
The following are the tools to be used:

NETWORK MANAGEMENT PROJECT

4

AlienVault
This tool helps a lot in monitoring activities on servers and other devices. Changes made on
configuration files are reported by the tool hence lowering chances of malicious configurations
going unnoticed. In network, there will be a lot of logs from different devices and it is important
to track the logs and handle any emerging issue. With AlienVault tool it becomes easy to manage
logs since it provides reporting mechanisms. Also, the tool has an online community which
shares details of recently discovered attacks helping network administrators to prevent them. For
more extended features Secrityonion tool can also be installed as well.
RMON Probes
RMON Probes will help a lot in network management. These probes are placed in strategic
locations to monitor the flow of network traffic. The probes help in monitoring various
parameters of the network as well as reporting.
Nxfilter/Nxcloud
Nxfilter is an open-source software installable on any platform and it is used as DNS. The
software has a good interface for managing domain names and monitoring DNS requests. It will
be used for filtering unwanted requests in the network. Another advantage of Nxfilter is that it
provides statistics of the network which are printable.
Nmap
Nmap is a powerful tool for mapping network. This tool will be useful during network
troubleshooting. Nmap also provides a graphical presentation of the network devices on various
levels depending on the user commands.

NETWORK MANAGEMENT PROJECT

Architecture
The diagrams below show the network architecture to be used:

5

NETWORK MANAGEMENT PROJECT

6

NETWORK MANAGEMENT PROJECT

7

Figure 1: Author's diagram of branch network connections

Figure 2: Author's diagram showing how various branch networks will be connected.
All branches of the company will share the same architecture and they all be connected through
the internet. In each branch, a cable modem will be used to connect the branch to the internet.
The modem is provided by an internet service provider. From the modem, the connection will go
through an external firewall for filtering then to the router.
The router will create a DMZ network and internal network. In the DMZ network, there will be
servers that do not contain sensitive data and have low-security level so that they can act as
honeypots (Dadheech, Choudhary & Bhatia, 2018). In the internal network, the connection will

NETWORK MANAGEMENT PROJECT

8

go through an internal firewall for more filtering. Then a core switch will be connected to the
internal firewall. It is from this core switch where an extra switch can be installed if expansion is
needed. Servers, access points, and staff computers will be connected from the core switch. In
this way, devices will be able to communicate while making sure that the network traffic is
filtered. Extra tools will be installed in servers to make sure that the network is monitored too.
Technologies used
The speed of CPU processing power keeps increasing over time. This means as the network
grows with time there will be more powerful devices on the market. The more the powerful the
device the more it can handle more bandwidth and devices.
Operating systems such as Fedora Server, Windows Server 2012 R and pfSense are easy to
update. The updates address performance as well as security concerns. Also, the systems are
easily cloned and migrated to new powerful hardware installed in the network.
In Wi-Fi networks, the 802.11ax standard is used since it has high performance and supports
many wireless devices. It will be easy in the future to replace the wireless access points with new
ones that have updated standards. The reason is that the access point configurations are
centralized.
Security concerns
The following are the major security concerns in the network:
Insider
Many security incidents occur due to human error. Also, many network administrators focus on
external threats and forget the internal threats posed by insiders. An insider can do a lot of harm
to the internal network compared to an outsider. For this reason, employee behavior will be

NETWORK MANAGEMENT PROJECT

9

monitored to reduce the chances of an insider compromising the network. Staff members will be
educated on various aspects of computer security to reduce the probability of human error.
Sniffing
Packet sniffing can occur at any level of the network. This is a major concern since sniffing can
compromise confidentiality while packet playbac...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags