Intel Network Infrastructure: Objectives and Design Presentation

Verified

Added on  2022/08/18

|13
|862
|11
Presentation
AI Summary
This presentation offers an in-depth investigation of Intel Corporation's network infrastructure. It begins with a business description of Intel, highlighting its global reach and the necessity of robust network communications. The presentation delves into the methods of communication, including the use of advanced features like SDN and NFV for network management. It explores Intel's global network coverage, detailing how different continents connect and transmit data. The logical network design is explained, illustrating how connections are provided to end devices. A crucial aspect is the subnet classification, showcasing how Intel performs IP address allocation, supported by an IP table detailing subnet configurations for five countries. The presentation also covers various networking technologies, including VLANs and DHCP, and concludes with best practices for secure networking, such as using advanced security features and enterprise-class security suites. References to relevant research papers are provided. The presentation aims to give an understanding of how large corporations manage their networking activities.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
A Presentation on Intel
Network Infrastructure
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Objectives
The aim of this presentation is to identify a large corporation in the
computing industry and investigate their networking activities.
This includes getting an idea of the global reach of the network.
The investigation also requires to know the method by which such network
communications are being conducted.
The logical design is to explain how the connection is provided to the end
devices.
The subnet classification must show how the company performs the IP
Address Allocation.
Then the different networking technologies and protocols should be noted.
The presentation must also offer the best practices for safe networking.
Document Page
Business Description
The company that has been
chosen is Intel Corporation
(Lieder et al., 2019).
It is a US based multinational
semiconductor manufacturing
company.
It ranks as one of the top 50
among the Fortune 500
companies as per revenue
generation.
It currently employs over
110,200 employees.
Document Page
Network Communications
A company like Intel needs to have a network capable of supporting
communications from remote sites.
The large internal network requires use of advanced networking features
like SDN and NFV for better management (Tootoonchian et al., 2019).
Software Defined Networking (SDN) helps separate the control plane
and data plane (Shang et al., 2017).
Effective management of data centres, server farms and offices enable
optimal use of storage and computing resources for streaming services.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Global Network Coverage
The internal network of Intel is
spread over the major
continents of the world.
In each continent the network of
Intel forms an interconnect of
routers of nearby countries.
These interconnects transmit
network connections with one
another and provide the services
to specific routers.
Document Page
Satellite Communication
The interconnects of different
continents need to communicate
over long distances.
This is made possible with the
help of Satellites and Dishes.
Network interconnect of each
continent have their own dish
installed.
Document Page
Logical Network Design
The logical design shows how the
network is acquired by the
interconnect.
Then the network traffic is
transmitted to specific office routers.
This is done using the national
broadband network infrastructure.
Multilayer switch is used to distribute
the network to specific departments
through multiple VLANs.
Access layer switches are used to
directly connect the devices using
the specific VLAN.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Subnet Classification
Locati
on
Subne
ts
Ne
ed
ed
Siz
e
Allo
cate
d
Size
Networ
k
Addres
s
CI
DR
Subnet
Mask
IP
Address
ing
Range
Broadcast
Address
China 650
0
8190 121.161.
64.0
/19 255.255.
224.0
121.161.
64.1 -
121.161.
95.254
121.161.95.
255
Vietna
m
450
0
8190 121.161.
96.0
/19 255.255.
224.0
121.161.
96.1 -
121.161.
127.254
121.161.127
.255
Israel 105
00
1638
2
121.161.
0.0
/18 255.255.
192.0
121.161.
0.1 -
121.161.
63.254
121.161.63.
255
USA 520
00
6553
4
121.160.
0.0
/16 255.255.
0.0
121.160.
0.1 -
121.160.
255.254
121.160.255
.255
Canad
a
450 510 121.161.
128.0
/23 255.255.
254.0
121.161.
128.1 -
121.161.
129.254
121.161.129
.255
The IP table provides the subnet
configuration for 5 of the 14
countries where Intel operates.
This IP table includes the subnet
names, IP requirements, allocated
space, network and broadcast
addresses, network masks and
range of assignable IPs.
Details regarding the above are
provided for offices of each of the
five countries that were
investigated.
The major network chosen for the
subnet classification is
121.160.0.0/14.
Document Page
Networking Techniques
To make different network partitions for
different departments, server farms,
data centres and WLAN network, virtual
Local Area Network (VLAN) is used.
These VLANs help further secure the
network by specifying rules and
permissions through ACL commands in
the router.
IP addresses are automatically allocated
to smart devices over WLAN and to the
end devices and generic servers
through DHCP.
Exception to DHCP are Web Server, DNS
Server and FTP Server.
Document Page
Best Networking Practices
To ensure secure networking services, the following networking practices
are recommended:
Use of advanced security features provided by the network routers and
switches.
Comprehensive enterprise class security suites must be installed in
every system.
Sensitive data must be prohibited from being stored locally in client
systems.
Use of strong passwords must be recommended to all users.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Conclusion
The presentation identifies the objectives to investigate the networking
activities of large corporations.
A large corporation with specific requirements is identified and
descriptions are provided.
The network designs are provided and discussed.
The subnet classification is given through the IP table and is discussed.
The different networking technologies that get used are discussed.
Best networking practices for safe networking are given.
Document Page
References
Lieder, I., Segal, M., Avidan, E., Cohen, A., & Hope, T. (2019). Learning a
faceted customer segmentation for discovering new business
opportunities at Intel. arXiv preprint arXiv:1912.00778.
Shang, G., Zhe, P., Bin, X., Aiqun, H., & Kui, R. (2017, May).
FloodDefender: Protecting data and control plane resources under SDN-
aimed DoS attacks. In IEEE INFOCOM 2017-IEEE Conference on
Computer Communications (pp. 1-9). IEEE.
Tootoonchian, A., Panda, A., Lan, C., Walls, M., Argyraki, K., Ratnasamy,
S., & Shenker, S. (2018). Resq: Enabling slos in network function
virtualization. In 15th {USENIX} Symposium on Networked Systems
Design and Implementation ({NSDI} 18) (pp. 283-297).
Document Page
Thank You
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]