Network Design and Directory Structure of Talon Textile Fasteners

Verified

Added on  2023/04/19

|16
|2928
|115
Project
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Network Design and Directory Structure of TTF
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Summary
The purpose of this report is to analyse the network requirements of Talon Textile Fasteners
(TTF) and suggest an upgraded network design that meets the demands of the expanding
business. The report starts by summarizing the requirements in a requirements specification
table and proceeds to suggest the upgraded network design while also mentioning the IP
address related specifications. Then the components of the active directory are explained by
talking about the Sites, Organizational Units and Groups where added focus is given on role
of users with respect to the organizational units and domains. Thereafter the server layout and
role are discussed and various project specific documents like sign-off, task list and test plan
are given. Then the report lists the maintenance plan and discusses about router and server
specifications afterwards. The report then ends with conclusions drawn from the study.
Document Page
2NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Table of Contents
Introduction................................................................................................................................4
Discussion..................................................................................................................................4
Requirements Summary.........................................................................................................4
Upgraded Network Design.....................................................................................................5
Active Directory.....................................................................................................................6
Sites....................................................................................................................................6
Organizational Units..........................................................................................................6
Groups................................................................................................................................6
Server specifications..............................................................................................................7
Number and location..........................................................................................................7
Server Role.........................................................................................................................7
Approval sign-off document..............................................................................................8
Server maintenance plan............................................................................................................9
Router Specifications...........................................................................................................10
Security plan and policy.......................................................................................................11
Defence in depth..............................................................................................................11
Perimeter Design..............................................................................................................11
Remote Access.................................................................................................................12
Threat Identification.........................................................................................................12
Policies.............................................................................................................................12
Disaster Recovery................................................................................................................12
Document Page
3NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Conclusion................................................................................................................................13
Bibliography.............................................................................................................................14
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Introduction
The report aims to analyse the requirements of Talon Textile Fasteners (TTF) so that
it can suggest the upgraded network design for the company. The study begins by listing the
requirements summary in a tabular format, following which the upgraded network design is
provided and also mentions the IP address related specifications. Thereafter the components
of the active directory are discussed namely – Sites, Organizational Units and Groups by
emphasizing role of the users. Thereafter the layout and role of the servers present in the
network are talked about in the server specifications sections. Then the various documents
regarding sign-off, server task list and the test plan are provided. After mentioning the router
specifications, the security plan of the network is given. Then the report ends with concluding
notes where observations are given based upon the report.
Discussion
Requirements Summary
Branch Servers Workstations Connections Floors
HQ 3 37 40 3
Mt Burr 2 23 25 2
Pt Pirie 0 1 1 1
Pt Adelaide 1 5 6 1
H-Burr 2
HQ-Pirie 2
HQ-Adelaide 2
Document Page
5NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Upgraded Network Design
Figure 1: Network Design of TTF
Major Network chosen for the design: 172.16.123.0/25
IP addresses available in the network: 126
Required IP addresses for the network: 78
Total IP addresses available from all allocated subnets: 106
The headquarters of the company is located in Adelaide near another branch Pt
Adelaide. Operations, warehousing, distribution and manufacturing are performed in the
headquarters with some overflowing tasks being conducted from Pt Adelaide which possess
‘Lines for All Purposes’.
Document Page
6NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Active Directory
Sites
The headquarters of the company is located in Adelaide along with the branch of Pt
Adelaide. Other sites include branches of Mt Burr and Pt Pirie. This means, in the active
directory of TTF there exists four different domains – one for each site.
Organizational Units
The different organizational units of Talon Textile Fasteners are:
Operations
Sales
Finance
Information Technology
Out of the above organizational units, operations exist in all the branches/sites with the
headquarters and Pt Adelaide executing most of the operational tasks. This suggests that other
sites have more than one organizational unit in their domain.
Groups
The different groups in which the stakeholders should be placed are:
Data Entry Officer – Domain user
This is because, for data entry tasks one domain is enough and they do not have the
requirement to be present in multiple sites.
Manufacturing supervisor – Global administrator
Manufacturing like operations is also performed in multiple branches and hence
manufacturing supervisors will be required to visit these sites and work with the installed
systems and hence requires access for multiple domains.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Sales manager – Domain user
Sales is another set of activities that do not require multiple branches, but even then,
sales managers are assigned to oversee activities in their own site and therefore only require
accesses to single domain only
Manager of operations – Domain user
Although operations are conducted in all branches, operations managers like sales
managers are asked to oversee activities of their site and so single domain access is enough.
CEO – Global user, CFO – Global user, CIO – Global user
These people belong to the CXO level and often travel across multiple sites within
and beyond the company and hence require global access.
IT Administrator – Global administrator
Since the IT administrators are responsible for maintaining the network uptime and
require access to every part of the network, they get global access.
Server specifications
Number and location
The company network has a total of 6 physical servers out of which 3 are located in
the headquarters, 2 at Mt Burr and the other one is in Pt Adelaide. The 3 servers in different
branches all perform network specific workloads.
Server Role
The main roles played by these servers is facilitating communication channels with
among the network including two-way connections between the headquarters and Pt Adelaide
so that operations, manufacturing, distribution and warehousing specific tasks can be
performed without a hitch. Out of the 3 servers in the headquarters, one is used for processing
Document Page
8NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
transfer of mails and messages. Another server is used for storing information while the other
one is being used to ensure security.
Approval sign-off document
Name and Title of Approver Decision Reason for Rejection Date
Project Manager Approved
Rejected
02.04.20
19
Business Analyst Approved
Rejected
02.04.20
19
Lead Architect Approved
Rejected
02.04.20
19
Sponsor Approved
Rejected
02.04.20
19
Approved
Rejected
Figure 2: Approval sign-off document
# Date Activities/Tasks/Items Priority Status
1 01.04.2019 Operations High In Progress
2 01.04.2019 Manufacturing Medium Delayed
3 01.04.2019 Sales High Not yet begun
4 01.04.2019 Operations Medium Delayed
5 01.04.2019 Finance Medium In Progress
Document Page
9NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
6 01.04.2019 Manufacturing Medium Not yet begun
Figure 3: Server Task list
ID TC_R1
Description Ensure all data is consistent among all
servers
Precondition Target server is configured, turned on and
an existing server added the server
Action Server which added the new server ensures
data between the servers are similar
Expected Result Target server has similar data which is
consistent with all other servers
Failure Condition 1. Target server does not have all data
2. Data in Target server is not the same
Figure 4: Server Test Plan
Server maintenance plan
The server maintenance plan generally requires several steps, including:
checking of log files of servers
assessing of hard disks
examination of folder permissions
monitoring applications for reading network temperature
ensuring acceptable redundancy in systems
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
examination of security features
installing patches for security software
reading of server logs for checking security specific alerts or even evidence of
attempts for hacking
updating security applications of all computers in the network
installing critical updates like service packs, bug fixes and other software updates
Router Specifications
Router chosen: Cisco 2800 series
Specifications:
2 Integrated 10/100 Fast Ethernet ports. > 4 High-Speed WAN Interface Card Slots
AC-IP max in-line power distribution: 160W
DC Input Voltage: 24 to 60 VDC
Optional integrated inline power (PoE): Yes
A total of 4 of these routers are chosen, one for each site. The network routed among
each other and switches are used to distribute the network from router to individual devices
like servers and clients.
Cables chosen to connect the routers is Fast Ethernet while Gigabit Ethernet cables
are used for connecting the individual devices to the switches.
For creating the different subnets for each of the four routers, Classless Inter Domain
Routing (CIDR) based subnet calculation is performed.
Third party applications like Wireshark can be used to detect and monitor the traffic
of the network in real time as also keep the sessions recorded.
Document Page
11NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Security plan and policy
Defence in depth
The security of the network is ensured by hardware and software level security
solutions installed in the servers that form the perimeter network of the company. The server
performs the role of a firewall and ensures authentication, proactive threat detection and real-
time monitoring services. To do this the industry leading SOPHOS security solution is being
used. SOPHOS is mostly known for their security solutions for businesses and enterprises.
Next the SBS server comes equipped with ISA server 2000 which isolates the intranet from
the servers which require public network access and provides additional security features. On
top of this, every client computer and server present in the network have antivirus and
antimalware security applications installed which provide similar security features like the
firewalls in addition to detection and removal mechanisms to prevent security risks from
human errors. They act as a second layer of security if by any means, the firewall gets
compromised. While the firewall device secures the network at the physical and data link
layers the software based firewalls and other security applications secure the network in other
five layers of OSI reference model. The individual security applications also help when
removable drives are being connected to the client computers. It is here that most of the
attacks to client computers in workplaces occur.
Perimeter Design
The perimeter network of the company involves securing the web and mail servers
from threats over the internet. However these devices require public access from outside the
company network for business purposes. Therefore further security is needed to secure the
internal network of the company. This is ensured by the SBS server which is equipped with
ISA Server 2000 – a solution designed for windows 2000 platform for management,
networking and authentication purposes. The web server and the mail server is connected to
Document Page
12NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
the network through the firewall with specific DMZ interfaces for each. This makes sure the
website is still up if the link for the mail server fails. Thus the perimeter design ensures
certain level of security for that the web server and mail server the services of which are
accessible by the public. The intranet being isolated from these servers is totally secured from
malicious cyber actors.
Remote Access
Since the network consists of LAN groups together creating a WAN, remote access
can easily be used through the default windows application – Remote Desktop
Threat Identification
As the network heavily relies on emails and messaging based communications, the
threat of remote execution of malicious code is identified to most affect the network
components and devices. To mitigate the risk, organizational members needs to stay alert and
grow awareness on cybersecurity.
Policies
It is also recommended for members of the company to lock their accounts when their
task is done so that misuses do not occur.
More importantly it is advised not open suspicious emails and messages and
compromise systems directly. Only emails from trusted sources should be opened.
Lastly one must not forget to keep the anti-malware solutions updated as newer
security threats are getting discovered every day.
Disaster Recovery
The primary concerns of branch offices and other remote locations of a business are
the dependencies on the central office or recovery site. This suggests that the ultimate
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
outcome of the data of local offices is in control of the headquarters only. In the event of
disasters like network or power outages the branch offices may lose all data. These data are
regularly updated with the database of headquarters which can resupply the data to the
affected branch. If such outages occur in the headquarters this kind of recovery is no longer
possible and hence the headquarters must be subscribed with multiple ISPs as well as acquire
generators and UPS devices. This makes sure the data needs of all branches are secured by
the headquarters and it also saves cost by reducing disaster recovery measures to be installed
in one particular site. In this way adequate countermeasures against disasters can be adopted
by TTF.
Conclusion
In conclusion the report succeeds in summarizing the requirements based on which
the upgraded network design is suggested. It is observed from the IP address specifications
that there is still room for further expansion if the company chooses to. Then the report
proceeds to the active directory section where it can be clearly noted how emphasis is given
in defining the roles of the different users and stakeholders in great detail with respect to the
organizational units. Then the report moves to the server specifications where the server
layout and roles are explained. Thereafter the sign-off document is given followed by the
server task list and the server test plan. Next the server maintenance plan is provided by
listing each step followed by the router specifications and the Security plans and policies. It is
noted that the suggested changes is certain to pay dividends to the company.
Document Page
14NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Bibliography
Bonica, R., Cotton, M., Haberman, B. and Vegoda, L., 2017. Updates to the Special-Purpose
IP Address Registries (No. RFC 8190).
Hasan, T. and Ogale, N., 2017. Remote Desktop control (RDC).
Hernandez, L., Jimenez, G. and Marchena, P., 2018. Energy Efficiency Metrics of University
Data Centers. Knowledge Engineering and Data Science, 1(2), pp.64-73.
Huang, J., Down, D.G., Lewis, M.E. and Wu, C.H., 2018, June. Dynamic scheduling and
maintenance for a two-class queue with a deteriorating server. In 2018 Annual American
Control Conference (ACC) (pp. 3197-3202). IEEE.
Khalaf, A.M., El Salam, M.S.A. and Ahmed, K.A., 2017, February. Investigation of different
ethernet wiring and different frame size to enhance the performance of LAN. In 2017 19th
International Conference on Advanced Communication Technology (ICACT) (pp. 787-796).
IEEE.
Leon, A.F.H., Parra, O.J.S. and Bermudez, G.M.T., 2018. LAN-WAN-LAN end-to-end
Network Simulation with NS2. International Journal of Applied Engineering Research,
13(17), pp.13136-13140.
Solomon, A., Obiniyi, A.A. and Adeyi, T.S., 2016. A Performance Study of IPV6 Multicast
Routing over a Dual Stack Virtual Local Area Network. International Journal of Computer
Applications, 147(10).
Stallings, W., 2015. Gigabit Ethernet: from 1 to 100 Gbps and beyond. Internet Protocol J,
18(1), pp.20-32.
Document Page
15NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Starov, O., Dahse, J., Ahmad, S.S., Holz, T. and Nikiforakis, N., 2016, April. No honor
among thieves: A large-scale analysis of malicious web shells. In Proceedings of the 25th
International Conference on World Wide Web (pp. 1021-1032). International World Wide
Web Conferences Steering Committee.
Stiawan, D., Idris, M.Y.B., Abdullah, A.H., AlQurashi, M. and Budiarto, R., 2016.
Penetration Testing and Mitigation of Vulnerabilities Windows Server. IJ Network Security,
18(3), pp.501-513.
van Do, T., Noll, J., Dixit, S., Dzogovic, B. and Feng, B., 2018, July. Reducing Inequalities
with 5G Internet Light Network Slice. In 2018 IEEE 5G World Forum (5GWF) (pp. 38-43).
IEEE.
Wepman, J.A., Bedford, B.L., Ottke, H. and Cotton, M.G., 2015. RF sensors for spectrum
monitoring applications: Fundamentals and RF performance test plan. NTIA Report, pp.15-
519.
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]