IT 640 Milestone Two
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
Q2726
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
7
Uploaded by SuperHumanSheep1739
Milestone Two
Corey MacFadden
Southern New Hampshire University
IT:640 Telecommunications/Networking
Farooq Afzal
10/22/2023
Milestone Two
Network architecture forms the structural foundation of an organization's technological infrastructure, encompassing a diverse range of components, from hardware and software to communication protocols and connectivity options. In the context of SNHUEnergy Inc., this exploration presents a valuable opportunity to gain insights into their network architecture. By scrutinizing traffic patterns, we can uncover critical insights into the company's operational dynamics and provide recommendations for bolstering network capacity and security. Our aim is
to create a comprehensive visual representation of the network's end-to-end path flow, accomplished by crafting a detailed Visio diagram that illustrates traffic flows and network elements.
Physical Network Devices
By reading the scenario, we can identify most of the infrastructure’s physical devices. SNHUEnergy Inc. uses network routers, switches, and a single firewall to direct and handle all the traffic both offices use. A WAN is used to connect the offices together and then the internet is provided through the Dallas Office. In addition to the network devices that are in use the company utilizes multiple applications and SQL Servers talking with multiple end points.
Critical Traffic Patterns
In the Traffic Flow WireShark Capture we can identify four different protocols being utilized. RTP is the most utilized in the traffic flow, so we need to keep that in mind moving forward with recommendations as we want to ensure reliability and not have bandwidth issues during real time traffic utilized for VOIP. VOIP also appears to be the only external communication that is made during the capture between 67.16.104.172 & 10.0.6.73. The second
most used protocol is MySQL which means access to the applications and servers that are available are typically heavily used. We can also note light TCP traffic and only one internal encrypted message between the devices 10.0.6.73 & 10.1.0.248. Patterns Across the infrastructure
Currently, the network comprises a wide area network (WAN) that connects the Dallas office (housing human resources, accounting, and payroll) with the Memphis office (responsible for billing and operations). The company has plans to expand to two additional regional offices in Kansas City and Houston, making it essential to assess the existing traffic patterns and the future requirements.
The primary communication pathways include TCP/IP traffic, which facilitates data, voice, and video applications across the organization. This traffic enables the exchange of information within the company's various departments and supports key critical applications such as human resources, email, and Voice over Internet Protocol (VoIP). As the organization expands, the traffic patterns will extend across the WAN, emphasizing the significance of TCP/IP communication processes in ensuring seamless connectivity between different offices and the efficient flow of information.
Performance Issues: One of the primary concerns for SNHUEnergy Inc. in their network infrastructure is the potential for network congestion and scalability challenges. As the company experiences growth and adds new regional offices, there's a risk of network congestion,
particularly on the existing WAN. The expanding user base and the increased volume of data, voice, and video traffic may lead to performance bottlenecks, which can hamper productivity. Furthermore, the reliability of the network infrastructure is paramount, as any downtime or hardware failures can result in significant disruptions to business operations, especially as the
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
company grows and relies heavily on seamless communication. As of right now the network has too many single point of failure items to be considered reliable and ready for growth. With no change to the current infrastructure and having expansion take place the offices will run into congestion and reliability issues due to the current setup. The use of a wide area network (WAN) and TCP/IP communication for future expansion introduces concerns about latency and the need for Quality of Service (QoS) measures. Latency issues, especially in real-time applications like VoIP, will impact the quality of communication. Without implementing QoS mechanisms to prioritize critical applications over less time-sensitive
traffic the user experience will be anything but seamless. Additionally, without effective bandwidth management and the user count continues to grow, users will begin to experience slow speeds on their network and some people may even be kicked off completely. Without implementing strategies like traffic shaping and prioritization is necessary to efficiently allocate network resources, we are not ensuring that vital applications receive the necessary bandwidth while optimizing overall network performance.
Security Issues:
As SNHUEnergy expands, so does the potential for threats to their business. The most important among these concerns is the threat of data breaches, as the company handles sensitive data related to oil and gas exploration, transportation, and refinement. Without a robust security framework in place, the risk of unauthorized access to this critical data significantly increases. The absence of proper access controls and user authentication mechanisms leaves the door open for unauthorized personnel to enter crucial systems and data repositories, potentially leading to data loss or tampering. To address these concerns, a comprehensive security strategy must be implemented.
Additionally, the scenario highlights concern regarding intrusion detection. Without adequate intrusion detection systems, the company may remain unaware of malicious activities occurring within the network. This lack of visibility can result in delayed responses to security incidents or, in some cases, an outright failure to detect them. Insider threats pose a unique challenge that necessitates a comprehensive security strategy.
Compliance with regional and industry-specific regulations is a significant concern, with the potential for legal and financial repercussions. Considering the expansion of the company and offices will be in different jurisdictions, each office might have different data laws or regulations they will need to follow. Visual Representation:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
For additional information on APA Style formatting, please consult the APA Style Manual, 7th Edition
.