1
Networking Final Assessment
Michael Darnell Pitts Sr.
University of Massachusetts Global
Interpersonal Communication
Monica Shukla
April 5, 2024
2
Executive Summary
Computer networking involves connecting computer devices that can communicate, share
resources or share data with one another. They usually follow some specific rules (that is,
communication protocols) to send information across different types of connections, including
cables or wireless networks. Networking is one of the most crucial foundations of any
organization whether it is a small or large organization. In order to maintain and expand its
network, organization must always have a well-designed networking system. This will provide
room for future developments and modifications. The networking system should be easy to
understand and implement, new user or system integrator should be able to figure out the logic in
minimal time. This will also be more cost efficient as the system would be well understood and
nobody would make any changes that would jeopardize the whole system. But the first and the
foremost criteria of any network is that it should be reliable.
All the tasks performed on the network are dependent on the reliability of the network. If
the network fails even once, it results in loss of data and loss of precious time of the user. This
gives a very bad image of the system in the eyes of the user. This might result in down gradation
of the system and in extreme cases user may also think of changing the whole system. So it is
very much necessary that the network be highly reliable. Last but not the least the network
should be fast enough to fulfill all the data transfer requirements. With the development of new
technologies, data is being stored and manipulated in different forms and at various instances.
The network should be able to cater to all such requirements and should also have provisions for
future advancements in data transfer speeds.
3
Introduction
Background of Computer Networking
The interconnection of multiple computers or devices, ranging from smartphones to large
servers, linked together for the purpose of communication or sharing resources is known as
computer networking.
The first functional network was funded by the U.S military with the creation of
ARPANET in the late 1960s (Russell, & Schafer, 2014). It was initially designed for government
researchers to exchange data despite the limitations of bulky computers, technology has
improved significantly since that time. Today, the internet (interconnected networks) is a vast
network of interconnected smaller networks that plays a central role in our daily lives.
Businesses of various sizes utilize networks to link employees' devices and shared resources like.
Computer networks play a crucial role in various aspects of our lives. From managing
traffic flow in cities, where systems provide real-time updates to officials and emergency
services, to enabling remote collaboration and monitoring of climatic weather condition in a
given environment. Hence, whenever we are performing video calls, streaming, file sharing,
messaging, or simply accessing the internet, we heavily depend on the smooth running of
computer networks.
Computer networking is a multidiscipline field that combines computer science,
engineering, and telecommunications to design, develop, create, maintain, and protect computer
networks. It involves designing, building, and safeguarding networks that connect computers and
allow them to communicate and share resources seamlessly (Solomon & Kim, 2021)..
4
Leading electronics producer and supplier ElekTron Industries is dealing with significant
challenges because of its current network infrastructure. ElekTron's outdated network
configuration, which has a main location in Los Angeles along with a secondary location in
Chicago, has been subjected to regular cyberattacks, resulting in system outages as well as
substantial downtime. These vulnerabilities, especially in the Domain Name System (DNS),
underscore the immediate need for an entire network upgrade (Smith, 2020).
The present infrastructure at ElekTron consists of 2 domain controllers operating
Elektron. Local domain in Los Angeles together with servers running Microsoft Windows Server
2008 R2. Nearly all the client PCs run Windows 7 or Windows 8. The inadequacies of this
configuration are compounded by the imminent inclusion of a brand-new remote location in
Washington, D.C., required by freshly awarded military contracts from the Department of
Defense. This expansion adds twelve extra staff members to the network, needing seamless
integration with current operations, while still fulfilling the strict government security procedures
(Johnson & Jackson, 2019).
The proposed solution, as a response to these concerns, would call for a thorough review
of the network infrastructure of ElekTron. The upgrade is designed to create a strong, scalable,
and secure networking environment that supports the future and present needs of the company.
The essential elements of the proposed solution are the implementation of modern networking
products, the use of advanced security measures, and the optimization of network protocols as
well as services (Brown & Miller, 2018).
This upgrade of the network is going to have several advantages. First, it will
considerably improve ElekTron's cybersecurity strategy, reducing the risks posed by cyber-
attacks and assuring compliance with federal protection requirements (Jones et al., 2021). The
5
suggested solution will reduce the likelihood of costly downtime and data leaks, while
simultaneously safeguarding ElekTron's operations and reputation, by increasing network
resilience and reducing vulnerabilities.
In addition, the improved network infrastructure will enable seamless communication as
well as collaboration across all locations, thus boosting efficiency as well as effectiveness
(Robinson, 2017). ElekTron personnel can access crucial applications and resources with no
disruption, enabling simplified business processes and accelerated decision-making, with
enhanced network throughput and reliability.
Additionally, ElekTron's expansion into Washington, D.C. provides a chance for the
company to establish itself as a trusted partner for federal contracts (Davis & Harris, 2020).
ElekTron could boost its competitiveness and credibility in the defense industry by aligning the
brand-new network infrastructure with the strict government security specifications, opening
avenues for future development and development.
The proposed network upgrade provides, in summary, an important investment in the
future success of ElekTron. ElekTron can strengthen its operations, empower its staff as well as
position itself for sustained development in a more digital world by dealing with the
inadequacies of the present infrastructure and developing contemporary network solutions.
a. The Major Components of Computer Network
A given computer network consists of two key components which are the
nodes/devices/computer and the links/edges that connects two or more nodes together for
exchange of information or sharing of resources.
6
Network Devices
As shown in Figure 1, there are many components or building blocks that makes up a
network, here are few of them:
i. Modem: This device allows computers to communicate through phone or cable
connections. It acts as an electronic translator, handling two key functions, that is
modulation (conversion of digital signals to an analog signals) and demodulation
(conversion of an analog signals to digital form).
ii. Mobiles or Computers: These are end devices or nodes that users often use in
communicating or sharing of information within a network, such as email originating
from the mailing application on a laptop or mobile phone.
iii. Network Interface Card (NIC): It’s also known as network adapter card, Ethernet Card
and LAN card. It's an essential hardware component in today's computers, facilitating
communication between network devices.
iv. Servers: Here is where the main computation and data storage occur. All requests for
specific tasks or data come to the servers. It’s like an engine room.
v. Routers: For processes and path selection, forwarding of data packets from one node to
another. It’s one of the most important components of a network system.
vi. Switches: A switch is a multi-port bridge. Multiple data cables or channels can be
plugged into switches to enable communication with multiple network nodes.
vii. Gateways: This is a component of the network that serve as the ‘gates’ between two
distinct networks.
7
Figure 1: Different Network Devices
b. Different Types of Network Topology
There are various form of network setup or topology or device/node layout or arrangement
depending on the need and requirement at a given point in time. Among them are: Star, Bus,
Tree, Mesh, Hierarchy, Ring, Daisy chain, Hybrid, etc.
Figure 2: Different forms of Network Topology
8
c. OSI Model
Open Systems Interconnection (OSI) is a framework that defines the architecture for
communication networks. It provides a set of protocols and standards that guide how devices
communicate with each other. The OSI model consists of seven distinct layers Each layer has
specific responsibilities and follows its own specific protocols.
i. Physical Layer
ii. Data link Layer
iii. Network Layer
iv. Transport Layer
v. Session Layer
vi. Presentation Layer
vii. Application Layer
The Protocol
These are set of rules or algorithms which dictate the way or how two or more devices or
component communicates across the entire network. There are different protocols defined at each
layer of the OSI model for a specific purpose. Some of these protocols are TCP, SMTP, IP, UDP,
FTP, DHCP, etc. A more detailed networking protocol is shown in Appendix 3.
Different Types of Computer Networks
Computer networks can be divided into various categories depending on many factors, one of
the ways is by considering the size of the network or complexity or the geographic scope of
networks. These can then be classified as:
9
i. Nanoscale networks: These are small networks that is a set of interconnected nano-
devices which are able to perform only very simple tasks, such as sensor.
ii. Personal area network (PAN): The size of a PAN ranges from a few centimeters to a
few meters that is within a very small area of coverage. For example, connection between
a Bluetooth earpiece and a smartphone.
iii. Local area network (LAN): Connects devices within a limited geographical area, such
as schools, hospitals, or office buildings.
iv. Campus area network (CAN): A collection of interconnected small LANs that are often
used by larger entities such as universities and governments.
v. Metropolitan area network (MAN): Connects multiple LANs across a large area but is
smaller than a WAN. It is usually a very large computer network that spans across a city.
vi. Wide area network (WAN): This covers larger areas for example large cities, states, and
even countries. It is the technology that connects business offices, data centers, cloud
applications, and cloud storage together for easy access, storing and retrieving of data.
vii. Virtual private network (VPN): This is an overlay private network stretched on top of a
public network.
viii. Cloud network: This is a WAN whose infrastructure is delivered via cloud services.
Based on organizational intent, networks can be classified as:
Intranet: A network owned and controlled by a single organization. Offers the highest level of
security, with access limited to authorized individuals. Typically located behind a router on a
local area network.
10
Internet: A vast network of interconnected networks, linked by routers and managed by
networking software. Connects various entities, including governments, businesses,
individuals, and organizations worldwide.
Extranet: Similar to an intranet, but with controlled connections to specific outside
networks. Commonly used to share information with approved external parties, such as
partners, vendors, or remote workers.
Darknet: This uses unique, customized communication protocols that runs on the
internet and can only be accessed by specialized software.
d. Proposed Network Design
The proposed network design for ElekTron Industries seeks to deal with existing
infrastructure challenges while laying a strong groundwork for future development. By
implementing this network design, ElekTron can effectively support its operations,
facilitate communication and collaboration among employees, and ensure the security
and availability of its network resources, The following are the design for ElekTron
business.
1. Device Types:
a. Routers: Connect multiple networks together and facilitate communication
between different unit/department. Appendix 1 “Network Devices Setup” shows the
diagrammatical representation of the network.
11
b. Switches: To connect devices within a local area network (LAN) and manage
traffic efficiently.
c. Firewalls: To protect the network from unauthorized access and ensure data
security by filtering incoming and outgoing traffic.
d. Servers: Host various services and applications needed by ElekTron, such as
file storage, email, and web hosting.
e. Workstations: Desktop computers, laptops, and other devices used by
ElekTron’s employees to access network resources and perform their tasks.
f. Wireless Access Points (WAPs): Provide wireless connectivity for devices
such as laptops, smartphones, and tablets.
2. Topology:
a. Star Topology: All the devices are connected to a central switch, which
simplifies network management and troubleshooting. The Appendix 2: “Star Network
Topology Setup” depict the proposed network design configuration.
b. Hybrid Topology: Combines elements of different topologies (e.g., star and
mesh) to meet the ElekTron’s needs. For example, critical devices may be connected in a
redundant mesh topology to ensure high availability, while other devices are connected in
a star topology for simplicity.
3. Services:
a. File Storage: Utilize file servers to store and share documents, spreadsheets,
and other business-critical files.
12
b. Email: To host an email server to facilitate internal and external
communication among ElekTron’s employees and clients.
c. Web Hosting: To host the ElekTron’s website and other web-based
applications on dedicated servers accessible to both ElekTron’s employees and
customers.
d. Database Management: Maintaining database servers that stores and manages
business data, such as customer information, product inventory, and financial records.
e. Remote Access: Implement virtual private network (VPN) services to allow
employees to securely access the network anywhere and anytime.
4. Protocols:
a. TCP/IP: This is one of the widely used protocol suite for communication on
the internet and it’s most appropriate for ElekTron corporate organization. Appendix 3:
“Network Protocols for the Design”
b. HTTP/HTTPS: This would be used for accessing web-based services and
websites securely.
c. SMTP/POP3/IMAP: These are the protocols for sending and receiving emails.
d. FTP/SFTP: Used for transferring files between devices and servers securely.
e. DNS: Resolves domain names to IP addresses, enabling users to access
websites and other network resources by name.
f. VPN Protocols (e.g., IPsec, SSL/TLS): Ensures secure communication
between remote users and the company network over the internet.
Interconnection among ElekTron's websites and protected communication will
depend on Virtual Private Network (VPN) connections. Site-to-site VPN tunnels,
13
encrypted with protocols such as IPsec, will ensure data transmission that is secure
between Los Angeles, D.C., and Washington, Chicago, using existing Cisco firewalls for
connectivity.
To standardize operations, ElekTron is going to migrate to contemporary
operating systems. House Windows 10 will be deployed on desktops for a protected, user-
friendly environment, while servers will update to Windows Server 2019 for
compatibility with the newest applications plus security patches. Active Directory will
facilitate centralized user authentication and resource management, improving network
administration and access management. This proposed network design belongs to an
extensive strategy to deal with future needs and current challenges, leveraging superior
network technologies and strong security measures to build a resilient, nimble, and
future-proof infrastructure (Garcia et al., 2018).
e. Project Justification
The project rationale for ElekTron Industries' proposed network upgrade involves
3 crucial aspects: The present infrastructure is governed by network security as well as
compliance, cost-benefit analysis as well as risk assessment.
First, network security, as well as compliance, are crucial for ElekTron, particularly given
its participation in providing electronic components to both individual and government
customers (Smith, 2020). Older infrastructure has likewise proven susceptible to
cyberattacks, causing system downtime as well as system outages. ElekTron seeks to
enhance its cybersecurity position and assure compliance with federal security
requirements by improving the network, particularly since it enters contracts with the
14
Department of Defense (DoD). Enhanced security measures will protect sensitive data,
stop unauthorized access, and lessen the chances of costly omissions and legal action.
Second, you must perform a cost-benefit analysis of the upgrade of the network
and justify the investment. Although the initial expense related to buying brand-new
network products, upgrading software, and implementing security measures might seem
considerable, the long-term advantages far outweigh the costs. Enhanced network
reliability as well as overall performance will lead to substantial cost savings in the long
run, while reducing downtime as well as improving efficiency. The enhanced security
measures will additionally reduce financial risks related to possible data breaches,
regulatory compliance, and reputational damage, further justifying the investment in a
network upgrade (Jones et al., 2021).
Lastly, the risks related to the present infrastructure underline the urgency of the
proposed upgrading of the network. The vulnerability of ElekTron's obsolete network
devices as well as software is because of its vulnerability to cyberattacks, hacking as well
as system failures. Additionally, the current infrastructure might struggle to cope with the
increasing demands for connectivity, compliance, and security with the inclusion of a
new remote Washington, D.C. site. Failing to deal with these issues quickly might lead to
considerable financial losses for ElekTron, reputational damage as well as legal
liabilities, underscoring the crucial demand for the upgraded network (Robinson, 2017).
To conclude, the ElekTron Industries project rationale for network upgrade is
grounded in the need to improve network security and compliance, perform a cost-benefit
analysis, and minimize the risks related to the present infrastructure. ElekTron seeks to
15
safeguard its operations, protect its assets as well as position itself for continued success
in a quickly evolving digital landscape by dealing with these crucial points.
f. Project Deliverables
ElekTron Industries is expected to report on the proposed changes,
implementation, or replacement plans and the expected benefits and enhancements
associated with its network upgrade (Brown & Miller, 2018).
First, the Changes Suggested section describes the specific changes to ElekTron's
current network architecture (Davis & Harris, 2020). Replacement hardware for old
hardware must include current networking devices including routers and high-capacity
switches, wireless access points along other devices that can be monitored and controlled
remotely. Additionally, Microsoft is preparing to port today's Server OS to Windows
Server 2019, from Windows Server 2008 on the newer release. By installing firewalls,
intrusion prevention systems, and encryption strategies, the network is going to be
shielded from cyber-attacks and conform to government security guidelines. Using a
VPN connection between ElekTron's locations will allow secure exchange of information
between the sites, enhancing connectivity and collaboration.
Then the proposal specifies the sequence of installation or replacement of the
required elements (Moore & Thompson, 2019). It will also examine the existing
infrastructure for obsolete equipment and vulnerabilities and will purchase and install
new network hardware and software. Installation will be completed in stages to reduce
interference with operations and each stage will be examined and verified extensively to
16
ensure functionality and compatibility. In addition, staff training and written materials
will be offered to familiarize staff with the new network system and security guidelines
for a smooth transition and rollout.
Lastly, the expected outcomes and gains justify the potential benefits of the
network update. Reliable network, security, and performance enhancements will reduce
downtime and operational interruptions for overall efficiency and effectiveness. The use
of the most advanced networking technologies and security will safeguard ElekTron's
assets and reputation. The VPN connections that enable simplified communication and
teamwork will also foster creativity and agility allowing ElekTron to rapidly adapt to
changing business requirements and market conditions (Garcia et al., 2018).
g. Project Plan & Timeline
The ElekTron Industries project plan and timeline layout crucial milestones,
stages, execution timelines as well as resources to ensure a successful and smooth
transition to the brand-new network infrastructure.
Key phases as well as milestones:
To help with efficient planning, execution, and monitoring, the project is split into
several key phases. These phases consist of evaluation and preparation, testing,
deployment, procurement, training, and support for the implementation. A comprehensive
review of the current infrastructure is going to be performed throughout the assessment
and planning stage to determine obsolete equipment, vulnerabilities, and demands for the
new network. This information will guide the creation of a detailed project plan as well as
an implementation method.
17
The procurement phase consists of finding and buying the required networking
hardware, software, and security systems. The deployment involves the setup,
configuration as well as integration of new equipment as well as software according to a
phased approach to minimize disruption of operations. At each stage, testing is going to
be performed to ensure security, functionality, and compatibility. The new network
environment as well as security procedures is familiar to staff members and will consist
of staff training and documentation. Support for the post-implementation period will
entail ongoing monitoring, repair, and troubleshooting to determine any problems and
ensure optimum performance.
Implementation Timeline
The implementation timeline is going to be arranged to align with significant
project milestones as well as key phases. It is going to be required to create a
comprehensive schedule describing specific tasks, due dates, and dependencies. There is
flexibility in the time frame to allow for unexpected events or delays, while making sure
the prompt completion of the project. Crucial milestones including hardware
procurement, testing, and installation will be closely monitored to reduce risks to the
project and to assure compliance with the timeline. All stakeholders will be given regular
progress updates as well as status reports all throughout the implementation process to
keep transparency as well as accountability.
Resource Allocation:
18
The allocation of resources is going to be planned carefully to ensure sufficient
support for each stage of the project. This includes human resources including IT trainers,
project managers, network engineers, and technicians, and financial resources for
equipment purchasing, software licensing as well as training materials. In addition,
physical resources like office space, computer labs, and testing areas will likely be
allocated to support project tasks as necessary. To promote effective collaboration and
coordination, clear roles and responsibilities are going to be established for each team
member. All stakeholders will be urged to communicate regularly and collaborate among
themselves to respond proactively and promptly to time constraints or challenges.
The project schedule and timeline for the upgrading of the ElekTron Industries
network were created in conclusion to guarantee systematic planning, execution as well
as monitoring of the project. ElekTron seeks to reduce risks, improve efficiency, and
attain a successful implementation of the brand-new network infrastructure in the agreed
time as well as budget by setting specific objectives, timelines as well as budget
allocations.
19
Appendix
Appendix 1: Network Devices Setup
Appendix 2: Star Network Topology Setup
20
Appendix 3: Network Protocols for the Design
21
References
1. Brown, A., & Miller, B. (2018). Network Infrastructure Upgrades: A Comprehensive
Approach. Journal of Network Engineering, 12(3), 45-56.
2. Davis, C., & Harris, E. (2020). Cybersecurity Challenges in Network Upgrades.
International Journal of Cybersecurity Research, 6(2), 78-89.
3. Garcia, R., et al. (2018). Enhancing Network Security through Infrastructure Upgrades.
Journal of Information Security, 24(1), 112-125.
4. Jones, L., et al. (2021). The Role of Advanced Networking Technologies in Infrastructure
Upgrades. Journal of Network Security, 18(4), 234-247.
5. Johnson, K., & Jackson, M. (2019). Modernizing Network Infrastructure: A Strategic
Approach. Journal of Business Technology, 7(2), 56-68.
6. Moore, S., & Thompson, D. (2019). Implementing Network Security Measures in
Infrastructure Upgrades. Journal of Cybersecurity Management, 15(3), 89-102.
7. Robinson, J. (2017). Network Infrastructure Upgrades and Business Performance: A
Comparative Study. International Journal of Business Technology, 5(1), 34-47.
8. Russell, A. L., & Schafer, V. (2014). In the Shadow of ARPANET and Internet: Louis
Pouzin and the Cyclades Network in the 1970s. Technology and Culture, 880-907.
9. Smith, T. (2020). Enhancing Cybersecurity through Network Infrastructure Upgrades.
Journal of Cybersecurity Research, 8(3), 112-125.
10. Solomon, M. G., & Kim, D. (2021). Fundamentals of communications and networking.
Jones & Bartlett Learning.