Sunteți pe pagina 1din 10

Running head: LAN INFRASTRUCTURE DEPLOYMENT SCOPE

LAN INFRASTRUCTURE DEPLOYMENT SCOPE


Hal Hagood
u01a1

LAN INFRASTRUCTURE DEPLOYMENT SCOPE


2
The purpose of this document is to determine the business goals for the
project and the architectural scope and principles. The scope of this project includes
but is not limited to the market place for this product, the new system and what
Evergreen Financial might achieve with it. There are many possibilities and business
problems to be addressed in this project. At the core of Evergreen Financials
dilemma is the ever expanding marketplace and progression of technology. Both
customers and stakeholders wish to see a further continuance of the success that
Evergreen Financial has enjoyed.
The justification for this project lies in multiple areas including, market
demand, business need and customer requests. In order to satisfy this need
Evergreen Financial requires and needs a basic Cisco network built for the local
office.
EverGreen Financial is a smaller company with approximately 20-30
employees specializing in financial products and services and needs a basic Cisco
network built for the local office. EverGreen has purchased Cisco devices such as
Cisco 2960 switches, a 2811 router, and a wireless LAN controller. These need to be
set up, along with a TFTP server. The companys internet connectivity has been
lacking with email transaction delays and download problems with various media on
the internet.
The stakeholders for EverGreen Financial include those who can be positively
or negatively impacted by, or cause an impact on the actions of a company or
organization. The primary stakeholders in this case are the President and CEO along
with the shareholders and company employees with various stock options and
rights.

LAN INFRASTRUCTURE DEPLOYMENT SCOPE


3
The LAN component consists of the LAN framework and network foundation
technologies that provide baseline routing and switching guidelines. The LAN design
interconnects several other components, such as endpoints, data center, WAN, and
so on, to provide a foundation on which mobility, security, and unified
communications (UC) can be integrated into the overall design. To resolve these
problems basic LAN design principles will be followed.
Any successful design or system is based on a foundation of solid design
theory and principles. Designing the LAN component of the overall medium
enterprise LAN service fabric design model is no different than designing any large
networking system. The use of a guiding set of fundamental engineering design
principles serves to ensure that the LAN design provides for the balance of
availability, security, flexibility, and manageability required to meet current and
future advanced and emerging technology needs (Cisco, 2014).
This LAN design provides guidance on building the next-generation medium
enterprise network, which becomes a common framework along with critical
network technologies to deliver the foundation for the service fabric design.
LAN design principlesProvides proven design choices to build various
types of LANs.
LAN design model for the medium enterpriseLeverages the design
principles of the tiered network design to facilitate a geographically dispersed
enterprise campus network made up of various elements, including
networking role, size, capacity, and infrastructure demands.
Considerations of a multi-tier LAN design model for medium enterprises
Provides guidance for the enterprise campus LAN network as a platform with

LAN INFRASTRUCTURE DEPLOYMENT SCOPE


4
a wide range of next-generation products and technologies to integrate
applications and solutions seamlessly.
Designing network foundation services for LAN designs in medium
enterpriseProvides guidance on deploying various types of Cisco IOS
technologies to build a simplified and highly available network design to
provide continuous network operation. This section also provides guidance on
designing network-differentiated services that can be used to customize the
allocation of network resources to improve user experience and application
performance, and to protect the network against unmanaged devices and
applications.
The following principles will be followed to implement the desired results:
Hierarchical
Facilitates understanding the role of each device at every tier
Simplifies deployment, operation, and management
Reduces fault domains at every tier
Modularityallows the network to grow on an on-demand basis
Resiliencysatisfies user expectations for keeping network always on
Flexibilityallows intelligent traffic load sharing by using all network
resources
(Cisco, 2014)

LAN INFRASTRUCTURE DEPLOYMENT SCOPE


5
EverGreen has purchased Cisco devices such as Cisco 2960 switches, a 2811
router, and a wireless LAN controller. The Cisco Catalyst 2960S Series Switches are
the leading layer 2 edge, providing improved ease of use, highly secure business
operations, improved sustainability, and a borderless network experience. The Cisco
Catalyst 2960S Series Switches include Cisco FlexStack switch stacking capability
with 1 and 10 Gigabit connectivity. The Cisco Catalyst 2960S Series are fixedconfiguration access switches designed for enterprise, midmarket, and branch office
networks to provide lower total cost of ownership (CDW, 2014).
The Cisco 2960 series of fixed-configuration, standalone, intelligent Ethernet
devices enable entry-level office networks to provide enhanced LAN service to the
network edge. By simplifying the movement from non-intelligent hubs and
unmanaged switches to a fully scalable network.
Cisco 2960 Switch

Cisco 2811 Router

LAN INFRASTRUCTURE DEPLOYMENT SCOPE


6

The Cisco 2811 router features a console port, an auxiliary port, two
Universal Serial Bus (USB) ports, four high-speed WAN interface card (HWIC) slots,
two10/100 Gigabit Ethernet RJ45 ports, an Enhanced Network Module (ENM) slot,
and a Compact Flash (CF) drive. The 2811 router supports one single-width network
module, four single-width or two double-width HWICs, two slots for AIM-VPN/BPIIPlus cards1, two internal packet voice data modules (PVDMs), two fast Ethernet
connections, and 16 ports of IP phone power output. Figure 2 shows the front panel
and Figure 3 shows the rear panel. The front panel contains 4 LEDs that output
status data about the system power, auxiliary power, system activity, and compact
flash busy status. The back panel consists of 12 LEDs: two Ethernet activity LEDs,
two duplex LEDs, two speed LEDs, two link LEDs, two PVDM LEDs, and two AIM
LEDs (cryptsoft, 2014).
Proposed Network Diagram

LAN INFRASTRUCTURE DEPLOYMENT SCOPE


7

(toolwire,
2014)

The above illustration is the proposed network diagram however it is only a


preliminary design and is subject to change as the project goes forward. Any
changes or updates will be presented before final implementation.
The risks and benefits of deploying a Cisco-based LAN infrastructure are factors that must be
considered. IP telephony is slowly but surely becoming part of the modern day organization's day-to dayoperations. In fact, some organizations depend on it to the extent of their core business or processes
based on IP communications. Sadly though, the security aspect pertinent to IP based communications
network, applications, and underlying infrastructure is usually not taken into consideration (or is ignored)
when enterprises and businesses think of deploying unified communications.

LAN INFRASTRUCTURE DEPLOYMENT SCOPE


8
IP telephony is slowly but surely becoming part of the modern day organization's day-to dayoperations. In fact, some organizations depend on it to the extent of their core business or processes
based on IP communications. Sadly though, the security aspect pertinent to IP based communications
network, applications, and underlying infrastructure is usually not taken into consideration (or is ignored)
when enterprises and businesses think of deploying unified communications (ciscopress, 2014).
There are several answers to securing a network that include protecting the information flowing in
IP communication channels from eavesdropping and reconnaissance attacks as well as from
manipulation or injection attacks. Ensuring that the investment in their on premise or off premise
infrastructure pays off (ROI) and doesnt end up in a rogues hands, utilizing it for malicious purposes.
Lowering Total Cost of Ownership (TCO) by leveraging IP communications to offset PSTN/Toll
calls and reducing Moving, Addition, Configuration, and Deletion (MACD) and at the same time, keeping
conversations safe. Mitigating attacks on the telephony network may result in monetary and reputation
loss. Moreover, it can directly or indirectly impact the business continuity and clientage.
In summation key management strategies revolve around information. Information is a valuable
asset to be used for enabling end-to-end business processes and for making specific decisions at all
levels. This may sound simple but it is becoming more and more of a challenge with the ever increasing
flow of information. If not properly managed - can lead to unnecessarily high operational costs, poor
business decisions, damaged customer and partner relationships, lost business opportunities, and steep
penalties for failure to comply with regulations. In short, enterprise data itself is useless unless it is
converted into information and then into enterprise knowledge (SAP Community Network, 2011).
In a practical sense local, state, and global privacy laws must be considered. The globalization of
the economy means that businesses are reaching greater and more diverse markets than ever before.
An increasing number of foreign laws aim at protecting personal data, and preserving and strengthening
human rights and fundamental freedoms. These laws are relevant to global companies. Negotiating a
deal, corresponding with clients, exchanging contact information for the delivery of a shipment usually
entails the collection, transfer, use, or storage of personal information.

LAN INFRASTRUCTURE DEPLOYMENT SCOPE


9
As companies exchange personal information of their employees, clients or contacts with entities
located in foreign countries with a different culture, history, political regime, and different laws, they must
remember and take into account these differences. We cannot expect a service provider in the
Philippines, or a distributor in Italy or Argentina to act in the way we act, to have priorities that are similar
to ours. We cannot expect them to treat or be required to treat - personal information in the same way
as we do (Global Privacy Book, 2014).
Profitable growth comes from superior customer service, new products and services come from
business units that are not bound by standard processes but from those that encourage local innovation
but are controlled in a centralized manner.

References
CDW, (2014). Retrieved April 8 2014 from http://www.cdw.com/shop/products/CiscoCatalyst-2960S24PS-L-switch-24-ports-managed-rack-mountable/2029885.aspx
Cisco, (2014). Retrieved April 8, 2014 from

LAN INFRASTRUCTURE DEPLOYMENT SCOPE


10

http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Medium_Enterprise_Desig
n_Profile/
CiscoPress, (2014). Retrieved April 8, 2014 from
http://www.ciscopress.com/articles/article.asp?p=1966660
Cryptosoft, (2014). Retrieved April 8, 2014 from
http://www.cryptsoft.com/fips140/vendors/140sp1035.pdf
Global Privacy Book, (2014). Retrieved April 8, 2014 from
http://www.globalprivacybook.com/
SAP Community Network, (2011) Retrieved April 8, 2014 from
http://www.sdn.sap.com/irj/scn/index
Toolwire, (2014). Retrieved April 8, 2014 from
http://dcm.toolwire.com/login/jsp/odw/frameset_rl_3tab_s_cap.jsp?HOST=rl-

04.logilent.com&USERNAME=1325194CAPL&SESSIONID=1070391647&LABNUM=C
AP-41500101_ICND1S0204&LANG=EN&PARTNERID=CAPL&CORPID=CAPL-HE

S-ar putea să vă placă și