Computer Networking
Computer Networking (Callingyou Inc)
Part I: Recommendation
T1 line between the two offices is an appropriate technique in relation to the improvement of the networking system and efficiency of the interaction between the employees and sites. This is because of the ability to integrate concepts of VoIP and central server access thus the ability to increase the rate and quantity of transmission of the data across the public network (internet). Implementation of this concept will enable the organization to monitor and track interactions within the networking system with improved effectiveness. Despite this advantage, it is essential to maintain the objective of the organization in relation to the achievement of the goals. This will focus on minimization of the cost and maximization of opportunities. T1 line is an expensive approach because of the cost of about $ 1000 to 1500 per month. In order to minimize this cost, I would advise the organization to consider the concept of LAN-to-LAN VPN.
This will be essential between the two offices, among employees, and extensions of the networking services to the workforce in relevant premises. LAN-to-LAN VPN is also the concept of site-to-site/business-to-business VPN (Malik, 2003). It refers to the secure and encrypted connection or networking that facilitates the transfer of information and networking between two offices, sites, and relevant businesses. LAN-to-LAN VPN will be essential for the achievement of the goals and objectives of the company thus enhancing the ability to improve its information and technology systems.
Figure 2 Figure 1
The case of the organization reflects impractical remote access to VPN thus the need and the requirement to adopt and integrate concepts of LAN-to-LAN VPN in the improvement of the networking systems between two offices and relevant communication systems. This networking system will require technological engineer to configure the LAN-to-LAN VPN with the aim of addressing the needs and preferences of the organization thus the opportunity to meet the goals and targets. LAN-to-LAN VPN will enable the organization through its offices in various locations to implement and establish secure networking systems over the internet (Malik, 2003). LAN-to-LAN VPN will also enable the organization to extend its networking systems by enabling employees in other locations to enjoy the networking concepts and computers in one location. In the implementation of the LAN-to-LAN VPN, the organization has two options in relation to the demands and objectives.
The first option is the configuration of the intranet based LAN-to-LAN VPN. This enables the organization to join numerous remote locations with single private network. The second option is the implementation or establishment of the extranet based LAN-to-LAN VPN. This enables the organization to interact with close entities, shareholders, and relevant stakeholders. This provides an opportunity for the organization to enjoy secure network while acting towards the provision of protection and prevention of access to the relevant intranets within the context of the individual organizations. LAN-to-LAN VPN will eliminate the need for the organization to operate each computer in relation to VPN client software like in the case of the remote-access VPN (Castelli, 2002).
In the implementation of the concept of the LAN-to-LAN VPN within the context of the organization, it is essential to configure through the aspect of IP routing. This will enable the organization to maximize the benefits and efficiency in relation to the concept of LAN-to-LAN VPN in enhancing the networking systems between offices and employees. One of the benefits of the LAN-to-LAN VPN in the context of the IP Routing is the ability to integrate and incorporate the concepts of the bridge connections and IP Routing to initiate connection between the two sites thus an opportunity to improve availability of the information. Employees will have accessibility to the vital information thus the ability to increase and maximize the opportunities with reference to improvement in the revenues and profit levels.
Another advantage of this concept is the essence of integrating IP routing via layer 3 switching with the aim of enhancing the availability of the information for the consumers and employees of the organization. Application of the bridge connections in the generation of the VPN connection to multiple LANS with contribute to the development of the LANS under the influence of the single layer 2 segment. This will enable the application of the virtual layer 3 switching between the LANS thus enabling the transfer of information between relevant entities in association with the organization (Malik, 2003).
This method will also enable the organization to ensure that its stakeholders communicate or interact between the LANS existing with the essence of stable IP networks making any changes with ease. This indicates that the organization will have the opportunity to make changes to the relevant communication systems and devices within the network with minimal challenge thus effectiveness and efficiency in the interaction with the shareholders and other relevant stakeholders. The organization will adopt and incorporate several computers within the organization thus an opportunity to enhance communication. In this scenario, it is essential to integrate IP routing because of the ability to facilitate interaction to over 100 computers within the context of the two sites and residential aspects of the employees. In order to improve effectiveness and efficiency in the transmission of information across the entities, it is vital for the organization to generate or develop smaller broadcast domain (Castelli, 2002).
In the current technological society, it is essential for the organization to develop its own Virtual Private Network with the aim of accommodating the needs and requirements of the remote employees and distant offices. This indicates that VPN will enable the organization to adopt and implement the concepts of the public network (internet) with the aim of offering effective and efficient connection between the remote sites and relevant users. Quality VPN will enable the organization to achieve most of the goals and targets through realization of various benefits and advantages. VPN will focus on enhancing and extending the geographic connectivity thus improving accessibility of the information between the sites and the users within the context of the organization.
VPN will also increase cyber security thus enhancing the credibility, availability, and integrity of the information and documentation systems. VPN will also increase the return on investment in comparison to the traditional WAN thus enabling the organization to improve its service and product provision to the consumers. Application of the VPN in the context of the organization will also contribute towards minimization of the transit time and costs in relation to the remote users. Organization can maximize this feature or networking system with the aim of increasing the productivity levels and simplification of the network typology. VPN will also enable the organization to maximize essence of global opportunities thus provision of the telecommuter support (Castelli, 2002).
In the implementation of the VPN, the organization should consider integration of the qualities of an effective VPN in relation to the achievement of the goals and objectives. One of the essential qualities of an effective VPN is the concept of focusing on the security management. This will contribute towards the promotion of protection of the files and information within the networking systems. Another concept is the reliability of the VPN in meeting the goals and objectives of the organization. The third feature or concept of quality VPN is the aspect of scalability. This will enable the organization to improve its internet or networking systems. Other factors to consider in the implementation of the concepts of the VPN within the organization include network and policy management (Malik, 2003).
Figure 3
Part II: Protocols
Network Layer Protocols
In the designed network, network layer protocols will be extremely essential in the realization of the goals and objectives of the organization. This is because of execution of various functions such as addressing, routing, valuable connection between networks, controlling congestion, and fulfilling store and forward switching of the packet. Examples of the Network layer protocols include internet protocols, address resolution protocols, reverse address resolution protocols, and internet-control message protocols (Dean, 2009).
Internet Protocol (IP)
Internet protocols facilitate the transfer of data from one computer system to another under the influence of the internet. Within the settings of the offices, the organization will adopt and integrate one IP address functioning as the distinguishing feature for identification of the computer system from other computers within the internet. In order to improve the effectiveness and efficiency of networking system, the organization should implement Internet protocol version 4 (IPv4).
Address Resolution Protocol (ARP)
Address Resolution Protocol is essential in mapping the Internet Protocol address in relation to the physical machine address recognizable within the network system. For instance, in the identification of the commonly applicable version of IP, address is 32 bits long hence effectiveness of ARP within the networking system. The physical address of the machine is also known as the media access control. Address Resolution Protocol will focus on the maintenance of correlation between the MAC addresses and the corresponding Internet protocol addresses. This is through the provision of the protocol rules in the generation of the correlation and enhancing conversion of addresses in relevant directions (Dean, 2009).
Reverse Address Resolution Protocol (RARP)
Reverse Address Resolution Protocol refers to the protocol through which physical machines within the local areas network have the ability to learn the internet protocol address by requesting from the gateway’s server. Reverse Address Resolution Protocol is available and active in the context of Ethernet, fiber distributed-data interface, and token ring LANS. Reverse Address Resolution Protocol focuses on the restoration or returning of the internet protocol address to the relevant machine for storage and implementation for future references or relevant applications. This protocol is essential for the adoption of internet protocol address of the newly set computer systems.
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol refers to the message control and error-reporting or illustration protocol. It exists between the host server and the gateway in accessing the internet. Internet Control Message Protocol adopts and implements concepts of the Internet Protocol datagram in the execution of its functions and obligations. In the processing of the messages, Internet Control Message Protocol uses internet protocols software thus not directly apparent to the individual or applicant users within the context of the organization. Internet Control Message Protocol is essential and effective in the realization of network management and administration of the internet protocols (Kozierok, 2005).
Transport Layer Protocols
Transport layer protocols are also essential in the achievement of the goals of networking. This is through integration of elements such as addressing, connection establishment, release, flow control, buffering, error control, crash recovery, and sequencing. Some of the components of the transport layer protocols include transmission control protocol and user diagram protocol.
Transmission Control Protocol (TCP)
Transmission Control Protocol refers to a set of rules or protocols applicable in association with the internet protocol in the sending of data in the form of message units in the context of computer systems across the internet. Transmission Control Protocol functions towards tracking the units of data (packets) following the division of the message for effectiveness and efficiency in the concept of routing across the internet. This relates to the act of the internet protocol focusing on the delivery of the message across the internet (Kozierok, 2005).
User Diagram Protocol (UDP)
User Diagram Protocol refers to the communications protocol offering limited services in the exchange of messages between the computers within the networking system. User Diagram Protocol is an option to the aspect of Transmission Control Protocol in executing its functions in relation to the internet protocol. User Diagram Protocol uses the aspect of internet protocol to facilitate the transfer of datagram from one computer system to another across the internet. This protocol does not provide division and reassembly services to the messages during the transmission from one computer to another within the networking system (Dean, 2009).
Application Layer Protocols
Simple Mail Transfer Protocol (SMTP)
Simple Mail Transfer Protocol is essential for the transfer or transmission of e-mail messages across the internet or servers. This indicates that the protocols are essential in case the organization wants to communicate or interact through e-mail messages across the networking systems. The protocols facilitate the interaction between the email client and mail server through enhancing transfer of information or messages. In order for the protocols to be effective in the execution of their functions, the organization must integrate POP or IMAP for the retrieval of the email messages across the server (Kozierok, 2005).
Hypertext Transfer Protocol (HTTP)
Hypertext Transfer Protocol refers to the aspect of rules governing the transfer of files in relation to the World Wide Web. These files can be in the form of sound, video, graphic images, text, and other relevant multimedia files. Hypertext Transfer Protocol runs on top of the Transmission Control Protocol/Internet Protocol suite of protocols. This is essential for the interaction of the organization with other entities across the networking systems thus vital for the designed internet (Dean, 2009).
Domain Name System (DNS)
Domain Name System refers to the process through which internet domain names are located and translated or interpreted within the context of internet protocol addresses. This is essential for the interaction or communication across the internet thus would enable the organization to manage and relate to other entities effectively and efficiently (Kozierok, 2005).
Dynamic Host Configuration Protocol (DHCP)
Dynamic Host Configuration Protocol is essential for the assigning of the internet protocol addresses in the context of networked computer systems. This follows the connection of the computer system to the Dynamic Host Configuration Protocol before initiation of the assigning aspect thus effective in the interaction across the internet. Dynamic Host Configuration Protocol is the most commonly applicable networking protocol because of the concept of slick automation in the execution of duties and functions within the networking systems (Dean, 2009)
References
Dean, T. (2009). Network+ guide to networks. Boston, Mass: Cengage Course Technology.
Network protocols handbook. (2005). Saratoga, CA: Javvin Technologies.
Castelli, M. J. (2002). Network consultants handbook: [a complete resource for assessing, auditing, analyzing, and evaluating any network environment]. Indianapolis, Ind: Cisco Press.
Malik, S. (2003). Network security principles and practices: [expert solutions for securing network infrastructures and VPNs ; CCIE professional development]. Indianapolis, Ind: Cisco Press.
Kozierok, C. M. (2005). The TCP/IP guide: A comprehensive, illustrated Internet protocols reference. San Francisco: No Starch Press.
