Network Design Executive Presentation
The PowerPoint must include the following in accordance with Chapter 14 of the text:
1. Title page2. Executive summary3. Project goal4. Project scope5. Design requirements: a. Business goalsb. Technical goalsc. User communities and data storesd. Network applications6. Current state of the network7. Logical design8. Physical design9. Results of network design testing10. Implementation plan with a project schedule11. Project budget with a return on investment calculation Running head: CAPABILITIES PROPOSAL
Assignment 1: Capabilities Proposal
Bennie Carter
CIS 532: Network Architecture and Analysis
John Dorociak
Monday, April 20, 2020
1
CAPABILITIES PROPOSAL
2
Prepare an opening statement that specifies your organization’s capabilities to manage a
deployment of this size
Antotech consulting firm began operations in 2004. We are ready to aid in the
complexities of network analysis, upgrades, assessments, and processes for company mergers.
We have the experience in merging companies, including Verizon and Vodafone, Spectrum and
Bright House, as well as Tech Data with Avnet. Antotech Consulting is prepared in all technical,
legal, and financial aspects of the process. Most importantly, we have the resources, licenses, and
strategies to implement and complete a merger. We employ individuals who leverage in the
assessment and consolidation of IT services.
1. Antotech Consulting Company employs individuals that will be leveraged in the
assessment and merger of IT services:
1. We centered on three resources with F5 certifications for load balancing,
traffic management, and app security which include; (F5-CA
certifications) F5 Certified BIG-IP Administrator (F5 -CA), F5 Certified
Technology Specialist (F5 -CTS), and F5 Certified Solutions expert (F5CSE)
2. Main focus include resources which provide Palo Alto certifications for
firewall and cloud (GlobalProtect and PCNSA certifications) PCCSA
(Palo Alto Network Certified Cybersecurity Associate), PCNSA (Paolo
Alto Network Security Administrator), and PCNSE (Paolo Alto Certified
Network Security Engineer)
CAPABILITIES PROPOSAL
3
3. We also ensure resources and attained experience engineer with Cisco
network certifications such as CCENT (Cisco Certified Entry Network
Technician) CCNP (Cisco Certified Network Professional) R/S, CCNA
(Cisco Certified Network Associate), and CCIE (Cisco Certified Network
Expert).
4. Our consulting firm also employs resources with Cisco WLAN
certification experts such as CCNP-W
5. Two engineers with Cisco CCIE R/S certification
6. Four experienced contractors with Cisco data center certifications (CCNP)
7. Five resources and experienced professionals in Cisco collaboration
certifications (CCNP-collaboration).
8. Two engineers with Citrix certifications (CCE-N)
9. Multiple contractors and one experience employee with WAN
certifications.
10. And experience employees with Microsoft certifications (MCSE)
2. Antotech Consulting is highly experienced in merging of company network
resources
1. Antotech Consulting has conducted seven IT mergers of Fortune 500
companies over the past five years
2. Antotech Consulting has done network analysis of fifteen companies over
the past ten years.
3. Antotech Consulting has provided an analysis of firewall
CAPABILITIES PROPOSAL
4
4. Antotech Consulting is highly experienced in using Cisco Stealth watch
Enterprise, allowing administrative staff to facilitate a smooth and
seamless merger process through the usage of Google Cloud and
Microsoft Azure.
5. Antotech Consulting contacts for references are available upon request
are; Office 813-808-7178 and email antotech.Consuslting@antotech.com
Graphically depict and effectively promote your company’s structured development and
services using Visio or its alternative open-source software
Below is a visual breakdown of the company’s structure development and services to
effectively illustrate Antotech Consulting’s capabilities on completed the network
implementation for the merge.
1. Image one has a business strategy.
CAPABILITIES PROPOSAL
2. The second image has the network Implementation strategy
5
CAPABILITIES PROPOSAL
6
Explain what the client can expect from your services, including past efforts of this size
Antotech Consulting clients may expect efficiency, quality, and urgency with the
implementation process. Productivity is imperative since we ensure that installation of systems
and services and completed from day one. Our resources and partnership offer a quality of
applications, equipment, and technical expertise on the desired services. Strayer Consulting has
professional engineers who are trained and experienced to handle a vastly complex network and
CAPABILITIES PROPOSAL
7
provide ways to recycle and satisfy and integrate multiple networks into one robust system.
Antotech Consulting would help plan the process from both the business and technical
perspectives. After assessing an organizational approach to how to handle the merge starting
from executives board, stakeholders’ insights, and financial institution and benefits. Then the
company would process on implementing the technical aspect of the network migration and
combining both domains into one where all security, users, equipment, network infrastructure,
and all systems that impact the new company’s acquisition.
•
Antotech Consulting is positioned to provide outstanding products and services
for merger analysis through the following:
1) Thoroughly analyze existing network topologies and network
functions from the core, distribution and access layers.
2) Carefully assess the process of merging network organizations.
3) Manage the entire turnkey merger process, from stakeholder meetings
to knowledge transfer.
CAPABILITIES PROPOSAL
8
References
Albrecht, K., & Albrecht, K. (2019). The only thing that matters: Bringing the power of the
customer into the center of your business. New York: HarperBusiness.
Mancuso, J. (1983). How to prepare and present a business plan. Englewood Cliffs, NJ:
Prentice-Hall.
Oyewole, B. (2018). Business Plan Guideline for Small and Medium Scale Enterprises.
Running head: DESIGNING A NETWORK TOPOLOGY
Assignment 2: Designing a Network Topology
Bennie Carter
CIS 532: Network Architecture and Analysis
John Dorociak
Monday, May 4, 2020
1
DESIGNING A NETWORK TOPOLOGY
Depict a graphical topological network design for the 20 employees (Academy, 2014).
Figure 1: Graphical topological network design for the 20 employees
2
DESIGNING A NETWORK TOPOLOGY
Depict a graphical topological network design for the 200 employees (Cisco, 2011).
Figure 2: Graphical topological network design for the 200 employees
3
DESIGNING A NETWORK TOPOLOGY
Figure 3: Network Tiers
4
DESIGNING A NETWORK TOPOLOGY
Depict a graphical model of network topology for future development to 400 employees.
Figure 4: Graphical model of network topology for future development to 400 employees
5
DESIGNING A NETWORK TOPOLOGY
Figure 5: Client, Access and Data Components
6
DESIGNING A NETWORK TOPOLOGY
7
Executive Summary
As companies grow and expand their capacities, it is key that security in the networking
is incorporated as the network expands allowing for backup servers. The first image displays the
pictorial view of the 20 employees in the organization. They are connected to the network using
a group switch or a router for the Bring Your Own Devices [BYOD] (Redmon, 2014). Business
goes on in the company in the presence of a server and firewall filtering the internet traffic. The
current topology which is considered flat, incorporated Pc’s and Peer to Peer Servers connection
connected using ADSL internet line connectivity making the access very restricted. The switch
has allowed workers to keep the growing employees connected. The current design that was
upgraded to accommodate the 200 employees supported the installation of essential services to
maintain and keep the network secure. Active Directory with DNS, Sign-on, file sharing and
DHCP replaces the initial flat topology (Academy, 2014).
(Cisco, 2011) claims that an organization’s growth of between 200 and 1000 users
is called a medium-size network. A three-tier network model is proposed to counter this high
number of employees. It increases the performance of the network at all times, keep the network
safe by employing a VPN to enhance security at all times. Working stations are linked with the
Access Layer Stackable switches making it cheap to redeploy the existing switches. They will
uplink a Distribution layer switch that joins to a dual-core layer redundant switch structure and a
touch of mesh topology. For the backups, all buildings will serve as a storage for each building
linked using a Virtual local area network that employs a failover services technology called
MPLS and Active Directory DFS synch for files, data source failover of web server,
management of content and database are always accessible. Part mesh model offer recovery from
disaster and no downtime.
DESIGNING A NETWORK TOPOLOGY
8
References
Academy, C. N. (2014). Hierarchical Network. Cisco Networking Academy Connecting
Networks Companion Guide: Hierarchical Network Design,
https://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=4.
Cisco. (2011). Redundancy and Fail-Over. Retrieved from Service Control Engine (SCE)
Software Configuration Guide, Rel. 3.1,:
https://www.cisco.com/en/US/products/ps6134/products_configuration_guide_chapter09
186a0080849904.html#wp1047706
Redmon, K. (2014). Cisco bring your own device (BYOD) networking. Cisco Press,.
Running Head: NETWORK SECURITY PLANNING – SAFE
Network Security Planning – SAFE
Name
Institution Affiliation
Date
1
NETWORK SECURITY PLANNING – SAFE
2
Introduction
Network security is very important in any organization. Attackers are always ready to
cause harm to vulnerable networks. Threats such as ransomware, worms, phasing, botnets, and
computer viruses are very common today. According to Balan, Otto, Minasian, and Aryal
(2017), most companies have incurred huge losses through cyber-attacks. The most challenging
thing in modern computer security is that attackers have advanced their skills and keeps on
inventing new and more complicated threats. Due to this, it has become a challenge for most
organizations to withstand emerging attacks using traditional security measures. Therefore, there
is a need for a security solution that is comprehensive, threat-focused, and credible. CISCO
SAFE reference architecture provides all the needs that modern organizations need to secure
their network.
CISCO SAFE Reference Architecture
The CISCO SAFE reference architecture is a modern way of securing businesses from
both the existing and upcoming threats. It organizes security capabilities in the organization to
come up with blueprints. The designs of SAFE architecture combine security capabilities with
the flow of the business to ensure that the network is secure in all network levels (Savold,
Dagher, Frazier, & McCallam, 2017). The SAFE reference architecture is organized into places
in network (PIN) or modules, which include Branch, Campus, Cloud, Internet edge, WAN, and
Data Center. Security capabilities implemented in these PINS provides organizations with
protection for the threats posed by new threats posed by the evolving media and technologies.
The branch module is the most targeted part of the network architecture because it
connects users to the organization via a remote connection. This is where threats like insider
NETWORK SECURITY PLANNING – SAFE
3
threats occur. CISCO SAFE Branch ensures that the branch is secure by preventing unauthorized
access and protecting the endpoints. WAN edge interconnect branches in different locations.
CISCO SAFE WAN edge ensures that WAN is protected from denial of service attacks to ensure
consistent business flow. CISCO SAFE data centers and SAFE internet edge also ensures that
data storage and internet connectivity are resilient and available because they can affect business
processes if they are down or attacked.
Limitations of CISCO SAFE Reference Architecture
CISCO SAFE architecture has the following limitations. First, it is dependent on devices
from CISCO (Fernandez, Monge, & Hashizume, 2016). This means that it is impossible to
implement CISCO SAFE architecture on the network effectively without first purchasing CISCO
devices. Since CISCO SAFE architecture is implemented in modules, all modules must be
uniform in terms of the device used to avoid incompatibility. For example, network devices from
Huawei, cannot be used in some of the CISCO SAFE architecture modules.
This limits the
flexibility of CISCO SAFE architecture.
The second limitation of CISCO SAFE architecture is that organizations cannot
implement it without redesigning the whole network. According to Savold, Dagher, Frazier, and
McCallam (2017), CISCO SAFE architecture is the arrangement of existing security devices and
capabilities in a way that improves the overall security. This means that it is not single software
or hardware that can be installed on the existing network. Therefore, the organization must incur
extra costs to buy devices such as Cisco Security Agents (CSA) and firewalls that are compatible
with the SAFE architecture and pay the experts. This makes it hard for small and medium
organizations to implement the CISCO SAFE despite the existing security challenges.
NETWORK SECURITY PLANNING – SAFE
4
Conclusion
In conclusion, network security has become a challenge in the modern world because of
more advanced threats due to evolving technology and media. Today, Organizations are in need
of security solutions that can provide a means for securing the whole network. That is why
CISCO SAFE reference architecture has benefited most organizations by allowing security to be
implemented in all network levels. SAFE architecture has allowed businesses to improve
productivity by allowing employees to work safely without threats, such as the denial of service
attacks. Also, the organization’s branches are interconnected securely, thus facilitating
organizational growth.
NETWORK SECURITY PLANNING – SAFE
5
References
Balan, S., Otto, J., Minasian, E., & Aryal, A. (2017). Data analysis of cybercrimes in businesses.
Information Technology and Management Science, 20(1), 64-68.
Fernandez, E. B., Monge, R., & Hashizume, K. (2016). Building a security reference architecture
for cloud systems. Requirements Engineering, 21(2), 225-249.
Savold, R., Dagher, N., Frazier, P., & McCallam, D. (2017, June). Architecting cyber defense: a
survey of the leading cyber reference architectures and frameworks. In 2017 IEEE 4th
International Conference on Cyber Security and Cloud Computing (CSCloud) (pp. 127138). IEEE.