Case Study of World Wide Trading Company

300 views 11 pages ~ 2821 words Print

For WWTC’s growth into North America, this research study is primarily focused on describing the design and installation of LAN networks with the introduction of WLAN and VoIP capabilities. This document’s network designs and equipment list fulfill the business design needs identified from the analysis of the World Wide Trading Company. This document describes the network’s logical layout as well as the many pieces of equipment that must be bought. This will comprise all the tools necessary for the job, as well as wireless and VoIP locations, connections, and naming conventions. The expanding development of remote voice-over-IP (VoIP) communication brings about more 802.11 Wi-Fi remote systems being approached to bolster remote voice telephone calls. Versatile handsets, and outstandingly items like the iPhone, have moved the endeavor into a remote VoIP world. The Cisco Unified Wireless Network consolidates propelled highlights that lift a remote sending from a mean of productive information availability to a stable, met interchanges organize for voice and data applications. The Cisco Unified Wireless Network is an extensive arrangement enveloping both customers and foundation, settling the confinements of conventional WLANs while empowering administration abilities to manage issues without overburdening corporate IT assets productively.

Classified network

Equipment

Quantity

Model

Remarks

Distribution Switch

1

Catalyst 6504E w/ 720-10G Sup

4RU

Servers

2

HP ProLiant DL360 Gen9

1RU

Core router

1

Cisco ASR 1001-X

1RU

Access Switch

1

1RU

Security Cameras

2

IP Camera Cisco 3520

PoE

Security Entry System

1

Card Reader: Honeywell

ACS-Access Control System

Uninterrupted Power Supply

1

APC Smart-UPS SRT 5000VA 230V

Uptime=40 minutes

Network Encryption

1

IP Encryption ViaSat KG0250X

Network Encryption

Server Racks / Cabinets

1

KH-3106-3-001-22

22U Enclosure

Cooling System

1

Mitsubishi MSZ-FH06NA

Mountable on the wall

Unclassified Network

Equipment

Qty.

Model

Remarks

Distribution Switch

2

Catalyst 6504E w/ 720-10G Sup

4RU

Core Router

2

Cisco ASR 1001-X

1RU

Storage Area Network

1

HPE Store Virtual 3200 (N9X19A)

2RU

Firewall

2

Cisco ASA 5555-X

1RU

UPS

2

APC Smart-UPS 5000VA 230V

Uptime = 40 minutes

Servers

7

HP ProLiant DL360 Gen9

1RU

IPS

2

FP7020-K9

1RU

Patch panels

4

Tripp-Lite N252-048

2 RU CAT 6 48 ports

Security cameras

2

IP Camera Cisco 3520

PoE

Cooling system

1

Mitsubishi MSZ-FH06NA

Mountable on the wall

Security Entry system

1

Card Reader: Honeywell

Access control system

Server Racks / cabinets

2

RS-4POSTRACK-24U

4Racks (Post open)

Access switch

6

WS-3750V2-48PS-E

1RU per switch

Wireless

Equipment

Qty.

Model

Remarks

Wireless Controller

2

AIR-CAP3602I-A-K9

Supports 25 WAPs

Wireless Access Point

5

AIR-CT2504-25-K9

802.11n Dual Band

Working Area

Equipment

Quantity

Model

Remarks

Workstations

87

HP Elite Desk 800 USDT

Windows 10

Printers

20

HP M575dm

LaserJet

PC Monitors

87

HP L2445w

24-inch Widescreen

HD Television

2

65 inches TV Wall Mounted

Conference Rooms

Video Conference

2

Polycom Real Presence Group 500

Conference Rooms

Security cameras

6

IP Camera: Cisco 3520

PoE

Security entry system

1

Card Reader: Honeywell

Access Control System

VoIP

Equipment

Qty.

Model

Remarks

Call Manager System

1

Cisco ISR 3945

Working sections

IP Phone

94

Cisco CP-7975G

Voice Gateway

1

Cisco ISR 3945

Equipment Naming Connections and Convention

Unclassified Vacant Room 1

Device

Connection

Name

Remarks

Cisco ASR 1001-X

NY-DSW1/NY-DSW2

NY-CR1

Core

Catalyst 6504E w/ 720-10G Sup

NY-CR1, NY-CR2, NY-ASW1 NY-ASW2

NY-DSW1

Distribution

Cisco ASR 1001-X

NY-DSW1/NY-DSW2

NY-CR2

Core

WS-3750V2-48PS-E

NY-DSW1, NY-DSW2

NY-ASW1

Access

Catalyst 6504E w/ 720-10G Sup

NY-CR1, NY-CR2, NY-ASW1 NY-ASW2

NY-DSW2

Distribution

Cisco ASA 5555-X

ISP1, ISP2

NY-FW1

Firewall

WS-3750V2-48PS-E

NY-DSW1, NY-DSW2

NY-ASW2

Access

AIR-CT2504-25-K9

NY-DSW1, NY-DSW2

NY-WLC

Wireless Controller

Cisco ASA 5555-X

NY-CR1, NY-CR2

NY-FW2

Firewall

Cisco ISR 3945

NY-DSW1, NY-DSW2

NY-VG

Voice Gateway

FP7020-K9

NY-FW1, NY-CR1, NY-CR2

NY-IPS

IPS

Cisco 3520 IP Camera

NY-ASW1, NY-ASW2

NY-CAM1 NY CAM2

Security Cameras

HPE Store Virtual 3200 (N9X19A)

NY-CR1, NY-CR2

NY-SAN

SAN

Vacant Room 2 (Classified)

Device

Connection

Name

Comments

Cisco ASR 1001-X

NY-DSW1/NY-DSW2

NY-CR3

Core

WS-3750V2-48PS-E

NY-DSW3

NY-ASW3

Access

Catalyst 6504E w/ 720-10G Sup

NY-CR3, NY-ASW2

NY-DSW3

Distribution

Cisco 3520 IP Camera

NY- ASW3

NY-CAM3 NY CAM4

Security Cameras

ViaSat KG0250X IP Encryption

NY-CR3

NY-NET

IPS

Work Area

Device

Connection

Name

Remarks

Cisco 3520 IP Camera

NY- ASW1, NY-ASW2

NY-CAM5 - CAM10

Secondary. Cameras

Cisco CP-7975G

NY- ASW1, NY-ASW2

IP Phones

AIR-CAP3602I-A-K9

NY- ASW1, NY-ASW2

NY-WAP1 -WAP4

Access Points

Hierarchical VLAN and IP Scheme

For the purpose of this study we need to create an IP address Scheme to be implemented for the New York office network infrastructure addressing in relation to the WWTC network infrastructure. We have been assigned an IP address of 172.0.0/20 in the requirements and this should allow for the accommodating for all devices 100%. For starters, we first differentiate the subnets based on the job title division because policies and resources are shared among these jobs i.e. the type of policies that are applicable to the brokers may not be applicable to the other staff. Next we need to identify the total number of devices available for the office. For this issue I assumed that a maximum of 14 devices can be held in each of the four reception offices taking into considerations both the wired and wireless connections. This will enable for multiple devices for every individual requesting for access privileges to the supposedly guest network. This requests total to 56 connections and in order for the network to have 100% growth room the subnet needs to be created with an assumed capacity of 112 devices. Therefore in order for this subnet to be created we have to go to the octet’s 128th place.

Linking of IP Addresses

For the linking of IP addresses section of address for network connections. We will list the IP addresses to their corresponding area in the network diagram.

The Classified Network Diagram

The Unclassified Network Diagram

Equipment Subnets and IP Addresses

Equipment

Section

Device

Qty.

VLAN

ID

100% Growth featured IP addresses

Host Devices Qty.

Subnet

Host IP address Range

Servers

47

100

94

126

172.16.12.0/25

172.16.12.0 – 172.16.12.127

Reception/Guest

56

110

112

126

172.16.0.0/25

172.16.0.0 – 172.16.0.127

VoIP

94

101

188

254

172.16.13.0/24

172.16.13.0 – 172.16.13.255

Printers

20

102

40

62

172.16.0.192/26

172.16.0.192 – 172.16.0.255

Conference Rooms

20

120

40

62

172.16.0.128/26

172.16.0.128 – 172.16.0.191

Managers

20

140

40

62

172.16.1.64/26

172.16.1.64 – 172.16.1.127

Executive Offices

26

130

52

62

172.16.1.0/26

172.16.1.0 – 172.16.1.63

Brokers

28

160

56

62

172.16.2.0/26

172.16.2.0 – 172.16.2.63

Staff

48

150

96

126

172.16.1.128/25

172.16.1.128 – 172.16.1.255

Wireless and VoIP Design

For this part, the network design diagrams that show the wireless and VoIP segments are implemented. As indicated by the detail in the WWTC Business and Technical requirements, the outline of the remote system ought to provide a fast and secure wireless connection in the hall and the two expansive gathering rooms.

VoIP Design

The design of the VoIP design of the network should provide for 100% connectivity, future growth requirements and reductions in the outside lines. In order for the implementation of a call manager, Voice Gateway and IP phones, the VoIP network design will be implemented by Cisco designs.

Outside phone lines will be utilized through open exchanged phone organize (PSTN) channels. WWTC’s official staff and merchants will be making business calls outside of the association and will require PSTN telephone lines. Because of the quantity of clients (around 28) and the normal substantial call volumes to be made, it is assessed that official staff and merchants will require around six PSTN channels at a 5:1 man for each channel proportion. For excess, voice-organize dial companions can be built up to keep up 100% network.

For the VoIP call the G.720 codec will be used whereas on the other hand the outside lines will be derived from the use of the Public switch telephone network. The VoIP network designs abd the voice bandwidth calculations are outlined in the table below.

Formula: Overhead + Packetization Size x Packet Rate = BW

OH

BW

PS

PR

BW

Total OH+PR

Peak %

Total BW

10 bytes

12 Kbps

20 bytes

50 pps

1.5 Kbps

30 bytes

70%

840 Kbps

Packetization Size

BW – Bandwidth

PR – Packet Rate

Kbps – Kilobytes per second

OH – Overhead PS

Office Layout

Wireless Design

Above is an excerpt of the network design for the wireless network requirements preceding the office layout diagram with the location of card readers, Security camera provisions and WAPs. The design of the wireless network should provide for the Cisco equipment including the wireless access points and wireless controllers. For the purpose of ensuring that there are maximum coverage provisions, the access points will be mounted on the ceilings of the reception areas and conference rooms. Constraining the scope of the wireless propagated coverage area can be overseen by modifying the antenna of the routers and furthermore the capacity to change the total number of the transmitting antennas.

WWTC will receive the most recent wireless standard, 802.11ac. Advantages to receiving the most up to date standard are speed and an expanded range of data without requiring extra allocation of the radio wave assignment, where a similar radio wave is utilized to make various streams which anticipate impacts on the system thereby preventing network collisions from occurring.

The security of wireless connection can be enhanced utilizing various encryptions to ensure that the wireless devices signals are validated from the access point end for integrity. The wireless signal needs to be scrambled for prevention of unauthorized client devices access or “sniffing” network data streams activity. A combination of PSK and WPA2 can be used to confirm the remote devices requesting accessibility. A fundamental advantage of WPA2 encryptions lies in its utilization of AES that scrambles 128-bits of data at once with a 128-bit encryption key.

For extra safety precaution effort, SSID name propagation needs to be incapacitated to prevent the discovery of the remote system identities by remote gadgets. Although this may not prove to be a fool proof strategy for security, it will make unapproved device connection more troublesome. Approved guests will be given system association subtle elements by system network administrators as required. Further protection to the wired and wireless networks will be achieved through use of separate VLANs and strict coverage area control of the wireless signals.

Wireless Access Point Configuration and Installation

Access Point Location

Access Points Naming

Summary of the Access Point Configuration

First Conference Room

WWTC_Conf1.1,

The wireless access point needs to be installed 8ft above the floor at the lobby and at both ends of the first conference room. To minimize channel interference, every access points will adopt its unique channels. In addition to this, a frequency of 2.4 GHz and 802.11g for bandwidth will be utilized.

Lobby

WWTC_Lobby1.1

The wireless access point needs to be installed 8ft above the floor at the lobby. For adequate coverage support for the users the antenna will be directional. A frequency of 2.4 GHz and 802.11g for bandwidth will be utilized. To minimize channel interference, every access points will adopt its unique channels.

Second Conference Room

WWTC_Conf2.1,

The wireless access point needs to be installed 8ft above the floor at the lobby and at both ends of the second conference room. To minimize channel interference, every access points will adopt its unique channels. In addition to this, a frequency of 2.4 GHz and 802.11g for bandwidth will be utilized.

Conclusion

The above designs and equipment will shape the logical and physical establishment of the WWTC New York voice and data systems. VoIP and services of the wireless network administrations will be actualized utilizing the most secure, progressive, and adaptable devices which exceed operational and budgetary goals. The subsequent stage for the network design plan is focused on creating carefully designed procedures, policies and security strategies via the Active Directory framework of the organization.

Voice administrations put stringent execution necessities on the whole system. Since digitized voice is an examining of a simple flag (verbal correspondence), its transmission is exceptionally delicate to delays amid travel. Truth be told, with the goal for voice to work accurately over any foundation, the end-to-end travel time (total time encoding the bundle, leaving the sending customer, navigating the system, and after that being decoded at the accepting customer) must be under 150 ms. Issues experienced amid travel result in blemishes in the reconstituted flag; otherwise called jitter. The jitter is fundamentally the variety in postponing that the framework is encountering.

While once voice and information were overseen as isolated innovations, the meeting of communication and Datacom is a reality in the remote venture today. Connect802 has been giving remote VoIP plan and counseling administrations for a long time, and we’ve viewed the business develop in the triple-play (voice-video-information) commercial center. We’ve likewise observed the sensational issues that happen when an 802.11 Wi-Fi remote LAN that is intended to bolster Web perusing, record exchange and email is utilized to bolster remote Voice-over-IP without the appropriate pre-sending appraisal.

Voice-over-Wireless-LAN (VoWLAN) requires a more high amount of flag power than does information exchange and Web perusing. VoIP requires that the got flag be all the more incredibly isolated from natural commotion (Signal-to-Noise Ratio SNR) and close-by meddling 802.11 transmitters (Carrier-to-Interference Ratio CIR). Connect802 can make an 802.11 Wi-Fi remote system outline that will appropriately bolster remote VoIP/Voice-over-Wireless-LAN (VoWLAN).

Dissimilar to some easygoing web surfing or checking email, your system foundation will need to give an abnormal state of unwavering quality and execution to give you fresh, clear, and NOT DROPPED remote IP telephone calls.Plus, in today’s meeting remote LAN condition, Triple Play (voice video information together) is another key motivation to ensure the Wi-Fi VoIP framework is prepared to bolster something beyond VoIP. 802.11 radio chipsets utilized as a part of remote information gadgets (journal PCs and PDAs), handheld stock scanners, and remote VoIP handsets are basically the same. They can all make associations with low flag qualities and moderately low flag to-clamor proportions (i.e. loud situations can bolster network). The issue comes when information associations (for record exchange, email, web perusing, and comparative exercises) are contrasted with the prerequisites for remote VoIP.

A remote VoIP call requires fundamentally higher detection quality, and a considerably more altogether high flag to-clamor proportions. An average “stroll around” on location review for a Wi-Fi organize does not survey 100% of a building’s floor space on the grounds that an architect can’t stroll around to each corner and all aspects of each room. Not at all like remote note pad PCs, which are regularly utilized as a part of a settled or roaming area (on a desktop, for instance), remote VoIP handsets are commonly utilized while a man is strolling. These requests an appraisal of reliable, adjoining scope that is unrealistic with an outline that is construct exclusively in light of a stroll through of a site.

RF CAD can be used in demonstrating and reproduction to increase the outline procedure, and as a rule to totally dispose of the requirement for an on location engagement. You get the correct plan the first run through, without stressing over backpedaling to right dead spots or feeble ranges in your scope. This quick reaction from the companion conveyance switch does not guarantee a quick union time, in any case, EIGRP recuperation is limited by the longest question reaction time. The EIGRP procedure needs to sit tight for answers from all questions to guarantee that it computes the ideal circle freeway. Reactions to the two questions sent towards the center should be gotten before EIGRP can finish the course recalculation. To guarantee that the center switches create a prompt reaction to the question, it is important to condense the square of dispersion courses into a solitary synopsis course publicized towards the center. At the point when a remote IP telephone controls on, it looks for and moves toward becoming related with an AP. As clients move starting with one area then onto the next, the remote IP telephone meanders out-of-scope of one AP into the scope of another AP. The remote IP telephone fabricates and keeps up a rundown of qualified APs and reconnects to an AP in that rundown.

A great assault on an exchanged system is a MAC content-addressable memory (CAM) flooding assault. This sort of assault surges the switch with such a variety of MAC addresses that the switch does not know which port an end station or gadget is joined to. At the point when the switch does not know which port a gadget is connected to, it communicates the movement bound for that gadget to the whole VLAN. Along these lines, the assailant can see all activity that is going to every one of the clients in a VLAN.

References

Cisco. (2011). Wireless LAN Design Guide for High Density Client Environments in HigherEducation. Retrieved June 9, 2016, from Cisco:http://www.cisco.com/c/dam/en_us/solutions/industries/docs/education/cisco_wlan_design_guie.pdf

Cisco Unified IP Phone 7942G Data Sheet. (n.d.). Retrieved June 3, 2016, from http://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/unified-ip-phone-7942g/product_data_sheet0900aecd8069bb68.html

Cisco Wireless LAN Controllers. (n.d.). Retrieved June 2, 2016, from http://www.cisco.com/c/en/us/products/collateral/wireless/4100-series-wireless-lan-controllers/product_data_sheet0900aecd802570b0.htm

Rife, B., 2012. How many calls can I make over my T1 with hosted voice? Retrieved 9 JUN 17 from http://www.invoip.com/blog/bid/103477/How-many-calls-can-I-make-over-my-T1-with-hosted-voice

Voice Design and Implementation Guide. (n.d.). Retrieved June 11, 2017, from http://www.cisco.com/c/en/us/support/docs/voice/h323/5756-7.html

Wireless_LAN_Design_Guide.pdf. (n.d.). Retrieved June 11, 2017, from http://www.cisco.com/c/dam/en_us/about/ciscoitatwork/downloads/ciscoitatwork/pdf/Cisco_IT_Wireless_LAN_Design_Guide.pdf

June 06, 2023
Category:

Education Business

Subcategory:

Learning Corporations

Subject area:

Research Study Company

Number of pages

11

Number of words

2821

Downloads:

59

Writer #

Rate:

4.4

Expertise Company
Verified writer

RiaSm02 is great for all things related to education. Sharing a case study that I could not understand for the life of mine, I received immediate help. Great writer and amazing service that won’t break the bank!

Hire Writer

Use this essay example as a template for assignments, a source of information, and to borrow arguments and ideas for your paper. Remember, it is publicly available to other students and search engines, so direct copying may result in plagiarism.

Eliminate the stress of research and writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro