Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Review of literature on inventory management
Review of literature on inventory management
Project work report on inventory management
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Review of literature on inventory management
Riordan Manufacturing WAN Project
The current architecture of the Riordan Manufacturing Company Inc. Wide Area Network (WAN) and network security in place requires updated documentation. The purpose of this paper is to consolidate the existing information into a single format and evaluate the WAN and security documentation for an executive overview. Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. With state-of-the art design capabilities, they create innovative plastic designs that have earned international acclaim. Attention to detail, extreme precision and enthusiastic quality controls are the hallmarks of Riordan Manufacturing. With facilities in San Jose, California, Albany, Georgia, Pontiac, Michigan and Hangzhou, China, the company is heavily dependent upon their communication networks. The documentation produced by this analysis will give the management at Riordan Manufacturing an understanding of their current network topology and a baseline to evaluate security of the network.
The current information regarding the security of Riordan Manufacturing's WAN is sparse at best. The diagrams supplied to our organization show the network setup for each facility. Information regarding the port configuration, router configuration, and any security software is not available at this time. An inventory of each site and a brief description of possible security settings and procedures for each facility will follow.
The corporate headquarters network in San Jose (see attachment 1) has 2 WAN connections. The first one is a T1 wired connection protected by an unknown firewall. The second connection is a satellite link to China no security devices noted. The network inventory includes:
2 each VoIP/Data routers model unknown
2 each 24 port switch Cisco 5950
1 each 24 port hub Linksys EF2H24
2 each gateway/switch model unknown
1 each Uninterruptible Power Supply model and size unknown
3 ea IBM H520 Blade Servers, 2 each for network and 1 each for exchange
1 each IBM pSeries 6E4 Unix server
1 each NAS Iomega P800M
35 each IP phones model unknown
35 each desktops Dell Optiplex
15 each desktops G5 MAC
3 each color printer Phaser
1 each plotter Hewlett Packard
The Albany, GA. (See attachment 2) network has 1 WAN connection to corporate headquarters. This connection is a fractional T1 with a 256k circuit for email and 1.5Mbps for burst. The WAN is not protected by any type of network security devices. The network inventory includes:
DataSMART 658 single-port add/drop DSU/CSUs to connect LAN to corporate network
3 each 24 port Nortel Baystack 450 switches
1 each Cisco 1760 router
2 each Compaq Proliant PIII 800MHZ servers, 1 each for file and print and 1 each for exchange
Based on information provided by the SANS Institute, obtaining as much information as possible, regarding the company’s network infrastructure, network topology, and even previously discovered vulnerabilities is important, in order to better-plan for executing various penetration tests (source). Also, with Alexander Rocco Corporation based in Hawaii, a legal analysis should be conducted, accounting for the following state laws regarding penetration testing and/or cybercrimes:
Employee motivation and rewards are effective means to retain employees. When an employee is motivated, his or her needs are being met. When an employee is unmotivated, his or her needs are not being met which results in a high employee attrition rate. Riordan Manufacturing is experiencing a high attrition rate. Riordan Manufacturing has 3 plants and employs 550 people. Recently, Riordan hired Human Capital Consulting to perform an analysis on the underlying issues that are causing the decreasing employee satisfaction and to recommend courses of action that will address the underlying issues. Research has been done to identify the issues and opportunities, the stakeholders and ethical dilemmas, and the end state vision. A gap analysis has also been performed to determine the gap between the current situation and the end state goals. Riordan Manufacturing will use this information to determine the best way to proceed towards improving its working environment for the employees.
In order to protect the application servers from the internet, the most common un-trusted network, the proposal suggests a firewall to be installed between the internal network and external router. The firewall would be an Adaptive Security Appliance (ASA) firewall, "the ASA is not just a pure hardware firewall. In brief, the Cisco ASA is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. It provides proactive
Cisco Designs, manufactures, and sells Internet Protocol (IP) - based networking and other products related to the communications and information technology (IT) industry and provide services associated with these products and their use. The company provides products for transporting data, voice within buildings, across campuses and globally. The products are utilized at enterprise businesses, public institutions, telecommunications companies and other service providers, commercial businesses, and personal residences. Cisco conducts its business globally and manages its business geographically. Its business is divided into the following three geographic segments: The Americans; Europe, M...
The main location, which is a much larger office, uses a Class A IP address schema. This class is for very large networks. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are used to identify each host. This means that there are 126 Class A networks each with 16,777,214 (224 -2) possible hosts for a total of 2,147,483,648 (231) unique IP addresses.
Meanwhile, the advent of early PC’s and the recognition of the value in networking devices together gave rise to Local Area Networks. These LAN’s were developed from a business customer perspective, which placed more emphasis on costs and ease of use over reliability. There were a number of different competing LAN technologies, two of the most common being Token Ring (IBM) and Ethernet (everyone else). The triumph of Ethernet in the marketplace, to the extent where it is included in every PC, game console and some refrigerators, provides a consistent and relatively inexpensive way to build internal networks with relative ease.
Two routers demark the border between internet and intranet. Internal to these routers are two more routers, creating the appearance of a demilitarized zone (DMZ). However, there are access points, the wireless antenna system and the remote access server (RAS), that provide deeper intranet access that do not rely on the DMZ, rendering the latter rather decorative than substantial. Lastly, there is the virtual private network (VPN) that makes use of the edge routers and provides greater intranet access. Over all, there are four access points: VPN, two edge routers, the RAS, and the wireless system. The RAS, VPN, and wireless provide internal access.
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
Although VPN is very popular in the market for networking technology, it may raise some concerns for IT managers. VPN requires an in-depth understanding of public network security issues and proper deployment precautions. The task of choosing and deploying a VPN solution is far from being simple and may require the training of workers in at least the basics...
In designing a network, it is essential to first determine the scope of the project by asking key questions that will aid in the design and build. Questions such as how many servers and computers will be connected, what is the intended purpose of the network, and how much money is available are basic questions that come immediately to mind. Other questions such as security considerations, and how will the physical architecture of the building affect the design are often ignored but are equally important to the success of the network. Once these questions have been answered, the process of network design can begin. As the design of the network affects both media choices and performance, it is crucial that a design which takes current needs into account, allows room for growth, and provides a proven path for upgradeability is chosen.
...fice location will have a VPN capable router connected to the T1 connection. Various workstations will also be connected to the LAN at each office.
A WAN (wide area network) goes across large physical distance. Many times a WAN will go almost around most of the world! The most popular WAN is the Internet. The Internet is one big huge WAN and it is also the most used WAN.
When you are getting hardware for your office you must have plenty of computers and also have a main computer server (McKay, 2011). “A server is the primary computer in the network, stores and transfers data to and from connected computers, and acts as a “clearing house” for all internet data traveling to and from the network” according to McKay (2011). It depends on how big the network is, if you need more than one server (McKay, 2011).
The internet sharing in the data network was done in unplanned manner where two internet connections where assigned to individual users, that is one connection per user, and the other two connections where supplying the rest of the data network, each connection assigned to a specific location that is the sales department have one connection and the drawing section has one connection, Microsoft internet sharing connection facility that is freely available in Windows client operating systems is used to share internet connection to the other devices, in each section, by default this type of connection will assign the gateway with a 192.168.0.1/24 IP address and by enabling the clients to get the IP addresses dynamical, they will all be assigned with an IP address from this subnet, since the same setup is used at the other section, an IP conflict occurs when the uplink cable is connected permanently. Therefore the link is being used as a back up, with the cable only plugged in when the link on the other side has failed.
While an intranet is private and is protected from public visits by firewalls, an organization can create an Extranet to allow authorized suppliers/distributors and customers/shareholders to have limited access to its internal intranet. An Extranet, or extended Internet, is a private business network of several cooperating organizations located outside the corporate firewall. An Extranet service uses existing Internet interactive infrastructure, including standard servers, email clients and Web browsers. This makes the extranet far more economical than the creation and maintenance of a proprietary networks. It enables trading partners, suppliers and customers with common interests to form a tight business relationship and a strong communication bond (see Figure 2).