Index IntroductionNetwork Architecture AnalysisNetwork Infrastructure AssessmentAddress Scheme ReasonServer ManagementNetwork Security Management:Security ThreatsDenial of Service AttacksMisalignmentAdware and SpywareSpywareChallenges: Features and ConfigurationTolerance Plan to errorsPower FailureCosts/Benefits of Power Failure PlanningHardware FailureCost/Benefit of Hardware Failure PlanningCable Management and FailuresConclusionRecommendationsReferencesThis report has deliberated network architecture analysis along with network infrastructure assessment for the company called Architectural Stone . This report detailed the server administration and network security issues involved, including denial of service attacks and misalignment with Ethernet. Likewise, it also explains the challenges and configuration of the network architecture such as fault tolerance plan, power failure, hardware failure, cable management and faults along with its cost benefit analysis. At the end of the report, some suggestions were made under the title of recommendations to protect and improve the Stone Architecture network. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay IntroductionArchitectural Stone is a privately held company with its head office located in Glenfield, Auckland. Architectural Stone believes the best service starts with the right people. We have an experienced team of stonemasons who together have decades of experience in the stone industry, including a family history of working with natural stone. (Architectural Stone)We have some experience in every single stone surface, offering our customers the widest range of items and assembly choices. As well as having a wide range of different granites, marbles and artificial stones, we can source and process specific materials to meet your needs. (Architectural Stone) Using today's innovation and the highest standards of customary aptitudes, we can create the strong piece of stone in countertops and vanities, higher points of refinement, just like hearths and mantles (including outdoor fireplaces), shower cabins, floors, partitions, coverings and uniquely crafted furniture. (Architectural Stone) Network Architecture AnalysisArchitectural Stone occupies a vital position. A warehouse is attached to the office structure where the goods are transported. The 10 stations used will use the Microsoft Windows 7 operating system. Microsoft Office is used for the main daily processes. Outlook is used for emails. Excel is used to track stocks. Excel inventory tables are uploaded to the inventory system's online system using the tools integrated into the hosted inventory application. In client-server architectures, the functions of the application program are divided between client and server, the list of servers is shown below: Web server File server Mail serverPrint serverDatabase serverOperator Access to the PCs is carried out by a colleague, an administrator office, which typically provides read-only access to Architectural Stone workers, including three managers with administrative-level access, as well as an accountant. Operator input is controlled by Microsoft Windows permissions. No employee's user login monitors Internet use or determines whether critical file management procedures are tracked. Written policies prescribe appropriate use of the Internet and file management, including thedownload of documents for business commitments. The existing topology is a logical star/bus. There is a vital hub to which all workstations are associated via a Cat5 Ethernet network. The cables are associated with a router and therefore with the Internet. The company's router was delivered to the company by their Internet service provider, Comcast. Network Infrastructure AssessmentArchitectural Stone is not a large company and network requirements are not important within it. There is confidence for future development, but at present a class C network is appropriate. A router, 3 24-port rack-mounted switches, 2 rack-mounted servers, 4 virtual servers, 10 workstations, and 3 printing devices are installed. In total, there are 30 unique IP addresses in one place. The first IP address on the system is 200.168.1.0. A Class C network allows 254 exclusive hosts per network. This often covers the current address network needs of the corporate network. (Doe, n.d.)A subnet mask is exploited to divide an IP address into 2 portions. The host fits into one part, and the network it fits into is the additional portion of the address if it's hidden in a subnet. Subnets are used to separate devices into workgroups, which can be divided by admission and utility. The subnet mask used for the network is the default subnet mask 255.255.255.0. This is the default subnet mask for Class C networks. (Doe, n.d.)IP addresses between 200.168.1.0 and 200.168.1.24 are reserved for network hardware. Servers, switches and routers are assigned a static IP address in DHCP. The figure is higher than essential to enable fault tolerance and virtualization. VPN networks are also routed using these IP addresses. IP addresses 200.168.1.25 to 200.168.1.50 are used for terminals. These IP addresses are assigned by the DHCP server as needed. Finally the devices vary from 200.168.1.51 to 200.168.1.75. Fax/printers are assigned to this collection of IP addresses. (Doe, n.d.)When you build the new schema, you need to update changes to local subnets, address pools, and default gateways on your servers. Devices and devices will not receive an IP address if network changes have been completed and DHCP servers have not been modernized to reflect these alterations. Reason for Address Scheme A class C network is currently Stone Architecture's choice, simply because the size of the network does not have to be very large. As already mentioned, the company only needs a maximum of 30 IP addresses in circulation at the same time and with normal use much less. Organizing the varieties of IP addresses in the technique defined above allows for better management and better troubleshooting. Setting subnets and IP addresses for failed devices helps you better manage network resources because traffic is consistent for specific IP addresses in groups. Server ManagementArchitectural Stone uses four types of servers. The file server, print server, mail server, and web server are located within the company, while the database server is located offshore. (Guide, 2017) Web Server: The basic utility of the web server is to have the website pages. Makes the Internet accessible. The site uses a static network. This way, the customer can only see the substance of the page and cannot ask or react to it. (Guide, 2017) File server: The most significant information should be stored in the registry such as customer data, staff data, offers and purchase data. It is also used to share documents and envelopes in the internal system. (Guide, 2017)Print Server: This server is usedfor printing purposes only. Whenever there is increased demand from the staff for printing, the server will take care of the pending burden and carry out the task by organizing it. You can use multiple printers to perform the assignment. (Guide, 2017) Mail Server: Use the organization's space name and create the email ID that each staff can communicate. (Guide, 2017)Database Server: This server is cloud-based. Its main capability is to store and access information from the cloud. It's deeply accessible. (Guide, 2017) The DNS server leverages services (DDNS services) that provide involuntary updates to the DHCP server. When the DHCP server enhances or issues IP addresses from agreed-upon extended leases, DDNS services regularly create, delete, and modify host entries that match for the purpose of the DHCP server. Microsoft Network Monitor can help troubleshoot DNS and DHCP server issues. With Network Monitor, an IT administrator can monitor hosts, ports, protocols and services and use network traffic to capture and analyze. (Guide, 2017) Alerts are sent to the IT administrator if the pool of available IP addresses drops below 20% of the total. At this point you will have to decide whether a further extension will be necessary. As devices are further upgraded, a static IP address is assigned to the network hardware and additional to the appropriate subnet. Devices and terminals are also connected to and, if necessary, disconnected from the IP ranges. In conclusion, traffic on network IP addresses is monitored by an IT administrator using MNM (Microsoft Network Manager). The server used is a client server architecture: https://www.toolsqa.com/client-server/client-architettura-server-e-protocollo-http/Network security management:In terms of security, Architectural Stone has of a firewall introduced within the network that has the ability to protect entry to the system from unapproved clients and potential dangers. Security Threats Some security dangers in the system that have been recognized are: Risk of phishing and downloading infections when staff are not alert to such dangers. Risk of vengeful malware being downloaded when not intended. Password-based attacks. Denial of Service attacks Front-end website and online store information: A denial-of-service attack on the website or at the store can essentially cause a network outage for the business. A DOS attack will shut down the company. There are methods for planning a denial of service attack. First, bandwidth congestion can cause a few spasms to run without interrupting the task. A DOS spasm mechanism exists because there is not adequate bandwidth to switch all incoming traffic. One prevention method is to have much greater bandwidth than. Automation tools can reduce noisy traffic and pass unencrypted traffic to the network. You can use a third-party Internet Service Provider to remove the traffic load in the event of a severe attack. If you have an additional source of Internet connection, the problem can be solved until the spasm ends. (Sanchez, 2010) Misalignment Each complete Ethernet cable must have a length divisible by eight to avoid this problem. Nodes carrying Ethernet frames depend on a File-Certification-sequence (FCS) figure. This figure allows you to accept the gadget to define upon arrival whether the package is accurate. Network noise can make these figures inconsistent with the source and can lead to an FCS error. (Sanchez, 2010)Adware and spywareIt is software designed to track site browsing dataWeb. Furthermore, it is a legitimate source of income for organizations that allow users to try their software for free, but display advertisements while using the software. The presence of adware is only evident because of these pop-ups and advertisements. As a result, it slows down the overall system, further affecting the functioning of the stone architecture. (Sanchez, 2010) Spyware Spyware is a type of malware that secretly collects information about Stone Architecture and transmits this data to other competitive organizations, which poses a serious risk to Stone Architecture because this software can share all the personal information of Stone Architecture with other parts. (Sanchez, 2010) These are some of the threats that Architectural Stone can and most likely will face in the near future. Challenges: Features and Configuration Fault Tolerance Plan No network is foolproof. The Stone Architecture network will concurrently experience network failures or compromises. You can identify potential network problems and plan your response. Five zones have been selected to be considered in fault tolerance planning, which are given below. (Knowledge, 2018)Power FailureWithout power, the network will not function regardless of other problems. Therefore, power should be taken into consideration for fault tolerance reasons, as power outages, no matter how brief, can cause significant hardware problems. To sustain an infinite supply, you need to use an uninterruptible power supply. An inverter is a hardware-based answer to convenience-level power outages. The inverter is on site and ensures energy supply in the event of a power failure. (Knowledge, 2018) The inverter is built with an automatic reset switch that controls when the inverter becomes operational. A generator should be considered a permanent solution because an inverter cannot cope with the energy load of the entire computer system for a long period of time (Burke, 2016). The automatic repositioning switch switches to the system's generator while the inverter processes the load in the meantime. Again, a UPS is not a permanent explanation for the power plant in the event of a power outage. But there is an inverter to maintain an uninterruptible power supply, because even a split-second failure can lead to serious computer problems. (Knowledge, 2018) Cost/Benefit of Power Outage PlanningThe purchase and installation of the inverter and the inadvertent transfer to the generator are associated with an initial expense. The price of an inverter for the entire system can be relatively high. The danger of data loss or corruption due to a power outage can also be significant. The price of a simple data loss is measured in man-hours spent recovering or restoring this information and in the price of any loss of revenue due to data loss caused by a power outage. (Knowledge, 2018) Hardware Failure Installing new hardware such as servers, switches, and routers carries a probable danger of hardware failure. Hardware errors can occur for several reasons, such as overheating, water damage, or personal injury. There are several steps you can take to resolve these issues. First, virtualizing a few servers helps combat physical server failures. However, you need to serve the server with virtual servers. A server room must be sufficiently cooled and ventilated. Switches and routers should be maintained in low-traffic areas
tags