Function of Routers in network infrastructures

Function of Routers in network infrastructures

Networking Infrastructure

Name:

Instructor:

Course:

Date:

Table of ContentsPage

Introduction ……………………………………………………………………….3

Primary Domain Controllers ………………………………………………………5

Function of Routers in network infrastructures …………………………………..6

Functions of firewall in network infrastructures found in organizations ………….6

Task 2: Local area network (LAN) Infrastructure …………………………………..7

Active Directory Network Storage for H.O.Ds ……………………………………..8

Task 3 ……………………………………………………………………………… 8

Task 4 ……………………………………………………………………………….11

Accessing Stored Files ………………………………………………………………13

Conclusion …………………………………………………………………………..13

Bibliography …………………………………………………………………………15

1. Introduction

Network infrastructure refers to an interconnected group of computer systems linked by the many parts of telecommunication architecture and design. Such network infrastructures can be categorized as computers that have been networked to routers and other devices such as cables and remote access focuses. Interconnected gatherings might likewise incorporate things, for example, the switches, spines, system conventions, and system access strategies that are vital and serve as the complete system of machines. Typically, networking infrastructures are either open or closed, such as the open architecture of the Internet or the closed architecture of a private intranet (Combee, et al., 2001). The network infrastructure techniques can operate either through wired or wireless network connections, or through a combination of both.

According to Organization For Economic Cooperation and Development (2012), in simplest of form network infrastructure may consists of one or more computers, a network or Internet connection, and a hub to both link the computers to the network connection and tie the various systems to each other. This hub networks all the computers without limiting data flow to or from any one system all the time. To make sure there is control or limited access between systems and regulate information flow, a switch replaces the hub to create network protocols that define how the systems communicate with each other.

Further, network infrastructure does also refer to the hardware and software resources of an entire network that enable network connectivity, communication, operations, and management of an enterprise. Combinations of different computers in a single area sharing similar internet connection can be considered a basic way of network infrastructure; this does not depend on whether or not the computers also share information with each other. Therefore, where there is a more advanced network infrastructure, with all systems accessing a global network containing information on various systems, and can accessed using website standards and protocols, most commonly framed as web addresses can be referred to as internet.

Most of the organizations use intranets, which can operate on a closed network infrastructure and can only be accessed by those within it. Intranets consist of servers, which centrally stores data or information in computers regardless of the number of computers. Beside this, it also consist of Ethernet cabling, remote access focuses, switches, switches, and workstations with access to the focal information store all the computers within the system are connected to the network by the use of either cabling or wireless access. The routers and switches determine what level of access they are allowed to have, which direct traffic to point them to the central data store on the servers. As the individual computers send or receive data, the routers ensure it reaches the appropriate destination.

Stallings and Brown (2013) assert that the primary concern when building a network infrastructure is the network security. Internet infrastructures uses in built firewalls as well as other software permitting only known users to access control, carry out data packet monitoring, as well as significant things such as strictly defined protocols to help in safety purposes. Adjusting network sharing properties on individual systems limits the folders and files that can be seen by other users on the network, this enhances network security. Communication routes and services between users, processes, applications, services, and external networks/the Internet is provided by the network infrastructure. The whole network infrastructure is interconnected, and can be used for either internal communications, external communications or both. Hardware system includes wireless routers, LAN cards, routers, switches and cables constituting an organizational network infrastructure. Other serves as a software system consisting of network operations/ administration, working frameworks and a firewall and system security requisitions that are key for security purposes lastly, benefits framework, for example, T-1 Line, DSL, satellite, remote, conventions and IP tending to.

According to Minasi (2014), a Primary Domain Controller (PDC) is a server computer in a windows domain in a control room. Primary Domain Controller serves as a place where there is a network of many computers and their accessibility is controlled by the primary domain controller, which is known as the domain. Various account types exist in the domain, the most basic is the “guest” or “anonymous login” account (Cisco Press, 2012). All the domain resources are centrally controlled at the primary domain controller in an administration account

Primary Domain Controllers

In an organization, primary domain controller is categorically purposed for, user manager for domains which is used as utility for maintaining user group information. It is worth noting that the main domain controller utilizes its own security database on the primary controller thus enhancing its functioning to a greater level. There is also main master copy of the user accounts database that is able to access and be modified anytime if necessary. Another copy is in the backup domain controller in the computers database, however these copies on read only memory (ROM). In addition, the primary domain controller duplicates its account database to the backup domain controllers regularly. It is important to note that the backup is provided to the primary domain controller by the backup domain controller, and can further help in ascertaining the many users that access the network in an easier way. In case failure is experienced on the primary domain controller, one of the backup controllers may be utilized in its place thus serving almost similar purpose.

Function of Routers in network infrastructures

Shelly and Misty (2012), assert that the purpose of a router is to decide the best route for a packet to travel through connection speed and also facilitates the data flow within the system. It has a specialized computer connected to more than one network. Communication to other networks are bridged by routers which also it links the networks and basically provides a common language for data exchange, according to the rules of each network in the system.

Functions of firewall in network infrastructures found in organizations

Mankell and Segerberg (2012) explain that firewalls have, for long, provided the first line of defence in network security infrastructures. This is made possible by comparing different corporate policies about users with network access rights to the connection of information surrounding every access point. Connection of user data ought to be similar for the firewall to deny accessibility to network resources, something that is essential in preventing break-ins.

Recently, firewalls are deployed in both the traditional network perimeter-where the private corporate network meets the public Internet-but also throughout the enterprise network in key internal locations, as well as at the WAN edge of branch office networks, this is considered a growing best practice. This strategy of distributed-firewall helps protect hardware and software against internal and external threats, which for a very long time has accounted for a large percentage of cyber losses, according to annual studies conducted by the Computer Security Institute (CSI).

Besides the significant benefits accrued to the network infrastructure in an organization, threats in networking infrastructure have increased significantly because of the emergence of new network perimeters that have formed inside the corporate Local Area Network (LAN). Threats in networking infrastructure are classified into either internal or external threats depending on their causes. Examples of these perimeters, or trust boundaries, are between switches and back-end servers, between different departments, and where a wireless Local Area Network meets the wired network (Jeffrey, Beasley & Piyasat, 2012). access breaches at these key network points are kept at bay by the firewalls, for instance, that sales representatives of the organization are unable to gain access to the commission tracking finance system. Apart from this, firewall support organizations by making sure that they are consistent with the latest industrial governance mandates that may be essential for the organizations.

Task 2

Local area network (LAN) Infrastructure

As indicated by Davies (2012), Local Area Network base outline is to a great degree imperative for legitimate IP telephony operation on an united system. An exhaustive neighborhood framework configuration obliges various essential arrangement. This helps in deploying a highly available network in an organization. Moreover, LAN infrastructure design needs the utilization of QoS that are found on the network infrastructure of organization.

7239000640080023

23

Below is a LAN diagram of the stadium business interconnection.

2133600414655Ms.A.D

Ms.A.D

142875357505HOD Guest services

HOD Guest services

4467225357505HOD Ticketing

HOD Ticketing

2209800383540HOD Entertainment

HOD Entertainment

Active Directory Network Storage for H.O.Ds

Dynamic Directory Network Storage is a document offering asset, through which Hods can store their documents on an ACCC record server. The administration depicted above gives clients profoundly excess, exceptionally accessible, completely moved down, lifetime stockpiling of individual or departmental documents and this resource is made available to the user whose departments have requested disk space through ADNS. The files are stored on a Windows file server, and users can access their files from multiple computers. Their files will be available to them 24 hours a day, 7 days a week, and 365 days a year excluding extreme circumstances.

Task 3

Different organizations usually have domain controllers in their network infrastructure and that enable them to on server core rather than the full version of windows. This is because server core provides minute footprint that is which are very flexible thus enhancing movement in a virtual devices and reduces parts that may be moving as well as enhancing of stability and uptime.

Medium-sized institutions must avoid using the “all-purpose” computer based servers that may only suit smaller companies. Therefore, an organization domain controller should effectively provide other infrastructure services like DHCP and DNS. Domain controllers in a network infrastructure should perform a single function as print servers, file servers, e-mail servers or any other major tasks.

It is important for every organization to put in place backups and recovery systems or a continuous, disk-to-disk backup system. Conversely, other organizations with medium size network infrastructure can also benefit from a dedicated active directory recovery tool that can provide graphical interfaces for attribute-level, single-object, and whole-domain recovery.

However, medium sized organizations should review their auditing and reporting techniques, especially those in legally-sensitive fields like finance institutions and healthcare institutions. This kind of change auditing needed in this organizations can rarely be satisfied by the native Windows event logs, which don’t provide separation of duties, high-performance high-volume logging and so on.

According to Desmond (2013), active directory functionality depends on the proper configuration of the DNS infrastructure. The organizations DNS infrastructure involves client configuration, including domain controllers, domain members, and other computers. There is also the server of the DNS and zone configuration and proper delegations in parent zones. DNS serves a significant role in locating records within the organization’s domain.

Davies (2012) asserts that, the considerations for implementation of active directory involves eemployees desktop that depend on the business the organization conducts as the rate of representative desktops shifts. Associations in retail area have similarly few work area-bound representatives, inasmuch as establishments like banks or insurance agencies have a higher rate. In each identified case, though, there is an employee who works on the floor or at a teller location in stations that are often not equipped with individual phones or computers (Clemm & Wolter, 2013), these employees use shared resources. However, workers that are using desktops have high chances of getting voice mail, as opposed to those that are on the retail floor during their work environment and responsibilities or duties. Majority of company employees have voice access mails (again, accessed from a common phone or break room) for human resources or education training purposes.

If the organization is using wide area network connectivity the network infrastructure between the sites is most likely to be a private wide area network of different type. Wider area network connectivity may include virtual private network that uses public internet as a way of conveying data that are not even QoS-enabled hence making it unfit for use in the organization system of networking.

There are different types of wide area network (WAN), for instance, VoIP-capable wide area network which may either be owned privately or may be provided as a single service to all the sites of the enterprise. A Virtual Private Network may still be used on top of the basic network service. In an organization, it is prudent to evaluate connectivity site because it depend on the site’s geographic location and its bandwidth needs. The connectivity sites may include DSL, BRI, fractional T1/E1 access, or even metro-Ethernet and organizations with relatively wide departments may require a full T1/E1 or may a combination of multiple DSL and BRI physical access lines to enable larger bandwidth.

An organization may prefer to use the use integrated access, that contains both voice and data channels sharing the same physical T1, as it offers an attractive offering for the office department. PSTN may serve as a T1 in-band that signals (T1 Channel Associated Signalling [T1 CAS]) or may be a fractional PRI as well as connection data that may help to relay connections. A careful analysis should be done before choosing PSTN connectivity because it depend the size of the office and its location. An organization may prefer low-density analogue (FXO or analogue DID) or BRI connections or higher-density fractional T1/E1, with fractional primary rate interface service.

Before an organization installs of the its operation system for the purpose of networking, the size of the department and the model of the business determine whether the office might prefer key system operation (Line1, Line2, will appear on the buttons of each phone). The office may also be determined if it suits PBX-like operation with typically a single extension per phone and DID service from the CO. Small sized offices more often tend to use key system (shared-line) operation, because that is the traditional voice system they were likely to have had installed before migrating to IP telephony. The companies with larger department, it is difficult to have a button appearance for each incoming managers activities. These sites tend to be better candidates for DID service. A human or provides receptionist services for general incoming business calls and directs clients to the correct department or employee extension (Davies, 2012).

It is significant to integrate some voice services if a few sites are interconnected because the on-net dial plan can always be implemented directly at each site due to its simplicity. However, this meshing of sites becomes increasingly complex to manage as the number of sites increases. Because of security reasons, an organization needs to employ a security officer in every gate to ensure that centralizing the dial plan management is well worth considering.

Task 4

A Head of Department should follow the best practices recommendations regarding DNS configuration from the beginning of the deployment is key for successful Active Directory deployment and operations (Svidergol, Allen & Hunter, 2013). However it is not in order to ttroubleshoot active directory rreplication in case it fails because of incorrect DNS cconfiguration, as this can lead to a wide variety of failures, because all active directory services largely depend on the ability of the devices to locate domain controllers, which is performed through DNS queries, (Beasley, 2012).

Presence of the event IDs logged by the net Logon service in the ssystem vent Log indicate that the corresponding domain controller cannot register DNS records that tend to advertise its availability as a domain controller. In such a case of failure domain controllers, domain members, and other devices cannot locate this domain controller. Hence, other domain controllers might not be able to replicate from this domain controller (Combee et al., 2001). It can interfere with other computer networks and may make them not to connect well with organization existing domain. Therefore, this effect might in turn not be able to add other domain controllers to this domain unless other domain controllers for this domain have successfully registered, domain controller Locator DNS records.

Accessing Stored Files

Requesting for the accesss of the files can be done using the following pointers,

P: Drive, Personal folders are developed on request for faculty or staff who have workstations on Active Directory. As a Head of Department to request a personal folder for yourself, complete the online form at active directory manager files. The shared folders these folders are prepared with each department that has different workstations on active directory and can only be accessed on request by the department who manages the folder data. The data can only be released on completion of the online form at active directory manager.

The security of the folders storage on the active directory file server ensures a secure, backed up data storage for faculty and staff. The employees file storage of the organization is set up for those who have a computer on an active directory. Files share by each department should be clearly set up in the organization departments. A member of an organization is able to access data stored on the active directory file servers from any computer on the network of that particular organization.

Every organization department the computers that have been added to active directory, the N and P drives are automatically mapped when you sign in to your computer with your active directory credentials. The remaining computers that have not been added to active directory cannot be accessed unless you obtain full folder path, including the active directory server name. Before accessing the data to active dictionary files of an organization from any wireless network or from off campus, one should first sign in to the UMD VPN service.

Conclusion

Organizations that want to embrace efficiency in the information technology, productivity, and transfer of digital information, Website linkages, and other electronic enterprises will need this medium as the platform for all electronic transactions. The network structure chosen by an organization should entail all the requirements mentioned above. As neighborhood and wide region systems are built, the country might revel in new specialized flexibilities bringing about enhanced administration to open and private area, more amazing enterprise open doors for the country, expanded income to the stadium. A good organization network infrastructure should be able to integrate and accommodate technical flexibility that permits extension of national future appropriately. The long run as well as the short-term benefits would manifest themselves in stadium productivity and efficiency improvement, and eventual departments, access and connectivity to e-transaction capabilities through the information super highway. References

Cisco Press, 2012. CCNA Exploration Course Booklet: LAN Switching and Wireless, Version 4.0 Cisco Unified Call Manager Express Solution Reference Network Design Guide

Clemm, A., & Wolter, R., 2013. Network-embedded management and applications: Understanding programmable networking infrastructure. New York, NY: Springer.

Combee, B., Lyons, R., E., Matthews, D., C., & Lysaght, R., 2001. Palm OS Web Application Developer’s Guide Developing and Delivering PQAs with Web Clipping. Rockland, MA, Syngress Pub.

Davies, J., 2012. Understanding IPv6: Your Essential Guide to IPv6 on Windows Networks “O’Reilly Media, Inc.”

Desmond, B., 2013. Active directory designing, deploying, and running Active Directory. Farnham, O’Reilly.

Jeffrey, S., Beasley & Piyasat, N., 2012. A Practical Guide to Advanced Networking, Third Edition Pearson.

Mankell, H., & Segerberg, E., 2012. Firewall. London, Vintage.

Minasi, M., 2014. Mastering Windows Server 2012 R2. Indianapolis, Sybex.

Organization for Economic Cooperation and Development 2012. Latin American economic outlook: 2013. [S.l.], Oecd.

Shelly, Gary, B., & Vermaat, Misty, E., 2012. Enhanced Discovering Computers, Complete 2012 Your Interactive Guide to the Digital World. Course Technology Ptr.

Stallings, W., & Lowrie, B., 2013. Computer security principles and practices. Pearson Edu.

Svidergol, B., Allen, R., & Hunter, L., E., 2013. Active Directory cookbook. Beijing: O’Reilly.