CIS 337 Unit 7 Assignment Final Project Part IV Pr

CIS 337 final project presentation for stakeholders outlining a WAN proposal for a growing organization. Covers network planning, topology, security, and connectivity to support national and international expansion.

Daniel Miller
Contributor
4.6
34
2 months ago
Preview (3 of 9)
Sign in to access the full document!
CIS 337 Unit 7 Assignment Final Project Part IV Presentation to Stakeholders
Coburne S. Leslie
Dr. Mohamed Ben Haj Frej, Ph.D.: MCSE, CCNA
CIS337: Networking in Business
Post University
Final Project Part IV Presentation to Stakeholders
This proposal is developed for a medium-sized organization that has plans on both
national and international expansion, through the implementation of a Wide Area Network
(WAN). I am requesting revenue to supplement the development of the parameters within
this proposal. Once the proposal has been approved by the organization's executive board
members, which consists of the Chief Executive Officer (CEO). Chief Finance Officer
(CFO) and Chief Information Officer (CIO), development will commence. This network
will facilitate a better ease-of-access for clients, employees, and managers, thus alleviating
issues surrounding file sharing, communication constraints, and security concerns, which
will in turn promote organizational growth and productivity.
Part I: Planning the Network
Areas of focus will c onsist of. internal and external networking components,
quantity of users at each location, security protocols (in transit and at rest), WAN
architecture, data access and file sharing, remote access, and connectivity for local and
international users.
Stakeholders: The organization s stakeholders will consist of the Chief Executive Officer.
Chief Finance Officer, and Chief Information Officer.
Network Topology: In a WAN environment, the Hub and Spoke topology is the best
choice to be used for connecting critical local and international networking sites together,
where high redundancy and minimal latency are essential for optimal operation.
Central Office (Hub): The central office or headquarters often serves as the hub. This
centra] location hosts critical network resources, including servers, data centers, and
services. It usually has a high-speed, reliable connection to the internet and extensive
network infrastructure.
Branch Office or International Locations (Spokes): The branch offices or "Remote
Locations." are the spokes in this network. They are connected to the centra] office via
wide area network (WAN) links, such as leased lines or W N connections.
Projected Data Pathways once Network is Operational: Data originates from end-user
devices such as laptops, desktops, mobile devices, or loT sensors. After which, computers
within a LAN will communicate with each other directly prior to sending the data out of
the local network. The router will then direct die data packets to their destination,
determining the best path based on routing tables and protocols through shielded network
lines.
The data will then pass through the firewalls which will restrict or permit traffic
based on the implemented protocols. Its primary function is to protect the network from
unauthorized access, threats, and vulnerabilities. Data destined for the cloud or external
servers must traverse the WAN to reach its destination. Connections will be established via
dedicated ISP Telecom lines and VPNs.
Once data reaches the WAN, it is sent over the public internet or dedicated
connections to a cloud gateway, which is an entry point to the cloud provider's network.
Lastly, data is then directed to the appropriate cloud servers edge routers to relay that data
to another site location within the infrastructure.
Interna] and External Components: Cisco SD-WAN Meraki Licensed MX95-SEC 5
Year Plan. It provides strong security, flexibility, and scalability, making it suitable for both
national and international deployments. It has the scalability to support up to 500 users.
Furthermore. "It has multi-layered security which provides the flexibility* to deploy the
right security in the right place, either on-premises or cloud-delivered" (Rohyans et al.,
2019)
Load Balancer: F5 BIG-IP ADC 5200v offers a range of load balancing and traffic
management features, making it suitable for both national and international networks
supporting up to 5DD users for future sustainability for employees and customers.
Network Monitoring Tool: Cisco Prime Infrastructure 1.1 Migration is a comprehensive
network management system that provides end-to-end visibility* and control over your
network It is suitable for both local and international networks and supports up to 500
users.
Edge Router: Arista Networks 7000 Series: Arista's 7000 Series edge routers are designed
for cloud and data center environments. They offer high performance and support for
advanced networking protocols, making them suitable for large-scale cloud deployments.
VPN: Cisco Meraki AnyC onnect Essentials supports site-to-site VPN connections, which
can be used to securely connect multiple branch offices or remote locations to a central
network. "The traffic is encrypted using an AES cipher.'" (Ajit. 2021) Additionally, it
supports up to 250 concurrent users.
Firewalls: The Zscaler Advanced provides cloud-delivered security*, making it suitable for
organizations with a global presence. Quickly identify and intercept evasive and encrypted
cyberthreats biding in traffic on nonstandard ports." (Firewall Zscaler. 2023)
In Transit andxAT-Rest Network Security: Transport Layer Security (TLS)to encrypt
data in transit over the network. This is essential for securing data during communication,
such as web browsing, email, and application data transfer. HTTPS for secure data
Preview Mode

Sign in to access the full document!

100%

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Related Documents

View all