Professional Documents
Culture Documents
Service Request SR RM 019
Service Request SR RM 019
Ashley Laubscher
Jacqueline Meyers
Steve Morozov
Current systems
Disadvantages
Out dated
Server based
Recommendations and Benefits
1000Base-t
Disadvantages
Out of date in near future
Cost of repair
Present recommendations and
benefits
Maintaining Fiber-Optic
Protocols
Topologies in use
Star topologies are being used in all four of Riodan’s
locations.
There is more of a mesh topology going on in
Riodan’s wide are network (WAN).
Locations are running 10 and 100BaseT through these
topologies.
Advantages and disadvantages of
the Star topology.
Advantages
Uses a Central Server
Connects using point-to-point
Disadvantages
Collisions of data
Slowed down travel time
Consider combining topologies
Current use of Star Topology
Star and Mesh Topologies fused together will allow for an easier data
flow and a more secure network that will still function even if one location
ends up breaking down.
Switches: Current setup and beneficial
recommendations.
San Jose: 100BaseT and Cisco switches and router/switch
connecting to the sattelite. There is a 24 port hub that
could be updated that connects the servers.
Hangzhou: 100BaseT switch, and two 24 port switches.
Pontiac and Albany: Notel Baystack switches, 48 port
patch panels. An upgrade to 100BaseT switch would be
beneficial.
Advantages and Disadvantages
Advantages
Star Topology
Easy to expand network
Easy to detect faults
Easy to remove parts
Mesh Topology
Messages can take several paths
Disadvantages
Time delays
During use
During set up
Amount of used bandwidth
Recommendations and benefits
Mesh topology will secure the data flow and will not stop if one location does.
Current security efforts
Encryption
Advantages and disadvantages of
various security approaches
Advantages
Firewalls
Physical
software
Disadvantages
Cost of implementation
Time and Down time of systems
Compatibility of all systems
Recommendations and benefits
Firewall will be physical as well as software. We will utilize both to ensure
the ensure that viruses and worms will not break through as well as
unauthorized users.
Encryption will ensure the confidential data stay that way and is not seen by
other users.
References