The main purpose of this report created is to analyze the connectivity provided by the existing network architecture used by the SNHUEnergy Inc. organization for conducting their business works. While further analysis of the organization, it had been found that the SNHUEnergy Inc. organization is an on growing oil and gas company, and apart from having one branch office at Memphis, the organization wanted to expand its branches further to the cities of Kansas and Houston, with the aim of increasing their work productivity by 50 % in the upcoming years. Thus, this report will be focusing on the existing network used by the organization and problems faced due to the network in use, while this report will also be used for proposing the future network architecture that would be beneficial for the organization to grow more as it expects. In conclusion to that, certain planning and security for protecting the network they would going to be using would also be discussed in this report.
While analysing the existing network infrastructure used by SNHUEnergy Inc. organization, some of the network applications were analysed that had been used by the organization to conduct their daily business and communication with the office branch situated in Memphis. The main network components used by the SNHUEnergy Inc. organization include:
The reference model of OSI used for communication among a computer system is split in to seven difference layers, as shown in below table:
Packet Data Unit |
OSI Layer |
Protocol |
Device |
Purpose |
Address |
Troubleshoot |
Message |
Session Layer |
HTTP, SMTP, etc. |
Gateway |
Authorization, Authentication |
No Address |
Wireshark, NBTSTAT, NSLOOKUP. |
Message |
Application Layer |
HTTP, SMTP, etc. |
No device |
Interface. |
No Address |
Wireshark |
Message |
Presentation Layer |
HTTP, SMTP, etc. |
No device |
Compression, Formatting, Encryption. |
No Address |
Wireshark |
Packets |
Network Layer |
ICMP, IP. |
Router |
Routing, Addressing |
IP Address |
Wireshark, PING, IPCONFIG, TRACERT. |
Frame |
Data-link Layer |
Wi-Fi, PPP, Ethernet, etc. |
Bridge, Switch, Access Points. |
Media Access Control, Logical Link Control |
MAC Address |
Wireshark, Lights on device, ARP. |
Segment, Datagram |
Transport Layer |
UDP, TCP. |
Firewall |
Reliability |
Posts |
Wireshark, TELNET, NETSTAT. |
Bits |
Physical Layer |
CAT 5, RJ-45. |
Cables, NICs, Hubs. |
Transmission |
No Address |
Lights on device |
Figure 1: Existing Network Diagram of SNHUEnergy Inc. organization
SNHUEnergy Inc. is a medium-sized gas and oil company that have been drilling and discovering various oil-products across the world. With its main branch in Dallas and a sub-branch in Memphis, it had been working to expand its branches to two more branches in the cities of Kansas and Houston. Apart from its future planning, the Physical network architecture that had been used includes the Network routers, firewalls, as well as switches. The routers help to distribute the network traffics while capturing the reliable network packets to be used by the organization, whereas the firewall is used that helps to provide a layer of security to the devices being connected with the network being provided. The Firewall used will help to monitor the inbound as well as outbound network traffics. With the router, switch is connected that helps to provide the connection to multiple computers, phones, and other peripherals being used by the main as well as the branch offices of SNHUEnergy Inc. For the transmission of data, the organization had been using VoIP or the Voice over Internet Protocol method.
Network traffics is generally denoted to the amount of data an organization is exchanging over the network on a specific time. In the case of SNHUEnergy Inc. organization, with this current network infrastructure, it had been found that the organization had been exchanging a huge amount of data between its main and the existing branch offices, causing a huge network congestion at the network being used by the SNHUEnergy Inc. organization. For further analysis of the network used by the SNHUEnergy Inc., Wireshark had been used. Wireshark not only helped in analysing the network traffics of the SNHUEnergy Inc. organization, but it also helped to capture certain voice over transmission control protocol. while analysing the Wireshark Flow report obtained, it had been found that various files were sent across various IPs following the RTP methods over the network. Along with that, Wireshark also helps to provide details about the data being sent over network following the TCP protocol. Thus, the use of Wireshark, also helps to analyse the SNHUEnergy Inc. organization’s crucial patterns that it had been following with the use of its existing network architecture.
Figure 2: Wireshark Network report of SNHUEnergy Inc.
With the use of the existing network architecture, there are various problems related to the performance of the network had been faced by SNHUEnergy Inc. organization (Sadick & Kamardeen, 2020). Apart from the SNHUEnergy Inc. organization being using a WAN network connection with its main branch and its sub-branch, the major issue occurs is related to the network bandwidth, where the data sent is not received by its another office on time, resulting a delay in the operations performed by the headquarter of SNHUEnergy Inc. organization (Kramar, 2021). Since, with the analysis of the Wireshark network report, and the network pattern obtained, it had been found that the organization often faces network congestion problems. With the slow and poor network bandwidth, the communication channel is also gets impacted adversely. Due to the delay caused in the network, the departmental communication is also impaired.
For an organization to work fluently, the major role is played by the security provided by the network used by that particular organization (Shaghaghi et al., 2020). While analysing the existing network of SNHUEnergy Inc. organization, it had been found that, the organization had been facing severe challenged related to the performance of each network components used by the SNHUEnergy Inc. organization. The major role, for providing a security to the network being used by the SNHUEnergy Inc. organization is generally provided by the Firewall, the organization being using. Apart from that, the SNHUEnergy Inc. organization wanted to establish its two new branches in the cities of Kansas and Houston. Now for that purpose, the Organization needed to be upgrading their Firewall security patches regularly, which the organization generally fails. Thus, the expansion of its network with the available network security issue could cause serious damage to the data being used by the SNHUEnergy Inc. organization, because the weak security will lure many cyber-security attackers, who ca easily penetrates through the systems with poor security of SNHUEnergy Inc. organization and can easily steal their data, thus corrupting the entire organization’s system.
While analysing the need of the SNHUEnergy Inc. organization, it had been found that, it wanted to extend its branch office to the cities of Kansas and Houston. Thus, with the huge extension of the organization, the SNHUEnergy Inc. needed to be using certain protocols and methods that can easily establish their communication channel with all the branches it had established. For the newly established office branch at Kansas and Houston, they would be making their communication with the headquarter of SNHUEnergy Inc. organization at Dallas and other office at Memphis using Emails, and Video-Conference. Apart from that, the Department dealing with Billing and other operations at Memphis also needed to be making a communication with main department dealing with Accounting, Payroll, as well as Human resources at Dallas. Thus, for conducting a communication they would also be using VoIP Phones in the offices. Along with that, the Network used by Houston and Kansas office branch could be able to connect with the main server of the organization situated at Dallas, along with the office situated at Memphis, while accessing data more easily.
While analyzing the work and tasks performed by the SNHUEnergy Inc. organization’s main branch and its existing sub branch and its demand to extend its branch to the cities of Kansas and Houston, thus the best network architecture model that would suit the desires and work performed by SNHUEnergy Inc. organization is the Client-server architecture (Potapov et al., 2018). With the establishment of the client-server network architecture at SNHUEnergy Inc. organization, the main server of the organization would be settled at the main headquarter of the organization that is situated at Dallas which will be acting as the centralized host server, as well as this network architecture will also be beneficial for the organization to grow its business by 50% by the upcoming next 2 years. With the establishment of the Client-server network architecture at the organization, the need for limited connection will be removed, as the proposed network architecture has no limitation for the devices for being connected with the network (Muller, 2020). Thus, the existing and new setup branch would easily be able to communicate with the main branch as well as among themselves with the establishment of the client-server architecture.
Figure 3: New Network Design for SNHUEnergy Inc. organization
Faulty network performance could be caused due to many reasons and it is important to mitigate them. The performance issues could even be raised due to the unexpected usage patterns of the network that leads to the disruptiveness in bandwidth. There are many reasons which could lead to create security issues and to mitigate these, some of the following steps could be taken,
Network management is essential with the development of network entities that surround the network both internally as well as internally. The network management and monitoring devices help the network in identifying any bugs and errors which could be present at anytime and any phase of the network, the tools would identify the bugs and provide an alert to the network administrators.
The network could be secured and settled with the help of some of the following security devices;
Firewalls
The firewall is connected to the router which is a standalone device which could be helpful in the network provisioning and administration. Moreover, the firewall is such a device which could be beneficial in the monitoring of traffic which would be produced by the network. The firewall would not be allowing the unwanted traffic to enter into the network and cause unwanted harm.
Antivirus
The network would require antivirus devices as mode to protect the system and entire network from getting compromised. It could be beneficial in the detection of malware that could indirectly get into the network system through the computer system of the user within the network (Neupane, Haddad & Chen, 2018). The antivirus could be very beneficial in terms of tackling the unwanted threats such as trojan, malware and viruses.
Web/content filtering device
With the help of this device, the network will be able to filter the malicious and threatening content which is present online. This could provide protection from the malicious and spam emails which could be designated to one of the users within the network. The malicious content might have the possibility of stealing information from the network or even crash it but filter device would not let that happen by constantly assisting the user.
Intrusion detection systems
Intrusion detection are such devices which help the network in monitoring the malicious activities in the network. The intrusion detection system would help in creating a log of such malicious activities and as a part of their systematic feature, it would even take steps to stop the activities (Sharafaldin, Lashkari & Ghorbani, 2019). The device would help in notifying the administrators and the administrator will be assisted as the device would provide them with reports followed by which the administrator will be able to take necessary steps.
With the establishment of new network architecture in the SNHUEnergy Inc. organization, there are certain changes needed to be made in the existing network devices used by the organization so that the organization need not to be implementing new network devices for the sake of new network infrastructure. While previously the Switches that were used in the network infrastructure was containing only 5 ports, while in the new network infrastructure the switches used will be containing 24 ports, the routers will be implemented with VPN, and the firewall needed to be upgraded (Kurniawan et al., 2019). Along with that IDS will be implemented in the network for detecting any intrusion in the network.
The implementation of the future network would not come with advantages only, it is possible that the network would bring few more challenges along with the benefits. The SNHUEnergy Inc. organization that will be implementing the new network would have to make sure that there are new configurations done all over the network devices from every end-to-end points (Tang & Elhoseny, 2019). The organization that will be implementing the new network would have to invest capital to the network although it would not be a loss to the company but definitely cut off several other investments.
Apart from analyzing the entire new network infrastructure developed, one thing is clear that the used network devices were always meant to be upgraded so that no cyber-security attack that include DDoS attack, Phishing, Ransomware, and many more, could be conducted on the organization’s network, thus corrupting the network being used by the SNHUEnergy Inc. organization. There would be much more consequences other than the cyber-security attack that could be faced by the SNHUEnergy Inc. organization if they don’t take care of the devices being used in their network architecture. Their confidential data could be lost, their reputation in the business market could also gets corrupted, and their aim of growing their business productivity by the 50% by the upcoming year would also gets affected. Thus, the best way they could prevent such risks from happening is that they frequently monitor their network, while keep their network devices up-to-date, which include upgrading the Firewall, as well as the OS being used by the devices in the organization, since the upgradation will help to upgrade the security patch of each network device, which eventually will help the organization to prevent any cyber-security attack from conducting on their business.
References
Beshley, M., Seliuchenko, M., Panchenko, O., Zyuzko, O., & Kahalo, I. (2018, February). Experimental performance analysis of software-defined network switch and controller. In 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET) (pp. 282-286). IEEE.
Kramar, R. (2021). Workplace performance: a sustainable approach. Asia Pacific Journal of Human Resources, 59(4), 567-581.
Kurniawan, D. E., Arif, H., Nelmiawati, N., Tohari, A. H., & Fani, M. (2019, March). Implementation and analysis ipsec-vpn on cisco asa firewall using gns3 network simulator. In Journal of Physics: Conference Series (Vol. 1175, No. 1, p. 012031). IOP Publishing.
Lin, H., Yan, Z., Chen, Y., & Zhang, L. (2018). A survey on network security-related data collection technologies. IEEE Access, 6, 18345-18365.
Lu, C., Liu, Z., Wu, Y., Xiao, Z., Yu, D., Zhang, H., … & Zhang, X. (2020). Nanophotonic polarization routers based on an intelligent algorithm. Advanced Optical Materials, 8(10), 1902018.
Lu, Z., Qu, G., & Liu, Z. (2018). A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems, 20(2), 760-776.
Muller, N. J. (2020). Client/Server Architecture and Implementation. In Enterprise Operations Management (pp. 189-205). Auerbach Publications.
Neupane, K., Haddad, R., & Chen, L. (2018, April). Next generation firewall for network security: A survey. In SoutheastCon 2018 (pp. 1-6). IEEE.
Pasterski, S., & Verlinde, H. (2021). HPS meets AMPS: how soft hair dissolves the firewall. Journal of High Energy Physics, 2021(9), 1-37.
Potapov, V. I., Shafeeva, O. P., Gritsay, A. S., Makarov, V. V., Kuznetsova, O. P., & Kondratukova, L. K. (2019, August). Reliability in the model of an information system with client-server architecture. In Journal of Physics: Conference Series (Vol. 1260, No. 2, p. 022007). IOP Publishing.
Sadick, A. M., & Kamardeen, I. (2020). Enhancing employees’ performance and well-being with nature exposure embedded office workplace design. Journal of Building Engineering, 32, 101789.
Shaghaghi, A., Kaafar, M. A., Buyya, R., & Jha, S. (2020). Software-defined network (SDN) data plane security: issues, solutions, and future directions. Handbook of Computer Networks and Cyber Security, 341-387.
Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2019). An evaluation framework for network security visualizations. Computers & Security, 84, 70-92.
Tang, Y., & Elhoseny, M. (2019). Computer network security evaluation simulation model based on neural network. Journal of Intelligent & Fuzzy Systems, 37(3), 3197-3204
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download