Final Project Submission: Network Analysis And Architecture
Final Project Submission Network Analysis And Architecture Evaluat
Analyze the current network architecture of SNHUEnergy, a medium-sized U.S.-based organization operating in Memphis and Dallas, with 110 employees initially, but potentially expanding. Assess the existing network components, traffic patterns, and security issues. Recommend necessary upgrades to support future growth, including implementing a WAN network connecting both locations, integrating cloud services such as SaaS, and adopting a hierarchical network architecture. Consider implications for scalability, security, performance, and reliability, providing a comprehensive high-level design for the future network infrastructure that ensures efficient, secure, and uninterrupted communication across all organizational units.
Paper For Above instruction
SNHUEnergy is a notable example of a medium-sized enterprise operating within the United States that is seeking to upgrade its network infrastructure to accommodate future growth and improve operational efficiency. With 110 employees initially, operating in Memphis and Dallas, it has established a foundational network comprising various physical devices, applications, and traffic patterns. Analyzing the existing setup reveals vulnerabilities and performance bottlenecks that necessitate a comprehensive redesign aligned with best practices in network architecture and security.
Current Network Infrastructure and Components
The Memphis location, with 30 employees, primarily handles operations and billing, supported by two servers dedicated to these functions and a few workstations utilized for video conferencing and VOIP communications. Its network includes a router and switch that connect to the Dallas office remotely. Conversely, the Dallas location, hosting over 90 employees, manages critical functions such as Payroll, HR, Accounting, and Email, supported by three servers and various workstations, along with a router, switches, and firewall. This setup operates on a client-server architecture, with key physical devices such as personal computers, servers, switches, routers, and firewalls orchestrating the network communication.
Network Traffic Patterns and Security Considerations
Monitoring network traffic with tools like Wireshark reveals predictable patterns—web traffic manifests as sporadic bursts, while login activities resemble shell or telnet interactions. Applications like email, HR, and accounting generate low bandwidth traffic, whereas video conferencing demands higher throughput. Understanding these patterns ensures efficient bandwidth allocation and network optimization. However, current security measures, primarily firewalls, offer only about 60% effectiveness against threats, leaving organizations vulnerable to malware, viruses, worms, and DoS attacks. The potential for data loss and unauthorized access underscores the need for layered security solutions.
Performance and Security Challenges in the Current Setup
Potential performance issues include configuration errors, hardware failures, and network outages. A single point of failure—in routers, switches, or cables—could disrupt operations across entire locations. Security vulnerabilities include susceptibility to DoS attacks exploiting TCP/IP limitations, malware infiltration through internet channels, and physical device failures. The existing firewall strategy, while providing baseline protection, requires upgrades and regular audits to adapt to evolving threats and ensure comprehensive security coverage.
Future Network Architecture Recommendations
To address these vulnerabilities and enable organizational growth, a future-proof network design must prioritize scalability, security, performance, and redundancy. Implementing a Wide Area Network (WAN) using secure VPN tunnels can connect Memphis and Dallas seamlessly, facilitating reliable communication regardless of physical distance. Incorporating cloud services such as Software as a Service (SaaS) enhances flexibility and scalability by offloading certain applications to cloud platforms, enabling remote access and minimizing on-premises hardware dependence.
Hierarchical Network Design Model
The hierarchical network architecture emerges as the optimal model for SNHUEnergy. Divided into access, distribution, and core layers, this approach enhances manageability, scalability, and security. The access layer provides connectivity for end-user devices through switches with security features such as port security and VLANs. The distribution layer aggregates traffic, implements policies, and manages routing and security policies. The core layer ensures high-speed reliable backbone connectivity between distribution layers and external networks.
This structure simplifies troubleshooting, offers scalability for future departmental additions, and allows for granular security policies, such as access control lists (ACLs). Cost-efficient and adaptable, hierarchical design supports traffic multiplexing, reduces broadcast domains, and enables support for advanced security mechanisms, including intrusion detection/prevention systems (IDS/IPS), SSL VPNs, and multi-layer firewalls.
Implementation Strategies
Network upgrades would involve deploying high-density switches, redundant routers with routing protocols such as OSPF or EIGRP for resilience, and next-generation firewalls with deep packet inspection capabilities. The implementation of Virtual LANs (VLANs) will segment traffic efficiently, enhancing security and performance. Establishing VPN tunnels over the internet secures inter-office communications, providing encrypted, reliable links that support Voice over IP (VoIP), video conferencing, and enterprise applications concurrently.
Furthermore, integrating cloud-based SaaS solutions reduces infrastructure costs and fosters remote workforce capabilities, aligning with modern organizational workflows. Regular security audits, intrusion detection systems, and employee cybersecurity training should complement these technical upgrades to mitigate vulnerabilities.
Concluding Remarks
SNHUEnergy's current network infrastructure, while functional, requires strategic enhancements to handle future organizational needs. A hierarchical network architecture, combined with WAN connectivity and cloud services, provides a scalable, secure, and efficient framework capable of supporting growth, diverse applications, and heightened security demands. By adopting this model, SNHUEnergy can ensure uninterrupted operations, optimized performance, and robust security posture, positioning itself for sustainable future development.
References
- Easttom, C. (2012). Computer Security Fundamentals. Pearson.
- Held, G. (2000). Network Design: Principles and Applications. CRC Press.
- Held, G., & Hundley, K. (2014). Cisco Security Architectures. McGraw-Hill.
- Kenyon, T. (2016). Data Networks: Routing, Security, and Performance. Digital Press.
- Laet, G. D., & Schauwers, G. (2015). Network Security Fundamentals. Cisco Press.
- Scott, J., & Carrington, P. J. (2015). The SAGE Handbook of Social Network Analysis. Sage Publications.
- Vacca, J. (2014). Network and System Security. Syngress.
- Easttom, C. (2012). Computer Security Fundamentals. Pearson.
- Held, G. (2000). Network Design: Principles and Applications. CRC Press.
- Laet, G. D., & Schauwers, G. (2015). Network Security Fundamentals. Cisco Press.