Indp Part 2
November 24, 2014
Indp Part 2
Protocols ensure that programs and networks are written in the same format to communicate and work properly. For upgrades to happen, communication must take place for the Patton-Fullers’s network. The Internet has protocols designed for its use and these protocols will integrate into the new system. A small portion of the network architecture is discussed as it fits these new requirements. The increase in network traffic will have an impact and will drive the need for an analysis. Problems and limitations will become clear as long as the analysis concentrates on certain areas. Implementing certain strategies will mitigate the ...view middle of the document...
This is especially important to Patton-Fuller because of the additions to the current network. The options involved with layer one according to Goleniewski include the following:
* TCP/IP Layer One
* Wireless LANs (802.11x, better known as Wi-Fi)
* 2.5G and 3G wireless WANs
* Private line or dialup links (using Point-to-Point Protocol [PPP])
* Frame Relay networks (Frame Relay interface)
* Ethernet LANs (10Mbps, 100Mbps, 1Gbps, and 10Gbps)
* Token-ring LANs (4Mbps and 16Mbps)
TCP/IP Layer Two
Layer two handles internetworking and is considered the key to the architecture. Remote networks will require interconnection without establishing the end-to-end connection that is prevalent with the closed LAN network. This strictly covers routing as it concentrates of packet delivery. Packet delivery may be random without regards to each other’s priority. No services are provided such as error checking as a result of concentration of packet delivery.
TCP/IP Layer Three
Layer three involved the host-to-host connection. This allows peer entities to communicate with each other. The devices themselves carry the capabilities to establish a terminal-to-terminal connects such as a radiologist’s personal computer to the hospital’s server.
TCP/IP Layer Four
Layer 4 specifies the use of protocols for the applications themselves. Certain applications use specific utilities to connect to networks. Some of the utilities necessary to support the network upgrade designs are:
* Simple Mail Transfer Protocol (SMTP) for sending e-mail
* Simple Network Management Protocol (SNMP) for network management
* Real-Time Transport Protocol (RTP) for transport of real-time audio and video which is particularly important to establishing a VoIP capability.
* X.25 packet-switching (Goleniewski, 2007, p. 169).
* The protocols for the VoIP revolve around User Datagram Protocol (UDP) which is a very simple but not guaranteed to be reliable. UDP however does not control the reliability or quality of packets. Delay associated with retransmitting packets because of error detection is not conducive to VoIP connections.
* This protocol is used with the Cisco VPN router. This addresses security through encryption, authentication, and key exchange. It works mainly by authenticating both ends of the connection and allows for secure transmission of packets at the IP layer.
Patton-Fuller will capitalize on its current network with its Windows Exchange Server. Point-to-Point access to connect the three other hospitals will rely on the Remote Access Service (RAS) server that hosts the VPN router. The IT data center also host an Internet server connected to an Internet Service Provider (ISP) by a Cisco model 7609 firewalled router. This can handle X.25 protocol communications for datagram packet encapsulation between the WAN and the IBM mainframe. Two Ethernet bus topology networks are connected by...