BiggsTech Electrical Inc.
Network Architecture
BiggsTech Electricals Inc. has been experiencing networking problems, which have made it not to complete its computer-based communication and transactions.
General business environment
BiggsTech Electricals Inc. specializes in the sale of consumer electronic products.
The company has an online shopping platform.
Currently the company shares information across its departments using an OSI and TCP/IP in a dual stacked environment.
The network goals and objectives are facilitating connectivity and communication, data sharing, hardware sharing, and data security and management.
The business goals and objectives that should be facilitated by the network are online shopping, inventory management, reconciliation of books of accounts, information and hardware sharing, and safe storage of and management of data.
The failure of the current network is because it is memory-intensive, which has led to the network’s inability to facilitate application internetworking.
Network Referencing Model (OSI versus TCP/IP)
BiggsTech Electricals Inc. is running on a dual-stack model that has implemented both OSI and TCP/IP protocol.
The dual-stacked method is memory intensive since it duplicates the implementation of the application to network layer across the communicating devices.
The OSI model has seven steps from sender to destination, which are application layer, presentation layer, session layer, transport layer, network layer, data link layer, and physical layer.
Each layer communicates with the peer layer in the two communicating devices.
TCP/IP communication suite helps in interconnecting network devices on the internet.
The protocol also applies to private networks such as intranet and extranet (Mazzon, 2000). Unlike OSI reference model, this protocol suite has five layers, which are application, transport, network, data link, and physical layers.
BiggsTech Electricals Inc. will have an OSI reference model to ensure that communication flows from the top to bottom layer in a secure manner for data integrity.
The network protocols such as TCP/IP will ensure there is secure communication and flow of information across the network.
Establishment of TCP/IP will result in all the rules that govern data communication been considered in the long run.
Local Area Network Design
BiggsTech Electricals Inc. router is connected to the Wide Area Network for internet connectivity.
The hubs link three workgroups in the business, which represents the departments, and the workgroups support five nodes which are the workstations for every device.
The AS/400 mainframe serves as the controller of every device on the network, which relies on the two servers for file storage and database management.
Proposed Network Solution

  • Replacement of the old router with that has access to the wide area network.
  • Introduction of the mail server for user email accounts management and mail archiving.
  • Securing of the file and database server into cabinets.
  • Introduction of next-generation firewalls into the network to secure the incoming and outgoing traffic.
  • Increasing the bandwidth for traffic capacity and transmission speed.
  • Improving on hardware and resource sharing. Such as enhanced sharing of printers, scanners, and other peripheral devices connected to the network.

Reasons for the change

  1. Enabling the company to have a router that has latest technology and firmware to ensure better compatibility with devices.
  2. To enhance security in the system.
  3. To ensure that the network is not memory-intensive.

Telecommunication Device
The reasons for the establishment of a new communication system are:

  • To develop a modern, enhanced and robust telecommunication framework for the enterprise.
  • To allow voice, data, image, and video communication using a telephone network that supports fax services.
  • To develop an enterprise strong communication channel free from failures and interruptions.

Proposed Communication System
The new solution will consider both products and services.
In the proposed solution, customer-owned, and customer-installed Wi-Fi local area network will have to be deployed to support voice over internet Protocol (VoIP) communication.
BiggsTech Electricals Inc. will purchase VoIP software package and install them on personal computers.
The connection to the internet will be managed and provided by an internet service provider (ISP).
Finally, the communication will be on digital communication framework to support, voice, video, images and data communication.
Remote Network Implementation Plan
The main objectives for the implementation of the remote network are:

  • To ensure all the retail store’s departments have access to the network using Cisco Virtual Private Network (VPN) configurations.
  • To provide a cloud based solutions such as SaaS, NaaS and PaaS to help in the prevention of risks and loses of the remote access controls.
  • To implement the IPSec for the current network.
  • To identify and plan the associated risks and threats prior to configuration and installation of the remote access to all the retail stores of BiggsTech Electricals Retail Store.

VPN is cost effective in the sense that it lowers the support cost for technology when compared to the other traditional means.
It is also possible to connect VPN servers with other VPN servers to form server-to-server connection to extent the intranet or extranet to cover multiple networks.
BiggsTech Electricals Inc. retail business will also require establishment of the Internet Protocol Security (IPsec), which is a framework that is based on open standards that ensures private and secure communications over the IP networks.
The main concepts applied in IPsec are cryptographic security services, network level peer authentication, data origin authentication, data integrity, encryption, and replay protection.
The main goal of the security implementations in place is to facilitate the safety of the communication channels and information sharing in the retail outlet.
Enterprise network security requires a well-planned security architecture that aims at protecting data at user and application level.