Presentation is loading. Please wait.

Presentation is loading. Please wait.

COLLEGE OF BUSINESS ADMINISTRATION

Similar presentations


Presentation on theme: "COLLEGE OF BUSINESS ADMINISTRATION"— Presentation transcript:

1 COLLEGE OF BUSINESS ADMINISTRATION
MISY3312: Introduction to Telecommunication Section 202  Done by: Miznah A. AlMansour ID# Submitted to: Dr. Valentina Korzhofa

2 Outline 1. Introduction 1.1 History of Zamil Steel
1. Introduction 1.1 History of Zamil Steel 2. Problem Statement 2.1 Problem statement regarding business 2.2 Problem statement regarding network 3. Network transmission media 3.1 Connection methods 3.2 Wired technologies 3.3 Wireless technologies 4. Type of networks based on physical scope 4.1 Virtual Private Network (VPN) 4.2 Local Area Network (LAN) 4.3 Wide Area Network (WAN) 4.5 Internet

3 Outline 5. Network classification 5.1 Network Architecture
5. Network classification 5.1 Network Architecture 5.2 Network topology 6. Basic hardware components 6.1 Switches 6.2 Routers 6.3 Network interface card 7. Network security 7.1 Firewalls 7.2 Security technology 7.3 Encryption 7.4 Authentications 8. Conclusion 8.1 Summary 8.2 Recommendations

4 Introduction Zamil Steel was established in 1977 in Saudi Arabia
Since then it is known worldwide as the leading structural steel in the manufacture of pre-engineered buildings in the Middle East Zamil Steel supplied structural steel for many industrial, including petrochemical, cement plants, gas and oil, steel mills, high-rise buildings along with many other industrials Zamil Steel has grown from a locally oriented industry into a global leader in expanding field of steel in Asia, Africa and Europe Zamil Steel main factories are located in Dammam, Saudi Arabia. Along with additional factories located in Egypt, India, Ras AlKhaima (UAE), and Vietnam

5 Problem Statement Problem Statement Regarding Business
Zamil Steel is always seeking for new opportunities, and as a part of the company’s development, Zamil Steel is more likely to operate in new facilities all around the world. For example, the next place that Zamil Steel is willing to open a new factory in is Brazil. In order for Zamil Steel to maintain its success, it should consider a good network of communications technology and advanced computers.

6 Problem Statement (cont’d)
Problem Statement Regarding Network To manage network globally, Zamil Steel should keep into consideration how to connect their offices globally, make applications run faster, and most importantly secure the applications and the network. Challenges: technical knowledge country-by-country service requirements network design and planning network management interoperability network management operations monitoring the network

7 Network Transmission Media
Connection Methods Connection methods can be classified according to hardware and software technologies used to connect the individuals’ devices in the network, such as optical fibers, wireless, wired, and point-to-point laser. Zamil Steel uses both wired and wireless connection methods

8 Network Transmission Media (cont’d)
Wired Technologies Twisted Pair Optical Fiber Twisted pair is used for client connections, where it follows category 5/6 cable standard The purpose of using it is for fast Ethernet and Gigabit Ethernet connection The maximum allowed length of a Cat 6 cable is 100 meters Zamil Steel uses unshielded twisted pair (UTP)

9 Network Transmission Media (cont’d)
Wired Technologies Twisted Pair Optical Fiber It is used for switch uplinks and server interfaces Multi-mode Fiber (MMF) it is used for short distance, less than 500 meters Single-mode Fiber (SMF) it is used for links longer than 500 meters The light propagates through the fiber with little attenuation compared to electrical cables

10 Network Transmission Media (cont’d)
Wireless Technologies local area network (LAN): it is used to connect PCs in close geographical proximity, and it is has higher speed than WAN. All devices can share files, printers, or programs without being aware of the actual physical location of resources In Zamil Steel, this service is provided by Aruba Networks, where they ensure that users are always within reach of business-critical information

11 Type of Networks Based on Physical Scope
1. Virtual Private Network (VPN) It is a network that uses public telecommunication infrastructure, such as the Internet, in order to provide remote offices and access to traveling users to the central organizational network The main benefit of VPN is the reduction in costs; because it does not need physical lines to connect remote users to the Internet In Zamil Steel, the methodologies used are IPsec and SSL VPNs

12 Type of Networks Based on Physical Scope (cont’d)
2. Local Area Network (LAN) LAN is a network used to interconnect computers in a building on one major site People working in LAN get more capabilities in data processing, information exchange, and work processing There are several advantages of LAN, such as the high reliability of network, adding new devices to the networks is easy, high rate of data transmission is possible, and much more In Zamil Steel, LAN used for Client communication in the campus network with high bandwidth

13 Type of Networks Based on Physical Scope (cont’d)
3. Wide Area Network (WAN) WAN is a network link that extends beyond the LAN to other networks, it is basically a telecommunication network that covers a broad area In Zamil Steel, it is used for interconnecting Area Offices across various regions. Client communications are accelerated using WAN optimization devices

14 Type of Networks Based on Physical Scope (cont’d)
4. Internet It is widely known that the Internet transmits a massive range of information resources and services In Zamil Steel, Internet is used for VPN and FTP and Mail transfer

15 Network classification
Network Architecture It is the layout of the network, including the hardware, software, communication protocols and mode of transmission, and connectivity In Zamil Steel the utilized network is client-server model. It is a computing model that functions as a distributed application, which divides tasks between providers of a service, which called server, and service requesters, called client The greatest advantage of client/server network is that it allows multiple clients connecting to a single server

16 Network classification (cont’d)
Network Topology Topology can be understood and defined according to the shape of a network Zamil Steel uses the star network topology That means each network host is connected to a central hub All traffic that crosses the network passes through the central hub, and that hub acts as a signal repeater One benefit of the star network is that it is easy to manage, and it is easier to expand compared to bus or ring topologies

17 Basic Hardware Components
All networks are made up of basic hardware building blocks interconnecting their terminals Networking hardware refers to equipment and tools facilitating the use of a computer network Switches A network switch is a device that enables network segments or network devices to be connected to each other efficiently The network switch plays an important part in the LAN Zamil Steel uses switches of layer 2/3 provided by two vendors, HP and Cisco. Through information sharing and resource allocation, switches save businesses money and increase employee productivity

18 Basic Hardware Components (cont’d)
Routers Routers are physical devices that join multiple networks together Its task is to copy packets from one network to another The router used in Zamil Steel is made by Cisco Network Interface Cards Network interface card (NIC) provides the hardware interface between a computer and a network It is basically a computer circuit board that is installed in a computer, so that it can be linked to a network. Zamil Steel uses 100BASE-TX (Fast Ethernet), and 1000BASE-T (Gigabit Ethernet)

19 Network Security Network security is the policies adopted to prevent and monitor unauthorized access to a computer network, and to protect the value of company’s assets and the integrity of operations Network security is accomplished through both hardware and software An effective and beneficial network security strategy is to identify threats and gaps, and then choose the most effective set of tools to battle them

20 Network Security (cont’d)
Firewalls The main goal of the firewalls is to provide a level of separation between the company’s intranet and the Internet It is basically a group of components that cooperate to form a barrier between the two networks Zamil Steel uses Cisco ASA firewall, and it is used to protect layer 3-4 attacks It enables the company to install strong security that delivers proven performance and reliability It also provides advances application-aware firewall services with identity-based access control

21 Network Security (cont’d)
Security Technology TrendMicro is the first solution to provide a full security software package, and it is the utilized antivirus in Zamil Steel. It prevents unauthorized software from changing critical applications, it finds and blocks untrustworthy links in and instant messages, and it strops websites from installing dangerous downloads on computers TippingPoint, which is a system that delivers application protection. Its solutions protect infrastructure, such as firewalls, routers, servers, and voice over Internet protocol gateways Top Layer Security, a leading global provider of Network Intrusion Prevention Systems (IPS) is one of the applied security technologies in Zamil Steel. It is a system that gives solutions that help the company protect its critical on-line assets from the losses and risks related to cyber threats and network attacks

22 Network Security (cont’d)
Encryption It is the process of transforming information using an algorithm to make that transform unreadable and invisible to anyone except those possessing special knowledge In Zamil Steel there are several types of encryptions are used such as Data Encryption Standard (DES) It is a method of data encryption using private key to customize the transformation, so that decryption can only be performed and retrieved by those who know the key used to encrypt Triple Data Encryption Standard (3DES) It can encrypt and decrypt data using a single secret key. Although the 3DES is three times slower than regular DES, it is way more secure and has higher levels of security Advanced Encryption Standard (AES) It is a symmetric key encryption technique that provides a strong encryption for securing sensitive material and it works at multiple network layers simultaneously

23 Network Security (cont’d)
Authentication Authentication in a security system is the process of determining and proving whether someone is, in fact, who is declared to be. It facilitates the username and the password validation and confirms that a specific thing is authentic. Zamil Steel has three tools of authentication, which they are Authentication Header (AH) Part of the Internet Protocol that provides connectionless integrity, data origin authentication and reply protection Protected Extensible Authentication Protocol (PEAP) It is used for transferring authentication data over wireless networks. It uses Transport Level Security (TLS) to create an encrypted channel between an authenticating PEAP client, and a PEAP authenticator Kerberos It is a network authentication protocol provides a mechanism for strong authentication between client/server applications.

24 Conclusion Summary Zamil Steel is the best in manufacturing, engineering, sales and project management, providing customers a diverse range of goods and services, which together create a total building solution This presentation examined different areas of networks in Zamil Steel, including the types of connection methods, types of networks based on physical scope, basic hardware components and network security A company’s success depends on its network systems, and Zamil Steel full understands this, and that what led them to reach the top

25 Conclusion (cont’d) Recommendations
There are several issues related to network, such as monitoring, managing ensuring availability, and scalability monitoring which included analyzing traffic flow. Additionally, port utilization, spike across the network, device health like memory, utilization, CPU utilization, temperature and more are significant issues regarding network The solution to all these issues included centralized management software, like IMC is in place which can give real time alerts, real time view, traffic analysis, centralized OS updating, centralized backup and restore. Moreover, to ensure the availability the network is equipped with redundancy setup of HP called IRF in addition to the maintenance contract

26 Thank you for listening

27 References Cisco. (2012). Products & Services. Retrieved 2012, from Cisco Systems, Inc.: Sabbagh, Z. (2012, March 15). Network of Zamil Steel . (M. AlMansour, Interviewer) Zamil Steel. (2012). About Zamil Steel. Retrieved 2012, from Zamil Steel : Zamil Steel. (2012). Steel Buildings from Zamil Steel. Retrieved 2012, from Zamil Steel:


Download ppt "COLLEGE OF BUSINESS ADMINISTRATION"

Similar presentations


Ads by Google