Preview

Riordan Manufacturing Company Inc. Wide Area Network

Powerful Essays
Open Document
Open Document
5538 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Riordan Manufacturing Company Inc. Wide Area Network
The current architecture of the Riordan Manufacturing Company Inc. Wide Area Network and network security in place requires updated documentation. The purpose of this paper is to gather the existing information into a single format and evaluate the WAN and security documentation for an executive overview.
Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. With state-of-the art design capabilities, they create innovative plastic designs that have earned international acclaim. Attention to detail, extreme precision and enthusiastic quality control are the hallmarks of Riordan Manufacturing. With facilities in San Jose, California, Albany, Georgia, Pontiac, Michigan and Hangzhou, China, the company is heavily dependent upon their communication networks. The documentation produced by this analysis will give the management at Riordan Manufacturing an understanding of their networks today, a plan for future upgrades and a baseline to evaluate security.
The goal of this exercise is three fold. Our first will be to provide an inventory of the existing network components for Riordan Manufacturing designated by location, review the network security for each site, and our last goal is to document the current security plan for use in future planning.
Because of the limited scope of the project, several assumptions must be made. The first assumption is that Riordan Manufacturing has accurate records of the current infrastructure and no changes will be made during this study. Furthermore, we must assume the equipment at each location is similarly configured.
The deliverables for this project will consist of an inventory by location of the network in a Visio format, description of the security by location of the network, and recommendations for changes to the network design, circuit speeds, and reasons why the changes should be implemented.
Not included in the scope of this study are equipment recommendations, cost specifics and



Links: Tomsho, G., Tittel, E., & Johnson D. (2004). Guide to Networking Essentials. Boston: Thompson Course Materials. University of Phoenix Student Web Site (2005). Riordan Manufacturing Network Overview. Retrieved September 26, 2005, from https://ecampus.phoenix.edu/secure/aapd/CSIST/VOP/Business/Riordan/IT/RioIT Network001.htm

You May Also Find These Documents Helpful

  • Better Essays

    Ops 571 Week 4 Team

    • 959 Words
    • 4 Pages

    References: University of Phoenix: Riordan Manufacturing, Inc. (2012). Retrieved October 28, 2012 from University of Phoenix website: https://ecampus.phoenix.edu/secure/aapd/cist/vop/index.html…

    • 959 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Bsa310 Week 2 Team

    • 546 Words
    • 3 Pages

    References: University of Phoenix. (n.d.). Riordan Manufacturing. Employee Site. Univerysity of Phoenix course materials. Retrieved from: https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Riordan/index.asp…

    • 546 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The many complexities of network design are vast, wide and most often tailored to the customer and their uses. In the case of Kudler Fine Foods the network is the backbone of the company compromising the bulk of communications as well as the point of sale network. The design of these networks is a collaborative procedure aimed at ensuring that the services provided meet the needs of the customer. In the search of the ideal plan for network development I will discuss and explain principles of distributed and centralized computer systems. Accomplishing this by describing different network topologies; the standards and protocols that are essential to networking. The responsibilities essential in providing telecommunication services to include security, privacy, reliability and performance. How we distinguish and understand the uses of voice over the internet protocol, Centrex and other forms of telecommunications. With our main goal is to develop a system to utilize in our company that will ensure a proper management of our resources. The timeline for this is to have an implemented plan in place within 30 days of commencement. Our outline of six months to have the plan implemented is not outside the rational. Considering the internal and external resources implemented in the project.…

    • 3954 Words
    • 16 Pages
    Better Essays
  • Better Essays

    Riordan Manufacturing's network configuration consists of infrastructure within four locations. The headquarters is in San Jose, CA and the other three are in remote in Albany GA, Pontiac MI, and Hangzhou, China. The investigation and detail required to demonstrate transition of WAN from Legacy to current design shows sources for which any problems may exist. Contributing information about the WAN includes the VoIP data router, satellite between headquarters and China, and T-1 connections between headquarters to both Georgia and Michigan.…

    • 1125 Words
    • 5 Pages
    Better Essays
  • Better Essays

    "Riordan Manufacturing is a global plastics manufacturer employing 550 people with projected annual earnings of $46 million. The company is wholly owned by Riordan Industries, a Fortune 1000 enterprise with revenues in excess of $1 billion" (Apollo Group Inc., 2004).…

    • 1062 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Analysis – The basis of service request SR-kf-10, submitted by Yvonne Reynolds, is a thorough analysis of current network infrastructure that should result in documentation outlining current network reliability and uptime, overall performance, topology, protocols, data integrity and security, and overall network security. The analysis effort will be directed toward determining if performance, specifically at checkout, can be improved and, if not, outlining and documenting the requirements and strategy necessary to improve performance, security, and stability. A critical component of the success of this effort is the structure and expertise of the project and analysis team, and the reporting relationship…

    • 899 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue five. Because Richman hosts an internet for employees to access information about the company and enroll in company benefits programs, and because Richman also hosts an extranet for its business partners, you must research and devise a method to secured networks and communications. This should include the network structure,…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    We show how incremental deployment of such routers can make the Internet safer. Like all things dynamic, change is inevitable. Such is the case with your network environment. Upgrades and modifications to the network architecture can sometimes expose, or create security holes. Hardening a network does not always mean spending large amounts of money. Whether that means spending it on new hardware, software, or man hours really depends on what needs to be addressed. It may include all of the above. The time may come when a cost/benefit analysis will be required by those in charge before hardening activities can move forward. As such it's important to point out some of the non-technical benefits of network hardening for the business as a whole.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Apply network management and security techniques using the FCAPS process. IS3120 Network Communications Infrastructure © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Fault management—SNMP alarms  Configuration management—change control board and procedures  Administration management—asset and inventory management  Performance management—WAN bandwidth and capacity planning  Security management—network infrastructure C-I-A IS3120…

    • 599 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper 502

    • 1305 Words
    • 5 Pages

    Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network security has not kept up with the company growth.…

    • 1305 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Riordan Manufacturing

    • 403 Words
    • 2 Pages

    Riordan Manufacturing has three operating entities…Georgia, Michigan and California…plus a joint venture in the People's Republic of China. Basically, the operating entities each have their own Finance & Accounting Systems and they provide input that is consolidated at Corporate…San Jose. The basic components of each system are as follows:…

    • 403 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3220 Assignment 3

    • 980 Words
    • 4 Pages

    As part of the network security team, we will be proving IDI with a network security plan to mitigate the vulnerabilities that have been discovered. A secure site will be set up with network intrusion detection and network protection systems will be available to access via the internal network. Policies will be presented for remote access and the use of VPN. Also contained within this report will be strategies for hardening the network and mitigating risks. An updated network layout with increased network security to meet the current needs will be included.…

    • 980 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Riordan Sr-Rm-013

    • 722 Words
    • 3 Pages

    Preventing attacks on your networks can be something that is stressful and very time consuming. Riordan has a Service request (SR-rm-013) in which the company shows concern about various security aspects within the company and the requirements of the Sarbanes-Oxley. Multiple different aspects of the company’s current security structure should be revised and updated to meet the standards of Sarbanes-Oxley Act.…

    • 722 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Assignment

    • 2454 Words
    • 14 Pages

    For the sake of time, many repetitive but important configuration tasks have been omitted from this activity. Many of these tasks, especially those related to device security, are essential elements of a network configuration. The intent of this activity is not to diminish the importance of full device configurations.…

    • 2454 Words
    • 14 Pages
    Powerful Essays