This paper is a continuation of our previous scenario of developing a Wide Area Network for an audio and video special effects company with worldwide offices in the U.S., Europe, Japan, and South America. This part of the project details the types of network protocols we’re proposing to utilize for the WAN and LAN throughout the corporation.
Keywords: WAN, Wide Area Network, LAN, Local Area Network, Global Corporate Communication Network Structure, Networking Protocols
Protocol Choices
Discussion
WAN’s (Wide Area Networks) and LAN’s (Local Area Networks) utilize a great deal of hardware and software to function efficiently and effectively. As our project has detailed thus far, the devices and programs we’re recommending for our given scenario is extensive. It must be stated here, though, that what is essential to a network’s operation is the protocols utilized. “A network protocol defines rules and conventions for communication between network devices” (Mitchell, 2013), and here we are detailing the protocol choices we’re recommending.
EIGRP
EIGRP, or Enhanced Interior Gateway Routing Protocol, is the primary WAN protocol we’ll utilize to connect our HQ, Design Centers and Sales Offices. This protocol is utilized for the communication between our routers, and it is this router communication which makes our WAN possible. EIGRP is our protocol of choice because it offers “quick convergence times with minimal network traffic” (Cisco, 2005). Cisco’s white paper on the subject states its advantages best: very low usage of network resources during normal operation; when a change occurs, only routing table changes are propagated, not the entire routing table (this reduces the load the routing protocol itself places on the network); and rapid convergence times for changes in the network topology (in some situations convergence can be almost instantaneous). (2005) It is these advantages which appeal to us and why we’ve recommended it for this project.
References: Cisco (2005, September 9). Enhanced Interior Gateway Routing Protocol. Retrieved from http://www.cisco.com/en/US/tech/tk365/technologies_white_paper09186a0080094cb7.shtml Delaney, E. (2011). CompTIA security plus study guide. Indianapolis, Indiana: Wiley Publishing Inc. Karris, S. T. (2009). Network: Design and Management, Second Edition (p. 522). Orchard Publications. Retrieved from http://common.books24x7.com.proxy.itt-tech.edu/toc.aspx?bookid=30200 Mistry, R. (2009). Microsoft SQL Server 2008 Management and Administration (p. 680). Sam’s Publishing. Mitchell, B. (2013). About.com Wireless/Networking. Retrieved from http://compnetworking.about.com/od/networkprotocols/g/protocols.htm Taylor, J. (2004). Managing Information Technology Projects: Applying Project Management Strategies to Software, Hardware, and Integration Initiatives (p. 274). AMACOM. Wood, D. P., & Passcarella, M. E. (2012). Essentials of Microsoft Office Project 2007: Custom Edition (p. 344). Pearson Custom Publishing. Our Network Topology Map