Preview

Network Plan

Good Essays
Open Document
Open Document
779 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Plan
Network Plan
Melissa Schnitzer
Bryant & Stratton College
NETW265 – Networking Tech Capstone
Professor Gray
November 10, 2012

Every company, no matter how big or small, will need careful attention to detail to ensure that an organization’s information will function properly and will be secure. Some of the things to consider are hardware, software, cost analysis, disaster recovery plans, and authentication policies. When creating a network plan for Acme Sensitive Data, these measures were taken. Their company has two adjacent floors with 20 employees. The other floors of the building contain several other companies that cannot gain access to their network. There are several hardware items that are needed, aside from the obvious items like computers, printers, and peripheral devices. Each computer will require a Network Interface Card (NIC) in order to communicate and transmit data on the network. To connect these computers, a Cat 5 Ethernet cable will be required because it supports up to 100 mbps of speed. This Ethernet cannot exceed more than 250 feet in a single run without losing effectiveness. If there needs to be more length a Cat 6 Ethernet should be used. Instead of buying the Ethernet with RJ45 connectors, buying a crimping tool and the connectors separate can make for a cleaner look to a network installation because the wires will be fit to exactly the right length. There is a need for servers but this number would depend on the needs of Acme Sensitive Data. A general scenario may include a main server that would perform the tasks that are most crucial to the business. Another server could be a backup and perform less daunting tasks of the corporation on a regular basis. Connecting the computers can be done through switches that have 20 ports. The software would include a Microsoft Operating System (OS) for each computer and Microsoft Server 2010 for the servers. Each computer will also need Microsoft Outlook for email purposes and a

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    It240 Week 3

    • 370 Words
    • 2 Pages

    To solve the shared bandwidth problem with the company network new equipment is necessary. First off the 10mbps Ethernet hub should be replaced with a 100mbps, due to its better performance. An extended star topology with a logical switch topology will be the best setup for the situation. As for the five new computers a wireless approach will be best. For this method each new addition will need to be equipped with a wireless NIC (network interface card). To connect these to the network a wireless router and a wireless access point will also be needed.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Travel Agency, Inc. is a large travel firm that was founded in 1999. They pride themselves on personal relationships along with fast and accurate customer service. Travel Agency, Inc. currently has five locations in Los Angeles, New York, Atlanta, Dallas and Chicago. Travel Agency, Inc. is looking to cut down on operating costs and focus on expanding their business. Part of this growth process is to switch to a telecommuting business model. The original business model consisted of workers in dedicated call centers. This is costly due to other travel agencies having lower overhead through utilization of self-service websites. By eliminating the overhead cost of a building rental, Travel Agency, Inc. will create flexibility, better customer service, and increased productivity. This also creates a home-based virtual office environment. This will help…

    • 9550 Words
    • 35 Pages
    Good Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It Case Study

    • 449 Words
    • 2 Pages

    The sales department consists of 50 employees that requires mobility with access to the company's resources while in the field with customers and presenting at sales meeting and conferences. The manufacturing department will have 45 employees and will need hardware that support word processing and spreadsheet programs and internet capable. The inventory control department will have 30 employees who would need mobility hardware as well with power to access database systems. The research and development department will consist of 20 employees that's need hardware with graphics design and CAD programs. The MIS will consist of 5 employees who will need additional processors and memory requirements to support administration tasks.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Request for Proposals

    • 26335 Words
    • 106 Pages

    Section C – Technical Approach Section D – Security Gap Analysis Section E – Privacy Data Section F – Security Assessment Section G – Security Assessment Report Section H – Mitigating Risks Section I – BIA, BCP, and DRP Section J – Layered Security Solution 6.4 6.5 6.6 6.7 Cost Proposal & Scoring Guide Proposal Score Summary Matrix Reference Questionnaire Supplemental Templates…

    • 26335 Words
    • 106 Pages
    Powerful Essays
  • Powerful Essays

    Justification for using component: The Cisco Aironet 1250 series APs are the first Wi-Fi CERTIFIED 802.11n draft 2.0 AP. It has also earned the Intel Connect with Centrino certification. As a thin client, the Cisco Aironet 1250 AP uses “Multiple In, Multiple Out” (MIMO) technology which uses wireless signal reflections to increase the device’s range and expand the coverage area to reduce dead spots; additionally, this WAP is UL 2043 Plenum rated for installation above suspended ceilings and supports Power over Ethernet (PoE) connectivity (or external DC power) allowing it to be installed in places that are not near electrical outlets. Other features found on the Cisco Aironet 1250 Series AP product sheet…

    • 2305 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Network Design APA Paper

    • 1898 Words
    • 9 Pages

    Designing and implementing a proper network design is an essential and yet critical step in building a reliable, top notch, network infrastructure. Developing the proper infrastructure can ensure performance at a level needed for growth and for stability all the while providing crucial time savings by minimizing the administrative workload. When designing a network you really want to implement scalability and future growth while ensuring minimal downtime and disruptions. Implementing scalability will ensure the network can grow with the organization. The network design I have implemented for UMUC which is depicted below provides scalability, security, and longevity.…

    • 1898 Words
    • 9 Pages
    Better Essays
  • Good Essays

    WAN Final

    • 753 Words
    • 2 Pages

    ACME Manufacturing is a growing organization, with locations in many different cities and it is now becoming a global company with its newest location in China. With the continuation of growth a company such as this will need a secure WAN.…

    • 753 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Xmgt Appendix C

    • 325 Words
    • 2 Pages

    Each of you will be faced with numerous moral and ethical dilemmas throughout your career. To be prepared to make these ethical decisions, it is helpful to clarify your personal values, and morals before you are faced with an ethical dilemma. Review the following list of values and create a list of the five values most important to you in making decisions.…

    • 325 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Businesses need to ensure the secure storage of company files and the guaranteed privacy of employee information. With the increased use and demand for network computing, information security has become a high priority. With all the ways in which someone can gain access to private and confidential information, the previous safe measures need to be enhanced and improved (Yaoxue Zhang; Laurenc T. Yang; Yuezhi Zhou; Wenyuan Kuang. 2010). For example, employee and company files are…

    • 962 Words
    • 4 Pages
    Better Essays
  • Good Essays

    There are some requirements before installing the system, basically the hardware like computer CPU, mouse, monitor, keyboard and printer are minimum requirements. Besides, memory is also a kind of hardware to run the customer relationship system (CRM) which requires larger memory space if the information or records about customers too much in this system. This system also requires random access memory (RAM). Next, the customer relationship system needs to run by install protocol correctly in client machine to connect to network and protocol also act as a set of rules that can make two or more computers to communicate such as TCP and IP. To allow a client computer can connect with central location that CRM located, network interface card (NIC) is needed for each server desktop and laptop machine to share information by CRM. Normally, wireless network card has been installed in laptop computer. Disk space is required before install customer relationship management system. Larger free space must in hard drive like more than 400 MB. Processor also needed in CRM. To avoid server from freeze, the lower grade processor should not use with customer relationship management system. Last but not least the operating system…

    • 1278 Words
    • 6 Pages
    Good Essays