Preview

Project Deliverable 5

Good Essays
Open Document
Open Document
899 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Project Deliverable 5
Charles H. West III
Week 8 Assignment 4 CIS499
Project Deliverable 5
Dr, James Manning
August 25, 2013

Objective
To provide the best desktop connectivity for end users we would use twisted cable to connect to the Ethernet and will bring the 8 pin cables in use. To provide the fastest possible throughput there will be the use twisted cable which will transfer the data between nodes and devices very quickly. To provide security for the pay roll department effective firewalls will be used at every possible end so that there is no misuse of data.
The updates are: * 100BaseT is a new technology. * Burst rate of 100Mb/s is provided over twisted-pair. * It supports all the network designs, rules and topologies of 10BaseT network. * Increase in speed. * Simple bridges are required for the connectivity. * It can support WAN.

I would suggest for Star topology because of the following reasons. * Less Expensive * Nodes do not have dedicated links in between. * One link and one I/O ports is required by each device to connect to any number of nodes. * Star topology is easy to install and configure. * Failure of one node does not affect the entire system. The remaining nodes work efficiently. * There is simplicity of operations. * It can be used for audio, video and low voltage application. Basic Security Requirement Model An incorporated risk management program is serious in securing business objectives requiring the enforcement of secrecy, reliability, accessibility, and liability. Secrecy Secrecy ensures the safety of data from illegal access throughout an organization’s information planning, which extends to all data directly linked with the architecture’s applications, data stores, communication links and/or processes. Reliability Reliability ensures that data, services, and other restricted resources are not altered and/or destroyed in an unlawful manner. Reliability based controls provide

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It would take 3 (hop) messages to send a message from node D to node A. One additional link would be required to add a new node E between node C and node B. The added node E will increase the number of actual messages required to be sent form one node to another.…

    • 503 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Between two nodes in a network there can be many connecting paths but usually shortest path is considered best. It means any information exchange between two nodes also go through all nodes appearing in shortest path. By this reason any node involved in shortest paths can have…

    • 596 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It 220 Lab 9.1

    • 426 Words
    • 2 Pages

    - First we need to look at all cables and see what will be the most cost effective choice. If using standard copper (Cat6e) you will get gigabit transfer speeds but at only a 328 foot maximum run without repeaters. This cable choice is ideal at the office level with a central switch. If you have to go vertical in between floors and underground, then fiber optic would be ideal. These can go miles per single run and can transfer 100’s of gigbits per second. There is no EMI and is very secure. You could also use multi-run fiber for desktop computers if you require very secure connections that are not susceptible to EMI and can’t be tampered. Most networks today use a combination of both fiber and copper to suit their needs.…

    • 426 Words
    • 2 Pages
    Good Essays
  • Good Essays

    7.2.2 Data can be transmitted from different devices simultaneously. This topology can withstand high traffic; even if one of the components fails there is always an alternative present. So data transfer doesn’t get affected and Expansion and modification in topology can be done without disrupting other nodes.…

    • 725 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Netw410 Week 1 Lab Report

    • 702 Words
    • 3 Pages

    I feel that the below network diagram is simple, but does clearly explain the decision of the servers, devices and type of cabling used to connect all devices. All devices are labled and color code for easy troubleshooting.…

    • 702 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    must be recoverable in the event of system failure or natural disaster. To accomplish this, you…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1.3 – Explain the purpose of legal and organisational requirements for the security and confidentiality of information.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Cis 111

    • 790 Words
    • 4 Pages

    o Data integrity and security: The view process and the authorization facilities provide access control mechanisms.…

    • 790 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Project Deliverable

    • 595 Words
    • 2 Pages

    The significance of the critical path is that the activities that lie on it cannot be delayed…

    • 595 Words
    • 2 Pages
    Good Essays
  • Good Essays

    hair and beauty

    • 349 Words
    • 2 Pages

    Future reference, data protection, (lockable cabinet, password protected database), available to clients on request, up-to-date, accurate, relevant, information must not be – mishandled, mismanaged…

    • 349 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Kabira

    • 5234 Words
    • 21 Pages

    a single physical node, as well as across multiple nodes. In addition, the Kabira Infrastructure…

    • 5234 Words
    • 21 Pages
    Better Essays
  • Good Essays

    A vital element of security operations is confidentiality. Confidentiality is the backbone of security, without it then the operations are not secure. This is crucial for all employees and employers in the field of security due to the nature of the business.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Good Essays

    police

    • 498 Words
    • 2 Pages

    Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc...)[1]…

    • 498 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The expected huge number of interconnected devices and the significant amount of available data open…

    • 34172 Words
    • 121 Pages
    Powerful Essays