Preview

Unit 3 Assignment 1: Designing A Network

Good Essays
Open Document
Open Document
755 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 Assignment 1: Designing A Network
Network is the mediator between client computer and server. It connects client computers to the server and allows the sharing of information stored in server computers. A local business (EROS) hair me to design Network for the third and fifth floors, so that After carefully considering the requirements I and my team have prepared the following network design for third and fifth floors. The network design is given above. The goal of the designed is to the provide the best performance, avilability, speed and over all, maximun security to serve groing adjacent for two floors of orgaization’s needs.

The selected network topology for EROS is a start Topology. In the start topology, as Wallace described, “Devices have an independent connection
…show more content…
To address the issue of data confidentiality, network will include a domain (EROS) and all stations, and user will be part of the domain. Through the use of active directory (AD), users will be granted access to the organization resources, based on their function and roles in the organization. Each use will be given a network account that will allow them access to the necessary means to perform their job. The wireless configuration will allow employees to connect to EROS-Employee Wi-Fi using two levels of security; MAC filtering and user authentication. Only devices, which physical address has been authorized will have access to the secured employee wireless network. In order to prevent employees from the 4th floor to see the wireless network and attempt to connect to it, EROS SSID will not be broadcast at all. The wireless configuration is part of EROS base image, for laptops, and can be setup on EROS provide mobile devices with a script. There is also a secured EROS Guest Wi-Fi for employees’ personal devices and guests. The wireless configuration is WPA2 and uses advance encryption standard (AES). The access key to the guest wireless will be reset on a weekly basis and user is able to retrieve the updated password from EROS intranet site. The IPsec tunnel configured for the organization offers encryption, data checksum, and user authentication.

You May Also Find These Documents Helpful

  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Research

    • 489 Words
    • 2 Pages

    a. The __bus_____ physical topology consists of a single cable that connects all nodes on a…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The many complexities of network design are vast, wide and most often tailored to the customer and their uses. In the case of Kudler Fine Foods the network is the backbone of the company compromising the bulk of communications as well as the point of sale network. The design of these networks is a collaborative procedure aimed at ensuring that the services provided meet the needs of the customer. In the search of the ideal plan for network development I will discuss and explain principles of distributed and centralized computer systems. Accomplishing this by describing different network topologies; the standards and protocols that are essential to networking. The responsibilities essential in providing telecommunication services to include security, privacy, reliability and performance. How we distinguish and understand the uses of voice over the internet protocol, Centrex and other forms of telecommunications. With our main goal is to develop a system to utilize in our company that will ensure a proper management of our resources. The timeline for this is to have an implemented plan in place within 30 days of commencement. Our outline of six months to have the plan implemented is not outside the rational. Considering the internal and external resources implemented in the project.…

    • 3954 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    This model would support Role based access controls and allow mandatory access control to be governed by remote access. The IS Dept. is responsible for maintaining the access and access rights and prividgles and restricted as needed by user roles in the organization. All data is encrypted and transmitted via remote and encrypted and used by the vpn tunnel. VPN access will be terminated on a 3 month basis and must be renewed by revisiting based on your access role and…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NETW204 Assignment 4

    • 691 Words
    • 4 Pages

    Fill in the blanks below with either the term defined or the definition for the terms listed. Each answer is worth 2 points each, 25 questions X 2 = 50 total points. Type answers in the appropriate cell; text will automatically wrap. Post your completed assignment to the dropbox.…

    • 691 Words
    • 4 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By implementing the encryption between workstations and WAP you can protect the confidentiality of data transmissions.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Produce a report that justifies the need for network managers to undertake routine performance management activities. Please ensure that your justification for these activities relates to reasons of efficiency and how they affect the quality of the service provided.…

    • 935 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    In order for Patton-Fuller to operate to the best of its ability, they must first start with their wireless network. First by implementing two completely separate networks, the first network would be inside their firewall and connected to the wired network for use by staff and used by company equipment. The Second one should be located on the outside of the firewall to be used by guest and families to the facility. By drafting a “User Agreement” the guest network would be secured or encrypted in anyway, allowing any one to connect to it. On the other hand, the internal network must be secured using a WPA2 encryption, and further encryption with MAC filtering. With them implemented and in place; then a balance of the security and accessibility would benefit everyone.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Quick Check

    • 747 Words
    • 3 Pages

    10. A new company will have 30 workstations in one building sharing a single network. All users must be able to share files and printers with each other. Access to shared information must be secure and simple to administer. The best technology for this system is:…

    • 747 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Network Design

    • 854 Words
    • 4 Pages

    In order to bring this system up to standards they will need to update to a more centralized computing system which all computing is done on a centrally managed computer system and the users use a dumb terminal (thin client) to connect to these central computers. The cost associated with this has been reduced over the years and was only used previously in enterprise environments but now more businesses are moving over to this type of system.…

    • 854 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Simple Network Design

    • 5452 Words
    • 22 Pages

    A group of Local Area Networks (LANs) interconnected using Wide Area Network (WANs) to form an enterprise network (Anon, n.d.). An enterprise networks control by a big organization (Anon, n.d.). This network consists of many internetworking devices such as switch, router and etc (Anon, n.d.).…

    • 5452 Words
    • 22 Pages
    Satisfactory Essays
  • Good Essays

    Network System Proposal

    • 1172 Words
    • 5 Pages

    When it comes to the topology of a network system there are several different types to choose from, first you have the most basic which is the bus line system, then there is the star topology, the token ring (originally designed by and for IBM systems), and finally there is the mesh topology. There are also several different hybrid systems which incorporate one or more of the systems mentioned above. For you though we decided to stick with a star topology which allows for high security, minimal if any system down time and, complete expandability. With this particular design we have allowed you and your systems administrators to enjoy an easily managed, high speed network. The star topology that we have designed uses several multi-layer switches that work on levels 1, 2, and 3 of the OSI model. All linked together creating aggregated links so that if one were to fail the others still allow for communication through out the entire system, with little or no effect on network speed. This topology will also allow your systems administrators to be able to efficiently locate the problem area by easily tracing network traffic too and from the switch(s).…

    • 1172 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    In this PAT, I will be investigating the different types of network solutions that will enable an ICT retail business head office to communicate with its two branches with ease. Transferring information relating to the company policies, new products, company promotions and advertising to relevant departments, staff related information and other business related issues. The type of network I will be looking find should be able to deal with the grow in the business in long term but also be able to provide more security to the business as a whole when it comes to insuring the sharing and communication with different branches is safe and reliable. I will use the internet, expert advice which I will receive through conducting interviews with a few network administrators. This will help my increase my knowledge and understanding of the different types of network solutions that’s are available that can meet the needs of the business.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Network Architecture

    • 2272 Words
    • 10 Pages

    Recent developments in information technology have enabled collection and processing of vast amounts of personal data, business data and spatial data. It has been widely recognized that spatial data analysis capabilities have not kept up with the need for analyzing the increasingly large volumes of geographic data of various themes that are currently being collected and archived. Our study is carried out on the way to provide the mission-goal strategy (requirements) to predict the disaster. The co-location rules of spatial data mining are proved to be appropriate to design nuggets for disaster identification and the state-of-the-art and emerging scientific applications require fast access of large quantities of data. Here both resources and data are often distributed in a wide area networks with components administrated locally and independently, a framework has been suggested for the above. Our contribution in this paper is to design network architecture for disaster identification.…

    • 2272 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Technician

    • 3478 Words
    • 10 Pages

    : Current Trends in Networking : Adrian Pullin : Alexander Kamambulu Chiumia : STU 34249 : 3278 : 25th April, 2013…

    • 3478 Words
    • 10 Pages
    Powerful Essays