Top-Rated Free Essay
Preview

Network Security

Good Essays
523 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Security
AMA Computer Learning Center – Pasay Campus
Special Project in Computer Hardware Servicing NCII
Mr. Jonel Mateo

CASE STUDY 01: NETWORK DESIGN

CASE STUDY SITUATION

You are interested in starting your own Music Store, QualitySounds, in a suburban area of your town. You need to design and build a network and computing solution for your stores. You have done some initial planning and you will start with two stores (but you plan to add two more stores across town within one year). Your store will sell new and used music and allow customers to get “online” in your stores and download music. You also will offer classes on how to setup music downloads and configure MP3 devices. You took computer networking courses in college and you feel you can tackle this solution yourself. Upon initial planning, you have identified the following requirements for your network:

* Connects three office computers and one computer used for Point-of-Sale (POS) services at each of your stores. You also want six (6) computers in the lobby/store where patrons can download music and you can run “training classes” for people to learn about using MP3 players and get other basic information. The two offices have to be connected into one cohesive network, sharing POS services and other critical company information. You also need to provide a “hand out” casual area for people to stop in and discuss music and connect wirelessly to the Internet (you might even offer free coffee to entice people to come in to your store). * Provides adequate security for all of the company communications and documents (especially sensitive sales documents). All POS services must be protected. All general network access should be segmented from the company POS services. * Fast and have additional capacity as the company grows * Provides for centralized printing * Supports the eventual addition of other stores to the network * Provides customers with a general information Website and a secure Website where clients can buy services, and products * Provides for limited downtime (24 hour downtime maximum) * Provides for centralized management and control of the computers in the two stores, so that you can maintain the network from off-site * Provides for long-term cost effectiveness * Provides a suite of software tools for the employees to effectively communicate and a POS solution for the stores

The company does not have any equipment. Your plan should include a complete network and computer system that meets these requirements and future expansion plans.

The two store locations will (eventually) be within a five-mile radius of each other. The locations are within a suburban area that has current technological infrastructures and related technology offerings. The stores will need a sales system and print services for invoices.

Complete your proposal including costs for computing equipment, network infrastructure, network servers, printers, and related hardware, software, and accessories. Include as much detail as possible as well as justification as to your selections. Diagram and explain your physical network and computer design as well as the logical network design (server installation, domain layout, etc.). As you are a small business, cost is a major factor and should be minimized.

You May Also Find These Documents Helpful

  • Powerful Essays

    The proposed network is designed to serve DesignIT which consist 56’x36’ office space, 4 cubicles, 1 office, 1 server room, 1 receptionist desk and 1 conference room.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    PAN, LAN, HAN, MAN or WAN –Given that the Little Country Store is a little secretly run organization, I would choose to setup a Local Area Network (LAN) for their framework designing. The LAN configuration is the best option for a productive Small Office/Home Office (SOHO) where periphery contraptions, for instance, printers and scanners may be bestowed to different PCs on the framework. Making usage of this preferred standpoint makes using a framework more calm than purchasing a printer for each individual PC. This LAN will have three PCs masterminded in a comparative building structure with a most extraordinary detachment of 200 feet between PCs.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    Sunica Music and Movies is a small but growing multimedia chain with currently four locations. These locations currently act independently from each other and have little to no communication between each other and each other’s stock. There is no web site which limits the business to local and word of mouth. There is also an accounting issue due to no centralization of funds. Because of these issues the company has lost customers and revenue. With the implementation of a Wide Area Network (WAN), and proper security steps, Sunica Music and Movies will have the ability to access, implement and use a centralized inventory database from any store. The creation of a webpage will also be necessary to be the company global as well as create an intranet between stores for secure location to location data transfer. There will need to be site set ups, one for the primary location of the web servers and data centralization and a backup location for disaster recovery.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lan Topologies

    • 261 Words
    • 2 Pages

    The Network will be Server based running four or five servers each with a certain task. The network will host at least 250 computers not including the servers with room to accommodate at least 50 more computers for future employees. I will implement a number of switches to accommodate the three or more floors that we need to access.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mis589 Wk7 Mini-Cases

    • 487 Words
    • 2 Pages

    Computer Dynamics is a microcomputer software development company that has a 300-computer network. The company is located in three adjacent five-story buildings in an office park, with about 100 computers in each building. The current network is a poorly designed mix of Ethernet and token ring (Ethernet in two buildings and token ring in the other). The networks in all three buildings are heavily overloaded, and the company anticipates significant growth in network traffic. There is currently no network connection among the buildings, but this is one objective in…

    • 487 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Thirdly, although it was not stated in the report as to whether the Sunshine Health Corporation had security or not, it indeed should be implemented. Having security is extremely detrimental to them due to the fact that on a day-to-day basis they would be sending patients’ information and business information over the line. In stating this, it is very important that the servers are well protected, physically as well as the information they are transferring to other systems. The Cisco switches, wireless routers, and IDS systems will provide security for the network from all foreseeable threats. “Providing complete intrusion protection, Cisco IDS delivers a comprehensive, pervasive security solution for combating unauthorized intrusions,…

    • 1138 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Hard Rock Case Study

    • 275 Words
    • 2 Pages

    1. What problems did the Rank Group find with the Hard Rock’s three main internal information systems (restaurant operations, merchandising, and financial)? Why was this a problem? [table]…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Case Projects

    • 437 Words
    • 2 Pages

    Based on our text I think a physical star has a lot of advantages and it would be better suited for this example. A peer to peer has too many disadvantages to work in this scenario. It is not centralized, there is a lack of security in this setup and only a small group of computer will be able to connect at a time with a peer to peer. With a server based network it will be easier to add and manage multiple computers, all file will be centralized and this way I can add 50 computers each to the five servers in compliance with what the client needs are based on the example. A switch is easiest to replace and in terms of what offer the best access it would be a network interface card.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To address the issue of data confidentiality, network will include a domain (EROS) and all stations, and user will be part of the domain. Through the use of active directory (AD), users will be granted access to the organization resources, based on their function and roles in the organization. Each use will be given a network account that will allow them access to the necessary means to perform their job. The wireless configuration will allow employees to connect to EROS-Employee Wi-Fi using two levels of security; MAC filtering and user authentication. Only devices, which physical address has been authorized will have access to the secured employee wireless network. In order to prevent employees from the 4th floor to see the wireless network and attempt to connect to it, EROS SSID will not be broadcast at all. The wireless configuration is part of EROS base image, for laptops, and can be setup on EROS provide mobile devices with a script. There is also a secured EROS Guest Wi-Fi for employees’ personal devices and guests. The wireless configuration is WPA2 and uses advance encryption standard (AES). The access key to the guest wireless will be reset on a weekly basis and user is able to retrieve the updated password from EROS intranet site. The IPsec tunnel configured for the organization offers encryption, data checksum, and user authentication.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Operational Decisions

    • 2865 Words
    • 12 Pages

    Program1 is an on-line music store that specializes in custom made music appliances programming, repairs, and the sale of personal computers, laptops, I-Pod’s, MP3 players, CD’s, instruments, and other devices associated with music. Program1 will use revenue from studio time sold along with any cash generated from entertainment events to help satisfy the entertainment services in the on-ground stores. The on-line feature will allow a convenient shopping experience for customers to purchase all of the products on-line. In addition, Program 1 will differentiate their products and services by having a variety of all genres of music from the 60’s through current day selections. Finally, Program 1 will provide a niche unlike its competitors by serving communities on a global frontier which will be an effective method for accomplishing their mission.…

    • 2865 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Cyber Security

    • 368 Words
    • 2 Pages

    I have a multitude of passwords to memorize in an effort to maintain my privacy and security. It is unfortunate that cyber world users must constantly deploy measures to keep their personal information private. Before this class I was certainly aware of the potential dangers that could occur in cyberspace, prevention always has been my goal. I have security protection in place against attacks such as viruses, spam, malware, spyware, and adware and I ensure that the protection is up-to-date as it is essential part of prevention is to remain current. Other security measures an average user may do is to maintain their system is to allow Microsoft Windows to perform automatic updates. These updates can provide additional security measures to the system info structure. Running regular maintenance such as a system defragmentation will keep the system up-to-date and in proper order. The average user should also password protect their personal information. If the wireless network James used had been password protected James would not have had the opportunity to enter the network without first inputting the password.. I would feel violated to know that someone was using my wireless network without my authorization I would be horrified to know that individual was plundering through my private things. Securing a personal computer and a wireless network with a password is extremely important otherwise the system is open and vulnerable toward an attack. Furthermore, James was placing himself at risk by entering an unknown unsecured network. When I review the network settings on my wireless network I am able to view data, websites and activity going through my network. I enjoy this feature because I am able to see what my children are doing when they are online. I teach my boys how to protect themselves while online. In the future I plan to remain aware of any potential treats and I will review any new…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    Sunica Music and Movies is a company that currently has four locations. This business is ready to improve the way they do business by implementing a computerized network that will allow for centralized accounting and inventory as well as starting a web-based e-commerce site. The following document provides an in-depth look at the implementation of policy and procedures that will help this transition to become successful.…

    • 3396 Words
    • 14 Pages
    Best Essays