Preview

Unit 3 Assignment 1: Designing A Network

Good Essays
Open Document
Open Document
755 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 Assignment 1: Designing A Network
Network is the mediator between client computer and server. It connects client computers to the server and allows the sharing of information stored in server computers. A local business (EROS) hair me to design Network for the third and fifth floors, so that After carefully considering the requirements I and my team have prepared the following network design for third and fifth floors. The network design is given above. The goal of the designed is to the provide the best performance, avilability, speed and over all, maximun security to serve groing adjacent for two floors of orgaization’s needs.

The selected network topology for EROS is a start Topology. In the start topology, as Wallace described, “Devices have an independent connection
…show more content…
To address the issue of data confidentiality, network will include a domain (EROS) and all stations, and user will be part of the domain. Through the use of active directory (AD), users will be granted access to the organization resources, based on their function and roles in the organization. Each use will be given a network account that will allow them access to the necessary means to perform their job. The wireless configuration will allow employees to connect to EROS-Employee Wi-Fi using two levels of security; MAC filtering and user authentication. Only devices, which physical address has been authorized will have access to the secured employee wireless network. In order to prevent employees from the 4th floor to see the wireless network and attempt to connect to it, EROS SSID will not be broadcast at all. The wireless configuration is part of EROS base image, for laptops, and can be setup on EROS provide mobile devices with a script. There is also a secured EROS Guest Wi-Fi for employees’ personal devices and guests. The wireless configuration is WPA2 and uses advance encryption standard (AES). The access key to the guest wireless will be reset on a weekly basis and user is able to retrieve the updated password from EROS intranet site. The IPsec tunnel configured for the organization offers encryption, data checksum, and user authentication.

You May Also Find These Documents Helpful

  • Good Essays

    NETW204 Assignment 4

    • 691 Words
    • 4 Pages

    Fill in the blanks below with either the term defined or the definition for the terms listed. Each answer is worth 2 points each, 25 questions X 2 = 50 total points. Type answers in the appropriate cell; text will automatically wrap. Post your completed assignment to the dropbox.…

    • 691 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The many complexities of network design are vast, wide and most often tailored to the customer and their uses. In the case of Kudler Fine Foods the network is the backbone of the company compromising the bulk of communications as well as the point of sale network. The design of these networks is a collaborative procedure aimed at ensuring that the services provided meet the needs of the customer. In the search of the ideal plan for network development I will discuss and explain principles of distributed and centralized computer systems. Accomplishing this by describing different network topologies; the standards and protocols that are essential to networking. The responsibilities essential in providing telecommunication services to include security, privacy, reliability and performance. How we distinguish and understand the uses of voice over the internet protocol, Centrex and other forms of telecommunications. With our main goal is to develop a system to utilize in our company that will ensure a proper management of our resources. The timeline for this is to have an implemented plan in place within 30 days of commencement. Our outline of six months to have the plan implemented is not outside the rational. Considering the internal and external resources implemented in the project.…

    • 3954 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    This model would support Role based access controls and allow mandatory access control to be governed by remote access. The IS Dept. is responsible for maintaining the access and access rights and prividgles and restricted as needed by user roles in the organization. All data is encrypted and transmitted via remote and encrypted and used by the vpn tunnel. VPN access will be terminated on a 3 month basis and must be renewed by revisiting based on your access role and…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    #include #include float avg_wt,avg_tt; int i = 0,ttl_wt=0,ttl_tt=0,qt; struct process { int prn; char type; int bt; int wt; int tt; struct process *nxt; }*stfor,*stbck,*np,*endfor,*endbck,*temp; void ins_node(struct process *np) { if(np->type == 'f') { if(stfor == NULL) stfor = endfor = np; else { endfor->nxt = np;…

    • 401 Words
    • 2 Pages
    Better Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By implementing the encryption between workstations and WAP you can protect the confidentiality of data transmissions.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 3 assignment 1

    • 479 Words
    • 2 Pages

    The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards are designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman Investments internal systems, etc.…

    • 479 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Produce a report that justifies the need for network managers to undertake routine performance management activities. Please ensure that your justification for these activities relates to reasons of efficiency and how they affect the quality of the service provided.…

    • 935 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    For this question I would have to go with the WLAN Star topology, the main reason for using the WLAN is for your wireless users to be able to connect to the network via an access point. Other reasons for using a WLAN, you would be able to have the ability to have the pc’s connected via CAT 5 still connect to the network. Security is a big issue for your company, the purpose of that would use the WPA, IDS/IPS, proxy servers, packet filtering firewalls that are locked a room like we have in Amazon, it’s a secure badge and pin combination room called out MDF room that is always cool with 2 cooling systems in there it have limited access to only IT personal. With the following security measure and the knowledge I have obtained up this point in these current and previous classes and working for Amazon, this would be a great way to have a fully secured network. With having WPA it will provide a strong data that will allow only authorized users to be able to access the wireless network. Like in the Visio diagram, the IDS/IPS with both enable the network to find anyone that tries to log into the network and allow to quarantine any hackers, like at Amazon we have the software Tanium to cover that. With having the firewalls and packet filters will examine the…

    • 925 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Quick Check

    • 747 Words
    • 3 Pages

    10. A new company will have 30 workstations in one building sharing a single network. All users must be able to share files and printers with each other. Access to shared information must be secure and simple to administer. The best technology for this system is:…

    • 747 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Network Design

    • 854 Words
    • 4 Pages

    In order to bring this system up to standards they will need to update to a more centralized computing system which all computing is done on a centrally managed computer system and the users use a dumb terminal (thin client) to connect to these central computers. The cost associated with this has been reduced over the years and was only used previously in enterprise environments but now more businesses are moving over to this type of system.…

    • 854 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Simple Network Design

    • 5452 Words
    • 22 Pages

    A group of Local Area Networks (LANs) interconnected using Wide Area Network (WANs) to form an enterprise network (Anon, n.d.). An enterprise networks control by a big organization (Anon, n.d.). This network consists of many internetworking devices such as switch, router and etc (Anon, n.d.).…

    • 5452 Words
    • 22 Pages
    Satisfactory Essays
  • Powerful Essays

    Network Architecture

    • 2272 Words
    • 10 Pages

    Recent developments in information technology have enabled collection and processing of vast amounts of personal data, business data and spatial data. It has been widely recognized that spatial data analysis capabilities have not kept up with the need for analyzing the increasingly large volumes of geographic data of various themes that are currently being collected and archived. Our study is carried out on the way to provide the mission-goal strategy (requirements) to predict the disaster. The co-location rules of spatial data mining are proved to be appropriate to design nuggets for disaster identification and the state-of-the-art and emerging scientific applications require fast access of large quantities of data. Here both resources and data are often distributed in a wide area networks with components administrated locally and independently, a framework has been suggested for the above. Our contribution in this paper is to design network architecture for disaster identification.…

    • 2272 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Network System Proposal

    • 1172 Words
    • 5 Pages

    When it comes to the topology of a network system there are several different types to choose from, first you have the most basic which is the bus line system, then there is the star topology, the token ring (originally designed by and for IBM systems), and finally there is the mesh topology. There are also several different hybrid systems which incorporate one or more of the systems mentioned above. For you though we decided to stick with a star topology which allows for high security, minimal if any system down time and, complete expandability. With this particular design we have allowed you and your systems administrators to enjoy an easily managed, high speed network. The star topology that we have designed uses several multi-layer switches that work on levels 1, 2, and 3 of the OSI model. All linked together creating aggregated links so that if one were to fail the others still allow for communication through out the entire system, with little or no effect on network speed. This topology will also allow your systems administrators to be able to efficiently locate the problem area by easily tracing network traffic too and from the switch(s).…

    • 1172 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    In this PAT, I will be investigating the different types of network solutions that will enable an ICT retail business head office to communicate with its two branches with ease. Transferring information relating to the company policies, new products, company promotions and advertising to relevant departments, staff related information and other business related issues. The type of network I will be looking find should be able to deal with the grow in the business in long term but also be able to provide more security to the business as a whole when it comes to insuring the sharing and communication with different branches is safe and reliable. I will use the internet, expert advice which I will receive through conducting interviews with a few network administrators. This will help my increase my knowledge and understanding of the different types of network solutions that’s are available that can meet the needs of the business.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technician

    • 3478 Words
    • 10 Pages

    : Current Trends in Networking : Adrian Pullin : Alexander Kamambulu Chiumia : STU 34249 : 3278 : 25th April, 2013…

    • 3478 Words
    • 10 Pages
    Powerful Essays