Preview

Infrastructure and Security

Good Essays
Open Document
Open Document
974 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Infrastructure and Security
Introduction
A network that is effective today networking enterprise is very critical. Down time as well as performance that is degraded can have a serious impact that can bring operations to a halt. With the importance of networks rising in today’s technology, threats also rise with them as well. Having the ability to keep a network up and running to its maximum ability is not only a job, it’s a business that has responsibility. Having infrastructure security is vital in order to ensure the integrity and stability of the network for Layer 1. Infrastructure Physical Media
Layer 1 is the physical layer of a network according to the OSI model. Electricity in this layer is the most fundamental because all of the networking equipment, devices, and open network equipment is dependent on electricity to deliver power to those devices. This layer represents the physical media that is used to transfer the binary data across the different networks. The physical layer uses all sorts of physical media to transfer the data, here are a few examples: Twisted Pair copper * Category 4 copper- A unshielded twisted pair copper that is uses four pairs for which is used in telecommunications along with some networks used for computers that provides 20 megahertz of bandwidth with a data transfer rate of 16 megabytes per second. * Category 5 copper – This type of cabling also uses four pairs and is used more extensively in terms of Ethernet connections, telephony, and local area networking systems. Punch-down and modular connections are the primary ways of installation and conforms to the standards of TIA/EIA-568 communications standards * Category 6 copper- Twisted pair copper that is specifically used for gigabit Ethernet-based computer networks. In 2002, Category 6 was introduced, and joined the Electronics Industry Association and Telecommunications Industry Association. This type of twisted copper consists of 4 strands and provides up to 250 megahertz



References: Kay, R. (2005, April 4). Biometric Authentication. Retrieved from Computerworld: http://www.computerworld.com/s/article/100772/Biometric_Authentication?taxonomyId=17&pageNumber=2 Mitchell, B. (n.d.). Network Topologies. Retrieved from About.com: http://compnetworking.about.com/od/networkdesign/a/topologies.htm Reed, D. (2003, November 21). Applying the OSI Seven Layer Network Model to Information Network Security. Retrieved from http://www.sans.org/reading_room/whitepapers/protocols/applying-osi-layer-network-model-information-security_1309

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 5 Assignment 2

    • 1305 Words
    • 4 Pages

    3. Which of the following speeds are not defined as a speed by some Ethernet LAN standard? b. 4 Gbps…

    • 1305 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Secure service: The main objective of this network is to provide secure administrative computing service to DesignIT. It is designed to be functionally and physically isolated from access by people not employed by DesignIT so as to minimize the risk of unauthorized use.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    1310 unit 4

    • 440 Words
    • 2 Pages

    Category 5e/6 cable: Enhanced CAT-5 and 6 have many improved specifications over CAT-5 with frequencies of 100MHz for 5e and 250 MHz for 6.…

    • 440 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Global Finance, Inc. (GFI) is a hypothetical company, which has grown rapidly over the past year. GFI has invested in its network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth. The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The most vital application servers is the company is their Oracle database and email system. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has recently experienced multiple network attacks resulting in a total estimated loss at more than $1,000,000.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Cat5e, Cat5 and CAT6 are the most recent Ethernet Evolution; they are the standard and most easily affordable for companies to use. The ease of installment is also a big factor when using CAT cables, twisting and lining up the end connectors is all that is required. The biggest issue with using CAT is that in starts to lose signal after 100 meters, it needs to be sent through a repeater, or a switch to regain signal strength. For the cost, performance and ease of installation the CAT5e is the best medium for a LAN.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Twisted pair comes in two varieties, shield (STP) and unshielded (UTP). The name describes the cabling completely, there are two pairs of cables twisted together in order to reduce cross talk between the wires. Phone line in houses and businesses still use USP for analog telephone and fax machines to this day. UTP comes in many varieties and is constantly being built upon. Cat5e, Cat6, Cat7, and now Cat 8 cables are available to businesses and end users today. With this standard pushing 40 Gigabytes per second the only question remains is what are the full limitations of copper? STP is nothing more than adding extra shielding to reduce crosstalk in the UTP standards. These are extremely cost effective networking cables and are easier to install than coax. Twisted pair is more…

    • 1357 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unshielded twisted-pair (UTP) - Copper wiring used in small-to-large networks to connect host devices to hubs and switches.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1330 Week 3 exercise

    • 251 Words
    • 2 Pages

    Unshielded twisted pair – Twisted pair cabling is a type of wiring in which two conductors are twisted.…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ch. 16 Solutions

    • 1258 Words
    • 6 Pages

    6. When using cable Internet, the data transmission shares the cabling with what other technology?…

    • 1258 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Ethernet Cabling Category

    • 384 Words
    • 2 Pages

    Category 2 UTP 10Base - T Ethernet Cabling Category 5 UTP 100Base - T Ethernet Cabling Category 6 UTP 1000Base - T Ethernet Cabling…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 8 Lab 1

    • 662 Words
    • 2 Pages

    References: Oliviero, A., & Woodward, B. (2011). Connectors. In A. Oliviero, & B. Woodward, Cabling: The Complete Guide to Copper and Fiber-Optic Networking (4 ed., pp. 679-683). Indianapolis, Indiana, United States of America: John Wiley & Sons,Inc.…

    • 662 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Mallery, J., Zann, J., Kelly, P., Noonan, W., Seagren, E., Love, P., et al. (2005). Hardening Network Security. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Cable Factors and Tools

    • 355 Words
    • 2 Pages

    Recognized Media recognizes two types of media that can be used as horizontal cabling. More than one media type may be run to a single work-area telecommunications outlet; for example, a UTP cable can be used for voice, and a fiber-optic cable can be used for data.…

    • 355 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    As many businesses try to make their companies thrive by connecting their systems to the internet, some companies may become very skeptical about this. With virtually everyone in the world being connected to some type of network, having all of company data linked together can cause a very serious problem by one user’s mistake or problem. In many instances, the potential for data loss or a small security breach increases when creating a network. This can happen over large or small networks, but when it comes to how important security is, the size is totally insignificant. The sole purpose in network security is to prevent any loss of data by mismanaging it.…

    • 838 Words
    • 4 Pages
    Good Essays