Preview

Lkt2 - Task 3

Good Essays
Open Document
Open Document
871 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lkt2 - Task 3
MAB Law Firm
Network Consolidation

Executive Summary
There are inherent challenges in merging the law firms Myrtle & Associates (Site A) and
Belleview Law Group (Site B). This document will identify the current architecture, address the proposed changes and identify issues to be resolved. With the attached security plan and network diagrams, it is intended to provide an accurate before and after view.
Currently both site A and B operate closed networks. This means neither have a connection to the internet. While this provides fewer points of entry for malicious activity, it also complicates the process of consolidating the networks. Additional equipment will need to be purchased along with data circuits to link the two across town networks, and provide internet access. Both networks will be connected with a Pont to Point T1 data circuit, with a second T1 at site A providing a firewalled connection to the Internet for both sites.
Both networks currently run different host Operating Systems (OS). Site A is running
Windows 2008 Active Directory (AD) and Servers, while site B is running the outdated version
NOVEL Directory Services (NDS). Since AD support communications with NOVEL, the site B
NDS server will be replaced with a Windows 2008 Domain Controller (DC). For the moment the NOVEL File and Application servers will remain active at the site B. All user accounts will be migrated over to AD.
Wireless support is currently only available at the site A. An access point will be need deployed to the site B. This will allow portable client systems to access the network regardless of which site they are located.
With a few changes and upgrades the transition from two closed networks to one multi location internet accessible network is possible. The challenges involved are not difficult to overcome. LKT2 – Task 3
Page 1 of 4

MAB Law Firm
Network Consolidation

Security Plan
Physical Security
Site A: The interior 8’ x 10’ room has one

You May Also Find These Documents Helpful

  • Good Essays

    Ntc/360 Week 4

    • 877 Words
    • 4 Pages

    The Team and Kudler Fine Foods have decided that Cisco will be the company that it gets most of it hardware from for the LAN portion of this network build. Once the T1 has been dropped at each Kudler Fine Foods Location, it will need to be hooked up to one of Cisco’s routers. This would most likely be one of the 2600 series routers. The router is needed to manage the data paths that information is transferred between devices such as computers and…

    • 877 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Lab Report

    • 567 Words
    • 3 Pages

    This will create a fault tolerant environment and a backup server in the event of a failure in Server##.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Wiley, J. (2012). Windows Server 2008 Active Directory Configuration. Hoboken: John Wiley and Sons, Inc.…

    • 1426 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Unit 7 Lab 7.1

    • 391 Words
    • 3 Pages

    This type of media can be used with Broadband over Power Lines (BPL), making use of the extensive infrastructure in place already.…

    • 391 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    17. A Windows Server 2008 computer that has been configured with Active Directory DS role is referred to as a __________. Domain Controller…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Lab 2 Answer

    • 2665 Words
    • 11 Pages

    In the diagram provided in Figure 2-1, write both the domain names and the fully qualified domain names that you have selected for the computers in the appropriate spaces.…

    • 2665 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1110

    • 335 Words
    • 2 Pages

    • Network-attached storage (NAS) is hard disk storage that is set up with its own network address rather than being attached to the department computer that is serving applications to a network 's workstation users. By removing storage access and its management from the department server, both application programming and files can be served faster because they are not competing for the same processor resources. The network-attached storage device is attached to a local area network (typically, an Ethernet network) and assigned an IP Address. File requests are mapped by the main server to the NAS file server. (Nerwork Attached Stroage)…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The updated server addresses, without informing the clients they will need to update their web response address.…

    • 811 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Exercise 1

    • 149 Words
    • 1 Page

    6. If the company decided to configure sites, where would you expect them to be located?…

    • 149 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Data Comm

    • 501 Words
    • 3 Pages

    3. List some advantages of mapping a directory located on a server to a workstation.…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    References: Zacker, C. (2009). Lesson 7: Deploying Web Applications. Windows server 2008 applications infrastructure configuration (70-643) (). Hoboken, NJ: Wiley.…

    • 411 Words
    • 2 Pages
    Good Essays
  • Good Essays

    There could be a number of changes that would improve the communication between the two sites and the running of Site 2. A PC and a printer installed at Site 2 would enhance the efficiency of accessing documents required to fulfill compliance requirements. The addition of email access would also enhance the communication between sites and quick sharing of documents and menu updates. Email would also speed up the process of emailing documents such as maintenance requests, OFI requests, and other related material and provide a resource management system for ordering of paper, ink cartridges, etc. The daily counting of the till could also be instantly processed.…

    • 437 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Vlan

    • 613 Words
    • 3 Pages

    VLAN will provide an independence from the physical topology of the network. This is done by allowing physically workgroups to be connected within a single broadcast domain. With the physical infrastructure in place, ports can be added in new locations to existing VLANs if a department expands or relocates. Additional security can be added by implementing VLANs. Allowing a network administrator to separate users can be done by requiring access to important information.…

    • 613 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    References: [1] The internet engineering task force mobile ad-hoc networking page (MANET). Available from: http://www.ietf.org/html.charters/ manet-charter.html. [2] Taipei-wlan. Available from: http://wlan.taipei-elife.net/english/ main.html. [3] Wireless philadelphia. wirelessphiladelphia.org. Available from: http://www.…

    • 10973 Words
    • 44 Pages
    Powerful Essays
  • Powerful Essays

    Client Server Technology

    • 7268 Words
    • 30 Pages

    Client/Server technology is a means for separating the functions of an application into two or more distinct parts. The client presents and manipulates data on the desktop computer. The server acts like a mainframe to store and retrieve protected data. Together each machine can perform the duties it is best at. Client-server computing or networking is a distributed application architecture that partitions tasks or work load between service providers (servers) and service requesters, called clients.[1] Often clients and servers operate over a computer network on separate hardware. A server machine is a high-performance host that is running one or more server programs which share its resources with clients. A client does not share any of its resources, but requests a server's content or service function. Clients therefore initiate communication sessions with servers which await (listen to) incoming requests. Client/server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request. Although the client/server idea can be used by programs within a single computer, it is a more important idea in a network. In a network, the client/server model provides a convenient way to interconnect programs that are distributed efficiently across different locations. Computer transactions using the client/server model are very common. For example, to check your bank account from your computer, a client program in your computer forwards your request to a server program at the bank. That program may in turn forward the request to its own client program that sends a request to a database server at another bank computer to retrieve your account balance. The balance is returned back to the bank data client, which in turn serves it back to the client in your personal computer, which displays the information for…

    • 7268 Words
    • 30 Pages
    Powerful Essays