Preview

Ntc 362 Integrative Network Design Project Part 3

Powerful Essays
Open Document
Open Document
855 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ntc 362 Integrative Network Design Project Part 3
Integrative Network Design Project: Part Three
Matthew T. Walsh
NTC/362
01/20/2013
Greg Ellis

Integrative Network Design Project The redesign for Kudler Fine Foods has covered the topology and standards and has defined the architecture, protocols, and strategies it will employ. Now security is the issue that needs to be reviewed. The most important aspect of any communications platform is that it is secure. This paper will discuss the security of the network and the details of the hardware choices that will be used in it.
Security Hardware and Software Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security
…show more content…
A local network can mean a small network in a home, or a business network covering several buildings on a city block. LANs are relatively fast, compact, and when configured correctly, have few errors or problems. The hardware needed to build an LAN is set up on OSI levels 1 and 2 and include devices like switches, bridges, hubs, and repeaters. Wide area networks (WAN) are complex networks that span large geographical areas. The most commonly known WAN is the Internet. WANs tend to be slower in speed, highly complex, and intolerant of system problems. Because of the multitude of connections on a WAN, even a simple down can create problems across the network.
Fundamental Network

You May Also Find These Documents Helpful

  • Good Essays

    Ntc/360 Week 4

    • 877 Words
    • 4 Pages

    Now that the Network design stage is complete, the team must now determine the hardware and software needed to bring the network design to life. As discussed the backbone of Kudler’s Fine Foods network will be a routed network with LANs and a WAN. IN this case the LAN or Local Area Network will be everything Kudler Fine foods have on the internal side of its routers and firewalls. The WAN or Wide Area Network will be everything in between the LANs at each one of the Kudler Fine Foods locations.…

    • 877 Words
    • 4 Pages
    Good Essays
  • Good Essays

    7.1.1 A WAN is a wide area network that is often used by large businesses or corporations. It is impractical for an organization to own an entirety of a WAN because a WAN is decentralized…

    • 725 Words
    • 3 Pages
    Good Essays
  • Best Essays

    A WAN (wide area network) goes across large physical distance. Many times a WAN will go almost around most of the world! The most popular WAN is the Internet. The Internet is one big huge WAN and it is also the most used WAN. A WAN is basically a dispersed collection of LAN 's. A network tool called a router connects LAN 's to a WAN.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Constant stream of multimedia traffic between offices – average file size 25MB; file transfers less than 5 seconds…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    I learned from this video that LAN (Local Area Network) is a computer network covering a small geographic area, like a home, office, school, or group of buildings. And also that WAN (Wide Area Network) is a computer network that covers a broad area (e.g., any network whose communications links cross metropolitan, regional, or national boundaries over a long distance). In addition, I learned what the difference between a work group and a domain. Domain names are used in various networking contexts and application-specific naming and addressing purposes. I also learned that in a work group all network computers are equal.…

    • 511 Words
    • 2 Pages
    Powerful Essays
  • Better Essays

    The utilization of networking hardware is used to connect different computers to a server in the case of my company it will be used to connect the different sections within our company. There are many different types of hardware to include bridges, routers, switches, and even networking cards. Our company will use routers, firewalls, and switches. With the routers and firewalls we will protected from threats to a degree by viruses, and attackers. One of the most commonly used is McAfee Antivirus which is the software that I would present to be used as security software. With the routers and firewalls, it will block any unwanted activity coming across the network. The use of the software allows the use of a security firewall that works with the internet firewall increasing our chances of not being attacked or corrupted by viruses, and hackers. It also provides anti-spyware upon the network, indicates safety of websites, and web protection detects and helps rid the network of any spyware, malware, and viruses, phishing and spam when it comes to email, and web usage. Without both networking hardware and software total security cannot exist.…

    • 939 Words
    • 3 Pages
    Better Essays
  • Better Essays

    The lower nodes can be LANs, making the whole network a WAN; tree networks are a common topology for a WAN.…

    • 1327 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    The most ideal method for diminishing dangers against a server is by part the web server from the server database and other application servers. Since the web server has a direct association with the web makes it the principle focus to obtain entrance to the network. Touchy data, similar to customer records, passwords, charge card numbers, and government disability numbers ought not be put away on the web server. Switches permit data to go forward and backward between networks. Having a switch at every area will permit information to stream between all areas. Switches inspect each bundle of data on the network and figure out where it ought to be sent and guides it there. Switches utilize a setup table to figure out where associations strive for steering information, needs for directing information to specific associations, and principles for taking care of the information. Firewalls are likewise added or joined with switches to give more security to the network and information put away. Firewalls act like a channel between a network, or a PC, and the Internet. Firewalls can be arranged to keep representatives from sending particular sorts of messages and exchanging information off the network. They can likewise be set up to wipe out access to certain sites on the Internet, for instance any informal communication locales like Facebook and Twitter. One vital occupation they perform is halting PCs outside the network from getting to PCs on the network.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Kudler Fine Foods was first founded by Kathy Kudler in La Jolla, California. It has expanded to two more locations, Del Mar, California, and Encinitas, California. The stores are generally spaced, about 8,000 sq ft, and have imported and domestic foods, including Fresh Bakery & Pastries, Fresh Produce, Fresh Meat & Seafood, Condiments & Packaged foods as well as Cheese and other dairy products. Kudler wants to see their company grow by upgrading their communications systems and making it wireless. The wireless technology upgrade will allow the company to have a better way of communicating between the stores as well as to the employees and customers .…

    • 495 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mis 589 Unit 7

    • 943 Words
    • 4 Pages

    Local area networks (LANs) consist of microcomputers located in a same general area. LANs usually share circuits where computers take turns using the same circuit. In a metropolitan area networks (MANs), a network usually covers a citywide area. Wide area networks (WANs) span a large geographical area. WANs span a larger area than MANs. Backbone networks (BNs) interconnect all networks on a single site. BNs is a large network which many networks within an organization are connected.…

    • 943 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1210 Network Essay

    • 618 Words
    • 3 Pages

    A LAN or local area network is a group of computers all located in the same area that are usually connected via some means. (Wireless or wired).…

    • 618 Words
    • 3 Pages
    Good Essays
  • Good Essays

    For the Patton-Fuller hospital to become the best hospital in the area, key issues must be addressed. Securing the network from all possible electronic threats is one of the main issues that must be addressed. Referring back to HIPPA, this states that the facility must, “protect the privacy of individually identifiable health information (HIPPA).” Circumventing potential issues, and aiding with the tools necessary for the hospital to continue providing exceptional patient care and continuing to operate sound. If the facility does this, then we can expect much success from Patton-Fuller.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    MIS 320 Midterm

    • 3629 Words
    • 12 Pages

    A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Firewalls prevent unauthorized users from accessing internal networks. They protect internal systems by monitoring packets for the wrong source or destination, or by offering a proxy server with no access to the internal documents and systems, or by restricting the types of messages that get through, for example, e-mail. Intrusion detection systems monitor the most vulnerable points or “hot spots” in a network to detect and deter unauthorized intruders. These systems often also monitor events as they happen to look for security attacks in progress. Sometimes they can be programmed to shut down a particularly sensitive part of a network if it receives unauthorized traffic.…

    • 3629 Words
    • 12 Pages
    Good Essays
  • Good Essays

    To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Network Design APA Paper

    • 1898 Words
    • 9 Pages

    Designing and implementing a proper network design is an essential and yet critical step in building a reliable, top notch, network infrastructure. Developing the proper infrastructure can ensure performance at a level needed for growth and for stability all the while providing crucial time savings by minimizing the administrative workload. When designing a network you really want to implement scalability and future growth while ensuring minimal downtime and disruptions. Implementing scalability will ensure the network can grow with the organization. The network design I have implemented for UMUC which is depicted below provides scalability, security, and longevity.…

    • 1898 Words
    • 9 Pages
    Better Essays