Monday, June 10, 2019
Design and security of a small businness network - case study Essay
Design and security of a sm on the whole businness web - fictional character study - Essay ExampleThe network layout of I.T soft requires an set offable and efficient network that will fulfill the requirements of the company. Advanced security features are also call for in order to protect the VoIP traffic and preserve network availability. Project Scope and Objectives As I.T soft has decided to implement a new network. The network will use the latest technology in terms of both hardware and software, thus far cost considerations cannot be ignored as the company is an SME . The carrying into action of software technology includes the new innovative network that will supporting the following Centralized Database retrieve for sales/customer databases Email Internet access Company Website and Intranet VOIP They intend to run a local anesthetic DNS server probably on their main domain server. They wish to support a location for all users to store any company data Accounts and pa yroll data should only be available to the relevant faculty. The customer database should be accessible to all staff, however they often have visitors to site who require network access, but the company are concerned about the integrity of their databases. Implementing a wireless environment to provide access to visitors They also require a training room, with networking and access to the internet. protect the integrity of their email and VOIP systems They need to provide access to internal data to staff working off-site. Requirement for tools and Suggestions in order to optimize network proceeding Requirements for monitoring the provision of their core services such as the availability and performance of their servers and VoIP system Tools to warn of any significant network changes Monitor any attacks on their systems Providing redundancy and failover Network Topology Star topology is recommended for the wired local area network. It is the most widely adopted topology. The star t opology supports the centralized provision of network resources and services. The support staff can manage the network administrative and troubleshooting tasks centrally. Star topology helps to implement centralized security architecture for improved and enhanced security of the network. The network implementation cost can be protected by provisioning the core systems located centrally. The security controls and backup systems are also located centrally for better troubleshooting and management. Example of the star topology is available in Fig 1.1. Network Cables For deploying the local network for Camden site, CAT 5 line of credit is the best option. It supports both voice and data transmission. CAT-5 is in the form of twisted pairs. This cable consists of four copper wire pairs, connecting the network node with RJ 45 connectors.CAT-5 supports up to 100 to 1000 MHz speeds in a full duplex stylus (Category 5 Cable. 2007). The Camden site will corresponds to request related to inte rnet applications, voice and video transmission, file transfer protocol and Emails. CAT 5 can support these features with ease. However, CAT 5 cable can support up to 300 feet equal to 100 meters in distance. A requirement of the switch is mandatory for every 300 feet. Routers A router is a core computing and packet processing devices in the computer network. Router connects two or more networks with different subnets, enabling the networks to expand on an enterprise level. Logically the router builds a routing table, where it stores all the route addresses. For example, the data packet
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.