Design and security of a small businness network - case study - Essay Example

Only on StudentShare

Extract of sample
Design and security of a small businness network - case study

The network layout of I.T soft requires an expandable and efficient network that will fulfill the requirements of the company. Advanced security features are also required in order to protect the VoIP traffic and preserve network availability. Project Scope and Objectives As I.T soft has decided to implement a new network. The network will use the latest technology in terms of both hardware and software, however cost considerations cannot be ignored as the company is an SME . The implementation of software technology includes the new innovative network that will support the following: Centralized Database access for sales/customer databases Email Internet access Company Website and Intranet VOIP They intend to run a local DNS server probably on their main domain server. They wish to provide a location for all users to store any company data Accounts and payroll data should only be available to the relevant staff. The customer database should be accessible to all staff, however they often have visitors to site who require network access, but the company are concerned about the integrity of their databases. Implementing a wireless environment to provide access to visitors They also require a training room, with networking and access to the internet. ...
Download paper


Introduction Internet is the fastest rising technology that has produced endless opportunities. At the same time, serving students to navigate through the dominant and greatest growing world of information is a challenge. The assimilation of computer networks is valuable for everyone…
Author : roma69

Related Essays

2002). UNIX back end server support the automatic generation of enterprise java beans facilitated the development teams to develop the J2EE application more efficiently. By the UNIX fast XML proxy support, web services are developed in no time on a distributed system as compared to the previous server architecture. IBM 32 way UNIX servers were also launched in year 2001 with the code name “Regatta”. The microprocessor architecture comprises of 1 GHz 64 Bit Power 4. This UNIX server is capable of self-healing technology and to decrease system failures. The system is capable to divide into...
7 pages (1757 words) Essay
Information Security Management ( Study Case )
Charlie must adopt some personal strategy to make top management realize the need and significance of information technology in their firm. He must explain them the benefits of adopting information security by comparing their firm with other firms. b) The most important advice to Iris: The most important advice is to make the top management understand the need for information security. From the illustration, it is understood that Random Widget Works gives the least priority to information security. Making the management understand its importance will let the management take initiatives for...
7 pages (1757 words) Essay
Network Security
2007). It is the twentieth century where improved communication technologies are inventing one after another. Internet has become a powerful and interactive delivery service providing extensive activities and web services. Organisations expand their resources with the help of Internet. Websites are created, for informational purposes, advertisement, online shopping etc. In the modernized countries, Internet is utilized for business: Education purposes Online shopping (Comet, EBay, etc) Blogs (Bloggers, Word Press, etc) Social-Networking (Facebook, Myspace, etc) Information (Advertising) Even...
24 pages (6024 words) Essay
Based on the investigation, it identifies the drawbacks in its management process and proposes changes in order to remove the same. The project also proposes revision of the aims and objectives of the organisation with the aim of improving the company’s business. Lastly, an explanation is provided on how the changes can be implemented. The entire plan for implementing the changes is provided starting from the date of initiation till the end. The mission of the restaurant is not only to serve the best tasting food, but also provide a friendly and efficient service because it considers...
6 pages (1506 words) Essay
Privacy & Security
This esssay stresses that threats and impacts including the impact on different aspects is discussed along with real world scenarios that are mentioned in terms of physical and online stealing of identities, online attacks by hackers, impacts of social networking sites if they misuse information or not provide correct security measures. Solutions and suggestions section discuss the solution of issues related to data privacy, SNS impacts and online attacks in order to steal the confidential information of employees. ...
26 pages (6526 words) Essay
Small-scale research study
They were requested to return the questionnaires to the researcher upon completion. Since there were just a few teachers who taught mathematics in KS1, they were all recruited for the study, although three were unable to participate due to unavailability and scheduling conflicts. The questions in the questionnaires were a product of the researcher’s secondary research findings and observations of KS1 classes. Responses for the survey questionnaire have been charted (see Appendix 2). The Likert-scale responses were averaged and the percentages were translated into pie charts. The qualitative...
6 pages (1506 words) Essay
Sustainable Design Case Study
The main reasons behind people moving towards urban areas are to seek employment, make shopping for purchasing goods, seek entertainment as well as attain better standard of living. Simultaneously, existing environmental infrastructures related to work as well as services are quite insufficient to serve the rise in population as well as population densities. It can be observed in this context that overcrowding leads to environmental vulnerabilities as well as degradation unless strategies related to reversing the environmental deterioration can be applied. One of the determinants of the...
8 pages (2008 words) Research Paper
Got a tricky question? Receive an answer from students like you! Try us!