StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Week 7 Group - Assignment Example

Cite this document
Summary
These functions should, however, take place taking into consideration the security and accessibility aspects of the network. The design should be guided by the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
Week 7 Group
Read Text Preview

Extract of sample "Week 7 Group"

Week 7 Group By Week 7 Group The network architecture and design for ABC should be flexible and efficient to provide maximum service to the users. These functions should, however, take place taking into consideration the security and accessibility aspects of the network. The design should be guided by the needs of the user. Each class of users should be able to access the facilities when the need arises. In addition, user access to the systems should be influenced by their clearance levels. Security is, therefore, a highly critical component of the system.

This paper brings into perspective how the company can employ the use of internal and anonymous CVS servers, WWW servers, and an internal mail server to achieve its goals.Fig. 1: ABC Company Network LayoutThe first, and most important, activity is to classify users into categories and define their duties and rights of access. ABC users can be subdivided into two main categories; ABC staff who include developers and the ABC administration, and the general public which incorporates developers from other companies and ABC clients.

Whereas ABC employees have more access to company systems external users get restricted access to these resources. For instance, ABC developers need to have access to secured servers that will allow them to develop new software and be able to post them to less secured public servers from where other developers and software lovers can download software or its source code. A number of servers with different configurations must be employed so as to have a reliable system.An internal CVS server would be necessary to limit access to the company’s most crucial systems to its employees.

Its location shall be in a remote location that cannot be easily accessed. It shall also have a live backup system that will be use to back it up in preparation for any failure. This will ensure that there is limited disruption in case the internal CVS server fails (Newman 2010). This server is configured in such a way that it is only accessible within the company network and from recognized and authenticated proxies. In order to make this possible, the system administrator creates a readers file in the servers root.

The file defines the read and write permissions for all users and domains that can access it. It also authenticates the users and blocks any unauthorized access. The administrator can also ban some users from accessing the server even if they are company staff. The company will conduct its business using this server. It is necessary to make sure that the server cannot be configured remotely. This ensures that external hackers are kept out hence increasing its security. In addition to the internal CVS, ABC Company will be required to install a local WWW server through which its staff will access facilities such as the internal mail server.

This local WWW server will only allow users to access the intranet; there shall be no access to external networks like LANS and the Internet.An anonymous server shall also be installed to provide a platform for ABC Company to communicate with the outside world. ABC will be able to share its software and source with clients and other developers through this server. Users would not require a high level clearance like is the case in the internal CVS server (Tanenbaum, A. S., and Wetherall 2010).

Its configuration will give rights to unknown people to read, and perhaps write. It shall be accessible from anywhere and using any network that can access the internet.This design, if properly implemented, will help the company achieve its goals in the development of open source software. It will not be long before ABC Company moves from being a new, little company into a powerhouse in the development of reliable software.List of ReferencesNewman, M. (2010). Networks: An Introduction. New York: Oxford University Press.

Tanenbaum, A. S., and Wetherall, D. J. (2010). Computer Networks. 5th ed. New Jersey: Prentice Hall.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 7 Group Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1601848-week-7-group
(Week 7 Group Assignment Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/information-technology/1601848-week-7-group.
“Week 7 Group Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1601848-week-7-group.
  • Cited: 0 times

CHECK THESE SAMPLES OF Week 7 Group

Group Counseling for Abused Children

Children who have been severely neglected and/or abused can be helped to cope with their past and current experiences through the use of the small group.... Major social, behavioral, and personality characteristics of physically abused children are identified and special adjustments and modifications of the group can be described and worked out as they are identified and as they occur in the group setting. … Child abuse left untreated not only ruins the child's but also ruins the welfare of any society....
8 Pages (2000 words) Essay

Careers in Math

group X is the experimental group (the group receiving the drug), and group Y is the control group (the group that received a placebo, instead of a drug).... The pre-trial test score of group X = 3.... The pre-trial test score of group Y = 5.... 0 per gallon (This week in Petroleum 2005).... 7 per gallon (This week in Petroleum 2005)....
3 Pages (750 words) Essay

Editing PNF vs Static Stretching

Purpose: The aim of this investigation was to compare the effectiveness of static stretching and proprioceptive neuromuscular facilitation on hamstring flexibility after a six week stretching programme. Method: Volunteers were randomly assigned to either a static, PNF or control group.... The static protocol consisted of four different static stretches performed for 30 seconds, the PNF protocol consisted of a contract relax procedure with two 10 second static stretches and a 10 second isometric contraction, the control group resumed no stretching procedure....
13 Pages (3250 words) Essay

EU Ministers Fail to Reach Deal

Is based on what a particular person or group of people believes is the best and has little arms to the society.... Bloomberg Business week, 02 May 2012.... The article is on how the European Union finance ministers failed on their most recent meeting which ended on May 02, 2012 in Brussels,… The meeting was to seek consensus and agreement on the regulations of the banking institutions in line with the Basell three recommendations which seek to regulate the banks on capital adequacy, stress testing and the market liquidity risk....
1 Pages (250 words) Admission/Application Essay

Positioning Firewall between Internal and External Domains

It is here that firewalls become of utmost importance.... By definition, a firewall refers to a security device used for protecting a local network from… A firewall may take the form of hardware or software component or a combination of both.... Anita (2011, p.... 94) notes that a firewall plays a vital role in an organization since it bars computers Why do we need a firewall between external and internal domains?...
2 Pages (500 words) Essay

A Comparison between Non-smokers and Smokers

To this end, the United States accounts for approximately 433,000 deaths every year.... Furthermore, smoking has been established as a primary cause of lung cancer with 80% and 90% of deaths among… Evidently, more deaths are due to tobacco smoking than by illegal drug use, suicides, human immunodeficiency virus, murders, alcohol use, and motor vehicle injuries combined. A comparison between non-smokers and smokers reveals that smoking increases risks of strokes by 2 to 4 time; coronary heart complication by 2 to 4 times; risks of cancer in women by 13 times, risk of cancer in men by 23 times and death from chronic, lung obstructive diseases by 12 to 13 times....
9 Pages (2250 words) Assignment

Week 2 group assignment

After going through the case study and the arbitration method of settling disputes the first part of the question that why the first lease did not contained an arbitration clause, when the new one did.... According to the arbitration method, this clause can be effective and… However, the one reason that comes up on the surface is that Commercial Properties (CP) did not see the need to have an arbitration clause in their first The Legal Environment of Business – Theory to Practice The Legal Environment of BusinessQ2....
2 Pages (500 words) Essay

Domestic Violence for Female Young Adults

A matter such as threats of lack of freedom that may take place in a public or private life of a woman is also considered domestic violence against… The group is entailed of young women who are much interested to curb the menace of domestic violence against women in the society which will make each member in the group productive (Corey, 2008).... As time progresses the domestic violence forms a The awareness that is created in the group will ensure that no young female will be experience abuse that is related to domestic violence either knowingly or unknowingly....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us