Design and security of a small businness network - case study

Undergraduate
Essay
Miscellaneous
Pages 9 (2259 words)
Download 0
At the same time, serving students to navigate through the dominant and greatest growing world of information is a challenge. The assimilation of computer networks is valuable for everyone. (Ramig…

Introduction

The network layout of I.T soft requires an expandable and efficient network that will fulfill the requirements of the company. Advanced security features are also required in order to protect the VoIP traffic and preserve network availability.
As I.T soft has decided to implement a new network. The network will use the latest technology in terms of both hardware and software, however cost considerations cannot be ignored as the company is an SME . The implementation of software technology includes the new innovative network that will support the following:
Star topology is recommended for the wired local area network. It is the most widely adopted topology. The star topology supports the centralized provision of network resources and services. The support staff can manage the network administrative and troubleshooting tasks centrally. Star topology helps to implement centralized security architecture for improved and enhanced security of the network. The network implementation cost can be saved by provisioning the core systems located centrally. The security controls and backup systems are also located centrally for better troubleshooting and management. Example of the star topology is available in Fig 1.1.
For deploying the local network for Camden site, CAT 5 cable is the best option. It supports both voice and data transmission. CAT-5 is in the form of twisted pairs. This cable consists of four copper wire pairs, connecting the network node with RJ 45 connectors.CAT-5 supports up to 100 to 1000 MHz speeds in a ‘full duplex’ mode (Category 5 Cable. 2007). The Camden site will corresponds to request related to internet applications, voice and video transmission, file transfer protocol and Emails. CAT 5 can support these features with ease. However, CAT 5 cable can support up to 300 feet equal to 100 meters in distance. A requirement of the switch is mandatory for every 300 feet.
A router is a ...
Download paper
Not exactly what you need?

Related papers

Network Design
The first step would be to select the type of system. The type I would recommend is a file-server system as it is comparatively cheaper than client/server or terminal server. The data accessed by the users is stored on a single server and their own stations do not have any memory storage devices.…
Case Study - Small Business Management
Within three years (1997-2000), profits increased by 350%. OBO is Simon's third business venture and he has learnt considerably from each undertaking.…
Network Security.
But with this ease of information access comes the issue of security. With the increase of information flow, there has been an increase in the number of attacks on information by hackers. Attacks such as Denial of Service (DoS) Attacks, Spoofs, Sniffing, etc. have increased with the increase in the availability of hacking tools which are free of cost. Valuable information is lost in the process.…
Organizational Design Case Study
All new staff are first expected to know the working of the company and the various departments and divisions before settling down to his or her own work. The challenge and the central problems seems to be to examine how this no structure management system could be essentially tied with the profitability approach so that employees are able to provide their best performance and the company output…
Network Security
Likewise, the disadvantages associated with DMZ are not significant, but one issue can be highlighted, as the segregation may create a hassle for the network administration because DMZ requires frequent updates and maintenance. Moreover, the hardware cost is high and requires dedicated hardware in order to implement DMZ within the network. Deployment includes a switch, separate firewall and IDS…
Design and security of a small businness network - case study
The network layout of I.T soft requires an expandable and efficient network that will fulfill the requirements of the company. Advanced security features are also required in order to protect the VoIP traffic and preserve network availability.…
Security Incident Case Study
This paper seeks to describe how effectively an emergency incident that occurred in Los Angeles International Airport (LAX), at 2:38pm, Terminal 4, would have be managed and highlight how effective airport operators can be, when during emergencies.…