Data communications and Network Fundamental

Masters
Assignment
Technology
Pages 4 (1004 words)
Download 0
Now Brilliant Boats has a Windows 2000/3 LAN and has recently installed an intranet. The intranet is fire-wall protected to ensure that competitors can not gain access to its confidential designs. Access to the intranet, via a web browser varies depending on employee jobs…

Introduction

The existing situation in the company's network infrastructure does not allow achieving best performance and security that are necessary at current stage of its development.
Virtual Private Network technology should be used in Brilliant Boats network infrastructure to solve a number of issues, such as remote access over the Internet, connecting computers over an intranet and connecting networks over the Internet.
VPNs provide remote access to Brilliant Boats' resources over the public Internet to most important clients, while maintaining privacy of information. Rather than making a long distance (or 1-800) call to Brilliant Boats or outsourced network access server (NAS), the client may dial a local ISP. Using the connection to the local ISP, the VPN client creates a VPN connection between the remote access computer and the Brilliant Boats' VPN server across the Internet.
VPNs allow the sales department's LAN to be physically connected to the Brilliant Boats' intranet but separated by a VPN server. The VPN server is not acting as a router between the Brilliant Boats' intranet and the sales department LAN. A router would connect the two networks, allowing everyone access to the sensitive LAN. ...
Download paper
Not exactly what you need?

Related papers

Network Management
There does not appear to be a comprehensive IT strategy in place with emphasis on driving the business forward and creating a positive impact on the bottom line. This is reflected in the current network architecture, which is somewhat piecemeal reflecting a 'fire-fighting' approach in its design.…
Network Localization
As such, modern information technology has been considered the result of a crucial connection between digital and communication technologies. It has been declared as the fundamental core of an information system, which involves various interactions between data, the users, software, hardware, business corporations and their environment.…
Computer Network Security Methods
The boom in information technology has revolutionized communications world wide. The exponential growth of the most popular public network, Internet, has made inter-communication fast and effective. The amount of data flow through e-mails, e-commerce etc has gained new peaks and is still growing. Business transactions on corporate networks, corporate data access facilities for mobile employees,…
Data communications and Network Fundamental
The existing situation in the company's network infrastructure does not allow achieving best performance and security that are necessary at current stage of its development.…
Data and Network Security
As far as the location of the company's office is concerned, 'enterprise Training solutions' offices are located in 4 adjacent rooms situated on the ground floor of a 4 storied building. In addition, the company also maintains a single office room in the first floor of the building. Under the existing situation, anyone is allowed access up to the reception area through a shared entrance. This…
Neural Network
In general a biological neural network is composed of a group or groups of chemically connected or functionally associated neurons. A single neuron may be connected to many other neurons and the total number of neurons and connections in a network may be extensive. These connections are called synapses, are usually formed from axons to dendrites, though dendrodendritic microcircuits and other…
Network Infrastructure
The Internet access is limited to a shared ISDN line in each of the headquarters and a dial-up access in the point of sales, the web presence and e-mail support are outsourced to Yahoo Small Business Services. All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company's data. The both…