Got a tricky question? Receive an answer from students like you! Try us!

Data communications and Network Fundamental - Assignment Example

Only on StudentShare
Masters
Author : dmosciski
Assignment
Technology
Pages 4 (1004 words)

Summary

Now Brilliant Boats has a Windows 2000/3 LAN and has recently installed an intranet. The intranet is fire-wall protected to ensure that competitors can not gain access to its confidential designs. Access to the intranet, via a web browser varies depending on employee jobs…

Extract of sample
Data communications and Network Fundamental

The existing situation in the company's network infrastructure does not allow achieving best performance and security that are necessary at current stage of its development.
Virtual Private Network technology should be used in Brilliant Boats network infrastructure to solve a number of issues, such as remote access over the Internet, connecting computers over an intranet and connecting networks over the Internet.
VPNs provide remote access to Brilliant Boats' resources over the public Internet to most important clients, while maintaining privacy of information. Rather than making a long distance (or 1-800) call to Brilliant Boats or outsourced network access server (NAS), the client may dial a local ISP. Using the connection to the local ISP, the VPN client creates a VPN connection between the remote access computer and the Brilliant Boats' VPN server across the Internet.
VPNs allow the sales department's LAN to be physically connected to the Brilliant Boats' intranet but separated by a VPN server. The VPN server is not acting as a router between the Brilliant Boats' intranet and the sales department LAN. A router would connect the two networks, allowing everyone access to the sensitive LAN. ...
Download paper
Not exactly what you need?

Related Essays

Network Localization
As such, modern information technology has been considered the result of a crucial connection between digital and communication technologies. It has been declared as the fundamental core of an information system, which involves various interactions between data, the users, software, hardware, business corporations and their environment.…
14 pages (3514 words)
Computer Network Security Methods
The boom in information technology has revolutionized communications world wide. The exponential growth of the most popular public network, Internet, has made inter-communication fast and effective. The amount of data flow through e-mails, e-commerce etc has gained new peaks and is still growing. Business transactions on corporate networks, corporate data access facilities for mobile employees, e-banking and many other data access and electronic facilities have become the order of the day. Almost any function of sale, purchase, transfer or sharing of data, conduct of on line university…
24 pages (6024 words)
Data and Network Security
As far as the location of the company's office is concerned, 'enterprise Training solutions' offices are located in 4 adjacent rooms situated on the ground floor of a 4 storied building. In addition, the company also maintains a single office room in the first floor of the building. Under the existing situation, anyone is allowed access up to the reception area through a shared entrance. This point signifies the fact that there are no notable security measures at least for the ground floor. The fact that a large share of 'Enterprise training solutions' offices are located on the ground floor…
7 pages (1757 words)
Neural Network
In general a biological neural network is composed of a group or groups of chemically connected or functionally associated neurons. A single neuron may be connected to many other neurons and the total number of neurons and connections in a network may be extensive. These connections are called synapses, are usually formed from axons to dendrites, though dendrodendritic microcircuits and other connections are possible. Apart from the electrical signaling, there are other forms of signaling that arise from neurotransmitter diffusion, which have an effect on electrical signaling. As such, neural…
6 pages (1506 words)
Network Infrastructure
The Internet access is limited to a shared ISDN line in each of the headquarters and a dial-up access in the point of sales, the web presence and e-mail support are outsourced to Yahoo Small Business Services. All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company's data. The both headquarters have an urge in establishing reliable and cost-effective printing solutions.…
12 pages (3012 words)