Monday, April 22, 2019

Design and security of a small businness network - case study Essay

Design and security of a small businness network - case study - Essay patternThe network layout of I.T soft requires an expandable and efficient network that will fulfill the requirements of the company. Advanced security features atomic number 18 also required in order to protect the VoIP traffic and preserve network availability. Project compass and Objectives As I.T soft has decided to implement a new network. The network will use the a la mode(p) technology in terms of both hardware and software, however cost considerations cannot be ignored as the company is an SME . The implementation of software technology includes the new innovative network that will support the undermentioned Centralized Database access for sales/customer databases Email Internet access Company Web rank and Intranet VOIP They intend to work a local DNS server probably on their main domain server. They wish to provide a location for all users to store any company data Accounts and payroll data should only be available to the relevant staff. The customer database should be accessible to all staff, however they often have visitors to site who require network access, but the company are concerned about the honor of their databases. Implementing a piano tuner environment to provide access to visitors They also require a training room, with networking and access to the internet. protect the integrity of their email and VOIP systems They need to provide access to internal data to staff working off-site. Requirement for tools and Suggestions in order to optimize network performance Requirements for monitoring the provision of their core services such as the availability and performance of their servers and VoIP system Tools to warn of any significant network changes Monitor any attacks on their systems Providing redundancy and failover Network Topology Star analysis situs is recommended for the fit outd local area network. It is the most widely adopted topology. The star topology supp orts the centralized provision of network resources and services. The support staff can apportion the network administrative and troubleshooting tasks centrally. Star topology helps to implement centralized security architecture for improved and heighten security of the network. The network implementation cost can be saved by provisioning the core systems situated centrally. The security controls and backup systems are also located centrally for better troubleshooting and management. Example of the star topology is available in Fig 1.1. Network Cables For deploying the local network for Camden site, CAT 5 crinkle is the outflank option. It supports both voice and data transmission. CAT-5 is in the form of twisted pairs. This cable consists of four copper wire pairs, connecting the network node with RJ 45 connectors.CAT-5 supports up to 100 to 1000 MHz speeds in a full duplex mode (Category 5 Cable. 2007). The Camden site will corresponds to request related to internet applicat ions, voice and mental picture transmission, file transfer protocol and Emails. CAT 5 can support these features with ease. However, CAT 5 cable can support up to 300 feet equal to 100 meters in distance. A requirement of the bruise is mandatory for every 300 feet. Routers A router is a core computing and packet processing devices in the computer network. Router connects two or more networks with different subnets, enabling the networks to expand on an enterprise level. logically the router builds a routing table, where it stores all the route addresses. For example, the data packet

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.