Free Essay

A Fully Functional Network Design for Shelly Fashion

In: Computers and Technology

Submitted By femiciti
Words 2953
Pages 12
NETWORKS AND TELECOMMUNICATONS

A FULLY FUNCTIONAL NETWORK DESIGN
FOR
SHELLY FASHION

PRESENTED BY:
Osazuwa Olufemi George

Business requirement
Shelly fashion is a clothing boutique that sells clothes to both male and female customers. Their goal is to be the biggest retail clothing store in the country which aims to provide customers from the ages of 5 to 45 years of age a wide variety of quality clothing.
The clothing retail store is open six days a week to customers who come in and buy their clothes directly at the store. The transaction is recorded and stored on the store’s computer with a Store Management Software which keeps track of inventory, sales, and computes the profits of the retail store biannually.
Shelly fashion is looking to expand its reach using internet technology so it would be able to meet with the growing number of customers and also to connect all its other and future branches together to form a centralized network. With the network the retail store would be able to launch its home delivery option where customers would be able to buy clothes online and have their goods brought to them at their homes without having to be physically present at store.
The business owners want to embark on a project to set up a telecommunications network which should be able to reach their business requirements. Shelly fashion’s business requirements for the proposed network are as follows: * Reduce operating cost by cutting cost too make telephone calls over telephone lines. * Generate revenue by reaching more customers via the web. * Increase client satisfaction. * Remote access * Business partner connectivity * Increase employee productivity * Better customer service

Design requirements
The design requirements for the network should be standard. The network design requirements are stated below: 1. Functionality: the working or functionality of the network is the absolute bottom line. Because the network is an integral part of enabling the organization to do their jobs effectively and efficiently, this part is essential. It is here that the use of Service Level Agreements (SLAs) is essential. 2. Scalability: As the organization grows, the network must be able to keep pace. This network and its initial design must enable it to expand accordingly. (NB: A network that cannot keep pace with the organization's needs is not much use). 3. Adaptability: The network must be capable of responding to changes. In this case, the network should have the capabilities to embrace new technologies in a timely and efficient manner. This becomes extremely important as the network ages because change within networking is racing forward at breakneck speeds. 4. Manageability: Since management is the ultimate goal to provide a “true” and “better” proactive network, the network must have the proper tools and design to ensure that the administrator is always aware of its operation and current status. 5. Cost effectiveness: Since budgets and resources can be limited in most cases, building or expanding the network while staying within the predetermined budget is always a benefit to proper network design. 6. Reliability: As the WAN is the backbone of the network, reliability is usually the most important requirement in the designing of the network. 7. Latency: Another big concern with users on the network occurs when network access requests take a long time to be granted. In this case, users should be notified about a latency problem in the network. 8. Compatibility: The network should be compatible with standards or legacy systems, since compatibility is always going to be an issue within the network throughout its life. 9. Simplicity and easy configuration: The network should be simple and easy to configure. 10. Support for remote offices and telecommuters: In today's telecommunications environment, remote satellite offices are becoming commonplace and require network connectivity, so the plan must be accordingly. The organization rapidly increases the number of telecommuters. This must be kept in mind as the placement of network components are determined to ensure that they can handle this requirement when it becomes a priority for the organization.

Network assessment
There are already existing telephone lines in the retail store that it uses to communicate with its other branches, suppliers, business partners and customers. In all branches there is a intercom system that networks all the different departments of the retail store.
We found in our assessment that Shelly fashion network lacks some of the security, reliability and performance most of today’s business demand. Based on our assessment, the current condition of your technology environment is primarily due to lack of quality IT consulting and support, and secondary due to some additional configuration changes required to establish the appropriate security and stability. We found major issues that we recommend addressing immediately. Assessment & Analysis * Lack of redundant drives in some of Shelly Fashion branches. * Norton personal anti-virus software installed on all PCs; no automatic updates enabled on 16 of the 27 PCs that the company is using in all the branches * No connectivity between the branches results in increased traffic, storage, lack of standardized file sharing and lack of unified backup strategy. * No windows operating System automatic update enabled for the workstations in the branches. * No backup configured for the transaction that are going on on every branches. * No disaster recovery plan in place. No procedure in place that can be followed to restore. There is no written disaster recovery procedure in place. Components or full system functionality. In case of disaster, this can lead to longer down times and outages. * No spyware removal solution in use * Found network shares that look like they need to have restricted access. All information is currently available to all on the network. Group policies are not configured properly and share permissions are not standardized. * There are 20 PCs (mix of Dell, HP and Samsung) and 7 Laptops (Toshiba, IBM and HP) 3 all-in-one color inkjet printers approximately 2 years old. * Users have limited training concerning the windows 7 operating systems

Recommendations * Replace inkjet all-in-one printers with newer, faster laser copier/printer machines. These offer much lower per page printing costs. You will likely recoup your investment in 6-9 months and enjoy considerable savings thereafter. * Business critical servers need to have drive redundancy configured in case of drive failure. Without redundant drives, there is the a potential for large amounts of revenue loss due to the repairs, reloading of the OS, reloading of the applications and restoring the data from backups. * The current IT service partner does not seem to have the technical expertise that your business requires. This can result in unnecessary risks and unplanned downtime. * The current IT provider is extremely slow to respond to your needs. * Organizational units and group policies are not configured correctly. Reconfiguring these important settings will result in improved security, easier system management. * Routers and switches have no firmware or system update plan in place. These devices are often left without updates for a significant time, resulting in weaker security and degraded performance. These components should be reviewed and updated to the latest firmware to keep the network at optimum health and performance. * Consider establishing a full-time VPN connection between the branches for better resource integration. * Enable Norton automatic update on all the PCs Replace inkjet all-in-one printers with newer, faster laser copier/printer machines. These offer much lower per page printing costs. You will likely recoup your investment in 6-9 months and enjoy considerable savings thereafter. * Replace inkjet all-in-one printers with newer, faster laser copier/printer machines. These offer much lower per page printing costs. You will likely recoup your investment in 6-9 months and enjoy considerable savings thereafter.

We are confident that the issues we found can be addressed quickly, resulting in improved security, better system management, increased performance, and greater productivity for yours users.

Infrastructure selection
The local area network for each branch would need a star topology network that would connect to a virtual private Network (VPN) which would link all other branches together. What we also need for this network is; * Modems for every branch * Routers * Switches * Twisted pair LAN cables * File servers * 4 Workstations for each branch

Security strategy
The security methodology is designed to protect the availability, integrity, and confidentiality of data in the organization's information technology (IT) system. * Confidentiality: The system contains information that requires protection from unauthorized disclosure. Examples: Timed dissemination information (for example, crop report information), personal information, and proprietary business information. * Integrity: The system contains information that must be protected from unauthorized, unanticipated, or unintentional modification. Examples: Census information, economic indicators, or financial transactions systems. * Availability: The system contains information or provides services that must be available on a timely basis to meet mission requirements or to avoid substantial losses. Examples: Systems critical to safety, life support, and hurricane forecasting.
Our security strategy involves establishing computer security policies and contingency plans in case of a disaster; protecting data from malicious and non-malicious attacks, as well as non authorized access. Furthermore, it will prevent unauthorised users such as hackers and attackers gaining access to the system and disrupt services, render systems useless, or alter, delete, or steal information. Methods, Tools, and Techniques for circumventing security measures
(Establishing Proactive and Reactive Strategies)
The security system will be based on physical, technical and administrative controls (it includes both preventive and detective controls.).
The physical controls or measures include: * Backup of files and documents; Backup material should be stored in a secure location constructed of non-combustible materials, including two-hour-rated fire walls. * Security guards stationed at the entrances of facilities will intercept intruders and ensure that only authorized persons are allowed to enter. * Locks and keys will be used for controlling access to restricted areas. * Fire extinguishers will be conveniently located for easy access in case of fire outbreak. Also, fire and smoke detectors will be strategically located to provide early warning of a fire.
The technical controls involve: * Access control software is to control sharing of data and programs between users. It provides the ability to control access to the system by establishing that only registered users with an authorized log-on ID and password can gain access to the computer system. * Antivirus software will be installed on all microcomputers to detect, identify, isolate, and eradicate viruses. * Audit trails and violation reports will be frequently and regularly reviewed by security officers and data base managers to identify and investigate successful or unsuccessful unauthorized accesses.
Administrative controls consist of: * Security awareness training that helps users to understand the benefits of security practices; thus, preventing the most common security problem. * Security Policies and Procedures; * Network security policies (for example, e-mail and Internet policies). * Data security policies (access control and integrity controls). * Computer security management and coordination policies.

* Contingency and disaster recovery plans and tests; the disaster recovery plan is a document containing procedures for emergency response, extended backup operations, and recovery.
Testing
Tests will be carried out after the reactive and proactive security strategies have been put into place. These tests will be performed using simulation attacks on a test or lab system; subsequently, the various vulnerabilities of the security system, policies and controls will be adjusted accordingly.

Network management strategy
Network Management System
The network management system will define the strategy for managing the network; it includes things like software, equipment, security and telecommunication. Its main objective is to ensure that the network is running at its best daily to continue to expand the organisation, maintain its services and ensure the company’s success.
Our network management system for the company will consist of consistently watching routers and switches to see if they are online; as well as managing and maintaining any interface or IP address that communicates over the network; that is any device used in the organisation to make daily business transactions.
The network administrator will use SNMP application (Simple Network Management Protocol) to manage and monitor all the devices connected to the network.
Communication is of utmost importance in network management in order to know what is going on, what issues exist, and how to better maintain and manage the network for the future; the network management system will also involve the customers and employees; because they are the ones using the network every day, therefore they have more knowledge on what is going on with the system. By involving them in the management, it will be easier to get to know about any issue or problem with the network and also what potentially could be done to improve the business.
Network Management Architecture
The following diagram shows how data is managed on the network:

It is an architecture for Cisco Systems for managing data network. This architecture includes a Cisco Call Manager server to manage Voice over Internet Protocol (VoIP); and shows how the Call Manager server is integrated into the NMS topology.
The network management architecture includes the following: * Simple Network Management Protocol (SNMP) platform for fault management. * Performance monitoring platform for long term performance management and trending. * CiscoWorks2000 server for configuration management, syslog collection, and hardware and software inventory management

Network Management * Fault Management: A management system alerts the end user when a fault is reported and corrective actions can be taken. The goal of the fault management is to detect, isolate, log, notify users, and correct faults encountered in the network in order to keep it running effectively. To do so, traps should be enabled consistently on network devices and a RMON alarm and event will be implemented for fault monitoring. * Configuration Management: It includes configuration aspects of network devices such as configuration file management, inventory management, and software management. The goal is to monitor the network and system configuration information so that the effects on network operation of various versions of hardware and software elements can be tracked and managed. * Performance Management: it monitors and measures various aspects of performance using the SNMP so that overall performance can be maintained at an acceptable level. The performance management solution that we will use is InfoVista; to monitor performance and assure IP based network, services and applications. * Security Management: it provides access to network devices and corporate resources to authorized individuals only. * Accounting Management: Usage information of network resources.
Proof of concept
The following is a list of tests that have been conducted to prove our network design: * Ping Equipment and severs: Printers and other devices on the network have been pinged to see if they communicate with each other and tests show it is successful. * Routing and Switching * Security testing * Availability testing * Application load testing
The above tests have been conducted on the network design and all test meet with our desired expectations. This provides a proof that the proposed network design concept can achieve the objectives that it was designed to achieve.
Design proposal/ review

The topology used is the star topology
Our network architecture is a set of several interconnected computer equipment. Each device is connected to the network through a physical medium (FTP Category 6 cable).
The equipment used in our network architecture are:
- Router Cisco 1800 (playing the role of gateway)
- Router Cisco ASA 5510 (playing the role of Firewall)
- Cisco Linksys Switch (Allows you to connect computer equipment)
- Modem Sagem (Allows connection to our network to the Internet)
So we have a network of dimension four (4) sub-networks.
- Administration
- Mail Service
- Accountung
- Data center
These four (4) sub-networks are connected through a switch cisco Linkys 16 ports each, which implies that we have four (4) cisco Linkys switch in our network architecture.
We also note the presence of two physical servers running on HP-branded Windows operating server 2008 standard and playing roles following system:
Windows Server 2008
- Active directory server (for authentication of network users)
- DNS server (for resolving host names and network equipment)
- DHCP server (remote IP address of the computer network)
Windows Server 2008
- Mail server (for sending and receiving email)
The client computers are mostly HP brand computers; and they are running the Windows Seven OS.
The information system of our system is based on a computer network that facilitates the management and smooth running of activities from within the company.
The information system of our network infrastructure relies on a network consisting of a set of computer equipment federated TCP / IP (Transport Control Protocol / Internet Protocol) mode routed using CISCO routers and switches.
Thus, a Cisco ASA 5510 located in server room acts as a Firewall. The category 6 FTP cable connects the router to the gateway (Router Cisco 1800) to which is attached the switch (Cisco Linksys); meanwhile allowing the interconnection of different servers and computer network equipment. A modem connected to the router Sagem Firewall allows the entire network to be connected to the Internet.
Implementation
For the implementation plan, an initial network test will occur. This will be done during off-hours to minimize possible problems; however, the final test will be done during normal business hours to completely evaluate the network performance. The following items below will be completely under evaluation:
- Verify if the design meets key business and technical goals
- Validate LAN and WAN technology and device selections
- Verify the service provider provides the agreed-upon service
- Identify any bottlenecks or connectivity problems
- Test the redundancy of the network.
- Analyze the effects on performance during network link failures.
- Determine the optimization techniques to meet performance and other technical goals.
- Analyze the effects on performance while the network links or devices is under construction
- Identify any risks that can impede implementation and determine the plans for contingencies. Furthermore, we will provide a follow-up after implementation. We will follow up every day until all issues have been resolved and the design has been fully completed.…...

Similar Documents

Premium Essay

Network Design

...April 4th 2011 ACME Network Design Anthony G, Buddy W, Anthony P, & Ryan O University of Phoenix Mike Kanfer Introduction As a network consultant hired by Acme Manufacturing, the company has asked Team A to develop a new networking design for Acme’s expanding business. The description below describes the key steps involved in developing a WAN for Acme Manufacturing. The company has six different buildings in six different locations throughout the world that needs to be networked collectively.   All the remote locations need to communicate effectively with the main headquarters that is in Atlanta, Georgia. The two buildings that house the headquarters are located across from each other. One building is used solely for corporate operations whereas the other building is for staffing the sales and engineering department. PBX vs VOIP PBX (Private Branch Exchange) is a system that has been around for a while. This allows users to communicate to other users in an office, even without an outside line connected. In a normal environment, the user would have to dial a specific number (or code) to access an outside line. In this way an end user could dial a number that would stay internally. A PBX also allows the users to share the lines that are accessible to the company. If a customer were to call the company on the main line, the receptionist could transfer that call to the salesperson. PBX systems also allow for many other features such as: Voice mail, Caller ID,......

Words: 2572 - Pages: 11

Free Essay

Network Design

...EDUCATION NETWORK DESIGN PROPOSAL TABLE OF CONTENTS | I. FEASIBILITY STUDY | II. NETWORK NEEDS ANAYLSIS | III. HIGH-LEVEL NETWORK DESIGN | IV. DETAILED DESIGN DOCUMENTATION | V. COST-BENEFIT ANALYSIS | ------------------------------------------------- FEASIBILITY STUDY Situation in which the Project Exists: This proposal is for a data communication network to serve the Maryland public education system. The Maryland legislature recently approved funding sufficient to pay for the development of this proposal. Pending proposal acceptance by the Maryland State Public Education Office of Technology (a department within the state Office of Education), funding will be sought to implement the proposal. Network Scope: The proposed network is designed to serve the state Office of Education and two of its school district offices. The state office, located in Kenzington, contains five departments to be served by this network. Each district office contains four departments to be served. The North School District is located in Ricksville, 25 miles from the state office. The South School District is located in Albanton, about 40 miles from the state office. Note that this network does not serve instructional needs of students; other resources have been allocated for that purpose. This network is for administrative purposes and is specifically designed to be independent of student computing facilities. Objectives of the Network. The network is......

Words: 5102 - Pages: 21

Premium Essay

Network Design

...Network Design Project Cecil Ruis NTC/362 August 6, 2013 Ron Inmon Kudler Fine Foods (KFF) is a small specialized company that deals in fine foods, wines and other related items for the discerning customer. Presently the company uses a dedicated T3 line to connect their La Jolla, Del Mar and Encinitas stores together with La Jolla being the site for the central server. The company incorporates a Bus Topology for a three locations. Bus networks use a common backbone to connect all devices. This is done with a single cable (backbone) that functions as a common communication link that all devices either tap into or attach to individually. Below is an example of a Bus Topology. Ethernet bus topology is considered the easiest to install and maintain because of its simplicity. Kudler uses a 100Base ThickNet cable for its backbone. The Bus Topology is very effective when connecting fewer than 15 components at a time. This is an ideal set-up for the company because all three locations have less than 15 connections per site. Each location has the same configurations which consist of six computers, one Point of Sales (POS) server, POS terminals, blade server (for all communications, e-mail, storage and Web), one printer, six Voice Over Internet Protocol (VOIP) phones and an APC Smart Uninterrupted Power Supply (UPS). The biggest downside to this system is that if anything happens to the backbone cable the entire system goes down. The plan for Kudler is to incorporate a...

Words: 3569 - Pages: 15

Free Essay

Fashion Design

...paper is over the career of Fashion Design. I chose this topic, because I have always had a desire to one day have my own clothing line and see other people support me by wearing my creations. Also because I like to mix different articles of clothing and create my own unique style to go out and express to the world. This paper will highlight the details about a fashion designer, like what type of education you need, skills required, the work environment, and their salaries. Fashion Design is a career where people express and use their creative ideas to create the best clothing on the market. For many of years the practice of changing the style of clothing has become common around the world. Fashion Designing has been around for many years “People wore garments to help them maintain body temperatures, dress design became a profession around the 1600’s” (“Fashion Designers”). The clothing business really started to escalate when the sewing machine was founded back in the day, designing clothes hasn’t been the same ever since. Education is not heavily looked upon in the field of Fashion Design. One article claims that “You can be successful without going to high school.” (Vogt. Peter). A student who does attend high school should take courses that express creativity like drawing, art, or even computer aided design. This would benefit them and give designers a head start. After graduating students, should attend a good 2-4 year school for fashion design, because companies......

Words: 989 - Pages: 4

Free Essay

Network Design

... Running head:PROJECT #3 Unit #3 Individual Project - Network Design For Champions, Inc. Travis Lee Thompson ITCO103-1201A-05 American International University Table Of Contents Network Architecture/Model ........................................................................................ Page 3 Star Network Topology (before the donation) .............................................................. Page 5 Star Network Topology (after the donation) ................................................................. Page 6 Advantages of the Star Network Design ....................................................................... Page 7 Disadvantages of the Star Network Design ................................................................... Page 8 Is an NOS needed? ......................................................................................................... Page 9 References ....................................................................................................................... Page 10 1. Network Architecture/Model The definition of "network architecture" is as follows: "Network architecture refers to the layout of the network, consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as wired or wireless." The existing hardware is currently 7 computers in which each computer consists of: Pentium 4 at 3.0 GHz; 100-GB IDE hard drive; 512 MB of memory, floppy......

Words: 1150 - Pages: 5

Premium Essay

Web-Site Functional Design

...Functional Design for a Web-site Submitted: June 16, 2010 Functional Design Overview Company Information Care4Kids Medical is a new non-profit healthcare institution offering international best practice pediatric services to the population of Mangrove Island(fictitious), with a goal of providing state of the art compassionate health care for a population ranging from newborns to young adults. The physicians and staff strive to maintain a personal and individual relationship with all patients and their families. This approach will not only to direct patient care but also to the equally important role of patient and parental education. The organization firmly believes in anticipatory guidance and hope that by offering advice on such subjects as nutrition, developmental issues including speech and language, immunizations, safety, and appropriate antibiotic use, they can provide a foundation that will enable families to feel confident and comfortable with regards to maintaining good health practices. In order to meet these goals, the physicians and staff will be deeply involved with continuing medical education, and it will be achieved by staying abreast of new diagnostic and therapeutic information, that will enable the team at Care4Kids to maintain a level of excellence. Goal of the Site – Strategic Analysis Primary Use The site is intended to be multi-purposed, firstly to be an information center for external users, such as patients and their......

Words: 2133 - Pages: 9

Premium Essay

Network Design

...Microsoft account Joseph Jackson  Westwood College Designing a Network Microsoft account Joseph Jackson  Westwood College Designing a Network Determining the networking requirements the designing of a network can be a difficult situation. Whether its data transfer rules that determine the number of channels needed and the priorities to be used. An alternate real issue is the most extreme size of data that can be sent and received leads to the need for segmentation at the sending end and reassembly at the receiving end. Networking design must reflect the objectives, attributes, and approaches of the associations in which they work. A decently planned network can help adjust these targets. At the point when legitimately executed, the network base can improve application accessibility and permit the savvy utilization of existing network assets. The primary step is to comprehend your networking necessities. (Cisco Systems, Inc.) There are two essential objectives when setting up a networking design and having the capacity to execute the design into a live environment. The principal objective is to have application accessibility. The system conveys application information between machines. On the off chance that the applications are not accessible to system clients, the system is not doing its occupying. Which can make trouble managing getting to applications over the system. The second of the essential objectives is the Cost of possession. The Information system (IS)......

Words: 874 - Pages: 4

Free Essay

Network Design

...Computer Dynamics is a microcomputer software development company that has a 300-computer network. The company is located in three adjacent five-story buildings in an office park, with about 100 computers in each building. Each building is approximately 90 feet long by 50 feet wide. They are set about 100 feet apart. The current network is poorly design for its current needs and must be completely replaced. Describe the network you would recommend and how it would be configured with the goal of building a new network that will support the company’s needs for the next 3 years with few additional investments. Figure 11.16 provides a list of equipment and costs you can use to build your network. You will need to make some assumptions, so be sure to document your assumptions and explain why you have designed the network in this way. We need 5 switches has 24 ports each in each floor to create the access layer of the network and also we need 100 Cat 5 cables in each floor to connect the computer to the switches. All the switches in the four floors are connected to core layer 3 switch using fiber optic cable to handle this huge number of connection. creating Vlans on each access layer switches to give privileges to each group of users can reduce the process in the core switches. then we can create a link between the core switch and the router. The router have T3 wan interface and connection with ISP pop to provide 44.370 Mbps can be pretty good for 300 users activities....

Words: 268 - Pages: 2

Premium Essay

Network Design

...Pam Marshall Christopher Montgomery ITT Technical Institute Network Systems Administration Capstone Project Ryan Rucker May 17, 2015 Part 1 - Structure of WAN In this design of a high level network for ABC Company we will provide a basic written infrastructure of both the local and wide area networks we are to build for them, being such an early stage this document is subject to change. This design includes the infrastructure for the corporate headquarters located in San Francisco, as well as the other design centers in Detroit, Paris, Tokyo, and Sao Paulo. We then follow up by explaining the infrastructure of the sales offices, which may not require as high grade of equipment as the design centers depending on its requirements. Finishing with the overview of the entire wide area network, connecting each site to the corporate headquarters which is where we will begin our design. The corporate office being the main headquarters will include many services such as file, print, email, directory, and application. These services will be separated onto at least two different servers due to the constant strain we may see from directory and email services. If necessary we will implement an application server as well to run any in-house programs the company may be familiar with. We also suggest the use of a database server dedicated to storing and providing access to its information throughout the network, which would also need to maintain a backup located nearby or......

Words: 5812 - Pages: 24

Premium Essay

Gsm Network Coverage Functional

...A Study on GSM Network Coverage Functional Operation & Planning Analysis of Banglalink ETE 498 Internship Report Submitted By Md. Akhter Uz Zaman ID: 1020086045 Supervised by Zasim U Mozumder Senior Lecturer, ECE, NSU Department of Electrical and Computer Engineering North South University Fall 2014 DECLARATION I have done my undergraduate Internship on “A Study on GSM Network Coverage Functional Operation & Planning Analysis of Banglalink” in my ETE 498 course. I believe people will get an overall idea of how this division works. I have covered here the rectification and maintenance of telecom equipments and network management center’s work operations. I learned a lot, experienced new stuffs. I have not submitted the matter embodied in this dissertation for the award of any other degree. None of the element, partly or fully, of this has been submitted elsewhere for the award of any Degree or Diploma. Any material reproduced in this paper has been properly acknowledged. Approval It is certified that Md. Akhter Uz Zaman, a student of Department of Electrical & Computer Engineering, North South University, have submitted the project titled “A Study on GSM Network Coverage Functional Operation & Planning Analysis of Banglalink”. It is a partial step upon his completion of the requirements for the award of the degree of Bachelor of Science Degree in Electronic and Telecommunication Engineering. He has approached a......

Words: 8200 - Pages: 33

Premium Essay

Network Design

...Network Design Student Name Course 2 July 2014 Professor Identify hardware and software needed to secure your choice of networks against all electronic threats. A network that helps a workstation to connect with each other is called a Networking hardware. If a company uses both routers and firewall, the company is assured protection of both wireless and cabled networks that are used in the company. Network hardware is suitable in any organization in the keeping of the organizations network safe. In the software part I will choose to use McAfee Anti-virus security software. This software in conjunction with firewall is a sure way of protecting a company. Routers when used along with hardware are the best security hardware needed if the company needs to increase the security of their network to a level where none of the intruders can be able to access it (Radu, 2002). The function of the firewall in an organization is to ensure that all unwanted activities are blocked including hackers that can retrieve important and delicate information of the company. Hacking will be a very dangerous exercise where criminal can access the important information that a company has and use this information in blackmailing the company and its customers. Networking software’s also plays a major role in securing an organizations network security. The software has the capabilities of detecting viruses that may attack an organization and make an organization loose its critical...

Words: 1080 - Pages: 5

Premium Essay

Network Design

...College Prepared by: Student Name I. Physical Network Design Network Topology Business Needs UOE is an institution that it is growing globally and diversifies its spears of academic excellence and markets itself. For the institution to achieve its goals and mission, use of computer systems and internet facilities installation should be prioritized. Today the world has become a global village and thus the need to put the infrastructure in place is essential. The institution looked at the need and considered it to be the priority. The organizations’ network has different users each with different privileges. The users are the administration, the staff and the students. My aim is to come up with an efficient, modular, resilient, structured and manageable network upon implementation with good structural and engineering principles. To meet the requirements of the organization, I propose a hierarchical network design needs to be implemented. This is because this design allows the use of the other topologies at different levels, growth and robustness. Hierarchical network design A hierarchical network is also called network backbone. The hierarchical system is divided into three tiers, namely core, distribution and access level, with the privileges reducing downwards. This design is most appropriate for the organization since it allows for network administrators to optimize and specify the correct hardware and software for the entire network that is changing from one level to......

Words: 2532 - Pages: 11

Free Essay

Fashion Design

... Fashion and Its Multi-Cultural Facets Critical Issues Series Editors Dr Robert Fisher Lisa Howard Dr Ken Monteith Advisory Board Karl Spracklen Katarzyna Bronk Jo Chipperfield Ann-Marie Cook Peter Mario Kreuter S Ram Vemuri Simon Bacon Stephen Morris John Parry Ana Borlescu Peter Twohig Kenneth Wilson John Hochheimer A Critical Issues research and publications project. http://www.inter-disciplinary.net/critical-issues/ The Ethos Hub ‘Fashion’ 2014 Fashion and Its Multi-Cultural Facets Edited by Patricia Hunt-Hurst and Sabrina Ramsamy-Iranah Inter-Disciplinary Press Oxford, United Kingdom © Inter-Disciplinary Press 2014 http://www.inter-disciplinary.net/publishing/id-press/ The Inter-Disciplinary Press is part of Inter-Disciplinary.Net – a global network for research and publishing. The Inter-Disciplinary Press aims to promote and encourage the kind of work which is collaborative, innovative, imaginative, and which provides an exemplar for inter-disciplinary and multi-disciplinary publishing. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means without the prior permission of Inter-Disciplinary Press. Inter-Disciplinary Press, Priory House, 149B Wroslyn Road, Freeland, Oxfordshire. OX29 8HR, United Kingdom. +44 (0)1993 882087 ISBN: 978-1-84888-309-3 First published in the United Kingdom in eBook format in 2014. First......

Words: 6573 - Pages: 27

Free Essay

Network Design

...Network Design Project Intruction Kudler Fine Foods is making steps to inhanse the existing network, including wireless technology. These changes are being provided to improve the comuunication links between the stores and all employees. We will be implementing new technologies to automate inventory managment by creating orders of products from the transactions at the POS. The VOIP phones will be repalced with wireless VOIP phones and will allow for the employees to take calls as they provide servieces for their costumers. The improvements in network security will provide real time monitoring. Timeline The redesign of the Kudler Fine Foods will be an extreme undertaking. We will need three months to fully reconfigure the network. Since each store will have to have new cable and equipment run throughout, the downtime for each location will be minimul. In the network closet the new router will be installed, along with the two new switches. The Cat 6 Ethernet has to be run from this closet to each access point. The two servers will need to be backed up and the data will be uploaded to the new servers. A wireless access point will be added to the network and the printers and VOIP phones will be configured. While the store is closed, all the user devices will be connected to the new ports and the network will be connected to the inetnet. Design Approach and Rationale My approach to the design of this network starts with security and usablilty. The network most be fast,......

Words: 1077 - Pages: 5

Premium Essay

Network Design

...Network Design Your name Your class Your teacher Date Network Design In business the main key to success is communication with others and to do ones job effectively. Up until around 1990 this communication would have been conducted through postal service or telephone services that offered only voice or fax. Today however thanks to the advancements in technology companies can use networks to communicate more timely. Network design is the process of planning and deploying a computer network for a company. A Computer Network defined in its simplest form is “a network consists of two or more connected computers” (Laudon & Laudon, 2009). Networks are a requirement for companies to succeed in business through the interlacing of the corporate network infrastructure. When one is designing a network for use by a company they must consider what that company is trying to achieve. To what extent do communication capabilities need to be utilized. It must be determined whether it is just voice communication or email and voice communication or data communication. Furthermore, does the local network need access to a larger network such as the internet? Is there a need for an intranet? There are many options that must be analyzed for a firm to manage their business in the most effective manner without exceeding their needs. For example, if the needs are exceeded the cost of running the network may outweigh the benefits of the networks capabilities. This is the...

Words: 724 - Pages: 3