WAN And LAN Network Analysis

Superior Essays
There are a few final considerations to examine for the setup of the WAN and LAN networks that will be running through all Kudler locations. Here we will discuss the software and hardware needed for security and functionality of the network at each location.
Firewalls
Any connection to the internet has some risk of attack from external sources, which means our proposed setup introduces this risk at each Kudler location. To mitigate this risk, we can use a combination of software and hardware firewalls to protect the Kudler network.
Hardware firewalls “provide a first line of defense against common forms of attack coming from the outside world.” (Pacchiano, 2011) They do this by monitoring all traffic, and rejecting traffic that comes from
…show more content…
The power of the router is that it can “determine the next network point to which a packet should be forwarded toward its destination.” (Rhodes, 2006) This kind of decision-making ability for where to send packets is what allows computers on a LAN to communicate with each other and with the internet or company intranet.
These routers are often multi-function devices, and can serve as gateways and hardware firewalls in addition to the routing. Therefore the best practice would be to invest in routers that can fill all of these roles.
Switches are devices without a lot of software built in, that are primarily used to expand the number of Ethernet ports available on a company network. Switches merely route data down paths pre-assigned by the router for incoming data, or simply forward data to the router when it comes to data leaving computers headed outward. While many home networks have routers filling some of this role as well, in a business environment it is fine to have a router that only has a single inward facing Ethernet cable, which goes to a switch, that allows for more Ethernet cables to be sent onward to company computers, and in this case, point of sale

Related Documents

  • Decent Essays

    TWC will provide primary service and AT&T will provide backup service if TWC service is down, the routers are configured to automatically switch between the connections when down, to reduce the amount of time the IT staff must deal with this. TWC will connect to Cisco switch #3 in the network drawing and AT&T will connect to Cisco switch # 1. The internet modems will have a connection point to both Cisco switches in the network. At the West and East branch, a new network fiber Internet VPN link will give access to the main branch office as the backup connection in case of unplanned outages or regular maintenance performed on network equipment, to ensure the network is always up as the bank management requires. It will only be active if the main WAN connection goes offline or experience connectivity issues to reduce the financial cost of adding the network link to the branch offices.…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    IPsec is often installed on today's IPv4 networks to protect communication over VPN networks. It is used to access VPN, as well as between VPNs. IPv6 transition mechanisms can use this kind of infrastructure to achieve a certain level of protection, even in the absence of IPv6 IPsec. Remote IPv4 hosts access private networks by establishing encrypted VPN access to a gateway device set up for this purpose. If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Figure 3 demonstrates the 3 layers that make up the SDN structure. Lowest layer represents the Infrastructure Layer or Forwarding Plane, mainly focusing on data forwarding but it also takes care of monitoring local information and gathering statistics. Next layer represents the Control Layer or Control Plane which is responsible for programming and managing the Forwarding Plane. Control Plane makes use of the information gathered by the Forwarding Plane in order to define the route and operation of the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    So you have an old Dell PowerEdge 2900 Server laying around with a few hard drives and your thinking I would really like to use this equipment as a NAS drive. It could happen, in our case it did. There were some stumbling blocks on the way though. Here is how we got through them… The goals we wanted to accomplish were creating a RAID5 array of 8 (7+1 Hot Spare) 1TB hard drives and then wanted to connect this FreeNas volume through and iSCSI channel to a file server that will present the NAS as a shared folder all of our servers could use. We quickly found that using the factory PERC (PowerEdge RAID Controller) to create a RAID 5 Array was not going to work.…

    • 608 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    NT1330 Unit 1 Lab Report

    • 1743 Words
    • 7 Pages

    1. Goal The main purpose of this lab is to introduce us to the RLES vCloud system, begin setting up a network with a router VM and a main Redhat VM, and configure some baseline features for the continuation of our work in future labs. This included configuring DNS forwarding and NTP on the PFSense router VM, and configuring a wiki on the redhat VM alongside monitoring software such as Zabbix or Opsview. When configuring the router, all was fairly straightforward and without any major setbacks. The web panel was very helpful in configuring the various NAT, DNS, and NTP settings.…

    • 1743 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range. Network…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Term Paper

    • 510 Words
    • 3 Pages

    The router takes information from the modem and moves it to the computer. You don’t need to have a router but they are very useful as they allow you to take data from multiple networks and then send that data to multiple computers therefore allowing more than one person to use the internet at the same time using the same connection. Web server: A web server is a computer that stores all the information needed to display a website. This will include things such as images, files, scripts and pages that make up the website. Once there is an access to the site the browser will get the data from the web server.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    This also helps to detect strange traffic running across the servers 3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access. 4. Secure the Network: Access level assignments…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1380 Words
    • 6 Pages

    The router allows you to have internet access to go on the internet by going through ISP. When a site is searched on the internet the message is sent to the system and sent back to display the web page. You can connect more than one computer device to the router but too many devices will slow down the network. The router should know where it came from to be positive to send the right thing back to the original computer.…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Router to router 4. Pc to pc. Wi-Fi Technology This was used to connect the electronic devices used in the network using the 2.4-gigahertz.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Big E Banking Case Study

    • 1574 Words
    • 7 Pages

    This report investigates three mini cases as provided by the brief (insert book title), these include Big E. Bank, Global consultants and Atlas advertising. The first mini case Big E. Banking (BEB) discusses the problems with connecting networks together over a wide area, all using different protocols to communicate. The second mini case addresses the problems with software acquisition including the methods used to communicate across different software products. The third mini case investigates the types of networks and network protocols used by the fictitious company Atlas Advertising. Each mini case will addresses the problems stated above including a set of pro 's and con 's of any alternatives.…

    • 1574 Words
    • 7 Pages
    Great Essays