Case Study: ABC Accounting, Inc.

Good Essays
ABC Accounting, Inc. is a quickly growing company looking to upgrade its current network. The company has grown from 5 to 200 employees in the past year and a half. The company is expected to grow to 350 employees in one year. ABC Accounting, Inc. will add more offices in the current building, which will span three floors. To accommodate their growth ABC Accounting is seeking the necessary solution to build an affordable, expandable, and secure network. This proposal will provide a comprehensive and secure solution for the networking needs of ABC Accounting, Inc.

Topology and network devices

ABC Accounting, Inc. offices span three floors. Currently, the company has a physical and logical star topology over Ethernet connections. The bottom
…show more content…
Class B has a maximum of 65,534 available IP addresses since the company will have grow to 350 employees over the next year a Class B network fills this need the best.
A DHCP server will be set up to manage IP addresses in the network. Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers configured for a given network (What is DHCP?, n.d.). Having a server to pass out IP addresses to client PC’s can save a lot of time and effort compared to the alternative of static IP addressing. Also, devices connecting to WiFi can easily grab an IP address without employees needing to ask a network administrator for a static IP.
…show more content…
Securing a network involves numerous devices and standards such as firewalls, intrusion detection methods, and various media and wireless protocols (LabSim). There are many different threats that exist. Denial of Service (DoS) attacks floods a target system with traffic in order for it to be unavailable for legitimate requests from users. A Distributed DoS (DDoS) attack uses slave computers or virtual clients to send a large amount of requests at once, crashing the target machine. A Smurf attack is a type of Distributed Reflective Denial of Service attack, which uses an attacker system, amplification network, and a target. The best way to prevent a DoS attack and its variants would be to supply more bandwidth to the network. Although this is expensive, it makes it much more difficult for an attacker to coordinate an attack large enough to buckle the network. Setting up multiple servers can also help because the entire network becomes less dependent on one machine. Spreading the workload to multiple sources can make the DDoS less impacting, and the network can easily recover by turning on a backup server. A third type of protection to use is a “scrubbing” service such as Prolexic, a third party company that verifies traffic before it reaches the target (DoS and DDoS Protection.,

Related Documents

  • Decent Essays

    Case Study: XYZ Computers

    • 1532 Words
    • 7 Pages

    The fragments are added to their particular disks at the same time on the same unit. This permits smaller units of the entire glob of information to be analyzed off the drive in parallel, providing this kind of organization huge bandwidth. When a sector on one of the disks breaks down, withal, the accompanying sector on each other disk is left of no use because part of the information is corrupted. RAID 0 does not enforce error rectification so any error is irrecoverable. More disks in the array implies higher bandwidth, but larger risk of information…

    • 1532 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Be Well Case Study

    • 1183 Words
    • 5 Pages

    Another pro is the flexibility of being able to backup data without the hassle, the cloud system can back up data automatically so the business does not have to waste their time doing this task themselves. One con of data backup through AWS is that the business has less control over the process. While this can be convenient as it frees up time for more important tasks, it also means you are relying a 3rd party to successfully back up all of your data. Since Be Well is a new start up, utilizing AWS for data backup will be even more convenient as they do not have previous data stored in other locations. Be Well can devote more time to marketing and selling their product, knowing that AWS is responsible for making sure their data is not going…

    • 1183 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Software testing, account testing and website testing is loaded with risks. If the worst happens, such as if a program goes rogue, if a program wrecks your hardware, if your information is stolen, and so forth, it is a good idea to have a few contingency plans. Your personal contingency plan should depend on your methods and the types of software you are testing. With that in mind, here are a few elements you may wish to enter into your contingency plans. Burnable Email Addresses The first piece of advice is an easy one, as a tester and as a hardcore Internet user, you should have more than one email address.…

    • 1060 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    How To Make My PC Fast

    • 918 Words
    • 4 Pages

    You can run a disk cleanup utility and clean ups your personal computer from unwanted files and releases space in the system. You can run the disk cleanup utility by going to the hard drive, select the properties option and then click on the Disk cleanup present in the general tab. Run a disk defragment from time to time It is advisable to use solid state drives also referred to as SSD’s. These drives replace the system’s HDDs enabling the system to be more secure and fast. Another vital step that enables the PC to run fast is to run a disk defragment.…

    • 918 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    • Authentication- this domain controller is made only for routine security processes. Due to this, it can perform these processes much faster than another server that is busy running programs and processing resources. Using a domain controller makes it easier for a user to access the domain and network, and the time savings are often rather large if this is used across a big network. Resource Authentication. Aside from authenticating users, domain controllers are also used to authenticate resources.…

    • 484 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    This article discusses the development of the internet and and its role in the future of the news industry and covers trends online with news outlets and social media websites. The author’s thesis is that the growth of the internet during the first decade of the twenty-first century has been astounding because it’s connecting people at much faster speeds. The most popular properties on the web are Twitter, Facebook, and Wikipedia. Among the largest trends, the most notable trend is in video with sites such as YouTube, Vine, DailyMotion, Vimeo, and NetFlix. By 2008, on nearly a monthly basis, about 75% of users of the internet watched videos online.…

    • 1890 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Trust in online shopping is very important to build a relationship between sellers and customers. To build trust between online shops and online buyers is necessary. It is because when losing trusts it will lose customers in the future and it also will avoid many other problems with the customers. In addition, users also need to do research on the companies before do the online shopping because it has many fake website that take the payment without posting the products. Other disadvantage is diminished instant satisfaction.…

    • 792 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    The real danger of blackouts and brownouts is the unexpected computer shutdown. Operating systems are complex and they must go through a “Shutdown Sequence.” An unexpected loss of electricity can interrupt important threads, and leave your computer in an inoperable state. The biggest certain are the computer files because you’ll have to reboot the whole computer after that, losing those files. When it comes to frequent outages and surges, you lose the physical lifespan of a hard drive. Including that Solid-State Drives can also suffer catastrophic damage from sudden power cuts, issuing anywhere from data corruption to total malfunction.…

    • 2603 Words
    • 11 Pages
    Decent Essays
  • Decent Essays

    Agree, even if the router has infinite amount of memory congestion does not get controlled on the contrary it gets worse. Memory increase causes the rate of the arriving packets to be more but the outgoing packets rate decreases. Once the packets get to the front of the queue they have already time out over and over again; in addition, duplicates of these packets are forward to the next router, causing an increase of load all the way to the final destination. 2. Compare the following: • Flow Control vs. Congestion Control o Flow Control is used in Computer Networks because of its mechanism of controlling the data flow between sender and receiver.…

    • 1130 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Atlantic Computers Case

    • 1259 Words
    • 6 Pages

    Atlantic Computers should emphasize on the fact that a server with PESA on it can end the need of buying many servers to fulfil a job, this will cut their labor, electricity and software license costs and will be very cost effective in the long run. With this they should also focus on the divisibility of the product. They should try to showcase tat PESA with Tronn is a fast solution to their problems. In short, they should try to show that PESA will be a driver for low…

    • 1259 Words
    • 6 Pages
    Decent Essays