Topology and network devices
ABC Accounting, Inc. offices span three floors. Currently, the company has a physical and logical star topology over Ethernet connections. The bottom …show more content…
Class B has a maximum of 65,534 available IP addresses since the company will have grow to 350 employees over the next year a Class B network fills this need the best.
A DHCP server will be set up to manage IP addresses in the network. Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers configured for a given network (What is DHCP?, n.d.). Having a server to pass out IP addresses to client PC’s can save a lot of time and effort compared to the alternative of static IP addressing. Also, devices connecting to WiFi can easily grab an IP address without employees needing to ask a network administrator for a static IP. …show more content…
Securing a network involves numerous devices and standards such as firewalls, intrusion detection methods, and various media and wireless protocols (LabSim). There are many different threats that exist. Denial of Service (DoS) attacks floods a target system with traffic in order for it to be unavailable for legitimate requests from users. A Distributed DoS (DDoS) attack uses slave computers or virtual clients to send a large amount of requests at once, crashing the target machine. A Smurf attack is a type of Distributed Reflective Denial of Service attack, which uses an attacker system, amplification network, and a target. The best way to prevent a DoS attack and its variants would be to supply more bandwidth to the network. Although this is expensive, it makes it much more difficult for an attacker to coordinate an attack large enough to buckle the network. Setting up multiple servers can also help because the entire network becomes less dependent on one machine. Spreading the workload to multiple sources can make the DDoS less impacting, and the network can easily recover by turning on a backup server. A third type of protection to use is a “scrubbing” service such as Prolexic, a third party company that verifies traffic before it reaches the target (DoS and DDoS Protection.,