Any defect at any level may hinder the operation of the network. Ranging from infrastructure to switches, each component plays its role in the smooth operation of the network. Any threat to the network must be dealt on priority purpose and must be rectified for the smooth operations of the network. When looking at the physical infrastructure of the organization is based upon the building, accommodation and style of the building as well. Other things to look at are the electrical wiring, ducting, computer cabling, patching and tagging are the important elements in computer networking. We also have to look into the detail of each of the physical components required to lay network in any organization. To start with, company first has to hire a good network engineer. He or she will also guide them, which building to be hired for networking purposes or how to change the current laid network (if any). If and when the company is already having a network, then the network admin will first have to understand the network and then if required change …show more content…
They try to have their data as secure as possible, meaning they will go to any extent to have an internal security system and use different authentication levels for all users. The two threats that can be faced by any organization are hacking of the network, and erasing the data from the systems. The layer two of the OSI model is known as a data link layer which is used to manipulate data within the organizations computer system. Switches are being used to cater to the security threats in this data link layer.
Different kind of security shield is a primary function that is required for securing any network from outside intrusion. Firewall plays a crucial role. Networks today use packets of data to be sent from one place to another. It can be software o a hardware that is being used to cater the flow of traffic over the network and sometimes stop them from entering the network but it is also important to know whom to stop at the network and wom to reject from the network. Personal computers normally come with a software based firewall that has been provided by the operating systems they are