Nt1310 Unit 3 Assignment 1

Great Essays
Abstract:
With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1]
Introduction:
With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate
…show more content…
The labs are named Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; every PC lab will have the closet. Every lab will have 32 PCs: 30 students PC, 1 educator PC, and 1 server in the server room for instructional utilization. Also, there will be a Student Computer Lab that will give PC access to students to get their work done. There will be 50 PCs in this lab and a server in the storage room. To permit student’s access to library assets, the library will have 10 PCs for students and 5 PCs for library staff. At last, there are different workplaces in the building. Each of these workplaces will have one PC for staff use, except for the confirmations office, which will have five PCs. There will be two server rooms, one on the first floor and one on the second floor. The main requirements for designing the network are:
• Student-got to PCs ought to be on separate network from the staff systems. PCs for open utilization ought to be on a different system.
• There must be at least 40 Mbps Internet associations, with a reinforcement line fit for no less than 20Mbps. Link, DSL, or FIOS ought to be utilized for essential Internet administration.
• The system ought to utilize physical link, not remote. Be that as it may, do give remote access in the Student Lobby region (second-floor passage). Set the most extreme concurrent remote clients to

Related Documents

  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Policy-based management: SQL server has a feature called policy-based management which is used to define and also implement policies in SQL server. It is used if we want to apply any policy against a table or database and then checks whether the database or table satisfies with the given policy. If target database objects are not satisfied with the policies then either a trigger should be fired or we can enforce it so that an administrator will come to know that there is some policy violation. It will manage one or more instances of SQL server.…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    WSUS is a Windows Server Update Service, that allows the administrators to have a server with Windows updates on site. Administrators can test new updates and approve the successfully tested Windows updates for release. Only the approved updates will be applied to the client computers. Using Group Policy, the administrators can point client computers to WSUS server, so the client computers will only receive the tested and approved updates from this server, instead of receiving all the updates (including potentially harmful updates) from the Windows update web site. This assures, that none of the new Windows updates will create unexpected issues with the clients' systems.…

    • 572 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The essential requirements of the organization is voice correspondence on which the whole business depends. In this way, the administration needs to pick the alternative which can improve the execution of the voice correspondence alongside the system versatility, cost adequacy and adaptability. As indicated by the given situation, the organization is offering for two alternatives, an exchanged Ethernet 100-Base – T network or Wi-Fi network. Both of these choices have their advantages and disadvantages and should be picked by the necessity. The organization can likewise concentrate on introducing voice only lines which may have better reliability and high performance for voice transfer.…

    • 234 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range. Network…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Here are some basic requirement to have a company network that can be fast and reliable I would like to have some time to talk to your IT manager to know where we are, and know the needs. Your IT manager might have most of this suggestion deployed already, in that case this can be used as a check list I will try to help as much as possible and I will be open to do any configuration of any device when you need me to ( I can do that from here) 1. The size of the company needs to be taken in consideration as well as the potential grown ( for space requirements)…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Technology Framework Design In this section, we combine the user domain needs described in Part 1 of this proposal, the physical framework requirements described in Part 2, and the technology selections described in Part 3 to create the final Digital Edge Manufacturing network infrastructure proposal. Choosing the Cabling Used in the Network We considered infrastructure costs, speed, and reliability for cabling and adaptors. Our network employed hybrid type of network sine we use Ethernet cable, Wi-Fi and fiber optic as our media.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Nt1310 Network Networks

    • 1368 Words
    • 6 Pages

    NETWORK CABLES Network cables are the medium used for information to move from one network device to another. There are many different types of cable which are often used in Local Area Networks. Most network set-ups are likely to use a variety of network cable types. Whereas in some other cases, a very basic network may only utilise one kind of network cable. The cable needed varies according to the client’s needs for example the size of the network (PAN, LAN, MAN, WAN), the network protocols and even the network topology.…

    • 1368 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    False Sense Of Security

    • 892 Words
    • 4 Pages

    How could Administrative, Technical, and Physical Controls introduce a false sense of security? Security controls are technical, physical or administrative defenses to evade, neutralize or diminish harm or inaccessibility because of risks operating on their corresponding weakness, i.e., security risk. Organizations add security controls, which is no surprise; however, it is easier than most think to bypass these controls. The business “goes through the motions of deploying a security tool or following an oversight procedure, but the benefit to the security posture might be negligible”…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    NT1330 Unit 3 Assignment 1

    • 1298 Words
    • 6 Pages

    Recommendations In order to improve upon the vulnerabilities of the file sharing peer to peer networks many actions are needed beginning with the traditional client server model. This specific problem is what lead to Napster 's ultimate undoing. After a court ordered ruling that what Napster was doing was indeed a violation of copyrighted material it was very easy for the authorities to control the data stored on Napster 's server. By ordering Napster’s to shut down its central server the government was able to completely destroy any clients access to files in the network.…

    • 1298 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Workplace Environment In this occupation, network architects interact with computers most of the time, but communication with peers, supervisors, and other subordinates is important as well. Many tools and software is used during work. Network architects work with a variety of computer servers, including file, domain name servers (DNS), backup, and high-end database servers. Use of access servers is also frequent, such as remote access and lightweight directory access protocol servers (LADP).…

    • 460 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Codeswat Security Policy

    • 615 Words
    • 3 Pages

    CodeSWAT Security Policy outlines specific requirements or rules implemented to ensure that Customer data is protected. We divided our security practices in four groups: Computer Security; Network Security; Server Security. Computer security The intent of this policy is to outline the acceptable use of computers, CodeSWAT databases in order to secure CodeSWAT from risks and network systems attack.…

    • 615 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Case Study: New College, University of Oxford New College simplifies wireless access while increasing visibility and security New College was looking for a new security automation and orchestration solution. The IT office at New College realized that although their homegrown authentication and registration solution had succeeded for many years, new security measures were needed because of student-driven demand for campus-wide wireless and wired connectivity. Among other capabilities, New College needed a solution that would enable them to: • Dynamically manage switched ports that let students use the same password for wired as well as wireless access. • Configure VLANs more productively and assign membership based on level of membership access. • Reduce the incidence of virus-related…

    • 1638 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays