Nt1310 Unit 3 Assignment 1

Great Essays
Abstract:
With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1]
Introduction:
With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate
…show more content…
The labs are named Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; every PC lab will have the closet. Every lab will have 32 PCs: 30 students PC, 1 educator PC, and 1 server in the server room for instructional utilization. Also, there will be a Student Computer Lab that will give PC access to students to get their work done. There will be 50 PCs in this lab and a server in the storage room. To permit student’s access to library assets, the library will have 10 PCs for students and 5 PCs for library staff. At last, there are different workplaces in the building. Each of these workplaces will have one PC for staff use, except for the confirmations office, which will have five PCs. There will be two server rooms, one on the first floor and one on the second floor. The main requirements for designing the network are:
• Student-got to PCs ought to be on separate network from the staff systems. PCs for open utilization ought to be on a different system.
• There must be at least 40 Mbps Internet associations, with a reinforcement line fit for no less than 20Mbps. Link, DSL, or FIOS ought to be utilized for essential Internet administration.
• The system ought to utilize physical link, not remote. Be that as it may, do give remote access in the Student Lobby region (second-floor passage). Set the most extreme concurrent remote clients to

Related Documents

  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment

    • 867 Words
    • 4 Pages

    ISP: An Internet Service Provider is a company that provides you with services that provide you with the connection to the internet. The main services the company provides are: Broadband, TV and Phone. Here are some ISP’s: Virgin Media, Sky, BT and Talk Talk. Different companies offer different broadband speeds, Virgin Media provide speeds from 50Mb, 100Mb and 200Mb.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Here are some basic requirement to have a company network that can be fast and reliable I would like to have some time to talk to your IT manager to know where we are, and know the needs. Your IT manager might have most of this suggestion deployed already, in that case this can be used as a check list I will try to help as much as possible and I will be open to do any configuration of any device when you need me to ( I can do that from here) 1. The size of the company needs to be taken in consideration as well as the potential grown ( for space requirements)…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Technology Framework Design In this section, we combine the user domain needs described in Part 1 of this proposal, the physical framework requirements described in Part 2, and the technology selections described in Part 3 to create the final Digital Edge Manufacturing network infrastructure proposal. Choosing the Cabling Used in the Network We considered infrastructure costs, speed, and reliability for cabling and adaptors. Our network employed hybrid type of network sine we use Ethernet cable, Wi-Fi and fiber optic as our media.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Nt1310 Network Networks

    • 1368 Words
    • 6 Pages

    NETWORK CABLES Network cables are the medium used for information to move from one network device to another. There are many different types of cable which are often used in Local Area Networks. Most network set-ups are likely to use a variety of network cable types. Whereas in some other cases, a very basic network may only utilise one kind of network cable. The cable needed varies according to the client’s needs for example the size of the network (PAN, LAN, MAN, WAN), the network protocols and even the network topology.…

    • 1368 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Albany System Request

    • 1464 Words
    • 6 Pages

    Albany State’s University Student Affairs System Enhancements Submitted by Steve Billingslea Business Management Major Submitted to Albany State University College of Business In fulfillment of participation in the BISE4207 – Systems Analysis and Design Faculty Dr. Kathaleena Edward Monds, Professor College of Business Albany State University 504 College Drive Albany, GA 31705 U.S.A. Albany State’s University Student Affairs System Enhancements INTRODUCTION…

    • 1464 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Codeswat Security Policy

    • 615 Words
    • 3 Pages

    CodeSWAT Security Policy outlines specific requirements or rules implemented to ensure that Customer data is protected. We divided our security practices in four groups: Computer Security; Network Security; Server Security. Computer security The intent of this policy is to outline the acceptable use of computers, CodeSWAT databases in order to secure CodeSWAT from risks and network systems attack.…

    • 615 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    False Sense Of Security

    • 892 Words
    • 4 Pages

    How could Administrative, Technical, and Physical Controls introduce a false sense of security? Security controls are technical, physical or administrative defenses to evade, neutralize or diminish harm or inaccessibility because of risks operating on their corresponding weakness, i.e., security risk. Organizations add security controls, which is no surprise; however, it is easier than most think to bypass these controls. The business “goes through the motions of deploying a security tool or following an oversight procedure, but the benefit to the security posture might be negligible”…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Lanway Case Study

    • 3244 Words
    • 13 Pages

    Therefore in order to effectively use these resources, they must be managed in a way that best allows them to be accessed. Paper All brochure documents received are to be immediately filed in new filing cabinets situated on the sales floor – simply because space exists there for them. Each publication is to be filed in alphabetical order under the company heading, with a "post it note" stapled onto it, giving details of the date it was first entered and which employee was responsible for it.…

    • 3244 Words
    • 13 Pages
    Improved Essays
  • Improved Essays

    NT1330 Unit 3 Assignment 1

    • 1298 Words
    • 6 Pages

    Recommendations In order to improve upon the vulnerabilities of the file sharing peer to peer networks many actions are needed beginning with the traditional client server model. This specific problem is what lead to Napster 's ultimate undoing. After a court ordered ruling that what Napster was doing was indeed a violation of copyrighted material it was very easy for the authorities to control the data stored on Napster 's server. By ordering Napster’s to shut down its central server the government was able to completely destroy any clients access to files in the network.…

    • 1298 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Network security has been at the head of some stories in the news. Security is an aspect of the technology field that should be considered at all times. Not only can personal security be breached, the security of others can be affected as well. For example, the incident with the retail company Target, (Vijayan 2014) retailer 's failure to properly segregate systems handling sensitive payment card data from the rest of its network. In this paper, network segment security aspects will be discussed on why they are important, who can be affected, and what can you as a someone entering the Information Technology field do to make yourself an asset which will help your placement and skills while working.…

    • 862 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Network Design Paper

    • 1236 Words
    • 5 Pages

    Network Design Paper Background: Your small business received a contract award to upgrade the network of the UMUC branch office located in Mannheim, Germany. Currently, each department has its own network with its own DSL connection. Students and faculty members have to access each department through the Internet to access resources. Also, each department has added computers by using switches and repeaters.…

    • 1236 Words
    • 5 Pages
    Decent Essays
  • Great Essays

    Case Study: New College, University of Oxford New College simplifies wireless access while increasing visibility and security New College was looking for a new security automation and orchestration solution. The IT office at New College realized that although their homegrown authentication and registration solution had succeeded for many years, new security measures were needed because of student-driven demand for campus-wide wireless and wired connectivity. Among other capabilities, New College needed a solution that would enable them to: • Dynamically manage switched ports that let students use the same password for wired as well as wireless access. • Configure VLANs more productively and assign membership based on level of membership access. • Reduce the incidence of virus-related…

    • 1638 Words
    • 7 Pages
    Great Essays