WAN And LAN Network Analysis

Superior Essays
There are a few final considerations to examine for the setup of the WAN and LAN networks that will be running through all Kudler locations. Here we will discuss the software and hardware needed for security and functionality of the network at each location.
Firewalls
Any connection to the internet has some risk of attack from external sources, which means our proposed setup introduces this risk at each Kudler location. To mitigate this risk, we can use a combination of software and hardware firewalls to protect the Kudler network.
Hardware firewalls “provide a first line of defense against common forms of attack coming from the outside world.” (Pacchiano, 2011) They do this by monitoring all traffic, and rejecting traffic that comes from
…show more content…
The power of the router is that it can “determine the next network point to which a packet should be forwarded toward its destination.” (Rhodes, 2006) This kind of decision-making ability for where to send packets is what allows computers on a LAN to communicate with each other and with the internet or company intranet.
These routers are often multi-function devices, and can serve as gateways and hardware firewalls in addition to the routing. Therefore the best practice would be to invest in routers that can fill all of these roles.
Switches are devices without a lot of software built in, that are primarily used to expand the number of Ethernet ports available on a company network. Switches merely route data down paths pre-assigned by the router for incoming data, or simply forward data to the router when it comes to data leaving computers headed outward. While many home networks have routers filling some of this role as well, in a business environment it is fine to have a router that only has a single inward facing Ethernet cable, which goes to a switch, that allows for more Ethernet cables to be sent onward to company computers, and in this case, point of sale

Related Documents

  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    WANs cover larger areas, such as cities, and even allow computers in different nations to connect. LANs are typically faster and more secure than WANs, but WANs enable more widespread connectivity. And while LANs tend to be owned, controlled and managed in-house by the organization where they are deployed, WANs typically require two or more of their constituent LANs to be connected over the public Internet or via a private connection established by a third-party telecommunications…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    TWC will provide primary service and AT&T will provide backup service if TWC service is down, the routers are configured to automatically switch between the connections when down, to reduce the amount of time the IT staff must deal with this. TWC will connect to Cisco switch #3 in the network drawing and AT&T will connect to Cisco switch # 1. The internet modems will have a connection point to both Cisco switches in the network. At the West and East branch, a new network fiber Internet VPN link will give access to the main branch office as the backup connection in case of unplanned outages or regular maintenance performed on network equipment, to ensure the network is always up as the bank management requires. It will only be active if the main WAN connection goes offline or experience connectivity issues to reduce the financial cost of adding the network link to the branch offices.…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    ABC Company has a few diverse equipment and software needs to meet the prerequisites of their network. We've investigated the different pieces of equipment and software to suit the needs of the company. We've looked into what every building will require with respect to what benefit every site gives and decided their needs based on those results. Servers…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    IPsec is often installed on today's IPv4 networks to protect communication over VPN networks. It is used to access VPN, as well as between VPNs. IPv6 transition mechanisms can use this kind of infrastructure to achieve a certain level of protection, even in the absence of IPv6 IPsec. Remote IPv4 hosts access private networks by establishing encrypted VPN access to a gateway device set up for this purpose. If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    NT1330 Unit 1 Lab Report

    • 1743 Words
    • 7 Pages

    1. Goal The main purpose of this lab is to introduce us to the RLES vCloud system, begin setting up a network with a router VM and a main Redhat VM, and configure some baseline features for the continuation of our work in future labs. This included configuring DNS forwarding and NTP on the PFSense router VM, and configuring a wiki on the redhat VM alongside monitoring software such as Zabbix or Opsview. When configuring the router, all was fairly straightforward and without any major setbacks. The web panel was very helpful in configuring the various NAT, DNS, and NTP settings.…

    • 1743 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Here are some basic requirement to have a company network that can be fast and reliable I would like to have some time to talk to your IT manager to know where we are, and know the needs. Your IT manager might have most of this suggestion deployed already, in that case this can be used as a check list I will try to help as much as possible and I will be open to do any configuration of any device when you need me to ( I can do that from here) 1. The size of the company needs to be taken in consideration as well as the potential grown ( for space requirements)…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Schools, colleges and office buildings would all use a LAN to interconnect their computer systems. They typically range from 1 – 10km. They are able to transmit data much faster than what can be transmitted over a phone line usually around 100kbps – 100mbps, they are cheap to set up compared to the other networks needing a switch and a hub. MAN – (Metropolitan Area Network) A MAN is similar to a LAN but able to cover an entire city.…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    From physical security to device security applications our network will be protected against both internal and external threats. The above mentioned architecture will step data through a variety of security configurations which will methodically mitigate the top four possible security threats. Additional support from the ISP may also be required when confronting DOS attacks as may attempt to overload security appliances. This will be mitigated by our multiple ISP connection but we must include information about DOS attacks in our service agreement with the ISP. Our network will prove to be more secure than other WWTC branches and will most likely become the security standard across the…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Firewall From a definition standpoint, a firewall is a hardware or software used in a networked environment to block unauthorized access by individuals while permitting authorized communications to and from the user. The firewall is often seen as a filtering wall that stands between the local network and the Internet. It jobs is filter out the traffic that might be harmful to the user device. The firewall monitors the ports that connect your network to the Internet and checks data packets before allowing them to pass through. A firewall can accept a packet, drop it -- erasing it from existence -- or deny it, returning it to the sender (Writer, 2013).…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Big E Banking Case Study

    • 1574 Words
    • 7 Pages

    This report investigates three mini cases as provided by the brief (insert book title), these include Big E. Bank, Global consultants and Atlas advertising. The first mini case Big E. Banking (BEB) discusses the problems with connecting networks together over a wide area, all using different protocols to communicate. The second mini case addresses the problems with software acquisition including the methods used to communicate across different software products. The third mini case investigates the types of networks and network protocols used by the fictitious company Atlas Advertising. Each mini case will addresses the problems stated above including a set of pro 's and con 's of any alternatives.…

    • 1574 Words
    • 7 Pages
    Great Essays