Uploaded by Catherine Kanini

network design

advertisement
Advanced Network Security
Advanced Network Security
Student's name
University of affiliation
Date
Advanced Network Security
The below system can host 75 employees, each with their own Cisco IP phone and a PC and provide
services which are essential in a working environment. The network design system users routers this
offers sufficient security and efficient data transmission hence no data trafficing.
The above diagram represents a network design that was chosen for the office set up;

Connectivity and security, connectivity can be looked upon by the wireless and LAN (local area
network) connectivity, this connection should be available to specific people whom have the
Advanced Network Security
authorization to operate on the network thus parameters should be put in place to keep out
unauthorized access.

Redundancy and backing up, redundancy simply mean having a backup plan for example having
two servers this prevents a breakdown in the operations of the company due to an unexpected
error within the system.

Disaster recovery plan, from lack of power to the occurrence of a natural phenomena there
should be a back up plan of what shall happen when the any of the horrible events tend to occur
to prevent the business from loosing crucial customer data.

Future growth of the organization, growth within an organization is inevitable and thus must be
planned for within the networking structure.
Static routing is used during the installation of the system so as to implement security over the system
unlike with dynamic routing protocols. Routing Information Protocol enables routers to exchange
network topology information. Network access control lists are applicable only at subnet level and thus
the network will follow the rules of the access control list.
Advanced Network Security
This diagram maps out the proposed packet tracer network diagram, showing how data from the
internet will flow to the target workstations.
Switch configuration can be achieved through;

Use an external emulator such as Telnet to login to the switch

Let the switch load the boot loader software

The boot loader measures the available physical memory

The boot loader locates and loads a default IOS operating system software image into memory
and hands control of the switch over to the IOS.
Router configuration can be achieved through;

WIFI details (SSID and password) are crucial for connecting a laptop to the router once
successful the router assigns an IP address.

Next is connecting to the router by using the default username and password.
Once the login is successful there are various configurations that are carried out to help secure the
router, these configurations include;

Admin password for router management

Internal IP address ranges
Host configuration
Various workstations on the network must be configured based on the need of the end user on the
network. For each workstation on the network system the internet address must be set and also the
host name, static gateways are also set
Access point and server configuration guidelines
If a workstation will have to perform a specific task such as a file server the necessary configuration
tasks must be carried out
Advanced Network Security
Most access points have the same type of configuration options;

Enable/disable wireless access point functions.

SSID (Service Set Identifier) used to identify a network

Channel used to broadcast from an access point to all the computers.
The server/hub is where the data is stored and made available to all the workstations, it should be
centrally placed to enable to provide connectivity to the 75 users on the system, data should be easily
accessed from any workstation along the system, the workstations should be able to communicate over
the network at ease.
Some of the various networking commands used include;

Ifconfig (interface configuration) it is used to display the IP address and net mask of a network
interface.

Netstat (Network Statistics) used to display routing table, connection information etc this
command normally works with the Linux system.

Ping enables communication of workstations (computers, laptops, mobile devices) to
communicate over a network.
Cost of networking products

Pricing budget

Power 1250$

Computer 40000$

Internet 4000$

Printing papers 400$

Printing cost 350$

Transport cost 6000$

Time 50000$

network devices40000$
Conclusion
Advanced Network Security
A good networking system should meet the demands of the client, it should also be flexible to help with
the inevitable growth of business. The cost of a system is determined by the requirements of a
networking system the configuration off the system requires an expert to prevent any errors when
setting up the networking system.
References
1]Play.google.com, 2020. [Online]. Available:
https://play.google.com/store/books/details/CCNA_Cisco_Certified_Network_Associate_Fast_Pass_E?id
=PARCyPSSkF8C&gl=US. [Accessed: 05- Dec- 2020].
[2]2020. [Online]. Available: https://www.amazon.com/Network-Fundamentals-ExplorationCompanion-Networking/dp/1587133482. [Accessed: 05- Dec- 2020].
[3]"CCNA Certification All-in-One For Dummies", Wiley.com, 2020. [Online]. Available:
https://www.wiley.com/en-us/CCNA+Certification+All+In+One+For+Dummies-p-9780470635926.
[Accessed: 05- Dec- 2020].
Download