country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Designed And Description Design Evaluated

tag 0 Download7 Pages / 1,687 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss About The Designed And Description Design Evaluated?

 

Answer:

Introducation

The Scope of this project is to create the secure network design for B2B solutions. The B2B solutions expanding their operations. So, organization team decided to creating the network design. The B2B solutions has the six building and various departments. It Each building the has the separate work stations. The Six buildings are finance office, sales office, research office, transport office, Information technology office and head office. the finance office contains the 100 work stations, sales office contains the 25 workstations, research office contains the 25 work stations, transport office contains the 50 work stations, head office contains the 50 work stations and information technology office contains the 250 work stations. Each building has the single subnet. These are connected with each other by using the routers. The Proposed network design provides the security and productivity of the network infrastructure for B2B solutions. The Network security threats are will be identified. The proposed network infrastructure hardware and software components are will be addressed and discussed in detail. The justification of proposed network design will be justified by ensuring the confidentiality, integrity, availability and authorization model in the network.

Network Security Threats

The security threats are divided into two categories like active and passive threats. The passive threats are identified to as eavesdropping and it involves the attempted by hackers to obtain the information related to communication [1]. It obtained by using the release of message content and traffic analysis method. The release of message content is used to identified the transmitted the file may contain sensitive and confidential information. So, it prevents the opponent from the message or data transmissions. Another method is traffic analysis. It is a kind of attack done on encrypted messages. The Active threats is including the false stream creation and data stream modification by using the denial of service and message modification method. The denial of services is one of the attack and it take the place when the network availability to a resource is blocked by a hacker. The proposed network design is used to provides the secure network by using the cisco firewalls. The firewalls are used to blocking the unauthorised access to prevent the sensitive information’s.

Software and hardware requirement

The Proposed network design hardware and software requirements are listed in below [2].

Software Requirements

The Software requirements for B2B network infrastructure is shown in below.

  • Operating System -           Windows 7
  • Memory -           2 GB RAM
  • Hard Drive -           2.2 GB

Hardware Requirements

The Hardware requirements for B2B network infrastructure is shown in below.

  • Cisco Routers -           Cisco 1900 series Routers
  • Cisco Switches -           Cisco Catalyst 4948 Switch
  • Cisco Firewall -           Cisco ASA 5540 Adaptive Security Appliance
  • Cisco Server -           Cisco UCS C3260 Rack Server
  • Cisco Core Switches -           Cisco Catalyst 6500 Series Switches
  • Cisco Access point -           Cisco Aironet 700 Series Access point
  • Personal Computers -           Dell Computers
  • Printers -           Canon Printers

Specification and Features of Network devices

Cisco 1900 series Routers

  • The Cisco 1900 series routers are used to provide the secure connectivity.
  • Cloud manged security and machine learning [3].
  • It grows the resiliency and density for a scalable network edge.
  • It provides the high performance.
  • To enhance the network infrastructure by combining the power of software and hardware.
  • It delivers the high network functions.
  • It creates the deliver the new services fast.

Cisco Catalyst 4948 Switch

  • It provides the high-speed network
  • low latency
  • It delivers the better mobile experience
  • It easily simplifies the operations
  • High network connectivity and security
  • It gives the high network performance.
  • Power consuming
  • It supports the multilayer switching
  • Shared buffer
  • It provides the end to end service for an organization [4].

Cisco ASA 5540 Adaptive Security Appliance

  • It is an adaptive and threat focused next generation firewall.
  • It designed for medium sized organization to provide the threat and advanced malware protection.
  • It delivers the integrate threat defence from attackers.
  • It provides the high performance and availability.
  • It ensures the business continuity [5].

Cisco UCS C3260 Rack Server

  • The UCS rack server is used to extend the cisco unified computing to reducing the organization total costs.
  • It increasing the organization agility.
  • It reduces the work load.
  • It provides the record braking performance.
  • It reliability to power the most computer and memory intensive.
  • High storage density [6].
 

Cisco Catalyst 6500 Series Switches

  • It enhances the security.
  • It improves the reliability
  • Easily manage the wired and wireless networks.
  • Easily simplifies the campus network.
  • High efficiency.

Cisco Aironet 700 Series Access point

  • It providing the c regulatory domain and internal antenna.
  • It provides the high-density experience for network [7].
  • It offers a greater coverage for more capacity and reliability.

The proposed network infrastructure for B2B solutions is shown in below.

The B2B solutions proposed network infrastructure is used to provide the security and productivity of the network [8]. It has the six building for various department. These are finance office, transport office, sales office, head office, research office and information technology offices. These are connected with each other by using the router. The router is connecting the six building by using the core switches and switches. The Each building has the single subnet. Each building is communicated with others. The Proposed network design uses the cisco network devices like cisco routers, switches, access point, core switches, server and cisco server. It provides the secure wireless network connection for each building by using the cisco access point. It cisco network devices are used to reduce the operational and maintenance costs [9].

Justification

The Proposed network solutions is used to ensures the confidentiality, availability, integrity and authorization of the network [10]. The CIAA model provides the secure and effective network for B2B solutions by using the cryptographic algorithms. The Cryptography is plays a major role in network security. The CIAA models is one of the network security techniques. The proposed network solutions ensure the CIAA model by using the cryptographic algorithms. Justification of CIAA model is shown in below.

Confidentiality

It is used to prevent the sensitive information from unauthorized users. It only allows the authorised users to accessing the sensitive information. It provides the high data security. It encrypting the information to protect the sensitive information by using the SSL/TLS security protocol for communications over the network.  It ensures the information confidentiality include enforcing the file access control and permission to restrict access to information’s [11].

Integrity

The integrity is used to maintains the data consistency, trustworthiness and accuracy through the network. It ensures that data cannot be modified by unauthorised users. It measures the file permissions and access control lists. It verifies the data integrity by using the checksums and cryptographic checksums.

Availability

The availability is used to ensure the authorised users are able to access the information when needed. It provides the sensitive information for authorised users at the right times. It denying the unauthorised users are accessing the information. It ensures the data availability by using the cryptographic algorithms [12].

Authorization

The authorization is used to authenticate the users to accessing the sensitive information. It allows the authenticated users only accessing the campus information through the network. The Cryptographic algorithms provide the users authentications to accessing the information. The cryptographic mechanisms are used to provide secure network and effective network. The CIAA model is used to maintains the organization security and provide the scalable and reliable network.

Conclusion

The B2B solutions decided to create the secure network design because the organization expanding their operations. The B2b solutions consists of six building and various departments. These are sales office, finance office, transport office, research office, head office and information technology office. These are connected with each other by using the cisco routers. Each building has the single subnet. These are communicated with each other. The proposed network design provides the security and efficiency of the network. It gives the security by using the cisco firewalls. The firewall is used to provide the productivity and security for an organization. It uses the cisco network devices to reduce the maintenance and operational costs. The Network security are identified. The proposed network design hardware and software requirement are identified and discussed in detail. The Detailed proposed design is designed and description of design is evaluated. The Justification of CIAA model is justified.

 

References

[1]J. Kurose and K. Ross, Computer networking. .

[2]NETworking. [Hong Kong]: Regional NET Coordinating Team, NET Section, CDI, EDB, 2013.

[3]J. Wang, Broadband wireless communications. [Place of publication not identified]: Springer-Verlag New York, 2013.

[4]W. Osterhage, Wireless security. Enfield, N.H.: Science Publishers, 2012.

[5]D. Forsberg, W. Moeller, V. Niemi and G. Horn, Lte security. Hoboken, N.J.: Wiley, 2014.

[6]"Disadvantages of Wireless Networks | Techwalla.com", Techwalla, 2017. [Online]. Available: https://www.techwalla.com/articles/disadvantages-of-wireless-networks. [Accessed: 27- Sep- 2017].

[7]T. Alpcan and T. Bas?ar, Network security. Cambridge: Cambridge University Press, 2011.

[8]T. Chia, "Confidentiality, Integrity, Availability: The three components of the CIA Triad « Stack Exchange Security Blog", Security.blogoverflow.com, 2017. [Online]. Available: https://security.blogoverflow.com/2012/08/confidentiality-integrity-availability-the-three-components-of-the-cia-triad/. [Accessed: 28- Sep- 2017].

[9]"What is confidentiality, integrity, and availability (CIA triad)? - Definition from WhatIs.com", WhatIs.com, 2017. [Online]. Available: https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA. [Accessed: 28- Sep- 2017].

[10]"Wireless Networking Security", Cs.bham.ac.uk, 2017. [Online]. Available: https://www.cs.bham.ac.uk/~mdr/teaching/modules03/security/students/SS7/Wireless%20Networking%20Security.htm. [Accessed: 28- Sep- 2017].

[11]"What is Network Security? - Palo Alto Networks", Paloaltonetworks.com, 2017. [Online]. Available: https://www.paloaltonetworks.com/cyberpedia/what-is-network-security. [Accessed: 28- Sep- 2017].

[12]J. Rak, J. Bay, I. Kotenko, L. Popyack, V. Skormin and K. Szczypiorski, Computer network security. .

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Designed And Description Design Evaluated. Retrieved from https://myassignmenthelp.com/free-samples/designed-and-description-design-evaluated.

"Designed And Description Design Evaluated." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/designed-and-description-design-evaluated.

My Assignment Help (2018) Designed And Description Design Evaluated [Online]. Available from: https://myassignmenthelp.com/free-samples/designed-and-description-design-evaluated
[Accessed 04 June 2020].

My Assignment Help. 'Designed And Description Design Evaluated' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/designed-and-description-design-evaluated> accessed 04 June 2020.

My Assignment Help. Designed And Description Design Evaluated [Internet]. My Assignment Help. 2018 [cited 04 June 2020]. Available from: https://myassignmenthelp.com/free-samples/designed-and-description-design-evaluated.


MyAssignmenthelp.com has appointed best assignment experts who are wizards of words. Our writers know every trick of crafting high quality write-ups within a short period. With years of experiences, we have become one of the most prolific assignment help services in the USA. We deliver custom-made help to students with writing different types of assignments. We guarantee total need-based and timely service, and this is why increasing numbers of students prefer to buy assignment online.

Latest Management Samples

BMA735 Management Ethics

Download : 0 | Pages : 3
  • Course Code: BMA735
  • University: University Of Tasmania
  • Country: Australia

Answer: Coles to pay $2.5m for misleading "Baked Today" and "Freshly Baked In-Store" bread promotion The main issue identified in Coles Supermarket is the underpayment of the workers and for the wrongful claim of ‘freshly baked’ products when the case was not such. The workers are being underpaid due to the controversial deal that the supermarket signed with SDA (Shop, Distributive and Allied Association of Employees) and for sell...

Read More arrow Tags: Australia 9 Manaagement Ethics University of Tasmania 

BUSS2054 Logistics And Supply Chain Management

Download : 0 | Pages : 16

Answer: Business report about supply chain management Introduction Supply chain management is the control of the movement of goods and services (Jaswal, 2018). It involves the action and the storage of raw materials. Supply chain management also deals with the flow of inventory under work in progress and finished goods from their original point to the point of consumption. Supply chain management has also been defined as the designing, plann...

Read More arrow Tags: Australia 31 Principles of Logistics and Supply Chain Management University of South Australia 

ACC201 Financial Accounting For Group Operations And Energy Markets

Download : 0 | Pages : 6

Answer: Expense is the budgeting and accounting term that is commonly used for mentioning any spending. It is the reduction in owner’s equity takes place due to usages of the assets for generating revenue and for other activities it is the part of the company’s operation. AGL Energy Limited is the integrated energy company that provides gas, electricity and associated products, services to business and wholesale customers all over ...

Read More arrow Tags: Australia Belconnen Management University of New South Wales 

GEOG8012 Development Problems And Solutions

Download : 0 | Pages : 2
  • Course Code: GEOG8012
  • University: Flinders University
  • Country: Australia

Answer: The following discussion is based on how cash transfer in India works to reduce and helps the present and future poverty conditions. According to the 2019 ratio, nearly 17% of India’s population is poor (Alexander, 2019).   The purpose of cash transfer is to provide social security to the poor households. Cash transfers which had been initiated by the government helps in the life of poor people by providing the cash di...

Read More arrow Tags: Australia Development Problems and Solutions Federation University 

BUMGT5922 Effective Business Communication

Download : 0 | Pages : 3
  • Course Code: BUMGT5922
  • University: Federation University
  • Country: Australia

Answer: Introduction This presentation will discuss: Scope of Communication Components of Communication Communication Styles Different styles of communication Benefits of understanding communication styles Quality of communication in a good leader Summary Scope of Communication Communication refers to interchange of information between two or more people. It is with the help of communication that in...

Read More arrow Tags: Australia 9 bumgt5922 Federation University 
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,329,672

Orders

4.9/5

Overall Rating

5,076

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 4/5

2594 Order Completed

95% Response Time

Michael Johnson

Masters of MSc in Economics

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1758 Order Completed

99% Response Time

William Martinez

MS in Biology

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

134 Order Completed

95% Response Time

Thomas Nelson

MS in Information Systems Technology with Specialization in Database Administration

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

First time using My Assignment Help Services - First meeting with customer service was very thorough and spent time explaining. Once hired and explained what I needed, I received exactly what I had asked for. The assignment was sent to me before th...

flag

User Id: 436537 - 04 Jun 2020

Australia

student rating student rating student rating student rating student rating

Good Job - provided exactly what I asked for. Addressed all questions in the assignment. APA formatted with references within the past 5 years. Assignment finished before the time I asked for it.

flag

User Id: 436537 - 04 Jun 2020

Australia

student rating student rating student rating student rating student rating

Finally a wonderful work ! Satisfied by rework after escalation as expected revived the solution! Would definitely recommend my friends! Thanks

flag

User Id: 332636 - 04 Jun 2020

Australia

student rating student rating student rating student rating student rating

VERY GOOD INFORMATION, I HAD TO DO A VIDEO ON THIS ASSIGNMENT. IT WAS A FEW MISSED SPELL WORDS BUT I READ OVER AND OVER UNTIL I GOT IT RIGHT. tHANKS!

flag

User Id: 240291 - 04 Jun 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?