Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Read a article of SmartDefence Security Solution:

Your tasks are to network all branches, provide internet connectivity, e-mail services, remote connectivity between other branches and Toronto, deploying other related servers as described by the following questions:

1. Provide LAN solution for each office connecting computers and printers together. Whatnetwork topology you are going to use for different LANs and why? Explain all connectivity devices used by your selected topology. 

2. Provide a solution for IP address assignment for the above offices. You need to explain howthe total solution is going to work and what type of server you are going to configure?

3. Howdid you secure the LAN servers?

4. Employees also need towork from home. So, what you are going to do so that employees can work remotely in a secured environment?

5. You want to provide a secured web server as well as email services to the clients. Place theseservers along with the other related servers (e.g., VPN server) in a DMZ area. Note: The DMZ is connected to the Internet through a firewall. Where do you want to place the DMZ servers and why?

6. How are you going to connect the branch offices in each city? What type of transmissionmedia you are going to use? 

7. Whatyou are going to do to provide a secured Remote connectivity solution among all offices using a  (6 Points)

8. ApplyVLSM (Variable Length Subnet Masking) to subnet Toronto network, Waterloo network and Brampton  For each subnet provide the followings (There are altogether 9 subnets for the 3 three cities): (9 * (0.5 * 6)) = 27 points

  • NetworkID
  • BroadcastIP address
  • 1stusable IP address
  • Lastusable IP address
  • Subnetmask
  • Totalnumber of valid hosts

9. Draw a diagram for the above scenario using a drawing program such as Microsoft Visio or https://www.draw.io/ .

Make sure your network is secured and label the transmission media, network ids, routers, switches, firewalls etc. for each subnet properly. Your design should reflect the answers for Q1 to Q8.

LAN Solution

SmartDefence is a company that is located in three cities, Toronto, Waterloo, and Brampton. The company deals with development of software solution for different clients. The company wants to upgrade it network to meet the new requirements. The company has three offices in three building located in Toronto, two office in Waterloo, two offices in Brampton. The head office is located in Toronto.

                             

                                                                        Figure 1: Toronto LAN

                                         

                                                                                Figure 2: Waterloo LAN

                                                 

                                                                                  Figure 3: Brampton LAN

The proposed topology for each LAN is tree topology. This is because this type of topology allows additions of more servers and devices to the network without affecting the other users (Chaturvedi, 2017). Additionally, this topology follows the hierarchical and symmetrical patterns to connect the different levels. Since this is a large network, tree topology is the best choice because it guarantees high availability and security. Moreover, it is highly flexible and a hub can be added to the network so as to connect more user computers. It facilitates centralized monitoring allowing the network administrators to troubleshoot and reconfigure the network easily. Tree topology enables better access to the network because of the point to point connection (Shekhar, 2016). The devices that will be used in this topology include routers, hubs/switches, and wireless access points. The router will be used to connect the LAN to the internet, the hub/switch will be used to extend the network, while the wireless access point will be used to provide wireless connection.

IP addresses are vital to any network because it allows the computers on the network to send and receive data and files. It identifies the specific computers uniquely on a network. Overlooking on how important IP addresses are can cause major network problems and may bring about communication breakdown. Since it is a critical resource, it should be managed because every device or application on the network from web connectivity, to networked printers, emails, and file storage requires assignment of IP addresses (Shapiro, 2013).

It is important for SmartDefence to have an IP address solution. Because of the wide network requirements within the company that requires servers, printers, and quite a large number of end users, this means that some devices will require static IP addresses while others dynamic. The servers and the printers will be assigned static IP addresses. The end user devices such as desktops, laptops, phones, tablets will be assigned IP addresses using a DHCP server.

DHCP server is works with both internet protocol and transmission control protocol to manage the network. The primary function of DHCP server is to configure and manage IP addresses on the network automatically and this addresses the challenge of having to assign IP addresses manually to every device that is connected to the network (Hopping, 2018). Some of the benefits of DHCP server include IP address management, centralized network client configuration, and large network support. The table below represent the IP address for each subnet and how they are assigned by DHCP. The first 20 IP addresses are reserved for management purposes and for devices that requires static IP.

Toronto (Mangers’ office)

172.16.0.0

/24

172.16.0.1

172.16.0.254

172.16.0.255

172.16.0.20 -176.16.0.254

Toronto Office 1

172.16.1.0

/24

172.16.1.1

172.16.1.254

172.16.1.255

172.16.1.20 -176.16.1.254

Toronto Office 2

172.16.2.0

/24

172.16.2.1

172.16.2.254

172.16.2.255

172.16.2.20 -176.16.2.254

Toronto Office 3

172.16.3.0

/24

172.16.3.1

172.16.3.254

172.16.3.255

172.16.3.20 -176.16.3.254

Toronto LAN Servers

172.16.4.0

/27

172.16.4.1

172.16.4.30

172.16.4.31

Waterloo office 1

172.20.0.0

/24

172.20.0.1

172.20.0.254

172.20.0.255

172.20.0.20-172.20.0.254

Waterloo office 2

172.20.1.0

/24

172.20.1.1

172.20.1.254

172.20.1.255

172.20.1.20 – 172.20.1.254

Brampton office 1

172.40.0.0

/24

172.40.0.1

172.40.0.254

172.40.0.255

172.40.0.20 – 172.40.0.254

Brampton office 2

172.40.1.0

/24

172.40.1.1

172.40.1.254

172.40.1.255

172.40.1.20-172.40.1.254

Toronto LAN

The security of the servers within the network is very crucial and as such, it is important to take crucial steps and strategies to ensure that the servers are protected from unauthorized access. The following are some of the steps that should be taken to ensure server security.

Perform mapping and auditing: this is a very important step because it brings deeper understanding of the network infrastructure such as firewall configuration, switches, routers, wireless access points, model/vendor, ports and ethernet cabling (Geier, 2014). This will ensure that the network connection to the servers is known to allow for continuous monitoring and troubleshooting.

Keeping the network up-to-date: once the network mapping and auditing is done, it is important to consider ‘dicing’ deeper. These include ensuring that server default password have been changed, software or firmware updates, identifying the security functions and features that are not being used, and any insecure configuration.

Physically secure the network: this include using firewall to protect the servers from viruses and bots, hackers, and any local threats. It is important to have physical security to restrict physical access to the server room either physically or via the network.

Another way to secure LAN servers is by implementing VLANs to segregate network traffic. This can be done by using VLANs to group users, wireless access points, and ethernet ports across the multiple virtual networks. By segregating the networks, the servers can be places in one VLAN to ensure and enhance security (Liyanage and Gurtov, 2013).

When it comes to mobile working or working from home, it is necessary to have a policy in place that is well understood by all the employees. This does not only refer to having a set of written rules and policies but also conducting awareness and training to ensure that staff working from home know what to do incase of a problem or what to look for. In order to facilitate the employees to work remotely in a secure environment the following measures have to be taken:

All the mobile devices should be secured with password. This is to ensure that unauthorize access to such device is prevented. Password are very vital when it comes working remotely.  Additionally, employees using devices such as phones and tablets to access critical information should be installed with remote wipe application such that incase such a device is lost or stolen, the information won’t fall into the wrong hands (Owais, 2018).

Secondly, it is important to ensure that the remote working environment is as secure as the office. This is achieved by ensuring that endpoint security applications such as antiviruses are installed and regularly updated. All the applications and software used by the employees should be updated regularly.

To protect internet traffic the company should use virtual private network and ensure appropriate policies have been applied. This can be achieved by routing the web traffic through secured corporate gateways to filter the web traffic and ensure that all sites accessed by the employees are secure and safe.

Waterloo LAN

All the devices used by the employees should be backed-up securely so that incase information is lost when staff is working remotely can be recovered. Additionally, it is important to deploy a data loss prevention mechanism and should be used on endpoint and gateways. By using DLP and security gateway, the company will be able to prevent staff from maliciously and inadvertently sending critical information (Tyson and Crawford, 2016). By implementing clear policies, educating employees, and ensuring that security systems are up to date, employees can work comfortably remotely.

DMZ should be placed outside the internal network where servers that are supposed to be accessed by the outsiders without getting into the internal network. This helps in fine tuning the monitoring process and limiting access to the internal network. DMZ helps in ensuring that all the traffic on going in and out of the public servers pass through a firewall. This is achieved by creating rules that will facilitate outsiders to connect to the email, DNS, and web server through the internet. The DMZ will ensure that any attempts by the outsiders to connect to other ports other than the ones specified will be denied by the firewall (Taylor, 2018). There are several methods to create DMZ; one is by putting a DMZ between two firewalls, this is a firewall sandwich.  

The recommended transmission medium to be used while connecting the branch offices is fiber optic cable. This medium uses the concept of light reflection via a plastic or glass core. This medium increases the bandwidth and capacity, is light weight, and has minimal signal attenuation. Fiber optic covers longer distance while ensuring that signal quality is not affected as it is being transmitted (Popov, 2018).

In order to provide secured remote connectivity solution, a VPN LAN-to-LAN will be used. A remote-access VPN enable users to establish connections that are secured with remote computer network. Individual users will be able to access secured resources on the company network as if they were physically connected to the to the network (Broadview, 2018). Encrypted IP traffic is received by centralized LAN-to-LAN VPN service using the internet. Having a virtual private network will enable secure remote connectivity.

Conclusion

A network is a very critical resource to any business, as such, it should be protected and secured at all times. There are several security strategies that can be employed to secure the network including using firewall, VPN, endpoint security solutions, and many others. When working remotely, the company should ensure that employees working remotely are connecting to the company network securely using VPNs.

Reference List

Broadview, N. (2018). Remote Access Solutions: Why VPNs Aren’t Enough | Broadview Networks. [online] Broadview Networks. Available at: https://broadviewnetworks.ca/remote-access-solutions-why-vpns-arent-enough/ [Accessed 27 Nov. 2018].

Chaturvedi, B. (2017). What is Tree Topology? Advantages and Disadvantages. [online] Pctechnicalpro.blogspot.com. Available at: https://pctechnicalpro.blogspot.com/2017/08/tree-topology-advantages-disadvantages.html [Accessed 27 Nov. 2018].

Geier, E. (2014). 8 ways to improve wired network security. [online] Network World. Available at: https://www.networkworld.com/article/2175048/wireless/8-ways-to-improve-wired-network-security.html [Accessed 27 Nov. 2018].

Hopping, C. (2018). What is a DHCP server?. [online] IT PRO. Available at: https://www.itpro.co.uk/network-access-control/30329/what-is-a-dhcp-server [Accessed 29 Nov. 2018].

Liyanage, M. and Gurtov, A. (2013). Securing virtual private LAN service by efficient key management. Security and Communication Networks, 7(1), pp.1-13.

Owais, A. (2018). Remote Access VPN: Secure Your Access Point with PureVPN. [online] PureVPN Blog. Available at: https://www.purevpn.com/blog/secure-remote-access-vpn-solution/ [Accessed 27 Nov. 2018].

Popov, S. (2018). FIBER OPTIC CABLE OF CONSISTENTLY HIGH QUALITY. LastMile, (4), pp.18-20.

Shapiro, A. (2013). Why Do Unique IP Addresses Matter and What Is Their Importance?. [online] Business 2 Community. Available at: https://www.business2community.com/tech-gadgets/why-do-unique-ip-addresses-matter-and-what-is-their-importance-0474610 [Accessed 29 Nov. 2018].

Shekhar, A. (2016). What Is Tree Topology? Advantages And Disadvantages Of Tree Topology. [online] Fossbytes. Available at: https://fossbytes.com/tree-topology-advantage-disadvantage/ [Accessed 27 Nov. 2018].

Taylor, L. (2018). DMZs for dummies | ZDNet. [online] ZDNet. Available at: https://www.zdnet.com/article/dmzs-for-dummies-5000297743/ [Accessed 27 Nov. 2018].

Tyson, J. and Crawford, S. (2016). How VPNs Work. [online] HowStuffWorks. Available at: https://computer.howstuffworks.com/vpn3.htm [Accessed 27 Nov. 2018].

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). SmartDefence Security Solution: LAN, IP Address, And Remote Connectivity. Retrieved from https://myassignmenthelp.com/free-samples/itm301-it-infrastructure/securing-lan-servers.html.

"SmartDefence Security Solution: LAN, IP Address, And Remote Connectivity." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/itm301-it-infrastructure/securing-lan-servers.html.

My Assignment Help (2021) SmartDefence Security Solution: LAN, IP Address, And Remote Connectivity [Online]. Available from: https://myassignmenthelp.com/free-samples/itm301-it-infrastructure/securing-lan-servers.html
[Accessed 16 April 2024].

My Assignment Help. 'SmartDefence Security Solution: LAN, IP Address, And Remote Connectivity' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/itm301-it-infrastructure/securing-lan-servers.html> accessed 16 April 2024.

My Assignment Help. SmartDefence Security Solution: LAN, IP Address, And Remote Connectivity [Internet]. My Assignment Help. 2021 [cited 16 April 2024]. Available from: https://myassignmenthelp.com/free-samples/itm301-it-infrastructure/securing-lan-servers.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close