country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Series Stackable Manage Switched Data Sheet

tag 0 Download7 Pages 1,592 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss About The Series Stackable Manage Switched Data Sheet?

 

Answer:

Introducation

Main scope of this project is to create the secure network design for B2B solutions. The B2B solutions is medium sized organization. It interests to create the secure network design. The B2B solutions has the six building such as finance office, Information technology office, research office, sales office, transport office and head office. Each office contains the workstations. The Finance offices has the 50 work stations, sales office has the 25 work stations, transport office has the 50 workstations, head office has 50 work stations and information technology office has the 250 workstations. These buildings are connected with the routers and each building has the single subnet. The proposed network design for B2B solutions is provides the productivity and security of the network. It uses the cisco products to reduce the maintenance and operational costs. The Network security threats will be analysed. The network design hardware and software components are will be addressed. The proposed network design will be ensuring the confidentiality, integrity, availability and Authorization of the network.

Security Threats

The Network security threats are classified into two types such as passive threats and active threats. The Network security threats diagram is shown in below [1].

The passive threats re referred to as eavesdropping dropping and it involves the attempted by an attacker to obtain the information relating to communication by using the traffic analysis and release of message content method. The Release of message contents are used to transferred the file may contain the confidential and sensitive information. It prevents the opponent from data or message transmission. The traffic analysis is a kind of attack done on encrypted messages. The active threats are involving the data stream modification and false stream creation by using the masquerade, replay, message modification and denial of service techniques. The Denial of services attack takes place when the network availability to a resource is blocked by an attacker. It disruption of an entire network by disabling the network [2]. The proposed network design provides the secure network by using the firewalls. The firewalls provide the security and productivity of the network. The Firewalls is used to blocking the unauthorised access to prevent the sensitive information’s.

Software Requirement

The Network design software requirements are shown in below.

Operating system

windows

Memory

2 GB RAM

Hard Drive

2.2 GB

Hardware Requirement

The Hardware requirements are shown in below [3].

Cisco Routers

Cisco 800 Series Routers

Cisco Switches

Cisco Small Business 500 Series Switch

Cisco Access Point

Cisco 300 Series Access Points

Cisco Firewall

Cisco ASA 5506-X with Fire POWER Services

Cisco Core switch

Cisco Nexus 7000 Series Switches

Requirement Specification

Specification of network devices is shown in below.

Cisco Routers – cisco 800 Series routers

  • It uses maximum power consumption is 11w to 18 w.
  • It does not have the extended shock-vibe
  • It has operating temperature and altitude is 0 to 40-degree Celsius.
  • It has maximum 85% of humidity [4].

Cisco Switches - Cisco Small Business 500 Series Switch

  • It supports he standard 802.1d spanning tree protocol.
  • In VLAN, it supports the 4096 Vlan simultaneously port based.
  • In Voice VLAN, the voice traffics are automatically assigned to a voice specific VLAN.
  • IT blocking Head of Line
  • It supports the classless Inter domain routing

Cisco Access Point - Cisco 300 Series Access Points

  • It enhanced the mobile guest experience.
  • It provides the strong security [5].
  • Easy to set up the peer-peer video conferencing for collaboration
  • It easily enables the next generation connected digital classrooms.
  • It minimizing the total cost of ownership for the network.

Cisco Firewall - Cisco ASA 5506-X with Fire POWER Services

  • It provides the ASA firewall functionality, advanced breach detection and advanced threat protection.
  • Highly secure and reliable access
  • High performance
  • It uses advanced malware protection like blocking, detection, analysis, remediation and tracking to protect the enterprises [6].
  • It reduces operation costs.
  • It provides the administrative visibility.

Cisco Core Switch - Cisco Nexus 7000 Series Switches

  • It combines the high levels of scalability with operational flexibility.
  • It provides the integrated resilience combined with features.
  • It also provides the reliability and availability of the network.
  • High Performance.
  • It helps to ensure the system reliability [7].
 

Network Design

The B2B solution network infrastructure is shown in below.

The B2B solutions network infrastructure consists of six building such as Finance office, sales office, head office, information office, research office and transport office. The Six building totally contains the 500 work stations. These are connected with the routers. The router connecting the core switch to connect the six building through cisco switches. The cisco products are providing the secure and scalability of the network for B2B solutions. The Proposed network design is used to provide the secure communication between the employees and organization team. It maintains network availability and usability [8]. The Proposed network design has the flexibility and availability of the network to delivers the secure network for entire organizations. The secure network design is decrease the operational and maintenance costs. Because the proposed network design does not require the maintenance costs to maintain the network. The cisco products are reduced the operational costs. The six building are securely communicated with each other’s [9]

Justification for CIAA

The network design ensures the confidentiality, integrity, availability and authorization by using the cryptographic algorithms. the cryptography plays a major role in network security. The network security goals are based on confidentiality, integrity, availability and authorization. these are designed to act as guide for information security policies [10].

Confidentiality

The confidentiality is protecting the information from the disclosure to unauthorised users. The confidentially protecting the information by encrypting the information. the encryption ensures the only the right peoples can be read the information. It provides the security for the sensitive information [11].

Integrity

The integrity is used to protecting the information from being modified by unauthorized users. the cryptography plays a major role in ensuring the data integrity. The to protect the integrity by using the various methods includes hashing the data and comparing the hash messages.

The availability is used to protect and ensures the information that authorised users are able to access the information when needed. It does not allow the unauthorised users accessing the information. It denying the access to information has become a very common attack. To ensure the data availability by backup the information’s. It provides the security and productivity. It reduces the down time [12].

Authorization

The authorization is used to allow an authorised users only accessing the information. The cryptography algorithms also provide the authorization of the users. It first authenticates the users, after provides the accessing permission. The Cryptography authorization is used to provide the security from attackers.

Conclusion

B2B solutions current network does not have the security. The B2B organization team interested to create the secure network design. The network design has the six building such as finance office, transport office, research office, sales office, head office and information technology office. Overall B2B network infrastructure has the 500 workstations. These building are connected with the routers. The router connecting each building by using the core switch. The six buildings are communicated with each other. The proposed network design provides the secure network design by using firewalls. The firewall is used to provides the productivity and security for the network. It blocking the unauthorised users. The network security threats are identified and discussed. The hardware and software requirements are identified and discussed in detail. The Justification of confidentiality, availability, integrity and authorization is done by using the cryptographic algorithms.

 

References

[1]J. Kurose and K. Ross, Computer networking. .

[2]NETworking. [Hong Kong]: Regional NET Coordinating Team, NET Section, CDI, EDB, 2013.

[3]J. Wang, Broadband wireless communications. [Place of publication not identified]: Springer-Verlag New York, 2013.

[4]P. Services, C. Switches and D. Sheets, "Cisco 500 Series Stackable Managed Switches Data Sheet", Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/products/collateral/switches/small-business-500-series-stackable-managed-switches/c78-695646_data_sheet.html. [Accessed: 27- Sep- 2017].

[5]P. Services, B. Routers, C. Routers and D. Sheets, "Cisco 2900 Series Integrated Services Routers Data Sheet", Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/products/collateral/routers/2900-series-integrated-services-routers-isr/data_sheet_c78_553896.html. [Accessed: 27- Sep- 2017].

[6]P. Services, C. Access, C. Series and D. Sheets, "Cisco Edge 300 Series Data Sheet", Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/products/collateral/switches/edge-300-series/data_sheet_c78-694183.html. [Accessed: 27- Sep- 2017].

[7]P. Services, C. Services and D. Sheets, "Cisco ASA with FirePOWER Services Data Sheet", Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/datasheet-c78-733916.html. [Accessed: 27- Sep- 2017].

[8]P. Support, C. Switches and I. Guides, "Cisco Nexus 7000 Series Site Preparation Guide - Technical Specifications [Cisco Nexus 7000 Series Switches]", Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/hw/nexus7000/site_prep/guide/nexus7k_siteprep_book/siteprep_tech_specs.html. [Accessed: 27- Sep- 2017].

[9]"Network Security – What is Network Security Threats?", Ecomputernotes.com, 2017. [Online]. Available: https://ecomputernotes.com/computernetworkingnotes/security/network-security-threats. [Accessed: 27- Sep- 2017].

[10]"Firewalls and Internet Security - The Internet Protocol Journal - Volume 2, No. 2", Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-1/ipj-archive/article09186a00800c85ae.html. [Accessed: 27- Sep- 2017].

[11]"Goals of Security Confidentiality, Integrity, and Availability", ExamCollection, 2017. [Online]. Available: https://www.examcollection.com/certification-training/security-plus-goals-of-security-confidentiality-integrity-availability.html. [Accessed: 27- Sep- 2017].

[12]T. Chia, "Confidentiality, Integrity, Availability: The three components of the CIA Triad « Stack Exchange Security Blog", Security.blogoverflow.com, 2017. [Online]. Available: https://security.blogoverflow.com/2012/08/confidentiality-integrity-availability-the-three-components-of-the-cia-triad/. [Accessed: 27- Sep- 2017].

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Series Stackable Manage Switched Data Sheet. Retrieved from https://myassignmenthelp.com/free-samples/series-stackable-manage-switched-data-sheet.

"Series Stackable Manage Switched Data Sheet." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/series-stackable-manage-switched-data-sheet.

My Assignment Help (2018) Series Stackable Manage Switched Data Sheet [Online]. Available from: https://myassignmenthelp.com/free-samples/series-stackable-manage-switched-data-sheet
[Accessed 21 February 2020].

My Assignment Help. 'Series Stackable Manage Switched Data Sheet' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/series-stackable-manage-switched-data-sheet> accessed 21 February 2020.

My Assignment Help. Series Stackable Manage Switched Data Sheet [Internet]. My Assignment Help. 2018 [cited 21 February 2020]. Available from: https://myassignmenthelp.com/free-samples/series-stackable-manage-switched-data-sheet.


MyAssignmenthelp.com boasts a pool of 3000+ experts from different backgrounds, who are solely dedicated to providing premier quality assignment help. Due to the diversity in our expert team, we are capable of providing academic assistance in more than 100 subjects. Some of our popular services include math assignment help, economic assignment help, accounting assignment help, statistics assignment help, law assignment help and more at a reasonable price.

Latest Management Samples

BUSM4687 Managing International Business Responsibly Findings

Download : 0 | Pages : 13
  • Course Code: BUSM4687
  • University: Royal Melbourne Institute Of Technology
  • Country: Australia

Answer: Introduction Today Corporate Social Responsibility (CSR) has become a very popular topic in the global market. With the increase of demand for corporate citizenship and transparency, CSR has been majorly required to embrace ethical, economic, social, and also environmental considerations. Through the current globalization changes and approaches, companies are expected to not only be of commercial value but also good corporate citizens...

Read More arrow

B01BAVA320 Self Reflection For Qantas Airways Aviation Industry

Download : 0 | Pages : 3

Answer: Self-reflection basically deals with the capacity to learn more about the purpose. The main objective of this report and the presentation is to have a critical and an in-depth analysis of the Qantas Airways. Qantas Airways is one of the aviation industry which standout amongst the most known leads in the Airline business. Being the third most seasoned carrier and the third biggest by virtue of fleet size and the joint of the team havin...

Read More arrow

BUSM4687 Managing International Business Responsibly Management

Download : 0 | Pages : 15
  • Course Code: BUSM4687
  • University: Royal Melbourne Institute Of Technology
  • Country: Australia

Answer: Introduction The Body Shop (TBS) is a London based multinational company. It was established in March 1976 by Dame Anita Roddick in Brighton. With continuously growing it has more than 3, 000 franchise stores in 66 countries. L’Oreal, who owned the company 2006-2017 sold it to Natura, a Brazilian cosmetics brands for £880 million.  Its mission is to develop its brand portfolios known for natural and home-based cosmeti...

Read More arrow

MLC709 Business Taxation Law And Policy For Service Tax

Download : 0 | Pages : 9

Answer: 1. An individual entity registered or required to obtain the registration is held liable for GST payable relating to the taxable supplies made by the entity. The entity is also entitled to obtain the input tax credit for the creditable acquisition that is made on carrying on the enterprise. In order to make the acquisition creditable the entity is required to acquire or import the goods entirely for the creditable purpose. When there i...

Read More arrow

MPM712: Managing Innovation And Final Reflection

Download : 0 | Pages : 20
  • Course Code: MPM712
  • University: Deakin Business School
  • Country: Australia

Answer: Introduction This project is all about the innovation and entrepreneurship and will able to understand the different aspect of the innovation. Innovation is one of the important facts in the business process and also gives rise to the concept of the entrepreneur. An entrepreneur is a man who adopts the innovation in their business to provide the new concept in the market. In this project the interview with Mr John Paul Jones DeJoria ...

Read More arrow
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,202,444

Orders

4.9/5

Overall Rating

5,061

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1692 Order Completed

98% Response Time

Alfred Dodd

PhD in Computer and Information Science with specialization in Database

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

234 Order Completed

100% Response Time

Samantha Ji

PhD in Chemistry with Specialization in Organic

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

93 Order Completed

100% Response Time

Jackson Mitchell

MiM (Masters in Management) in Supply Chain Management

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

A large proportion of this assignment has been copied from other sources, 34% Turnitin score. Although you use quotation marks to identify this in places you are not referencing correctly. You should only quote direct from the source if you are using...

flag

User Id: 361245 - 20 Feb 2020

Australia

student rating student rating student rating student rating student rating

Thank you for your support. Work is well written all learning outcomes achieved.

flag

User Id: 368401 - 20 Feb 2020

Australia

student rating student rating student rating student rating student rating

Because its not done properly so i am working on it byself. Some of part not explained verg well

flag

User Id: 367680 - 20 Feb 2020

Australia

student rating student rating student rating student rating student rating

very very good outline, helped me to have a clear idea of what i need to do on my first essay ever.

flag

User Id: 373468 - 20 Feb 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?