country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Series Stackable Manage Switched Data Sheet

tag 0 Download7 Pages / 1,592 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss About The Series Stackable Manage Switched Data Sheet?

 

Answer:

Introducation

Main scope of this project is to create the secure network design for B2B solutions. The B2B solutions is medium sized organization. It interests to create the secure network design. The B2B solutions has the six building such as finance office, Information technology office, research office, sales office, transport office and head office. Each office contains the workstations. The Finance offices has the 50 work stations, sales office has the 25 work stations, transport office has the 50 workstations, head office has 50 work stations and information technology office has the 250 workstations. These buildings are connected with the routers and each building has the single subnet. The proposed network design for B2B solutions is provides the productivity and security of the network. It uses the cisco products to reduce the maintenance and operational costs. The Network security threats will be analysed. The network design hardware and software components are will be addressed. The proposed network design will be ensuring the confidentiality, integrity, availability and Authorization of the network.

Security Threats

The Network security threats are classified into two types such as passive threats and active threats. The Network security threats diagram is shown in below [1].

The passive threats re referred to as eavesdropping dropping and it involves the attempted by an attacker to obtain the information relating to communication by using the traffic analysis and release of message content method. The Release of message contents are used to transferred the file may contain the confidential and sensitive information. It prevents the opponent from data or message transmission. The traffic analysis is a kind of attack done on encrypted messages. The active threats are involving the data stream modification and false stream creation by using the masquerade, replay, message modification and denial of service techniques. The Denial of services attack takes place when the network availability to a resource is blocked by an attacker. It disruption of an entire network by disabling the network [2]. The proposed network design provides the secure network by using the firewalls. The firewalls provide the security and productivity of the network. The Firewalls is used to blocking the unauthorised access to prevent the sensitive information’s.

Software Requirement

The Network design software requirements are shown in below.

Operating system

windows

Memory

2 GB RAM

Hard Drive

2.2 GB

Hardware Requirement

The Hardware requirements are shown in below [3].

Cisco Routers

Cisco 800 Series Routers

Cisco Switches

Cisco Small Business 500 Series Switch

Cisco Access Point

Cisco 300 Series Access Points

Cisco Firewall

Cisco ASA 5506-X with Fire POWER Services

Cisco Core switch

Cisco Nexus 7000 Series Switches

Requirement Specification

Specification of network devices is shown in below.

Cisco Routers – cisco 800 Series routers

  • It uses maximum power consumption is 11w to 18 w.
  • It does not have the extended shock-vibe
  • It has operating temperature and altitude is 0 to 40-degree Celsius.
  • It has maximum 85% of humidity [4].

Cisco Switches - Cisco Small Business 500 Series Switch

  • It supports he standard 802.1d spanning tree protocol.
  • In VLAN, it supports the 4096 Vlan simultaneously port based.
  • In Voice VLAN, the voice traffics are automatically assigned to a voice specific VLAN.
  • IT blocking Head of Line
  • It supports the classless Inter domain routing

Cisco Access Point - Cisco 300 Series Access Points

  • It enhanced the mobile guest experience.
  • It provides the strong security [5].
  • Easy to set up the peer-peer video conferencing for collaboration
  • It easily enables the next generation connected digital classrooms.
  • It minimizing the total cost of ownership for the network.

Cisco Firewall - Cisco ASA 5506-X with Fire POWER Services

  • It provides the ASA firewall functionality, advanced breach detection and advanced threat protection.
  • Highly secure and reliable access
  • High performance
  • It uses advanced malware protection like blocking, detection, analysis, remediation and tracking to protect the enterprises [6].
  • It reduces operation costs.
  • It provides the administrative visibility.

Cisco Core Switch - Cisco Nexus 7000 Series Switches

  • It combines the high levels of scalability with operational flexibility.
  • It provides the integrated resilience combined with features.
  • It also provides the reliability and availability of the network.
  • High Performance.
  • It helps to ensure the system reliability [7].
 

Network Design

The B2B solution network infrastructure is shown in below.

The B2B solutions network infrastructure consists of six building such as Finance office, sales office, head office, information office, research office and transport office. The Six building totally contains the 500 work stations. These are connected with the routers. The router connecting the core switch to connect the six building through cisco switches. The cisco products are providing the secure and scalability of the network for B2B solutions. The Proposed network design is used to provide the secure communication between the employees and organization team. It maintains network availability and usability [8]. The Proposed network design has the flexibility and availability of the network to delivers the secure network for entire organizations. The secure network design is decrease the operational and maintenance costs. Because the proposed network design does not require the maintenance costs to maintain the network. The cisco products are reduced the operational costs. The six building are securely communicated with each other’s [9]

Justification for CIAA

The network design ensures the confidentiality, integrity, availability and authorization by using the cryptographic algorithms. the cryptography plays a major role in network security. The network security goals are based on confidentiality, integrity, availability and authorization. these are designed to act as guide for information security policies [10].

Confidentiality

The confidentiality is protecting the information from the disclosure to unauthorised users. The confidentially protecting the information by encrypting the information. the encryption ensures the only the right peoples can be read the information. It provides the security for the sensitive information [11].

Integrity

The integrity is used to protecting the information from being modified by unauthorized users. the cryptography plays a major role in ensuring the data integrity. The to protect the integrity by using the various methods includes hashing the data and comparing the hash messages.

The availability is used to protect and ensures the information that authorised users are able to access the information when needed. It does not allow the unauthorised users accessing the information. It denying the access to information has become a very common attack. To ensure the data availability by backup the information’s. It provides the security and productivity. It reduces the down time [12].

Authorization

The authorization is used to allow an authorised users only accessing the information. The cryptography algorithms also provide the authorization of the users. It first authenticates the users, after provides the accessing permission. The Cryptography authorization is used to provide the security from attackers.

Conclusion

B2B solutions current network does not have the security. The B2B organization team interested to create the secure network design. The network design has the six building such as finance office, transport office, research office, sales office, head office and information technology office. Overall B2B network infrastructure has the 500 workstations. These building are connected with the routers. The router connecting each building by using the core switch. The six buildings are communicated with each other. The proposed network design provides the secure network design by using firewalls. The firewall is used to provides the productivity and security for the network. It blocking the unauthorised users. The network security threats are identified and discussed. The hardware and software requirements are identified and discussed in detail. The Justification of confidentiality, availability, integrity and authorization is done by using the cryptographic algorithms.

 

References

[1]J. Kurose and K. Ross, Computer networking. .

[2]NETworking. [Hong Kong]: Regional NET Coordinating Team, NET Section, CDI, EDB, 2013.

[3]J. Wang, Broadband wireless communications. [Place of publication not identified]: Springer-Verlag New York, 2013.

[4]P. Services, C. Switches and D. Sheets, "Cisco 500 Series Stackable Managed Switches Data Sheet", Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/products/collateral/switches/small-business-500-series-stackable-managed-switches/c78-695646_data_sheet.html. [Accessed: 27- Sep- 2017].

[5]P. Services, B. Routers, C. Routers and D. Sheets, "Cisco 2900 Series Integrated Services Routers Data Sheet", Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/products/collateral/routers/2900-series-integrated-services-routers-isr/data_sheet_c78_553896.html. [Accessed: 27- Sep- 2017].

[6]P. Services, C. Access, C. Series and D. Sheets, "Cisco Edge 300 Series Data Sheet", Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/products/collateral/switches/edge-300-series/data_sheet_c78-694183.html. [Accessed: 27- Sep- 2017].

[7]P. Services, C. Services and D. Sheets, "Cisco ASA with FirePOWER Services Data Sheet", Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/datasheet-c78-733916.html. [Accessed: 27- Sep- 2017].

[8]P. Support, C. Switches and I. Guides, "Cisco Nexus 7000 Series Site Preparation Guide - Technical Specifications [Cisco Nexus 7000 Series Switches]", Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/hw/nexus7000/site_prep/guide/nexus7k_siteprep_book/siteprep_tech_specs.html. [Accessed: 27- Sep- 2017].

[9]"Network Security – What is Network Security Threats?", Ecomputernotes.com, 2017. [Online]. Available: https://ecomputernotes.com/computernetworkingnotes/security/network-security-threats. [Accessed: 27- Sep- 2017].

[10]"Firewalls and Internet Security - The Internet Protocol Journal - Volume 2, No. 2", Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-1/ipj-archive/article09186a00800c85ae.html. [Accessed: 27- Sep- 2017].

[11]"Goals of Security Confidentiality, Integrity, and Availability", ExamCollection, 2017. [Online]. Available: https://www.examcollection.com/certification-training/security-plus-goals-of-security-confidentiality-integrity-availability.html. [Accessed: 27- Sep- 2017].

[12]T. Chia, "Confidentiality, Integrity, Availability: The three components of the CIA Triad « Stack Exchange Security Blog", Security.blogoverflow.com, 2017. [Online]. Available: https://security.blogoverflow.com/2012/08/confidentiality-integrity-availability-the-three-components-of-the-cia-triad/. [Accessed: 27- Sep- 2017].

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Series Stackable Manage Switched Data Sheet. Retrieved from https://myassignmenthelp.com/free-samples/series-stackable-manage-switched-data-sheet.

"Series Stackable Manage Switched Data Sheet." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/series-stackable-manage-switched-data-sheet.

My Assignment Help (2018) Series Stackable Manage Switched Data Sheet [Online]. Available from: https://myassignmenthelp.com/free-samples/series-stackable-manage-switched-data-sheet
[Accessed 04 June 2020].

My Assignment Help. 'Series Stackable Manage Switched Data Sheet' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/series-stackable-manage-switched-data-sheet> accessed 04 June 2020.

My Assignment Help. Series Stackable Manage Switched Data Sheet [Internet]. My Assignment Help. 2018 [cited 04 June 2020]. Available from: https://myassignmenthelp.com/free-samples/series-stackable-manage-switched-data-sheet.


MyAssignmenthelp.com boasts a pool of 3000+ experts from different backgrounds, who are solely dedicated to providing premier quality assignment help. Due to the diversity in our expert team, we are capable of providing academic assistance in more than 100 subjects. Some of our popular services include math assignment help, economic assignment help, accounting assignment help, statistics assignment help, law assignment help and more at a reasonable price.

Latest Management Samples

CO4830 IT Project Management 3

Download : 0 | Pages : 8
  • Course Code: CO4830
  • University: University Of Central Lancashire
  • Country: United Kingdom

Answer: Introduction The Lizzie Leather Company has been expanding the business through establishing six different centers at the different places. It is a crucial aspect for the successful implementation of this expansion is to manage an effective and efficient communication between all the centers. The aim of this report is to emphasize on the project management approach that could be an effective approach for the accomplishment of the obje...

Read More arrow

MGT 6093 Entrepreneurship Practice And Processes For Health Promotion Unit

Download : 0 | Pages : 28
  • Course Code: MGT 6093
  • University: Segi University
  • Country: Malaysia

Answer: Product Description:  While there is lunch program available in all the government school several students do not makes the use of food provided to them. The school food menu is restricted to sandwiches which includes meat products. Additionally, it is noticed that most the students turn to vendor that come to school premises to provide fried food. These vendors provide school students with the fried food, soda and candy though c...

Read More arrow

SBLC4001 Management Information Technology For PureGym Limited

Download : 0 | Pages : 11
  • Course Code: SBLC4001
  • University: University Of Wales Trinity Saint David
  • Country: United Kingdom

Answer: Introduction:   The report is a discussion on management information technology with special focus on how social media provides a platform to various businesses for communicating and delivering information to the social media. The company chosen here is PureGym Limited that represents a chain of no frill clubs meant especially for fitness in the United Kingdom (PureGym 2018). These chains of fitness club have its base point in...

Read More arrow

MKT220 Business Research Methodology For Educational Recordings

Download : 0 | Pages : 5
  • Course Code: MKT220
  • University: Charles Sturt University
  • Country: Australia

Answer: 1. Interviewee: “The use of smart speakers is highly favourable in my house and each and every member in the house uses it for various reasons [8 second pause]. There is no particular purpose for using the voice-activated speaker in my voice, as we use it as per our requirement [6 second pause]. For instance, I use the voice-activated speaker for listening to music, as listening to music after hectic days calms me down. Oh, Yes! ...

Read More arrow

LD0474 Strategic Management For Competitive Advantage

Download : 0 | Pages : 9

Answer: Introduction  The main purpose of this assignment is to analyze the policies of Corporate Social Responsibility of a company. Corporate Social Responsibility (CSR) can be defined as the various policies which are followed by the business in order to ensure that the activities of the business do not affect the environment or the social well-being of the society (Schwartz, 2017). In other words, CSR policies requires the compa...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,329,672

Orders

4.9/5

Overall Rating

5,076

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1265 Order Completed

97% Response Time

James Cook

Masters in Management

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1896 Order Completed

95% Response Time

Herman Berens

MSc in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

529 Order Completed

95% Response Time

Ivan Blank

PhD in Functional Human Biology

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

285 Order Completed

99% Response Time

Eugene Baranowski

MBA in Supply Chain

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

My assignment help are the best. They communicate so well with their customers and their work is so neatly done. I recommend everyone to try them. I passed my essay report. Thank guys ????????

flag

User Id: 415918 - 04 Jun 2020

Australia

student rating student rating student rating student rating student rating

thank you so much and one more thing are you available at next Wednesday as well?

flag

User Id: 219126 - 04 Jun 2020

Australia

student rating student rating student rating student rating student rating

satisfied with the provided service, like the way assignment was done, will definitely get back to my assignment help when needed.

flag

User Id: 288269 - 04 Jun 2020

Australia

student rating student rating student rating student rating student rating

SO HAPPY WITH MY MARK AND ASSIGNEMENT QUALITY I GOT SUCH A GOOD MARK , THANK YOU SO MUCH FOR YOUT HELP

flag

User Id: 305377 - 04 Jun 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?