country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Windows Networking Design Implementation

tag 0 Download6 Pages / 1,482 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss About The Windows Networking Design Implementation?

 

Answer:

Introduction

The present IT infrastructure of B2B Company will be investigated. The exisiting threats of the present network will be studied. The secured network design with necessary IP addressing , hard ware and software requirements will be studied. The network devices that are needed to implement the secured network design will be explained briefly. Network diagrams and IP addressing designs will be made.

Network Design Project Scope

The network planning[1] by keeping security as one of the important parameters.B2B company has six departments and the requirement is a router across each department and hence the network is designed with 6 routers and these six router share 500 workstations. Finance department has 100 workstations. Transport office has 50 workstations. Research office has 25 workstations. Sales office has 25 workstations. Information technology has 250 workstations. The head office has 50 workstations. Security devices are provided in layers to implement the safe handling of the network. As a network security architect, the criteria to be implemented are taken into consideration. The network is designed in such a manner that it has proper flow of information [2]. To implement the confidentiality, the network is protected or crypted with passwords. Web based filtering is also implemented by using proper certified website through a web filter and also by blocking the insecure sites. Role based access control is also implemented in the network. RBAC is used to aid the users perform specific tasks according to the departments. The network also has IPS, firewall and webservers[3].

Security Threats

  A security threat[5] is nothing but a risk that can create harm or damage the network's working environment. The threat mostly comes in the form of a software threat. There are many threats that can affect the network. Some of the security threats are

  • Ransom ware
  • Software vulnerabilities
  • Hacktivism
  • Online hacking
  • Cloud attacks

The threats may also come in the form of virus, Trojans. DoS attack is nothing but the denial of service attack that is used to create data traffic artificially and can make a server drown very easily. The threats can also be categorized into physical and non-physical threats. The physical threats are nothing but the threats that cause damage to the devices. The types of physical threats are internal, external and humans. Nonphysical threat is the one that creates loss of data or information. The nonphysical threats are also called the logical threats. The logical threats are more dangerous.

Secure Network Design

Security is considered as a major factor in designing the network. More layers of security are provided. The first layer of security is provided by the VPN[7][8]. The second layer of security is provided by the firewall. The third layer of security is provided by IPS. VPN diagram is shown below.

Since different sites are used the end users may need to send the data through WAN. VPN will give lot of security features in this type of IT network infrastructure.

Detailed diagram of the LAN network is shown.

The IP addressing scan be as per the requirement.

  • Finance Office got 100 workstations. In DHCP server this can be Scope_Finance and the allowed IP ranges can be 192.168.1.1-192.168.1.120
  • Transport Office got 50 workstations. In DHCP server this can be Scope_Transport and the allowed IP ranges can be 168.1.121-192.168.1.180
  • Research Office got 25 workstations. In DHCP server this can be Scope_Research and the allowed IP ranges can be 168.1.181-192.168.1.210
  • Sales Office got 25 workstations. In DHCP server this can be Scope_Sales and the allowed IP ranges can be  168.2.1 - 192.168.2.40
  • Information technology got 250 workstations. In DHCP server this can be Scope_IT and the allowed IP ranges can be 168.3.1-192.168.1.254
  • Head Office got 50 workstations. In DHCP server this can be Scope_Headoffice and the allowed IP ranges can be 168.4.1-192.168.4.60
 

The security blocks used in the network include

  • Firewall
  • Antivirus server
  • IPS system

Three layers of security are implemented in the network diagram. First layer of security is implemented by the firewall. Second layer of security is implemented by the anti-virus servers. The third level of security is implemented by the IPS system. Firewall is installed between the router and the server. In order to provide the security to the servers, antivirus server is also implemented. PS is the abbreviation of Intrusion Prevention System. It protects against the threats by examining the network traffic.

Hardware requirements and devices

Required hardware [6] to implement the secured network is explained below.

A router is a one that establishes connection between two or more wired or wireless devices that frames a structured network. Router has memory and operates like a embedded device. Router is also responsible for handling incoming and outgoing packets. Packets are basic unit of the network. There are many types of router like Brouter, Core router, Edge router, Virtual router, Wireless router.

  • Manufacturer’s Name-- Cisco
  • Series Series-- Integrated Services Routers
  • Model-- 4000

Switches are used to connect devices. Router also serves the same functionality but the difference is that routers are used to connect the network and the witches are used to create the network. There are two main types of switches. They are manageable switches and non-manageable switches. Switches are considered as valuable assets for a network. Switch have many ports. According to the port, the switch can be 2 port switch, 4 port switch or the multiple port switch. Switch allows the flow of the network in a structured manner.

  • Manufacturer’s Name Cisco
  • Series Catalyst Switch
  • Model 6880-X

Network cables are used to connect one device to the other device physically.There are many types of cables used in network.They are

  • Twisted pair
  • Fiber optic
  • Coaxial
  • Patch
  • Power lines

Twisted pair cable is one which has pairs of wires in twisted form.Fibre optic cable is one which has glass core in the center that is surrounded by many protective materials.The protective layer is nothing but the layer of insulating jacket. Patch cable is one which is mostly used for connecting electrical devices

  • Manufacturer’s Name Hitech Products Private Limited (falcon Cables)
  • Series Networking cable
  • Model CAT-5

Like a wall which gives security to the buildings, firewall also refers to the system which provides security to the networks. Firewall blocks the authorized access. Firewall can be a software application or a hard ware device.

Web Server

A webserver is one that aids one to browse or handle webpages. The webserver works with the help of HHTP.HTTP is a type of protocol. They share the viewing and editing control of webpages upon request

Software Requirements

Windows servers need Windows 2012 R2 Operating system[10]. Web server can be implemented in Apache/IIS. Routers and switche3s will be having inbuilt OS.

CIAA

CIAA stands for confidentiality, integrity, availability and authentication[8].  In the present network VPN is configured.  So the data confidentiality is ensured. Integrity can be checked by using many techniques like parities. Availability can be implements for keeping the data in multiple palces. Authentication can be achieved by using active directory in this design

Conclusion

The security implementation to the various blocks used in the network diagram is clearly explained. The misconfiguration of webserver by an attacker is prevented by using the antivirus server. The antivirus server protects the application server from vulnerable software. Suppose a malicious document gets opened by an employee, it can be considered as a threat. The threat can be avoided by taking care of the network traffic using the IPS system. DNS server is also kept away from the cache poisoning using the IPS system.

 

References

[1]"Network design checklist: How to design a LAN", SearchITChannel, 2017. [Online]. Available: https://searchitchannel.techtarget.com/feature/Network-design-checklist-Six-factors-to-consider-when-designing-LANs. [Accessed: 29- Sep- 2017].

[2]I. Cisco Systems, "Introduction to Cisco Network Design > Designing Campus Networks",Ciscopress.com, 2017. [Online]. Available: https://www.ciscopress.com/articles/article.asp?p=25259. [Accessed: 29- Sep- 2017].

[3]"Campus Network Design Models", Network Computing, 2017. [Online]. Available: https://www.networkcomputing.com/data-centers/campus-network-design-models/1685370612. [Accessed: 29- Sep- 2017].

[4]P. Oppenheimer, Top-down network design. Indianapolis, Ind.: Cisco Press, 2011.

[5]"Security Threats", Msdn.microsoft.com, 2017. [Online]. Available: https://msdn.microsoft.com/en-us/library/cc723507.aspx. [Accessed: 29- Sep- 2017].

[6]"Network Devices", 2017. [Online]. Available: https://www.certiology.com/computing/computer-networking/network-devices.html. [Accessed: 29- Sep- 2017].

[7]"How VPN Works: Virtual Private Network (VPN)", Technet.microsoft.com, 2017. [Online]. Available: https://technet.microsoft.com/en-us/library/cc779919(v=ws.10).aspx. [Accessed: 29- Sep- 2017].

[8]"Information Security Concepts +1: Confidentiality, Integrity, Availablity, and Authenticity", Bright Hub, 2017. [Online]. Available: https://www.brighthub.com/computing/smb-security/articles/29153.aspx. [Accessed: 29- Sep- 2017].

[9]V. Ltd., "Network solutions, network monitoring, network filrewall systems, network security - VirtueWorld - Website Design and Development", Virtueworld.com, 2017. [Online]. Available: https://www.virtueworld.com/network_solutions/designing_and_implementation_of_vpn_networks.html. [Accessed: 29- Sep- 2017].

[10]"Windows Networking Design Implementation Guide", Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/support/docs/additional-legacy-protocols/ms-windows-networking/10624-winnt-dg.html. [Accessed: 29- Sep- 2017].

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Windows Networking Design Implementation. Retrieved from https://myassignmenthelp.com/free-samples/windows-networking-design-implementation.

"Windows Networking Design Implementation." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/windows-networking-design-implementation.

My Assignment Help (2018) Windows Networking Design Implementation [Online]. Available from: https://myassignmenthelp.com/free-samples/windows-networking-design-implementation
[Accessed 12 July 2020].

My Assignment Help. 'Windows Networking Design Implementation' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/windows-networking-design-implementation> accessed 12 July 2020.

My Assignment Help. Windows Networking Design Implementation [Internet]. My Assignment Help. 2018 [cited 12 July 2020]. Available from: https://myassignmenthelp.com/free-samples/windows-networking-design-implementation.


MyAssignmenthelp.com has appointed best assignment experts who are wizards of words. Our writers know every trick of crafting high quality write-ups within a short period. With years of experiences, we have become one of the most prolific assignment help services in the USA. We deliver custom-made help to students with writing different types of assignments. We guarantee total need-based and timely service, and this is why increasing numbers of students prefer to buy assignment online.

Latest Management Samples

DMKT5008 Digital Marketing Spring

Download : 0 | Pages : 21

Answer: Introduction The whole study is focussed on the importance of digital marketing in nowadays. The importance is being felt by one of the renowned names in the entertainment industry. It is about HMV which is headquartered in the UK. The company had remained a popular name in the entertainment industry until the time; the position was actually being hampered by Amazon in around 2012. Amazon had enabled people getting their favourite mus...

Read More arrow

IHRM4032 Introduction To Human Resource Management Spring 2018

Download : 0 | Pages : 12

Answer: Introduction Management of human resources of an organization is pivotal to the success of the organization. Human resource management team plays a wide variety of roles in the business starting from recruiting competent employees, ensuring the employees are fairly compensated, putting efforts in retaining employees, managing organizational talent and addressing employee grievances (Jackson, Schuler & Jiang, 2014). The case in the...

Read More arrow Tags: Australia Marlborough Management University of New South Wales Humanities 

FELM4026 Financial And Economic Literacy For Managers11

Download : 0 | Pages : 20

Answer: Introduction: The financial and economic literacy report has been prepared to analyze and evaluate the numerous concepts about the economical concept, micro factors, macro factors etc. the report explains about the changes and the performance of UK economical position. For preparing the report, local high street market of UK has been evaluated and it has been identified that how the corporate could growth itself. Further, the study ha...

Read More arrow

FELM4026 Financial And Economic Literacy For Managers11

Download : 0 | Pages : 20

Answer: Introduction: The financial and economic literacy report has been prepared to analyze and evaluate the numerous concepts about the economical concept, micro factors, macro factors etc. the report explains about the changes and the performance of UK economical position. For preparing the report, local high street market of UK has been evaluated and it has been identified that how the corporate could growth itself. Further, the study ha...

Read More arrow

DMKT5008 Digital Marketing Spring 2018

Download : 0 | Pages : 21

Answer: Study background:   The whole study is focussed on the importance of digital marketing in nowadays. The importance is being felt by one of the renowned names in the entertainment industry. It is about HMV which is headquartered in the UK. The company had remained a popular name in the entertainment industry until the time; the position was actually being hampered by Amazon in around 2012. Amazon had enabled people getting th...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,360,163

Orders

4.9/5

Overall Rating

5,081

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

529 Order Completed

95% Response Time

Ivan Blank

PhD in Functional Human Biology

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

647 Order Completed

98% Response Time

Adlina Han

Masters in Marketing with Specialization in Branding

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

453 Order Completed

98% Response Time

Howard Asuncion

LLM in Criminal Law

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

285 Order Completed

99% Response Time

Eugene Baranowski

MBA in Supply Chain

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

good it was perfect clear answer just what i need for ode thank you so much!! clear and in steps

flag

User Id: 304633 - 12 Jul 2020

Australia

student rating student rating student rating student rating student rating

The current help needs to improve on his English writing. While the coach was helpful in providing the content, I had to rework the context of whole paper to make it readable for the level of output expected. But overall it was helpful since I don't ...

flag

User Id: 223122 - 12 Jul 2020

Australia

student rating student rating student rating student rating student rating

Work is perfectly written, though not graded yet but I’m being optimistic that a good grade will be awarded.

flag

User Id: 369420 - 12 Jul 2020

Australia

student rating student rating student rating student rating student rating

It was well written and I\'m 100% satisfied. The expert knew exactly what to do and finished well above my expectations.

flag

User Id: 332269 - 12 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?