logo

Network Security Plan: Corporation Techs Company

   

Added on  2022-12-08

8 Pages1326 Words408 Views
First name
Student Name
Professor’s Name
Course Name
Date
Network security plan: Corporation Techs Company
Executive summary
The Corporation Tech computer systems share the same class C public IP address which
includes the IP address range. This also includes workstation along with servers. This documents
gives a basic network design for the organization. One of the most essential part of this work is
to reduce the number of public IP addresses needed to support the organization network. The
document also identify some of the hardening strategies. The scope of this document is only
within the Corporation Tech Company and the remote office of the network; some of the tools
utilized to for the analysis of the organization network are WireShark.
Document benefits
Provide an increased organization network capacity
Provide future expansion capability
Identify some critical points of failure
Recommend which points of failure which the organization needs to address (Blanc and
Cotton 56)
The current network design
Figure one shows the current network design. As shown from the figure the company has
implemented a hierarchical network design. A hierarchical network design is a three-layer
network design which was first proposed by Cisco network. The design divides the network into
three layers which are the access layer, the distribution layer, and the core layer. The access

Second Name
layer is specifically used to connect to the enterprise layer. The distribution layer is specifically
used for routing, quality of Service and filtering. The core layer is used to manage high-speed
network connection like ten gigabit Ethernet.
Second as shown from figure one, the current network for the organization uses
inexpensive switches which are not manageable. The current network users are connected to a
bus-network using an Ethernet 100Base-T technology. In addition, the organization has utilized a
firewall which is used to prevent unauthorized to the organization network (Vasudevan 113).
Figure 1:

Second Name
Critical points of failure
Switches which links to the various rooms
Connection to the administrative offices
The VPN connection to the remote office
Best network design
The company needs to go for GPON network design. This is a design which involves the
use of Passive Optical Splitters so as to divide one optical connection to server multiple
endpoints. Taking the design in figure one, the company can pass one fiber from Optical Line
Terminal port in the server room and pass to all the workstations and split it off using the 1:32
splitter into the various connections. Each of the various connections has to have an endpoint on
it which is supposed to offer Ethernet connectivity to the endpoint devices in the server room.
Features of the GPON design
The network design is equipped with fiber optical cabling and wall plates in the various
offices
Within the organization there various managed switches which gives a more control
managed switches which gives control over the organization LAN traffic. In addition, the
managed switches provides the ability for one to manage, monitor, and configure the
organization LAN.
A firewall is another device which have been implemented which us designed to either
permit or deny network transmissions based on the organization rules (Tittel 114)
Hardening strategies

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
TCP/IP NETWORKING.
|4
|423
|84

Network Design for an Organization using NIST Framework
|6
|623
|410

Network Design and Troubleshooting
|13
|2365
|335

Network and Technical Documentation : Assignment
|7
|866
|35

Troubleshooting Network Issues: Upgrading and Optimizing Company Network Infrastructure
|9
|1428
|448

SBM4101 Network Devices Identification And Functions
|14
|2622
|19