logo

IT Networking in Talon Textile

10 Pages2476 Words148 Views
   

Added on  2020-05-03

IT Networking in Talon Textile

   Added on 2020-05-03

ShareRelated Documents
IT NETWORKING
IT Networking in Talon Textile_1
Table of Contents1.Network Design.................................................................................................................12.Directory Structure...........................................................................................................23.Server Specification..........................................................................................................44.Server Build Task List Template....................................................................................45.Server Test Plan................................................................................................................56.Server Maintenance Plan.................................................................................................67.Router Specifications........................................................................................................78.Security Policy and Plan...................................................................................................79.User Documentation.........................................................................................................810.Ongoing Maintenance Support....................................................................................8References.................................................................................................................................91
IT Networking in Talon Textile_2
1.Network DesignThe Talon Textile Fasteners organization use the outdated network structure. So, it needsto upgrade and improves the network structure. The organization team members are firstupgrade the all client workstations from windows XP to windows 7. Because the windowsXP does not provide the effective performance compared to windows 7. It also support the allhardware in the organization but windows 7 support the organization current hardware andsoftware applications. So, organization team upgrades the client workstations. After, teammembers are upgraders the small business server to windows server 2008. Because the smallbusiness server only supports 25 users and 50 clients. But, windows server 2008 supports themore than 50 users and 50 clients. It also has the server core to maintain the all configurationand maintenance. It has improved windows firewall with secure default configuration. After,Organization team as replacing the red hat Linux file server to windows based file server.Because it is used to allow window security and it use file and storage services includestechnologies that help user to set up and manage the one or more file servers. These serversare provide the central locations on user network. The proposed network structure use dedicated security firewall machine at head office.Because it easily isolate the main server from the user network and it creates the good senseto secure the data in the organization. It use the dedicated hardware firewalls to easily deploythe one or more dedicated servers and it provide the ultimate control over the firewallconfiguration. It includes the al traffic monitoring, reporting and logging. In Mr Burr, it usethe internet connectivity has wireless backhaul link. This wireless link provide the securenetwork connection and effective performance compared to other wireless links. Then,implement the internet information services and hosting the company websites in theperimeter network. This implementation is used to allow orders to come in via the companywebsite. The organization sales staff are uses the webmail access in remote. The remoteaccess provides the fast and efficient performance. The organization employees payment areproceed to online portal by using company website (Digitalocean.com, 2017). Finally,increase the security for the organization. Mostly organization staffs are using the laptopsoutside the office as well as security within our domain. Because all laptops are will beencrypted with a secret key. The secret key is exchanged using a private and public keyprotocol.2
IT Networking in Talon Textile_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Network Design and Implementation
|18
|3281
|32

Network Design and Directory Structure of TTF
|16
|2928
|115

Network Design and Implementation Plan.
|19
|3503
|206

The WPA4 Way Handshake
|10
|1342
|65

Network Design Assignment (Doc)
|20
|5604
|583

VPN Configuration in Windows Server 2012 R2
|14
|1502
|55