This paper reflects on the network design for a small business with 400 staffs in different cities. It discusses the design requirements, network concept, technology, operating system, IP addresses, and security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORK DESIGN FOR SMALL BUSINESS Network Design for Small Business Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 NETWORK DESIGN FOR SMALL BUSINESS Table of Contents 1. Introduction..................................................................................................................................2 1.1. Project Aim...........................................................................................................................2 1.2. Objectives.............................................................................................................................2 2. Brief description..........................................................................................................................3 2.1. Design requirements with diagram.......................................................................................4 2.2. Gantt Chart............................................................................................................................5 3. Special Condition.........................................................................................................................8 3.1.Assumption...........................................................................................................................8 3.2. Risk.......................................................................................................................................8 4. Resources.....................................................................................................................................9 4.1. Hardware Resources.............................................................................................................9 4.2. Software Resources..............................................................................................................9 5. Network Concept.........................................................................................................................9 6. Network technology...................................................................................................................11 7. Network Operating System........................................................................................................14 8. Internet Server Management......................................................................................................17 9. IP addresses...............................................................................................................................17 10. Security....................................................................................................................................21 11. Conclusion...............................................................................................................................24 Bibliography..................................................................................................................................25
2 NETWORK DESIGN FOR SMALL BUSINESS 1. Introduction The paper mainly reflects on the network design for the small business that works with 400 staffs in different cities. The main office of the company is situated in London, Birmingham. The main aim of the project is to design a network for the company. The paper provides information regarding the design requirements of the project. The report also discusses the network concept, network technology, network operating system, internet server management as IP address related information. In addition to this, proper security related information is provided in the report for keeping the network secure. This specific report is prepared to design and develop a network for small business organizations. In order to develop the network design the aims and objectives of the organization is needed to be identified. A brief description of the network is given in the project specification document and a diagram is created aligning the requirement of the organization. The project schedule is created for organizing the development activity required while developing a project. The potential risk and assumption that are identified for development of network solution is also attached with the report for its elimination and increasing the network security. 1.1. Project Aim The main of the company is to design a network for the company that has its main office inLondon,Birmingham.Thedesignnetworkoftheorganizationmustincludeproper information about design requirements, network concept, network technology, network operating system, IP addresses as well as security with the help of proper diagram. The main aim of the network is to connect the different branches of the organization and enable secure transmission of data packets between the main office and branches to reduce the communication cost and increase the efficiency of the business. The network device installed in different location is needed to be connected with redundant link such that if one of the link becomes down the other link can be used for reaching the destination address. 1.2. Objectives The main objectives of the development of network design solution is given below:
3 NETWORK DESIGN FOR SMALL BUSINESS To reduce the communication cost of the user connected in different geographical location of the network. To increase the availability and eradicate different risk of collision, lost packets and jitters within the network. To enable wireless connectivity for allowing the employees to connect their wireless devices with the network To secure the wireless connection such that it cannot be used by unauthorized users for accessing the internal resources To install the severs in secured area are restrict the users to physically access the server such that the security is never compromised. 2. Brief description Thenetworkisdevelopedafterunderstandingthespecificrequirementofthe organization and the success of the network depends on the selection of the technology and topology. A research is made on the available technology that can be applied for connecting two remote locations and enabling secure transmission of data between them. The network is also designedsuchthatitcansupporttheintraofficecommunicationforenablingfaster communication than the traditional telephony networks. The routers are needed to be configured with VoIP and it should be ensured that QoS is enabled in the network and the network is reliable. The switch is needed to be configured with VLAN depending on the number of departments of the organization and voice and data requirements. A firewall is also required to be connected to both the entry and exit points of network such that the internal network of the organization cannot be access by the intruders and the network is secured from the external agents. The network solution is developed by ensuring that it is secured and reliable to meet the current and future needs of the organization. It is a scalable network design solution that can be expanded with the growth of the organization. The application of VPN technology in the network designed for the organization helps in increasing the security and maintain fast reliable secure connection with the branch office. It can use the public lines and internet connection to connect with the different location and eliminated the cost needed for maintaining leased lines. The geographical connectivity cane be extended for allowing the remote employees to connect
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 NETWORK DESIGN FOR SMALL BUSINESS with the organizational network and maintain their global operations. The scalability of the network improves and thus it helps the organization to increase the capacity of the network without adding infrastructure in the current network solution. The long distance telephone changes can also be reduced and remote connectivity and service can be configured for increasing the efficiency of communication between the sites of the organization. The network is configured such that it can establish a secure connection with its business partners and other sites. For the establishment of VPN connection servers are required to design, deployed and configure with different services. Here site to site VPN configuration is used for connecting the remote sites and the protocols and configuration required for the development of the network is identified before starting the development of the project. For the establishment of secure connection with the remote site a VPN gateway is used for encapsulating the outbound traffic and send it via the VPN tunnel. The site to site VPN is used since it can be extended in future for connecting more than one branches and increase the scalability of the network solution. 2.1. Design requirements with diagram The above network design is crated for a small business with three offices in three different cities i.e. Main office in London, Birmingham and Manchester. There are 400 number of users currently connected with the network from different areas and thus the site to site VPN solution is proposed for the organization. The intranet VPN solution is proposed since it can help
5 NETWORK DESIGN FOR SMALL BUSINESS in delivering a cost effective network for the main offices when compared with connecting each of the sites with traditional leased lines. The site to site VPN is proposed since it is suitable for small office and enterprise sites and it can support the growth of the organization and connect more number of branch office for enabling secured communication between the main office and the branch office to advance the competence and performance of different business operations. In case of the intranet VPN for the long distance communication ISP connections are used that carries the data packets in encapsulated format such that it cannot be access by any third party for gaining access of the sensitive information of the organization. A syslog server is used for capturing the error log and troubleshooting the errors for increasing the efficiency of the network solution. It also helps in management of the configuration and generating real time alerts for increasing the network security. A NTP server is also deployed for synchronizing the clocks between the computer system and it is essential for the long distance communication for identification of latency in then network and synchronizing the network according to the daylight saving time. For each of the department of the organization a SSH client is created such that it can connect with the remote network for transferring files and information and gaining terminal access. SSH protocol adds a layer of security for transferring files and for it there are different software such as Putty, Win SCP, etc. that can be used for establishing a secure link with the remote network. 2.2. Gantt Chart Task NameDurationStartFinishPredecessors Developmentof network solution for a small business 46 daysMon 02/18/19 Mon 04/22/19 Feasibility Study7 daysMon 02/18/19 Tue 02/26/19
6 NETWORK DESIGN FOR SMALL BUSINESS Identification of number of users 2 daysMon 02/18/19 Tue 02/19/19 Identification of service needed 3 daysWed 02/20/19 Fri 02/22/192 Development of project specification 2 daysMon 02/25/19 Tue 02/26/193 Planning8 daysWed 02/27/19 Fri 03/08/19 Development of network design 3 daysWed 02/27/19 Fri 03/01/194 Identification of resources 2 daysMon 03/04/19 Tue 03/05/196 Cable requirement3 daysWed 03/06/19 Fri 03/08/197 Analysis10 daysMon 03/11/19 Fri 03/22/19 Gathering business requirement 3 daysMon 03/11/19 Wed 03/13/19 8 Aligning the project with business needs 4 daysThu 03/14/19Tue 03/19/1910
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8 NETWORK DESIGN FOR SMALL BUSINESS 04/22/1904/22/19 3. Special Condition 3.1.Assumption For the development of the network solution the following assumptions are made: 100 mbps bandwidth would be efficient for the users connected in the network and met the future needs of the organization. The users would be able to use the current network efficiently without any errors and hindrance The software update of the firmware would be automatically applied to the operating system of the network device for securing the network from external threats The pcs would be installed with antivirus software for protecting the user from malware and spyware and improve the security of the current network framework.
9 NETWORK DESIGN FOR SMALL BUSINESS 3.2. Risk The following the network security risk identified prior of starting the development of the network solution: Computer Viruses –The instance of virus attack can pose a threat for the small organization because it can delete or corrupt files that contains valuable information and impact the daily operation of the business. Software Vulnerability –The unsigned and outdated software can cause the computer system to crash or slow down the entire network causing a major issue for the small business to loss information. Hackers –The hackers can break into the computer system for gaining access to the privilege information, steal files and expose the secrets of the organization. Internal Employees –Even the trustworthy employee can pose a security threat for the network because they can unintentionally harm the system and leave the information of the organization to a vulnerable position. The best practice should be shared with the employees and the malicious websites should be blocked from the firewall for eliminating the risk. 4. Resources 4.1. Hardware Resources The hardware resources those are essential for development of a proposed network solution for different small business organization are given below: Router- Cisco 1941 Series Router Firewall - Cisco ASA 5505 firewall Server - AAA Server, NTP Server, Sys Log Server 4.2. Software Resources For establishing a secure connection with the remote terminal and enabling transfer of files and information a VPN client software is necessary that would allow the user to establish a secure connection and send and receive data packets through the tunnel securely. Some example of VPN software is Putty, Win SCP, FileZilla, etc.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 NETWORK DESIGN FOR SMALL BUSINESS 5. Network Concept For the development of the network infrastructure for the small business a budget of the network and the device obligatory for the development of a network solution is needed to be identified. A design of the network is also needed to be created such that the reliability of the network is increased and it can be used for allowing multiple users to communicate with different users connected in the network. A router is deployed in the network for separating the network and multiple switches are used for enabling interconnectivity between the network devices and enabling communication between them. The local area network is designed with network equipment such that it has support for VPN network infrastructure and establish a secure connection with the remote site. The LAN is need to be designed by analysing the number of members of the organization and twisted pair cables are used for connecting the host with the switches and enabling communication between the hosts. The requirement for deployment of a server and the service that is needed to be configured should be identified prior to the development of the network. For enabling the user to communicate with email the server should be configured with SMTP service and active directory should be configured such that the users accessing the servers can be managed centrally. A disaster recovery plan should also be created such that the redundancy of the network is improved and a business continuity is improved. A plan is needed to be created such that it covers all the devices and services and recover all the functionality and data in case of any disaster such that business organisation can increase the reliability of the organization. The support of the upper level management team is essential for the development of the disaster recovery plan and the impact of the plan in the current business is also needed to be identified for the management of critical functions and different operations on different sites. Each of the employees in the organization an off site data backup and off site recovery plan should be created. An alternative location should be selected for storing the backup location and remote location should be used for storing the backup. A contingency plan should be created for restoring the data and no data should be lost. For increasing the reliability of the network framework investment should be made on deployment of high quality routers and switches. The home networking equipment’s cannot support the growth of the current business and it can be used for growing the network over time.
11 NETWORK DESIGN FOR SMALL BUSINESS The use of high quality device helps in adding new features and functionality in the network and the features include VoIP, wireless application and integrated messaging service. It should be made sure that the routers and switches can be easily installed such as the switches having in line power helps in placing equipment’s anywhere in the building location connecting it with wall jack. It eliminated the need of installation of additional fitting and outlets for powering on the network devices. It should be made sure that the network design is created for increasing redundancy and reliability of the current framework for enabling business continuity and respond against the unforeseen forecasts. Here, client server framework is followed for designing the network framework and connect each of the group in different location of the business organization. For the long distance communication leased lines are avoided since it adds extra cost for communicating with the remote branches and instead it is replaced with the VPN technology that would help in using the public internet connection and encryption to securely transmit the data packets to the remote location. Same type of topology is used for each of the branches such that the users are familiar with the network of the remote location and does not face any difficulty while using the network solution. The users are sub divided into groups according to their patter of usage and needs for management of access of the resources and sharing of the resources with each other. The different types of risks and security threats acting on the network framework is analysed for increasing the network security and keep the sensitive information of the organization safe from the external agents. Network policy is needed to be developed aligning the needs of the business for the management of access of the users to different parts of the network. The implementation of the network policy helps in configuring access control list on the router and manage the access of the users. The network should be redundant such that the uptime of the network is maximum and it can respond to the needs of the users at a real time. Intrusion prevention System should be deployed in the network from increasing the resistance of the network and eliminate the risk of distributed denial of service, SQL injection, Man in the middle or other types of attacks. 6. Network technology The network technology that will generally be used for this entire network will be VPN. Virtual Private Network (VPN) is defined as a technology that helps in improving the online security as well as privacy. It is found that by using the entire commercial VPN service, it is
12 NETWORK DESIGN FOR SMALL BUSINESS quite important to connect it to a server in order to properly run by a VPN provider with the help of encrypted connection. Additionally, all the transferred data between the computer as well as VPN server must be properly scrambled so that no one else can be able to read it properly. It is found that this setup has number of different types of consequences which generally result in improving the internet security. As all the data gets encrypted, all the activity must be hidden from the internet service provider. In addition to this, it is found that VPN provider helps in viewing the internet activity so that the VPN should be properly seen as giving proper protection for the personal information. When the data gets encrypted then the VPN generally prevents different types of attacks in which proper adversaries attempt must intercept the data en-route. This is generally considered to be true when public Wi-Fi hotspot are used which helps in presenting major danger to the various users of the internet. By using the VPN, it is quite necessary to encrypt the information so even one connect with evil twin hotspot or the information get intercepted by utilizing the proper Wi-Fi packet sniffer then the data will be considered to be safe. The IP address must be hidden within the internet as the VPN server generally act as a proxy between the internet and the computer. Thus, the malicious websites generally act as a log of the IP address in the VPN server. Additionally, it is quite necessary to protect the personal information effectively as it is quite difficult for the adversaries to properly target. In addition to this, utilization of VPN is considered to be one of the partial solution as website generally utilizes all sorts of the sneaky methodologies for tracking as well as identifying the visitors. Against all the attacks, VPN will generally be regarded as one of the important component within a toolkit that generally includes browser based add-ons including the script blockers as well as anti-tracking tools as well as advancedcookiemanagers. The most important real downside of using the VPN is that is generally slows down the internet connection quite slightly due to proper processing of the needed power that is generally required for encrypting as well as decrypting the routing of the data with the help of third party server. However, this speed generally hits as well as considered as quite noticeable. VPN mainly ranges from $10 per month as per the data limits as well as session times. When it generally comes to internet security as well as one click solutions. By using the VPN, one of the best way to properly protect oneself while remaining online.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13 NETWORK DESIGN FOR SMALL BUSINESS VPN is considered as one of the great tool that is mainly utilized for protecting the privacy as well as for increasing the security on the internet. It basically helps in connecting two types of computers quite securely as well as privately on the internet. It is found that a VPN is generally designed in order to provide proper secure as well as encrypted tunnel for transmitting the data between the company network as well as the remote user. The information that is generally transmitted between the two different locations with the help of the encrypted tunnel cannot be properly ready as the entire system generally contains number of elements for securing the private network of the company and outside network which is generally connected by the network user. It is found that VPN helps in adding proper layer of privacy as well as security to both the public as well as private networks with the help of Wi-Fi hotspots. As the entire time progresses, then the advantage or benefit of VPN is generally realized by the users than other companies as well as organizations. It is found that both the companies as well as organizations that utilizes VPN for communicating confidentially over the entire public network for sending voice as well as videos and data. It is also considered as one of the important option for the remote organizationsaswellasworkersthathaveglobalofficesandpartnersforsharingdata effectively. Moreover, the personal users can be able to use VPN for increasing security as well as privacy for accessing the various streaming channels as well as similar types of services everywhere in order to properly protect the identity anywhere on the internet. VPN is considered as one of the secure solution that helps in allowing the users for sending as well as receiving data with the help of proper internet service by maintaining the privacy as well as confidentiality of the data depending on the encryption level. It is found to be necessary for the security need of the people specially while sending data over the network. The VPN technology helps in increasing security, assist in enhancing productivity of the company, helps in sharing files as well as assists in unblocking website as well as helps in bypassing filters. Moreover, it is found that IP address can be changed with the help of VPN and it also helps in improving performance by reducing the maintenance costs. Public networks are generally considered as a real threat. The private networks are generally not considered safe as the internet service provider can be able to track the activities and therefore it is quite necessary for the VPN to properly encrypt the traffic while the browsing
14 NETWORK DESIGN FOR SMALL BUSINESS is completed on the network bypassing geo- restrictions for saving some of the bucks while buying the tickets of the plane. In the coming future, the VPN will be helpful in providing free VPN trial, speed, proper connectivity and reliability as well as apps compatible with different types of operating systems. One of the main purpose of the VPN is to keep the online activities way from the third party. Selection of proper VPN service which generally has a transparent way of saying or doing something for making it away from the entire connection logs. Therefore, it is quite necessary to check the privacy related policies first. In addition to this, it is also necessary to make sure that safe connection must be dropped for buying the service of VPN. Moreover, the utilization of VPN is considered to be quite beneficial for improving the internet connectivity. 7. Network Operating System Network operating system is referred to as a computer Operating System (OS) that is mainly intended to support the workstation, individual computer as well elder fatal those are connected on a Local Area Network (LAN). The Operating System (OS) generally helps in providing printer sharing, database sharing, common file system as well as the ability of managing the entire network name directory, security as well as other aspects of housekeeping of the network.It is found that a network operating system helps in providing number of services to the clients over the entire network. Both the server and the peer to peer networking models mainly utilizes proper network operating system for handling the duties of the network. The role of the file server is that it is most commonly deployed for the computers that generally run under the Server of 2012. It is found that every organization that general have Windows clients OSs have at least one server that mainly functions as one of the file server. With the help of Server 2012, Microsoft generally works in order to improve the Server Message Block Protocol. The file server that runs Server 2012 can generally handle more number of clientsincomparisontothefileserverthatrunsServer2008R2.Additionally,tothe improvement of the SMB protocol, it is identified that Server 2012 helps in supporting storage spaces that allows the technology for creating flexibility as well as fault tolerant drives that uses multiple disks. Moreover, the storage spaces are generally built into the operating system so that one does not need to add any roles as well as features for utilizing them. SQL server is one of the prerequisite within the Microsoft products that generally includes the Microsoft System Centre suite as well as the SharePoint 2013. The SQL Server
15 NETWORK DESIGN FOR SMALL BUSINESS 2012 can be installed with the Service Pack on the computers that runs both the GUI as well as Server Core versions of Server 2012. SQL Server helps in supporting the utilization of managed service accounts as well as virtual accounts that further defaults the virtual accounts when it is properly installed within the Server 2012. Exchange 2013 can be installed on the running servers of the computers 2008 R2 or Server 2012. In order to prepare AD in context to exchange deployment 2013, it is quite significant to have the .NET framework 4.5 as well as Window management 3.0 must be accurately installed. It is also necessary to properly deploy the AD directory Services that are generally related with the Remote Server Administration Tools. This type of tools can get installed by utilizing the tools such as Add Roles and Features Wizard through proper execution of the PowerShell command.Exchange 2013 generally needs the Scheme master, one DCas well as GC server in each of the site that runs on the Windows Server 2003. It is found that it is quite fair to assume that one needs to think about the deployment Exchange 2013 on Server 2012 so that the infrastructure of the organization generally meets the various requirements. After the components like Microsoft Office 2010 Filter Pack, Microsoft Office 2010 Filter Pack SP1 as well as Microsoft Unified Communication managed API 4.0 then one can install Exchange 2013 by using number of different steps. It is quite important to un Setup from the entire installation media. One will be promoted properly for checking the updated installation file for agreeing on the license agreement to decide whether proper feedback is required to be provided to the Microsoft or not. On the other hand in the page called Server role selection, it is very much necessary to select whether the installation of a mailbox server role or entire Client access server role. It is necessary to configure accurately the routine of Exchange 2013 of installation in order to automatically install the roles as well as features which are generally needed for supporting the Conversation although it is quite well to do the prior to the installation routine. It is quite necessary to properly prompt the location of the Exchange installation files in order to select a name for the Exchange organization. One need to select proper AD split permission, if one needs to separate the entire administration of AD as well as Exchange. It is quite necessary to disable the native malware scanning and then it is quite necessary to perform proper perquisite check as well as analysis. After these checks are generally passed then one desires to install Exchange 2013. As soon as AD directory Service Remote Administration Tools
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16 NETWORK DESIGN FOR SMALL BUSINESS are properly connected then preparation of AD prior to the deployment will generally occur automatically. As soon as the installation procedure gets completed, one needs to verify the installation success by utilizing proper web browser for navigating the Exchange administrative Centre. As the web browser is utilized for managing the Exchange 2013 then it is necessary to pin a Exchange Administrative Centre based Website for addressing to the complete taskbar of the system on which properly the Exchange 2013 is installed. There are number of different ways that are utilized for installing the SharePoint 2013. One of the most simple way for installing the server to utilize the built-in database. The SharePoint tools are product preparation based tools that generally installs number of roles, landscapesaswellasadditionalsoftware.Thistoolcanberunwiththehelpof prerequisiteinstaller.exe from the different root folder of share point 2013 connection media. If the copes of the needed server files in addition to the various features as well as roles then the SQL Server 2008 R2 SP1 native customer. Furthermore, proper internet connection is generally required in order to run the tools quite effectively. The preparation based tool will usually endure for running after a reboot pending all the prerequisites have been properly enabled or installed. After all different types of prerequisite components must be installed properly, it is ver much important to properly install the SharePoint Server 2013 by performing number of different types of steps. First of all, it is quite important to provide the SharePoint 2013 product key properly for agreeing to the various terms of the license. It is quite important to select complete as well as proper standalone installation. Furthermore, installation of local example of SQL Server 2008 R2 Express along with SP1 must be optional for the proper productive environment. After the entire procedure of installation is complete, then it is quite necessary for running the entire SharePoint Product Shape Wizard. This Wizard is generally launched through avoidance while you properly finish an installation wizard. After running a configuration wizard properly by situation the deployment of SharePoint 2013, it is quite necessary to generate a new farm for server. Specification about location of a database name as well as the account of the operator which generally have proper administrative permission. In addition to this, it is quite important to configure a farm paraphrase properly. Once the passphrase is used then one needs in order to join the new servers within the SharePoint 2013 farm. Furthermore, the configuration of the SharePoint Central Administration Web
17 NETWORK DESIGN FOR SMALL BUSINESS Application page generally allows one to be selected at random. It is quite necessary to select between BTLM as well as Kerberos authentication with NTLM which is considered as the default value. After the completion of the configuration, it is quite important to connect the SharePoint Central Administration website to complete the configuration of aSharePoint 2013. 8. Internet Server Management The server is deployed in the current network for allowing the different user connected in the network to manage different service. The client issues a server request and a response is generated for serving the needs of the user. The server deployed in the current network can be configured as a file server for sharing of files and information between a group of users connected in the current network framework. Apart from file server there are data server, email server and WEB server that can be deployed for management of different service and request of the user. While deploying the server the security of the server should be considered because it can be illegally accessed by a third party agent to access the information residing in the server and compromise of the security of the current network framework. Threats can be received by the server from different network location and the attacker mainly focuses on breaching the security and misusing the data on the server. It is the responsibility of the network administrator to increase the security of the server and manage permission for the users to access the services configured for increasing the efficiency of the network. No authorised access should be allowed on the server because it can damage the functionality of application and data that are currently configured on the server. A virtual directory can be created on the server from the IIS manager and the client server model should be created for increasing the efficiency of the network. A website must be created from the IIS service and a virtual directory should be created for enabling directory browsing. A test case should be created for testing the configuration and connectivity of the server and resolving different issues associated with the development of the client server architecture. The online availability of the server should also be tested and the server should always be available to the user for serving different needs. The server is needed to be accessed from external environment such that it can be access from the resource available from the web server utilizing the other environment. The users and the groups should be managed and different actions are
18 NETWORK DESIGN FOR SMALL BUSINESS performed by providing rights and permission for the local groups and users. The users should be provided with rights to perform certain action that is associated with the object. 9. IP addresses Major Network:170.16.8.0/22 Available IP addresses in major network:1022 Number of IP addresses needed:400 Available IP addresses in allocated subnets:506 About50%of available major network address space is used About79%of subnetted network address space is used Subnet Name Neede d Size Allocat ed Size AddressMas k Dec MaskAssignabl e Range Broadcast London200254170.16.8.0/24255.255.255. 0 170.16.8.1 - 170.16.8.2 54 170.16.8.2 55 Birmingh am 100126170.16.9.0/25255.255.255. 128 170.16.9.1 - 170.16.9.1 26 170.16.9.1 27 Manchest er 100126170.16.9.1 28 /25255.255.255. 128 170.16.9.1 29- 170.16.9.2 170.16.9.2 55
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19 NETWORK DESIGN FOR SMALL BUSINESS 54 London Network Major Network:170.16.8.0/24 Available IP addresses in major network:254 Number of IP addresses needed:200 Available IP addresses in allocated subnets:250 About100%of available major network address space is used About80%of subnetted network address space is used Subnet Name Neede d Size Allocat ed Size AddressMas k Dec MaskAssignabl e Range Broadcast Departme nt 1 100126170.16.8.0/25255.255.255.1 28 170.16.8.1 - 170.16.8.1 26 170.16.8.1 27 Departme nt 2 5062170.16.8.1 28 /26255.255.255.1 92 170.16.8.1 29- 170.16.8.1 90 170.16.8.1 91 Departme nt 3 5062170.16.8.1 92 /26255.255.255.1 92 170.16.8.1 93- 170.16.8.2 170.16.8.2 55
20 NETWORK DESIGN FOR SMALL BUSINESS 54 Birmingham Network Major Network:170.16.9.0/25 Available IP addresses in major network:126 Number of IP addresses needed:100 Available IP addresses in allocated subnets:124 About100%of available major network address space is used About81%of subnetted network address space is used Subnet Name Neede d Size Allocate d Size AddressMas k Dec MaskAssignabl e Range Broadcast Departme nt 1 5062170.16.9. 0 /26255.255.255.1 92 170.16.9.1 - 170.16.9.6 2 170.16.9.6 3 Departme nt 2 5062170.16.9. 64 /26255.255.255.1 92 170.16.9.6 5- 170.16.9.1 26 170.16.9.1 27 Manchester Network Major Network:170.16.9.128/25
21 NETWORK DESIGN FOR SMALL BUSINESS Available IP addresses in major network:126 Number of IP addresses needed:100 Available IP addresses in allocated subnets:124 About100%of available major network address space is used About81%of subnetted network address space is used Subnet Name Neede d Size Allocat ed Size AddressMas k Dec MaskAssignabl e Range Broadcast Departme nt 1 5062170.16.9.1 28 /26255.255.255.1 92 170.16.9.1 29- 170.16.9.1 90 170.16.9.1 91 Departme nt 2 5062170.16.9.1 92 /26255.255.255.1 92 170.16.9.1 93- 170.16.9.2 54 170.16.9.2 55 10. Security The network device installed in the network should be configured with password such that the configuration of the router and the other network device cannot be changed and the network is secured from the external agents. A firewall is needed to be deployed at the entrance of the network for management of the inbound and outbound network traffic and improve the network security. The wireless access point deployed in the network should be designed to protect the usability and integrity of the network and manage the access of the network for the different users in the business. A variety of threats and vulnerability in the network should be
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
22 NETWORK DESIGN FOR SMALL BUSINESS identified and the network should be developed for protecting the usability and integrity of the network and data including software and hardware technology. The multiple layers of defines as the network edge should be combined with the implementation of different policies and controls. The authorised users should be allowed to gain access of the network resources and the malicious actors should be blocked from carrying exploits and threats. The implementation of the network security is a challenging process but it can help in protecting the proprietary information from different types of network attacks. The network security is of different types such as: Access control –It is used for restricting a number of users to access the network and keep the potential attacker out of the network. Each of the network device and the users are needed to be known for enforcing the security policy and blocking the non-compliant network device. Antivirus and antimalware software –It includes Trojans, malwares, viruses that can infect the network and make it dormant for a limited period of time. The antimalware programs are needed to be implemented for continuously scanning the entry of malware and track the affected files afterwards for finding anomaly, fixing the damage and removing the malware. Application Security –The business software that are used for the management of business operation is needed to be protected from different vulnerabilities. The application may contain bugs and holes that can be used by the attacker to reach the different sources of the network. The security of the application contains the software, hardware and the different procedures that are used for removal of the bugs and holes. Behavioural analytics –It is used for detecting the abnormal behaviour of the network and the tool automatically differentiate the activity from the set of rules defined to identify the abnormal behaviour. The network security team can thus pose a remedy to the identified problem and eliminate the threats acting on the network. Prevention of data loss –It should be ensured that the staffs should not send any organizational data outside of the network. The implementation of data loss prevention restricts the employees or users of the network from uploading, forwarding and printing the sensitive information in the network.
23 NETWORK DESIGN FOR SMALL BUSINESS Email Security –The email gateways are vulnerable to security breaches and the attacker can use the personal information or social engineering methodology for creating sophisticated phishing platform and attract the user to receive the malware from the site. The implementation of email security application helps in blocking the incoming attacks and controls the outbound message for preventing loss of sensitive data and information. Intrusion Prevention System –This types of systems are designed to scan the network traffic and actively blocking the attacks. The deployment of Cisco Next Generation IPS appliances can be used for correlating the huge global threat intelligence for blocking the malicious activity and tracking the progression of the suspicious files and malwares in the network and prevent its spread, infection or outbreaks in the current organizational network. Mobile Device Security –The mobile device that are connected with the organizational network with the means of wireless access point can also be targeted by the cybercriminals. Thus it is essential to control which devices can be access by the network and the network should be configured accordingly for keeping the data traffic private. NetworkSegmentation–Thenetworktrafficisneededtobeclassifiedforthe enforcement of the network security policies easily. The segmentation and classification should be dependent on the identity of endpoint and access rights should be assigned depending on roles, location and other criteria. The right level of access should be given to the right people depending on roles and service needed by the user and the suspicious devices should be remediated. Security information and event Management –There are different security information and event management products that can be implemented for responding against the threats and identification of the vulnerability. The device can be of different forms such as virtual, server or physical appliances. VPN –It is used for encrypting the connection between the endpoints communicating in the network using the internet. SSL or IPSec protocol is used for the establishment of the secure connection and authenticating the user for establishing communication between the network and different device.
24 NETWORK DESIGN FOR SMALL BUSINESS Web Security –The web security solution can also be deployed in the current network solution for creating an internal network framework and deny access of the users to access the malicious threats. It can also protect the web gateway and helps in protecting the website of the organization. Wireless Security –Wireless network is also vulnerable and it needs some security measures for restricting the unknown users to access the wireless signal. The exploitation of the wireless network can be prevented by application of encryption algorithm and keeping the wireless network in separate VLAN such that users using the wireless network should not reach the core network of the organization. The security of management of IIS service is essential for authenticating the user and establish a secure connection with SSL encryption for allowing the IIS to identify the client based on the personal information. Certificates are used by the IIS for allowing the client, server depending on the information of server certificate. Four different methodology provides separate feature for selection of a type of authentication depending on the requirement of the small business. A basic authentication is necessary for enabling transmission of a clear text and increasing the security of the network framework. Digest authentication based on windows domain server should be used for sending the password in encrypted format over the network. Encryption of the password generates hash values and increases the network security. The methodology of accessing and granting permission to the IIS server can be changed and it should be dependent on the requirement of the current business. 11. Conclusion From the above report it can be concluded that with the development of the network solution for the small business the organization would be benefitted because it would reduce the cost of communication. The network would help the organization to reach to the remote client and manage the business operation from a central location. The needs to manually handle the business information would be eliminated and more number of customer can be server data a time increasing the possibility of future growth of the organization. The success of the network depends on the elimination of threats and vulnerability and securing the organizational inform from the external threats acting on the network. A policy is needed to be created along with a backup plan for the management of the accessibility of the network and ensuring that no data is
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
25 NETWORK DESIGN FOR SMALL BUSINESS lost if a disaster scenario occurs. The IP addressing plan is created for each of the location and some extra number of IP address are kept in reserve such that the network solution supports the scalability and future demands.
26 NETWORK DESIGN FOR SMALL BUSINESS Bibliography Akbari, T., Zolfaghari Moghaddam, S., Poorghanaat, E. and Azimi, F., 2017. Coordinated planning of generation capacity and transmission network expansion: A game approach with multi‐leader‐follower.International Transactions on Electrical Energy Systems,27(7). Almeshekah, M.H. and Spafford, E.H., 2014, September. Planning and integrating deception into computer security defenses. InProceedings of the 2014 New Security Paradigms Workshop(pp. 127-138). ACM. Alzate, F. and Alberto, F., 2017.Characterization, Modelling and Implementation of TSO: Security Process and its Application in the Operational Planning of Sustainable Electric Power Systems. kassel university press GmbH. Cankurtaran, M.F. and Karatepe, E., 2017, April. Flexible transmission expansion and reactive power planning with wind energy considering N-1 security. InSmart Grid and Cities Congress and Fair (ICSG), 2017 5th International Istanbul(pp. 22-26). IEEE. Correa,C.A.,Bolanos,R.andGarces,A.,2015.Enhancedmultiobjectivealgorithmfor transmission expansion planning considering N− 1 security criterion.International Transactions on Electrical Energy Systems,25(10), pp.2225-2246. Dominguez, A.H., Macedo, L.H., Escobar, A.H. and Romero, R., 2017. Multistage security- constrained HVAC/HVDC transmission expansion planning with a reduced search space.IEEE Transactions on Power Systems,32(6), pp.4805-4817. Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support approaches for cyber security investment.Decision Support Systems,86, pp.13-23. Han,B.,Gopalakrishnan,V.,Ji,L.andLee,S.,2015.Networkfunctionvirtualization: Challenges and opportunities for innovations.IEEE Communications Magazine,53(2), pp.90-97. Haryadi, S. and Ibrahim, J., 2015, November. Security requirements planning to anticipate the traffic flooding on the backbone network. InWirelessand Telematics(ICWT), 2015 1st International Conference on(pp. 1-4). IEEE.
27 NETWORK DESIGN FOR SMALL BUSINESS Hausken, K. and Zhuang, J., 2015. Imperfect screening, 58, 69 Independent system operator, 81, 84 Information value theory, 166 Infrastructure planning, 221.Game Theoretic Analysis of Congestion, Safety and Security,87, p.309. Khouzani, M.H.R., Malacaria, P., Hankin, C., Fielder, A. and Smeraldi, F., 2016, September. Efficientnumericalframeworksformulti-objectivecybersecurityplanning.InEuropean Symposium on Research in Computer Security(pp. 179-197). Springer, Cham. Kizza, J.M., 2017.Guide to computer network security. Springer. Knapp, E.D. and Langill, J.T., 2014.Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress. Li, Z., Shen, W., Xu, J. and Lev, B., 2015. Bilevel and multi-objective dynamic construction site layout and security planning.Automation in Construction,57, pp.1-16. Lincke, S., 2015. Designing Information Security. InSecurity Planning(pp. 115-133). Springer, Cham. Liu, J., Cheng, H., Tian, Y., Zeng, P. and Yao, L., 2018. Multi-objective bi-level planning of active distribution networks considering network transfer capability and dispersed energy storage systems.Journal of Renewable and Sustainable Energy,10(1), p.015501. Ma, H., Lv, G. and Wu, C., 2018. Campus Network Planning and Design.Journal of Computer Hardware Engineering,1(1). Missanga, J., Msuya, S. and Mtenga, D., 2017. Network of Actors in Agricultural Improvement for Food Security and Associated Local Planning in Most Vulnerable Areas to Climate Change in Central Tanzania; A case of Chololo Village in Dodoma Municipality.Imperial Journal of Interdisciplinary Research,3(11). Mohtashami, S., Pudjianto, D. and Strbac, G., 2017. Strategic distribution network planning with smart grid technologies.IEEE Transactions on Smart Grid,8(6), pp.2656-2664. Moreira, A., Street, A. and Arroyo, J.M., 2015. An adjustable robust optimization approach for contingency-constrainedtransmissionexpansionplanning.IEEETransactionsonPower Systems,30(4), pp.2013-2022.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
28 NETWORK DESIGN FOR SMALL BUSINESS Nikolopoulou, M., Martin, K. and Dalton, B., 2016. Shaping pedestrian movement through playful interventions in security planning: what do field surveys suggest?.Journal of Urban Design,21(1), pp.84-104. Riabov, A., Sohrabi, S., Udrea, O. and Hassanzadeh, O., 2016. Efficient high quality plan explorationfornetworksecurity.InInternationalSchedulingandPlanningApplications woRKshop (SPARK). Sekhavatmanesh,H. and Cherkaoui,R., 2017. OptimalInfrastructurePlanningof Active Distribution Networks Complying with Service Restoration Requirements.IEEE Transactions on Smart Grid. Shu, J., Wu, L., Zhang, L. and Han, B., 2015. Spatial power network expansion planning considering generation expansion.IEEE Transactions on Power Systems,30(4), pp.1815-1824. Singhal, A. and Ou, X., 2017. Security risk analysis of enterprise networks using probabilistic attack graphs. InNetwork Security Metrics(pp. 53-73). Springer, Cham. Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more holistic approach: A literature review.International Journal of Information Management,36(2), pp.215-225. Speicher, P., Steinmetz, M., Backes, M., Hoffmann, J. and Künnemann, R., 2018. Stackelberg Planning: Towards Effective Leader-Follower State Space Search. Tabbane,S.,2014.HandbookofMobileRadioNetworks(ArtechHouseMobile Communications Library). Artech House, Inc.. Tsohou, A., Karyda, M., Kokolakis, S. and Kiountouzis, E., 2015. Managing the introduction of information security awareness programmes in organisations.European Journal of Information Systems,24(1), pp.38-58. Xing, H., Cheng, H., Zhang, Y. and Zeng, P., 2016. Active distribution network expansion planningintegratingdispersedenergystoragesystems.IETGeneration,Transmission& Distribution,10(3), pp.638-644.
29 NETWORK DESIGN FOR SMALL BUSINESS Xing, H., Fu, Y. and Cheng, H., 2017. Active Distribution Network Expansion Planning Integrating Practical Operation Constraints.Electric Power Components and Systems,45(16), pp.1795-1805. Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J. and Di Renzo, M., 2015. Safeguarding 5G wireless communication networks using physical layer security.IEEE Communications Magazine,53(4), pp.20-27.