Network Management for Law Firm

Verified

Added on  2019/09/30

|7
|847
|286
Report
AI Summary
This report outlines the design of a telecommunications network for a law firm that recently merged, increasing its size and requiring enhanced communication capabilities across three office locations. The report details the requirements analysis, focusing on information protection and security (complying with GLB and Financial Privacy Act), remote access, wireless device access, and disaster recovery. It specifies the necessary network components, including computer configurations, network devices (Cisco switches, routers, firewalls), and cabling. A network design diagram is included, illustrating the proposed architecture. The benefits of the proposed solution are highlighted, emphasizing security, backup plans, remote and wireless access, flexibility, reliability, and manageability. The conclusion summarizes the expected fulfillment of the company's needs through the implementation of the proposed network.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Network Management
Law Firm
Student Name:
Student ID:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Introduction................................................................................................................................2
Requirement Analysis................................................................................................................2
Information Protection and Security Requirements...................................................................2
Types of Network, Components, Devices, and Equipment.......................................................2
Network Design Diagram..........................................................................................................3
Benefits of the Proposed Solution..............................................................................................4
Conclusion..................................................................................................................................4
References..................................................................................................................................4
Document Page
Introduction
The intellectual property rights law firm has merged with another law firm that specializes in
filing and defending patents. The initial size of the law firm was ten attorneys, seven support
staff and one receptionist. However, after the merger, the employee size has increased to 23
attorneys, 12 support staffs, and 3 receptionists. There are three offices located at three
different locations. The staffs working in the company communicate with each other and
client from their office locations and also through their mobile phones. The company has
realized that there is need of an effective communication system that can facilitate the
business process effectively. The network for the companies is a must if effective
communication is to be facilitated among the three locations within the city. Therefore, this
paper is concerned with the designing the telecommunications network. There is the
requirement to receive and send legal documents and other form of information from
individual to another and among offices. This paper shows the various requirements for the
same. A telecommunication network has to be established considering the current
requirements and the suitable system components.
Requirement Analysis
The requirements identified for the law firm are given below:
1. The telecommunication network should be there. The telecom network should be reliable
for the protection of financial information.
2. The system should be able to give access to the information that is stored remotely.
3. The network should be protected from any form of attacks.
4. There should be provision for downtime and disaster management.
Document Page
5. The network should be accessed by the users from their wireless devices.
Information Protection and Security Requirements
The requirements related to the information protection and security requirements are:
1. The financial information of the customers’ needs to be protected under GLB and
Financial Privacy Act
2. Private information of the customers is needed to be protected.
3. Protection of the individuals’ information from the search made by the governments.
Types of Network, Components, Devices, and Equipment
Given below are the requirements for various locations:
Computer Configuration for each location
CPU Memory HDD NIC Display
Monitor
Number of
Computers
Operating
System
I3 3rd
generatio
n
4GB
DDRIII
1TB 10/1000 19"LE
D
15 Win 7
Network Configuration for each location:
NIC Cards Switch Cables Router Firewall
IEEE 3560-E Cat6 Cisco 4700 Cisco 2603
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10/1000 Series Cisco
Network Design Diagram
The network design diagram has been shown below:
Benefits of the Proposed Solution
The solution that has been proposed is likely to support the firm in effective communication:
1. Secured Network
The network will provide security to the information that needs protection (Radack, 2010).
The security of the network will make it GLB and Financial Privacy Act compliant.
2. Backup Plan
Document Page
There will be provision for the backup plan which will ensure that the information stays
protected in case of emergencies.
3. Remote Access
The network will provide remote access to the information from anywhere.
4. Wireless Device Access
The wireless device access will be there to ensure that the employees can use their personal
devices.
5. Flexible and the Reliable Network
The network will provide flexibility and reliability.
6. Manageable Network
The network will not require major attention after implementation apart from periodic
maintenance.
Conclusion
The successful implementation of the proposed system above is expected to fulfil the needs
of the company. Some of the important requirements identified for the company were reliable
telecommunication network, security, risk management, and wide accessibility. Based on the
requirements, computer and network configuration components have been selected to be used
in the system. The network design diagram has covered the three locations it can be assumed
that the benefits such as secured network, remote access, wireless access, and reliable
network will be garnered.
Document Page
References
Business.ftc.gov. (2014). Gramm-Leach-Bliley Act | BCP Business Center., from
http://www.business.ftc.gov/privacy-and-security/gramm-leach-bliley-act
Business.ftc.gov,. (2014). In Brief: The Financial Privacy Requirements of the Gramm-
Leach-Bliley Act | BCP Business Center. from
http://www.business.ftc.gov/documents/bus53-brief-financial-privacy-requirements-gramm-
leach-bliley-act
Small Business - Chron.com,. (2014). What Is Telecommunication & Networking in
Business?., from http://smallbusiness.chron.com/telecommunication-networking-business-
25996.html
Federline (2003), “Benefit from Wireless Networks through Risk Management”, from
https://www.americanbar.org/newsletter/publications/gp_solo_magazine_home/
gp_solo_magazine_index/benefitswireless.html
Radack (2010), “security for wireless networks and devices”, from
http://www.itl.nist.gov/lab/bulletns/bltnmar03.htm
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]