HND Project: Network Design for Small Business with VPN Solution
VerifiedAdded on 2023/04/20
|30
|9068
|373
Project
AI Summary
This project report details the network design for a small business with 400 employees across multiple locations, including London, Birmingham, and Manchester. The project aims to create a secure and efficient network infrastructure, addressing design requirements, network concepts, network technology, network operating systems, IP addressing, and security measures. The design incorporates a site-to-site VPN solution to connect the main office and branches, reducing communication costs and enhancing data transmission security. The report includes a Gantt chart for project scheduling, identifies potential risks and assumptions, and specifies hardware and software resources. Key network components such as Cisco routers and firewalls are selected to ensure reliability and security. The proposed network also supports wireless connectivity and VoIP, with considerations for QoS and VLAN configuration. The project emphasizes scalability to accommodate future growth and includes security protocols like SSH and measures to mitigate risks from viruses, hackers, and internal threats. This comprehensive network solution aims to meet the current and future needs of the small business while maintaining a secure and efficient communication infrastructure. Desklib provides access to similar solved assignments for students.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: NETWORK DESIGN FOR SMALL BUSINESS
Network Design for Small Business
Name of the Student
Name of the University
Author’s Note
Network Design for Small Business
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
NETWORK DESIGN FOR SMALL BUSINESS
Table of Contents
1. Introduction..................................................................................................................................2
1.1. Project Aim...........................................................................................................................2
1.2. Objectives.............................................................................................................................2
2. Brief description..........................................................................................................................3
2.1. Design requirements with diagram.......................................................................................4
2.2. Gantt Chart............................................................................................................................5
3. Special Condition.........................................................................................................................8
3.1. Assumption...........................................................................................................................8
3.2. Risk.......................................................................................................................................8
4. Resources.....................................................................................................................................9
4.1. Hardware Resources.............................................................................................................9
4.2. Software Resources..............................................................................................................9
5. Network Concept.........................................................................................................................9
6. Network technology...................................................................................................................11
7. Network Operating System........................................................................................................14
8. Internet Server Management......................................................................................................17
9. IP addresses...............................................................................................................................17
10. Security....................................................................................................................................21
11. Conclusion...............................................................................................................................24
Bibliography..................................................................................................................................25
NETWORK DESIGN FOR SMALL BUSINESS
Table of Contents
1. Introduction..................................................................................................................................2
1.1. Project Aim...........................................................................................................................2
1.2. Objectives.............................................................................................................................2
2. Brief description..........................................................................................................................3
2.1. Design requirements with diagram.......................................................................................4
2.2. Gantt Chart............................................................................................................................5
3. Special Condition.........................................................................................................................8
3.1. Assumption...........................................................................................................................8
3.2. Risk.......................................................................................................................................8
4. Resources.....................................................................................................................................9
4.1. Hardware Resources.............................................................................................................9
4.2. Software Resources..............................................................................................................9
5. Network Concept.........................................................................................................................9
6. Network technology...................................................................................................................11
7. Network Operating System........................................................................................................14
8. Internet Server Management......................................................................................................17
9. IP addresses...............................................................................................................................17
10. Security....................................................................................................................................21
11. Conclusion...............................................................................................................................24
Bibliography..................................................................................................................................25

2
NETWORK DESIGN FOR SMALL BUSINESS
1. Introduction
The paper mainly reflects on the network design for the small business that works with
400 staffs in different cities. The main office of the company is situated in London, Birmingham.
The main aim of the project is to design a network for the company. The paper provides
information regarding the design requirements of the project. The report also discusses the
network concept, network technology, network operating system, internet server management as
IP address related information. In addition to this, proper security related information is provided
in the report for keeping the network secure.
This specific report is prepared to design and develop a network for small business
organizations. In order to develop the network design the aims and objectives of the organization
is needed to be identified. A brief description of the network is given in the project specification
document and a diagram is created aligning the requirement of the organization. The project
schedule is created for organizing the development activity required while developing a project.
The potential risk and assumption that are identified for development of network solution is also
attached with the report for its elimination and increasing the network security.
1.1. Project Aim
The main of the company is to design a network for the company that has its main office
in London, Birmingham. The design network of the organization must include proper
information about design requirements, network concept, network technology, network operating
system, IP addresses as well as security with the help of proper diagram.
The main aim of the network is to connect the different branches of the organization and
enable secure transmission of data packets between the main office and branches to reduce the
communication cost and increase the efficiency of the business.
The network device installed in different location is needed to be connected with
redundant link such that if one of the link becomes down the other link can be used for reaching
the destination address.
1.2. Objectives
The main objectives of the development of network design solution is given below:
NETWORK DESIGN FOR SMALL BUSINESS
1. Introduction
The paper mainly reflects on the network design for the small business that works with
400 staffs in different cities. The main office of the company is situated in London, Birmingham.
The main aim of the project is to design a network for the company. The paper provides
information regarding the design requirements of the project. The report also discusses the
network concept, network technology, network operating system, internet server management as
IP address related information. In addition to this, proper security related information is provided
in the report for keeping the network secure.
This specific report is prepared to design and develop a network for small business
organizations. In order to develop the network design the aims and objectives of the organization
is needed to be identified. A brief description of the network is given in the project specification
document and a diagram is created aligning the requirement of the organization. The project
schedule is created for organizing the development activity required while developing a project.
The potential risk and assumption that are identified for development of network solution is also
attached with the report for its elimination and increasing the network security.
1.1. Project Aim
The main of the company is to design a network for the company that has its main office
in London, Birmingham. The design network of the organization must include proper
information about design requirements, network concept, network technology, network operating
system, IP addresses as well as security with the help of proper diagram.
The main aim of the network is to connect the different branches of the organization and
enable secure transmission of data packets between the main office and branches to reduce the
communication cost and increase the efficiency of the business.
The network device installed in different location is needed to be connected with
redundant link such that if one of the link becomes down the other link can be used for reaching
the destination address.
1.2. Objectives
The main objectives of the development of network design solution is given below:

3
NETWORK DESIGN FOR SMALL BUSINESS
To reduce the communication cost of the user connected in different geographical
location of the network.
To increase the availability and eradicate different risk of collision, lost packets and
jitters within the network.
To enable wireless connectivity for allowing the employees to connect their wireless
devices with the network
To secure the wireless connection such that it cannot be used by unauthorized users for
accessing the internal resources
To install the severs in secured area are restrict the users to physically access the server
such that the security is never compromised.
2. Brief description
The network is developed after understanding the specific requirement of the
organization and the success of the network depends on the selection of the technology and
topology. A research is made on the available technology that can be applied for connecting two
remote locations and enabling secure transmission of data between them. The network is also
designed such that it can support the intra office communication for enabling faster
communication than the traditional telephony networks. The routers are needed to be configured
with VoIP and it should be ensured that QoS is enabled in the network and the network is
reliable. The switch is needed to be configured with VLAN depending on the number of
departments of the organization and voice and data requirements. A firewall is also required to
be connected to both the entry and exit points of network such that the internal network of the
organization cannot be access by the intruders and the network is secured from the external
agents.
The network solution is developed by ensuring that it is secured and reliable to meet the
current and future needs of the organization. It is a scalable network design solution that can be
expanded with the growth of the organization. The application of VPN technology in the
network designed for the organization helps in increasing the security and maintain fast reliable
secure connection with the branch office. It can use the public lines and internet connection to
connect with the different location and eliminated the cost needed for maintaining leased lines.
The geographical connectivity cane be extended for allowing the remote employees to connect
NETWORK DESIGN FOR SMALL BUSINESS
To reduce the communication cost of the user connected in different geographical
location of the network.
To increase the availability and eradicate different risk of collision, lost packets and
jitters within the network.
To enable wireless connectivity for allowing the employees to connect their wireless
devices with the network
To secure the wireless connection such that it cannot be used by unauthorized users for
accessing the internal resources
To install the severs in secured area are restrict the users to physically access the server
such that the security is never compromised.
2. Brief description
The network is developed after understanding the specific requirement of the
organization and the success of the network depends on the selection of the technology and
topology. A research is made on the available technology that can be applied for connecting two
remote locations and enabling secure transmission of data between them. The network is also
designed such that it can support the intra office communication for enabling faster
communication than the traditional telephony networks. The routers are needed to be configured
with VoIP and it should be ensured that QoS is enabled in the network and the network is
reliable. The switch is needed to be configured with VLAN depending on the number of
departments of the organization and voice and data requirements. A firewall is also required to
be connected to both the entry and exit points of network such that the internal network of the
organization cannot be access by the intruders and the network is secured from the external
agents.
The network solution is developed by ensuring that it is secured and reliable to meet the
current and future needs of the organization. It is a scalable network design solution that can be
expanded with the growth of the organization. The application of VPN technology in the
network designed for the organization helps in increasing the security and maintain fast reliable
secure connection with the branch office. It can use the public lines and internet connection to
connect with the different location and eliminated the cost needed for maintaining leased lines.
The geographical connectivity cane be extended for allowing the remote employees to connect
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
NETWORK DESIGN FOR SMALL BUSINESS
with the organizational network and maintain their global operations. The scalability of the
network improves and thus it helps the organization to increase the capacity of the network
without adding infrastructure in the current network solution. The long distance telephone
changes can also be reduced and remote connectivity and service can be configured for
increasing the efficiency of communication between the sites of the organization. The network is
configured such that it can establish a secure connection with its business partners and other
sites. For the establishment of VPN connection servers are required to design, deployed and
configure with different services. Here site to site VPN configuration is used for connecting the
remote sites and the protocols and configuration required for the development of the network is
identified before starting the development of the project. For the establishment of secure
connection with the remote site a VPN gateway is used for encapsulating the outbound traffic
and send it via the VPN tunnel. The site to site VPN is used since it can be extended in future for
connecting more than one branches and increase the scalability of the network solution.
2.1. Design requirements with diagram
The above network design is crated for a small business with three offices in three
different cities i.e. Main office in London, Birmingham and Manchester. There are 400 number
of users currently connected with the network from different areas and thus the site to site VPN
solution is proposed for the organization. The intranet VPN solution is proposed since it can help
NETWORK DESIGN FOR SMALL BUSINESS
with the organizational network and maintain their global operations. The scalability of the
network improves and thus it helps the organization to increase the capacity of the network
without adding infrastructure in the current network solution. The long distance telephone
changes can also be reduced and remote connectivity and service can be configured for
increasing the efficiency of communication between the sites of the organization. The network is
configured such that it can establish a secure connection with its business partners and other
sites. For the establishment of VPN connection servers are required to design, deployed and
configure with different services. Here site to site VPN configuration is used for connecting the
remote sites and the protocols and configuration required for the development of the network is
identified before starting the development of the project. For the establishment of secure
connection with the remote site a VPN gateway is used for encapsulating the outbound traffic
and send it via the VPN tunnel. The site to site VPN is used since it can be extended in future for
connecting more than one branches and increase the scalability of the network solution.
2.1. Design requirements with diagram
The above network design is crated for a small business with three offices in three
different cities i.e. Main office in London, Birmingham and Manchester. There are 400 number
of users currently connected with the network from different areas and thus the site to site VPN
solution is proposed for the organization. The intranet VPN solution is proposed since it can help

5
NETWORK DESIGN FOR SMALL BUSINESS
in delivering a cost effective network for the main offices when compared with connecting each
of the sites with traditional leased lines. The site to site VPN is proposed since it is suitable for
small office and enterprise sites and it can support the growth of the organization and connect
more number of branch office for enabling secured communication between the main office and
the branch office to advance the competence and performance of different business operations. In
case of the intranet VPN for the long distance communication ISP connections are used that
carries the data packets in encapsulated format such that it cannot be access by any third party
for gaining access of the sensitive information of the organization. A syslog server is used for
capturing the error log and troubleshooting the errors for increasing the efficiency of the network
solution. It also helps in management of the configuration and generating real time alerts for
increasing the network security. A NTP server is also deployed for synchronizing the clocks
between the computer system and it is essential for the long distance communication for
identification of latency in then network and synchronizing the network according to the daylight
saving time. For each of the department of the organization a SSH client is created such that it
can connect with the remote network for transferring files and information and gaining terminal
access. SSH protocol adds a layer of security for transferring files and for it there are different
software such as Putty, Win SCP, etc. that can be used for establishing a secure link with the
remote network.
2.2. Gantt Chart
Task Name Duration Start Finish Predecessors
Development of
network solution for a
small business
46 days Mon
02/18/19
Mon
04/22/19
Feasibility Study 7 days Mon
02/18/19
Tue 02/26/19
NETWORK DESIGN FOR SMALL BUSINESS
in delivering a cost effective network for the main offices when compared with connecting each
of the sites with traditional leased lines. The site to site VPN is proposed since it is suitable for
small office and enterprise sites and it can support the growth of the organization and connect
more number of branch office for enabling secured communication between the main office and
the branch office to advance the competence and performance of different business operations. In
case of the intranet VPN for the long distance communication ISP connections are used that
carries the data packets in encapsulated format such that it cannot be access by any third party
for gaining access of the sensitive information of the organization. A syslog server is used for
capturing the error log and troubleshooting the errors for increasing the efficiency of the network
solution. It also helps in management of the configuration and generating real time alerts for
increasing the network security. A NTP server is also deployed for synchronizing the clocks
between the computer system and it is essential for the long distance communication for
identification of latency in then network and synchronizing the network according to the daylight
saving time. For each of the department of the organization a SSH client is created such that it
can connect with the remote network for transferring files and information and gaining terminal
access. SSH protocol adds a layer of security for transferring files and for it there are different
software such as Putty, Win SCP, etc. that can be used for establishing a secure link with the
remote network.
2.2. Gantt Chart
Task Name Duration Start Finish Predecessors
Development of
network solution for a
small business
46 days Mon
02/18/19
Mon
04/22/19
Feasibility Study 7 days Mon
02/18/19
Tue 02/26/19

6
NETWORK DESIGN FOR SMALL BUSINESS
Identification of
number of users
2 days Mon
02/18/19
Tue 02/19/19
Identification of
service needed
3 days Wed
02/20/19
Fri 02/22/19 2
Development of
project specification
2 days Mon
02/25/19
Tue 02/26/19 3
Planning 8 days Wed
02/27/19
Fri 03/08/19
Development of
network design
3 days Wed
02/27/19
Fri 03/01/19 4
Identification of
resources
2 days Mon
03/04/19
Tue 03/05/19 6
Cable requirement 3 days Wed
03/06/19
Fri 03/08/19 7
Analysis 10 days Mon
03/11/19
Fri 03/22/19
Gathering business
requirement
3 days Mon
03/11/19
Wed
03/13/19
8
Aligning the project
with business needs
4 days Thu 03/14/19 Tue 03/19/19 10
NETWORK DESIGN FOR SMALL BUSINESS
Identification of
number of users
2 days Mon
02/18/19
Tue 02/19/19
Identification of
service needed
3 days Wed
02/20/19
Fri 02/22/19 2
Development of
project specification
2 days Mon
02/25/19
Tue 02/26/19 3
Planning 8 days Wed
02/27/19
Fri 03/08/19
Development of
network design
3 days Wed
02/27/19
Fri 03/01/19 4
Identification of
resources
2 days Mon
03/04/19
Tue 03/05/19 6
Cable requirement 3 days Wed
03/06/19
Fri 03/08/19 7
Analysis 10 days Mon
03/11/19
Fri 03/22/19
Gathering business
requirement
3 days Mon
03/11/19
Wed
03/13/19
8
Aligning the project
with business needs
4 days Thu 03/14/19 Tue 03/19/19 10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
NETWORK DESIGN FOR SMALL BUSINESS
Make necessary
changes
3 days Wed
03/20/19
Fri 03/22/19 11
Development 16 days Mon
03/25/19
Mon
04/15/19
Installation of
network device
5 days Mon
03/25/19
Fri 03/29/19 12
Connecting network
cables
4 days Mon
04/01/19
Thu 04/04/19 14
Configuring network
device
4 days Fri 04/05/19 Wed
04/10/19
15
Network policy 3 days Thu 04/11/19 Mon
04/15/19
16
Testing 4 days Tue 04/16/19 Fri 04/19/19
Pinging of network
device
1 day Tue 04/16/19 Tue 04/16/19 17
Penetration testing 3 days Wed
04/17/19
Fri 04/19/19 19
Project Closure 1 day Mon
04/22/19
Mon
04/22/19
Stakeholder sign off 1 day Mon Mon 20
NETWORK DESIGN FOR SMALL BUSINESS
Make necessary
changes
3 days Wed
03/20/19
Fri 03/22/19 11
Development 16 days Mon
03/25/19
Mon
04/15/19
Installation of
network device
5 days Mon
03/25/19
Fri 03/29/19 12
Connecting network
cables
4 days Mon
04/01/19
Thu 04/04/19 14
Configuring network
device
4 days Fri 04/05/19 Wed
04/10/19
15
Network policy 3 days Thu 04/11/19 Mon
04/15/19
16
Testing 4 days Tue 04/16/19 Fri 04/19/19
Pinging of network
device
1 day Tue 04/16/19 Tue 04/16/19 17
Penetration testing 3 days Wed
04/17/19
Fri 04/19/19 19
Project Closure 1 day Mon
04/22/19
Mon
04/22/19
Stakeholder sign off 1 day Mon Mon 20

8
NETWORK DESIGN FOR SMALL BUSINESS
04/22/19 04/22/19
3. Special Condition
3.1. Assumption
For the development of the network solution the following assumptions are made:
100 mbps bandwidth would be efficient for the users connected in the network and met
the future needs of the organization.
The users would be able to use the current network efficiently without any errors and
hindrance
The software update of the firmware would be automatically applied to the operating
system of the network device for securing the network from external threats
The pcs would be installed with antivirus software for protecting the user from malware
and spyware and improve the security of the current network framework.
NETWORK DESIGN FOR SMALL BUSINESS
04/22/19 04/22/19
3. Special Condition
3.1. Assumption
For the development of the network solution the following assumptions are made:
100 mbps bandwidth would be efficient for the users connected in the network and met
the future needs of the organization.
The users would be able to use the current network efficiently without any errors and
hindrance
The software update of the firmware would be automatically applied to the operating
system of the network device for securing the network from external threats
The pcs would be installed with antivirus software for protecting the user from malware
and spyware and improve the security of the current network framework.

9
NETWORK DESIGN FOR SMALL BUSINESS
3.2. Risk
The following the network security risk identified prior of starting the development of the
network solution:
Computer Viruses – The instance of virus attack can pose a threat for the small
organization because it can delete or corrupt files that contains valuable information and impact
the daily operation of the business.
Software Vulnerability – The unsigned and outdated software can cause the computer
system to crash or slow down the entire network causing a major issue for the small business to
loss information.
Hackers – The hackers can break into the computer system for gaining access to the
privilege information, steal files and expose the secrets of the organization.
Internal Employees – Even the trustworthy employee can pose a security threat for the
network because they can unintentionally harm the system and leave the information of the
organization to a vulnerable position. The best practice should be shared with the employees and
the malicious websites should be blocked from the firewall for eliminating the risk.
4. Resources
4.1. Hardware Resources
The hardware resources those are essential for development of a proposed network solution for
different small business organization are given below:
Router - Cisco 1941 Series Router
Firewall - Cisco ASA 5505 firewall
Server - AAA Server, NTP Server, Sys Log Server
4.2. Software Resources
For establishing a secure connection with the remote terminal and enabling transfer of
files and information a VPN client software is necessary that would allow the user to establish a
secure connection and send and receive data packets through the tunnel securely. Some example
of VPN software is Putty, Win SCP, FileZilla, etc.
NETWORK DESIGN FOR SMALL BUSINESS
3.2. Risk
The following the network security risk identified prior of starting the development of the
network solution:
Computer Viruses – The instance of virus attack can pose a threat for the small
organization because it can delete or corrupt files that contains valuable information and impact
the daily operation of the business.
Software Vulnerability – The unsigned and outdated software can cause the computer
system to crash or slow down the entire network causing a major issue for the small business to
loss information.
Hackers – The hackers can break into the computer system for gaining access to the
privilege information, steal files and expose the secrets of the organization.
Internal Employees – Even the trustworthy employee can pose a security threat for the
network because they can unintentionally harm the system and leave the information of the
organization to a vulnerable position. The best practice should be shared with the employees and
the malicious websites should be blocked from the firewall for eliminating the risk.
4. Resources
4.1. Hardware Resources
The hardware resources those are essential for development of a proposed network solution for
different small business organization are given below:
Router - Cisco 1941 Series Router
Firewall - Cisco ASA 5505 firewall
Server - AAA Server, NTP Server, Sys Log Server
4.2. Software Resources
For establishing a secure connection with the remote terminal and enabling transfer of
files and information a VPN client software is necessary that would allow the user to establish a
secure connection and send and receive data packets through the tunnel securely. Some example
of VPN software is Putty, Win SCP, FileZilla, etc.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10
NETWORK DESIGN FOR SMALL BUSINESS
5. Network Concept
For the development of the network infrastructure for the small business a budget of the
network and the device obligatory for the development of a network solution is needed to be
identified. A design of the network is also needed to be created such that the reliability of the
network is increased and it can be used for allowing multiple users to communicate with
different users connected in the network. A router is deployed in the network for separating the
network and multiple switches are used for enabling interconnectivity between the network
devices and enabling communication between them. The local area network is designed with
network equipment such that it has support for VPN network infrastructure and establish a secure
connection with the remote site. The LAN is need to be designed by analysing the number of
members of the organization and twisted pair cables are used for connecting the host with the
switches and enabling communication between the hosts. The requirement for deployment of a
server and the service that is needed to be configured should be identified prior to the
development of the network. For enabling the user to communicate with email the server should
be configured with SMTP service and active directory should be configured such that the users
accessing the servers can be managed centrally.
A disaster recovery plan should also be created such that the redundancy of the network
is improved and a business continuity is improved. A plan is needed to be created such that it
covers all the devices and services and recover all the functionality and data in case of any
disaster such that business organisation can increase the reliability of the organization. The
support of the upper level management team is essential for the development of the disaster
recovery plan and the impact of the plan in the current business is also needed to be identified for
the management of critical functions and different operations on different sites. Each of the
employees in the organization an off site data backup and off site recovery plan should be
created. An alternative location should be selected for storing the backup location and remote
location should be used for storing the backup. A contingency plan should be created for
restoring the data and no data should be lost.
For increasing the reliability of the network framework investment should be made on
deployment of high quality routers and switches. The home networking equipment’s cannot
support the growth of the current business and it can be used for growing the network over time.
NETWORK DESIGN FOR SMALL BUSINESS
5. Network Concept
For the development of the network infrastructure for the small business a budget of the
network and the device obligatory for the development of a network solution is needed to be
identified. A design of the network is also needed to be created such that the reliability of the
network is increased and it can be used for allowing multiple users to communicate with
different users connected in the network. A router is deployed in the network for separating the
network and multiple switches are used for enabling interconnectivity between the network
devices and enabling communication between them. The local area network is designed with
network equipment such that it has support for VPN network infrastructure and establish a secure
connection with the remote site. The LAN is need to be designed by analysing the number of
members of the organization and twisted pair cables are used for connecting the host with the
switches and enabling communication between the hosts. The requirement for deployment of a
server and the service that is needed to be configured should be identified prior to the
development of the network. For enabling the user to communicate with email the server should
be configured with SMTP service and active directory should be configured such that the users
accessing the servers can be managed centrally.
A disaster recovery plan should also be created such that the redundancy of the network
is improved and a business continuity is improved. A plan is needed to be created such that it
covers all the devices and services and recover all the functionality and data in case of any
disaster such that business organisation can increase the reliability of the organization. The
support of the upper level management team is essential for the development of the disaster
recovery plan and the impact of the plan in the current business is also needed to be identified for
the management of critical functions and different operations on different sites. Each of the
employees in the organization an off site data backup and off site recovery plan should be
created. An alternative location should be selected for storing the backup location and remote
location should be used for storing the backup. A contingency plan should be created for
restoring the data and no data should be lost.
For increasing the reliability of the network framework investment should be made on
deployment of high quality routers and switches. The home networking equipment’s cannot
support the growth of the current business and it can be used for growing the network over time.

11
NETWORK DESIGN FOR SMALL BUSINESS
The use of high quality device helps in adding new features and functionality in the network and
the features include VoIP, wireless application and integrated messaging service. It should be
made sure that the routers and switches can be easily installed such as the switches having in line
power helps in placing equipment’s anywhere in the building location connecting it with wall
jack. It eliminated the need of installation of additional fitting and outlets for powering on the
network devices. It should be made sure that the network design is created for increasing
redundancy and reliability of the current framework for enabling business continuity and respond
against the unforeseen forecasts.
Here, client server framework is followed for designing the network framework and
connect each of the group in different location of the business organization. For the long distance
communication leased lines are avoided since it adds extra cost for communicating with the
remote branches and instead it is replaced with the VPN technology that would help in using the
public internet connection and encryption to securely transmit the data packets to the remote
location. Same type of topology is used for each of the branches such that the users are familiar
with the network of the remote location and does not face any difficulty while using the network
solution. The users are sub divided into groups according to their patter of usage and needs for
management of access of the resources and sharing of the resources with each other. The
different types of risks and security threats acting on the network framework is analysed for
increasing the network security and keep the sensitive information of the organization safe from
the external agents. Network policy is needed to be developed aligning the needs of the business
for the management of access of the users to different parts of the network. The implementation
of the network policy helps in configuring access control list on the router and manage the access
of the users. The network should be redundant such that the uptime of the network is maximum
and it can respond to the needs of the users at a real time. Intrusion prevention System should be
deployed in the network from increasing the resistance of the network and eliminate the risk of
distributed denial of service, SQL injection, Man in the middle or other types of attacks.
6. Network technology
The network technology that will generally be used for this entire network will be VPN.
Virtual Private Network (VPN) is defined as a technology that helps in improving the online
security as well as privacy. It is found that by using the entire commercial VPN service, it is
NETWORK DESIGN FOR SMALL BUSINESS
The use of high quality device helps in adding new features and functionality in the network and
the features include VoIP, wireless application and integrated messaging service. It should be
made sure that the routers and switches can be easily installed such as the switches having in line
power helps in placing equipment’s anywhere in the building location connecting it with wall
jack. It eliminated the need of installation of additional fitting and outlets for powering on the
network devices. It should be made sure that the network design is created for increasing
redundancy and reliability of the current framework for enabling business continuity and respond
against the unforeseen forecasts.
Here, client server framework is followed for designing the network framework and
connect each of the group in different location of the business organization. For the long distance
communication leased lines are avoided since it adds extra cost for communicating with the
remote branches and instead it is replaced with the VPN technology that would help in using the
public internet connection and encryption to securely transmit the data packets to the remote
location. Same type of topology is used for each of the branches such that the users are familiar
with the network of the remote location and does not face any difficulty while using the network
solution. The users are sub divided into groups according to their patter of usage and needs for
management of access of the resources and sharing of the resources with each other. The
different types of risks and security threats acting on the network framework is analysed for
increasing the network security and keep the sensitive information of the organization safe from
the external agents. Network policy is needed to be developed aligning the needs of the business
for the management of access of the users to different parts of the network. The implementation
of the network policy helps in configuring access control list on the router and manage the access
of the users. The network should be redundant such that the uptime of the network is maximum
and it can respond to the needs of the users at a real time. Intrusion prevention System should be
deployed in the network from increasing the resistance of the network and eliminate the risk of
distributed denial of service, SQL injection, Man in the middle or other types of attacks.
6. Network technology
The network technology that will generally be used for this entire network will be VPN.
Virtual Private Network (VPN) is defined as a technology that helps in improving the online
security as well as privacy. It is found that by using the entire commercial VPN service, it is

12
NETWORK DESIGN FOR SMALL BUSINESS
quite important to connect it to a server in order to properly run by a VPN provider with the help
of encrypted connection. Additionally, all the transferred data between the computer as well as
VPN server must be properly scrambled so that no one else can be able to read it properly. It is
found that this setup has number of different types of consequences which generally result in
improving the internet security. As all the data gets encrypted, all the activity must be hidden
from the internet service provider. In addition to this, it is found that VPN provider helps in
viewing the internet activity so that the VPN should be properly seen as giving proper protection
for the personal information.
When the data gets encrypted then the VPN generally prevents different types of attacks
in which proper adversaries attempt must intercept the data en-route. This is generally considered
to be true when public Wi-Fi hotspot are used which helps in presenting major danger to the
various users of the internet. By using the VPN, it is quite necessary to encrypt the information
so even one connect with evil twin hotspot or the information get intercepted by utilizing the
proper Wi-Fi packet sniffer then the data will be considered to be safe. The IP address must be
hidden within the internet as the VPN server generally act as a proxy between the internet and
the computer. Thus, the malicious websites generally act as a log of the IP address in the VPN
server. Additionally, it is quite necessary to protect the personal information effectively as it is
quite difficult for the adversaries to properly target. In addition to this, utilization of VPN is
considered to be one of the partial solution as website generally utilizes all sorts of the sneaky
methodologies for tracking as well as identifying the visitors. Against all the attacks, VPN will
generally be regarded as one of the important component within a toolkit that generally includes
browser based add-ons including the script blockers as well as anti-tracking tools as well as
advanced cookie managers.
The most important real downside of using the VPN is that is generally slows down the
internet connection quite slightly due to proper processing of the needed power that is generally
required for encrypting as well as decrypting the routing of the data with the help of third party
server. However, this speed generally hits as well as considered as quite noticeable. VPN mainly
ranges from $10 per month as per the data limits as well as session times. When it generally
comes to internet security as well as one click solutions. By using the VPN, one of the best way
to properly protect oneself while remaining online.
NETWORK DESIGN FOR SMALL BUSINESS
quite important to connect it to a server in order to properly run by a VPN provider with the help
of encrypted connection. Additionally, all the transferred data between the computer as well as
VPN server must be properly scrambled so that no one else can be able to read it properly. It is
found that this setup has number of different types of consequences which generally result in
improving the internet security. As all the data gets encrypted, all the activity must be hidden
from the internet service provider. In addition to this, it is found that VPN provider helps in
viewing the internet activity so that the VPN should be properly seen as giving proper protection
for the personal information.
When the data gets encrypted then the VPN generally prevents different types of attacks
in which proper adversaries attempt must intercept the data en-route. This is generally considered
to be true when public Wi-Fi hotspot are used which helps in presenting major danger to the
various users of the internet. By using the VPN, it is quite necessary to encrypt the information
so even one connect with evil twin hotspot or the information get intercepted by utilizing the
proper Wi-Fi packet sniffer then the data will be considered to be safe. The IP address must be
hidden within the internet as the VPN server generally act as a proxy between the internet and
the computer. Thus, the malicious websites generally act as a log of the IP address in the VPN
server. Additionally, it is quite necessary to protect the personal information effectively as it is
quite difficult for the adversaries to properly target. In addition to this, utilization of VPN is
considered to be one of the partial solution as website generally utilizes all sorts of the sneaky
methodologies for tracking as well as identifying the visitors. Against all the attacks, VPN will
generally be regarded as one of the important component within a toolkit that generally includes
browser based add-ons including the script blockers as well as anti-tracking tools as well as
advanced cookie managers.
The most important real downside of using the VPN is that is generally slows down the
internet connection quite slightly due to proper processing of the needed power that is generally
required for encrypting as well as decrypting the routing of the data with the help of third party
server. However, this speed generally hits as well as considered as quite noticeable. VPN mainly
ranges from $10 per month as per the data limits as well as session times. When it generally
comes to internet security as well as one click solutions. By using the VPN, one of the best way
to properly protect oneself while remaining online.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13
NETWORK DESIGN FOR SMALL BUSINESS
VPN is considered as one of the great tool that is mainly utilized for protecting the
privacy as well as for increasing the security on the internet. It basically helps in connecting two
types of computers quite securely as well as privately on the internet. It is found that a VPN is
generally designed in order to provide proper secure as well as encrypted tunnel for transmitting
the data between the company network as well as the remote user. The information that is
generally transmitted between the two different locations with the help of the encrypted tunnel
cannot be properly ready as the entire system generally contains number of elements for securing
the private network of the company and outside network which is generally connected by the
network user.
It is found that VPN helps in adding proper layer of privacy as well as security to both the
public as well as private networks with the help of Wi-Fi hotspots. As the entire time progresses,
then the advantage or benefit of VPN is generally realized by the users than other companies as
well as organizations. It is found that both the companies as well as organizations that utilizes
VPN for communicating confidentially over the entire public network for sending voice as well
as videos and data. It is also considered as one of the important option for the remote
organizations as well as workers that have global offices and partners for sharing data
effectively. Moreover, the personal users can be able to use VPN for increasing security as well
as privacy for accessing the various streaming channels as well as similar types of services
everywhere in order to properly protect the identity anywhere on the internet.
VPN is considered as one of the secure solution that helps in allowing the users for
sending as well as receiving data with the help of proper internet service by maintaining the
privacy as well as confidentiality of the data depending on the encryption level. It is found to be
necessary for the security need of the people specially while sending data over the network. The
VPN technology helps in increasing security, assist in enhancing productivity of the company,
helps in sharing files as well as assists in unblocking website as well as helps in bypassing filters.
Moreover, it is found that IP address can be changed with the help of VPN and it also helps in
improving performance by reducing the maintenance costs.
Public networks are generally considered as a real threat. The private networks are
generally not considered safe as the internet service provider can be able to track the activities
and therefore it is quite necessary for the VPN to properly encrypt the traffic while the browsing
NETWORK DESIGN FOR SMALL BUSINESS
VPN is considered as one of the great tool that is mainly utilized for protecting the
privacy as well as for increasing the security on the internet. It basically helps in connecting two
types of computers quite securely as well as privately on the internet. It is found that a VPN is
generally designed in order to provide proper secure as well as encrypted tunnel for transmitting
the data between the company network as well as the remote user. The information that is
generally transmitted between the two different locations with the help of the encrypted tunnel
cannot be properly ready as the entire system generally contains number of elements for securing
the private network of the company and outside network which is generally connected by the
network user.
It is found that VPN helps in adding proper layer of privacy as well as security to both the
public as well as private networks with the help of Wi-Fi hotspots. As the entire time progresses,
then the advantage or benefit of VPN is generally realized by the users than other companies as
well as organizations. It is found that both the companies as well as organizations that utilizes
VPN for communicating confidentially over the entire public network for sending voice as well
as videos and data. It is also considered as one of the important option for the remote
organizations as well as workers that have global offices and partners for sharing data
effectively. Moreover, the personal users can be able to use VPN for increasing security as well
as privacy for accessing the various streaming channels as well as similar types of services
everywhere in order to properly protect the identity anywhere on the internet.
VPN is considered as one of the secure solution that helps in allowing the users for
sending as well as receiving data with the help of proper internet service by maintaining the
privacy as well as confidentiality of the data depending on the encryption level. It is found to be
necessary for the security need of the people specially while sending data over the network. The
VPN technology helps in increasing security, assist in enhancing productivity of the company,
helps in sharing files as well as assists in unblocking website as well as helps in bypassing filters.
Moreover, it is found that IP address can be changed with the help of VPN and it also helps in
improving performance by reducing the maintenance costs.
Public networks are generally considered as a real threat. The private networks are
generally not considered safe as the internet service provider can be able to track the activities
and therefore it is quite necessary for the VPN to properly encrypt the traffic while the browsing

14
NETWORK DESIGN FOR SMALL BUSINESS
is completed on the network bypassing geo- restrictions for saving some of the bucks while
buying the tickets of the plane. In the coming future, the VPN will be helpful in providing free
VPN trial, speed, proper connectivity and reliability as well as apps compatible with different
types of operating systems. One of the main purpose of the VPN is to keep the online activities
way from the third party. Selection of proper VPN service which generally has a transparent way
of saying or doing something for making it away from the entire connection logs. Therefore, it is
quite necessary to check the privacy related policies first. In addition to this, it is also necessary
to make sure that safe connection must be dropped for buying the service of VPN. Moreover, the
utilization of VPN is considered to be quite beneficial for improving the internet connectivity.
7. Network Operating System
Network operating system is referred to as a computer Operating System (OS) that is
mainly intended to support the workstation, individual computer as well elder fatal those are
connected on a Local Area Network (LAN). The Operating System (OS) generally helps in
providing printer sharing, database sharing, common file system as well as the ability of
managing the entire network name directory, security as well as other aspects of housekeeping of
the network. It is found that a network operating system helps in providing number of services
to the clients over the entire network. Both the server and the peer to peer networking models
mainly utilizes proper network operating system for handling the duties of the network.
The role of the file server is that it is most commonly deployed for the computers that
generally run under the Server of 2012. It is found that every organization that general have
Windows clients OSs have at least one server that mainly functions as one of the file server.
With the help of Server 2012, Microsoft generally works in order to improve the Server Message
Block Protocol. The file server that runs Server 2012 can generally handle more number of
clients in comparison to the file server that runs Server 2008 R2. Additionally, to the
improvement of the SMB protocol, it is identified that Server 2012 helps in supporting storage
spaces that allows the technology for creating flexibility as well as fault tolerant drives that uses
multiple disks. Moreover, the storage spaces are generally built into the operating system so that
one does not need to add any roles as well as features for utilizing them.
SQL server is one of the prerequisite within the Microsoft products that generally
includes the Microsoft System Centre suite as well as the SharePoint 2013. The SQL Server
NETWORK DESIGN FOR SMALL BUSINESS
is completed on the network bypassing geo- restrictions for saving some of the bucks while
buying the tickets of the plane. In the coming future, the VPN will be helpful in providing free
VPN trial, speed, proper connectivity and reliability as well as apps compatible with different
types of operating systems. One of the main purpose of the VPN is to keep the online activities
way from the third party. Selection of proper VPN service which generally has a transparent way
of saying or doing something for making it away from the entire connection logs. Therefore, it is
quite necessary to check the privacy related policies first. In addition to this, it is also necessary
to make sure that safe connection must be dropped for buying the service of VPN. Moreover, the
utilization of VPN is considered to be quite beneficial for improving the internet connectivity.
7. Network Operating System
Network operating system is referred to as a computer Operating System (OS) that is
mainly intended to support the workstation, individual computer as well elder fatal those are
connected on a Local Area Network (LAN). The Operating System (OS) generally helps in
providing printer sharing, database sharing, common file system as well as the ability of
managing the entire network name directory, security as well as other aspects of housekeeping of
the network. It is found that a network operating system helps in providing number of services
to the clients over the entire network. Both the server and the peer to peer networking models
mainly utilizes proper network operating system for handling the duties of the network.
The role of the file server is that it is most commonly deployed for the computers that
generally run under the Server of 2012. It is found that every organization that general have
Windows clients OSs have at least one server that mainly functions as one of the file server.
With the help of Server 2012, Microsoft generally works in order to improve the Server Message
Block Protocol. The file server that runs Server 2012 can generally handle more number of
clients in comparison to the file server that runs Server 2008 R2. Additionally, to the
improvement of the SMB protocol, it is identified that Server 2012 helps in supporting storage
spaces that allows the technology for creating flexibility as well as fault tolerant drives that uses
multiple disks. Moreover, the storage spaces are generally built into the operating system so that
one does not need to add any roles as well as features for utilizing them.
SQL server is one of the prerequisite within the Microsoft products that generally
includes the Microsoft System Centre suite as well as the SharePoint 2013. The SQL Server

15
NETWORK DESIGN FOR SMALL BUSINESS
2012 can be installed with the Service Pack on the computers that runs both the GUI as well as
Server Core versions of Server 2012. SQL Server helps in supporting the utilization of managed
service accounts as well as virtual accounts that further defaults the virtual accounts when it is
properly installed within the Server 2012.
Exchange 2013 can be installed on the running servers of the computers 2008 R2 or
Server 2012. In order to prepare AD in context to exchange deployment 2013, it is quite
significant to have the .NET framework 4.5 as well as Window management 3.0 must be
accurately installed. It is also necessary to properly deploy the AD directory Services that are
generally related with the Remote Server Administration Tools. This type of tools can get
installed by utilizing the tools such as Add Roles and Features Wizard through proper execution
of the PowerShell command. Exchange 2013 generally needs the Scheme master, one DC as
well as GC server in each of the site that runs on the Windows Server 2003. It is found that it is
quite fair to assume that one needs to think about the deployment Exchange 2013 on Server 2012
so that the infrastructure of the organization generally meets the various requirements.
After the components like Microsoft Office 2010 Filter Pack, Microsoft Office 2010
Filter Pack SP1 as well as Microsoft Unified Communication managed API 4.0 then one can
install Exchange 2013 by using number of different steps. It is quite important to un Setup from
the entire installation media. One will be promoted properly for checking the updated installation
file for agreeing on the license agreement to decide whether proper feedback is required to be
provided to the Microsoft or not. On the other hand in the page called Server role selection, it is
very much necessary to select whether the installation of a mailbox server role or entire Client
access server role. It is necessary to configure accurately the routine of Exchange 2013 of
installation in order to automatically install the roles as well as features which are generally
needed for supporting the Conversation although it is quite well to do the prior to the installation
routine. It is quite necessary to properly prompt the location of the Exchange installation files in
order to select a name for the Exchange organization. One need to select proper AD split
permission, if one needs to separate the entire administration of AD as well as Exchange. It is
quite necessary to disable the native malware scanning and then it is quite necessary to perform
proper perquisite check as well as analysis. After these checks are generally passed then one
desires to install Exchange 2013. As soon as AD directory Service Remote Administration Tools
NETWORK DESIGN FOR SMALL BUSINESS
2012 can be installed with the Service Pack on the computers that runs both the GUI as well as
Server Core versions of Server 2012. SQL Server helps in supporting the utilization of managed
service accounts as well as virtual accounts that further defaults the virtual accounts when it is
properly installed within the Server 2012.
Exchange 2013 can be installed on the running servers of the computers 2008 R2 or
Server 2012. In order to prepare AD in context to exchange deployment 2013, it is quite
significant to have the .NET framework 4.5 as well as Window management 3.0 must be
accurately installed. It is also necessary to properly deploy the AD directory Services that are
generally related with the Remote Server Administration Tools. This type of tools can get
installed by utilizing the tools such as Add Roles and Features Wizard through proper execution
of the PowerShell command. Exchange 2013 generally needs the Scheme master, one DC as
well as GC server in each of the site that runs on the Windows Server 2003. It is found that it is
quite fair to assume that one needs to think about the deployment Exchange 2013 on Server 2012
so that the infrastructure of the organization generally meets the various requirements.
After the components like Microsoft Office 2010 Filter Pack, Microsoft Office 2010
Filter Pack SP1 as well as Microsoft Unified Communication managed API 4.0 then one can
install Exchange 2013 by using number of different steps. It is quite important to un Setup from
the entire installation media. One will be promoted properly for checking the updated installation
file for agreeing on the license agreement to decide whether proper feedback is required to be
provided to the Microsoft or not. On the other hand in the page called Server role selection, it is
very much necessary to select whether the installation of a mailbox server role or entire Client
access server role. It is necessary to configure accurately the routine of Exchange 2013 of
installation in order to automatically install the roles as well as features which are generally
needed for supporting the Conversation although it is quite well to do the prior to the installation
routine. It is quite necessary to properly prompt the location of the Exchange installation files in
order to select a name for the Exchange organization. One need to select proper AD split
permission, if one needs to separate the entire administration of AD as well as Exchange. It is
quite necessary to disable the native malware scanning and then it is quite necessary to perform
proper perquisite check as well as analysis. After these checks are generally passed then one
desires to install Exchange 2013. As soon as AD directory Service Remote Administration Tools
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16
NETWORK DESIGN FOR SMALL BUSINESS
are properly connected then preparation of AD prior to the deployment will generally occur
automatically. As soon as the installation procedure gets completed, one needs to verify the
installation success by utilizing proper web browser for navigating the Exchange administrative
Centre. As the web browser is utilized for managing the Exchange 2013 then it is necessary to
pin a Exchange Administrative Centre based Website for addressing to the complete taskbar of
the system on which properly the Exchange 2013 is installed.
There are number of different ways that are utilized for installing the SharePoint 2013.
One of the most simple way for installing the server to utilize the built-in database. The
SharePoint tools are product preparation based tools that generally installs number of roles,
landscapes as well as additional software. This tool can be run with the help of
prerequisiteinstaller.exe from the different root folder of share point 2013 connection media. If
the copes of the needed server files in addition to the various features as well as roles then the
SQL Server 2008 R2 SP1 native customer. Furthermore, proper internet connection is generally
required in order to run the tools quite effectively. The preparation based tool will usually endure
for running after a reboot pending all the prerequisites have been properly enabled or installed.
After all different types of prerequisite components must be installed properly, it is ver
much important to properly install the SharePoint Server 2013 by performing number of
different types of steps. First of all, it is quite important to provide the SharePoint 2013 product
key properly for agreeing to the various terms of the license. It is quite important to select
complete as well as proper standalone installation. Furthermore, installation of local example of
SQL Server 2008 R2 Express along with SP1 must be optional for the proper productive
environment. After the entire procedure of installation is complete, then it is quite necessary for
running the entire SharePoint Product Shape Wizard. This Wizard is generally launched through
avoidance while you properly finish an installation wizard.
After running a configuration wizard properly by situation the deployment of SharePoint
2013, it is quite necessary to generate a new farm for server. Specification about location of a
database name as well as the account of the operator which generally have proper administrative
permission. In addition to this, it is quite important to configure a farm paraphrase properly.
Once the passphrase is used then one needs in order to join the new servers within the SharePoint
2013 farm. Furthermore, the configuration of the SharePoint Central Administration Web
NETWORK DESIGN FOR SMALL BUSINESS
are properly connected then preparation of AD prior to the deployment will generally occur
automatically. As soon as the installation procedure gets completed, one needs to verify the
installation success by utilizing proper web browser for navigating the Exchange administrative
Centre. As the web browser is utilized for managing the Exchange 2013 then it is necessary to
pin a Exchange Administrative Centre based Website for addressing to the complete taskbar of
the system on which properly the Exchange 2013 is installed.
There are number of different ways that are utilized for installing the SharePoint 2013.
One of the most simple way for installing the server to utilize the built-in database. The
SharePoint tools are product preparation based tools that generally installs number of roles,
landscapes as well as additional software. This tool can be run with the help of
prerequisiteinstaller.exe from the different root folder of share point 2013 connection media. If
the copes of the needed server files in addition to the various features as well as roles then the
SQL Server 2008 R2 SP1 native customer. Furthermore, proper internet connection is generally
required in order to run the tools quite effectively. The preparation based tool will usually endure
for running after a reboot pending all the prerequisites have been properly enabled or installed.
After all different types of prerequisite components must be installed properly, it is ver
much important to properly install the SharePoint Server 2013 by performing number of
different types of steps. First of all, it is quite important to provide the SharePoint 2013 product
key properly for agreeing to the various terms of the license. It is quite important to select
complete as well as proper standalone installation. Furthermore, installation of local example of
SQL Server 2008 R2 Express along with SP1 must be optional for the proper productive
environment. After the entire procedure of installation is complete, then it is quite necessary for
running the entire SharePoint Product Shape Wizard. This Wizard is generally launched through
avoidance while you properly finish an installation wizard.
After running a configuration wizard properly by situation the deployment of SharePoint
2013, it is quite necessary to generate a new farm for server. Specification about location of a
database name as well as the account of the operator which generally have proper administrative
permission. In addition to this, it is quite important to configure a farm paraphrase properly.
Once the passphrase is used then one needs in order to join the new servers within the SharePoint
2013 farm. Furthermore, the configuration of the SharePoint Central Administration Web

17
NETWORK DESIGN FOR SMALL BUSINESS
Application page generally allows one to be selected at random. It is quite necessary to select
between BTLM as well as Kerberos authentication with NTLM which is considered as the
default value. After the completion of the configuration, it is quite important to connect the
SharePoint Central Administration website to complete the configuration of a SharePoint 2013.
8. Internet Server Management
The server is deployed in the current network for allowing the different user connected in
the network to manage different service. The client issues a server request and a response is
generated for serving the needs of the user. The server deployed in the current network can be
configured as a file server for sharing of files and information between a group of users
connected in the current network framework. Apart from file server there are data server, email
server and WEB server that can be deployed for management of different service and request of
the user. While deploying the server the security of the server should be considered because it
can be illegally accessed by a third party agent to access the information residing in the server
and compromise of the security of the current network framework. Threats can be received by
the server from different network location and the attacker mainly focuses on breaching the
security and misusing the data on the server. It is the responsibility of the network administrator
to increase the security of the server and manage permission for the users to access the services
configured for increasing the efficiency of the network. No authorised access should be allowed
on the server because it can damage the functionality of application and data that are currently
configured on the server.
A virtual directory can be created on the server from the IIS manager and the client server
model should be created for increasing the efficiency of the network. A website must be created
from the IIS service and a virtual directory should be created for enabling directory browsing. A
test case should be created for testing the configuration and connectivity of the server and
resolving different issues associated with the development of the client server architecture. The
online availability of the server should also be tested and the server should always be available to
the user for serving different needs. The server is needed to be accessed from external
environment such that it can be access from the resource available from the web server utilizing
the other environment. The users and the groups should be managed and different actions are
NETWORK DESIGN FOR SMALL BUSINESS
Application page generally allows one to be selected at random. It is quite necessary to select
between BTLM as well as Kerberos authentication with NTLM which is considered as the
default value. After the completion of the configuration, it is quite important to connect the
SharePoint Central Administration website to complete the configuration of a SharePoint 2013.
8. Internet Server Management
The server is deployed in the current network for allowing the different user connected in
the network to manage different service. The client issues a server request and a response is
generated for serving the needs of the user. The server deployed in the current network can be
configured as a file server for sharing of files and information between a group of users
connected in the current network framework. Apart from file server there are data server, email
server and WEB server that can be deployed for management of different service and request of
the user. While deploying the server the security of the server should be considered because it
can be illegally accessed by a third party agent to access the information residing in the server
and compromise of the security of the current network framework. Threats can be received by
the server from different network location and the attacker mainly focuses on breaching the
security and misusing the data on the server. It is the responsibility of the network administrator
to increase the security of the server and manage permission for the users to access the services
configured for increasing the efficiency of the network. No authorised access should be allowed
on the server because it can damage the functionality of application and data that are currently
configured on the server.
A virtual directory can be created on the server from the IIS manager and the client server
model should be created for increasing the efficiency of the network. A website must be created
from the IIS service and a virtual directory should be created for enabling directory browsing. A
test case should be created for testing the configuration and connectivity of the server and
resolving different issues associated with the development of the client server architecture. The
online availability of the server should also be tested and the server should always be available to
the user for serving different needs. The server is needed to be accessed from external
environment such that it can be access from the resource available from the web server utilizing
the other environment. The users and the groups should be managed and different actions are

18
NETWORK DESIGN FOR SMALL BUSINESS
performed by providing rights and permission for the local groups and users. The users should be
provided with rights to perform certain action that is associated with the object.
9. IP addresses
Major Network: 170.16.8.0/22
Available IP addresses in major network: 1022
Number of IP addresses needed: 400
Available IP addresses in allocated subnets: 506
About 50% of available major network address space is used
About 79% of subnetted network address space is used
Subnet
Name
Neede
d Size
Allocat
ed Size
Address Mas
k
Dec Mask Assignabl
e Range
Broadcast
London 200 254 170.16.8.0 /24 255.255.255.
0
170.16.8.1
-
170.16.8.2
54
170.16.8.2
55
Birmingh
am
100 126 170.16.9.0 /25 255.255.255.
128
170.16.9.1
-
170.16.9.1
26
170.16.9.1
27
Manchest
er
100 126 170.16.9.1
28
/25 255.255.255.
128
170.16.9.1
29 -
170.16.9.2
170.16.9.2
55
NETWORK DESIGN FOR SMALL BUSINESS
performed by providing rights and permission for the local groups and users. The users should be
provided with rights to perform certain action that is associated with the object.
9. IP addresses
Major Network: 170.16.8.0/22
Available IP addresses in major network: 1022
Number of IP addresses needed: 400
Available IP addresses in allocated subnets: 506
About 50% of available major network address space is used
About 79% of subnetted network address space is used
Subnet
Name
Neede
d Size
Allocat
ed Size
Address Mas
k
Dec Mask Assignabl
e Range
Broadcast
London 200 254 170.16.8.0 /24 255.255.255.
0
170.16.8.1
-
170.16.8.2
54
170.16.8.2
55
Birmingh
am
100 126 170.16.9.0 /25 255.255.255.
128
170.16.9.1
-
170.16.9.1
26
170.16.9.1
27
Manchest
er
100 126 170.16.9.1
28
/25 255.255.255.
128
170.16.9.1
29 -
170.16.9.2
170.16.9.2
55
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

19
NETWORK DESIGN FOR SMALL BUSINESS
54
London Network
Major Network: 170.16.8.0/24
Available IP addresses in major network: 254
Number of IP addresses needed: 200
Available IP addresses in allocated subnets: 250
About 100% of available major network address space is used
About 80% of subnetted network address space is used
Subnet
Name
Neede
d Size
Allocat
ed Size
Address Mas
k
Dec Mask Assignabl
e Range
Broadcast
Departme
nt 1
100 126 170.16.8.0 /25 255.255.255.1
28
170.16.8.1
-
170.16.8.1
26
170.16.8.1
27
Departme
nt 2
50 62 170.16.8.1
28
/26 255.255.255.1
92
170.16.8.1
29 -
170.16.8.1
90
170.16.8.1
91
Departme
nt 3
50 62 170.16.8.1
92
/26 255.255.255.1
92
170.16.8.1
93 -
170.16.8.2
170.16.8.2
55
NETWORK DESIGN FOR SMALL BUSINESS
54
London Network
Major Network: 170.16.8.0/24
Available IP addresses in major network: 254
Number of IP addresses needed: 200
Available IP addresses in allocated subnets: 250
About 100% of available major network address space is used
About 80% of subnetted network address space is used
Subnet
Name
Neede
d Size
Allocat
ed Size
Address Mas
k
Dec Mask Assignabl
e Range
Broadcast
Departme
nt 1
100 126 170.16.8.0 /25 255.255.255.1
28
170.16.8.1
-
170.16.8.1
26
170.16.8.1
27
Departme
nt 2
50 62 170.16.8.1
28
/26 255.255.255.1
92
170.16.8.1
29 -
170.16.8.1
90
170.16.8.1
91
Departme
nt 3
50 62 170.16.8.1
92
/26 255.255.255.1
92
170.16.8.1
93 -
170.16.8.2
170.16.8.2
55

20
NETWORK DESIGN FOR SMALL BUSINESS
54
Birmingham Network
Major Network: 170.16.9.0/25
Available IP addresses in major network: 126
Number of IP addresses needed: 100
Available IP addresses in allocated subnets: 124
About 100% of available major network address space is used
About 81% of subnetted network address space is used
Subnet
Name
Neede
d Size
Allocate
d Size
Address Mas
k
Dec Mask Assignabl
e Range
Broadcast
Departme
nt 1
50 62 170.16.9.
0
/26 255.255.255.1
92
170.16.9.1
-
170.16.9.6
2
170.16.9.6
3
Departme
nt 2
50 62 170.16.9.
64
/26 255.255.255.1
92
170.16.9.6
5 -
170.16.9.1
26
170.16.9.1
27
Manchester Network
Major Network: 170.16.9.128/25
NETWORK DESIGN FOR SMALL BUSINESS
54
Birmingham Network
Major Network: 170.16.9.0/25
Available IP addresses in major network: 126
Number of IP addresses needed: 100
Available IP addresses in allocated subnets: 124
About 100% of available major network address space is used
About 81% of subnetted network address space is used
Subnet
Name
Neede
d Size
Allocate
d Size
Address Mas
k
Dec Mask Assignabl
e Range
Broadcast
Departme
nt 1
50 62 170.16.9.
0
/26 255.255.255.1
92
170.16.9.1
-
170.16.9.6
2
170.16.9.6
3
Departme
nt 2
50 62 170.16.9.
64
/26 255.255.255.1
92
170.16.9.6
5 -
170.16.9.1
26
170.16.9.1
27
Manchester Network
Major Network: 170.16.9.128/25

21
NETWORK DESIGN FOR SMALL BUSINESS
Available IP addresses in major network: 126
Number of IP addresses needed: 100
Available IP addresses in allocated subnets: 124
About 100% of available major network address space is used
About 81% of subnetted network address space is used
Subnet
Name
Neede
d Size
Allocat
ed Size
Address Mas
k
Dec Mask Assignabl
e Range
Broadcast
Departme
nt 1
50 62 170.16.9.1
28
/26 255.255.255.1
92
170.16.9.1
29 -
170.16.9.1
90
170.16.9.1
91
Departme
nt 2
50 62 170.16.9.1
92
/26 255.255.255.1
92
170.16.9.1
93 -
170.16.9.2
54
170.16.9.2
55
10. Security
The network device installed in the network should be configured with password such
that the configuration of the router and the other network device cannot be changed and the
network is secured from the external agents. A firewall is needed to be deployed at the entrance
of the network for management of the inbound and outbound network traffic and improve the
network security. The wireless access point deployed in the network should be designed to
protect the usability and integrity of the network and manage the access of the network for the
different users in the business. A variety of threats and vulnerability in the network should be
NETWORK DESIGN FOR SMALL BUSINESS
Available IP addresses in major network: 126
Number of IP addresses needed: 100
Available IP addresses in allocated subnets: 124
About 100% of available major network address space is used
About 81% of subnetted network address space is used
Subnet
Name
Neede
d Size
Allocat
ed Size
Address Mas
k
Dec Mask Assignabl
e Range
Broadcast
Departme
nt 1
50 62 170.16.9.1
28
/26 255.255.255.1
92
170.16.9.1
29 -
170.16.9.1
90
170.16.9.1
91
Departme
nt 2
50 62 170.16.9.1
92
/26 255.255.255.1
92
170.16.9.1
93 -
170.16.9.2
54
170.16.9.2
55
10. Security
The network device installed in the network should be configured with password such
that the configuration of the router and the other network device cannot be changed and the
network is secured from the external agents. A firewall is needed to be deployed at the entrance
of the network for management of the inbound and outbound network traffic and improve the
network security. The wireless access point deployed in the network should be designed to
protect the usability and integrity of the network and manage the access of the network for the
different users in the business. A variety of threats and vulnerability in the network should be
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

22
NETWORK DESIGN FOR SMALL BUSINESS
identified and the network should be developed for protecting the usability and integrity of the
network and data including software and hardware technology. The multiple layers of defines as
the network edge should be combined with the implementation of different policies and controls.
The authorised users should be allowed to gain access of the network resources and the
malicious actors should be blocked from carrying exploits and threats. The implementation of the
network security is a challenging process but it can help in protecting the proprietary information
from different types of network attacks. The network security is of different types such as:
Access control – It is used for restricting a number of users to access the network and
keep the potential attacker out of the network. Each of the network device and the users are
needed to be known for enforcing the security policy and blocking the non-compliant network
device.
Antivirus and antimalware software – It includes Trojans, malwares, viruses that can
infect the network and make it dormant for a limited period of time. The antimalware programs
are needed to be implemented for continuously scanning the entry of malware and track the
affected files afterwards for finding anomaly, fixing the damage and removing the malware.
Application Security – The business software that are used for the management of
business operation is needed to be protected from different vulnerabilities. The application may
contain bugs and holes that can be used by the attacker to reach the different sources of the
network. The security of the application contains the software, hardware and the different
procedures that are used for removal of the bugs and holes.
Behavioural analytics – It is used for detecting the abnormal behaviour of the network
and the tool automatically differentiate the activity from the set of rules defined to identify the
abnormal behaviour. The network security team can thus pose a remedy to the identified problem
and eliminate the threats acting on the network.
Prevention of data loss – It should be ensured that the staffs should not send any
organizational data outside of the network. The implementation of data loss prevention restricts
the employees or users of the network from uploading, forwarding and printing the sensitive
information in the network.
NETWORK DESIGN FOR SMALL BUSINESS
identified and the network should be developed for protecting the usability and integrity of the
network and data including software and hardware technology. The multiple layers of defines as
the network edge should be combined with the implementation of different policies and controls.
The authorised users should be allowed to gain access of the network resources and the
malicious actors should be blocked from carrying exploits and threats. The implementation of the
network security is a challenging process but it can help in protecting the proprietary information
from different types of network attacks. The network security is of different types such as:
Access control – It is used for restricting a number of users to access the network and
keep the potential attacker out of the network. Each of the network device and the users are
needed to be known for enforcing the security policy and blocking the non-compliant network
device.
Antivirus and antimalware software – It includes Trojans, malwares, viruses that can
infect the network and make it dormant for a limited period of time. The antimalware programs
are needed to be implemented for continuously scanning the entry of malware and track the
affected files afterwards for finding anomaly, fixing the damage and removing the malware.
Application Security – The business software that are used for the management of
business operation is needed to be protected from different vulnerabilities. The application may
contain bugs and holes that can be used by the attacker to reach the different sources of the
network. The security of the application contains the software, hardware and the different
procedures that are used for removal of the bugs and holes.
Behavioural analytics – It is used for detecting the abnormal behaviour of the network
and the tool automatically differentiate the activity from the set of rules defined to identify the
abnormal behaviour. The network security team can thus pose a remedy to the identified problem
and eliminate the threats acting on the network.
Prevention of data loss – It should be ensured that the staffs should not send any
organizational data outside of the network. The implementation of data loss prevention restricts
the employees or users of the network from uploading, forwarding and printing the sensitive
information in the network.

23
NETWORK DESIGN FOR SMALL BUSINESS
Email Security – The email gateways are vulnerable to security breaches and the attacker
can use the personal information or social engineering methodology for creating sophisticated
phishing platform and attract the user to receive the malware from the site. The implementation
of email security application helps in blocking the incoming attacks and controls the outbound
message for preventing loss of sensitive data and information.
Intrusion Prevention System – This types of systems are designed to scan the network
traffic and actively blocking the attacks. The deployment of Cisco Next Generation IPS
appliances can be used for correlating the huge global threat intelligence for blocking the
malicious activity and tracking the progression of the suspicious files and malwares in the
network and prevent its spread, infection or outbreaks in the current organizational network.
Mobile Device Security – The mobile device that are connected with the organizational
network with the means of wireless access point can also be targeted by the cybercriminals. Thus
it is essential to control which devices can be access by the network and the network should be
configured accordingly for keeping the data traffic private.
Network Segmentation – The network traffic is needed to be classified for the
enforcement of the network security policies easily. The segmentation and classification should
be dependent on the identity of endpoint and access rights should be assigned depending on
roles, location and other criteria. The right level of access should be given to the right people
depending on roles and service needed by the user and the suspicious devices should be
remediated.
Security information and event Management – There are different security information
and event management products that can be implemented for responding against the threats and
identification of the vulnerability. The device can be of different forms such as virtual, server or
physical appliances.
VPN – It is used for encrypting the connection between the endpoints communicating in
the network using the internet. SSL or IPSec protocol is used for the establishment of the secure
connection and authenticating the user for establishing communication between the network and
different device.
NETWORK DESIGN FOR SMALL BUSINESS
Email Security – The email gateways are vulnerable to security breaches and the attacker
can use the personal information or social engineering methodology for creating sophisticated
phishing platform and attract the user to receive the malware from the site. The implementation
of email security application helps in blocking the incoming attacks and controls the outbound
message for preventing loss of sensitive data and information.
Intrusion Prevention System – This types of systems are designed to scan the network
traffic and actively blocking the attacks. The deployment of Cisco Next Generation IPS
appliances can be used for correlating the huge global threat intelligence for blocking the
malicious activity and tracking the progression of the suspicious files and malwares in the
network and prevent its spread, infection or outbreaks in the current organizational network.
Mobile Device Security – The mobile device that are connected with the organizational
network with the means of wireless access point can also be targeted by the cybercriminals. Thus
it is essential to control which devices can be access by the network and the network should be
configured accordingly for keeping the data traffic private.
Network Segmentation – The network traffic is needed to be classified for the
enforcement of the network security policies easily. The segmentation and classification should
be dependent on the identity of endpoint and access rights should be assigned depending on
roles, location and other criteria. The right level of access should be given to the right people
depending on roles and service needed by the user and the suspicious devices should be
remediated.
Security information and event Management – There are different security information
and event management products that can be implemented for responding against the threats and
identification of the vulnerability. The device can be of different forms such as virtual, server or
physical appliances.
VPN – It is used for encrypting the connection between the endpoints communicating in
the network using the internet. SSL or IPSec protocol is used for the establishment of the secure
connection and authenticating the user for establishing communication between the network and
different device.

24
NETWORK DESIGN FOR SMALL BUSINESS
Web Security – The web security solution can also be deployed in the current network
solution for creating an internal network framework and deny access of the users to access the
malicious threats. It can also protect the web gateway and helps in protecting the website of the
organization.
Wireless Security – Wireless network is also vulnerable and it needs some security
measures for restricting the unknown users to access the wireless signal. The exploitation of the
wireless network can be prevented by application of encryption algorithm and keeping the
wireless network in separate VLAN such that users using the wireless network should not reach
the core network of the organization.
The security of management of IIS service is essential for authenticating the user and
establish a secure connection with SSL encryption for allowing the IIS to identify the client
based on the personal information. Certificates are used by the IIS for allowing the client, server
depending on the information of server certificate. Four different methodology provides separate
feature for selection of a type of authentication depending on the requirement of the small
business. A basic authentication is necessary for enabling transmission of a clear text and
increasing the security of the network framework. Digest authentication based on windows
domain server should be used for sending the password in encrypted format over the network.
Encryption of the password generates hash values and increases the network security. The
methodology of accessing and granting permission to the IIS server can be changed and it should
be dependent on the requirement of the current business.
11. Conclusion
From the above report it can be concluded that with the development of the network
solution for the small business the organization would be benefitted because it would reduce the
cost of communication. The network would help the organization to reach to the remote client
and manage the business operation from a central location. The needs to manually handle the
business information would be eliminated and more number of customer can be server data a
time increasing the possibility of future growth of the organization. The success of the network
depends on the elimination of threats and vulnerability and securing the organizational inform
from the external threats acting on the network. A policy is needed to be created along with a
backup plan for the management of the accessibility of the network and ensuring that no data is
NETWORK DESIGN FOR SMALL BUSINESS
Web Security – The web security solution can also be deployed in the current network
solution for creating an internal network framework and deny access of the users to access the
malicious threats. It can also protect the web gateway and helps in protecting the website of the
organization.
Wireless Security – Wireless network is also vulnerable and it needs some security
measures for restricting the unknown users to access the wireless signal. The exploitation of the
wireless network can be prevented by application of encryption algorithm and keeping the
wireless network in separate VLAN such that users using the wireless network should not reach
the core network of the organization.
The security of management of IIS service is essential for authenticating the user and
establish a secure connection with SSL encryption for allowing the IIS to identify the client
based on the personal information. Certificates are used by the IIS for allowing the client, server
depending on the information of server certificate. Four different methodology provides separate
feature for selection of a type of authentication depending on the requirement of the small
business. A basic authentication is necessary for enabling transmission of a clear text and
increasing the security of the network framework. Digest authentication based on windows
domain server should be used for sending the password in encrypted format over the network.
Encryption of the password generates hash values and increases the network security. The
methodology of accessing and granting permission to the IIS server can be changed and it should
be dependent on the requirement of the current business.
11. Conclusion
From the above report it can be concluded that with the development of the network
solution for the small business the organization would be benefitted because it would reduce the
cost of communication. The network would help the organization to reach to the remote client
and manage the business operation from a central location. The needs to manually handle the
business information would be eliminated and more number of customer can be server data a
time increasing the possibility of future growth of the organization. The success of the network
depends on the elimination of threats and vulnerability and securing the organizational inform
from the external threats acting on the network. A policy is needed to be created along with a
backup plan for the management of the accessibility of the network and ensuring that no data is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

25
NETWORK DESIGN FOR SMALL BUSINESS
lost if a disaster scenario occurs. The IP addressing plan is created for each of the location and
some extra number of IP address are kept in reserve such that the network solution supports the
scalability and future demands.
NETWORK DESIGN FOR SMALL BUSINESS
lost if a disaster scenario occurs. The IP addressing plan is created for each of the location and
some extra number of IP address are kept in reserve such that the network solution supports the
scalability and future demands.

26
NETWORK DESIGN FOR SMALL BUSINESS
Bibliography
Akbari, T., Zolfaghari Moghaddam, S., Poorghanaat, E. and Azimi, F., 2017. Coordinated
planning of generation capacity and transmission network expansion: A game approach with
multi‐leader‐follower. International Transactions on Electrical Energy Systems, 27(7).
Almeshekah, M.H. and Spafford, E.H., 2014, September. Planning and integrating deception into
computer security defenses. In Proceedings of the 2014 New Security Paradigms Workshop (pp.
127-138). ACM.
Alzate, F. and Alberto, F., 2017. Characterization, Modelling and Implementation of TSO:
Security Process and its Application in the Operational Planning of Sustainable Electric Power
Systems. kassel university press GmbH.
Cankurtaran, M.F. and Karatepe, E., 2017, April. Flexible transmission expansion and reactive
power planning with wind energy considering N-1 security. In Smart Grid and Cities Congress
and Fair (ICSG), 2017 5th International Istanbul (pp. 22-26). IEEE.
Correa, C.A., Bolanos, R. and Garces, A., 2015. Enhanced multiobjective algorithm for
transmission expansion planning considering N− 1 security criterion. International Transactions
on Electrical Energy Systems, 25(10), pp.2225-2246.
Dominguez, A.H., Macedo, L.H., Escobar, A.H. and Romero, R., 2017. Multistage security-
constrained HVAC/HVDC transmission expansion planning with a reduced search space. IEEE
Transactions on Power Systems, 32(6), pp.4805-4817.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support
approaches for cyber security investment. Decision Support Systems, 86, pp.13-23.
Han, B., Gopalakrishnan, V., Ji, L. and Lee, S., 2015. Network function virtualization:
Challenges and opportunities for innovations. IEEE Communications Magazine, 53(2), pp.90-97.
Haryadi, S. and Ibrahim, J., 2015, November. Security requirements planning to anticipate the
traffic flooding on the backbone network. In Wireless and Telematics (ICWT), 2015 1st
International Conference on (pp. 1-4). IEEE.
NETWORK DESIGN FOR SMALL BUSINESS
Bibliography
Akbari, T., Zolfaghari Moghaddam, S., Poorghanaat, E. and Azimi, F., 2017. Coordinated
planning of generation capacity and transmission network expansion: A game approach with
multi‐leader‐follower. International Transactions on Electrical Energy Systems, 27(7).
Almeshekah, M.H. and Spafford, E.H., 2014, September. Planning and integrating deception into
computer security defenses. In Proceedings of the 2014 New Security Paradigms Workshop (pp.
127-138). ACM.
Alzate, F. and Alberto, F., 2017. Characterization, Modelling and Implementation of TSO:
Security Process and its Application in the Operational Planning of Sustainable Electric Power
Systems. kassel university press GmbH.
Cankurtaran, M.F. and Karatepe, E., 2017, April. Flexible transmission expansion and reactive
power planning with wind energy considering N-1 security. In Smart Grid and Cities Congress
and Fair (ICSG), 2017 5th International Istanbul (pp. 22-26). IEEE.
Correa, C.A., Bolanos, R. and Garces, A., 2015. Enhanced multiobjective algorithm for
transmission expansion planning considering N− 1 security criterion. International Transactions
on Electrical Energy Systems, 25(10), pp.2225-2246.
Dominguez, A.H., Macedo, L.H., Escobar, A.H. and Romero, R., 2017. Multistage security-
constrained HVAC/HVDC transmission expansion planning with a reduced search space. IEEE
Transactions on Power Systems, 32(6), pp.4805-4817.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support
approaches for cyber security investment. Decision Support Systems, 86, pp.13-23.
Han, B., Gopalakrishnan, V., Ji, L. and Lee, S., 2015. Network function virtualization:
Challenges and opportunities for innovations. IEEE Communications Magazine, 53(2), pp.90-97.
Haryadi, S. and Ibrahim, J., 2015, November. Security requirements planning to anticipate the
traffic flooding on the backbone network. In Wireless and Telematics (ICWT), 2015 1st
International Conference on (pp. 1-4). IEEE.

27
NETWORK DESIGN FOR SMALL BUSINESS
Hausken, K. and Zhuang, J., 2015. Imperfect screening, 58, 69 Independent system operator, 81,
84 Information value theory, 166 Infrastructure planning, 221. Game Theoretic Analysis of
Congestion, Safety and Security, 87, p.309.
Khouzani, M.H.R., Malacaria, P., Hankin, C., Fielder, A. and Smeraldi, F., 2016, September.
Efficient numerical frameworks for multi-objective cyber security planning. In European
Symposium on Research in Computer Security (pp. 179-197). Springer, Cham.
Kizza, J.M., 2017. Guide to computer network security. Springer.
Knapp, E.D. and Langill, J.T., 2014. Industrial Network Security: Securing critical infrastructure
networks for smart grid, SCADA, and other Industrial Control Systems. Syngress.
Li, Z., Shen, W., Xu, J. and Lev, B., 2015. Bilevel and multi-objective dynamic construction site
layout and security planning. Automation in Construction, 57, pp.1-16.
Lincke, S., 2015. Designing Information Security. In Security Planning (pp. 115-133). Springer,
Cham.
Liu, J., Cheng, H., Tian, Y., Zeng, P. and Yao, L., 2018. Multi-objective bi-level planning of
active distribution networks considering network transfer capability and dispersed energy storage
systems. Journal of Renewable and Sustainable Energy, 10(1), p.015501.
Ma, H., Lv, G. and Wu, C., 2018. Campus Network Planning and Design. Journal of Computer
Hardware Engineering, 1(1).
Missanga, J., Msuya, S. and Mtenga, D., 2017. Network of Actors in Agricultural Improvement
for Food Security and Associated Local Planning in Most Vulnerable Areas to Climate Change
in Central Tanzania; A case of Chololo Village in Dodoma Municipality. Imperial Journal of
Interdisciplinary Research, 3(11).
Mohtashami, S., Pudjianto, D. and Strbac, G., 2017. Strategic distribution network planning with
smart grid technologies. IEEE Transactions on Smart Grid, 8(6), pp.2656-2664.
Moreira, A., Street, A. and Arroyo, J.M., 2015. An adjustable robust optimization approach for
contingency-constrained transmission expansion planning. IEEE Transactions on Power
Systems, 30(4), pp.2013-2022.
NETWORK DESIGN FOR SMALL BUSINESS
Hausken, K. and Zhuang, J., 2015. Imperfect screening, 58, 69 Independent system operator, 81,
84 Information value theory, 166 Infrastructure planning, 221. Game Theoretic Analysis of
Congestion, Safety and Security, 87, p.309.
Khouzani, M.H.R., Malacaria, P., Hankin, C., Fielder, A. and Smeraldi, F., 2016, September.
Efficient numerical frameworks for multi-objective cyber security planning. In European
Symposium on Research in Computer Security (pp. 179-197). Springer, Cham.
Kizza, J.M., 2017. Guide to computer network security. Springer.
Knapp, E.D. and Langill, J.T., 2014. Industrial Network Security: Securing critical infrastructure
networks for smart grid, SCADA, and other Industrial Control Systems. Syngress.
Li, Z., Shen, W., Xu, J. and Lev, B., 2015. Bilevel and multi-objective dynamic construction site
layout and security planning. Automation in Construction, 57, pp.1-16.
Lincke, S., 2015. Designing Information Security. In Security Planning (pp. 115-133). Springer,
Cham.
Liu, J., Cheng, H., Tian, Y., Zeng, P. and Yao, L., 2018. Multi-objective bi-level planning of
active distribution networks considering network transfer capability and dispersed energy storage
systems. Journal of Renewable and Sustainable Energy, 10(1), p.015501.
Ma, H., Lv, G. and Wu, C., 2018. Campus Network Planning and Design. Journal of Computer
Hardware Engineering, 1(1).
Missanga, J., Msuya, S. and Mtenga, D., 2017. Network of Actors in Agricultural Improvement
for Food Security and Associated Local Planning in Most Vulnerable Areas to Climate Change
in Central Tanzania; A case of Chololo Village in Dodoma Municipality. Imperial Journal of
Interdisciplinary Research, 3(11).
Mohtashami, S., Pudjianto, D. and Strbac, G., 2017. Strategic distribution network planning with
smart grid technologies. IEEE Transactions on Smart Grid, 8(6), pp.2656-2664.
Moreira, A., Street, A. and Arroyo, J.M., 2015. An adjustable robust optimization approach for
contingency-constrained transmission expansion planning. IEEE Transactions on Power
Systems, 30(4), pp.2013-2022.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

28
NETWORK DESIGN FOR SMALL BUSINESS
Nikolopoulou, M., Martin, K. and Dalton, B., 2016. Shaping pedestrian movement through
playful interventions in security planning: what do field surveys suggest?. Journal of Urban
Design, 21(1), pp.84-104.
Riabov, A., Sohrabi, S., Udrea, O. and Hassanzadeh, O., 2016. Efficient high quality plan
exploration for network security. In International Scheduling and Planning Applications
woRKshop (SPARK).
Sekhavatmanesh, H. and Cherkaoui, R., 2017. Optimal Infrastructure Planning of Active
Distribution Networks Complying with Service Restoration Requirements. IEEE Transactions on
Smart Grid.
Shu, J., Wu, L., Zhang, L. and Han, B., 2015. Spatial power network expansion planning
considering generation expansion. IEEE Transactions on Power Systems, 30(4), pp.1815-1824.
Singhal, A. and Ou, X., 2017. Security risk analysis of enterprise networks using probabilistic
attack graphs. In Network Security Metrics (pp. 53-73). Springer, Cham.
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more
holistic approach: A literature review. International Journal of Information Management, 36(2),
pp.215-225.
Speicher, P., Steinmetz, M., Backes, M., Hoffmann, J. and Künnemann, R., 2018. Stackelberg
Planning: Towards Effective Leader-Follower State Space Search.
Tabbane, S., 2014. Handbook of Mobile Radio Networks (Artech House Mobile
Communications Library). Artech House, Inc..
Tsohou, A., Karyda, M., Kokolakis, S. and Kiountouzis, E., 2015. Managing the introduction of
information security awareness programmes in organisations. European Journal of Information
Systems, 24(1), pp.38-58.
Xing, H., Cheng, H., Zhang, Y. and Zeng, P., 2016. Active distribution network expansion
planning integrating dispersed energy storage systems. IET Generation, Transmission &
Distribution, 10(3), pp.638-644.
NETWORK DESIGN FOR SMALL BUSINESS
Nikolopoulou, M., Martin, K. and Dalton, B., 2016. Shaping pedestrian movement through
playful interventions in security planning: what do field surveys suggest?. Journal of Urban
Design, 21(1), pp.84-104.
Riabov, A., Sohrabi, S., Udrea, O. and Hassanzadeh, O., 2016. Efficient high quality plan
exploration for network security. In International Scheduling and Planning Applications
woRKshop (SPARK).
Sekhavatmanesh, H. and Cherkaoui, R., 2017. Optimal Infrastructure Planning of Active
Distribution Networks Complying with Service Restoration Requirements. IEEE Transactions on
Smart Grid.
Shu, J., Wu, L., Zhang, L. and Han, B., 2015. Spatial power network expansion planning
considering generation expansion. IEEE Transactions on Power Systems, 30(4), pp.1815-1824.
Singhal, A. and Ou, X., 2017. Security risk analysis of enterprise networks using probabilistic
attack graphs. In Network Security Metrics (pp. 53-73). Springer, Cham.
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more
holistic approach: A literature review. International Journal of Information Management, 36(2),
pp.215-225.
Speicher, P., Steinmetz, M., Backes, M., Hoffmann, J. and Künnemann, R., 2018. Stackelberg
Planning: Towards Effective Leader-Follower State Space Search.
Tabbane, S., 2014. Handbook of Mobile Radio Networks (Artech House Mobile
Communications Library). Artech House, Inc..
Tsohou, A., Karyda, M., Kokolakis, S. and Kiountouzis, E., 2015. Managing the introduction of
information security awareness programmes in organisations. European Journal of Information
Systems, 24(1), pp.38-58.
Xing, H., Cheng, H., Zhang, Y. and Zeng, P., 2016. Active distribution network expansion
planning integrating dispersed energy storage systems. IET Generation, Transmission &
Distribution, 10(3), pp.638-644.

29
NETWORK DESIGN FOR SMALL BUSINESS
Xing, H., Fu, Y. and Cheng, H., 2017. Active Distribution Network Expansion Planning
Integrating Practical Operation Constraints. Electric Power Components and Systems, 45(16),
pp.1795-1805.
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J. and Di Renzo, M., 2015. Safeguarding
5G wireless communication networks using physical layer security. IEEE Communications
Magazine, 53(4), pp.20-27.
NETWORK DESIGN FOR SMALL BUSINESS
Xing, H., Fu, Y. and Cheng, H., 2017. Active Distribution Network Expansion Planning
Integrating Practical Operation Constraints. Electric Power Components and Systems, 45(16),
pp.1795-1805.
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J. and Di Renzo, M., 2015. Safeguarding
5G wireless communication networks using physical layer security. IEEE Communications
Magazine, 53(4), pp.20-27.
1 out of 30
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.