Capstone Project - Verbania Inc.: Network and CRM Integration Design

Verified

Added on  2022/08/26

|6
|1413
|15
Project
AI Summary
This assignment provides a detailed network design solution for Verbania Inc., a company aiming to launch a social networking platform. The solution begins by recommending a hybrid mesh network topology for the corporate backbone, wired, and wireless connections, explaining its advantages over other topologies. It then recommends Ethernet cabling due to its reliability and speed. The assignment also addresses remote access by suggesting the use of Remote-access VPNs for secure access to the company's resources. Furthermore, it proposes integrating social media sites with a CRM solution to streamline data collection and improve user experience. Finally, the assignment outlines crucial security considerations, including the need for a robust network security strategy and access level management, to protect the company's data. References are provided to support the recommendations.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
0Running head: NETWORKING
NETWORKING
Name of the Student:
Name of the University:
Author’s note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1NETWORKING
Question 1:-
Which type of network topology would you recommend for the corporate
backbone and the wired and wireless connections?
Answer 1:-
A mesh network delivers shared communications maximum nodes over the switches.
This selection stimulates alliance and the distribution of network properties, though, it is faraway
also luxurious and far also terminated to make the whole system a meshed topology (Diebold &
Yılmaz, 2014). A hybrid mesh topology would provide the network with the benefits of together
while dropping the drawbacks of either solo as one topology.
It is far added practical to attach particular of the structures like they are in a mesh
topology, although other parts of the structure are linking to more than one switches or hubs. The
topology is an extensive procedure of a network in which every node are connected using the
connecting or network lines. Apart from just relating how nodes are interconnected, network
topology also clarifies how data is relocating in a particular network.
According to the (Rohden et al., 2014) in Star topology, every network components are
linking to an essential device named "hub" which are routing by a switch. So in a mesh hybrid
topology, the workplaces are not in a straight line, but ultimately linked to another apparatuses
from the star to mesh topology, therefore making the hybrid of a star or mesh topology. The
purpose of this system creates as is that it uses the benefits of mesh and star topologies to stop
out some of the shortcomings of both categories of the convention in the central point.
Document Page
2NETWORKING
Question 2:-
Which type of cabling would you recommend? Why do you think this would
be the best choice?
Answer 2:-
Ethernet is the most useful cabling for the network. The most regularly used kind of cable
used to linking a system is recommending to Ethernet cable. It is the old-fashioned technology
for linking wired LANs which permitting devices to interconnect with another through the
protocol (Zhao et al., 2014). It mainly transfers data packets, so another instrument on the similar
LAN segment can identify, accept and process them. These are also the physical, covered wiring
over which the data explorations.
As various cables become accessible, the greatest and latest habitually comes at an
exceptional budget, but over time the worth tends to come down. Related to wireless LAN
technology, Ethernet is naturally less susceptible to disruptions, whether from interference,
bandwidth hogs and physical barriers (Padilla, Agbossou & Cardenas, 2014). Ethernet is useful
because it has a habit of the work marginally quicker than a wireless connection. Wireless
networks are a bit slower but deliver the suitability of using it inside a particular range. The
Ethernet cables are also easy to troubleshoot and maintain.
Question 3:-
How will the network infrastructure accommodate remote access?
Answer 3:-
Document Page
3NETWORKING
For active and high productivity purposes, these organization (Verbania Inc.) network
substructure should be capable of lodging remote access. The network projects should integrate a
quantity of Remote-access VPNs to permit distantly located operators to contact the business's
facilities using an encrypted-tunnel through the Internet. These companies are efficiently
arranging its remote-access VPNs, it essentials to use either) and SSL or IP security.
The VPNs have been describing to deal with an extensive range of reasonable
explanation for determinations of attaining remote-access connectivity. They promise to
protected and fast transportations across the firm's workers, employees, managers and associates,
VPNs also recover the company's efficiency overspreading its applications and network. Finally,
it decreases infrastructures charges for remote operators.
Question 4:-
What solution would you propose to integrate the social media site with a
CRM SOLUTION?
Answer 4:-
The functions of CRM through collecting information from a business's client and
forceful it through the assumed CRM (Zomers, 2014). In the circumstance of a severe level, a
vigorous CRM record may be rooted in web pages over coordinating CRM data with the content
kept in the website's history. CRM inside the site is respectable; subsequently, it means less
period will be expending when entering client evidence into CRM from several inlets.
Usually, choosing a CRM explanation contains making severe judgments (Amin &
Biswas, 2015). Before determining on which CRM software selection for, it is vital to confirm
that these not only fulfils with all the business's requirements and necessities but also permits for
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4NETWORKING
combination to social-application. Consequently, the particular CRM software must be appraised
and be confirming that it provides a room for participating social websites.
Question 5:-
What are the security considerations involved?
Answer 5:-
From the time when this organization is in the procedure of planning a network, there is
definite vital security reflection which wants to be making for the security of the business's
information and data (Perlman, Kaufman & Speciner, 2016). This appeals for a company to
describe an appropriate network security strategy that decisively protects the different
characteristics of security anticipation, research and reaction in case of any dangers identified.
The most familiar difficulties in network designs contain both the physical and data components.
The vulnerabilities should be categorized in terms of their possibility to happen, which permit
the business to set up appropriate security actions.
The access levels formation might include managements, governments, operators or
even standby workers is also vital in the system preparation (Acemoglu, Malekian & Ozdaglar,
2016). The safety policy preparation should be personalized to meet the precise network
topology that the business selects to apply in its system design. The strategy should contain the
declaration of the usage, how the safety squad will be designed and their responsibilities, and
how threats will be analyses upon the future existence.
Document Page
5NETWORKING
References:-
Acemoglu, D., Malekian, A., & Ozdaglar, A. (2016). Network security and contagion. Journal
of Economic Theory, 166, 536-585.
Amin, R., & Biswas, G. P. (2015). Remote access control mechanism using rabin public key
cryptosystem. In Information Systems Design and Intelligent Applications (pp. 525-533).
Springer, New Delhi.
Diebold, F. X., & Yılmaz, K. (2014). On the network topology of variance decompositions:
Measuring the connectedness of financial firms. Journal of Econometrics, 182(1), 119-
134.
Padilla, E., Agbossou, K., & Cardenas, A. (2014). Towards smart integration of distributed
energy resources using distributed network protocol over ethernet. IEEE Transactions on
Smart Grid, 5(4), 1686-1695.
Perlman, R., Kaufman, C., & Speciner, M. (2016). Network security: private communication in a
public world. Pearson Education India.
Rohden, M., Sorge, A., Witthaut, D., & Timme, M. (2014). Impact of network topology on
synchrony of oscillatory power grids. Chaos: An Interdisciplinary Journal of Nonlinear
Science, 24(1), 013123.
Zhao, L., Xiong, H., Zheng, Z., & Li, Q. (2014). Improving worst-case latency analysis for rate-
constrained traffic in the time-triggered ethernet network. IEEE Communications Letters,
18(11), 1927-1930.
Zomers, A. (2014). Remote access: Context, challenges, and obstacles in rural electrification.
IEEE Power and Energy Magazine, 12(4), 26-34.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]