Designing a Secure Network

In: Computers and Technology

Submitted By medik
Words 3194
Pages 13
WAN Design with Frame Relay
David Horton CST-443 Abstract This paper gives a high-level overview of how to design a Wide Area Network (WAN) using Frame Relay technology. Aspects of the WAN design process are explored through the use of a fictitious manufacturing company called Zippy's Chips. The Zippy's WAN design covers the topics of weighing alternative technologies, setting up basic Frame Relay Permanent Virtual Circuit (PVC) connections, adding redundant links and scaling the network for future growth.

Table of Contents
Frame Relay in a Nutshell.......................................................................................................................... 2 Terminology.......................................................................................................................................... 2 Basic Concepts...................................................................................................................................... 2 A Sample Design...................................................................................................................................3 Deciding if Frame Relay is Right for the Network.................................................................................... 4 Advantages of Frame Relay...................................................................................................................4 Disadvantages of Frame Relay.............................................................................................................. 5 Alternatives to Frame Relay.................................................................................................................. 6 X.25.................................................................................................................................................. 6…...

Similar Documents

Designing Recruitment

...Maintain personal life Mentoring Not necessary Does not handle well negative Not necessary to receive feedback Constant feedback needed feedback Retention Loyalty Salary Security/Salary Personal relationship Client Orientation Personal contact Telephone E-mail E-mail/IM/Text Technology Dictates documents, e-mail only in the office, Documents prepared by the Creates own documents, uses Creates own documents, use of library instead of Associates, e-mail mobile and laptop, creates databases, web, limited phone use primarily in the office, web use to uses web to research, review uses web to research and “google” etc., e-mail/mobile 24/7 network, use of email/IM/text 24/7 Build a perfect career, excel Build a transferable career, variety of Build several parallel careers, skills and have a several jobs experiences simultaneously Career Goals Build a legacy, a life-time career with one company The! Traditionalists (Veteran Generation) The Veteran! Generation, born between 1925 and 1945, were brought up in a more! challenging time with life experiences that included WW II. The economic and political uncertainty that they experienced led them! to be hard working, financially conservative, and cautious.! Organizational loyalty is of an essence and they have advanced with the premiss that the seniority is important to advance in one's career.!......

Words: 3443 - Pages: 14

Variations of Networks

...There are many different choices that one can make when designing an IT network. These most preferable choices can change depending on your needs, the capabilities that your equipment requires, and perhaps most important, the budget you have available to spend on the network. First, you will have to choose from the various topologies that exist. Second, you will have to determine what type of cable you will use to run your network. Finally you will have to decide if you want to have wireless capabilities. In this paper, you will find a great deal of information that should help you in making your decisions, at the very least, a little easier. Topologies There are several different topologies available to choose from, each with its own traits and flaws. The most common are the bus, ring, and star topologies. There are several other examples, but these are the network topologies that will be covered in this paper. The bus topology is the simplest network topology. also known as a linear bus, in this topology all computers are connected to a single unbroken cable. On a linear bus, each computer determines when the network is not busy and transmits its data as needed. The signal in a bus topology travels down the entire length of the cable, giving its data to each connected device. At the end of the bus is a component called a terminator. The terminator is essentially a resistor that terminates the transmitted data, preventing it from returning back down the bus, which...

Words: 928 - Pages: 4

Network

...and Domain Consolidation 13 System Administration 15 Operating Systems 17 Email System 19 Maintenance 21 Network Security 23 Summary 25 References 26 Technology Analysis and Assessment Plan Listed below is a simple diagram of the hardware layout in Acme Gym Inc., a small local fitness company that serves the community from a single location. Following the diagram is a detailed description of the current technology available on-site and an assessment of its weaknesses. There are currently four workstation computers located across several office locations. All four workstations currently contain essentially the same hardware and software consisting of: * Microsoft Windows XP operating system * 2 GHz CPU * 2 GB RAM * 120 GB Hard drive * DVD burner drive * Built-in USB and Ethernet ports The server on-site is currently running Microsoft Windows Server 2000 operating system. It contains the following hardware: * 2 each removable 250 GB hard drives in a RAID configuration (one drive used as a ghost drive, to ensure data integrity) * 2 GHz CPU * 2 GB RAM * DVD burner drive * Built-in USB and Ethernet ports The server currently maintains all customer related databases and also serves as domain (www.acmegym.com) and email host for the company. A standalone printer is the only peripheral currently connected to the network via the six-port switch and is available to all workstations. All workstations have a single Ethernet......

Words: 5202 - Pages: 21

Keeping Information Secure

...Keeping information secure in the workplace Hacking A hacker is a person who breaks codes and passwords to gain unauthorised entry to computer systems. A system hacker knows about designing and maintaining operating systems and a password hacker knows how to find out someone else's password. Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers enjoy learning more about how computers work and get excitement out of cracking the security of remote computer systems. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. The purpose of hacking could be anything like to get money illegally, destroying the network, stealing, for the fun or some other motives as well. There are very small numbers of computer hackers in the world because hacking requires lot of knowledge. To prevent this from happening Network security Your business needs to stay on top of changes that could affect the security of your LAN. Keep your operating system updated with the latest security patches and bug fixes. Assign access to directories and other network resources on a need-to-have basis, and remove a user's account immediately when they leave your company. Use network logging and security tests to check your network for security holes and possible break-ins. Passwords One bad password......

Words: 1741 - Pages: 7

Secure Network

...Marketing Products Antonio Holmes Dr. Steven Englehart Marketing Management November 3, 2013 The type of product the company will offer and its primary characteristics The product that Angels will offer to the target market is AM moisturizer lotion which best suited for the target market’s skin. The product is designed to meet the needs of both the light and dark skins, which have similarities. It is designed like so and that is important to attract and retain the potential Mexican and African market. The consumers will definitely be attracted to such a product which meets their needs and even exceed their expectations. Accordingly, the Mexican and African skin are faced by certain conditions which make the product necessary to the market. The conditions that are found in the Mexican and African skin are mainly dark spots, acne, aging skin and uneven skin tone. The product to be offered by Angels to the target market aims at satisfying the listed skin conditions, where as maintaining the most affordable prices in the industry. The product is natural and scientifically formulated to treat skin conditions which occur on the dark and ethnic skin types. The moisturizers prevent and treat dry skin, protect sensitive skin, improve the skin tone and improve the texture (Glenn, 2009). The product will also be less costly and affordable as per the financial ability of the target market. To ensure that the product has such characteristics and that the product will likely......

Words: 1304 - Pages: 6

Secure Web and Database Successfully

...Project Part 2 Task 2: Secure Web and Database Servers Scenario First World Bank Savings and Loan needs to service its customers online with a Web application using a database that contains highly sensitive information. The Web application has been designed to work well with open source Web and database servers. The front end of the Web application, which is accessed by users, is served by a Web server. The Web server communicates with a database server to deliver the data. In other words, the Web server interacts with the database server. The users do not need to interact directly with the database server. Tasks Research and make recommendations about how the organization should implement the Web and database servers. Defend your recommendations in terms of security and stability. Explain how Web and database administrators will be able to access the servers remotely. Self-Assessment Checklist •Student has recommended a database and Web server architecture and provided adequate explanations for the recommendation based upon security and stability. •Student was able to specify a remote access solution for the Web and database administrators that can be considered secure. Service subscribers access queues and or topics to exchange data using point-to-point or publish and subscribe patterns Remote-access VPNs allow secure access to corporate resources by establishing an encrypted tunnel across the Internet. The ubiquity of the Internet, combined with today's VPN......

Words: 452 - Pages: 2

Securing a Network

...Securing a Network Kaplan University Securing a network for a company is a very important job because without security anything can come in or be taken from the company. With securing a company I would have a firewall in place of course. A firewall is a software and sometimes hardware that screen out hackers, viruses etc. coming in from the internet (Microsoft Office, 2013). After making sure the firewall is up and running at all times I would began hardening the system. When hardening the system I will take out every unnecessary piece of item that I can without interfering with the task that needs to be done by this system. By taking these unnecessary pieces away I will be creating an easier task for myself and the firewall because, it will increase the security. I will then audit the firewall to make sure everything works properly. Once everything is checked on and I have finished making sure it is running smooth I will have an ongoing maintenance. This ongoing maintenance will detect anything suspicious and any intrusions. A method of encrypting alphabetic: P mxlfop sy lbffdtgkee pexugbpipc. Using Vigenere Cipher I was able to come up with this Cipher. I used http://rumkin.com/tools/cipher/vigenere-autokey.php# an online cipher to help with this Cipher, using the alphabet key A and the passphrase Patsy. I believe this a very secure cipher due to the fact that there can be up to 26 different cipher alphabets. When securing the network that I have chosen I need......

Words: 1001 - Pages: 5

Designing for Security

...Midterm Examination Written Responses Presented in ITS-331 Designing for Security By QUESTION 1 In Chapter 1 of Weaver, Weaver, and Farwood (2013), we considered various THREATS to network security, the FUNDAMENTAL goals of network security, and how LAYERED approaches to defense contributed to the overall security posture of an organization’s information infrastructure. Chapter 2 explored Transmission Control Protocol / Internet Protocol (TCP/IP), the Open Systems Interconnect (OSI) Model, and how various protocols operated within, as well as across OSI layers to enable telecommunications to function. In a scholarly peer-reviewed journal article entitled: "Cyber security in the Smart Grid: Survey and challenges," Wang and Lu (2013) examined security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the U.S. Smart Grid. Based upon what you read in Chapters, one, and two of Weaver et al. (2013), as well as the journal article, COMPARE and CONTRAST Vulnerabilities, Attacks, or Threats shared from the text against those provided within the journal article. IDENTIFY Three Similarities AND Three Differences that exists between the text and literature. Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), 1344-1371. Weaver, R., Weaver, D., & Farwood, D. (2013). Guide to Network Defense and Countermeasures (third Ed.). Boston, MA: Course......

Words: 1934 - Pages: 8

Implementing Secure Cloud Computing

...Implementing secure cloud computing Author: Justin Schmidt Abstract Cloud computing is an effective and efficient way in which most businesses are conducting business today or will one day. This is due to its low costs and benefits. Cloud computing is still considered to be in its younger years and has much to go through before it can be highly secure. This article will address some ways in which a company can reduce security risks before implementing on the cloud environment. Cloud Service Providers (CSP) hosts the information for their client company onto which ever cloud model is best suited for the company. These consist of either public cloud, private cloud, or hybrid cloud. Each have different specifications of features, like security, and play a big role in securing your data. Determining which CSP is best suited for a company can make all the difference before implementing in the cloud environment. CSP’s can also offer a variety of services such as software as a service (SaaS), Platform as a Service (PaaS), or Infrastructure as a Service (IaaS) which is determined by the client’s needs and all require different means of security. There are third party encryption applications that can assist in the secure data implementation process. 1. Introduction When the term “cloud computing” is heard most people state that they don’t understand what is meant by it and it generally confuses most people or companies. IT departments argue what is meant by the term and......

Words: 3210 - Pages: 13

Networks

...Chapter 1 Analyzing Business Goals and Constraints This chapter serves as an introduction to the rest of the book by describing top-down network design. The first section explains how to use a systematic, top-down process when designing computer networks for your customers. Depending on your job, your customers might consist of other departments within your company, those to whom you are trying to sell products, or clients of your consulting business. After describing the methodology, this chapter focuses on the first step in top-down network design: analyzing your customer’s business goals. Business goals include the capability to run network applications to meet corporate business objectives, and the need to work within business constraints, such as budgets, limited networking personnel, and tight timeframes. This chapter also covers an important business constraint that some people call the eighth layer of the Open System Interconnection (OSI) reference model: workplace politics. To ensure the success of your network design project, you should gain an understanding of any corporate politics and policies at your customer’s site that could affect your project. The chapter concludes with a checklist to help you determine if you have addressed the business issues in a network design project. Using a Top-Down Network Design Methodology According to Albert Einstein: 000200010270745975 “The world we’ve made as a result of the level of thinking we have......

Words: 8812 - Pages: 36

Designing a Program

...Designing a Program When creating anything no matter what it is, a good design is always going to be very beneficial and in most cases required. When creating a new program, designing it will make things so much easier. Designing a new program will allow you to “see” what steps you need to accomplish in order to get what you want. In the long run it also save time because without a good design you would just be going into the project blindly and will more than likely need redoing over and over again. Designing a program using algorithm, flowcharts and pseudocode are all very important and I will use all of them but I think that the most important one would be the algorithm. We need to know what steps we need to take in order to get the results that the customer wants. Without the algorithm you really wouldn’t know what to put in the flowchart or what needs to be in the mock up or pseudocode. So for me the algorithm is the most important part of the designing process. Now let’s say we wanted to start a new project to design a game but didn’t want to take the time to design it. Well where would you start? I guess pull up the IDE that you will be working with and then? What do you want the game to be about? What do you need to do in order to play the game? I mean where do you start? That’s why designing is almost a necessity. References Gaddis, T. (2012). Starting Out with Programming Logic & Design, Custom Edition. [VitalSource Bookshelf Online]. Retrieved......

Words: 286 - Pages: 2

Secure Vpn

...http://www.iptables.org In RedHat 8 and above it is the default firewall daemon. Account Authentication Configuration Make sure that the root password is secure and that you maintain a MD5 checksum of all the passwords in a separate file. Make sure that the password file itself is shadowed; this should be default on RedHat installations. Package Installation: Install only what you think you will need. You can always install new packages in the futures. Network Security Network Parameter Modification (RedHat only) Edit /etc/sysctl.conf with the following changes Net.ipv4.ip_forward = 0 (this disables ip forwarding, it should only be enabled if you plan to use the machine as a router/gateway) Net.ipv4.conf.all.accept_source_route = 0 (disables ip source routing) Net.ipv4.tcp_max_syn_backlog = 4096 (enables syn flood protection) Net.ipv4.conf.all.rpP_filter = 1 (enables ip spoofing protection) Net.ipv4.tcp_syncookies = 1 (enables tcp syn flood protection) Net.ipv4.conf.all.send_redirects = 0 (disables the ability to send ICMP Redirects) Net.ipv4.conf.all.accept_redirects = 0 (disables ICMP Redirect acceptance) Net.ipv4.conf.default.accept_redirects = 0 also disables ICMP redirect acceptance) Save the changes and run the following commands as root # chown root:root /etc/sysctl.conf # chmod 0600 /etc/sysctl.conf # /etc/rc.d/init.d/network restart Disallow Remote Root Login There should never be a need for root to login remotely. Any access required by root for system......

Words: 5898 - Pages: 24

Network

...Computer network From Wikipedia, the free encyclopedia "Computer networks" redirects here. For the periodical, see Computer Networks (journal). "Datacom" redirects here. For other uses, see Datacom (disambiguation). Network science Theory · History Graph · Complex network · Contagion Small-world · Scale-free · Community structure · Percolation · Evolution · Controllability · Topology · Graph drawing · Social capital · Link analysis · Optimization Reciprocity · Closure · Homophily Transitivity · Preferential attachment Balance · Network effect · Influence Types of Networks Information · Telecommunication Social · Biological · Neural · Semantic Random · Dependency · Flow Graphs Vertex · Edge · Component Directed · Multigraph · Bipartite Weighted · Hypergraph · Random Cycle · Loop · Path Neighborhood · Clique · Complete · Cut Data structure · Adjacency list & matrix Incidence list & matrix Metrics and Algorithms Centrality · Degree · Betweenness Closeness · PageRank · Motif Clustering · Degree distribution · Assortativity · Distance · Modularity Models Random · Erdős–Rényi Barabási–Albert · Watts–Strogatz ERGM · Epidemic · Hierarchical Browse Topics · Software · Network scientists Graph theory · Network theory v t e A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of......

Words: 7339 - Pages: 30

Network Design

...Network Design Your name Your class Your teacher Date Network Design In business the main key to success is communication with others and to do ones job effectively. Up until around 1990 this communication would have been conducted through postal service or telephone services that offered only voice or fax. Today however thanks to the advancements in technology companies can use networks to communicate more timely. Network design is the process of planning and deploying a computer network for a company. A Computer Network defined in its simplest form is “a network consists of two or more connected computers” (Laudon & Laudon, 2009). Networks are a requirement for companies to succeed in business through the interlacing of the corporate network infrastructure. When one is designing a network for use by a company they must consider what that company is trying to achieve. To what extent do communication capabilities need to be utilized. It must be determined whether it is just voice communication or email and voice communication or data communication. Furthermore, does the local network need access to a larger network such as the internet? Is there a need for an intranet? There are many options that must be analyzed for a firm to manage their business in the most effective manner without exceeding their needs. For example, if the needs are exceeded the cost of running the network may outweigh the benefits of the networks capabilities. This is the...

Words: 724 - Pages: 3

Library Secure

...project. Besides that, he is going to order new books, timing to buy equipments and waiting for the delivery about 4 weeks. 3. Installing the system (Mr. Nguyen Van luong) Designing the website and scanning the books to up into the library, installing the devices to check the books and student card. Moreover, we have to setting up the tool to read online, update lecturer’s slides and curriculum to the library. Therefore it should take about four weeks to complete the installation. 4. Trial and Maintenance ( Mr. Nguyen Van Luong & Ms Tran To Anh) The library is tested in four weeks it will be used in internal Raffles before show up outside. In this time, the librarian will check the operation and manage activities to repair immediately if it gets problems and IT librarian will maintain the system as well as have a schedule to check in every month. Advantages Benefits for Raffles International colleges: The visitors can be impressed with the facilities and professional style of international university and probably it can be an effective marketing for university. In addition, Raffles enable to get money by selling book, manage and control books easily. Advantages for students: A perfect environment to study and share together all students in network Raffles International colleges. In addition, students’ access easily to more information and related website, find out slides and subjects of their lecturers as well as......

Words: 1659 - Pages: 7