Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

EverTrain is a fast growing organization that specializes in corporate training.

ID: 3673844 • Letter: E

Question

EverTrain is a fast growing organization that specializes in corporate training. It operates offices in 13 cities around the world. They specialize in government contract, human resource, customer service, and security training. Since there are many regional laws and cultural variations, EverTrain uses its offices to maintain knowledge of local laws and customs. The company’s IT strategy so far has been to let the local offices make their own IT decisions. However, management has decided that it is now time to create a standardized and comprehensive corporate IT telecommunications standard.

Question 1: Local offices - Each office has separate departments for each of the specialized training areas, so each department wants to have its own LAN. Make a recommendation for the LAN networking technology in the local offices. Specifically, make recommendations for…

The Access layer (Network protocol, wired infrastructure, Wi-Fi deployment, and interconnect hardware)

The Distribution layer (wired infrastructure and interconnect hardware).

Explanation / Answer

make recommendations

The Access layer

the access layer is where your client's network devices directly connect to your network. You want their connection to be as efficient, simple, and secure as possible. This involves controlling who accesses the network and for what services. Controlling access may be as simple as blocking access, or it may involve a redirection or quarantining action.

To continue the general security metaphor part of controlling the boundary is also observing inappropriate behavior at the boundary can also result in blocked access.

The access layer is where end users connect to the network. In the past, network administrators have largely relied on physical security to protect this part of the network. Unauthorized users were not allowed to enter a secure building where they could plug into the network, and students didn't carry computers with them. Today, contractors and consultants regularly have access to secure areas, and a student carrying a laptop is unsurprising. Once inside, there is nothing to prevent a contractor or student from plugging into a wall jack and gaining access to the corporate network. There is no need to enter an employee office to do this. Conference rooms frequently offer network access through wall jacks or even desktop switches. Once connected to the network, everyone (employees, contractors, consultants, guests, students, and malicious users) has access to all the resources on the network.

What is commonly called the access layer in network design is the business end of the network, the part of the network that your users see and interact with. The end users do not see or appreciate the power of your collapsed core distribution layer, the elegance of your addressing plans, or the genius of your end to end network design. Training users on using the access is focused upon small—the smaller the better—number of steps users must go through to gain access to their network applications.

At the same time as providing simple uncomplicated network access for users, the access layer provides the first line of security defense for the network, provide service differentiation based upon management policies and, providing power to support the deployment of specialized devices.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote