Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Mr. Smith is the Director of IT at a law firm located in downtown Chicago. He ne

ID: 3875945 • Letter: M

Question

Mr. Smith is the Director of IT at a law firm located in downtown Chicago. He needs to plan for a network upgrade. He has decided that he would like to have a network analysis done before the upgrade so that he can find out which systems would require upgrades and to create a strategy to present to the senior partners that will include return on investment.

The law offices occupy four floors of a high-rise building. The customer is experiencing network latency, especially in the Accounting department and in Human Resources, which both reside on the 32nd floor. The director of the Accounting department has expressed concerns about the security of his files. The Research, IT, and Corporate Administration departments all share the 33rd floor. The senior and junior partners and their support staff occupy the 35th floor, and the 36th floor is used for reception and conference rooms. The firm has decided that video conferencing is an essential component of its business and is looking to implement video conferencing as soon as possible so it can communicate with two new satellite offices that will be occupied in six months.

The firm has one network segment for each floor, but has been experiencing latency. Each floor except the 36th has 10 to 20 printers. Each floor has a 100Mb uplink to the Data Center on the 33rd floor. There are approximately 50 PCs on the 36th floor, 150 PCs on the 35th floor, and 40 PCs on both the 32nd and 33rd floors. The servers for each department reside on their respective floors. Mr. Smith is concerned about network security and wants a recommendation to secure traffic of three specific departments: Human Resources, Accounting, and Corporate Administration.

Answer these questions:

What type of testing program (Prototype or Pilot) would you recommend to test the video conferencing among the remote offices? Justify your choice of one testing program over the other.

What type of naming structure would you give to servers, network devices and end nodes in this network? Provide a few examples.

Explain why Mr. Smith's existing network does not provide adequate security for the data in each department. How do you want to optimize the network?

Explain to Mr. Smith the function of each network device.

Will the needs of key departments change your network design? Explain your answer.

Write a 3 - 5 page paper using the APA style that summarizes your findings, and provides enough detail to fully support your opinion.

Explanation / Answer

Answer (1). When testing a system to get an entire comprehension of issues the system might have there is no silver shot application, but instead a mix of uses that have particular capacities. The first thing that is a noteworthy worry with understanding conceivable issues that are going on a system is conceivable bottlenecks or transmission capacity restrictions as they relate to organizing performance. One application that performs a safe constant system monitoring is called ‚Aunettest (Agarwal, Boverhof, Jackson).‚äù This open-source application intended to keep running on Linux platform and it fuses a couple of various structures to direct a progression of tests as they relate to arranging performance. This application is intended to work between a couple diverse has on a system so before utilizing it; approval must be achieved with a specific end goal to introduce the application between has. Once the performance testing is finished, it is vital to realize what is being sent across the system. To figure out what is being sent across a system a bundle sniffer can be utilized. A decent valuable free system bundle sniffer is called ‚ÄúWireshark (Sharpe, Warnicke, 2008).‚äù Wireshark permits to parcels to be caught and dumped into a record where they can be investigated at a later point in time or for some individual with quick eyes they can break down the bundles progressively. For the two sorts of tests, it is prescribed to perform the tests over some undefined time frame, for example, finished a 24-hour term. This will comprehend the requests put on the system amid crest hours and also non-top hours of operation. The utilization of different projects to examine organize performance and breakdown of the kinds of system activity will distinguish any issues.

Answer (2). Naming structure: When naming system gadgets it is vital to give a gadget a name that can recognize whom the gadget serves and the gadgets area. To recognize whom the gadget serves there isn't sufficient space inside the gadgets namespace to take into account finish names, so shortened forms will need to be utilized (Morris, 2008). For instance, the HR office has a 3 letter designator HUM, bookkeeping ACC, organization ADM, deals SAL, information innovation INF, shipping SHI, corporate COR, et cetera. To distinguish a gadgets area a building number, floor number, and room number can be utilized. At last in the event that it is wanted a gadget can be recognized by the gadget and in the event that it is an inside or outer gadget by utilizing the identifiers SW for a switch, R for a switch, B for connect, W for a workstation, or SE for the server. At the point when these condensing are assembled a conceivable name for a gadget can resemble this: ACC-115-32-J-SWI. This procedure tells some person that this gadget is found in the bookkeeping branch of building 115, situated on the 32nd story in room J, and it is an inner switch. Following naming structure recognizes gadgets, their capacities, and where they are found.

Answer(3). Adequate of security for the data in each department: Regardless of which organization, which association, or which department some individual works for; there is dependably a need to keep data secure. Despite the fact that individuals work for a similar organization doesn‚äôt mean they require access to similar data. One technique to shield distinctive departments from getting to each other‚äôs data is by logically isolating the system by means of the utilization of virtual LANs also called VLANs. Utilizing VLANs keeps every department portioned so just workforce inside a specific department can get to just that department‚äôs data. Another approach to keeping data secured is for data that is stored in a unified area, similar to a record server, is by the utilization of document consents. Faculty without the right consents won't have the capacity to get to a specific document. It is likewise critical to guarantee data is being transported safely across a system. To guarantee data is being transmitted safely on the system, IPSec can be utilized. IPSec scrambles bundles of information with the goal that it can achieve the planned goal safely. At long last it is critical to guarantee no outside access is permitted on the system. To anticipate unapproved access to a system, a firewall can be utilized. A system firewall examines each bundle it gets by checking the source and goal of every parcel, and after that, it checks an entrance control list (ACL) to confirm get to is permitted before the parcel is sent onto the goal.

Answer (4). Functions of each network device: Distinctive systems administration gadgets work at various layers of the OSI model and in this manner, each can do their own particular part in guaranteeing a system is secure. Beginning at the most minimal level of the OSI model and moving in the direction of the top we can perceive what every gadget does and what included security it can give. Physical security has an imperative influence of guaranteeing the physical availability is secured inside a controlled territory. Switches work at the data-interface layer of the OSI model and their obligation is to transport data rapidly and proficiently. Switches likewise give organize security by enabling a system to be portioned into various VLANs. Switches work at the system layer of the OSI model and their capacity is to transport data starting with one system then onto the next. Switches can give a little security by giving an ACL to guarantee to organize movement from one system is approved to get to another system. System firewalls likewise work at the system layer and their fundamental reason for existing is to guarantee both that movement is approved starting with one system fragment then onto the next, yet additionally a firewall hinders any unused system ports from being gotten to. Arranged servers can work at the session, introduction, and application layers of the OSI model. A legitimately arranged system server can give security be guaranteeing parcels are encoded, approved clients are permitted to get to a system by verifying clients, and records are secured with the right document authorizations. Every gadget on a system assumes it possesses part of guaranteeing access to a system is approved and data inside the system is secured.

Answer(5). Despite the fact that diverse departments work for a similar organization their particular needs may impact the outline of a system. The clearest particular requirement for a department is the measure of clients the department has. Since the senior and junior staff of the law office involves the 35th floor with 150 distinct PCs, they may have a higher interest for transfer speed than the bookkeeping and HR departments, which possess the 32nd and 33rd stories with just 40 PCs. The IT and research departments may both have particular needs of wanting to put their own systems administration gadgets on the system to take into account them to make a test organize. The corporate department might need to utilize voice over IP administrations and in this manner have a particular need of having a voice VLAN arranged on their systems administration gadgets. Regardless of what the particular need of a department is, a great system configuration must join the majority of the department's requirements for both today and into what's to come.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote