Verified Document

Network That Houses The Storage Case Study

I would devise an intelligent hub that would have enhanced capacities for other features such as remote management capability. Switches are an addition o hubs and would also provide this prospective network with support capacities such as multiple bandwidths, bridge functionality, and router functionality.

I will install a bridge that will filter data packets according to their various addresses. This will forward only the appropriate packages to the relent address. The packet moves on if it does not belong. This function seperates the various files and ensures that each receives its correct one without clogging up the system. It also provides data security so that each receives only that which he is permitted to have access to. Bridges help th traffic. They require, however, that network managers install and update their list of addresses.

Routers are also an inescapable piece of my network. The router does many of the above functions reading the destination address for information, examining the contents of each packet, and establishing the most efficient path. All of this is performed by routing protocols.

I will use dynamic routing whereby the router will be able to automatically reconfigure its information table. It will be able to recalculate the lowest-cost path in terms of load, line delay, or bandwidth. I may even have one that will be able to rebalance the traffic load across multiple links. I will use the Open Shortest Path First (OSPF) as routing protocol.

Routers are slower than bridge but provide better security. I may therefore use bridges and routers in conjunction. If I had to choose between one or the other, I would prefer the router even though its far more expensive and difficult to maintain. They also provide network management overhead.

I will want to prevent unauthorized entry of suspicious...

To that end, my solution will be to introduce software at a central site and distribute it throughout the network. In this way, all have access to the same software that is located at a central region.
To ensure safe file location, I will also keep files safe in a central location whilst directing files in use to the local workstation.

In order to ascertain that there is no multiple configuration of more than one file at a time by multiple users, configuration settings can be stored in a central station and will be available suer when he logs on from his workstation.

Since network hardware changes all the time, I will program the system with the ability to recognize new systems and to update automatically as the hardware changes. Of course, frequent checking is required.

A firewall will be installed for both security and to prevent clogging, crashing of system, and in order to control the traffic between network and Internet.

The network too will be designed with centralized management in mind so that the network can be controlled from a focal region monitoring issues such as version control, security, and diagnosing failures.

Finally, a significant part of my work will be to make the pieces of the network as similar as possible by using protocol standards in order to do so. I will do this to ensure compatibility, but will first ascertain that the hub suites all the management needs of the organization. And of that particular set of network. I will use a Hybrid network so that the standard can be changed when necessary.

To monitor and keep on assessing function of my LAN, I will build test points into it. This will also make maintenance far easier. The network management software must be written carefully and tested thoroughly to ensure that network management systems are highly reliable

Cite this Document:
Copy Bibliography Citation

Related Documents

Network Security
Words: 9364 Length: 25 Document Type: Term Paper

networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Design Telecommunications Network
Words: 1248 Length: 3 Document Type: Essay

Telecommunications Network In an effort to provide better care for its patients, arises the need to design a network able to support a new multi-location dental care practice. In this report, we will provide a clear set of requirements for the network solution, and then identify the information that is to be protected as well as their related security requirements. Also, we will identify the types of network components, devices

My Future House Using Gothic Revival Style
Words: 1640 Length: 5 Document Type: Term Paper

future house, to be built in the tradition of the Gothic Revival style. This description will include an explanation of the general layout of the house, as well as address the elements of light, acoustics, and color. Further, issues of living space will be addressed, including sleeping, entering, food and storage, and bathing areas. External structure and landscaping will be outlined, as well as internal infrastructure like heating, and

David Fincher's the Social Network
Words: 846 Length: 2 Document Type: Essay

Much as employers claim to despise Facebook, it has become a useful way of screening employees. For advertisers, who feared losing a captive television audience to the Internet, Facebook is a way to engage in careful market segmentation and targeting. It expands the methods of surveillance into bedrooms and homes, and makes the posters willing participants in the process. Interactivity seems to have the illusion of consumer choice (given that

Security Program Network Risk Assessment
Words: 1927 Length: 7 Document Type: Term Paper

Tracking normal activity patterns of users is essential to enable abnormal activity to be flagged. Also, unintentional user errors such as logging onto unsecure websites and opening up potentially infected documents must be flagged. Sending an email from an odd-looking address and seeing if employees open the email is one way to gage the relative wariness of employees. If employees open up the email, it staff can include a

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now