Essential Network Services And Network Security Recommendations For EZY Books

Topic 1: The Structured Cabling

Planning a network mainly focuses on the topology and arrangement in which they are arranged. It is immersivelty referred to as complex since we limit ourselves to designing small and medium size network. The information networks of the computers are a main reason that leads to successful sharing of resources as well as communication. It links people, supports services and applications. In this assignment, we are going to focus mainly on the significant issues faced when planning and designing an internetwork infrastructure.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

EZY Books is a specialized publisher for customized books services based in Brisbane. They have recently opened up a constituent branch that has the marketing team, Human Resource and other managerial duties. These offices comprise of 20 computers that are available and 2 servers. The first floor has the Editorial, Design and Photography team with 20 computers and 1 allocated server. EZY Books has also settled business in Sydney team with a marketing team of 8 employees and they are allocated 10 computers on a leased office.

The main aim of the network is to set up a communication channel that enables one to interact freely within the network. The interactions include file sharing and use of resources such as printers and the webmail for intranet communication within the organization. The branch network simply interlinks the connectivity of various networking segments in the topology without the devices and communication around the area. Then, the branch will be rendered functional since there is no way it can access data  information and services while the isp is down or one of the distributors have spoilt it in one way or another. Here, the designed network is supposed to meet and attain certain operational and business objectives that are functional. They include:

  1. The network should provide secure services to the organization. It should be geographically and functionally isolated to deny access to unregistered people to reduce the danger of unauthorized users.  
  2. The development of the network structure is with exterior walls. The equipment and network introduced in the market will be new. Design used will be IPS.
  3. The network ought to enable its users to retrieve, process and store data entailing the company’s operations, billing, accounting as well as tracking.
  4. The network plan must be scalable so that incase additional network cables are required, they can be introduced easily without redoing the whole network installation process.
  5. The users intended to use the network will be two, that is, the administrators or the owners and the full time employees. (Browne, Valente & Hariri, 2009)

Ethernet cables are the most preferable cables that are mostly relied in setting up a network. They are cables that are connected to the device interface to facilitate communication between two or more devices. Ethernet are simple divide in the way they can work and there duplex mode.

There is the Gigabit Ethernet with a speed of up to 1000 mbps. They work in half duplex through hubs and are not typical. In general, all applications are full duplex through the switch, half-duplex operation on the stop and wait command.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Full Duplex communication operates on simultaneous communication. There are also fast Ethernet cables used in the same network access method (CSMA/CD) since it provides a transmission speed of up to 10Mbps. Sometimes it can reach up to 100Mbps. On setting up a NIC card, one must consider some certain factors for efficient and effective communication in the network. (Trulove, 2015)

Topic 2: IP addressing and planning

The Internet Service Providers will dedicate a public ip4 address of 120.154.191.2 with a subnet mask of 255.255.255.0 and a gateway of 120.154.19.1 that will show the interface of between the internet service providers and the EZY Router R1

Upon the entry of the network provided by the ISP to the internal network of the branch, the network will be separated into subnet that ideally means that the network will be segmented into separate sections of 3. The ip address will be of class c and the address will 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24. On every subnet, a computer will be assigned and will be configured to the available ip address in regard to the subnets respectively. (Comer & Droms, 2013)

The ip addressing table is based on the network that is layed down and the configuration across the network.

Device

Interface

IP Address

Subnet Mask

Default Gateway

ISP

Se2/0

120.154.191.1

255.255.255.0

N/A

R1

Se2/0(DCE)

120.154.191.2

255.255.255.0

N/A

Se3/0

192.168.0.1

255.255.255.0

N/A

Fa0/0

192.168.1.1

255.255.255.0

N/A

R2

Se2/0(DCE)

192.168.0.2

255.255.255.0

N/A

Fa0/0

192.168.2.1

255.255.255.0

N/A

Fa1/0

192.168.3.1

255.255.255.0

N/A

PC1

NIC

192.168.1.2

255.255.255.0

192.168.1.1

PC2

NIC

192.168.2.2

255.255.255.0

192.168.2.1

PC3

NIC

192.168.3.2

255.255.255.0

192.168.3.1

Internet Access Technologies enable the exchange of information and data through the protocol suite. The intercommunication of the internet enabled devices and the internet is initiated/triggered through the technology of data transmission communication. They majorly focus on the automatic ip assignment being dedicated across the network and the private network conversion. (Guttman, 2009)

Dial up Internet Access. It uses the modulation and demodulation technology of telephone lines. This on the other had is regarded to as old fashion technology (Analog). This is due to slow and unreliable connectivity speed. It is on the other hand least expensive if one is working on limited funds.

DSL (Digital Subscribed Loops). This is more similar to the Dial up technology only that this ensures Asymmetric Digital Subscriber Line (ADSL). This allows the conveyance of internet and telephone on massed on the same line.

Cable Internet. It provides a high bandwidth cable to transmit internet to residential area. This is among the most preferred in the context.

Wireless Broadband (WiBB). This is the modest internet access technology allowing the conveyance of high-speed internet within a large range area. It uses the microwave technology where there is the transmitter and the receiver on the other end. The waves are then demodulated and behold you have internet.

Integrated Service Digital Network (ISDN). It ensures the conveyance of better communication and data transmission along a telephone line reducing information lost along the way.  

Ethernet. This is the most widely distributed local area network since it provides a transmission speed of up to 10Mbps. Sometimes it reaches up to 100Mbps. (Stockebrand, 2011)

Access control- by simply setting up a login and passphrase key keeps hackers and attackers away. One needs to be aware of the security feature and level being laid up. Also by enforcing security policies, one can keep out the non-compliant away from the endpoint by laying up the limited access

Antivirus software- Malicious software such as viruses and worm can crawl into the network, tap a machine and cripple it. At given times malware may also cripple the network and render it useless for several days.

Firewalls – this simply a setup barrier between trusted internal network and others by simply setting up rules and regulations that govern the network. It can either be software based or even hardware. They set defined rules to control the traffic flow within the network. (Brunetti et al., 2011)

Conclusion 

In conclusion, we finally see that the network is successfully setup with consideration of the service they provide and focusing on the objectives that were set before starting the project. I can herby say that the network is functional.

References

Browne, R., Valente, J. and Hariri, S., 2009. An advanced middleware architecture for secure and survivable mobile C4I systems. In Military Communications Conference Proceedings, 2009. MILCOM 2009. IEEE (Vol. 1, pp. 506-513). IEEE.

Brunetti, J.A., Chakrabarti, K., Ionescu-Graff, A.M., Nagarajan, R. and Sun, D., 2011. Open network quality of service and bandwidth control: Use cases, technical architecture, and business models. Bell Labs technical journal, 16(2), pp.133-152.

Comer, D.E. and Droms, R.E., 2013. Computer networks and internets. Prentice-Hall, Inc..

Guttman, E., 2009. Service location protocol: Automatic discovery of IP network services. IEEE Internet Computing, 3(4), pp.71-80.

Stockebrand, B., 2011. Essential Network Services. IPv6 in Practice: A Unixer’s Guide to the Next Generation Internet, pp.81-102.

Trulove, J., 2015. LAN wiring. McGraw-Hill, Inc..