1.0 Introduction
Al Ikhsan Company is a small company producing sports shoes around the city of Ipoh. The company has been operating in several months. In the administration of the company, there is a manager, accounts, production and personnel to manage the Al Ikhsan.
Al Ikhsan company is still operating and is a small company does not have knowledge of networking systems There are a few problems that arise in the management of information in each section manager, accounts, production and personnel in the company.
After analyzing the information obtained by the company, proposed to create a virtual local area network (VLAN) and access control list (ACL).
2.0 Company Background
Al Ikhsan is a company selling athletic shoes in the premises at the address Address Lot F.43, First Floor, Ipoh Parade, 105, Jalan Sultan Abdul Jalil, Greentown, Silver Silver Postcode 30450. States are also distributors of branded sports shoes from off to market in the region surrounding Ipoh. Additionally, the company also makes Al Ikhsan online sales to their customers. Target company in order to grow rapidly to be competitive with existing markets for the products they sell are branded shoes. The target for the customers, these are all levels of society because there are different types of athletic shoes that they distribute.
3.0 Problem Statement
3.1 No knowledge of networking systems.
The company has just set up a few months, so experience in management in the company's networking system is very weak. The company should get some advice from networking to facilitate the daily work and business of the company.
3.2 No limiting computer access to the manager between the staff and also with the production and account.
No limit computer access to...
... middle of paper ...
...: network security access list standards and exended
7.3 google. (2012, novmber 21). cs-study.blogspot.com/2012/11/acl-on-packet-tracer. Retrieved 11 22, 2012, from cs-study.blogspot.com/2012/11/acl-on-packet-tracer: http://cs-study.blogspot.com/2012/11/acl-on-packet-tracer.html
8.0 Appendix
Figure 8.1 shown about the set ip address
Figure 8.2 shown about the configuring of VLAN for Manager
Figure 8.3 shown about the configuring of VLAN for Account
Figure 8.4 shown about the configuring of VLAN for Production and Staff
Figure 8.5 shown about block host staff to host manager
Figure 8.6 shown about block host production to network 192.168.2.1
Figure 8.7 shown about block toip address staff to network 192.168.2.1
Figure 8.8 shown about set ip address of manager can access to all pc or network
The scope of this project is not to provide wireless Internet to the cus-tomers, only to provide working access on employee
The deployed wireless network automatically disables rogue access points when required. In order to connect to the wireless network, all wireless laptops are required to be the current domain members. A group policy is enforced to all domain members so as to lock their system to SSID access point. For network layer protection, firewalls must be installed throughout the network. Wireless connections should always be WPA2 secured. All systems must have anti-virus software which provides protection from viruses. To ensure that only valid users access the network system, server certificates are installed in the
Multigroup has a strong top at the tone. All employees have a limited Internet access (unless they have an authorization). All phone calls and computers are being recorded and observed 24/7. The company counts with more than 650 cameras around their facilities. No guest can access their network. Computer access requires username and password. No USB flash drives allowed.
...anization cannot ensure who use telecommuter computers and what happen in remote location. It's also too difficult to ensure telecommuter follows the Non-Disclosure Agreement. There is a way that IT department can use to prevent this from happening. They can control the remote computer settings, and monitoring employee perform on the computer. The deep Freze program can be used to prevent telecommuter to change computer settings. Other than that, keystroke recorder can monitor activity telecommuter so that they engaged with the company work. The last categories of technical support is communication and logistical support. For the communication, IT department responsible to provide support for telecommuters by operating communication and groupware tools for business such as e-mail, instant messaging, and chat room that provide means of communication.
The company has self organizing team and use groupware, emails and blogs to communicate with the customers.
Authorization controls to restrict access to authorized users. These controls are implemented with an access control matrix and compatibility tests.
The company would benefit from the management of user rights. This makes sure that a user only has access to the minimum data/information that is appropriate for their job. For this system to remain effective it should be reviewed every four to six months. Job titles, requirements, personal, and technologies change often. In order for it to be proficient and the company to run smoothly everyone should have access to what they need in order to do their job correctly and efficiently the first time
The correlation of expansion in Footwear International fell within the same time constraints as Bangladesh’s political history. As power transferred in 1971, the Manager Director of the company was recognized as being an integral part of the independence movement of Bangladesh. Two years following President Ershad gaining office, Footwear Bangladesh seen as the number one growth potential within Footwear International’s strategic plan. Sales were in excess of 10,000,000 pairs of footwear and gave the company 15% of the national market (L...
In addressing the problem, the proposed research will use the case study method to examine the plan, design, and implementation of WLAN technologies at Berean. At present, the non-wireless local area network (LAN) technologies employed by Berean include 10/100BaseT Ethernet at each desktop. Ethernet ports at the desktop are switch connected to an Asynchronous Transfer Mode (ATM) T1 backbone. Berean¡¦s one remote facility connects to the network using switched Frame Relay services along with Internet Virtual Private Network (VPN) connections.
Networks, including the internet, are one of the most essential things to businesses. Without computer networks, companies would be lost and would not have a way to communicate without these systems and this would cause businesses to operate slower (Network 1). Patch works of older networking systems are easier to find these days (Network 1). Starting relationships between many businesses, networks in many ways become synonymous with the groups and businesses they bring together (Network 1). Business employees, customers, and business partners would have available access to their information stored in network systems, could get to their network systems and share them easily among themselves (“Network” 1). Computer networks give their owners speed, ability to connect, and ultimately value to their users. They give possible solutions for business difficulties and issues that would not be possible to other businesses (Network 1). Computer networking systems are required for electronic communications. (Network 1) As time moves on, businesses’ spend a ton of money on computer systems that are used to manage various functions such as accounting, human resources...
Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever-growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a short distance to cover. In most cases a LAN only occupies one or a group of buildings located next to each other. For larger area need there are several other types of networks such as the Internet.
But, these laws always changing, depending on the work setting or policies set by any specific organizations. Because there are so many different work environments, each claim of privacy has to be evaluated based on the actual conditions of the workplace (Smith & Burg, 2015). This is why policies must be set according to the CEO needs. If the organization does not allow the use of the internet for any personal use, than the employee must follow such guidelines. This eliminates employee privacy right violations, because the policy will informs them of the monitoring during the hiring
Network management planning and security planning involves identifying the best and most appropriate systems and hardware that the firm can use to better manage network and plan security systems. Therefore, the management required me to examine the best software and hardware systems in the market place that the company can adopt to enable it to manage the network and security. The management required me to advice on the implementation procedure of various plans that are going to be adopted. My responsibility also involved finding out or predicting the impact of the plan on the future operations. They required me to evaluate the challenges the company might face while adopting the changes in the network management plan and security plans.
The company consider one of fastest growing brand in the gulf region and highly trusted brand in UAE. They operate in modern and automated were they have machines are producing and doing the most of the production requirements. The factory operate according to the local authorities and international standards. AlAin company is part and one of Agthia group companies. The quality management system achieved internal and international quality standards such as ISO 9001:2008, FSSC 22000 and Hazard Analysis and Critical Control Points (HACCP). They consider the manufacturing process and their labs world class now after getting ISO 17025 for international laboratory standard.
the employees and vice versa. This is a way to make sure everyone will access