Network management planning and security planning involves identifying the best and most appropriate systems and hardware that the firm can use to better manage network and plan security systems. Therefore, the management required me to examine the best software and hardware systems in the market place that the company can adopt to enable it to manage the network and security. The management required me to advice on the implementation procedure of various plans that are going to be adopted. My responsibility also involved finding out or predicting the impact of the plan on the future operations. They required me to evaluate the challenges the company might face while adopting the changes in the network management plan and security plans.
This context will describe and explain the design considerations that should go into building a secure network. The first step in building secure network is creating the network topology. The topology is a physical and logical layout of the network. It is the DNA and basis of network design. A basic network will contain an Internet Service Provider (ISP) router, boundary router, firewall, switches, severs, and local hosts.
It is ensured by the firewalls and intrusion detection system (IDS). 3) Data Availability which means data should be available to users when they needed. 4) Data Location and Relocation which means data can be moved from one location to another because cloud providers have contracts with each other, so that they can use each other’s resources. In cloud computing environment, plain text is converted into cipher text by the cloud service provider and get back to the original data by the cloud user. Only the authorised user can access the data.
In such a situation the customer is reliant on the service provider to have adequate contracts which they enforce if anything was to go wrong. Auditing is also a practice which was common with traditional software contracts where customers were allowed to audit their suppliers they outsource any services too. For a cloud computing service however, this is not as easy as there is no set physical location of service as the data is probably stored in a data centre which is replicated all over the world for redundancy. Also, opening up a company for audit would breach the privacy of all other customers which use the service and also store their data with the provider.
Regardless of the size of the project, a good plan should be the first step in the process. The principal question that should be asked is: What is the purpose of this network and what are the resources required to meet this purpose? This will lead to creating a project plan that will include all of the standards which will be utilized to design, implement, test, review and revise the entire process as required. Amongst those standards should be a clear, thorough and concise security policy to use during the implementation of every network asset. Physical security, software and configuration for all aspects of the network design must be addressed in the security policy.
3. Check the block force direct connect to report this IP and put in the WAN IP address obtained for your situation in Step 1. This completes the setup of DC. This will vary slightly for Individual Situations I will explain it for a linksys cable/dsl router but the same should apply regardless of what your using for a firewall. 1.
A remote network access policy would define appropriate standards to be applied in connecting to the company’s network while outlining the security standards that devices attempting to connect to the network would follow for successful connectivity. This paper outlines the various network security guidelines that are secure both for the users within an organization and for remote users as well while maintaining a high degree of reliability. Security in Network Management Network management processes that have the backing of senior management are paramount in ensuring that the organization develops security for its network. The management needs to play a great role and incorporate security guidance into their network. The network security guidelines provided here should govern how the network should operate in the area of security, how the network would be developed to maintain security, how security is organized to support upcoming needs, and how the network will comply with the operational and regulatory security needs (Gupta, Chandrashekhar, Sabnis, & Bastry, 2007).
They can connect directly to the companys websites to give the information needed to run the business such as item prices and inventory levels. Recommendation overview: For Bead Bar the network topography that is recommended is star topography. The reason for the selection of this topography is that the disabling of any node will not effect the rest of the network. Once, the central node has been taken care of the system functions. For Bead Bar the selected architecture is the autonomic network architecture.
Why? Routers are used to connect networks together and they also do the following network functions. FUNCTIONS OF A ROUTER • Control broadcasts on the LAN • Act as the default gateway • Translate protocols when necessary • Send data to different networks • Learn and advertise loop free paths • Show the most efficient path to reach the correct destination At the physical, data link and network layer Networks (most of the time Ethernet) use broadcast communication. Transmissions on the network layer broadcast to all devices or servers on the network layer. Network broadcast communication i... ... middle of paper ... ...een programmed this way, and finds routes based off of other routers.
It is considered as the backbone of the OSI model because for the purpose for the data transfer between nodes, network layer performs selection and management of the best logical path. Switches, firewalls, bridges and routers are some hardware devices that this layer contains. From the transport layer it responds to requests and issues requests to the data link layer. The process of moving data from one network to another is known as routing. Interior Gateway Protocols (IGPs) handle routing within a single Autonomous System.