Free Essay

Cis175 It Consult

In:

Submitted By elmano
Words 731
Pages 3
DesignIT Network Consultation Proposal
Strayer University
CIS175 Introduction to Networking
Professor
June 17

Network Consultation Proposal In order to design and deliver a reliable and secure network for DesignIT, many critical factors must be considered such as the network topology and architecture, the selection of hardware and software components designed to meet the client’s requirements, and also appropriate security services. DesignIT has decided to upgrade from a temporary workplace to a permanent office space. The new space measures 56’ x 36’ giving DesigntIT over 2000 square feet of dedicated space. This new space contains four cubicles, one executive office, one server room, one reception desk, and one conference room and allows DesignIT to hire two full time designers and a receptionist. As stated in the Request for Proposal (RFP) issued by DesignIT, the design must incorporate the following considerations: * Relocation of three servers configured as follows: * One (1) Web Server – Microsoft IIS Server * One (1) File Server- Microsoft Server 2008 * One (1) Server – Server 2008 Small Business Server
Furthermore, DesignIT has stated the design must also include the following deliverables: * High speed internet access * Firewall * Antiviurs/Malware protection * Six (6) computers * Three (3) color laser printers * Wireless access for portable devices

A critical first step in designing a network to meet DesignIT’s requirements is designating the network topology. A network topology is both the logical and physical layouts of the network. Physical topology is related to the physical aspects of the office space and the requirement to provide network distribution to the various offices, reception area, server room, and conference room. Related to the physical topology is the logical topology. The logical topology is not necessarily constrained by the physical aspects of the office. The logical design must take into consideration the requirements for any Virtual LAN’s (VLAN), Virtual Private Networks, (VPN), as well as the accesses required by personnel within the office. The network design for this project is based on TCP/IP connected to the internet via a commercial fiber optic connection with wireless 4G LTE serving in a redundant role. The figure below represents the logical topology of the office.

A Cradlepoint ARC MBR1400 LPE will be used to provide the required wireless access for portable devices and also redundant 3G/4G connection to the internet in the case of a wired failure. The use of the Cradlepoint also provides security features such as IPv6, PCI compliance for transactions conducted in the office, and multiple account login options for guests and employees.
Recommended Office Hardware Description | Item | Unit Cost | Quantity | Total Cost | SOHO Server | 2008 Small Business Server | N/A | N/A | N/A | File Server | Microsoft 2008 Server | N/A | N/A | N/A | Web Server | Microsoft IIS Server | N/A | N/A | N/A | Server UPS | APC 3000va | $1,375.00 | 3 | $4,125.00 | Cabling | Various | N/A | N/A | $1,000.00 | Router | Cradlepoint MBR1400 | $799.99 | 1 | $799.99 | Antivirus | Norton Premium | $69.99 | Annual | $69.99 | Firewall | Juniper | $600.00 | 1 | $600.00 | Computers | Dell EliteBook | $1,250.00 | 6 | $7,500.00 | Computer UPS | APC BK500 | $99.00 | 6 | $594.00 | Printer | HP Pro 476 | $500.00 | 3 | $1,500.00 | Total | | | | $16,188.98 |

Security Considerations A Juniper small business firewall has been chosen for to help provide security for DesignIT. Firewalls are an integral part of business security by helping to prevent unauthorized access and internal and external attacks. Firewalls provide protection against worms, viruses, Trojans, spam, and malware. Along with a firewall, Norton Small Business Antivirus was chosen. Norton Small Business that virus and malware threats are stopped before they can do damage, warns of threats to files to be downloaded, and detect threats found on USB devices.
Expected Costs Costs associated with equipment, labor, and services for the year are detailed in the following table. Labor costs were based on managed services support for remote IT needs as a full time IT employee was not required. Type | Cost | Labor | $15,000 Annually | Equipment | $16,188.98 | Services | $6,000.00 Annually |

Failure Points As with any network configuration, failure points are inevitable. Several common failure points such as power and internet access have been addressed by the use of UPS and a wireless router respectively. However, even with these redundant measures planned failure points such as the loss of a server, firewall, or router still exist.
.

References

Similar Documents

Premium Essay

Security on the Internet

...Marshall Keese Instructor: David Belva Course: CIS175 Security on the Internet The Internet has had security problems since its earliest days as a pure research project. Today, after several years and orders of magnitude of growth, is still has security problems. It is being used for a purpose for which it was never intended: commerce. It is somewhat ironic that the early Internet was design as a prototype for a high-availability command and control network that could resist outages resulting from enemy actions, yet it cannot resist college undergraduates. The problem is that the attackers are on, and make up apart of, the network they are attacking. Designing a system that is capable of resisting attack from within, is still growing and evolving at a fast pace, is probably impossible. Changes are needed, and once you have achieved a certain amount of size, the sheer inertia of the installed base may make it impossible to apply fixes. The challenges for the security industry are growing. With the electronic commerce spreading over the Internet, there are issues such as nonrepudiation to be solved. Financial institutions will have both technical concerns, such as the security of a credit card number or banking information, and legal concerns for holding individuals responsible for their actions such as their purchases or sales over the Internet. Issuance and...

Words: 2435 - Pages: 10