Introduction to Networking Touchstone 4 (1)

docx

School

Portland Community College *

*We aren’t endorsed by this school

Course

212

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

5

Uploaded by BaronRoseGuineaPig68

Report
Mason Patterson 1920 Dayton Ave. Ames, IA 50010 515-773-3916 02/06/2024 Chris Nelson President Greenfield Properties 123 Sophia Way Minneapolis, MN 55000 Dear Mr. Nelson, I’m glad I was able to work with you to design a functional network system to meet your organization’s needs. As promised, included below is a non-technical outline of specific inclusions that must be made for your new network to function as you intend. Please do not hesitate to reach out with any questions or concerns. Sincerely, Mason Patterson 1
Introduction My proposal discusses goals in creating a network capable of supporting your company, allowing for growth from the merger. This document outlines specific physical and virtual objects that will be utilized in the function and protection of this network. Network Infrastructure 46 employees will be using 95 devices. With this increased number of users, Greenfield Properties will need to move on to a client – server network, since these users are expected to share resources from any location, and some employees will need special access to databases. This network will be both LAN and WAN, for on campus employees and off-site. Twisted pair cables can be used since they are less costly than coaxial cables. Twisted pair cables will reduce signal loss. These server functions will be needed to meet Greenfield Properties’ needs: - File server: Allow employees to access data. - Web server: Allow access to web sites and public clouds. - Mail server: Allows the company email data to be stored on the company’s system rather than web hosting. - Database server: Access to databases was requested for a handful of employees. - Print server: Allows printing without setting up individual drivers on each device. The servers will be hybrid of on-premise and cloud-based due to the needs of Greenfield Properties. Off-site employees can access public cloud data when away from the facility, and employees with proper authorization can access on-premise databases, since data lakes can require large amounts of storage. Network Segmentation and Printing Subnetting will improve performance of the network’s security. 2
Each server function can occupy a subnet, including the print server. Each subnet will have decreased traffic, meaning less latency. Depending on if the employee is on campus, off campus, or has special permissions will determine what servers the employee has access to, such as access to the print server for on- site employees only and database access for data employees. Printing An independent print server will be beneficial to save the IT team time during the setup of the network. Setting up individual drivers for each device in a system without a print server would be very time consuming and difficult for the IT team. The print server will cost some additional money, but will remove inconsistencies created by direct IP printing, can handle more complex tasks, is simple for the users, and allows the organization to have more control over settings and permissions. Wi-Fi Networking There are 69 wireless devices currently, but the company should expect to support more, to allow room for growth following the merger. 12-13 wireless access points will be needed, and they must be spread out to cover the campus, to ensure any given location has appropriate wifi capabilities. Each WAP will have the same SSID. This means that users will be able to roam the facility while connected to the same network, even if they leave the range of a wireless access point they are using. A LAN controller will ensure devices move from one AP to another. Security Measures The network must be protected from threats in order to protect user data. Protection on multiple levels will prevent breaches from occuring by physical and virtual means. Physical Security Devices and equipment will be stored in secured locations that require a badge swipe to access. This will prevent individuals who do not have proper clearance or outsiders from accessing devices they are not intended to have. Infrastructure Access 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Routers and switches will be kept out of reach or in an area in sight of a camera to prevent tampering. MAC address lists will be set to include only addresses that belong to company devices, preventing unauthorized technology from accessing the network. Authentication All employees will use multifactor authentication to sign into devices connected to the network. This means verification of signing in via text or email in addition to username and password. User login data will be encrypted, so even if a hacker breaches this data it will not be readable. Lockout Policy If a user or outsider fails to log in within 3 attempts, the user will be locked out from attempting to sign in for 5 minutes. If they fail another 3 attempts, this will be escalated to 15 minutes. Password Complexity Requirements A more complex password is more difficult to guess. These are my suggested requirements: - 8 character minimum, 20 character maximum - At least one uppercase letter - At least one number - At least one symbol - Must not contain name or birthdate Firewall The purpose of a firewall is to impede hackers from accessing ports. A stateful network-based firewall will protect the system. In addition to the network’s firewall, most computers come with a client-level firewall for the device, free of charge. Anti-Malware Installing anti-malware software for the entire server is the most cost-effective route. Norton Antivirus starts at $19.99/year for a server plan. 4
5