Friday, October 18, 2019
Infrastructure and Security Essay Example | Topics and Well Written Essays - 1000 words
Infrastructure and Security - Essay Example Network infrastructure consists of single networked computers, cables, routers, wireless access points, network access methodologies, switches, network protocols, bridges and backbones among other devices. In the case of our organization, a closed architecture would be favourable. It is very important to have proper infrastructure in place so that future problems can be avoided. For instance, end user devices should in no way be used to perform any networking functions and conversely it is not a good practice for network devices to deal with functions at Layer 7. The right networking devices should be used in a network so that network instability can be avoided. Mixing of network and application functions can be quite expensive in the event of bug fixes and upgrading and might even bring the whole network to a halt (Stilwell et al, 2006). The arrangement of different network items is referred to as network topology. Network topologies are classified into physical and logical network topologies. Physical topology deals with the interconnection of devices while logical topologies are concerned with how data flows across the network. The company will need a physical star topology layout with a logical bus topology. Star topology is easier to upgrade since it requires upgrading the devices without necessarily changing the cabling. The star topology uses a switch which sends traffic where it is required to go (Stilwell et al, 2006). The figure below shows a logical and physical topographical layout of the current and planned network in an organization Different LAN segments in different floors can be interconnected using a collapsed backbone architecture which is a type of LAN architecture. The LAN backbone is collapsed using Ethernet switch of layer 2. A Fast Ethernet switch with a speed of 1 Gps will be the central device where each LAN segment links to the central Fast Ethernet switch, through two Fast Ethernet connections of fiber optic to each switch. Spanning Tree protocol configures the two switches which acts as backup while the other acts as a primary switch. In case of failure by one switch, the other switch takes over (Stilwell et al, 2006). Laying down the infrastructure layout is half job; network security measures have to be considered. There are specific threats that may target poorly managed network infrastructure security. Some of these risks include loss of data privacy, data integrity may also be lost, denial of service and system compromise. Therefore, better practices are implemented to ensure systems and sensitive information is housed (Stilwell et al, 2006). The main principles regarding network security are better design practices which may be expressed in five ways. The first one is to ensure a secured manner of configuring and accessing network devices. The second one is that network communications should use secure protocols. The third one is appropriate separation of external and internal facing networks, by use of control devices like router access control lists or securely configured firewalls and demilitarized zones (DMZs). Finally, there should be secure management of accessibility of internal networks remotely. Lastly, configuring of internal networks to detect or prevent running of untrusting traffic or
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.