Wednesday, May 6, 2020

Network Analysis The Core Layer - 1277 Words

The Core Layer, which is the trusted computing base internal network of the GFI network, houses the servers that are the heart of the organization. The Core acts as the backbone of the GFI network. The Core has six servers all with specify roles in caring out the daily operations of the business. The core is primarily responsible for transmitting data, processing instructions, and managing the network as a whole. The network architecture used for the GFI network allows for interconnection and communication between all devices on the network. The only evidence of network segmentation is the access layer 2 VLAN switch connected to the finance department. This flat design allowed GFI to reduce cost and save on network maintenance and administration. However, as the company has grown beyond a small startup, their network needs have also grown in size and complexity. Risk Assessment The risk analysis of resources, controls, threats, and vulnerabilities of the GFI information system has outlined many critical areas of concern. All hardware associated with the GFI information system to include switches, firewalls, servers, workstations and peripheral devices within the architecture boundary must be secured both physically and logically. All software, databases, libraries, computer programs, and source code used on GFI systems have been identified as areas of risk that need to be secured. The severity of the risk impact will be determined by the potential loss ofShow MoreRelatedLogical vs. Physical Network Design1134 Words   |  5 PagesPhysical Network Design The typical Top-Down approach to network design uses a systematic method to plan, design, and implement a new network. Generally, the Top-Down methodology involves analysis of the business requirements and goals, development of the logical design based on such goals, development of the physical design, and a phase for testing, optimizing, and documenting the network design. This paper focuses on the activities performed to create a logical design of a network and thenRead MoreLogical Vs. Physical Network Design Essay1125 Words   |  5 PagesPhysical Network Design The typical Top-Down approach to network design uses a systematic method to plan, design, and implement a new network. Generally, the Top-Down methodology involves analysis of the business requirements and goals, development of the logical design based on such goals, development of the physical design, and a phase for testing, optimizing, and documenting the network design. This paper focuses on the activities performed to create a logical design of a network and thenRead MoreAssignment 2: Network Topology Design Essay967 Words   |  4 PagesAssignment 2: Network Topology Design You are the network manager of a company that has grown from 10 employees to 100 employees in 12 months. Year 2 projected growth is estimated to be 100 additional employees located at a remote location. The aggressive growth has brought about some unique challenges and opportunities. The company has one remote warehouse and no off-site disaster recovery services or servers. The network design remains a non-redundant, flat topology. Your assignment must considerRead MoreNetwork Topology Design Essay707 Words   |  3 PagesNetwork Topology Design Week 4 Assignment 2 Naressa Hackney Menser Dr. Edwin Otto CIS532 Network Architecture and Analysis February 3, 2013 â€Æ' Network addresses should be carefully planned managed and documented (Oppenheimer, p. 168). All of the address names should make sense and should be easily understood. As Oppenhiemer states, I would begin planning by designing a model. Design the model without assigning any addresses (p.168). Once the model is designed, the network engineer willRead MoreThe Label Switching And Mpls Is A Technique That Enables The Labeling Of Packets1476 Words   |  6 Pageslabeling of packets in such a way that facilitates network traffic and the tracking of that packet across different routers along a network. As a technique, moreover, it is differentiated from a specific service, so that in essence MPLS can be utilized in the delivery of different kinds of services, including virtual private networks on IP, Ethernet, and optics-based services. The fundamental idea is that information about a packet in a network is saved in a kind of tag or label, known as the FECRead MoreCmgt/430 Enterprise Secu rity1513 Words   |  7 Pagespotential actions the organization should take. Organizations that capitalize on data stand apart from traditional data analysis environments in three key ways: They give attention to data flows as opposed to stocks; they rely on data scientists and product and process developers rather than data analysts, and they are moving analytics away from the IT function and into core business, operational, and production functions. This assignment will specify the provision of organization data and accessRead MoreThe Design Of Network Topology1601 Words   |  7 Pages Design of Network Topology Pravalika Reddy Podduturi Virginia International University Author note Pravalika Reddy Podduturi, Department of Computer Science, Virginia International University. pravpodd@campus.viu.edu Abstract According to the book ‘Top down network design’ by Priscilla, and research by Pandya supports that a network is a group of devices connected together. There are many types of computer networks like, local area network (LAN), wide area network (WAN), campus area networkRead MoreAdvantages and Disadvantages of Multiprotocol Label Switching639 Words   |  3 Pages, ENTERPRIZE NETWORK MANAGEMENT APRIL 20, 2014 Loading...MULTIPROTOCOL LABEL SWITCHING Executive Summary 2 The analysis and discussion of an existing network can be a daunting task for any company small or large. This includes the discussion of current advancements of the Multiprotocol Label Switching or MPLS. This paper will start with a brief description of what MPLS is and briefly address some key elements of MPLS to include the current advancements of MPLS as well as an analysis of potentialRead MoreAssignment 5 Project Deliverable 5 Infrastructure And Security.1495 Words   |  6 PagesInformation Systems C apstone, CIS499 February 26, 2017 Assignment 5 Project Deliverable 5 Infrastructure and Security LefTech’s relationship between infrastructure and security: How it relates to our data-collection and analysis company†¦ Data collection is the core component of our company and what we value most here at LefTech. Without data LefTech would not exist. We are a value driven company that thrives on Stakeholder satisfaction. With data and the collection of it, comes the addedRead MorePatton - Fuller Community Hospital948 Words   |  4 PagesAn analysis of Patton-Fuller Community Hospital Network systems James doglas CMGT/554 December 19, 2011 Carol Eichling An analysis of Patton-Fuller Community Hospital Network systems Patton – Fuller community hospital’s network system consist of two major parts, the first part is the executive part that connects the hospitals executive management, human resources department, operations, IT and data center, etc., the first network is connected using a 1000base-T Gigabyte network connection

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.