M-Tech Limited is a network consulting and engineering firm which specialized in providing solutions such network design, network implementation, supply of network devices and provide a wide range of solution in information technology. Our team consist of wide range of expertise which have deep analysis on the customer’s problems.
E-Commerce organization has contacted M-Tech Limited to provide a solution on network design and implementation in the new building which they will be moving soon. Since it is a new building everything will be set it from the scratch.
M-Tech’s expertise have done thorough analysis on E-Commerce organizations and have come up with the following problems which client need to be addressed in the new building. The network services that need to be availed in the new building will include:
The above problems will be addressed by the M-Tech expertise within one week of service.
Our network design and implementations considers the following factors include:
As the number of system users’ increases, resource controls system need to be implemented to ensure that all the resources are shared among the authorized personnel only. Without this controls data integrity, confidential and availability may be negatively affected. In this network of E-Commerce organization, there is a need to be implemented a security measures that authenticate and identify individuals connected to the network.
Active Directory is one of the services that windows server 2012 is shipped with. All the computers in the network and users will authenticate through this. Users and policy implementation will be based on departmental. Staffs which belongs to specific department will share common files and policies. This will ensure security in the organization’s network.
Backup is essentials in every business. Hardware and Software tend to failed in unpredicted time. Other disasters which are not predicted included environmental for example flood, fire and human factors. In case of malware attack data may be attack therefore they must be a need to ensure that the down time of company systems are low. Local Backup and Cloud backup will be implemented in the network. This will ensures the safety of data. For local backup, external Hardisk which support network sharing will be used. This external Hardisk will be synchronized to the cloud. All the backup will be schedule so that every day during the midnight all the schedule backup services will be running. For each backup service running logs will be generated to show if the backup is running successfully or running with errors.
All the services that employees are accessing over the internet are placed in a demilitarized zone for example Dynamic Network System, Email Service, and File Sharing. The demilitarized zone has an external Firewall which will protect the router from unauthorized access by the black listed internet protocol addresses. Also the purpose of external firewall is to block any public IP address trying to access the internal network.
The internal network is protected by the internal firewall. Any user trying to access the internet will have to use proxy server. The purpose of the proxy server is to receive all the internal clients’ requests and send the request to a remote server. All the responses will be received by the proxy server and forward to the clients which had requested for the resource.
Internal resources are only accessible from within the internal network. Any staff which wants to access emails will use the hypertext protocol to access from the internet. The firewalls also being used support virtual private network therefore any employee which want to access internal application will have to use this virtual private network. All the internal and external users will authenticate to network services using a centralize Active Directory in the network. . Wireless hot’s spot will be place at the open office’s location where signal’s interference will be low.
The purpose if DNS is to resolve internet protocol address into domain name and to resolve domain name into internet protocol address. Domains names are very important since it is easier to remember than IP addresses.
Firewall ensures network and its devices are protected from potential attacks. This is done through analyzing data passing in and out of the network. Firewall uses preconfigured rules to detect any unauthorized packets in the network. So in our network configurations we will consider the following:
VLANS will be implemented in the switch. Traffics from different departments will have their own VLANS. This will ensure security for different departments.
In every organization, files such as spreadsheets are shared by several employees. For example Finance department financial entries are done by different people. So this files need to be shared with top managers to review if everything is alright. File sharing among staff will be accessed through internal network and internet. FTP services will be installed in windows server 2012.
Wireless access points will be available in the entire organization. This will ensures that all the staff are able to access network within the building premises. All the wireless access points will use dhcp to issue IP address to all the computers in the network.
Installing printers in the network will ensures that few resources are shared over the network. This will reduce the cost of buying printers to each computer. Printers will be install in the network. This will ensures sharing of resource among staff. Each office will have its own printer.
Communication in every business is essentials. Getting in contact with business customers’ will thrive the business to the best level. So Microsoft Exchange will in install to carter for email communication. Emails will be accessible over the internet and internal network. The mail server will be hosted within the premises.
Network logs play an important role in any network. Any system that run in a network logs data to the files. This logs file are much important since administrator can know what kind of activity a device is running. Any anomalies activities are logged to the file. Since the devices in network are many for example. Servers, switches, routers, hubs, workstation etc. So to monitor this devices one by one is expensive in terms of human resources. Also they are time consuming. Using a centralized logging system will ease the work of collecting logs from each. Also automated system can be used to analyze logs in one station without the need of manually analyzing.
Web proxy is an intermediately between the user requesting for a resource and a server responding to a user requests. Proxy server is use mainly for privacy purpose in the network. It hides users’ information requesting the resource from the server. The server cannot be able to get users’ details information such the operating system, system architecture etc. In then E-Commerce organization proxy server will help to hide Internet Protocol Address from the internet. Malicious attackers will be hard to get the internal IP address of users therefore protecting them from malicious attacks.
Also apart from hiding actual internet protocol address to the internet, proxy server speeds up the browsing activating in the network. The most visited sites will be cached from the server. If the site content has not change the proxy server will send resources to the client requesting. All the resources are cached by the proxy server. This will reduce traffics in the network therefore enabling users to experience first browsing. The network through the support of learning from another will be able to learn of failures. This will enable a router to change the paths for routing as it seeks to look for a better path with a successful packets routings.
Router will reside in demilitarized zone of the network. This is because the router will be facing the public face that is internet. The firewall will be facing the internet in order to prevent router from the various attacks such as denial of service, brute force of router login. The purpose of the router in the network is to look for the shortest path to destination of a request. It forwards all the traffics to other routers in the network. This is the most intelligent system in the network. Dynamic routing will be configured in E-Commerce organizations. They are several advantages of dynamic routings. It involves:
A dynamic routing adapt easily with the network configurations. Routers has ability to learn from another router communication between them. Router broadcast packets to identify itself from the network. The other router will receive the packets and learn by using those packets.
All the workstations except servers will be configured to use dynamic host configuration protocol. Since the number of workstation will more than a hundreds, maintaining the database of the internet protocol address being issued will be time consuming and expensive. Assigning IP Addresses to all workstation come with challenges such as IP addresses conflicting. Using Dynamic Host Configuration Protocol will ease the work by issuing and revoking from workstations. Also maintain addresses to be excluded from issuing to other workstation is convenient since administrator adds to the exclusion table in dhcp server.
Conclusion
In conclusion, we have seen the network requirements, the network design and its implementations. E-Commerce will be able to access all the services with high availability and its security implementation which ensures that everyone in the network is safe from any potential attack.
References
[1]”What is DMZ (demilitarized zone)? – Definition from WhatIs.com”, SearchSecurity, 2018. [Online]. Available: https://searchsecurity.techtarget.com/definition/DMZ. [Accessed: 08- May- 2018].
[2]”Understanding Firewalls and Their Role in Network Security – Schneider Electric Blog”, Schneider Electric Blog, 2018. [Online]. Available: https://blog.schneider-electric.com/datacenter/2011/08/19/understanding-firewalls-and-their-role-in-network-security/. [Accessed: 08- May- 2018].
[3]B. Nelson, “How to Setup and Configure DNS in Windows Server 2012 – Install and Configure DNS on Windows Server 2012”, Tom’s IT Pro, 2018. [Online]. Available: https://www.tomsitpro.com/articles/configure-dns-windows-server-2012,2-793.html. [Accessed: 08- May- 2018].
[4]”Chapter 4: Installing and Configuring Microsoft DHCP and WINS Server Services“, Technet.microsoft.com, 2018. [Online]. Available: https://technet.microsoft.com/en-us/library/cc302637.aspx. [Accessed: 08- May- 2018].
[5]”How to setup FTP server / users on Windows 2012 R2?”, VPSie, 2018. [Online]. Available: https://vpsie.com/knowledge-base/how-to-setup-ftp-server-users-on-windows-2012-r2/. [Accessed: 08- May- 2018].
[6]P. Kennedy, “Microsoft Windows Server 2012 Hardware Requirements and Recommendations”, ServeTheHome, 2018. [Online]. Available: https://www.servethehome.com/microsoft-windows-server-2012-hardware-requirements-recommendations/. [Accessed: 08- May- 2018].
[7]”What Is a VPN, and Why Would I Need One?”, Howtogeek.com, 2018. [Online]. Available: https://www.howtogeek.com/133680/htg-explains-what-is-a-vpn/. [Accessed: 08- May- 2018].
[8]”Star topology – Telecom ABC”, Telecomabc.com, 2018. [Online]. Available: https://www.telecomabc.com/s/star.html. [Accessed: 08- May- 2018].
[9]”Cisco Firewall Best Practices Guide”, Cisco, 2018. [Online]. Available: https://www.cisco.com/c/en/us/about/security-center/firewall-best-practices.html. [Accessed: 08- May- 2018].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download