StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Topology and Design Layout - Essay Example

Cite this document
Summary
The author of the "Network Topology and Design Layout" paper demystifies the complexities behind an operational network system in a start-up company. There has also been a discussion on pivotal matters in a network such as security, management, and service delivery…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Network Topology and Design Layout
Read Text Preview

Extract of sample "Network Topology and Design Layout"

Network Topology and Design Layout 1.0 Introduction With open source software products you can gain access to the software source code in addition to the program software. There is room for restructuring and redistribution of the software. The presented company ABC seeks to specialize in this subject of open source software under proper security and management. In order to achieve this, the company needs two Current Versions Systems (CVS) servers. CVS enables code developer to save and gain access to various versions of source code. In this case, one CVS server shall only be accessible by internal developers and another by anonymous outsiders who intend to download source code. The company will also need two WWW servers so that one is for its internal management and another for external users. Furthermore, a mail server will also be crucial in this case. For the sake of ABC company security, it is crucial that outsiders should not gain access to the internal CVS or internal WWW servers whatsoever. For a start-up open source software company as the company ABC, it would be a great challenge to fully implement an effectively secured network. In this study we therefore purpose to realize the company with the above specifications. Below is a graphical representation of the network design layout. 2.0 Security 2.1 Security Assumptions It is very risky running an entire company on a personal computer. The ABC Company needs to watch over servers that handle the web based systems with advanced expertise. Such servers in this case include CVS and WWW servers. In terms of security assumptions, it is important for the company to make its security appear good as argued by Cheswick et al (2003) that this is enough to deter attackers. It is also important to make simple security arrangement since complex things are harder to comprehend and might even be nightmare to their designer (Cheswick et al, 2003, pp.5). For a young company as ABC, it would be inappropriate to use huge security-sensitive programs because in most cases such programs have acted as sources of security problems. Furthermore, the company's network designer must keep security assumptions in mind and see to it that the security is an integral part of the original design. 2.2 Security Policy Let us begin by considering this typical policy: Internal users are trusted, and with permitted Internet access they are able to initiate ongoing TCP connections, issue DNS queries, be able to run ping trace-route and set their clock aided by external time server (Cheswick et al, 2003, pp.5). Secondly, the outsiders should not be able to initiate access to the internal world. Adherence to policies as such are able to keep the security of the company checked at all times. In order to improve security further, ABC Company may decide to develop a policy restricting only external users with valid accounts when it comes to downloading of software. 3.0 Trust Domain 3.1 User Trust Assumptions With a domain trust, users from a trusted domain can be allowed access to services in a trusting domain. With reference to Todorov (2007), trust relationships can exist as transitive or non-transitive. Transitive trust domain (source) trusts the domains of the domains (accounts) upon which its trust is build. There needs to be no existent relationship between them. On the other hand, non-transitive domain relationships, if domain C trusts B and domain B trusts domain A, then domain C does not implicitly trust A. Network users in the company could act as the root entitled to security management, administrative tasks (Microsoft Official Academic Course 2014). 3.2 User Classification In the hierarchy of user classification and their capabilities we could say that the ABC Company’s domain lies in the top-most category. Its duty is to offer services to other network users such as the anonymous users who only download software and source codes from the website of the company. When it comes to the trusted domain category, a trustier only trusts a trustee with respect to fulfill an agreed upon task or service (Grandison & Sloman, 2000, pp. 3). The anonymous users can also contribute in the development of the company by leaving comments, suggestions and proposals in its website. Based on ABC's firewall management, it could control the incoming and outgoing traffic based on the applied set of rules. The rules build restrictions between the company and other net users for the better part of its security. 4.0 Authorization Mechanisms Authorization is purposed to control the rights of authenticated entity on network services and resources (Athina, 2010, pp.187). Server-based authorization mechanism is suitable for the ABC company communication model. This mechanism is applicable when the anonymous users download software from the company's servers. It therefore lies within the company to generate and keep authorization rules. 5.0 Server Security The distribution of services in client/server increases the susceptibility of the company's system to damage from viruses, fraud, physical damage or even misuse in the centralized system. These security issues and others like information theft apply in both the CVS and WWW server cases. The company should see to it that the CVS server center is in a secure location where strict access by authorized personnel is allowed. Furthermore there should be an interrupted power supply since this protects the server through mains filtration. This can also allow the server to shut itself down in an organized manner hence enabling data protection. The WWW servers could be protected by the company through the implementation of security protocols such as the Internet Protocol Security (IPsec). The IPsec supports secure exchange of packets at the IP layer. There are also instances when some Internet users send malwares and spy-wares as mail so that they are not detected by mail servers. It is therefore upon the user to identify any mail in their in-box before opening and responding to them. Normally there are application managers designed by mail companies to manage the mail servers. The configuration and management of these servers is therefore a responsibility of the ABC Company. 6.0 Conclusion Practical implementation of a good and effective network system is based on a prominent network topology and layout design. This study demystifies the complexities behind an operational network system in a start-up company. There has also been a discussion on pivotal matters in a network as security, management and service delivery. There is therefore need for the company to analytically implement the presented arguments in a reasonable manner towards the betterment of its performance. Reference List Athina, L. 2010, August. Wireless Technologies for Ambient Assisted Living and Health-care: Systems and Applications. IGI Global. Cheswick, R. W., Bellovin, M. S. & Rubin, D. A. 2003. Firewalls and Internet Security: Repelling the Wily Hacker. Addison Wesley Professional: Boston, PP. 4-6. Grandison, T. & Sloman, M. 2000, Fourth Quarter. A Survey of Trust in Internet Applications. IEE Communications Surveys. PP. 2-16. Retrieved from http://www.comsoc.org/pubs/surveys . Microsoft Official Academic Course 2014, October. Exam 70-413 Designing and Implementing a Server Infrastructure. John Wiley & Sons Todorov, D. 2007, July. Mechanics of User Identification and Authentication: Fundamentals of Identity Management. . CRC Press: Florida. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network topology design & layout Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Network topology design & layout Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1673688-network-topology-design-layout
(Network Topology Design & Layout Essay Example | Topics and Well Written Essays - 1000 Words)
Network Topology Design & Layout Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1673688-network-topology-design-layout.
“Network Topology Design & Layout Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1673688-network-topology-design-layout.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Topology and Design Layout

ACE Network Design

8) and the decision once made on topology and network media is seldom changed or it might be very expensive to change this decision at a later stage to cater network management or optimization issues.... This report will present a detailed network infrastructure design to accommodate all business and technological needs of the network, a diagrammatic overview of the topological layout of network infrastructure devices.... The report will present also present a diagrammatic overview of the topological layout of network infrastructure devices....
9 Pages (2250 words) Essay

The Concept of Connecting Computers to one Network

These networks are further classified into star topology network, ring logical topology and bus physical topology.... Name Institution Course Instruction 13th December 2013 Characteristics of your network topology Introduction network topology is a systematic arrangement of different nodes of many computers in local area network and wide area network.... Thus, network topology means, network that is connected to circular method whereby, each node examines raw data send to a ring finally; it is send through directed address....
2 Pages (500 words) Essay

Network Design for UMUC Branch Office

The project "Network design for UMUC Office" seeks to upgrade the network of the UMUC branch office located in Mannheim, Germany.... The proposed network design allows for the development of a fast, reliable, and secure network.... The system is fragmented - each department has its own network.... The director of the campus is seeking to improve security, raise network bandwidth, and also consolidate the multiple LANs into one campus network whilst keeping costs minimal....
6 Pages (1500 words) Term Paper

Computer Network and Logical Network Design

Network design is a systematic approach to interconnect a number of computers in such a way that they can exchange information.... It is a detailed, labor-intensive activity and utilizes both physical and logical network design strategies.... During the design process, all key aspects of the network design are examined in terms of how they meet current needs and how they must be adapted or enlarged as network usage grows.... In the following section a description of both physical and logical design is given to clearly define the distinction between these two approaches....
2 Pages (500 words) Essay

Three Network Topologies

The word topology, or additional particularly, network topology, refers to the pact or physical description of computers, wires, and other machinery on the network that we want to build.... For this we have to see the following Running head: THREE NETWORK TOPOLOGIES DISRUPTIVE AND REVOLUTIONARY TECHNOLOGY: Affiliation October 2008 Three Network Topologies The word topology, or additional particularly, network topology, refers to the pact or physical description of computers, wires, and other machinery on the network that we want to build....
2 Pages (500 words) Essay

Computer Technology and the Networked Organization

This essay articulates on network setup and design of a medium-sized food store, the structure of securing, socio-technical linkages and maintaining the network.... Network structure design is compulsory for any computer network, whether it is small business or home network.... According to the paper the perfect network for medium-sized food store therefore must be candid and effortlessly controlled.... An Enterprise networks have thousands of end-users and comprises of wide-area network links, mainframe systems, complex array of servers and the like....
4 Pages (1000 words) Assignment

Network Design for the Medium-Sized Public Relations Company

This report "Network Design for the Medium-Sized Public Relations Company" presents a description of the network infrastructure layout/topology for a Small to Medium-sized Public Relations Company.... The report further provided the network layout diagram that shows how the network will be laid out.... The network design diagram for the recommended layout will also be shown in this report.... The justifications for the recommended layout will also be discussed in this report....
9 Pages (2250 words) Report

Network Design For Public Relations Company

Also, the advantage of choosing a common, but secure network topology is to enhance the connection of computers or peripherals in a linear version where employees can be able to share the same network in the same organization.... Star network topology requires less cable length than other network designs and is uptime and bandwidth distribution is constant regardless of the traffic flowing in the network.... "Network design For Public Relations Company" paper contains a network design and also the requirements for the design for the network....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us