Вы находитесь на странице: 1из 12

TASK 1

Investigate network cabling options available in your country for the networks within the
architects office. Pay particular attention to:
a The !e"ia use"
b The connectors use"
c The cost of cabling an" installation
" The "ata transfer rates that will be re#uire"
Data Network cables (also known as transmission media) are responsible for carrying messages back and
forth between computers and other devices and as such are the foundation of your network. All other
network equipment has to be compatible with the choice of data cable, so this decision constrains or
determines many of other choices. he choice of the cable type depends on the network!s topology, protocol,
and si"e. #hile varieties of cables are standardi"ed and available for in the market to purchase, these types
mainly fall into four main categories.
$nshielded wisted %air ($%) &able
'hielded wisted %air ('%) &able
&oa(ial &able
)iber *ptic &able
he architect+s company office comprises of five rooms and a reception area all on a single floor it seems
that networking needs are very simple but being an architect+s firm, the requirements of the speed, capacity
and security are high. Architects need drafting large files, accessing client information, email facilities and
file storage, so the slow ,nternet connections or low scale networking media can make communication time-
consuming and frustrating.
.y keeping in mind, more or less seven workstation computers and one server is the need, along with the
some peripherals so linear bus topology should work efficiently in the firm.
$e"ia:
&oa(ial &able used as a medium for the networking.
%oa&ial %able
&oa(ial cabling has a single copper conductor at its center. A plastic layer provides insulation between the
center conductor and a braided metal shield. (#inkelman, /011).
23A'*N4
he metal shield helps to block any outside interference from fluorescent lights, motors, and other
computers.
,t is highly resistant to signal interference.
,n addition, it can support greater cable lengths between
network devices.
he two types of coa(ial cabling are thick coa(ial and thin coa(ial.
hin coa(ial cable is also referred to as thinnet. 10.ase/ refers to the specifications for thin coa(ial cable
carrying 3thernet signals. he / refers to the appro(imate ma(imum segment length being /00 meters. ,n
actual fact the ma(imum segment length is 156 meters. hin coa(ial cable has been popular in linear bus
networks.
hick coa(ial cable is also referred to as thicknet. 10.ase6 refers to the specifications for thick coa(ial cable
carrying 3thernet signals. he 6 refers to the ma(imum segment length being 600 meters. hick coa(ial
cable has an e(tra protective plastic cover that helps keep moisture away from the center conductor. his
makes thick coa(ial a great choice when running longer lengths in a linear bus network (Anon., n.d.).
Coaxial Cable Connectors
he most common type of connector used with coa(ial cables is the
.ayone-Neill-&oncelman (.N&) connector. Different types of
adapters are available for .N& connectors, including a -connector,
barrel connector, and terminator. &onnectors on the cable are the
weakest points in any network. o help avoid problems with your
network, always use the .N& connectors that crimp, rather screw, onto the cable. (#inkelman, /011)
%ost of cabling an" installation:
&oa(ial cable is one of the economical transmission media for data networking. ,t comes in greater lengths.
'o resulting in less connector installation so minimum weak points. ,n comparison with the other cabling
option it is much cheaper than fiber optic but moderately e(pensive than $%. ,ts installation is very easy
and simple. ,nstallations of thicknet are dwindling, this is because this thicker version of coa(ial cable is well
shielded and therefore doesn+t suffer as much from interference as thinnet cable.
hinnet was the cable at one time because of its relative ease of installation and its low cost. hinnet 7ANs
employ a bus topology, where a -connector is attached to each computer+s network card. he computers are
then chained together using appropriate lengths of cable. hinnet installations require that each end of the
network be terminated, and terminators are placed on the downside -connector of the computers that reside
on either end of the network. (Anon., n.d.)
Coaxial cable
The "ata transfer rates:
&oa(ial cable is limited to only 60 8. per second. hat fulfils the requirements of the firm data transfers,
and other communication needs. As it is a firm of architects, a high speed data transfer is the prime
requirement. 'o transfer rate of 60mbs is chosen for the company network.
'eco!!en"ation:
&oa(ial cable has a fairly high degree of immunity to noise, and can be used over longer
distances. #e can use thicknet and thinnet cables in a network. hicknet &oa(ial cable can be
used to make network backbone cable. 8aplin is the hardware store where you can easily find the
cable and connector ad all the relevant equipment for the installation of cable.
hicknet cable of 10.ase6 is the backbone cable while an ethernet tranceiver was connected to
the cable using a vampire tap, so called because it clamps onto the cable, forcing a spike through
the outer shielding to make contact with the inner conductor, while two smaller sets of teeth bite
into the outer conductor. hen a thinnet cable will be used to connect the thicknet and the
computers.
#hether the best option for networking is the optic fiber but according to the requirement and the budget, it
goes out of range of the firm. Depending on the firm and networking location better and optimum option will
be coa(ial cable as transmission media.
TASK: (
'esearch the har"ware re#uire" for provi"ing a secure intranet for all the functions the fir!
re#uires an" a secure e&tranet that allows clients to access the architectural "rawings an" other
"ocu!ents that have been create" for the! whilst preventing access to other "ata. )ive "etails
of:
The "ata transfer rates an"*or !e!ory storage space that will be re#uire" for each
function
The har"ware options available for each re#uire" function
The costs of purchase an" installation for each piece of har"ware
)or a single floor Architect firm, requirements for an intranet for company internal communications
including the storage of client files, printing facilities, email facilities, etc.
)irm also requires an e(tranet for remote working and client access to relevant files. he hardware
requirement for providing a secure intranet for all these functions the firm includes4
A secure and reliable intranet requires4
#eb server
Network *perating 'ystems and &lient 'oftware
2epeater
he network interface card (N,&)
2outer9switch
Networked &omputers
)irewall hardware and software
%rinter, scanner and fa(
Web Server
A server is a network computer that provides access to various
network resources. 8odern networks of any si"e are server-
based or client-server networks. )ile servers are either
minicomputers or high-specification %&s with large-capacity
storage devices, high-speed processors and large amounts of
2A8. he storage devices used are typically RAID (redundant
array of ine(pensive disks) devices, which employ multiple disks to store programs and data, affording a
high degree of fault tolerance. A file server provides services such as user authentication, access to home
directories and shared file space, and printing services. A specialised network operating system (N*')
provides the necessary network management functions. 3(amples of include Windows 2008 'erver and
Novell Netware.
+etwork ,perating Syste!
A network operating system (N*') is a special kind of operating system designed to provide networking
functionality. A network operating system should support client-server networking, and include all of the
programs needed to manage network resources and create a secure network environment. he most widely
used network operating systems today include 8icrosoft #indows 'erver
'epeater
As signals travel along a transmission medium there will be a loss of signal strength ( attenuation ). A
repeater is a non-intelligent network device that receives a signal on one of its ports, regenerates the signal,
and then retransmits the signal on all of its remaining ports. 2epeaters can e(tend the length of a network
(but not the capacity) by connecting two network segments.
The network interface card (NIC)
3very device on a network that needs to transmit and receive data must have a network interace card (N,&)
installed. hey are sometimes called network adapters, and are usually installed into one of the computer!s
e(pansion slots in the same way as a sound or graphics card. he N,& includes a transceiver, ,t provides the
physical connection between the network and the computer workstation with the help of networking cables.
,t plays an important role in the speed and performance of a network.
Switch*'outer
he switch9router is a relatively new network device that has replaced both hubs and bridges in 7ANs. A
switch uses an internal address table to route incoming data frames via the port associated with their
destination 8A& address. 'witches can be used to connect together a number of end-user devices such as
workstations, or to interconnect multiple network segments. ,t provide internet security as firewall.
Networked Computers
A workstation is a computer that is configured with a network interface card, networking software, and the
appropriate cables. #orkstations do not need large storage hard drives and other components, because
mostly files are saved on the server.
Firewall hardware and software
,t is a networking device that is installed at the entrance to a 7AN when connecting a networks together,
particularly when connecting a private network to a public network. he firewall uses rules to filter traffic
into and out of the private network thus acting as security wall.
As we discussed earlier 608b9s is the desired data transfer rate of the company, these hardware and the
media that , recommend will be enough to fulfill the requirements. .igger storage capacity is the point of
interest here for me. .ut the server has the capacity to store bigger files and provide sufficient security.
here are variant options for the hardware of the networking, here , already mention the ,.8 server, client
computer can be any computer that can able to install the company relevant software. All the computers now
a day+s come with built in network interface card. No need of firewall separately as the router having the
capability to act as firewall.
'erver is e(pensive hardware equipment among all networking materials. ,t cost you somewhere between
1000-1600 pounds, whereas workstation can be :00-600 pound each one. 2est of the hardware including
router, repeater and peripherals are not costly at all.
After the installation of the server and connected to the repeater and router through coa(ial cable, thinnet
cable is used to ;oin workstation with the backbone cable. he topology we will be going to follow is simple
linear bus topology, as it is a single floor office with nearly 5 systems working in a network.
Network operating system and ,ntranet dashboard will be installed in your server systems. hat can be
assessed by employees and outside through e(tranet as well.
ecommendations4
.y keeping in mind a complete network diagram about < work station computers are the need, my
recommendation for them is =% %avilion p>-//00ea Desktop %& with 7'/0.?00N' /0@ 73D 8onitor,
it is :10.00 pound system with a 7&D monitor, comes with 1 year free service warranty at %& #orld.
,.8 server will be the best choice as we are looking for a small network so we need all in one server. ,t
costs about 11/0.00 pounds from the ,.8 store. All these systems come with the built in network
interface cards and widows has its own firewall facility.
N3A3A2 %ro'afe 50/.11g B%N )irewall about /00 pounds and a Netgear A'105 %ro'afe repeater of 50
pounds seems good for the networking solution. *nly point of concern regarding to firm future needs will be
e(tra large storage capacity so for storing larger data in a network , recommend an e(ternal network data
storage device of 160 pound, Netgear 2eady Nas NB Network 'torage 'ystem. Cust for the hardware your
overall estimated cost will be ::/0 pounds.
TASK: -
Investigate the security issues relating to the e&tranet you have "esigne" in Task ( inclu"ing:
a The security issues that are specific to an e&tranet
b Protection fro! viruses. tro/an horses. etc
3(tranets provides highly productive and cost effective new ways of working. *rgani"ations can use
,ntranets and 3(tranets to distribute information, build a wide range of self-service applications and can
improve collaboration among employees across the organi"ation and with business partners. .eside of all
these advantages for architect firm to implement an e(tranet, such an interconnection can e(pose company
business to increased security risks.
here are the following potential security issues regarding to e(tranet4
An unauthori"ed person, such as a contractor or visitor, might gain access to a company+s computer
system.
An employee or supplier authori"ed to use the system for one purpose might use it for another. )or
e(ample, an engineer might break into the =2 database to obtain confidential salary information.
&onfidential information might be intercepted as it is being sent to an authori"ed user. )or e(ample,
an intruder might attach a network sniffing device to the network. #hile sniffers are normally used
for network diagnostics, they can also be used to intercept data coming over the wire.
$sers may share documents between geographically separated offices over the ,nternet or 3(tranet,
or telecommuters accessing the corporate ,ntranet from their home computer can e(pose sensitive
data as it is sent over the wire.
3lectronic mail can be intercepted in transit.
oo many e(tranet accesses provide the potential entry point for viruses and other malicious
contents.
'ensitive and proprietary information can be also at risk due to unauthori"ed user access.
,n order to protect the network system from the viruses, ro;an horses or other malware, a protection system
must be installed. here are numbers of antivirus and anti malware software are available and these
software are updated on regular basis. hese softwares combines multiple anti-malware scanning
engines from industry-leading security partners with file and keyword filtering to provide
comprehensive protection against the latest threats. here are two most commonly used antivirus
programs are Daspersky Anti-Birus for #indows 'ervers and )orefront %rotection 'erver
8anagement.
)ollowing are the main advantages of the antivirus program4
,t stops malware more effectively through integration of multiple industry-leading scanning engines
,t blocks dangerous attachments from being posted or downloaded with file filtering
,t prevents the upload or download of out-of-policy content with keyword filtering
,t ma(imi"es malware detection without compromising performance

!C"##!N$%TI"NS %S T" T&! S!C'IT( #!%S'!S
here is no security issue with the intranet and e(tranet if the proper safety measure is taken. An e(tranet
should be properly planned, implemented and maintained to ensure that it does not pose an unacceptable risk
to an organi"ation+s data and information systems.
)ollowing are some key point+s measures that should be considered in an e(tranet. (&happle, /00>).
)*) Isolation+
,solate e(tranet systems from both the public network and the private network. During e(tranet design, keep
in mind that only the desired information should be e(posed to required person.
,*) Stron- authentication+
he /
nd
key point of a secure e(tranet is the use of strong authentication techniques. #here possible,
e(tranets should implement some form of two-factor authentication.
.*) /ranular access controls
*rgani"ation has to interact with a number of different suppliers, customers, vendors and business partners,
you need to take steps to enforce the principle of least privilege. he ideal scenario, of course, is to
implement isolation to such a degree that e(tranet clients get access to a network "one that only contains
resources they are authori"ed to access.
0*) !ncr1ption
)inally, e(tranets should make use of available encryption technology. .y nature, e(tranets involve sharing
sensitive organi"ational data over the ,nternet.
!F!!NC!S
1. 3-network. (1EEE). !abling options" Available4 http499www.e-networks.org9EcablingF1coa(.html.
7ast accessed 16th *ct /01/.
/. echnology $D. (/001). #elecomunication" Available4
http499www.technologyuk.net9telecommunications9networks9transmissionFmedia.shtml. 7ast
accessed 16 *ct /01/.
?. Dr. 2oy #inkelman. (1EE<-/011). !$ %& cabling" Available4
http499fcit.usf.edu9network9chap:9chap:.htm. 7ast accessed 0? *ct /01/
:. 8ike &happle. (/00>). strategies or secure e'tranets" Available4
http499searchenterprisewan.techtarget.com9tip9)our-strategies-for-secure-e(tranets. 7ast accessed 1:
*ct /01/.
6. !$apter 2 - !onnecting Network !omponents" Available4 http499technet.microsoft.com9en-
us9library9cc</?:>1.asp(. 7ast accessed 0? *ct /01/.
>. Daren A. Dorow Diks. (/001). (ecurity !onsiderations or )'tranets" Available4
http499www.sans.org9readingFroom9whitepapers9basics9security-considerations-e(tranetsF6/<. 7ast
accessed 0: *ct /01/.
<. 8icrosoft forefront. (/01/). Available4 http499www.microsoft.com9en-us9server-
cloud9forefront9default.asp(. 7ast accessed 1: *ct /01/.

Вам также может понравиться