Riordan Network Security Recommendations

Requirement

Question: Riordan Network Security Recommendations

Solution

Hardware and Software Required to Secure Our Network From Electronic Threats
We chose Virtual Private Network (VPN) over public Internet under intranet site-to-site for Riordan Manufacturing. 
VPNs by default are more secure than the underlying public network as they "use advanced encryption protocols and secure tunneling techniques to encapsulate all online data transfers " ("What Is A VPN? - WhatIsMyIP.com®", 2016) and also data integrity checks (VPN SECURITY February 2008, 2008). 

Hire the best computer science experts at Allassignmenthelp.com to complete your CSE assignment on time. Our computer programming assignment helpers have the potential to assist the students in improving and achieving the desired grades. If you are running out of time then you can get our instant assignment help online and submit your assignments before the deadline.

VPNs cannot make online connections completely anonymous, and thus we would like to increase the security, for which we include the following as applicable ("Virtual private network", 2016):

  • 1.    Internet Protocol Security (IPsec)

  • 2.    Transport Layer Security (SSL/TLS)

  • 3.    Datagram Transport Layer Security (DTLS)

  • 4.    Microsoft Point-to-Point Encryption (MPPE)

  • 5.    Microsoft Secure Socket Tunnelling Protocol (SSTP)

  • 6.    Multi Path Virtual Private Network (MPVPN)

  • 7.    Secure Shell (SSH) VPN

Comparison of Local Area Networks (LANs), Wide Area Networks (WANs) and wireless technologies

The technologies to realize a LAN, WAN and a wireless network are different as they have different physical characteristics.
LANs use Ethernet, cables, and network switches for hardware. A switch can be connected to a router, cable modem, or ADSL modem for Internet access ("A Review of the Basic Components of a Local Area Network (LAN)", 2016). For protocol, it uses TCP/IP.
One way of WAN is based on leased lines connected by a router on each end. Another way is using circuit switching or packet switching. Protocols include Packet over SONET/SDH, MPLS, ATM and Frame Relay. The hardware includes Network Access Points (NAP), backbones and routers.
For Wireless Personal Area Networks (PANs) Bluetooth, IEEE 802.15, and IrDa Cable replacement technologies are used. For Wireless LAN, IEEE 802.11, Wi-Fi, and HiperLAN  are used. And for global coverage,  CDPD and Cellular 2G, 2.5G, and 3G and LTE are used ("Types of Wireless Networks", 2016)

Concepts and Building Blocks of Data Communication Networks

In general, a data communication network includes the following components  ("Network Fundamentals Study Guide - Webopedia", 2016):

  • Server: It is a computer or device that manages network resources.

  • Client: A client is a computer/application that requests a server for some resource.

  • Transmission media: The type of physical system used to carry a communication signal from one system to another. Examples of transmission media include twisted-pair cable, coaxial cable, and fiber optic cable, wireless etc.

  • Network Interface Card (NIC):  An expansion board you insert into a computer so the computer can be connected to a network.

  • Hub: It connects multiple computers or other network devices together ("What is Hub?", 2016).

  • Switch: A device that filters and forwards packets between LAN segments. 

  • Router: A router is a device that forwards data packets along networks.

  • Gateway: A node on a network that serves as an entrance to another network.

  • Bridge: A device that connects two local-area networks (LANs), or two segments of the same LAN that use the same protocol

  • Access Point: A hardware device or a computer's software that acts as a communication hub for users of a wireless device to connect to a wired LAN.

  • Modem (modulator-demodulator): A modem is a device or program that converts electrical signal to physical signal and vice-versa.

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order

References

  • A Review of the Basic Components of a Local Area Network (LAN). (2016). Networkbits.net. Retrieved 8 August 2016, from http://networkbits.net/lan-components/local-area-network-lan-basic-components/

  • Groth, D. & Skandier, T. (2005). Network+TM Study Guide: Exam N10-003, 4th Edition. John Wiley & Sons.

  • Network Fundamentals Study Guide - Webopedia. (2016). Webopedia.com. Retrieved 8 August 2016, from http://www.webopedia.com/quick_ref/network-fundamentals-study-guide.html

  • Tanenbaum, A. & Wetherall, D. (2011). Computer networks (p. 3). Boston: Pearson Prentice Hall.

  • Types of Wireless Networks. (2016). Computernetworkingnotes.com. Retrieved 8 August 2016, from http://www.computernetworkingnotes.com/wireless-networking-on-cisco-router/types-of-wireless-networks.html

  • Virtual private network. (2016). Wikipedia. Retrieved 8 August 2016, from https://en.wikipedia.org/wiki/Virtual_private_network#Security_mechanisms

  • VPN SECURITY February 2008. (2008) (1st ed., p. 5). Retrieved from http://www.infosec.gov.hk/english/technical/files/vpn.pdf

  • What Is A VPN? - WhatIsMyIP.com®. (2016). Whatismyip.com. Retrieved 8 August 2016, from https://www.whatismyip.com/what-is-a-vpn/

  • What is Hub?. (2016). Computerhope.com. Retrieved 8 August 2016, from http://www.computerhope.com/jargon/h/hub.htm

  • Wireless. (2016). Wikipedia. Retrieved 8 August 2016, from https://en.wikipedia.org/wiki/Wireless

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order