This assignment will explore the secure network architecture for a coffee and tea retailer that is frequented by various users in need of an internet connection. The focus of this proposal will be a recommendation of a design for this type of organization while addressing cost and security concerns. Ultimately, I would recommend a Wide Area Network (WAN) for this type of organization. The data shared below is what I took into consideration before arriving at this decision.
Alternative Architectures
Typically when performing a review of network architecture, most designers review the Local Area Network (LAN) and the Wide Area Network (WAN) diagrams. The LAN consists of a group of computers and supporting devices that share communications line as well as share a server within a particular area (usually one that is geographic). An example of this would be each individual store location having access to their selective network. On the other end of the spectrum is a WAN. A WAN is a wide spread telecommunications network that can span across regional, national or international platforms. This mode of design creates an environment to conduct daily operations within its various locations. A widely used example of the WAN is what the Internet consist of today; multiple users connected all over the world using a single platform.
Pros and Cons of WAN and LAN
When reviewing alternatives, there are always benefits and potential drawbacks of each option. Reviewing alternatives will also allow a further analysis of what network designs consist of and how organizations weigh their decision. Below is a table that outlines the pros and cons of each network design (Differen, 2015):
Local Area Network (LAN)
Wide Area Network (WAN)
Covers
Local Areas
Large Geographic Areas
Speed
High Speed (1000 mbps)
Low Speed (150 mbps)
Data Transfer Rates
High Data Transfer Rates
Low Rates especially when compared to a LAN
Connection
One LAN can be connected to other LANs over any distance via telephone lines and radio waves
Computers connected to a WAN are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites.
Ownership
Typically owned, controlled, and managed by a single person or organization
WANs are not owned by any one organization but rather exist under collective or distributed ownership and management over long distances.
Set-Up Cost
If there is a need to set-up extra devices on the network, it’s fairly inexpensive.
Since networks in remote areas have to be connected the set-up costs are higher. However WANs using public networks can be setup very cheaply using software such as a Virtual Private Network (VPN)
Maintenance Cost
Because it covers a relatively small geographical area, LAN is easier to maintain at relatively low costs.
Maintaining WAN is difficult because of its wider geographical coverage and higher maintenance costs.
Unit 1: Assignment 2 (P3, M2) The Election process (P3) To stand for election you must be 21 years of age at least and a British, Commonwealth or republic of Ireland citizen also need to be nominated by at least 10 of the registered electors in the constituency and if you want to stand you must receive authorisation from the party if you don’t then you will be classed as an independent and have to pay £500 which you only get back if you receive over 5 percent of the votes cast There are many selection…
ISS3340 Windows Security Unit 2 Assignment 1 Recommendations for Access Controls Recommendations for Access Controls Access Control is the defined as “the selective restriction of access to a place or other resource”, in the RFC 4949. “The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.” Simply put the ability to read, write, modify, or deleting information or files is what Access Control is. It is more than this, in the permissions…
Hutchison, John 6/28/15 NT2580 Unit 2: Assignment 1-Window of vulnerability The four parts would be the Discovery-Time, Exploit-Time, Disclosure-Time, and Patch-Time. All four of these must be looked at and evaluated. Discovery Time –is the earliest date that vulnerability is discovered and recognized to pose a security risk. The discovery date is not publicly known until the public disclosure of the respective vulnerability. Exploit Time -is the earliest date an exploit for vulnerability is available…
What does “secure information” really mean? Information that is secure satisfies three main tenets, or properties, of information. If you can ensure these three tenets, you satisfy the requirements of secure information. The three tenets are as follows: • Availability—Information is accessible by authorized users whenever they request the information. • Integrity—Only authorized users can change information. • Confidentiality—Only authorized users can view information. Internal use only—Information…
OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN BUSINESS Unit 2 - BUSINESS RESOURCES P1 - describe the recruitment documentation used in a selected organisation P2 - describe the main employability and personal and communication skills required when applying for a specific job role M1 - analyse the recruitment documentation of a selected organisation Scenario You are to produce a guide for applicants on the recruitment documentation used within a selected organisation (Duffryn High School)…
In this assignment, I will talk about developing Effective Communication in Health and Social Care. In order to achieve, I will explain the role of Effective communication and Interpersonal Reaction in a Health and Social Care setting context. I will also discuss theories of communication such as Formal and Informal communication. In order to have good communication skills it is important to understand the effectiveness of communication and interaction formed between people. Explain the role of…
Course Information Sheet & Units Overview Date: July 13 - August 14, 2015 Teacher: Ms. Puopolo Department: English Principal: Joe Russo Curriculum Policy Document The Ontario Curriculum, Grades 11 & 12: English, 2007 (revised) Course Title English Course Code ENG 4U1 Grade & Type 12 University Pre-requisite English, Grade 11, University Preparation Full Year / Semester Summer Session (July-August) Credit Value 1 Course Description (As specified in Ministry of Education Policy Document) This…
Graded Assignments STUDENT COPY The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course. Graded Assignment Requirements Assignment Requirements documents provided below must be printed and distributed to students for guidance on completing the assignments and submitting…
of Science Unit Guide S1 Day Session 1, North Ryde, Day 2013 Table of Content Table of Content General Information Convenor and teaching staff Credit Points Prerequisites Corequisites Co-badged status Unit Description 2 3 3 3 3 3 3 3 Learning Outcomes Assessment Tasks Weekly Exercises Assignment One Assignment Two Assignment Three Final Examination 4 5 5 5 5 5 6 Unit Schedule Delivery and Resources CLASSES REQUIRED AND RECOMMENDED TEXTS AND/OR MATERIALS UNIT WEBPAGE AND TECHNOLOGY…
PT1420 Introduction to Programming GRADED ASSIGNMENTS Graded Assignment Requirements This document includes all of the assignment requirements for the graded assignments in this course. Your instructor will provide the details about when each assignment is due. Unit 1 Assignment 1: Homework Learning Objectives and Outcomes Describe the role of software for computers. Identify the hardware associated with a computer…