Untitled

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 37

Contents

P1: Discuss the benefits and constraints of different network types and standards.............................2
P2: Explain the impact of network topology, communication, and bandwidth requirements..............3
P3: Discuss the operating principles of networking devices and server types.......................................3
P4: Discuss the interdependence of workstation hardware and relevant networking software...........5
M1: Assess common networking principles and how protocols enable the effectiveness of networked
systems..................................................................................................................................................6
M2: Explore a range of server types and justify the selection of a server for a given scenario,
regarding cost and performance optimization......................................................................................7
P5: Design a networked system to meet a given specification..............................................................8
P6: Design a maintenance schedule to support the networked system..............................................12
Network Maintenance...................................................................................................................12
Upgrading Hardware and Software.........................................................................................12
Network Monitoring....................................................................................................................12
Security........................................................................................................................................12
Scheduling Backups.....................................................................................................................12
EOL devices...................................................................................................................................13
M3: Analyse user feedback on your designs with the aim of optimising your design and improving
efficiency.............................................................................................................................................15
P7: Implement a networked system based on a prepared design.......................................................17
P8 Document and analyse test results against expected results.........................................................21
M4: Recommend potential enhancements for the networked systems.............................................23
D1: Evaluate the topology protocol selected for a given scenario and how it demonstrates the
efficient utilisation of a networking system.........................................................................................24
D2: Critically reflect on the implemented network, including the design and decisions made to
enhance the system.............................................................................................................................29
Part 1

P1: Discuss the benefits and constraints of different network types


and standards.

Figure 1

Kindly note all comments are in the PowerPoint presentation.

(Editorial, 2021)

(Prasanna, 2022)

(Shaw, 2022)

(Stoltzfus, 2021)

(Snyder, 2021)
P2: Explain the impact of network topology, communication, and bandwidth requirements.

Figure 2

Kindly note all comments are in the PowerPoint presentation.

(KEARY, 2022)

P3: Discuss the operating principles of networking devices and server


types.
Figure 3

Kindly note all comments are in the PowerPoint presentation.

(Melnick, 2022)

(Team, 2022)
P4: Discuss the interdependence of workstation hardware and
relevant networking software.

Figure 4

Kindly note all comments are in the PowerPoint presentation.

(techopedia, 2012)

(Trick, 2022)

(Singh, 2022)

(clintg, 2020)

(Geeksforgeeks, 2022)

(IBEAKANMA, 2022)

(Tippins, 2022)

(andro, 2021)
M1: Assess common networking principles and how protocols enable
the effectiveness of networked systems.

Figure 5

Kindly note all comments are in the PowerPoint presentation.

(Techopedia, 2020)

(geeksforgeeks, 2021)

(CDW, 2022)

(Williams, 2022)
M2: Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimization.

Figure 6

Kindly note all comments are in the PowerPoint presentation.

(Saeed, 2022)

(microsoft, 2022)

(Shanika Wickramasinghe, 2021)

(alteryx, 222)
Part 2

P5: Design a networked system to meet a given specification.

Chosen LAN as a network type for my design

Lan is a network that provides connecting wires and cables. The LAN is generally wired as a star,
with all of its branches going to a central hub. The LAN can be accessed by two or more computers
within the same office or building. A dedicated LAN is a computer network that stands on its own,
separate from the other networks around it. The LAN usually operates using a separate set of cabling
and may or may not use the same type of power or data cables as other networks.

Network design

Figure 7
Figure 8

Figure 9
Technical network design
Figure 10

Devices used

ADSL: Is a service that competed with a cable to provide local access to high-speed customers. You
can access the internet from it via your phone line. ADSL is a type of internet that operates over
regular phone lines. It's much faster than dial-up service and won't cause problems with your phone
line. This means that you'll be able to use the internet, even while making voice calls on your landline .
(Kayne, 2022)

Servers: A server is a standard-issue computer that manages network data, devices, and
systems. Servers allow organizations to have the network devices they need while providing
them with the resources they need. This is important for businesses because this means their
server will be scalable, efficient, and reliable. (Ingalls, 2021)

Firewall: A firewall is a system that keeps unwanted messages from coming onto/going off of your
computer or another security system. A firewall will be able to identify, then block, any malicious
intrusion attempts on your network. They work by using software to manage activity on the network
and prevent anything in case of an attack. The objective of your firewall should be mainly to prevent
any kind of cyberattack. (Kanade, 2022)

Router: The router is a device that connects information to the internet in home and small business
networks. It is used to forward traffic and packets depending on layer 3 info. It has a variety of
applications and communicates across multiple protocols. It also acts as the gatekeeper that protects
your network from any unwanted intrusion. (Sheldon, 2020)

Switch: A network switch operates at the data link layer, meaning that it happens on a physical
device. It receives packets and forwards them to the right devices. Switches can operate at the
Network Layer (Layer 3) and routing takes place there. Switches are devices or software that act as a
gateway between the LAN and WAN. The switch is responsible for handling all of the data coming
into it, so it has the intelligence to know what needs to go where. (shaw, 2022)

Access Point: A wireless access point can be added to your existing setup for improved WIFI
coverage. They are becoming more popular in places where one connection wouldn’t work for the
entire property. These are mostly large, solid structures or buildings where the wireless signal needs to
go through a lot of objects on the way. (Tom, 2022)

Plus, I added up a printer and an IP phone.

Cloud Backup

There are a lot of great reasons to use cloud backup. One is that it's really good for sending copies of
files, databases, or entire virtual machines to secondary off-site locations without any downloads. The
goal of a backup system is to always have copies of your data in case anything happens. Having
cloud-based secondary data stores and servers makes it easy to make sure that your files are safe, no
matter what is happening. There are different types of cloud backup services: you can save data
directly to the public cloud, you can use a dedicated provider, or you can back up from one cloud to
another. One method is to set up on-premises backup and save data in the public cloud. (netapp, 2022)
P6: Design a maintenance schedule to support the networked system.
Network Maintenance

Network maintenance is a broad term that covers everything that needs to be done in order to keep a
network up and running efficiently. Network monitoring, network administration, and network
security are all responsibilities of the network administrator. You will only be able to maintain the
stability of your IT if you plan ahead for potential malfunctions and inconsistencies. A clear,
predetermined network maintenance plan will allow you to not have to reactively solve problems as
they arise, which in turn helps you maintain that stability.

Upgrading Hardware and Software

Always install, replace, and update the hardware and software of your IT network to protect it from
becoming outdated. Installing new products updates the system with the latest developments,
improves performance, and protects it against cyber threats. Upgrading hardware, software, and patch
levels can all be considered different things. Upgrading hardware may involve replacing older
equipment or software updates. Patching may also be needed as a safety measure to protect your
system.

Network Monitoring

A proactive maintenance campaign is essential for preventing damaging network problems. It allows
employees to be aware of, and fix any issues before they can have a negative effect on day-to-day
operations. To deal with potential network problems efficiently and ensure your network is running
smoothly, make sure you document any problems that arise.

Security

There are many ways to maintain the security of your network, including updating software and
securing access. If you have a dedicated team of IT professionals who go around monitoring your
network regularly, which all large companies usually do, then you'll be much more aware of
vulnerabilities and security threats.

Scheduling Backups

Your data is valuable and it should be a high priority to back up your important files. You can avoid
losing all of your data by performing routine backups. Ensure that any backup copies of the core
network devices are timely monitored and verified because this will make it easier to restore a
component or the entire network in case of a hardware or software failure. (ecmanagedit, 2019)
EOL devices

If vendors close their doors to old operating systems and hardware, cybercriminals can take advantage
by remaining even more undetected. It is always best to update your hardware when the end-of-life
date passes. By not doing so, you’re risking your company’s data and putting it at risk of being stolen
or corrupted.

At-risk data: EOL hardware is vulnerable to security risks, which can have devastating consequences
when they are able to affect both the device and everything on the network it has access. If your
device is detected as unpatched or outdated, please contact a professional before these vulnerabilities
give hackers access to even more of your data.

The cost of maintenance: Eventually, EOL means no more patches or upgrades. That also means parts
stop being made and are hard to get. It's tough for IT to find what they need, and it's expensive too.

Business productivity: Hardware that is technically outdated is more susceptible to failure at any
moment, leading to unnecessary downtimes and hindering productivity.

 Legal ramifications: When it comes to risks at the end of life, organizations that handle sensitive
customer data or government information face an elevated level of danger. For these organizations,
failing to take care of your data in a way that's compliant with regulatory standards can lead to some
very serious consequences. (Richard Dornhart, 2021)

Managing and Maintaining Your VPN

Unlike other security devices, like a Firewall or proxy server, VPNs require constant attention. That's
because some types of Internet traffic can more easily get through even when a firewall is in place.
VPNs can also be accessed from various "points of Internet access" around the world, while
configuring a firewall may take help from those who use said equipment. Anyone who has used a
remote access server knows how frustrating it can be. Similarly, to remote access servers, users of a
VPN are likely to run into many of the same issues, including slow browsing and lack of connection
stability. Remote sites that are connecting to a corporate LAN might require less maintenance until
you start worrying about security.

Testing plan

Define the test objectives by identifying the areas of your network that need to be tested.
These can include:

 Volume testing. Makes sure the resource servers work properly under constant
volumes of data coming from applications over a long period.
 Stress Testing. Ensures that the network stays resilient at peak load conditions. A
good rule of thumb is to test the load on a system at 25% higher than what you expect,
all at once.
 Recovery Testing. Maintains backups and recovery procedures to ensure they are all
up to date.
 Security Testing. The network has been verified to meet the security requirements
 Performance Testing. Ensures that performance metrics are met (e.g., response times,
media views)
Define Acceptance Criteria

For every objective, identify how to tell when it has been successfully completed. For example:

 All results expected were achieved on the first run.


 All severe and high-priority errors have been fixed and the associated tests were successfully
rerun.
 The company always maintains a documented plan to identify what will happen next in
regard to low and medium-priority faults. It's also updated when something changes.

Define Schedule

Identify the high-level activities, tasks, and expected start and completion dates.

Define Responsibilities

Who will be responsible for the test?

Define Resources

Confirm the staff, hardware, and software requirements. Check that the Network Deployment Plan
has accounted for these needs and find a way to resolve any differences.

Define Procedures

Define what needs to be done to ensure tests are conducted and met: Write test scripts, set up the
testing environment, and test the product. (community, 2008)
M3: Analyse user feedback on your designs with the aim of
optimising your design and improving efficiency.
As a commercial network, we want feedback from our users as it helps us to keep improving the
service. If you think we're doing something right or wrong, please contact one of our customer
services centres to let us know. When a network problem occurs and your service is impacted, it is
best to contact the customer service centre. If we could extract this data, it could provide a more in-
depth insight into what issues users are experiencing. This would complement the views of advanced
monitoring techniques implemented by service providers.

User feedback scenario 1: The network is too slow

Speed test

There are a lot of online utilities that measure Internet speed. Speed Test is a good resource
for this and can tell you what you're getting from your ISP versus what you need. Your
internet speed is a useful piece of information if you need to call your ISP for help.

Reset Adaptor

While the cause of the issue could be many things, you might start by resetting your Network
Adapter. Windows will then work to fix the problem and might reset the network adapter on its own.
Sometimes this speed solves your Internet problem. If not, you will have to reset your Network
adaptor and the problem should be solved. If that doesn't work, you may need to troubleshoot the
computer by resetting it with Windows and see if that fixes anything.

Restart the router or modem

Sometimes all it takes is restarting your modem and your router. They provide broadband Internet to
the whole house and make things easy to access. Wait ten seconds so the modem is completely
powered off. Plug in the modem and make sure it's working properly by going to your link web
interface. The modem will blink green when it has finished booting up.

Call your internet provider

If your Internet is slow and it’s also not working, call your ISP for help. This usually resolves the
issue; if that doesn’t work, check with the manufacturer.

User feedback scenario 2: Wi-Fi signal is weak

The access point is too far away from the devices.

You can't see the devices your access point is broadcasting to and they're too far away to connect
with. This makes it difficult to troubleshoot any issues. With this in mind, you should consider
upgrading to a wireless access point that's closer to your devices.
The access point needs a firmware update.

Your access point might not be performing as it should. If that's the case, you should consider
installing the latest firmware update which could help improve performance. for your device. If you're
using an older generation access point, you should consider upgrading to a newer generation access
point.

Access points interfere with each other.

You're using two or more wireless access points and they're interfering with each other. This
reduces the quality of your wireless connection. It's a good idea to switch to a single access
point with higher radio broadcast power. Sometimes, configuring a wireless access point with
the same SSID as your primary wireless access point can cause interference. This makes it
hard to troubleshoot any issues. If you have trouble connecting to your primary wireless
network, try changing the password and disabling the current one so only one network is
broadcasting at a time. Sometimes, configuring a wireless access point with the same SSID as
your primary wireless access point can cause interference.
Part3

P7: Implement a networked system based on a prepared design.

Setting VLANs and subnets

Assuming that guest WIFI needs 2000 host

00000000.00000000

65,536.32,768.16,384.8,192.4,096.2,048.1,024 512.256.128.65.32.16.8.4.2

Network 190.123.0.0 Subnet 255.255.248.0

10111110011110110000000000000000 11111111.11111111.11111000.00000000

10111110.01111011.00000000.00000000

11111111.11111111.11111000.00000000

11111111.11111111.11111000.00000000 = 2048 host - 2046 usable IPs

Vlan 3 Client IPs

Range 190.123.0.1 - 190.123.7.254

Assuming that Employee’s WIFI needs 500 host

00000000.00000000

65,536.32,768.16,384.8,192.4,096.2,048.1,024 512.256.128.65.32.16.8.4.2

Network 190.123.8.0 Subnet 255.255.254.0

10111110.01111011.00001000.00000000 11111111.11111111.11111110.00000000

10111110.01111011.00001000.00000000

11111111.11111111.11111110.00000000

11111111.11111111.11111110.00000000 = 512 host - 510 usable IPs

Vlan 6 Employees IPs

Range 190.123.8.1 - 190.123.9.254


Assuming that Admin WIFI needs 100 host

00000000.00000000

65,536.32,768.16,384.8,192.4,096.2,048.1,024 512.256.128.65.32.16.8.4.2

Network 190.123.10.0 Subnet 255.255.255.128

10111110.01111011.00001010.00000000 11111111.11111111.11111111.10000000

10111110.01111011.00001000.00000000

11111111.11111111.11111111.10000000

11111111.11111111.11111111.10000000 = 128 host - 126 usable IPs

Vlan 9 Admin IPs

Range 190.123.10.1 - 190.123.10.126


Figure 11
Figure 12
P8 Document and analyse test results against expected results
Figure 13
M4: Recommend potential enhancements for the networked systems.
ENHANCE NETWORK PERFORMANCE

A reliable and uninterrupted network is important to ensure that business continues running smoothly.
Poor quality of service or a connection problem could lead to wasted time, loss of productivity, and
money. This means businesses need to balance the cost-benefit of purchasing a high-quality internet
service provider (ISP). It's important to keep an eye out for the factors that can lead to poor network
performance. One of these factors is malware, but don't forget about old equipment too. As the
importance of networking grows and with the need for reliable, up-to-date service providers in mind,
you should assess your network and rate them to identify if they meet all your requirements.

Offer guests another network

Network slowdowns are sometimes the result of irresponsible, user-generated traffic via social media
and other applications. While it’s unclear if your streaming guest is causing these problems, you
might want to consider how many guests are streaming in the lobby. If it’s a large number of people
and they need Internet access, that could be more of a problem than one individual without Wi-Fi.
You might also want to consider how much bandwidth they’re using while they’re streaming. If all
these people are streaming at once, that could also be a problem.

Educate staff members.

You may notice a slowdown during lunchtime if a couple of your employees are spending their breaks
chatting over food. They may be getting back to work by booting up their computer, and you can take
the opportunity to remind them of the company guidelines for time off from work. They might not be
aware of the network resources they use during lunch, so take a moment and tell them about latency.
Chances are that they would happily choose a different leisure activity if you make a few suggestions.
There are many other factors that might be causing a slowdown- for example, people might be not
sharing files properly by emailing PPT presentations to multiple contacts. Instead, they could share
them via a shared file storage solution. If you have employees sharing large and unnecessary files
often, teach them how to compress those files, or to use the cloud instead. This way, the network
won’t get affected much by all that traffic.

Consider running low-priority traffic on a VLAN and segment your network without sacrificing
performance.

Virtual Local Area Networks are indicative of a growing trend in the modern workplace, designed to
maximize efficiency in networks. They can be configured in such a way that ensures the highest
standards of importance are guaranteed and distributed to all areas, especially traffic-heavy ones. A
VLAN offers the benefits of having distinct networks without having to rewire your office. You can
set them up based on which computer is being used, or what they are being used for in their respective
area, even if they are all throughout the office. Using VLANs also ensures more security. If your
network becomes compromised, that part can be isolated from the rest of the system. This means
other areas will be safe from harm.

Upgrading and updating your firmware and software will ensure your system provides the best
experience possible.

Updating your software is important in this digital age. If you're using old technology or outdated
machines, you could have software running on them that doesn't work properly. A lot of people don't
feel safe updating their programs and this can lead to a lot of problems. When there are bugs with
your outdated software, they might break down your entire infrastructure. Keeping your devices up-
to-date can help improve your network's performance. For example, when a driver is updated it can
boost the CPU's performance. Technology is constantly changing, and any company needs to make
sure they're always on top of changes. Unless you upgrade your outdated software, the system will be
unusable and your network inefficient. The only way to optimize it is by upgrading old or obsolete
software.

Bottlenecks.

Network monitoring is important to diagnose potential bottlenecks in your network. For instance,
system backups typically use up a lot of bandwidth & space. Most networks run backups at night
because resources are usually available then. Remote monitoring and maintenance services are the
best way to ensure any problems with your tech don't get out of hand. They can spot and identify any
issues much quicker than you could, so you can fix them before they turn into a disaster.

Upgrade your network.

When you're having an issue with connectivity, it might not be the client's device. This can sometimes
be remedied by upgrading the network and suggesting devices to troubleshoot their issue. Fortunately,
as we said earlier, fibre Internet has never been less expensive. If you are still using an old and
outdated cabled connection, a new wired connection could eliminate your greatest delays.

Optimization is never 100% and networks need to constantly be re-adjusted.

No matter how well your network is configured today, nothing stays the same. Your applications will
change and you'll need different servers to support them; you'll upgrade devices, customers' demands
will shift, and your network won't keep up with all of these changes. Network management has
become a major focus for businesses and it's not hard to see why. In order to keep efficiency and
performance up, networks have to be monitored by experts. We offer remote monitoring services that
will give your business peace of mind while allowing you more time to focus on other aspects of your
business. (brightlineit, 2018)

Part4

D1: Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilization of a networking system.

For this scenario, I chose the bus star topology (Hybrid) with a LAN network system.
Bus topology

A network implementation of this type is called bus topology. Computers and network devices are
typically connected by a single row, line, or conduit. The cable used is usually a coaxial cable, an RJ-
45 cable, or their variants. Bus topology is a network arrangement where all computers and network
hardware are connected to the same cable or backbone. There are two types of bus topology: linear
bus and ring bus. A linear bus is where all nodes have a single cable connecting them to the backbone,
with the last node connected to the first node via its own single cable.

Advantages

 Easy to use as a local network.


 A linear network is the simplest and most common network for hooking things up.
 It's cheaper and takes up less space than a star topology (Hope, 2018)

Star Topology

Every node in this network is connected to a centralized device, like a hub, switch, or computer. A
central device is used to act as a server with peripheral devices acting as clients. The type of cable to
use has to match the network card in each of the peripheral devices. A star configuration means there
are two types of connection: coaxial or RJ-45. To make it possible for the peripheral devices to be
connected. Cat 5 or Cat 6 is a type of wire that has eight copper conductors, with an insulating layer in
between them. It is used primarily for audio and video transmission and distribution over short
distances.

A star topology comes in two varieties: active and passive. It all depends on how the network is
managed by its users.

 If the central node provides functions for data amplification or regeneration.


 If a network actively controls data transit.
 If you need to power the network.

Star networks can be wired, wireless, or cabled. In many systems, the central hub is a server and the
additional nodes are clients.

Advantages of star topology:

 Centralized network: If you want centralized management, you need a central computer or a
switch. They help keep an eye on your network and only show issues if something's wrong.
 User-friendly: In a star network, new nodes can be added or replaced easily without
disrupting the rest of the network. Similarly, components can be removed or replaced. A new
computer can be added to the network, and malfunctions could also be fixed very quickly.
 Very reliable: When one cable or device fails, the rest of them will still work. So, when one
electrical line goes down or something like that, it won’t affect other parts of the network.
 Highly efficient: In a star topology architecture, every device is connected to the central core
by its cable. This makes data collisions far less likely and means performance levels are very
high.
 Easily manageable: The issue is often easy to detect because the cause of it can be easily
located. It’s also easier to figure out what went wrong and then find a solution.
 Safe to use: In a star topology, there is no risk of the entire network going down when one
cable is unplugged - or just one of the NICs. If you want to disable all the devices
simultaneously, you need to disable the central core. This is not an easy task if one does not
have access to it, which makes it ideal for businesses that need protection.
 Multiple stars can be created to extend the network’s reach: Star topology is a good
option for those looking to extend their network, especially if you have a central server. But it
does require the power needed to support all activities done on this network. (prasanna, 2022)

Local Area Network.

Unlike personal area networks and near-field connections, which are limited to a single proximity
zone, a corporate LAN is able to cover a broader area. This makes it an excellent solution for offices
with multiple floors or rooms. They also do not require a connection to use Wi-Fi, so in some cases,
they may be better for the environment. Leading telecom carriers provide LAN solutions to their
consumers and enterprise users so they can connect all of their personal and professional devices to
the internet for daily use. LAN access offers all of these benefits. Remote collaboration, online
shopping, cloud-based media consumption and storage, and transferring data from wearables are just a
few of the ways that you can now use your LAN access.

Local area networks can be categorized based on which devices they connect to and how the network
is designed. There are a few types of these that are emerging, including a cloud-based one. , which
makes use of the Internet and is usually designed for mobile devices. The following are a few of the
common types of local area networks: Cloud-based local area network (LAN) - One that uses an
interconnected series of servers and network hardware to work as a platform for various devices in a
given area, such as homes, businesses, or campuses. It is often managed by a central company and
accessed through the Internet.
Figure 14
The types of LAN used for this scenario.

Client-server LAN

In a client-server LAN, one server connects to multiple connected devices called clients. Client
machines are not able to interact with each other but must rely on a central machine for activities like
managing traffic, enforcing security, etc. Smaller businesses may find this LAN type more efficient
while larger ones might not.

Wired LAN

The Wired LAN is one of the most common types of LAN. It uses electronic waves to transmit data
across optical cables and transmits data at a rate of 10-100 Mbps. A wired LAN is reliable and really
fast as long as there's a server of excellent performance. However, it isn't flexible or portable because
there are no LAN cables for devices to connect to.

Wireless LAN

Wireless LAN is the most common way to connect all smart devices in a home environment, such as
computers, wearables, and appliances. But there is also a huge market for wireless LAN. It is growing
by 10.3%, according to IDC. This type of wireless LAN feature uses radiofrequency-based
technology that can make it more susceptible to security risks. Besides, it is battery-intensive and may
not work as well at certain positions.

LAN Architectural Components

Internet

The public internet is often accessed when connected to a LAN. The central server will receive
packets from the internet and can then be used for access requests from clients. It enables data transfer
to all of the connected devices over the network. LANs may work completely outside of the public
internet. For example, they might be used for sharing private data or even hosting intranet sites.
Having internet access is one of the top reasons people choose a LAN though.

Wired end-user devices

Generally speaking, a LAN will have both wired and wireless devices. In particular, this includes
various laptops, desktops, TV or monitor, collaboration hardware, and boardroom systems.
(BasuMallick, 2022)
D2: Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
Firewall Upgrades

Firewalls are a type of software or hardware that regulate network traffic. They evaluate each
connection and determine if it gets to pass through or not based on their defined set of security rules.
The internet and the cyber world are now considered an extension of the physical world. As such, it
has become increasingly important for businesses to maintain their equipment in order to protect their
networks from future cyberattacks which have become more technical.

Older firewalls are often less secure and outdated software could be potentially exploited by
cybercriminals to get your sensitive data. Upgrading your firewall software to the latest version
should protect your company from new cybersecurity flaws.

You might need to upgrade your firewall due to an increase in internet speed or download speed. For
example, if you've upgraded your internet plan, such as from a slower connection to a faster one, or if
you have more people using the internet at the same time.

The best indicator of when you need an update to your firewall is when the vendor stops providing
customer support. The company will no longer handle any upgrades or troubleshooting for the
product, which can be a headache if you run into any problems. (Mindanao, 2021)

Strong encryption

All wireless routers come with some level of encryption. It really depends on what level of security
you want. Ideally, the encryption should be secure enough to protect your data from potential
interceptions while it is being transferred to its destination. However, this level of security might be
too difficult for older routers which will typically just scramble your data making it indecipherable.
WEP encryption, the method of choice for many older devices, has been cracked by cyber-security
experts for years. So, if you're using WEP encryption, it's time to upgrade ASAP. It's important to use
the strongest possible encryption on your Wi-Fi network. WPA or WPA2 protocols are more secure
than ever and prevent hackers from sniffing data packets and decoding passwords. (Bryan, 2022)

Network auditing

A network assessment/audit helps you get a good idea of any issues on your network, so you
can deal with them accordingly. You also gain the following benefits:

 Working to limit unknown risks for clients


 Gather market intelligence and uncover new revenue opportunities by identifying new
potential for selling managed IT services.
 Help to maintain compliance with industry regulations to reduce the risk of penalties
by authorities.
 Decide what you want to do and set up a plan of action.

Other types of audits can help businesses be more proactive in maintaining business continuity
for their customers. (N-able, 2020)
Emphasize password strength.

It has never been more important to make sure your passwords are strong enough because hackers can
break in and get what you want with just a few clicks. If one of your accounts is compromised, the
others are at risk. You should use a different password for each account. Having access to one
company's data makes it easier to hack into other companies and steal personal information. A
business that is able to profit off sensitive (and often confidential) data could become a superpower
while ensuring safeguards. (healix, 2022)

Ensure QoS is working

Quality of service (QoS) assures that high-performance applications services have sufficient resources
to work at top speed. The right network management plan is crucial to making sure that critical
business applications work properly and that they do not get interfered with when the network
performance is at its lowest. (Hein, 2019)

Physically secure 

We all know how important the IT security of your network is, but that doesn't mean you
should neglect the physical side of it. Without strong protection on both the public and
private sides, there is always a risk that hacker threats can enter the building. Protecting
against these local threats is just as crucial as protecting against Internet-facing ones.

Bibliography
(n.d.).

Advantages and Disadvantages of Using SAN (Storage Area Network). (2019, November 21). From
reviewplan: https://www.reviewplan.com/advantages-disadvantages-storage-area-network/

alteryx. (222, November 2). System Requirements. From alteryx:


https://help.alteryx.com/20221/server/system-requirements

andro, T. (2021, April 8). System Bus Architecture And 3 Main Functions. From informerguru:
https://informerguru.com/what-is-system-bus-architecture-in-computer/

BasuMallick, C. (2022, Fabuary 10). What Is Local Area Network (LAN)? Definition, Types,
Architecture, and Best Practices. From spiceworks:
https://www.spiceworks.com/tech/networking/articles/what-is-local-area-network/

brightlineit. (2018, July 3). 8 Tips to Improve Network Performance in Your Office. From brightlineit:
https://brightlineit.com/8-tips-to-improve-network-performance-in-your-office/

Bryan, R. (2022, September 18). HOW TO INCREASE NETWORK SECURITY IN A FEW EASY WAYS. From
mytekrescue: https://mytekrescue.com/how-to-increase-network-security-in-a-few-easy-
ways/

CDW. (2022, August 8). 3 Mains Types of Network Protocols, Explained. From CDW:
https://www.cdw.com/content/cdw/en/articles/networking/types-of-network-
protocols.html
cdw. (2022, November 7). Advantages and Disadvantages of VPN. From cdw:
https://www.cdw.com/content/cdw/en/articles/security/advantages-and-disadvantages-of-
vpn.html

clintg. (2020, January 22). The 3 Types of Network Media. From acenetworker:
http://acenetworker.com/the-3-types-of-network-media/

community. (2008, April 5). Creating a Network Test Plan. From community:
https://community.spiceworks.com/topic/2455151-creating-a-network-test-plan

ecmanagedit. (2019, October 10). What is Network Maintenance? From ecmanagedit:


https://ecmanagedit.com/what-network-maintenance/

ecstuff4u. (n.d.). Advantages and disadvantages of wide area network. From ecstuff4u.

Editorial. (2021, October 26). Advantages And Disadvantages Of Wireless Technologies. From
roboticsbiz: https://roboticsbiz.com/advantages-and-disadvantages-of-wireless-
technologies/

geeksforgeeks. (2021, December 27). Elements of Computer Network. From geeksforgeeks:


https://www.geeksforgeeks.org/elements-of-computer-network/

Geeksforgeeks. (2022, January 24). What is a Network Operating System? From geeksforgeeks:
https://www.geeksforgeeks.org/what-is-a-network-operating-system/

getanp. (2022, June 30). 7 TIPS TO ENHANCE NETWORK PERFORMANCE. From getanp:
https://www.getanp.com/blog/65/7-tips-to-enhance-network-performance.php

GUIDI, S. (2019, Febuary 20). 7 Types of Computer Networks Explained. From sierraexperts:
https://www.sierraexperts.com/7-types-of-computer-networks-explained

healix. (2022, May 22). The importance of good password security. From healix:
https://healix.com/sharing-knowledge-and-news/password-security/

Hein, D. (2019, October 18). 7 Ways to Improve Your Company’s Network Performance. From
solutionsreview: https://solutionsreview.com/network-monitoring/7-ways-to-improve-your-
companys-network-performance/

Hope, C. (2018, January 14). Bus topology. From


https://www.computerhope.com/jargon/b/bustopol.h:
https://www.computerhope.com/jargon/b/bustopol.h

IBEAKANMA, C. (2022, July 13). What Is a Firewall? How Does a Firewall Work? From makeuseof:
https://www.makeuseof.com/tag/firewall-work-makeuseof-explains/

Ingalls, S. (2021, July 21). What Is a Server and What Do Servers Do? From serverwatch:
https://www.serverwatch.com/guides/what-is-a-server/

Kanade, V. (2022, March 24). What Is a Firewall? Definition, Key Components, and Best Practices.
From spiceworks: https://www.spiceworks.com/it-security/network-security/articles/what-
is-firewall-definition-key-components-best-practices/

Kayne, R. (2022, November 30). What Is DSL? From easytechjunkie:


https://www.easytechjunkie.com/what-is-dsl.htm
KEARY, T. (2022, June 27). Network Topology: 6 Network Topologies Explained & Compared. From
comparitech: https://www.comparitech.com/net-admin/network-topologies-advantages-
disadvantages/

LAN Advantages and Disadvantages | Local Area Network Advantages and Disadvantages. (2022,
January 7). From aplustopper: https://www.aplustopper.com/lan-advantages-and-
disadvantages/#Advantages_of_LAN

Melnick, J. (2022, January 13). Network Devices Explained. From netwrix:


https://blog.netwrix.com/2019/01/08/network-devices-explained/

microsoft. (2022, August 8). Active Directory Domain Services Overview. From microsoft:
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/virtual-dc/
active-directory-domain-services-overview

Mindanao, K. (2021, October 11). By: Kharmela Mindanao on October 11th, 2021 Print/Save as PDF.
From itsasap: https://www.itsasap.com/blog/signs-upgrade-firewall

N-able. (2020, October 1). How to Perform a Network Audit: A Step-By-Step Guide. From able:
https://www.n-able.com/blog/how-to-perform-network-audit

netapp. (2022, January 31). 4 Types of Cloud Backup Services. From netapp:
https://bluexp.netapp.com/blog/cvo-blg-4-types-of-cloud-backup-services-and-how-to-
choose

Prasanna. (2022, May 10). Advantages and Disadvantages Of Hybrid Topology | What is Hybrid
Topology?, Types, Why Hybrid Topology is Used? From aplustopper:
https://www.aplustopper.com/advantages-and-disadvantages-of-hybrid-topology/

prasanna. (2022, January 7). Star Topology Advantages and Disadvantages | What is Star Topology?
Advantages and Disadvantages of Star Network Topology. From aplustopper:
https://www.aplustopper.com/star-topology-advantages-and-disadvantages/

Rehman, J. (2018). Advantages and disadvantages of personal area network (PAN). From itrelease:
https://www.itrelease.com/2018/07/advantages-and-disadvantages-of-personal-area-
network-pan/

Richard Dornhart. (2021, April 8). The security risk of end of life hardware. From data3:
https://www.data3.com/knowledge-centre/blog/the-security-risk-of-end-of-life-hardware/

Roomi, M. (2020, July 20). 6 Advantages and Disadvantages of MAN | Limitations & Benefits of
MAN. From hitechwhizz: https://www.hitechwhizz.com/2020/07/6-advantages-and-
disadvantages-of-man.html.html

Roomi, M. (2021, June 16). 5 Advantages and Disadvantages of WLAN | Drawbacks & Benefits of
WLAN. From hitechwhizz: https://www.hitechwhizz.com/2021/06/5-advantages-and-
disadvantages-drawbacks-benefits-of-wlan.html

Saeed, S. (2022, November 9). 9 Different Types of Servers in Computer Networks (2022). From
collectiveray: https://www.collectiveray.com/different-types-of-servers

Shanika Wickramasinghe, M. R. (2021, December 9). DBMS: Database Management Systems


Explained. From bmc: https://www.bmc.com/blogs/dbms-database-management-systems/
Shaw, K. (2022, March 14). The OSI model explained and how to easily remember its 7 layers. From
networkworld: https://www.networkworld.com/article/3239677/the-osi-model-explained-
and-how-to-easily-remember-its-7-layers.html

shaw, K. (2022, October 4). What is a network switch, and how does it work? From networkworld:
https://www.networkworld.com/article/3584876/what-is-a-network-switch-and-how-does-
it-work.html

Sheldon. (2020, November 24). Layer 3 Switch Vs Router: What Is Your Best Bet? From community:
https://community.fs.com/blog/layer-3-switch-vs-router-what-is-your-best-bet.html

Singh, A. (2022, October 11). What Is a Network Component? From naukri:


https://www.naukri.com/learning/articles/network-component/

Snyder, J. F. (2021, April 28). 802.1X: What you need to know about this LAN-authentication
standard. From networkworld: https://www.networkworld.com/article/2216499/wireless-
what-is-802-1x.html

Still, J. (2021, July 30). What is Ethernet? The wired network connection, explained. From
businessinsider: https://www.businessinsider.com/guides/tech/what-is-ethernet

Stoltzfus, J. (2021, Fabuary 2). Transmission Control Protocol/Internet Protocol (TCP/IP). From
techopedia: https://www.techopedia.com/definition/2460/transmission-control-
protocolinternet-protocol-tcpip

Team, I. E. (2022, January 13). Types of Computer Servers and How They Function. From indeed:
https://www.indeed.com/career-advice/career-development/types-of-servers

techopedia. (2012, November 27). Workstation . From techopedia:


https://www.techopedia.com/definition/5140/workstation-ws

Techopedia. (2020, April 23). Network Protocols. From Techopedia:


https://www.techopedia.com/definition/12938/network-protocols

Tippins, K. (2022, May 30). What is Commercial Software? From contractbook:


https://contractbook.com/blog/what-is-commercial-software

Tom. (2022, March 11). Wireless Access Points - What They Do & How They Work. From smartaerials:
https://www.smartaerials.co.uk/blog/wireless-access-points-what-they-do-how-they-work

Trick, C. (2022, April 12). What is a NIC Card (Network Interface Card)? From trentonsystems:
https://www.trentonsystems.com/blog/nic-card

Williams, L. (2022, November 26). IPv4 vs IPv6 – Difference Between Them. From guru99:
https://www.guru99.com/difference-ipv4-vs-ipv6.html#:~:text=IPv4%20is%20a
%2032%2DBit,IPv6%20offers%208%20header%20fields.

You might also like