Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Planning the Network

Implementing a Wide Area Network (WAN) Topology

CIS 377 Networking in Business


The Stakeholders

► WAN Technician ► Collaboration with the following


specialists:
- Helps in planning and developing
of wide area networks - Service providers or Internet
service providers.
- Provide administration of local
and wide area networks. - WAN administrators
- Network support personnel
Internal and External Networking
Components for Full Mesh Topology
Internal networking External networking
components components
► The connected nodes that can be ► Routers (Butler, 2022).
used include:
► Gateway
- Computers
► Repeaters
- Switches
- Hubs
A Security Recommendation

► IBM Cloud key management services enables encryption for data stores
(International Business Machines Corporation, 2023).
► IBM Cloud key management services function with numerous IBM Cloud
data services to protect data.
► The significance of IBM is provision of strong encryption protecting data
Network Protocols for the WAN
Architecture
► TCP/IP protocol suite
- Functions as an abstraction layer between the routing and switching fabric
and internet applications.
► Multiprotocol label switching
- Directs data from one node to the next to avoid time consumption
► Overlay network
- Creates virtual networks on top of another network to support applications
Allows users to have access to resources
remotely and securely?
-Using a VPN will allow the users to access resources remotely
and securely. We would use an application called NordVPN. With
this application it offers built-in malware protection, chrome and
Firefox extensions, no weblogs and no IP/ DNS leaks. This
application also offers a password manager, and file encryption
tool.
Have the ability to file share?

DropBox
Icloud
One Drive
Email Providers
Removable Storage
References

► Butler, S. (2022, July 19). What is mesh network topology? Networking|


Help Desk Geek.
https://helpdeskgeek.com/networking/what-is-mesh-network-topology/
► International Business Machines Corporation. (2023). Protect data in transit
or at rest. IBM - United States.
https://www.ibm.com/cloud/architecture/architecture/practices/data-se
curity/

You might also like