blog




  • Essay / Wiring to Configure the Network

    This project will require cabling to configure the network. There are a number of cabling options to consider. These include the following: Say no to plagiarism. Get a tailor-made essay on “Why violent video games should not be banned”?Get the original essayUTP-CAT5e is a copper cable that can transmit at speeds of up to 1 Gbps. Multimode fiber optic cable will be used in offices as they are cheaper than single mode which is mainly used for long distance telecommunications networks. (Tomsho, 2012). With each floor having over two hundred connections, it will be necessary to have wiring cabinets which will greatly facilitate the management of the myriad of cables. The closets should also provide a place where troubleshooting operations can begin. As these are rectangular buildings, the electrical cabinets will be placed in a corner of the third floor, next to the data center. This will ensure that IT equipment throughout the building is controlled from one location. This also allows for easier ventilation as it can be completed by opening it. From a security perspective, the third floor also makes sense because it would be difficult for burglars to gain access. (Tomsho, 2012). One of the main ways to prevent attackers will be to take physical security measures. With the two buildings being three stories each and the company being the sole occupant of the buildings, this can be done easily. First there should be a system of CCTV cameras covering the entire perimeter of the buildings. A central control room should be established at both sites to ensure they can be monitored at all times. Building access control should include smart cards provided to all employees. Given the additional security required for the Atlanta location with both development teams, an additional layer will be necessary. The first access to the building will require a smart card and a code changed daily. Further into the building will be biometric locks that will provide access to development areas as well as the data center. These biometric measures may include fingerprint and iris scanners. This will ensure that only people with the appropriate authorization can access secure areas. (Peltier, 2016).Keep in mind: This is just a sample.Get a custom article from our expert writers now.Get a custom essayLogic security will be very important for both sites. This is especially true for the Atlanta location, which will also host the company's database and web servers. The first task will be to close all unnecessary services. The more services there are on a server, the more ports there will be open, which will provide channels for attacks on the system. This should also lead to higher performance as more resources are freed up. With web servers, application files and scripts must be kept on a separate drive or even partition from the operating system, system files, and logs..