StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Networking - Research Paper Example

Cite this document
Summary
Computer networking School Name Introduction Big companies need to have a network that connects the entire company with its workers and the surrounding environment in which it exist. It is important for the company to establish a secure connection especially where by the company has various departments which are stationed in different locations, for our scenario, Lucerne Publishing company has cooperate offices which requires interaction through network access where workers need to access the services remotely in order to increase the labor force size…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Networking
Read Text Preview

Extract of sample "Networking"

Computer networking School Introduction Big companies need to have a network that connects the entire company with its workers and the surrounding environment in which it exist. It is important for the company to establish a secure connection especially where by the company has various departments which are stationed in different locations, for our scenario, Lucerne Publishing company has cooperate offices which requires interaction through network access where workers need to access the services remotely in order to increase the labor force size.

In order to allow remote connection by the workers one need to upgrade the internet connection by first having a domain established so as to allow a VPN connection. The VPN allows users to connect to the network system through a remote connection system. This is done by configuring in a server to enable client computers to connect to the network. Due to the fact that remote access to clients does not support routing protocols such as the routing information protocol, the client user uses a simple routing table with remote packet from remote users to the internet and the intranet connection or simultaneous and thus depends with the user.

For example a user on a LAN has a route to its own subnet in the LAN and thus having a default gateway router for all the traffic and thus without the remote access, user cannot determine the best route to its destination. The best method to route traffic in this network is by directing packets through a remote network to a remote network. Routing By default, when a connection is established, the remote client access inserts a default route in its respective routing table and hence increases the size of the default gateway route to ensure that the newest route is used and thus will ensure that every client computer on the network communicates with its route to avoid collision and loss of energy.

The new rout connection to its route point ensures none of the data packets are not addressed in the LAN system on the remote network. Under this type of configuration, as a result of the VPN client connection, is creation of a new route and thus enhance more data security. Based on the default route added, all the users will have a broad access to the internet or on the company’s intranet. Window servers 2008 In order to configure the window server 2008 as a router you need to have the following essentials (Bender, 2010).

An internet connection for a stable internet service provider and a digital service line (DSL) modem which is a modem and a broadband router, a router which routes traffic from the local network to the internet, clients computers which connects to the main frame computer to form a network system, these are the computers that the users will use, and the windows 2008 sever essentials that will provide file sharing and used for remote access. The router will be configured such that it allows only assigned IP address to connect to the network system for improved security in the network. Fig 1.1 Windows server as a router Security In remote access network it is very vital to observe security measures in the virtual private network to prevent the treats in the organization network system.

This measures includes the use of company owned computes that are well maintained and serviced with anti-malware soft wares by the company’s IT department and are configured in the network systems such as the domain system. Restrict the authorization of installation of UN authorized software’s, this is done to protect the company’s computers against malicious software, this is done through the use of standard user access accounts in the company computers. Educate the interactive remote users on the need to use anti malwares to protect the company’s data.

Use of firewall and proxies, firewalls and proxies restricts users from accessing unauthorized sites that might contain malicious content to protect the company’s data and the network system. The use of the active directory to manage the users who are using the network system, the active directory can be used to restrict illegal access to the network and also to lock users who enter wrong authentication information in the system to prevent fraud and impersonation by the use of access control.

Data base optimization The SQL server database can be optimized by clustering the data block into distinct orders that match the indexes which results is the storage of raw data (Millsap & Holt, 2003). Therefore, only a single index can be created in a database table which greatly increases the retrieval speed usually sequential data access in the reverse order. References Bender, M. (2010). MCTS guide to Microsoft Windows Server 2008 network infrastructure configuration. Boston, MA: Course Technology, Cengage Learning.

Millsap, C. V., & Holt, J. (2003). Optimizing Oracle performance "A practitioner's guide to optimizing response time"--Cover. Sebastopol, CA: O'Reilly.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networking Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Networking Research Paper Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1468357-networking
(Networking Research Paper Example | Topics and Well Written Essays - 750 Words)
Networking Research Paper Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1468357-networking.
“Networking Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1468357-networking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Networking

Social Networking

Rasheem Williams March 29, 2011 Essay # 2 Social Networking Introduction The pervasive nature of the Internet has added a new dimension in the manner in which people interact and communicate with others.... This new dimension is called social Networking and is built on friend-based web sites.... hellip; In the opinion of Magsino (2009), “social Networking tools enable individuals and groups to engage in social Networking by monitoring and interacting within their networks”....
1 Pages (250 words) Essay

Social networking

Social Networking Name University Social Networking Introduction Over the past few years, the internet and the society witnessed an outburst if social Networking websites and increase in the usage of these websites (Reynolds, 2010, p.... Social Networking is a web space where individuals are indulged in the activity of creating online profiles of themselves in order to connect with other individuals who have created profiles on same social Networking outlets....
4 Pages (1000 words) Essay

Social networking

Social Networking Social Networking has become a valuable communication tool in many countries worldwide.... Still, the implications of social Networking have been highlighted in the academic literature.... hellip; The above study presents the security risks related to the social Networking sites.... The particular study also promotes a model that can help to assess the security risks to which the users of social Networking sites are exposed....
3 Pages (750 words) Essay

Developing Networking Communication

Networking Institutional Affiliation Networking Identify all the skills that you could use at a Networking event to ensure communication for building success.... In an article written by Leimback (2012), it was revealed that the skills which would be useful at a Networking event to ensure communication for building success include the following: (1) application of appropriate personal style in leveraging and understanding the necessary requirements and resources for the event; (2) discerning Networking events that would strategically provide rewarding returns; (3) effective application of planning skills; (4) being able to empower and engage human resources for the event; (5) sh… owcasing expertise in Networking; (6) establishment of beneficial relationships; (7) effectively assessing and tapping opportunities; and (8) delivering or even surpassing expected value (Leimback, 2012)....
3 Pages (750 words) Assignment

Computing networking

Using the Star Topology for Networking the company's computers, the Swindon office, which consists of 39 workstations, should have a network diagram as shown on the figure below (Figure 1).... Cost And Benefit Analysis - Swindon Office Using the Star Topology for Networking the company's computers, the Swindon office, which consists of 39 workstations, should have a network diagram as shown on the figure below (Figure 1).... [SCAB2005]The detailed specifications for the network are as follows:Networking EquipmentNumber of PiecesPCI LAN Card39RJ45 Jack78UTP CAT5 Cables39 cables with total 90 - 100 meters length16-port Hub/Switch124-port Hub/Switch1Figure 1....
2 Pages (500 words) Essay

Computer networking

More specifically addressing computer Networking, the report revolves around the core concept of the said issue.... The report also addresses the technical concepts of implementing computer Networking and also emphasizes… The most prevalent norms of computer Networking applications and type are addressed in the end. The onset of the digital age was like embarking upon a journey full of inventions and transformations for the human race....
4 Pages (1000 words) Research Paper

Advancement of Home Networking

This turned to be extremely common after inception of web era, which acted… Since there are varied issues that lead to predicaments experienced in home Networking, they are rooted deep in the protocol and architect of the internet (Edwards et al.... Advancing the State of Home Networking.... Home networkingNetworkHome NetworkThe most surprising or interesting point in the article: 1 Networking at home has followed the same path similar to other varied and even complex technological capabilities....
2 Pages (500 words) Article

Professional Networking

This paper ''Professional Networking'' tells that Over the past few years, the marketplace has become an extremely competitive place for corporations and individuals.... One of them has it roots in professional Networking.... Quite understandably, if someone has a friend in a company due to his Networking abilities, he may be the first to know about that opening, thus increasing the probability of getting the job (Baber & Waymon, pp.... In a way, professional Networking is the manifestation of the same....
5 Pages (1250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us