Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

In the first reading, the foundations of how to lay out a physical network were

ID: 3756877 • Letter: I

Question

In the first reading, the foundations of how to lay out a physical network were outlined. Why do you think it is important to lay out networks in advance before beginning the physical implementation? What are some of the possible pitfalls that can arise from improper planning? Case Project #2 - VPN's allow for companies to ensure a secure connection for people who are working in "non-traditional" environments, such as working from home or working on the road. What security needs to be in place on both sides of the connection to ensure that security is maintained? Case Project #3 - Describe some of the security measure that need to take place, both logically and physically, when planning for a wireless network implementation? Be specific about some of the steps you might take. Case Project #4 - Why is documentation such an important part of the post installation tasks when developing a network? What are some of the possible problems that can arise from bad documentation?

Explanation / Answer

Case Project #2

Case Project #3

In a highly secure environment, a best practice is to have the wireless access points connect to a wired network physically or logically separate from the existing user network. This is accomplished using a separate switched network as the wireless backbone or with a  Virtual LAN (VLAN) that does not have a routing interface to pass its traffic to the existing wired network. This network terminates at a

Virtual Private Network

(VPN) device, which resides behind a firewall. In this manner, traffic to and from the wireless network is controlled by the firewall policy and, if available, filters on the VPN device. The VPN device will not allow any traffic that is not sent through an encrypted tunnel to pass through. With this model, the wireless clients can communicate among themselves on the wireless network, but there is no access to internal network resources unless fully encrypted from the wireless client to the VPN.

Network documentation can provide valuable information to service providers as well as providing backup in the event of a catastrophic network failure

good network documentation proves that you adhere to industry best practices, and could be your best defense should a customer ever file litigation against you for something network-related.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote