Building a data network (wired and wireless

Preview:

Citation preview

Building a Data Network

(wired and wireless) for a

Small OfficeBY :

1. PYIE SONE

2. SOE THIHA

3. PYAE PHYO AUNG

Here’s The office layout

To the layout

How we design the network

To The Network Diagram

Installation schedule

One Week

After Office Hour

Testing

Logical Diagram explained with

specific layering

To Logical Diagram

Budget

4 Routers

2 Switch

1 Access Point

Internet Connection

Cable

IP Phone

Printer

Detail Description of Selected DevicesDiagram Item Price

Amped Wireless Amped

Wireless AP20000G

Wireless Access Point

$ 159.99

TRENDnet TEG-S224

Gigabit Ethernet Switch

$ 100.5

Epson Workforce Pro WP-

4540 All-in-One Printer

$ 259.99

Hawking Tech. HSB2 IEEE

802.11b/g Wi-Fi Signal

Booster

$ 149.99

D-Link amplifi DIR-857

Wireless Router - IEEE

802.11n

$ 179.99

Linksys SRW224G4 28-port

WebView Gigabit

Ethernet Switch

$ 200

I. Worms and Viruses

- Last year, 75% of small and medium-sized

businesses affected by at least one virus.

- Meanwhile office staffs are also spreading virus

unintentionally by downloading untrustworthy

material.

- Security Systems need to detect and repel worms,

viruses, and spyware at all points in the network.

IIInformation Theft

- Hackers break to steal credit card or social security

numbers in small-sized businesses rather than large

corporations.

- From both inside and outside of the office, there

should be security strategy to prevent theft of

sensitive electronic information.

III Business Availability

- DoS and DDoS attack are one of top most destructive attacks which cause inability to process legitimate traffic, and If more severe, office's credibility is damaged.

- Normally small-sized businesses are less prepared for attacks than large corporations.

- Even a modest attack could result in substantial lost and tax internal resources

and attacks are more sophisticated and stealthier.

HOW TO PREVENT THESE THREATS

1. Cisco Self-defending Network

long term strategy to secure business processes

both internal and external threats.

they can protect both their networks, and their

network investments

, It has 3 main characters, integration, collaboration

and adaptability, integrate into all elements in the

network,

work together to exchange information,

use innovative behavioral recognition to repel new

threats

Stay Open for Business, Even While Under

Attack

proven, multifaceted approach protects

from devastating effects of worms, viruses.

IPSs (Industry-leading Cisco intrusion

prevention systems)can and inspect all

incoming traffic in real time, if found, stop

the threat and prevent it from spreading

though the network.

Layers of security allows to continue to

respond to clients and stay open for

business - even while under attack.

Precaution

Enable MAC address filtering

Static IP Address

Disable SSID broadcast

Firewall

WPA2 Encryption

Pros And Cons of wLAN

Pros

Mobility

Wireless

Less Complicated

Roaming

Cons

Slow

Limitation

Security

THANK

YOU! DATA COMMUNICATION AND WIRELESS SOLUTIONS TEAM

Recommended