15
Building a Data Network (wired and wireless) for a Small Office BY : 1. PYIE SONE 2. SOE THIHA 3. PYAE PHYO AUNG

Building a data network (wired and wireless

Embed Size (px)

Citation preview

Page 1: Building a data network (wired and wireless

Building a Data Network

(wired and wireless) for a

Small OfficeBY :

1. PYIE SONE

2. SOE THIHA

3. PYAE PHYO AUNG

Page 2: Building a data network (wired and wireless

Here’s The office layout

To the layout

Page 3: Building a data network (wired and wireless

How we design the network

To The Network Diagram

Page 4: Building a data network (wired and wireless

Installation schedule

One Week

After Office Hour

Testing

Page 5: Building a data network (wired and wireless

Logical Diagram explained with

specific layering

To Logical Diagram

Page 6: Building a data network (wired and wireless

Budget

4 Routers

2 Switch

1 Access Point

Internet Connection

Cable

IP Phone

Printer

Page 7: Building a data network (wired and wireless

Detail Description of Selected DevicesDiagram Item Price

Amped Wireless Amped

Wireless AP20000G

Wireless Access Point

$ 159.99

TRENDnet TEG-S224

Gigabit Ethernet Switch

$ 100.5

Epson Workforce Pro WP-

4540 All-in-One Printer

$ 259.99

Hawking Tech. HSB2 IEEE

802.11b/g Wi-Fi Signal

Booster

$ 149.99

D-Link amplifi DIR-857

Wireless Router - IEEE

802.11n

$ 179.99

Linksys SRW224G4 28-port

WebView Gigabit

Ethernet Switch

$ 200

Page 8: Building a data network (wired and wireless

I. Worms and Viruses

- Last year, 75% of small and medium-sized

businesses affected by at least one virus.

- Meanwhile office staffs are also spreading virus

unintentionally by downloading untrustworthy

material.

- Security Systems need to detect and repel worms,

viruses, and spyware at all points in the network.

Page 9: Building a data network (wired and wireless

IIInformation Theft

- Hackers break to steal credit card or social security

numbers in small-sized businesses rather than large

corporations.

- From both inside and outside of the office, there

should be security strategy to prevent theft of

sensitive electronic information.

Page 10: Building a data network (wired and wireless

III Business Availability

- DoS and DDoS attack are one of top most destructive attacks which cause inability to process legitimate traffic, and If more severe, office's credibility is damaged.

- Normally small-sized businesses are less prepared for attacks than large corporations.

- Even a modest attack could result in substantial lost and tax internal resources

and attacks are more sophisticated and stealthier.

Page 11: Building a data network (wired and wireless

HOW TO PREVENT THESE THREATS

1. Cisco Self-defending Network

long term strategy to secure business processes

both internal and external threats.

they can protect both their networks, and their

network investments

, It has 3 main characters, integration, collaboration

and adaptability, integrate into all elements in the

network,

work together to exchange information,

use innovative behavioral recognition to repel new

threats

Page 12: Building a data network (wired and wireless

Stay Open for Business, Even While Under

Attack

proven, multifaceted approach protects

from devastating effects of worms, viruses.

IPSs (Industry-leading Cisco intrusion

prevention systems)can and inspect all

incoming traffic in real time, if found, stop

the threat and prevent it from spreading

though the network.

Layers of security allows to continue to

respond to clients and stay open for

business - even while under attack.

Page 13: Building a data network (wired and wireless

Precaution

Enable MAC address filtering

Static IP Address

Disable SSID broadcast

Firewall

WPA2 Encryption

Page 14: Building a data network (wired and wireless

Pros And Cons of wLAN

Pros

Mobility

Wireless

Less Complicated

Roaming

Cons

Slow

Limitation

Security

Page 15: Building a data network (wired and wireless

THANK

YOU! DATA COMMUNICATION AND WIRELESS SOLUTIONS TEAM