Introduction to Networking Touchstone 4
<September 15, 2023>
Chris Nelson
President
Greenfield Properties
123 Sophia Way
Minneapolis, MN 55000
Dear Mr. Nelson:
I am a student at Columbia University. I am currently undertaking my computer science degree course in the third year of my studies. The course is very satisfactory to me, and the project I am currently undertaking is entertaining.
The project is a touchstone assignment that touches on various issues, including but not limited to network printer connectivity, planning of the IP address and wireless infrastructure together and network security measures. My proposal will answer the questions in each of these four touchstone tasks.
I hope I have answered the questions to the best of my knowledge and understanding. If you need any clarification regarding my answers, do not hesitate to reach out.
Sincerely,
Student Name
Introduction
My proposal touches on various issues related to network connectivity. It would begin off by discussing network printer connectivity, followed by an assignment on IP address. This would then be followed by wireless infrastructure and network security measures.
Network Infrastructure
The two major components that will support an organization’s network infrastructure are the wireless access point and the wireless network interface card. The wireless access point performs the function of connecting all the hosts and fostering communication between them. On the other hand, the wireless network interface card offers a full-time connection to the network.
Network Segmentation and Printing
Segmentation of the network refers to dividing the network into various pieces. This process is also referred to as subnetting. Subnetting a network is important because it necessitates improved network performance, boosts the security of the network, and fosters the employees’ knowledge of route maps.
Printing
Businesses stand to benefit greatly from either local or network printers. The local printer refers to one that is used to directly connect with a specific computer through the USB cable. On the other hand, the network printer can easily be accessed by different computers simultaneously, provided they are connected to the network.
Wi-Fi Networking
The organization will adopt Wi-Fi networking as the best mechanism for regulating the cost of internet access. In this regard, the router in the organization would be connected to the internet modem, which would act as a hub to broadcast the internet signal to all the devices at close range.
Security Measures
The assets held by an organization are vulnerable to various types of threats. Below is a brief elaboration of the security measures that can be adopted in an organization.
Physical Security
Greenfield Properties will adopt various measures to enhance its physical security. Some of the measures it would adopt include hiring security guards, installing door locks, and implementing the perimeter intrusion detection system.
Infrastructure Access
The access to the infrastructure of Greenfield Properties can be assured through the adoption of the secure sockets layer (SSL). Installing an SSL is essential because it ensures that the connections between the web browser and web server are secure.
Authentication
The authentication method that Greenfield Properties should adopt is the Remote Authentication Dial-In User Service (RADIUS). This method is pertinent because it verifies the users operating on various types of links, including but not limited to dial-up requests. The method stores the usernames and passwords of clients, making it easy for authentication requests to be granted.
Lockout Policy
This is also a security measure that can be adopted in running the systems of Greenfield Properties. This policy works so that when a user leaves his account without logging out, the system signs out, requiring the user to sign in when they’re back.
Password Complexity Requirements
The formulation of passwords follows the complexity requirements developed to ensure that third parties can hardly guess them. Some of these requirements are that the password should have a minimum of eight characters, capital and small letters, and at least one special character and a numeric number.
Firewall
As a security measure, a firewall sieves through the traffic of data passing through the network, ensuring that unauthorized parties are not granted the right to enter the network. It performs the same function as a watchman but is more thorough in executing its job than a human being.
Anti-Malware
The anti-malware software that I would suggest Greenfield Properties adopt is the host-based anti-malware. The host-based anti-malware provides the organization with total control over the entire process of safeguarding its network, requiring regular updates. The organization may also adopt server-based anti-malware because it requires little processing power, eliminates the need for constant updates, and allows the accesibility of the latest malware data.