WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

Design , implementation and management of secured lan

( Télécharger le fichier original )
par Eliud Ir. Eliud Aganze
Jomokenyatta university of agriculture and technology - B.sc information technology 2014
  

précédent sommaire suivant

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

4.4.7.1 Logical design

Figure 4.14. Proposed logical design

The merits of the new proposed logical design Ares;

ü Make the network scalable

ü Availability

ü Reduce large domain failure.

ü Create link and devices redundancy by adding 3 router to ensure if one fails 2 will keep running and serve.

ü Allow integration of voice and video in one network.

ü Reduce broadcast domain.

4.4.7.1 Proposed security strategies

The new system has the following security features;

a. Port shutdown or port security, which blocks any attempt of port sniffing.

b. Implementation of VLAN virtual local area network, this segment network into sub network. Which will separate user in the network. The purpose is to deny access students or unauthorized staff to access critical information like database of marks and finance.

c. Secured wireless access point (WAP) and deploy wireless round the campus.

précédent sommaire suivant






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Les esprits médiocres condamnent d'ordinaire tout ce qui passe leur portée"   François de la Rochefoucauld