LAW FIRM COMPUTER NETWORKS PROJECT
Contents
INTRODUCTION1
TASK 12
MEDIA USED2
CONNECTORS USED2
COST OF CABLING AND INSTALLATION2
DATA TRANSFER RATE REQUIRED2
TASK 23
FIBRE OPTIC CABLES3
MERITS OF FIBRE OPTIC CABLES3
DEMERITS OF FIBRE OPTIC CABLES3
VIRTUAL PRIVATE NETWORKS3
BENEFITS OF VIRTUAL PRIVATE NETWORKS3
DEMERITS OF VIRTUAL PRIVATE NETWORKS3
PROTOCOLS USED4
MEDIA REQUIRED4
HARDWARE REQUIRED4
TASK 34
SECURITY ISSUES4
PROTECTION FROM VIRUSES, TROJANS AND WORMS5
CONCLUSION6
LIST OF REFERENCES6
INTRODUCTION
This is a report for a law firm outlining the options in setting their data network up. It includes details of how the intranet will be provided, internet facilities for each office, access to client information, email facilities and file storage. Details include of media and connectors used, cost of cabling and installation, merits and demerits of methods used and security issues are discussed.
TASK 1 (35 marks)
MEDIA USED
Remote Access (mobile worker)
CONNECTORS USED
RJ 45 connectors which are used for networking are kshs 45 per Metre & the length needed is 11 Metres by 11 Computers by 2 offices.
Fibre Optic Cables used for transmitting digital data signals are kshs 5,000 per Metre & the length needed is kshs 5,000 by 2000 Metres.
COST OF CABLING AND INSTALLATION
UTP Cables=(45/= by 121m by 2 offices)= 10,890/=
Fibre Optic Cables=(5,000/= by 2000m)= 10,000,000/=
Virtual Private network= 2,000,000/=
Installation=(90,000 by 2 offices)= 180,000/=
Server= 80,000/=
Printer= 30,000/=
DATA TRANSFER RATE REQUIRED
This will be 1Gigabyte per second.
TASK 2 (30 marks)
FIBRE OPTIC CABLES
These are long thin pure glass strands arranged in bundles used to transmit signals over long distances by bouncing the light signals from the cladding (mirror-lined walls).
MERITS OF FIBRE OPTIC CABLES
Flexible – Optic fibres transmit and receive light due to its flexibility. This then makes it possible to be used in plumbing, mechanical and medical imaging.
Low power - Fibre optic cables uses low-power transmitters instead of high voltage electrical transmitters because they degrade less thus are non-flammable.
Less expensive- several miles of optical cable can be made cheaper than equivalent lengths of copper wire which is less expensive.
Thin – fibre optic cables are thinner than copper wires allowing more phone lines to go over the same cable.
Light weight – as it takes up less space in the ground.
DEMERITS OF FIBRE OPTIC CABLES
Requires special skills – This requires expensive precision, splicing, additional training of personnel and measurement.
Opaqueness – Fibre optic cables becomes opaque when exposed to radiation despite extensive military use.
Affected by chemicals – Fibre optic cables (underwater cables) are affected by chemicals such as Hydrogen.
VIRTUAL PRIVATE NETWORKS
It is said to be the best in establishing long-distance and/or network connections that are secure. It is used in businesses more than commercial use.
BENEFITS OF VIRTUAL PRIVATE NETWORKS
Low cost of virtual private network – This is due to elimination of leasing of expensive long distance lines and thus using a dedicated connection to the service provider. This is also possible due to the lessening the need for telephones charges (long-distance) for remote access.
Scalability – Virtual private networks avoids the problem of expensive costs of leasing lines when an organisation adds another branch as more lines are required which making it very expensive.
Provides a secure remote access through the internet where data is encrypted before it is passed over the internet then the data is decrypted when it reaches the destination.
DEMERITS OF VIRTUAL PRIVATE NETWORKS
Immature standards – virtual private networks technologies from different vendors may not work well together.
Needs to accommodate existing internal network technology and protocols other than internet protocol.
PROTOCOLS USED
PPTP – This stands for Point to Point Tunnelling Layer. It allows one to send or receive emails over the internet. Used to tunnel a point-to-point session over an internet protocol network and supports multiprotocol virtual private networks which enables remote users to access corporate networks securely.
IPSEC - This stands for Internet Protocol Security. It is used to transfer files that make up the web pages. Used to protect one or more paths between a pair of hosts, between a pair of security gateways or between a security and a host.
L2TP – This stands for Layer to Tunnelling Protocol. It is used for intergrading multi-protocol dial up services into existing internet services providing point of presence
SSL – This stands for Secure Socket Layer. This is a collaborative project used to develop a robust, commercially-grade, full-featured and open source toolkit which implements the secure socket layer (SSL v2/v3) and transport layer security (TLS v1) protocols.
MEDIA REQUIRED
Fibre Optic Cables – uses optical fibres to carry digital data signals in form of modulated pulses of light and can handle very high data transmission rates. It can transmit data between 2 kilometres-100 kilometres before attenuation. Attenuation means that the signal starts to weaken.
Twisted pairs – Is categorised into two; Unshield pair (UTP) and Shielded pair (STP). UTP is more popular than STP because it is cheaper. They both transmit data up to a maximum distance of 100 metres. Otherwise, signals must be boosted. Failure to this the signal starts to fade away (attenuation).
Coaxial Cables – Is categorised into two; thin net which is about 185 metres and thick net which is about 500 metres before attenuation begins. However, they are not common due to the fact that they do not accommodate high transmission speeds.
HARDWARE REQUIRED
Switch – this is the central point that controls computers from a central point.
Router – this routes or directs data to follow the most efficient path.
Server – this is a computer or a computer program that manages access to a centralized resource or service in a network.
Printer – this is an output device used to print text or pictures onto paper.
Repeater – this re-transmits the signals to their original strengths.
TASK 3 (25 marks)
SECURITY ISSUES
COMPONENTS THREATS COUNTER MEASURES
Hardware
Theft
Power Failure
Vandalism
Destruction
Closed camera Circuits
Back-ups
Ups & Generators
Grills, Locks & Security Personnel
Software
Counterfeit Software
Viruses, Worms & Trojans
Logic Bombs
Unauthorised Access
Anti-virus
User Names & Passwords
Back-ups
Spyware
File/Documents
Hackers
File Theft
Modification/Deletion
Viruses
Back-ups
Firewalls
Encrypting Files
User Acceptance Policies
Users
Unauthorised Access
Damages
Deletion
Theft
User Names
Back-ups
Education
Personnel
Vandalism
Destruction
Theft
Dishonesty
Education
Policy Documents
Finger Print Locks
Closed Circuit Cameras
External people
Fraud
Hackers
Theft
Vandalism
Detecting Equipment
Firewalls & Encrypting Files
Back-ups
Alarm Systems
Organisations
Inadequate Support
Unauthorised Access
Theft
Lack of Responsibilities
Education
Back-ups
Documents Showing Importance of Data Security
Security Personnel
Natural Calamities
Floods
Fire
Wars
Earthquakes
Insurance
Back-ups
Raising the servers
PROTECTION FROM VIRUSES, TROJANS AND WORMS
Installing genuine and recognised anti-viruses such as KASPERSKY INTERNET SECURITY in the computers.
Updating the anti-virus on a regular basis.
Scanning for viruses from external hardware such as Flash disks.
Installing pop-up blockers whenever a site is unsafe.
CONCLUSION
Hiring of security personnel for security and taking insurance.
Installing closed circuit cameras around the building’s perimeter.
I would recommend VPN due its relatively low costs of both buying and installing.
Back-ups should be stored away from the offices in a good secret monitored location.
LIST OF REFERENCES
1. www.computer.howstuffworks.com/fibre-optic4.html
2. www.optical-fibres.tripod.com/id4.html
3. www.jarvin.com/networksecurity/openSSL.html
4. www.jarvin.com/protocolPPTP.html
5. www.homepages.uel.ac.uk/u-/NETWORKS.COM/aa010701c.htm
6. www.computer.howstuffworks.com/fiber-optic4.html
7. www.windowsecurity.com/articles/vpn
8. www.jarvin.com/networksecurity/IPsec.html
9. www.jarvin.com/protocolL2TP.html