Question

In: Computer Science

Discuss a recommendation for one of the questions in detail with this broader audience. Obtain other...

Discuss a recommendation for one of the questions in detail with this broader audience. Obtain other views and perspectives for consideration. Support your recommendation using what you know about the company Verbania, knowledge of technologies, and best practices.

You may wish to prepare a Word document that contains your recommendations.

  • Which type of cabling would you recommend? Why do you think this would be the best choice?
  • How will the network infrastructure accommodate remote access?

Solutions

Expert Solution

Answer:-

Which type of cabling would you recommend? Why do you think this would be the best choice?

best cabling is

Shielded Twisted Pair (STP) Cable

Although UTP cable is the least expensive cable, it may be susceptible to radio and electrical frequency interference (it should not be too close to electric motors, fluorescent lights, etc.). If you must place cable in environments with lots of potential interference, or if you must place cable in extremely sensitive environments that may be susceptible to the electrical current in the UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend the maximum distance of the cables.

Shielded twisted pair cable is available in three different configurations:

  1. Each pair of wires is individually shielded with foil.
  2. There is a foil or braid shield inside the jacket covering all wires (as a group).
  3. There is a shield around each individual pair, as well as around the entire group of wires (referred to as double shield twisted pair).

why:-

Resistance to Interference

STP cabling automatically repels interference from outside sources. The two wires inside of the cabling form a circular magnetic field when electrical current flows through them. The magnetic field cancels out any outside magnetic fields as well as interference from within the cable, other electrical devices and radio waves. The wires' outer metallic foil or braid shield adds an extra layer of protection against interference.

Speed

STP cables transmit data quickly at speeds up to 100 megabits per second. The cabling carries data, including packets of information via the Internet as well as commercial computer networks, through both inner wires and not just one wire. Using both wires also reduces data transmission delays.

Data Security

Data being sent via STP cabling is also more secure than data sent via other cabling types, including coaxial and unshieled twisted cabling. STP cabling's inner and outer components keep data flowing properly, resulting in fewer data packet dropouts, delays and errors. Data packet dropouts and delays slow information transmission and can result in Internet connection and network errors.

How will the network infrastructure accommodate remote access?

accessFor effective and high productivity purposes, the Verbania, Inc. network infrastructureshould be able to accommodate remote access. To achieve this, the network designs shouldincorporate a number of Remote-access virtual-private networks (VPNs) to enable remotelylocated users to access the company’s services using an encrypted-tunnel across the Internet. FirVerbania, Inc. to effectively deploy its remote-access VPNs, it needs to use either IP-Security(IPsec) and Secure-Sockets Layer (SSL) (Noonan, 2004). Note that, VPNs have been defined tooffer a wide range of logical solution for purposes of achieving remote-access connectivity.Among other benefits for using VPNs for remote access are: - They guarantee secure and fastcommunications across the company’s contractors, employees, employers and partners, VPNsalso improve company’s productivity through extending its network and applications. Lastly, itreduces communications costs for the remote users. Solution to integrate the social media site using a CRM solution

times and enabling work without interruptions present in an office environment.

VPNs also provide a secure solution for providing limited network access to non-employees, such as contractors or business partners. With VPNs, contractor and partner network access can be limited to the specific servers, Webpages, or files they are allowed access to, thus extending them the network access they need to contribute to business productivity without compromising network security.

Technology Options: IPsec and SSL VPNs

There are two primary methods for deploying remote-access VPNs: IP Security (IPsec) and Secure Sockets Layer (SSL). Each method has its advantages based on the access requirements of your users and your organization's IT processes. While many solutions only offer either IPsec or SSL, Cisco ® remote-access VPN solutions offer both technologies integrated on a single platform with unified management. Offering both IPsec and SSL technologies enables organizations to customize their remote-access VPN without any additional hardware or management complexity.

SSL-based VPNs provide remote-access connectivity from almost any Internet-enabled location using a Web browser and its native SSL encryption. It does not require any special-purpose client software to be pre-installed on the system; this makes SSL VPNs capable of "anywhere" connectivity from company-managed desktops and non-company-managed desktops, such as employee-owned PCs, contractor or business partner desktops, and Internet kiosks. Any software required for application access across the SSL VPN connection is dynamically downloaded on an as-needed basis, thereby minimizing desktop software maintenance.

SSL VPNs provide two different types of access: clientless and full network access. Clientless access requires no specialized VPN software on the user desktop. All VPN traffic is transmitted and delivered through a standard Web browser; no other software is required or downloaded. Since all applications and network resources are accessed through a Web browser, only Web-enabled and some client-server applications-such as intranets, applications with Web interfaces, e-mail, calendaring, and file servers-can be accessed using a clientless connection. This limited access, however, is often a perfect fit for business partners or contractors who should only have access to a very limited set of resources on the organization's network. Furthermore, delivering all connectivity through a Web browser eliminates provisioning and support issues since no special-purpose VPN software has to be delivered to the user desktop.

SSL VPN full network access enables access to virtually any application, server, or resource available on the network. Full network access is delivered through a lightweight VPN client that is dynamically downloaded to the user desktop (through a Web browser connection) upon connection to the SSL VPN gateway. This VPN client, because it is dynamically downloaded and updated without any manual software distribution or interaction from the end user, requires little or no desktop support by IT organizations, thereby minimizing deployment and operations costs. Like clientless access, full network access offers full access control customization based on the access privileges of the end user. Full network access is a natural choice for employees who need remote access to the same applications and network resources they use when in the office or for any client-server application that cannot be delivered across a Web-based clientless connection.

IPsec-based VPNs are the deployment-proven remote-access technology used by most organizations today. IPsec VPN connections are established using pre-installed VPN client software on the user desktop, thus focusing it primarily on company-managed desktops. IPSec-based remote access also offers tremendous versatility and customizability through modification of the VPN client software. Using APIs in IPsec client software, organizations can control the appearance and function of the VPN client for use in applications such as unattended kiosks, integration with other desktop applications, and other special use cases.


Related Solutions

Look at the following research questions. What would be an appropriate audience for each one? Why...
Look at the following research questions. What would be an appropriate audience for each one? Why did you come to that answer? 1. How does the use of texting affect high school English grades? 2. What effect do medical budget cuts have on small town hospitals? 3. Does earning an MBA make you a better job candidate? 4. Why does the American government lend money to foreign countries?
Please explain in detail. Which of the following is true about market definition? (a) The broader...
Please explain in detail. Which of the following is true about market definition? (a) The broader the market is defined, the more likely it is that two firms in that market will be able to have a merger between them approved by the Department of Justice (b) If two firms produce close substitutes, all else equal the Department of Justice will be less likely to approve a merger between them (c) Two firms producing complementary products will generally have their...
Discuss in detail at least one of the key network functions.
Discuss in detail at least one of the key network functions.
1. Discuss in detail the interrelationship of dietitians with other health professionals in nutritional management of...
1. Discuss in detail the interrelationship of dietitians with other health professionals in nutritional management of diseases. 2. Discuss food taboos and cultural issues which affect food consumption and how they can be circumvented. (20mks
Describe and discuss one (01) recommendation you may have for multinational corporations in doing business in...
Describe and discuss one (01) recommendation you may have for multinational corporations in doing business in chile
How do labor markets operate and how do they connect to each other and the broader...
How do labor markets operate and how do they connect to each other and the broader economy?
For each of these questions, your audience are persons that are not experts in statistics. Write...
For each of these questions, your audience are persons that are not experts in statistics. Write with complete sentences and paragraphs. Cite any references that you use. (5 pts.) When building a model, you make four assumptions about the residuals. Explain what they are and how you can verify that your assumptions are correct. (5 pts) Define ‘interaction term’. From your own experience, identify an instance in which you believe an interaction term would be appropriate.
For each of these questions, your audience are persons that are not experts in statistics. Write...
For each of these questions, your audience are persons that are not experts in statistics. Write with complete sentences and paragraphs. Cite any references that you use. a. Imagine you fit a regression model to a dataset and find that R‐squared = 0.69. Is this a good regression model or not? If you cannot tell, what additional information do you need?   b. Research and then explain the "regression fallacy". Provide at least one example.
Discuss and answer at least two of the questions listed below in detail. Review: What is...
Discuss and answer at least two of the questions listed below in detail. Review: What is the purpose of the statement of cash flows? Why would we want to convert accrual basis net income to cash basis when creating the statement of cash flows? Differentiate between these three activities: operating, financing, and investing. Provide at least two examples of each. What are the two methods to prepare the cash flow statement? Discuss in detail how cash operating activities are determined...
Mention the recommendation that researchers should take into account when collecting qualitative data to obtain high-quality...
Mention the recommendation that researchers should take into account when collecting qualitative data to obtain high-quality data?with reference
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT