In: Computer Science
Discuss a recommendation for one of the questions in detail with this broader audience. Obtain other views and perspectives for consideration. Support your recommendation using what you know about the company Verbania, knowledge of technologies, and best practices.
You may wish to prepare a Word document that contains your recommendations.
Answer:-
Which type of cabling would you recommend? Why do you think this would be the best choice?
best cabling is
Shielded Twisted Pair (STP) Cable
Although UTP cable is the least expensive cable, it may be susceptible to radio and electrical frequency interference (it should not be too close to electric motors, fluorescent lights, etc.). If you must place cable in environments with lots of potential interference, or if you must place cable in extremely sensitive environments that may be susceptible to the electrical current in the UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend the maximum distance of the cables.
Shielded twisted pair cable is available in three different configurations:
why:-
Resistance to Interference
STP cabling automatically repels interference from outside sources. The two wires inside of the cabling form a circular magnetic field when electrical current flows through them. The magnetic field cancels out any outside magnetic fields as well as interference from within the cable, other electrical devices and radio waves. The wires' outer metallic foil or braid shield adds an extra layer of protection against interference.
Speed
STP cables transmit data quickly at speeds up to 100 megabits per second. The cabling carries data, including packets of information via the Internet as well as commercial computer networks, through both inner wires and not just one wire. Using both wires also reduces data transmission delays.
Data Security
Data being sent via STP cabling is also more secure than data sent via other cabling types, including coaxial and unshieled twisted cabling. STP cabling's inner and outer components keep data flowing properly, resulting in fewer data packet dropouts, delays and errors. Data packet dropouts and delays slow information transmission and can result in Internet connection and network errors.
How will the network infrastructure accommodate remote access?
accessFor effective and high productivity purposes, the Verbania, Inc. network infrastructureshould be able to accommodate remote access. To achieve this, the network designs shouldincorporate a number of Remote-access virtual-private networks (VPNs) to enable remotelylocated users to access the company’s services using an encrypted-tunnel across the Internet. FirVerbania, Inc. to effectively deploy its remote-access VPNs, it needs to use either IP-Security(IPsec) and Secure-Sockets Layer (SSL) (Noonan, 2004). Note that, VPNs have been defined tooffer a wide range of logical solution for purposes of achieving remote-access connectivity.Among other benefits for using VPNs for remote access are: - They guarantee secure and fastcommunications across the company’s contractors, employees, employers and partners, VPNsalso improve company’s productivity through extending its network and applications. Lastly, itreduces communications costs for the remote users. Solution to integrate the social media site using a CRM solution
times and enabling work without interruptions present in an office environment.
VPNs also provide a secure solution for providing limited network access to non-employees, such as contractors or business partners. With VPNs, contractor and partner network access can be limited to the specific servers, Webpages, or files they are allowed access to, thus extending them the network access they need to contribute to business productivity without compromising network security.
Technology Options: IPsec and SSL VPNs
There are two primary methods for deploying remote-access VPNs: IP Security (IPsec) and Secure Sockets Layer (SSL). Each method has its advantages based on the access requirements of your users and your organization's IT processes. While many solutions only offer either IPsec or SSL, Cisco ® remote-access VPN solutions offer both technologies integrated on a single platform with unified management. Offering both IPsec and SSL technologies enables organizations to customize their remote-access VPN without any additional hardware or management complexity.
SSL-based VPNs provide remote-access connectivity from almost any Internet-enabled location using a Web browser and its native SSL encryption. It does not require any special-purpose client software to be pre-installed on the system; this makes SSL VPNs capable of "anywhere" connectivity from company-managed desktops and non-company-managed desktops, such as employee-owned PCs, contractor or business partner desktops, and Internet kiosks. Any software required for application access across the SSL VPN connection is dynamically downloaded on an as-needed basis, thereby minimizing desktop software maintenance.
SSL VPNs provide two different types of access: clientless and full network access. Clientless access requires no specialized VPN software on the user desktop. All VPN traffic is transmitted and delivered through a standard Web browser; no other software is required or downloaded. Since all applications and network resources are accessed through a Web browser, only Web-enabled and some client-server applications-such as intranets, applications with Web interfaces, e-mail, calendaring, and file servers-can be accessed using a clientless connection. This limited access, however, is often a perfect fit for business partners or contractors who should only have access to a very limited set of resources on the organization's network. Furthermore, delivering all connectivity through a Web browser eliminates provisioning and support issues since no special-purpose VPN software has to be delivered to the user desktop.
SSL VPN full network access enables access to virtually any application, server, or resource available on the network. Full network access is delivered through a lightweight VPN client that is dynamically downloaded to the user desktop (through a Web browser connection) upon connection to the SSL VPN gateway. This VPN client, because it is dynamically downloaded and updated without any manual software distribution or interaction from the end user, requires little or no desktop support by IT organizations, thereby minimizing deployment and operations costs. Like clientless access, full network access offers full access control customization based on the access privileges of the end user. Full network access is a natural choice for employees who need remote access to the same applications and network resources they use when in the office or for any client-server application that cannot be delivered across a Web-based clientless connection.
IPsec-based VPNs are the deployment-proven remote-access technology used by most organizations today. IPsec VPN connections are established using pre-installed VPN client software on the user desktop, thus focusing it primarily on company-managed desktops. IPSec-based remote access also offers tremendous versatility and customizability through modification of the VPN client software. Using APIs in IPsec client software, organizations can control the appearance and function of the VPN client for use in applications such as unattended kiosks, integration with other desktop applications, and other special use cases.