Designing a Corporate Network

Designing a complete research proposal with a sample questionnaire for the topic “Comparing traditional learning and online learning in colleges and universities in terms of the outcomes of the delivered courses”
August 15, 2017
design intent
August 15, 2017
Show all

Designing a Corporate Network

Designing a Corporate Network Introduction The type of network design that will be appropriate for the XYZ Company is the Wide Area Network Design. This design is favorable since it allocates steady WAN services and applications in all the offices or departments that are interfaced with it. It additionally helps to save both time and money while adding the value of the company. There is consistency in optimization of application, coherence and security which are integrated to make business cooperation workable in the business, make strong the security and fasten data access. The Wide Area Network handles a wide range of requirements, it helps to limit complexity through exploiting WAN Services in the branch office and aggregation routers situated in the data centers. This aspect is vital in getting a better return on investment by making the needs of the branches be aligned with the consistency of the WAN Services demands. The Network Design helps to mitigate Security risks. The security of the network is at the top most consideration. For this purpose, the WAN applies a number of security services like the VPN, access control and traffic monitoring. The duties done by this network design is to have a virtualized security service to limit the number of applications making management simpler, there is also to limit the security expenses while keeping high security and according a compliance report so as to evade penalties related to legislative and regulatory spotlight (Stawowski, 2007). The users will similarly be accorded a better user experience of the services offered. The services of the WAN are designed to uphold company services. The WAN upholds voice and video services that are reliable and stable at a point which advances their application and productivity. Balance Between Security and Usability The network design has to keep safe so that vital information in the financial and human resource department is secure from an unauthorized access. For the balance to be achieved there has to be a determination of the risk that exists between the network and data then set up a security that do away with the risk. This is done by an assessment of the network model, impact of data intrusion and looking out if the building is access controlled. There has to be the determination of which data is more important. In this case the financial and human resource department containing data on the employees need to be kept safe. Later one has to determine what security policies that have to be applied. These policies are connected in the prior data collected on vital data that are to be kept safe. This calls for a three layer security of the IPSec. IPSec encrypts data located in the IP datagram. This accords the network data integrity, confidentiality and authentication. The IPSec technology applies user authentication and encapsulation protocols to allocate data security on user computers, servers and work groups in WAN offices (Lippis, 2009). The authentication header offers authentication and integrity for a company where confidentiality is not considered while encapsulation brings about confidentiality using encryption, integrity and authentication among other aspects. In using the IPSec one has to be verified to access or receive data in a computer. The digital signatures are safest in ensuring authentication. There is the use of anti-replay which makes sure that an authentication is not interpreted when sent over a network. Summarily, the WAN advantage with regard to business connects the WAN resources with the priorities and procedures of a business. The design can offer the XYZ a better user experience with real time coherence services in addition to video conferencing from any place, a better application response and access to information for staff to work variedly and in a better. Reference Lippis J. (2009). WAN Advantage: New Thinking in Branch Office and WAN Edge Design plus Services. Lippis Report White Paper. Lippis consulting. Stawowski, M., (2007). The Principles of Network Security Design. The Global Voice of Information Security, ISSA Journal. Retrieved from

Leave a Reply

Your email address will not be published. Required fields are marked *