Verbania Network Infrastructure
Cabling recommended
I would recommend that the company uses fiber optic cable as their form of cabling; it will use single-mode fiber during it cabling this is because the company, with time, will have a big data center because of storing a lot of information about its users; therefore the type of cabling they will require is the one that covers a longer distance hence the use of single-mode fiber.
Fiber the best choice
The reason why fiber optic is the best choice of cabling for Verbania is that it is a type of cabling that can support higher bandwidth since Verbania is a social media company. The level of internet connection of connection will be maximum, therefore ensuring there is high availability of their services and reliability and accessibility. Network downtime will be rare because of the strong connection that is available. Since Verbania’s network infrastructure would be between buildings, fiber will the most appropriate standard method of cabling. Because Verbania will be a company that has just gotten into the market, the cost of regular replacing and maintaining the network would be scarce, saving on some of its resources. Data transmitted within the company will be accessed and retrieved very easily because of the high internet connectivity the fiber has.
Network infrastructure
To accommodate remote access, the network infrastructure will incorporate the use of a virtual private network where its employees can access the company’s information without having to worry about data security. The VPN will create an encrypted and safe connection over a less secure network that employees commonly use, i.e., the internet. When a particular user connects to the network through a VPN, the VPN software will first encrypt the traffic before delivering the information over the internet (Page, 2020). The VPN server is usually located at the targeted network edge. The data is then decrypted and finally sent to the host found inside the private network; it should always be sent to the appropriate host.
Integration of social media and CRM
I would uncover the potential customers through hashtags and keywords; this will be done by tracking the keywords for the brand during the types of conversion they having during social media. The hashtags will enable users to categorize different content and, through this, will be able to know the level of interest they have about the company. Another solution can be responding faster to customer complaints; this will be done by engaging them when talking about the company and showing that you care about their views and perceptions of negative or positive comments.
Security consideration
Some of the security consideration when we will be designing the network infrastructure will be ensuring there is user authentication, where the user who logs in to the network or even the database of the company has permission to do so, e.g., we will ensure the use of passwords and user names when logging into the LAN/WAN network, we will also use digital certificates in receiving and sending e-mails that are secure via the internet. Server authentication is also another security consideration where a client machine can be able to verify that the server is the correct server, e.g., when HTTPS mode of communication is used which uses the HTTP 1.1 with the secure socket layer, the data that is transmitted is encrypted, and authentication of the server is done through over internet (Plósz et al., 2016). A digital certificate is the one that accomplishes the server authentication. The secure transmission should also be considered where the data being transmitted is encrypted. Only the recipient and the sender have the key that can decode and encode the data.
References
Page, V. I. (2020, October). Developing and Deploying Remote Access Infrastructure for Global Equipment Support. In SNAME Maritime Convention. The Society of Naval Architects and Marine Engineers.
Plósz, S., Hegedűs, C., & Varga, P. (2016, September). Advanced security considerations in the arrowhead framework. In International Conference on Computer Safety, Reliability, and Security (pp. 234-245). Springer, Cham.