This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Verbania Network Infrastructure

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

Verbania Network Infrastructure

Cabling recommended

I would recommend that the company uses fiber optic cable as their form of cabling; it will use single-mode fiber during it cabling this is because the company, with time, will have a big data center because of storing a lot of information about its users; therefore the type of cabling they will require is the one that covers a longer distance hence the use of single-mode fiber.

Fiber the best choice

The reason why fiber optic is the best choice of cabling for Verbania is that it is a type of cabling that can support higher bandwidth since Verbania is a social media company. The level of internet connection of connection will be maximum, therefore ensuring there is high availability of their services and reliability and accessibility. Network downtime will be rare because of the strong connection that is available. Since Verbania’s network infrastructure would be between buildings, fiber will the most appropriate standard method of cabling. Because Verbania will be a company that has just gotten into the market, the cost of regular replacing and maintaining the network would be scarce, saving on some of its resources. Data transmitted within the company will be accessed and retrieved very easily because of the high internet connectivity the fiber has.

Network infrastructure

            To accommodate remote access, the network infrastructure will incorporate the use of a virtual private network where its employees can access the company’s information without having to worry about data security. The VPN will create an encrypted and safe connection over a less secure network that employees commonly use, i.e., the internet. When a particular user connects to the network through a VPN, the VPN software will first encrypt the traffic before delivering the information over the internet (Page, 2020). The VPN server is usually located at the targeted network edge. The data is then decrypted and finally sent to the host found inside the private network; it should always be sent to the appropriate host.

 

 

 

 

 

 

 

 

 

 

 

 

Integration of social media and CRM

I would uncover the potential customers through hashtags and keywords; this will be done by tracking the keywords for the brand during the types of conversion they having during social media. The hashtags will enable users to categorize different content and, through this, will be able to know the level of interest they have about the company. Another solution can be responding faster to customer complaints; this will be done by engaging them when talking about the company and showing that you care about their views and perceptions of negative or positive comments.

Security consideration

            Some of the security consideration when we will be designing the network infrastructure will be ensuring there is user authentication, where the user who logs in to the network or even the database of the company has permission to do so, e.g., we will ensure the use of passwords and user names when logging into the LAN/WAN network, we will also use digital certificates in receiving and sending e-mails that are secure via the internet. Server authentication is also another security consideration where a client machine can be able to verify that the server is the correct server, e.g., when HTTPS mode of communication is used which uses the HTTP 1.1 with the secure socket layer, the data that is transmitted is encrypted, and authentication of the server is done through over internet (Plósz et al., 2016). A digital certificate is the one that accomplishes the server authentication. The secure transmission should also be considered where the data being transmitted is encrypted. Only the recipient and the sender have the key that can decode and encode the data.

 

 

 

 

 

 

 

References

Page, V. I. (2020, October). Developing and Deploying Remote Access Infrastructure for Global Equipment Support. In SNAME Maritime Convention. The Society of Naval Architects and Marine Engineers.

Plósz, S., Hegedűs, C., & Varga, P. (2016, September). Advanced security considerations in the arrowhead framework. In International Conference on Computer Safety, Reliability, and Security (pp. 234-245). Springer, Cham.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask