Leveraging Information Covered In Your Learning Team Collabo

Leveraging Information Covered In Your Learning Team Collaborative Dis

Leveraging information covered in your Learning Team collaborative discussions, continue developing the solution for Taylor & Sons Financial Consulting. Write a 1- to 2-page paper that specifically focusing on the following: Details of topology chosen and the reasons selected Whether LINUX or Windows was the selected operating system for specific functions or applications The protocols that will be used, access, and diagrams Create a 6- to 8 -slide boardroom-quality Microsoft ® PowerPoint ® presentation detailing your plan and based on the project to date. The presentation must contain the Local Area Network plan for Taylor & Sons Financial Consulting, and include: Flowcharts/diagrams of the physical and logical network, and an explanation of why you would choose to develop the network in the format you selected Details regarding the topology needed for your plan, and what benefits it would provide for Taylor and Sons Network security implementations, including firewall, virus scanning, encryption, malware protection, and user authentication Speaker notes to elaborate on the key points of your plan Note: The presentation will be reviewed and commented on by the facilitator, and you will be asked to revise and resubmit in Week Five.

Submit your assignment using the Assignment Files tab. Materials Individual Project Instructions: Local Area Network for Taylor & Sons Financial Consulting Plan and Presentation Learning Team Collaboration: Local Area Network for Taylor & Sons Financial Consulting All trademarks are property of their respective owners. See the list of trademarks used in this course. Resources: Center for Writing Excellence Reference and Citation Generator Grammar and Writing Guides Learning Team Toolkit

Paper For Above instruction

The development of a robust Local Area Network (LAN) for Taylor & Sons Financial Consulting necessitates careful planning regarding topology, operating systems, protocols, security measures, and network diagrams. This paper explores the chosen topology, rationale behind OS selection, relevant protocols, and the security strategies integral to the network design, laying the foundation for the comprehensive PowerPoint presentation required for the project.

Network Topology Selection and Rationale:

For Taylor & Sons, a star topology was selected as the most appropriate network configuration. The star topology involves connecting all devices to a central switch or hub, which simplifies troubleshooting, enhances performance, and offers scalability. This topology is advantageous for financial consulting firms like Taylor & Sons because it ensures high availability and minimizes downtime; if one device fails, it does not impact the entire network. The centralized nature facilitates easier management and security implementation, making it suitable for a professional environment where data integrity and system uptime are paramount.

Operating System Choice:

The decision between Linux and Windows operating systems hinges on the specific functions and applications within Taylor & Sons. Given the firm's reliance on proprietary financial software and the prevalence of Windows-based applications in business environments, Windows Server and client OS are the most logical choices. Windows offers user-friendly management interfaces, extensive support for enterprise applications, and integration with Active Directory for user management. Nevertheless, Linux can be employed for certain server functions, such as hosting secure web services or database servers, due to its stability, security features, and cost-effectiveness. Hence, a hybrid approach utilizing Windows for client workstations and enterprise applications, alongside Linux servers for backend services, optimizes operational efficiency.

Protocols, Access Methods, and Network Diagrams:

Key protocols such as TCP/IP form the communication backbone of the LAN, enabling reliable data transfer among devices. For secure remote access, Virtual Private Network (VPN) protocols like PPTP or L2TP/IPsec are recommended. Ethernet will serve as the primary physical protocol for wired connections, while Wi-Fi (IEEE 802.11ac/ax) will support wireless devices, maintaining flexibility. Access controls are managed via VLANs and user authentication systems, incorporating 802.1X standards. The network diagrams include physical topology maps illustrating device interconnections, and logical diagrams outlining data flow and protocol layers, providing clarity on network structure and security zones.

Security Measures and Benefits:

Securing the LAN involves multiple layers: firewalls to monitor and control traffic between segments, intrusion detection/prevention systems (IDS/IPS), anti-virus and anti-malware solutions, and encryption protocols for data confidentiality. User authentication through strong passwords, biometrics, or smart cards enhances access security. Regular malware scanning mitigates threats, while VPNs enable secure remote access. The star topology’s centralized management improves the implementation of these security measures, facilitating quick updates and policy enforcement. Encryption protocols such as SSL/TLS protect sensitive data during transmission, aligning with compliance standards for financial data security.

Conclusion:

In conclusion, the proposed LAN for Taylor & Sons combines a star topology with a hybrid OS environment, leveraging TCP/IP and Ethernet protocols for reliable connectivity. Security implementations like firewalls, encryption, and user authentication are fundamental to safeguarding client and corporate data. The accompanying diagrams and speaker notes will further clarify the network structure and security strategies, providing a comprehensive plan that ensures operational efficiency, scalability, and security suitable for a financial consulting firm.

References

  • Craig, D. (2020). Networking Fundamentals. Pearson Education.
  • Gordon, L., & Westrissen, H. (2019). Network Security: Foundations and Practice. Wiley.
  • Kurose, J. F., & Ross, K. W. (2021). Computer Networking: A Top-Down Approach. Pearson.
  • Odom, W. (2018). Cisco CCNA Routing and Switching 200-125 Official Cert Guide. Cisco Press.
  • Stallings, W. (2020). Data and Computer Communications. Pearson.
  • Forouzan, B. A. (2017). Data Communications and Networking. McGraw-Hill Education.
  • Microsoft Corporation. (2023). Network Security Guidance for Windows Servers. Microsoft Docs.
  • Linux Foundation. (2022). Linux Security Modules. The Linux Foundation.
  • Chen, T., & Zhang, G. (2021). Implementing Secure LANs in Financial Institutions. Journal of Network Security, 15(3), 45-60.
  • National Institute of Standards and Technology (NIST). (2022). Cybersecurity Framework. NIST.