Assignment 2 Security Requirements
Assignment 2 Security Requirements
Security Requirements
Quality of service
The ability of a network to deliver better service to specified network traffic through multiple
technologies is referred to as quality of service. This ensures that key programs run smoothly.
Prioritization, comprising dedicated bandwidth, regulated jitter and delay, and enhanced loss
attributes, is the fundamental purpose of QoS. Before their competition, Internet service
providers must employ technology and tactics to deliver the finest service available.
Design of network system
IP address allocation table
Blueprint of LAN
.
Installing and configuring network services and application
User Feedback
Maintenance Schedule
System Maintenance Time Notice
General office and reception 8.00am – 5.00pm, Sunday, Will provide 12–24 hours,
systems. only as needed. notice when taking down
Our system.
Accounts and administrative 5.30am – 8.30am, Will provide 24 – 48 hours,
system Saturdays, only as needed. Notice when taking down
our system.
Network services and access 9.00am – 5.00pm, When a longer down time is
point. Saturdays. required, will provide 12-24
Hours, notice.
Workstations 4.00am – 8.30am, Monday, No additional notice.
Only as needed.
Pcs and printers. No weekly schedule No additional notice.
Required, only as needed.
IP Configuration
Trucking
Conduct Verification
1. Ping
The ping command is a simple way to check for connection. Ping checks for connections
by delivering ICMP echo messages to a site and waits for a reply. After awaiting for
every packet to be sent, the ping program displays the data packets being sent returned.
Each packet received is matched to the one that was sent. Four echo packets with 64
bytes of data are delivered by default. DNS resolve both for host name and the IP address
can be tested with the ping program.
2. Telnet
The term "telnet" is derived from the phrases "telephone" and "network." It was created
with the intention of allowing command line remote management across slower
connections. A TCP-based method may be used to test the connection of an array of
options. It can be used to check SMTP, SQL, and Remote Desktop connection.
3. Trace Route
The trace route program, which developed on UNIX and Cisco platforms, has been
ported to Windows. Trace route is a Global configuration utility that shows the path a
packet follows from its current location to its destination. It accomplishes this by
delivering echo response message to the target via the Internet Control Message Protocol
(ICMP).
Test Results
This image depicts workstation computers that have been successfully pinged.
Result with Telnet
Functionalities
1. Firewall
A firewall is a network equipment that analyses incoming and outgoing network traffic
and determines when specific types of communication must be permitted or forbidden
according to a security procedure. For more than 25 years, firewalls were the main line
defense in information security. They serve as a barrier among internal networks that are
trusted and secure and possibly unreliable external networks.
2. Backup servers
A restoration server is made consisting of a standard hardware server with plenty of
storage space, usually with large storage disks, and a backup server program tailored to it.
A client utilities program or the host system software can be used to set the backup
schedule for each computer (OS).
3. Cloud Backup
Cloud backup is a program that allows you to use public cloud services and facilities to
create, modify, maintain, and restore information, services, or applications. This is
performed by utilizing the internet.
References