Upload
fedora-leo
View
164
Download
3
Embed Size (px)
Citation preview
Building a Data Network
(wired and wireless) for a
Small OfficeBY :
1. PYIE SONE
2. SOE THIHA
3. PYAE PHYO AUNG
Installation schedule
One Week
After Office Hour
Testing
Logical Diagram explained with
specific layering
To Logical Diagram
Budget
4 Routers
2 Switch
1 Access Point
Internet Connection
Cable
IP Phone
Printer
Detail Description of Selected DevicesDiagram Item Price
Amped Wireless Amped
Wireless AP20000G
Wireless Access Point
$ 159.99
TRENDnet TEG-S224
Gigabit Ethernet Switch
$ 100.5
Epson Workforce Pro WP-
4540 All-in-One Printer
$ 259.99
Hawking Tech. HSB2 IEEE
802.11b/g Wi-Fi Signal
Booster
$ 149.99
D-Link amplifi DIR-857
Wireless Router - IEEE
802.11n
$ 179.99
Linksys SRW224G4 28-port
WebView Gigabit
Ethernet Switch
$ 200
I. Worms and Viruses
- Last year, 75% of small and medium-sized
businesses affected by at least one virus.
- Meanwhile office staffs are also spreading virus
unintentionally by downloading untrustworthy
material.
- Security Systems need to detect and repel worms,
viruses, and spyware at all points in the network.
IIInformation Theft
- Hackers break to steal credit card or social security
numbers in small-sized businesses rather than large
corporations.
- From both inside and outside of the office, there
should be security strategy to prevent theft of
sensitive electronic information.
III Business Availability
- DoS and DDoS attack are one of top most destructive attacks which cause inability to process legitimate traffic, and If more severe, office's credibility is damaged.
- Normally small-sized businesses are less prepared for attacks than large corporations.
- Even a modest attack could result in substantial lost and tax internal resources
and attacks are more sophisticated and stealthier.
HOW TO PREVENT THESE THREATS
1. Cisco Self-defending Network
long term strategy to secure business processes
both internal and external threats.
they can protect both their networks, and their
network investments
, It has 3 main characters, integration, collaboration
and adaptability, integrate into all elements in the
network,
work together to exchange information,
use innovative behavioral recognition to repel new
threats
Stay Open for Business, Even While Under
Attack
proven, multifaceted approach protects
from devastating effects of worms, viruses.
IPSs (Industry-leading Cisco intrusion
prevention systems)can and inspect all
incoming traffic in real time, if found, stop
the threat and prevent it from spreading
though the network.
Layers of security allows to continue to
respond to clients and stay open for
business - even while under attack.
Precaution
Enable MAC address filtering
Static IP Address
Disable SSID broadcast
Firewall
WPA2 Encryption
Pros And Cons of wLAN
Pros
Mobility
Wireless
Less Complicated
Roaming
Cons
Slow
Limitation
Security
THANK
YOU! DATA COMMUNICATION AND WIRELESS SOLUTIONS TEAM