Universal Network Access Policy
|
|
- Abigail Lynch
- 8 years ago
- Views:
Transcription
1 Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety of services for staff, members and guests, accessible over a comprehensive data communications infrastructure. It is certain that Information Technology will have a crucial and increasing role to play in the day-today activities of staff, members and guests; it is therefore important that staff, members and guests have access to their Information Technology resources whenever and wherever they need them. The purpose of this Policy is to ensure that Poynton Workmens Club provides, maintains and develops the infrastructure necessary to enable authorised Universal access to its Information Technology resources. Scope This Policy covers access to Information Technology resources delivered from the main site and all remote sites. It covers user access from on site and remote locations including remote working. This Policy defines the infrastructure and support strategies necessary to ensure that network services, applications and access technologies provide the most appropriate, efficient and secure environment for authorised users. Policy Poynton Workmens Club recognises that continual investment in network infrastructure will be required to help maintain its competitiveness and realise the benefits of advances in Information Technology. Poynton Workmens Club s network infrastructure consists of the following elements: Backbone fibre optic cabling infrastructure Remote sites interconnect Cabling infrastructure Backbone and remote sites routing services Local Area Networks (LANs) routing and switching services Flexible access facilities Remote access facilities Support Considering each element Poynton Workmens Club s policy will be as follows, NB. Actual investments will depend on Poynton Workmens Club s financial position and other commitments. Backbone fibre optic cabling infrastructure Poynton Workmens Club s Policy is to ensure that it s backbone fibre optic cabling infrastructure is maintained and developed to support the data communications requirements for current and future Information Technology service delivery. Initially the system was used to implement a 10Mbs bridged Ethernet backbone, whereas today it supports a trunked Gigabit Ethernet backbone and is capable of supporting 10Gigabit Ethernet and beyond. Poynton Workmens Club will continue to develop its strategic fibre optic cabling infrastructure by connecting new buildings as they come on stream and enhancing resilience to existing buildings where appropriate. Although cable choice, construction and fibre operating parameters have changed, the Policy of installing both multimode fibre and single mode fibre cables per link will continue. Remote sites interconnect Poynton Workmens Club s Policy is to ensure that staff located at remote sites are not disadvantaged in terms of the Information Technology resources and service levels provided for them.
2 Remote sites present many problems with respect to network provisioning and support. It is not uncommon for users at remote sites to feel left out of mainstream developments because of poor connectivity with the main site. Providing interconnects at bandwidths comparable with those available on the main network would not be affordable using traditional tariff services from the Public Telecommunications Operators (PTOs). This would generally lead to low bandwidth provisioning and associated reductions in the service levels that could be offered and supported. The availability of remote access services allows Poynton Workmens Club s IT Service to deliver high bandwidth services to remote sites on a par with the services delivered to the main network. Buildings cabling infrastructure Poynton Workmens Club s Policy is to ensure that data communications services are regarded as essential building utilities similar to water, gas and electricity. Poynton Workmens Club has adopted industry standard Premises Distribution Schemes (PDS) as the data communications wiring standard for all buildings. Each connection point is presented as either a wireless network connection or an RJ45 connector mounted within a suitable faceplate and containment system. The data transmission media used is industry standard unshielded twisted pair (UTP) cable providing four pairs of wires per connection point. The UTP cables run radialy from each connection point to specialized termination panels located within secure wiring closets that also house network and building LAN active components. PDS network connection points will provide the primary means by which end user systems connect to Local Area Networks (LANs) and hence Poynton Workmens Club s network. Backbone and remote sites routing services Poynton Workmens Club s Policy is to ensure that it s backbone network provides high performance, scaleable, secure and robust routing services between LANs and local, national and international resources. The backbone routing services are implemented via a number of core routers configured in a ring topology. The links between core routers consist of trunked gigabit Ethernet circuits; links to other buildings and departments are provided at 10Mbs, 100Mbs and 1Gbs as appropriate. Routing services are supported at wire rate for IP and IPX protocols and at considerably less than wire rate for AppleTalk protocols. High-speed routing services are provided for remote sites via open fibre circuits or leased (SDH) circuits. Poynton Workmens Club recognises that the replacement cycle for the core routers should be based on user and network application requirements, technological advances and available budgets. Under normal circumstances the replacement cycle is expected to be four years. Backbone replacement and upgrade programmes will address the following: Routing performance in terms of packets per second Trunk link upgrades to 10Gbs and beyond Access link upgrades to 100Mbs, 1Gbs, 10Gbs and beyond Quality of service provisions ensuring service performance and operational guarantees Service resilience Enhancements to overall management and network security provisions Poynton Workmens Club intends to provide an IP only routing service when it is practical to do so. AppleTalk backbone routing support is targeted for withdrawal by mid Microsoft server and client protocol support will only be routed in IP context. Local Area Networks (LANs) routing and switching services Poynton Workmens Club s Policy is to ensure that Local Area Networks (LANs) are maintained and developed within all buildings in order to provide the core technology and access ports necessary to deliver high quality network services and applications to end users; these services will be delivered via local servers, where appropriate, and servers located on other LANs or networks connected via the routing services.
3 Poynton Workmens Club has implemented the IEEE Ethernet standards as the technology of choice for Poynton Workmens Club s backbone and building LANs. Current LAN deployments provide network connections via 10Mbs contention based hubs or 10/100Mbs Ethernet switches; LANs typically connect to the backbone routing service via dedicated 10/100/1000Mbs router ports. By their nature contention based 10Mbs hubs provide relatively low useable bandwidth and allow all network traffic to be presented to network ports belonging to the same collision domain. By contrast 10/100Mbs Ethernet switches provide dedicated bandwidth for each port and ensure that only broadcast traffic and unicast traffic intended for a port is forwarded to it. Poynton Workmens Club recognises that it needs to address the disparity in network access provision between users on 10Mbs contention networks and users on switched networks. Poynton Workmens Club s policy will be that users are connected to Building LANs through dedicated switch ports operating at the most appropriate speed i.e., 10/100/1000Mbs.This Policy will enhance network security by reducing the opportunity for unapproved network monitoring/sniffing. The timescales for implementing this policy will depend on funding allocations and priorities. The core user access technology for local area networks will be centrally managed Ethernet switch ports providing dedicated connections for the following: Standard staff desktops Open access clusters Department supported staff workstations Standard staff desktops and open access clusters provide centrally managed customised environments tailored for specific user requirements. The key features of both environments are: User authentication is required before access to Information Technology resources is permitted Mobility Users do not need to be tied to a specific workstation at a specific location Desktop lock down Desk top environments are customised for specific requirements that can only be changed by authorised users and support staff Security Desk top environments provide security via anti-virus software, operating system and application patch management, authentication, desk top lock down and central support Data integrity File systems and data integrity is maintained by implementing network file storage for all common directories, user specific file store and applications System recovery System rebuilds are supported centrally using standard images Departments who provide local IT support for their staff workstations are encouraged to adopt similar safeguards. As a minimum local IT support staff and users must implement the following measures: Proactive systems security measures i.e., Enforce user authentication before access to Information Technology resources is permitted Workstations must be kept up to date with respect to operating system and applications patch levels Workstations must be protected by an up to date version of Poynton Workmens Club s recommended anti virus software operating with the latest virus definition files Data integrity File systems and data integrity must be maintained by implementing network file storage or local system backup and restore procedures Flexible access facilities
4 Poynton Workmens Club s Policy is to ensure that flexible and secure network access facilities are provided in order that authorised users can use their own systems to access their work related Information Technology resources from locations on or while working away from premises. On Flexible Access facilities The technology used to implement this provision will be a mixture of wireless and wired network connection points. The services available over the on flexible access network will be advertised via the IT Service web pages and will be similar to those provided for remote access users. User support will be largely self-service via Web based configuration instructions and FAQs. Whilst on, Flexible access users will be responsible for the following: Providing a suitable workstation with a functioning network interface card (NIC), NB, this may be an approved wireless or Ethernet NIC Registering their workstation for use with the flexible access facility Installing and properly configuring all network and client software in accordance with online instructions Ensuring all copyrighted software is properly licensed Complying with all relevant Information Technology Policies Ensuring laptop batteries have sufficient capacity before attempting critical work Systems security users should understand the risks involved in connecting their personal system to the Internet via different service providers (ISPs) either from home, the other institutions or commercial facilities (hotels etc). users must keep their systems up to date with respect to operating system and applications patch levels users must install, operate and maintain an up to date version of Poynton Workmens Club s recommended anti virus software users are strongly recommended to install, operate and maintain an up to date version of one of Poynton Workmens Club s recommended personal firewall shims Visitors must give assurances that their systems have been maintained to the most up to date operating system and application patch levels and are free from virus or other infections Physical security of their systems and accessories Users must not disclose their authentication credentials to anyone Users must not allow any other person to use their system to access IT resources Users must safeguard all sensitive or restricted data downloaded to their system Remote Flexible Access Facilities Poynton Workmens Club s Policy is that centrally supported VPN services will provide the main secure, authenticated remote flexible access facilities, augmented by application specific services including Terminal Servers and Web based portal services. The IT Service has introduced a more flexible solution based on Virtual Private Network (VPN) technology. The current VPN facility consists of a number of VPN concentrators and client software, which can be used to establish secure authenticated VPN tunnels over almost any IP network. The benefits for end users are as follows: Performance Users will be able to choose between a range of connect options including: V.90 analogue modems ISDN digital broadband services
5 Cable modem services currently provided by Virgin Media and Telewest; if located in providers franchise area ADSL broadband services from BT and participating ISPs; if connected to an ADSL enabled BT exchange Cost Local call rate options, surf packages and broadband packages would be available Support Improved support through concentrated local effort and ISP help lines The VPN facility is documented on the IT Service web site and provides native access to all network resources. This is achieved over a secure (IPSEC) tunnel between the client workstation and the VPN concentrator. Once connected and authenticated the concentrator allocates an IP address for the client from Poynton Workmens Club s IP address space. The client accesses resources using IP datagrams, with this assigned IP source address, encapsulated over the IPSEC tunnel. The VPN concentrator is responsible for unpacking/decryption and packing/encryption of data to and from the LAN and the relevant IPSEC client tunnel. The client workstation therefore looks like any other local workstation to hosts and servers on the network. Future versions of the VPN concentrator software will include WebVPN services, which will obviate the need for a thick VPN client whilst supporting a similar set of Network applications. Any persons wishing to access network resources off-site must submit an application to the Committee and/or its authorised persons Other service or application specific remote access services are provided as follows: SSL Secure web access is supported via secure socket layer protocols SSH Secure access to certain systems is supported over the secure shell protocol Secure is supported via PGP encryptions, secure pop/imap and secure web-mail Terminal services providing authenticated and secure access to virtual desktop environments It is important to note that although the VPN service provides a secure authenticated tunnel between a remote system and Poynton Workmens Club s network, this tunnel will only be as secure as the remote system itself. If for example a remote system has been compromised via another network then establishing a secure tunnel from it to Poynton Workmens Club s network will present a real security threat; this scenario would apply to all modes of remote flexible access. Users of Poynton Workmens Club s remote flexible access facilities must therefore safeguard their systems by adhering to the following Users must comply with all relevant Information Technology policies Remote access sessions, other than for the purpose of accessing public information, must be authenticated If a user requires access to restricted information then their remote access session must be authenticated and conducted using strong data encryption Users must not disclose their authentication credentials to anyone, not even family members Users must not allow their system to be used for access to any IT resources by any other person, not even family members Users must not enable access from other connected networks to Poynton Workmens Club s network over a remote access session Systems security Users should understand the risks involved in connecting their personal system to the Internet via different service providers (ISPs) either from home, other institutions or commercial facilities (hotels etc). Users must keep their systems up to date with respect to operating system and applications patch levels Users must install, operate and maintain an up to date version of Poynton Workmens Club s recommended anti virus software Users connecting via always on networks e.g., broadband networks, must have a approved personal firewall shim installed and kept up to date with recommended security policies.
6 Users must safeguard all sensitive or restricted data downloaded to their system Users must agree that if requested by Poynton Workmens Club s Computer Incident Response Team they will supply their remote access system for inspection Support Poynton Workmens Club s Policy is that the IT Service department provides central support for the following services: backbone cabling infrastructure and building PDS systems backbone routing service and all building LAN routing and switching services, unless by special arrangement All core support services including: DNS services WWW services WWW caches hubs and relays Remote access services IT Security services File store services Print services Directory services Authentication authorisation and accounting services Video conferencing and other collaboration services The key benefits associated with this approach may be summarised as follows Fully managed services Consistency of provision Clear lines of responsibility Economies of scale Accountability and compliance monitoring Single points of contact with users and other service providers Under certain circumstances decentralised support arrangements may be required; in such environments Policies and procedures will be established to guide departments and support staff to ensure that Poynton Workmens Club s overall security and access requirements are satisfied. Poynton Workmens Club s Policy is to introduce new network services and applications, where these would lead to improvements in the IT facilities offered to staff, members and guests. However introducing new network services and applications will depend on appropriate levels of funding, including all support overheads.
Data Network Security Policy
Authors: Mike Smith Rod Makosch Network Manager Data Security Officer IM&T IM&T Version No : 1 Approval Date: March 2005 Approved by : John Aird Director of IM&T Review Date : 1 April 2006 Trust Ref: C7/2005
More informationNetwork Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
More informationCompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
More informationNetwork Service, Systems and Data Communications Monitoring Policy
Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring
More informationLocal Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More informationStudent Halls Network. Connection Guide
Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to
More informationPowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
More informationIP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationTechnical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
More informationFBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts
Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their
More informationOCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL
More informationGPRS / 3G Services: VPN solutions supported
GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive
More informationHughesNet Broadband VPN End-to-End Security Using the Cisco 87x
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet
More informationZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:
DSL Access Guide DSL Access Routers ZyXEL is a leading manufacturer and supplier of DSL and Voice over IP routers. ZyXEL offer a complete portfolio of routers suited for Telecoms providers, Internet Service
More informationSTRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
More informationCOMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
More informationState of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
More informationNetwork Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationThis course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking
Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses
More informationGPRS and 3G Services: Connectivity Options
GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview
More informationTechnical Glossary from Frontier
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
More informationEnterprise Broadband Customer Service Description
BT 2012 Issue 2_8 Table of Contents INTRODUCTION... 3 SERVICE OVERVIEW... 4 BENEFITS OF CHOOSING ENTERPRISE BROADBAND... 5 SERVICE DETAILS... 5 THE WORKPLACE... 5 COVERAGE... 5 ENTERPRISE BROADBAND...
More informationChapter 4 Connecting to the Internet through an ISP
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
More informationMeeting the challenge of voice services
Meeting the challenge of voice services Executive Summary Making the most of convergence to bridge the gap between IT networks and traditional telephony. This white paper is aimed at IT support companies
More informationNovember 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
More informationWAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
More informationRAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009
Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their
More informationLayer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationChapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
More informationGigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
More informationMillbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0
Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction
More informationNetwork Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
More informationBest Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
More informationInformation Crib Sheet Internet Access Service Agreement
Information Crib Sheet Internet Access Service Agreement 1. Definitions and Interpretation This Service Agreement is to be read in conjunction with the Conditions for Communications Services (the Conditions
More informationAssociate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
More informationL-Series LAN Provisioning Best Practices for Local Area Network Deployment. Introduction. L-Series Network Provisioning
L-Series LAN Provisioning Best Practices for Local Area Network Deployment Introduction Scope NComputing s L-series access devices connect to a host computer through an Ethernet interface and IP protocol.
More informationOSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES
Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationHow To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
More informationehealth Ontario EMR Connectivity Guidelines
ehealth Ontario EMR Connectivity Guidelines Version 1.3 Revised March 3, 2010 Introduction Ontario s new ehealth strategy includes the use of commercially-available high-speed Internet to meet Electronic
More informationChapter 1 Reading Organizer
Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small
More informationSecurity. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
More informationAPPENDIX 3 LOT 3: WIRELESS NETWORK
APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop
More informationNetwork System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
More informationBuilding A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationPublic Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.
Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote
More information11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationLocal Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547
Unit title: Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547 UNIT AIM AND PURPOSE Learners will gain an understanding
More informationEnabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
More informationNetworking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
More informationTAXONOMY OF TELECOM TERMS
TAXONOMY OF TELECOM TERMS Prepared by TUFF Ltd This short taxonomy is designed to describe the various terms used in today s telecommunications industry. It is not intended to be all embracing but to describe
More informationMSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
More informationipass FAQs Q: What is ipass? Q: Who should use ipass? Q: How do I get ipassconnect? When can I start using it?
ipass FAQs Q: What is ipass? A: The ipass service provides local dialup and wireless internet access in most cities and towns within the USA and many locations throughout the world. Many of these locations
More informationChapter 2 TCP/IP Networking Basics
Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationIntroduction. Technology background
White paper: Redundant IP-VPN networks Introduction IP VPN solutions based on the IPsec protocol are already available since a number of years. The main driver for these kinds of solutions is of course
More informationChapter 1 Instructor Version
Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic
More informationThe evolution of data connectivity
Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity
More information10 Gigabit Ethernet: Scaling across LAN, MAN, WAN
Arasan Chip Systems Inc. White Paper 10 Gigabit Ethernet: Scaling across LAN, MAN, WAN By Dennis McCarty March 2011 Overview Ethernet is one of the few protocols that has increased its bandwidth, while
More informationCCNA Discovery Chapter Four
CCNA Discovery Chapter Four By Chief Eng. Amna Ahmed Institute of Telecommunication amna_ahmed28@yahoo.com Modified by Vincenzo Bruno Hacklab Cosenza Chapter 4 Explain what the internet is Every day millions
More informationEndpoint Security VPN for Mac
Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
More informationWAN Failover Scenarios Using Digi Wireless WAN Routers
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
More informationMicrosoft Windows Server System White Paper
Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta
More informationSSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
More informationE2BN Direct - Network Services for Schools and Academies
E2BN Direct - Network Services for Schools and Academies E2BN Direct provides internet, web filtering and other services directly to Schools and Academies. We use proven products backed by dedicated support,
More informationService Descriptions
Mainframe Application Hosting/Central Processing Unit (CPU) Rate: $1,044.00 per hour (Based on normalization to an IBM 2064-116 model rated at 8,117.7067 SUs per second) The DTS provides software application
More informationComputer Networks. Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction. Learning outcomes
Unit 9: Computer Networks Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose R/601/7320 BTEC National The aim of this unit is to ensure learners understand the key components
More informationCisco Network Performance Evaluation Using Packet Tracer
Cisco Network Performance Evaluation Using Packet Tracer doi: 10.17932/ IAU.IJEMME.m.21460604.2015.5/1.905-911 Muhammet Emin KAMİLOĞLU 1 Abstract In this study, a wide area network designed and simulated.
More informationNetwork Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
More informationAPPENDIX 8 TO SCHEDULE 3.3
APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE
More informationWireless Networking Policy September 2009 Newman University College IT Services. Wireless Networking Policy
This policy document relates specifically to wireless networking at Newman University and should be read in conjunction with the General Conditions of Use of Computing and Network Facilities. The Wireless
More informationChapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
More informationIT Security Standard: Network Device Configuration and Management
IT Security Standard: Network Device Configuration and Management Introduction This standard defines the steps needed to implement Bellevue College policy # 5250: Information Technology (IT) Security regarding
More informationVIA COLLAGE Deployment Guide
VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
More informationREMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationSolutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.
Solutions Guide Secure Remote Access Allied Telesis provides comprehensive solutions for secure remote access. Introduction The world is generating electronic data at an astonishing rate, and that data
More informationAdit 3000 Series Part Guide
Adit 3000 Series Part Guide The Adit 3000 product line consists of high-bandwidth multi-service routers and IP business gateways for small and medium enterprises and remote locations. The Adit 3104 is
More informationE2BN Direct - Network Services for Schools and Academies
E2BN Direct - Network Services for Schools and Academies E2BN Direct provides internet, web filtering and other services directly to Schools and Academies. We use proven products backed by dedicated support,
More informationMCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
More informationMultifunctional Broadband Router User Guide. Copyright Statement
Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. Other trademark or trade name mentioned herein are the trademark or registered trademark of above company. Copyright
More informationEdgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service May 2012 Table of Contents EdgeMarc 250w Router Overview.... 3 EdgeMarc 4550-15 Router Overview... 4 Basic Setup of the 250w, 200AE1 and 4550... 5
More informationMOC 6435A Designing a Windows Server 2008 Network Infrastructure
MOC 6435A Designing a Windows Server 2008 Network Infrastructure Course Number: 6435A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft exam: Exam 70647:
More informationNATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES
NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NWORK SERVICES A Major CCTV network and surveilance services provider chose Senetas certified high-speed encryptors to protect European law enforcement CCTV network
More information1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
More informationApplication Note Secure Enterprise Guest Access August 2004
Application Note Secure Enterprise Guest Access August 2004 Introduction More and more enterprises recognize the need to provide easy, hassle-free high speed internet access to people visiting their offices,
More informationClearOS Network, Gateway, Server Quick Start Guide
ClearOS Network, Gateway, Server Quick Start Guide Welcome ClearOS is computer Operating System (OS) that provides enterprise-level network security and application services to the Small/Medium-sized Business
More informationChapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
More informationIT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,
More informationGigabit Content Security Router
Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security
More informationNetwork Technology (10101)
Network Technology (10101) Rationale Statement: The goal of this course is to help students recognize the significant impact of computer networking in their lives. Virtually any career involves the use
More informationComputer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
More information