Router Networking, CISCO IT & Computer Science Term Paper (Term Paper Sample)
This is an essay in response to Evil Corp. Unlimited's request for proposal. The organisation has recently experienced an improvement in its worker turnaround. However, its networking seem to be experiencing problems. Thus the institution has requested for proposals to optimize its connection, paying more attention to
source..
Response to Evil Corp. Unlimited’s Request for Proposal
Name
Institutional Affiliation
Abstract
Evil Corp. Unlimited’s (ECU) management has realized some shortcomings in their current network environment despite experiencing exponential growth over the recent past. Apart from the ineffectiveness of the system, some of its engineers are portraying unprofessionalism, considering actions such as one of the institution’s staff practicing for an exam in the production network environment and perhaps tampering with the network. This document is a response to the institution’s Request for Proposal and it contains proposals and solutions for how the institution will accomplish routing in their enterprise network environment using the available two Internet Service Providers and ten routers. If the recommendations and suggestions are adhered to, our company guarantees that ECU will enjoy an optimal network operation and convergence.
Table of Contents TOC \o "1-3" \h \z \u HYPERLINK \l "_Toc21694897" Abstract PAGEREF _Toc21694897 \h 2Introduction PAGEREF _Toc21694898 \h 4Implementing Routing Security in ECU’s Network System PAGEREF _Toc21694899 \h 4Preparation PAGEREF _Toc21694900 \h 4Prevention PAGEREF _Toc21694901 \h 6Response PAGEREF _Toc21694902 \h 7Implementation of eBGP connections to the two Internet Service Providers along with all policy required for redundancy PAGEREF _Toc21694903 \h 9Implementing an inclusive iBPG PAGEREF _Toc21694904 \h 10Implementation of a solution to make its network a non-transit network for ISP PAGEREF _Toc21694905 \h 11Recommendations and Future Improvement PAGEREF _Toc21694906 \h 11Reference PAGEREF _Toc21694907 \h 12
Introduction
Without an effective infrastructure and no security policy and implementation in place, network availability within an organization can be interrupted. This proposal begins by assessing the risks to Evil Corp. Unlimited’s network and formulates remedies. Continuation of the proposal suggests the adaption of a security change management strategy and monitoring the network for security violations.
Implementing Routing Security in ECU’s Network System
There are three steps involved to implement network security. These steps are preparation, prevention, and response.
Preparation
Preparation is done through formulation policy statements, analyzing the risks that the system is can be exposed to and establishing an efficient security personnel structure.
Other Topics:
- Cyber Crime IT & Computer Science Term Paper PaperDescription: Cybercrime is a common type of crime in the world today. Cybercrimes are committed through the use of technological infrastructures such as computers and the internet. Given the dynamic and versatile nature of technology with regards to information and communication systems...6 pages/≈1650 words| 4 Sources | APA | IT & Computer Science | Term Paper |
- Operators in SQL IT & Computer Science Term Paper EssayDescription: In everyday programming, the use of SQL server for all web based applications is highly inevitable. For developers interested in performing several functions across the SQL server, the correct query should have the right syntax for it to carry out the intended purpose. Some of the infamous...2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Term Paper |
- Computer Security IT & Computer Science Term PaperDescription: Computer security is one of the major concerns that has been raised by corporate bodies and institutions in recent years. Some people may argue that security of an organizations' network systems is the sole responsibility of the IT team, but in the real sense, it is a shared...14 pages/≈3850 words| 5 Sources | APA | IT & Computer Science | Term Paper |