Net Work Proposal

Submitted by: Submitted by

Views: 39

Words: 356

Pages: 2

Category: English Composition

Date Submitted: 12/08/2014 10:32 AM

Report This Essay

Jordan Cordova

CEG4400

Proposal

The proposed layout of Techpology Inc. network has a few main goals in mind. First, and foremost we seek to make the network as secure as possible. We know that as a business securing the data of customers, employees, and internal operations, are essential to running a successful business. Second, we seek to streamline the physical topology of the network by grouping various divisions of the network together by function, which allows us to localize team members, as well as physical resources. Lastly, we seek to help streamline the network management process by using a hierarchical network topology that allows for fine grained control over what data each employee has access to so that access can be tailored the needs of the company.

We will provide enhanced security by doing the following. First and foremost, in the attached network layout you will see that grouping employees such as we propose will segregate traffic allowing the network administrators to easily observe where traffic is coming from and stop potential security risks in their tracks. By simplifying the logical topology of the network we can improve security and productivity in your business.

By streamlining the physical topology we seek to further improve productivity by enabling workers with similar functions to be both close to one another, and their first line supervisors. This structure will thus minimize the time needed for employees to get to assigned meetings, while also encouraging a more tight knit and highly cooperative work environment.

Lastly, and most importantly, we want your network to be as efficient and easy to manage as possible so that you can deliver to your clients the best possible experience. By structuring data access permissions by an employees role we can guarantee that every employee has access to all the data that they need in order to perform their function, while at the same time protecting sensitive information.

We thank you for...