Abstract
This design is based on open standards, which approve the processing of information, resources used to process information and the data conveyed. This includes using fibre optic and satellite technology. The design focuses on LAN for office setting. Network employed are TCP and open short path first protocol kind of network. On security enhancement, the use of firewall and switch for all information is more emphasized. The Riordan Manufacturing corporate is a network that is mixed and comprises of VoIP and as well as data. It sits on two negotiating back bones that stand on 100 T Ethernet base. In total, there are two main routers on this kind of LAN.

You're lucky! Use promo "samples20"
and get a custom paper on
"Riordan Network Proposal"
with 20% discount!
Order Now

Introduction
The Riordan Manufacturing corporate is a network that is mixed and comprises of VoIP and as well as data. It sits on two negotiating back bones that stand on 100 T Ethernet base. In total, there are two main routers on this kind of LAN. One leads through a firewall on the ISP while the second router leads to a Sat uplink that connects the LAN to another LAN situated in a site remote in chain. In between the back bones there is a switch. Other switch is put to check on traffic likely to occur at the Sat Link. In between the backbone and Sat Link there is a HUB that control main reservoir connection to this network. Moreover, there are two 2 24 switches that connect other four groups of computers put in this office set up. This design is based on open standards, which approve the processing of information, resources used to process information and the data conveyed. This includes using fibre optic and satellite technology.

By following firewall connection going through ISP there at other two LANs. Among the two is the Ga office with one router connecting to the firewall. The same router connects to a 48 port switch which connects all the assets to the LAN at this point. Moreover, the manufacturing floor that connects smaller 24 port switch which routs to blade server is found in this office. On security enhancement, the use of firewall and switch for all information is more emphasized. Through the firewall, we can rout to another LAN present in the Pontiac Mi bringing about an office set up similar to the of Ga office. All the computers, network bank and server are connected by the router from the firewall leading to the 48 port switch. A 24 port switch allows the server to run separately and connect to the manufacturing floor. Offices here use Cat5 Ethernet lines and a separate connection of fibre between network bank to blade servers. The NAS in this case is used to storage and as network backup system for the HQ. The design focuses on LAN for office setting. Network employed are TCP and open short path first protocol kind of network.

Headquarters and head out across Sat Link to remote site
A LAN set up like Headquarters’ network. In case of ISP going down, the Sat uplink acts as a backup system. This is because, two routers lead in coming from both sides. This has two switches and two Ethernet backbones. Among them, one connects the smaller office to the main in the Sat Link bringing a reinforcement to the backup route. Additionally, there is a HUB that deals with connections between servers’ two switches, a printer and a gateway. Thus mixing the network with VoIP and data.

Hardware and software needed to secure LAN against all electronic threats.
Firewalls and network address
Hardware and software firewall work best as they block as well as discard unexpected traffic in the network. Computers protected by firewall software and hardware are assigned an IP address which are not easily routed over internet.

Use of Patches to servers
Patching computers on time prevents it from being infected by dreaded worms such as the code red as well as its variants.

Use of dial-up connections
This brings into existence a speed up connection and reduces the risk of dial-us that are uncontrolled.

Use of Zone Alarm Programs
This program identifies suspicious traffic they reduce infection or alteration of computers through their alarms.

Comparison between Local Area Networks (LANs), Wide Area Networks (WANs), and wireless technologies.
LAN, WAN and wireless technologies are easy to install since they only demand for neat cables during their installation process.
They cannot hear all other wireless nodes using the same network.
Wireless networks check upon the visibility of another network. Their performance can be affected by other similar wireless networks.
Their connectivity is beyond reach of physical networking by use of cables and finally they all work on radio waves as well as microwaves.

Concepts and building blocks of today’s data communication networks, such as switches, routers, and cabling.
In present day, the world seen to be integrated from the earliest form of exchanging information that was characterised as slow and time consuming to becoming fast, safe and reliable. This is due to the incorporation of sophisticated mediums in use. Such mediums include; TCP and ISO kinds of network just to name but a few. Security inauthenticity of data communication mediums has been intensified by use of both hardware and software. Other communication components have been included such as cables and optic gadgets used in relaying data as well as the firewalls and routers which are basically used to check on data trafficking.

Data cabling has been implemented to deliver electronic signals coming from one network to another finally to network interference cards. Data security is enhanced by use of routers and firewalls. Switches check on the attack from within an organization. Due to different sizes of networks and their sensitivity, security components tend to vary in configuration.

To meet efficiency in service delivery, KFF has been developed. KFF enhances information security and protects the user against unwanted infections and interference. It ensures a safe and open information distribution in an organization.

In conclusion, Network standards have been established which take care of both technical information and traditional form of communication such as voice and video. This design is based on open standards which approve the processing of information, resources used to process information and the data conveyed. This includes using fibre optic and satellite technology. Network employed are TCP and open short path first protocol kind of network. On security enhancement, the use of firewall and switch for all information is more emphasized.