Description of the Proposed Technology Solution
The technology solution to be implemented by Catacombs will be key in the improvement of service delivery and the reduction of cost for the company. The technology solution is composed of two data centers and several links for redundancy purposes. It will also have two perimeter networks that will connect to corporate WAN and internet simultaneously for redundancy. The internet connects to EDI system and web application system through VPN. The corporate IP WAN network will connect directly to IP phones, Wi-Fi devices and Video conferencing facilities. The solution will also have two WAN aggregation routers connected to the five locations concurrently and to other location and it ensures uptime of all the locations. The monitoring system assists in the cost monitoring and tracking of orders by the company.
The business requirements that will lead to the proposed technology are as below:
The need for increased bandwidth
The need for increased storage capacity
The need for system reliability
The need for cost reduction and monitoring
The need for scalability with existing devices
The need for security
The security of the network will play a great role in the maintenance of trust and reliability of the services. The first security requirement is the protection of the data integrity of the company. This has been implemented by firewall placement between the data centers of the system. Then there is need for customer and worker authentication. The Wi-Fi provided in the corporate network will have WPA-2 encryption and will need user authentication. There will be a password policy implemented that will require only a strong password to be set by both the client and the workers and will prompt occasional change on the same. The communication to external clients will be through VPN that will ensure more security. All devices brought to work or used at work will also have address filtering to allow only the permitted devices to access the network
Architectural Diagram
References
Alabady, S. (2009). Design and Implementation of a Network Security Model for Cooperative Network. International Arab Journal of e-Technology, 1(2), 26-36.
Avolio, F. M., & Fallin, S. (2007). Producing Your Network Security Policy. Seattle: WatchGuard Technologies Inc.