Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Digital Edge Manufacturing Networking Technology Plan Modern companies realize that, no matter what they manufacture or what activities they perform, well-running networking technology, a digital

Digital Edge Manufacturing Networking Technology Plan

Modern companies realize that, no matter what they manufacture or what activities they perform, well-running networking technology, a digital nervous system, is a necessity. They know the importance of networking to monitor work progress and ensure the data needed to tailor their products to the customer reach the right resource at the right time.

For this project, you will be developing a unified networking framework for an advanced manufacturing company. Though the company is fictional, the class project is meant to demonstrate how important an understanding of networking technologies can be when preparing a company to compete in our modern, interconnected marketplace.

Digital Edge Manufacturing Profile

To make the project more realistic, you are asked to act as a consultant to a technology company and submit a networking proposal that will cover the networking at their manufacturing centers.

The company, Digital Edge Manufacturing (DEM), is a leader in the use of 3D-printing to create products for a variety of industries. DEM currently has one production site outside of Chicago, Illinois. The demand for their work is exceeding current capacity and the Board of Directors has given the go-ahead to develop two more plant sites, with one on the East Coast and one on the West Coast of the United States.

The project requires a complete revamp of their current WAN and LAN networking structure.

Security Review

For the Part 1 overview, the discussion on security measures is a more general review of current security technologies and policies.

Your general discussion should include some aspect of these topics:

Antivirus protection you need to consider things like central server updates and end point protection

Automated patch management not only end-user but servers and security devices such as firewalls and intrusion detection devices need to be keep up-to-date

Wireless network security ease of use may be important but the risks will outweigh the advantages. Include a discussion of how access control and network-monitoring tools must be used to make sure that the network is not being exploited. This includes a review of the various networking protocols that can provide inherent encryption and password-protection point.

Hardware review Include a review of security hardware that could be implemented including:

Firewalls

Proxy servers

Virtual Private Networks

Intrusion Detection Sensors and System

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Learn To Program Databases With Visual Basic 6

Authors: John Smiley

1st Edition

1902745035, 978-1902745039

More Books

Students also viewed these Databases questions

Question

Writing a Strong Introduction

Answered: 1 week ago

Question

Write the difference between sexual and asexual reproduction.

Answered: 1 week ago

Question

What your favourite topic in mathematics?

Answered: 1 week ago

Question

Briefly describe vegetative reproduction in plants.

Answered: 1 week ago

Question

2. How will you handle the situation?

Answered: 1 week ago