Contents
1. Annotated Screenshot.............................................................................................................................2
2. How the network has met all the requirements?....................................................................................3
3. All of the key components I have used....................................................................................................4
Separate Rooms.......................................................................................................................................4
Computers...............................................................................................................................................4
Phones.....................................................................................................................................................5
Switches...................................................................................................................................................5
Servers and Firewalls...............................................................................................................................5
Router......................................................................................................................................................5
Wireless Access Point..............................................................................................................................5
4. The functions of each of the three interconnection devices....................................................................6
Router......................................................................................................................................................6
Switch......................................................................................................................................................6
Wireless Access Point..............................................................................................................................6
5. How I have ensured the network is secure..............................................................................................7
Firewalls...................................................................................................................................................7
Locked Rooms..........................................................................................................................................7
Antivirus...................................................................................................................................................7
6. Business risks of insecure networks and how they can be minimized.....................................................8
Loss of service..........................................................................................................................................8
Data Confidentiality.................................................................................................................................8
Loss of Business or Income......................................................................................................................8
Legal and Financial Issues........................................................................................................................9
Malware Attacks......................................................................................................................................9
How to prevent these issues?..................................................................................................................9
Justification of design and choice of components.....................................................................................10
YONKOV, BOYAN 1
, 1. Annotated Screenshot
This is the administrator office in
This is the administrator Office 1-2. It has two computers This is Office 1-3. Where the
manager’s office in the Office 1- and two phones for the two service manager is and it has
1. It is on the first floor and has administrators. They all connect computer and a phone. That
a phone and a Pc connected to to the switch which is in the connect to the switch on the
the switch on the first floor same room. first floor.
This is the server
room where the
firewalls, antivirus
server and data
server are held.
This is the Main
Here is the
Reception Area. It
Conference Room
consists of two
and it has a printer,
computers and two
access point and a
phones that are
wireless device to
connected to the
demonstrate the
ground floor switch
connection
This is Office 0-1 the hotel manager
This is Office 0-2. This is where
office. It consists of a computer and a
the catering manager is and he
phone that connect to the ground
has a computer and a phone.
floor switch.
The switch and the router are
also placed in this room because
it is centralized. The room also
has a printer.
YONKOV, BOYAN 2