SlideShare a Scribd company logo
Requirements for an
internet connectivity
solution
Intro.
• Virtually every organization that runs a data network
wants to provide its users with some type of access to
the Internet. E-mail and Web sites have become
essential business tools in recent years, and supplying
these tools has become a standard requirement of IT
professionals. The questions of how you will provide the
network with Internet access, how much Internet access
you will provide, and how you will secure your private
network against unauthorized access from the Internet
are essential parts of a network designer's infrastructure
plan.
Scalability and fault tolerance
requirements
•

The term fault tolerant is generally used to describe technology that
offers a higher level of resilience and instantaneous recovery. This is
accomplished by using hardware redundancy in addition to
specialized software.

1. accommodates the number fo people who will immediately use the
system.
2. accommodates the number of people who might be using it in 1,5 or
10 years.
3. Does not fail as a result of any single component failing .
4.provides recovery from multiple failures.
Note : server arrays and load balancing are two ways to provide fault
tolerance.
Filtering requirements
•

Filtering enables you to control the flow of data you need to decide
the type of filtering that you require for additional network security .
There are several types of filtering that you should consider:

1. Packet filtering :- when this type of filtering is enabled , all packets
on the external interface are dropped except for those packets that
you explicitly allow. Packet filtering can be either Static or Dynamic
with dynamic packet filtering ports open only as required for
communications and close when communication is complete.
2. Circuit - level filtering :- circuit- level enables support for virtually all
standard and custom internet applications designed for use with the
with the windows O.S . This accomplished by using inspecting
session rather then connections or packets.
4. Application – level filtering : this type of
filtering provides application-specific
processing , including inspecting ,screening
or blocking ,redirecting ,or even modifying
the data as it passes through the firewall.
5. Protocol filtering :- this type of filtering
prevents specified protocol traffic from being
forwarded out of switch ports.
How Much Bandwidth?
• One basic question a network designer must ask when
devising an Internet access strategy is how much
bandwidth the users will need to perform their jobs. The
answer dictates what type of WAN connection the
network will need, what kind of ISP account is required,
and how high the monthly fees will be. To answer this
question, you must estimate how many users will require
Internet access at one time, what applications they will
use, what activities they will perform, and when.
Bandwidth control
requirements
• You need to determine the relative
amounts of bandwidth to allocate to
different types of network traffic. To do
this, you set bandwidth priorities in
bandwidth rules that determine the
connection that takes priority over the
others.
How Many Users?
• Calculating the number of users is not as easy as it
might first appear. Of course, you can find out how many
employees there are in the organization and how many
of them use computers connected to the network.
However, you must also determine how many users are
working at any one time and how much of that time they
spend accessing the Internet.
• You might find out that a maximum of 250 users work on
the network at one time, but then you have to determine
how much time they spend actually accessing the
Internet
User access requirements
• Your enterprise security needs might
require sophisticated access control.
You can control user access based
on user name ,group ,ip address,
destination, schedule,or content
type .
Authentication requirements
• You will need to consider whether your solution supports
strong user authentication. The solution should be able to:
1. authenticate users before they use any resources.
2. support authentication methods.
3. configure different authentication methods for incoming
and outgoing requests.
Extensibility and flexibility requirements
•

An important consideration for any solutions is its ability to provide you with
customization tools and functionality . This is typically achieved through use
of a software development kit (SDK) that is available for in-house
development. You also want to determine if the solution provides a large
selection of third party add on solutions and an extensible administration
option. You might want to consider some of the following extensibility
administration option . You might want to consider some of the following
extensibility features:

•
•
•
•
•
•

Virus scanning
Management tools
Content filtering
Site blocking
Real-time monitoring
Reporting
Thank you
HCL Noida
Name - Dinesh Kumar
Sap code - 4001201076
Presantation topic – Requirements for an
internet connectivity solution
Batch – HCNE-03
Trainer – Mr. Amit saxena

More Related Content

PPTX
Network access protection ppt
DOCX
System analyst
PPTX
Secure your LAN
PDF
Information Security Whitepaper
PPT
MS NAP - Security Day
PDF
Security and Compliance
PPTX
Ease out the GDPR adoption with ManageEngine
Network access protection ppt
System analyst
Secure your LAN
Information Security Whitepaper
MS NAP - Security Day
Security and Compliance
Ease out the GDPR adoption with ManageEngine

What's hot (20)

PPTX
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
PPTX
5 ways you can strengthen and secure your network infrastructure with Firewal...
PPT
LAN Security
PPTX
Cloud resilience, provisioning
PDF
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
PDF
Application-aware Network Performance Management with OpManager
PDF
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PPTX
IBM QRadar BB & Rules
PDF
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
PPTX
6421 b Module-07
PDF
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
PDF
Datasheet over privileged_users
PDF
Network Architecture Review Checklist
PPTX
Functions and features network management
PPTX
6 reasons to switch to fluidic ui - Network Configuration Manager
PDF
Multi-Factor Authentication
 
PDF
Security Policy Checklist
PDF
The Security Policy Management Maturity Model: How to Move Up the Curve
PPT
Network Access Protection
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
5 ways you can strengthen and secure your network infrastructure with Firewal...
LAN Security
Cloud resilience, provisioning
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Application-aware Network Performance Management with OpManager
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
IBM QRadar BB & Rules
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
6421 b Module-07
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Datasheet over privileged_users
Network Architecture Review Checklist
Functions and features network management
6 reasons to switch to fluidic ui - Network Configuration Manager
Multi-Factor Authentication
 
Security Policy Checklist
The Security Policy Management Maturity Model: How to Move Up the Curve
Network Access Protection
Ad

Similar to Requirements for an internet connectivity solution 1 (20)

PPT
PPT
Chapter 2 - Analyzing Technical Goals and Tradeoffs.ppt
PPT
Chapter02
PPTX
Confirm Client Requirements
PDF
Top Down Network Design - ebrahma.com
PPTX
Network design consideration
PDF
WAN Services Planning Checklist
DOCX
lo-1-planning-and-designing-internet-infrastructure.docx
PPS
Pmw2 k3ni 1-1b
PPTX
Chapter04
DOCX
Cilent to server network plan
PPT
Cp7101 design and management of computer networks-requirements analysis
DOCX
final doc
DOCX
Top-Down Network DesignAnalyzing Technical Goals.docx
DOCX
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
PPT
Example of One of my Desgins for Cyber &Networking Solutions for Customers ...
PDF
Unit 5 - Designing Internet Systems and Servers - IT
PPTX
INT_Ch17.pptx
PPTX
M03-Build-a-small-wireless-Local AN.pptx
PDF
Ccnp™ advanced cisco® router
Chapter 2 - Analyzing Technical Goals and Tradeoffs.ppt
Chapter02
Confirm Client Requirements
Top Down Network Design - ebrahma.com
Network design consideration
WAN Services Planning Checklist
lo-1-planning-and-designing-internet-infrastructure.docx
Pmw2 k3ni 1-1b
Chapter04
Cilent to server network plan
Cp7101 design and management of computer networks-requirements analysis
final doc
Top-Down Network DesignAnalyzing Technical Goals.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Example of One of my Desgins for Cyber &Networking Solutions for Customers ...
Unit 5 - Designing Internet Systems and Servers - IT
INT_Ch17.pptx
M03-Build-a-small-wireless-Local AN.pptx
Ccnp™ advanced cisco® router
Ad

Recently uploaded (20)

PPTX
Slideham presentation for the students a
PDF
Women’s Talk Session 1- Talking about women
PPTX
Unit 1- Introduction to Corporate Etiquettes
PDF
Beginner’s Guide to Digital Marketing.pdf
PPTX
Opioid_Analgesics_Presentation (1).pptxp
PPTX
UNIT 1 about all the important topics that you need
PPTX
employee on boarding for jobs for freshers try it
PPTX
ANN DL UNIT 1 ANIL 13.10.24.pptxcccccccccc
PPTX
Final Second DC Messeting PPT-Pradeep.M final.pptx
PPTX
D1basicstoloopscppforbeginnersgodoit.pptx
PPTX
STS CHAP 4 human development as reflected
PDF
iTop VPN Crack Latest Version 2025 Free Download With Keygen
PDF
202s5_Luciano André Deitos Koslowski.pdf
PPT
ppt-of-extraction-of-metals-12th-1.pptb9
PPTX
DPT-MAY24.pptx for review and ucploading
DOCX
PRACTICE-TEST-12 is specially designed for those
PPTX
mathsportfoliomanvi-211121071838 (1).pptx
PDF
CollegePresentation.pdf hsjsisjsjsjsssoo
PPTX
Unit 3 Presentation Etiquette Business and Corporate Etiquette
PDF
LSR CASEBOOK 2024-25.pdf. very nice casbook
Slideham presentation for the students a
Women’s Talk Session 1- Talking about women
Unit 1- Introduction to Corporate Etiquettes
Beginner’s Guide to Digital Marketing.pdf
Opioid_Analgesics_Presentation (1).pptxp
UNIT 1 about all the important topics that you need
employee on boarding for jobs for freshers try it
ANN DL UNIT 1 ANIL 13.10.24.pptxcccccccccc
Final Second DC Messeting PPT-Pradeep.M final.pptx
D1basicstoloopscppforbeginnersgodoit.pptx
STS CHAP 4 human development as reflected
iTop VPN Crack Latest Version 2025 Free Download With Keygen
202s5_Luciano André Deitos Koslowski.pdf
ppt-of-extraction-of-metals-12th-1.pptb9
DPT-MAY24.pptx for review and ucploading
PRACTICE-TEST-12 is specially designed for those
mathsportfoliomanvi-211121071838 (1).pptx
CollegePresentation.pdf hsjsisjsjsjsssoo
Unit 3 Presentation Etiquette Business and Corporate Etiquette
LSR CASEBOOK 2024-25.pdf. very nice casbook

Requirements for an internet connectivity solution 1

  • 1. Requirements for an internet connectivity solution
  • 2. Intro. • Virtually every organization that runs a data network wants to provide its users with some type of access to the Internet. E-mail and Web sites have become essential business tools in recent years, and supplying these tools has become a standard requirement of IT professionals. The questions of how you will provide the network with Internet access, how much Internet access you will provide, and how you will secure your private network against unauthorized access from the Internet are essential parts of a network designer's infrastructure plan.
  • 3. Scalability and fault tolerance requirements • The term fault tolerant is generally used to describe technology that offers a higher level of resilience and instantaneous recovery. This is accomplished by using hardware redundancy in addition to specialized software. 1. accommodates the number fo people who will immediately use the system. 2. accommodates the number of people who might be using it in 1,5 or 10 years. 3. Does not fail as a result of any single component failing . 4.provides recovery from multiple failures. Note : server arrays and load balancing are two ways to provide fault tolerance.
  • 4. Filtering requirements • Filtering enables you to control the flow of data you need to decide the type of filtering that you require for additional network security . There are several types of filtering that you should consider: 1. Packet filtering :- when this type of filtering is enabled , all packets on the external interface are dropped except for those packets that you explicitly allow. Packet filtering can be either Static or Dynamic with dynamic packet filtering ports open only as required for communications and close when communication is complete. 2. Circuit - level filtering :- circuit- level enables support for virtually all standard and custom internet applications designed for use with the with the windows O.S . This accomplished by using inspecting session rather then connections or packets.
  • 5. 4. Application – level filtering : this type of filtering provides application-specific processing , including inspecting ,screening or blocking ,redirecting ,or even modifying the data as it passes through the firewall. 5. Protocol filtering :- this type of filtering prevents specified protocol traffic from being forwarded out of switch ports.
  • 6. How Much Bandwidth? • One basic question a network designer must ask when devising an Internet access strategy is how much bandwidth the users will need to perform their jobs. The answer dictates what type of WAN connection the network will need, what kind of ISP account is required, and how high the monthly fees will be. To answer this question, you must estimate how many users will require Internet access at one time, what applications they will use, what activities they will perform, and when.
  • 7. Bandwidth control requirements • You need to determine the relative amounts of bandwidth to allocate to different types of network traffic. To do this, you set bandwidth priorities in bandwidth rules that determine the connection that takes priority over the others.
  • 8. How Many Users? • Calculating the number of users is not as easy as it might first appear. Of course, you can find out how many employees there are in the organization and how many of them use computers connected to the network. However, you must also determine how many users are working at any one time and how much of that time they spend accessing the Internet. • You might find out that a maximum of 250 users work on the network at one time, but then you have to determine how much time they spend actually accessing the Internet
  • 9. User access requirements • Your enterprise security needs might require sophisticated access control. You can control user access based on user name ,group ,ip address, destination, schedule,or content type .
  • 10. Authentication requirements • You will need to consider whether your solution supports strong user authentication. The solution should be able to: 1. authenticate users before they use any resources. 2. support authentication methods. 3. configure different authentication methods for incoming and outgoing requests.
  • 11. Extensibility and flexibility requirements • An important consideration for any solutions is its ability to provide you with customization tools and functionality . This is typically achieved through use of a software development kit (SDK) that is available for in-house development. You also want to determine if the solution provides a large selection of third party add on solutions and an extensible administration option. You might want to consider some of the following extensibility administration option . You might want to consider some of the following extensibility features: • • • • • • Virus scanning Management tools Content filtering Site blocking Real-time monitoring Reporting
  • 13. HCL Noida Name - Dinesh Kumar Sap code - 4001201076 Presantation topic – Requirements for an internet connectivity solution Batch – HCNE-03 Trainer – Mr. Amit saxena