The network designs for the local area network for the 500 employees in the headquarters would be to setup work stations in the headquarters. The wired technologies will use the 100GMbps Ethernet standard. This is the connection that will be enabled and designed in the headquarters and all the 300 branches of the company. This speed is sufficient because of network loss due to long connectivity. The medium that will be used for connecting the local area is coaxial cable. All the computers on the network will be connected together using the Ethernet technologies. One of the requirements of the connectivity it to have the network makes use of Ethernet technologies. There will be wireless technologies that will be used in the headquarters which will be used to connect the mobile devices. For this reason, there will be the use of Ethernet wireless router to provide the network for the wireless devices in the network. This will enable the connectivity of the wireless devices on the network. The security of the wireless network will be achieved with the use of WPA2so that the access of the wireless network will require that there is some authenticity (Selga, Zaballos, & Navarro, 2013).
The connectivity between the branches will be achieved with the use of virtual private network (VPN). This is a technology which will enable the connection and interconnectivity between the branches and because of the many braches that are found in the computer network. One of the requirements is to have safe connectivity which will enable the different international offices without compromising the security of the company. One of the needs is to have a VPN setup using the public network that will enable the branches to be connected using the public internet. There will be security mechanisms which will enable the network to be connected in a safe process. The connection will make use of the TCP/IP technology will give the link and is reliable than other technologies (Shukla, Gangele, Verma, & Thakur, 2011).
There will be different hardware that will be recommended for the networks. They are listed in the table:
Recommendations on security
There is a need to ensure that there is security on the network. One way in which security will be achieved is to have data encryption for intellectual property data. This data will have to be encrypted so that they are safe. This will enable their safety. Even if they are stolen, it will not be possible to get the content of the property. Another way is to have the security of the network. This will be achieved with the use of firewall technologies. This will ensure that the network will be achieved. The thieves will be safe and will not be a bother to the network users. It is important to understand the requirements of the network. There will be also the use of access control to the network users (Shao, 2011).
Selga, J. M., Zaballos, A., & Navarro, J. (2013). Solutions to the Computer Networking Challenges of the Distribution Smart Grid. IEEE Communications Letters, 17(3), 588-591.
Shukla, D., Gangele, S., Verma, K., & Thakur, S. (2011). A Study on Index Based Analysis of Users of Internet Traffic Sharing in Computer Networking.World Applied Programming (WAP), 1(04), 278-287.
Shao, Q. (2011, June). A Multimedia Approach to Teaching Computer Networking and Telecommunications. In World Conference on Educational Multimedia, Hypermedia and Telecommunications (Vol. 2011, No. 1, pp. 3513-3517).