4. Implementation of a strict regime of user identification and authentication. Use of a creditable password policy will go a long way in securing the company's network from intrusion.
4. CONCLUSION.
The following recommendations are appropriate both for efficient utilization of the network and any future enhancements:
1. The performance monitoring scheme mentioned in the project aims should be rigorously pursued. Only then can timely maintenance and/or enhancements can be implemented for a long-lasting efficient use.
2. A wireless connection for the Instructors working in the field might be necessary in future to improve their productivity. Issues of WLAN security and bandwidth should be carefully considered before any such implementation.
3. The business capacity of the network (especially the servers) can be easily increased. We have designed it to be very scalable. Just add another server and network.
…