Question
Offered Price $11.99

Assignment 2: Network Design

Question # 00451325
Subject: Computer Science
Due on: 12/31/2016
Posted On: 12/28/2016 07:55 PM

Rating:
4.1/5
Expert tutors with experiences and qualities
Posted By
Best Tutors for school students, college students
Questions:
769
Tutorials:
768
Feedback Score:

Purchase it
Report this Question as Inappropriate
Question

Assignment 2: Network Design

Imagine that you have been hired as a contractor by a local business that has recently purchased new office space for its growing business. Design a network for the local business based on the following information: The business has approximately fifty (50) employees, and the new office space will stretch across the third and fifth floors of a building. The fourth floor is currently occupied by another tenant.

Write a two to four (2-4) page paper in which you:

1. Suggest the equipment that you would utilize to design and implement a network, based on the scenario. Justify the need for your suggestions.

2. Recommend the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Suggest a solution that includes the cabling / connecting of the two (2) differing office space floors.

3. Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.

4. Detail the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

· Explain the complexities in an information technology environment by applying best practices and using appropriate technologies and methodologies.

· Describe protocols for inter process communication for communication across networks.

· Outline why the Information Assurance and Security perspective needs to pervade all aspects of information technology.

· Use technology and information resources to research issues in information technology.

· Write clearly and concisely about introductory information technology topics using proper writing mechanics and technical style conventions.

Tags design network aignment information design aignment busine page technology office resources space using scenario solution implement suggest course title security floors required included explain follow quality based network date coverpage imaginethat profeors hired

Tutorials for this Question
Available for
$11.99

Assignment 2: Network Design - Tutorial Guide

Tutorial # 00447124
Posted On: 12/28/2016 07:55 PM
Posted By:
Best Tutors for school students, college students schoolbench
Expert tutors with experiences and qualities
Questions:
769
Tutorials:
768
Feedback Score:
Report this Tutorial as Inappropriate
Tutorial Preview …Use…
Attachments
8761255.docx (131.7 KB)
Preview: Address xxxxxxxx 172 xx 118 4 xxxx and HIDS xxxxxxxxx Host xxxxx xxxxxxxxx Detection xxxxxxxxxx Catalyst Switch xx Network is xxxxxxxxx directly xxxx xxxx (Network xxxxxxxxx Detection system) xxx function is xx provide xxxxx xxxx of xxxxxxx against any xxxxxxxxxxxx intrusion Connecting xxxx at xxx xxxx of xxxxxxx point is xxxxxxxxx as it xxxxxxxx security xx xxxxx network xx analysing whole xxxxxxx passing through xxxxxxx Network xxxxxxxxx xxxxxxxxx system xxxxxxx malicious traffic xxxxxxx through the xxxxxxx and xx xxxxxx to xxxx corrective ensures xxxxx it can xxxx record xxx xxxxxxx attempts xx log files xxxxx log files xxx be xxxxxxxx xxxxx in xxxxx to analyse xxx security event xxxxxxxxxxx Host xxxxx xxxxxxxxx detection xxxxxx is also xxxxxxxxx with DMZ xxxxxxx and xxxxxxxxx xxxxxxx in xxxxx to provide xxxxxxxxx security Host xxxxx intrusion xxxxxxxxx xxxxxx can xxxxxxx any malicious xxxxxxx passing through xxxxxxxxxxxx and xxx xxxx corrective xxxxxxx in order xx protect data xxx 3005Catalyst xxxxxx xx also xxxxxxxxx to VPN xxxxxxxxx based) from xxxxx side xxx xxxx is xxxxxxxxx part of xxxxxxx as it xxxx functionality xx xxx network xx it provides xxx only secure xxx better xxxxxxxxxx xxxxxxxxxx facilities xx employees but xxxx help managing xxxxxxxx by xxxxxxx xx sec xxxxxxxxxxxx Whole network xxxxxxx in main xxxxxx of xxxxxxx xx connected xx internet through xxx that enables xxxxxxxxx establish xxxxxxxxx xxxxxxxxxx to xxxxx networks On xxx other side xxx is xxxx xxxxxxxxx with xxxxxx modem in xxxxx to provide xxxxxxx teleworkers xxxx xxx based xxxxx to point xxxxxxxxxxxx While Software xxxxx VPN xxxxxxxxx xx router.....
Purchase this Tutorial @ $11.99 *
* - Additional Paypal / Transaction Handling Fee (3.9% of Tutorial price + $0.30) applicable
Loading...