Analyze the need for network topology

Assignment Help Computer Network Security
Reference no: EM132008012

Network Topology

Technical Requirements

In this section, you will assess UMUC's technical requirements. Use the information provided in the scenario to analyze the need for network topology, cables and connectors, networking and internetworking devices, wide area networking design, and computer systems. If you need more information, feel free to ask your instructor or make some assumptions. If you make assumptions, be sure to list them. This section should be used to describe the technical requirements of the task at hand. That is, you will be making explicit the requirements as you understand them, which will lead to the next section (your proposed solution).

Networking and Internetworking Hardware

Technical Requirements

In this section, you will assess UMUC's technical requirements related to networking and internetworking hardware. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Wide Area Network (WAN) Design

Technical Requirements

In this section, you will assess UMUC's technical requirements related to the Wide Area Network (WAN) design. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Wide Area Network (WAN) Design

This section should be used to provide the details of your proposed ISP solution, Be sure to cover what options are available through leased lines, metro Ethernet, and dedicated connections are based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Computer Systems Hardware

Technical Requirements

In this section, you will assess UMUC's technical requirements related to the computer systems hardware for both classroom end points and servers as well as what would be needed for dedicated IT use. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Attachment:- network design proposal template.rar

Verified Expert

In the given task there is requirement to design secure network. Also in this design every device cost and comparison is required. Assignment solution include detailed reason and description of router, switch, firewall, ids/IPS, creating DMZ , backup device, how network monitoring can be done and at least how network can be troubleshoot will occur. This things are explained in the given assignment.

Reference no: EM132008012

Questions Cloud

Aggregate demand and aggregate supply diagram : Show the impact of this rise in oil prices on aggregate supply in the aggregate demand and aggregate supply diagram to the right
Recall your own childhood and the physical education lessons : Recall your own childhood and the physical education lessons and classroom environment which you participated.
Develop a listing of new hiv-aids educational strategies : Develop a listing of new HIV/AIDS educational strategies an agency can use in a general community.
Prepare the liability section of the balance sheet : Prepare the liability section of the balance sheet at December 31, 2013 based on the information provided
Analyze the need for network topology : Network Design Proposal - University of Maryland - analyze the need for network topology, cables and connectors, networking and internetworking devices
State two prevention approaches from the reading : State two prevention approaches (policy, employer, community programs, health plans, etc.) from the reading or based on your experience.
Compute the pv of your lease and loan payments : Compute the PV of your LEASE and LOAN payments and subtract these two values.
Describe the environment and the people being observed : Students must describe the environment and the people being observed, i.e., age, gender, dress, etc. Discuss the nonverbal communication, i.e.
Would consumers be better off in terms of welfare : Would consumers be better off in terms of welfare, when you compare a firm in monopolistic competition, oligopoly, and monopoly to one in perfect competition?

Reviews

urv2008012

12/10/2018 1:26:38 AM

Hello, You did a great job for myself and my refferal. I have another assignment with quality job that will pass turnitin. I need In-text Citation for the solution. Thank you, tutors, you are the best!! I had a splendid experience with your website. Your team and experts were always there to help even after I finished my assignment and was having some revision that was suddenly given by the teacher before one day of submission. I got the revised solution within in some hours, and I also got excellent grades in it.

Write a Review

Computer Network Security Questions & Answers

  Discuss thoroughly vpns and how they are implemented

Discuss thoroughly VPNs and how they are implemented and Discuss both symmetric and asymmetric cryptographic algorithms. Also, explain cryptographic tools. Which should FDU consider

  Is the research informed by primary sources of theories

Is the research informed by primary sources of theories, concepts, principles and models in the field, and are they referred to specifically? Are methods of data collection appropriately explained - Is data analysis complete and presented logically..

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  What is the decryption matrix

What is the decryption matrix - determine the period of the recursion relation - Show all intermediate steps.

  Provide recommendations for mechanisms that can be applied

Provide recommendations for mechanisms that can be applied to reduce the spread and impact of each. Man-in-the middle attacks.

  Identify the erroneous bit in the given message

One simple technique combines row-based(character) parity with column-based (longitudinal) parity to help detect and correct single-bit errors.

  Network topology diagram and the domains of trust

Network topology diagram and the domains of trust Security-related assumptions in your design and security policy to make this assumption valid and give a classification about users according to their trust domain

  Describe the security methods and controls that need

Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.

  Describe the four types of network testing

Describe the four types of network testing typically performed. What is regression testing? Why is regression testing usually an important part of network testing

  Describe the process used in restoring

Describe the process used in restoring the scrambled bits and insert plain text in the assignment - hypothetical case you are required to produce a formal report consisting of facts from your findings to your attorney who has retained you.

  Discuss the description of the code and its purpose

Create a PowerPoint slide for each code. Each slide should discuss the description of the code, its purpose, and how it will impact the completion of the cable plant within the new building.

  Discuss any threats to priva

Companies would share. sign-on Information for any Weh user Mb 0 agree to participate. They would also share personal Information such as call card dela, billing addresses, and personal preferences.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd