Reference no: EM13802879
After evaluating and completing support for high-definition IP cameras to enhance security for a college campus, you have completed a design of the network switching infrastructure that fully supports both the existing data traffic and the additional HD camera traffic according to requirements. Last week, you discussed your template of configurations with the network manager.
Over the past couple of months, the university has experienced a number of issues with layer 2 loops and the loss of VLAN's. We discovered that a student connected a switch that was purchased at a local garage sale to the network, and inadvertently bridged the network, causing a Layer 2 loop. The switch also wiped out the VLAN's on the upstream switches.
Your manager is concerned with the network's inability to self-heal when experiencing these types of network issues. As the network engineer, he has asked you to do a network assessment on the network's health and how to prepare the network for any future STP and VTP issues.
Design Requirements
Your team's configuration template should address each of the following requirements:
1. Layer 2 spanning-tree hardening; and
2. VTP standardization
Deliverables
You are required to prepare a detailed network report for your manager at the next scheduled meeting.
Your report should:
1. Describe in detail all issues associated with layer 2 loops and VTP; and
2. Present best design practices to minimize layer 2 loops and VTP;
Find the amount of capital gain realized from the assets
: An asset used in a 4-year project falls in the 5-year MACRS class for tax purposes. The asset has an acquisition cost of $500,000 and will be sold for $100,000 at the end of the project. Assume tax rate is 35%. (A) Find the asset's book value at the ..
|
Advantages of using mobile computing technology
: Analyze the advantages and disadvantages of using mobile computing technology to monitor patients. Assess the security concerns with regard to the transmission of personal medical information over wireless networks
|
Why do you think the us is more crime prone
: Compared to other countries, why do you think the US is more crime prone? How do you think the criminal justice system is dealing with criminals today?
|
Write the your company it planning
: Write the Your Company's IT Planning and Analysis Processes section of your term paper
|
Completing support for high-definition
: After evaluating and completing support for high-definition IP cameras to enhance security for a college campus, you have completed a design of the network switching infrastructure that fully supports both the existing data traffic and the additio..
|
What is the exact cost of trade credit as an annual rate
: If your firm buys $1,000 worth of supplies on credit with terms 3/15 n60 and pays the bill on the 60th day after the purchase: a. What is the approximate, or "nominal," cost of trade credit as an annual rate? b. What is the exact cost of trade credit..
|
Identifying deductive and inductive fallacies
: Identifying Deductive & Inductive Fallacies
|
What variables do you feel might account for the crime rates
: What variables do you feel might account for the crime rates in your state (i.e., large populations, rural area, etc.)Briefly describe the UCR, NCVS, and Self Report Studies in your own words.
|
How does data become usable information
: How does data become usable information and Find articles to support your argument in both situations. Is the article based on quantitative or qualitative research? Explain
|