Describe briefly the different types of network messages

Assignment Help Computer Network Security
Reference no: EM131479936

Assignment

There are three components to this project:

• First, as an individual, you are to complete the Unit 4 lab tasks.

• Second you are to prepare a short paper, 1-2 pages, that demonstrates your understanding of IP addressing. Submit your individual work to the Small Group individual area.

• Third, work with your team to develop a paper that meets the stated user requirements.

Individual Work

Refer to the instructions for the unit 4 lab tasks.

You are Sam Smith, a network technician with Global Packaging. You have been asked to configure the Internet Protocol (IP) address and subnet mask on a local host computer to enable IP connectivity. For this assignment, include the following:

• Explain why and how the IP address and subnet mask enable computers to communicate with each other on that network.
• Briefly explain how you know that the host computer was placed on the correct subnet.
• Explain the relationship between IP addressing, DNS and DHCP.
• Describe briefly the different types of network messages.
• Submit your individual work in a Word document approximately 1-2 pages in length to the Small Group submission area.

Group Work

As you have gained experience in the topic of network design and development through this course, the team must design a global organization's network. This organization has approximately 600 employees distributed evenly among six different departments. Its headquarters is located in Los Angeles, CA, and it has major offices in Madrid, Spain, Tokyo, Japan, and Sydney, Australia. Discuss your IP addressing scheme and whether you implemented subnetting or Classless Inter-Domain Routing (CIDR).

Design the following for availability, reliability, and performance. Explain and support your choices. Include a table of components, quantity, and prices:

• Local area network (LAN) (host to switch using a hybrid of cables and wireless options)
• LAN backbone design (utilizing fiber optics)
• Wide area network (WAN) design with a primary connection and backup connection for redundancy
• IP addressing scheme for the organization's network (Class B private network address)
• Summation as to how design addresses availability, reliability and performance requirements
• Describe recommendations regarding network security such as hardware and security policy
• Suggest high level disaster recovery or business continuity plan

Prepare a Word document that is between 6-8 body pages in length. Add a title page and abstract. Citations and references must be in APA format. Include diagrams that illustrate your backbone and WAN design. Submit the Word document to the Small Group submission area. Refer to the APA style guide found in the Library for further information.

In the Small Group Discussion Board, deliberate with the other team members about the implications of the LabSim assignments in all units completed to date, including this Unit's LabSim assignments. Discuss how this knowledge impacted your ability to make the choices that you did in the organization's network design.

Attachment:- Uni-t4-Lab.pdf

Reference no: EM131479936

Questions Cloud

Decrease his expected payment per repair job : Assume that Bob does not want to decrease his expected payment per repair job. What is the maximum amount per job that Bob would be willing to pay Bill?
What is the main difference between audio and video elements : What is the main difference between audio and video elements? What are the different types of selectors in CSS? What are font properties?
Write an expression for the future value of the stock : Write an expression for the future value of the stock of external wealth in period N (WN). This should be written as a function of the economy's trade balance.
Review the perfect builders case study : ICT310 - System Analysis and Design - Review the Perfect Builders case study and answer the following question with reference to the information in the case study.
Describe briefly the different types of network messages : Describe briefly the different types of network messages. Briefly explain how you know that the host computer was placed on the correct subnet.
What is the total payoff from the projects in future years : In this question, assume all dollar units are real dollars in billions, so, for example, $150 means $150 billion. It is year 0. Argentina thinks it can find $15
Describe alternatives to current sex offender legislation : Provide a conclusion you drew about the effectiveness of sex offender legislation as it relates to sex offender management.
Write research paper about big data use for decision-making : Write a research paper about Big Data use for decision-making by Social Media Organizations. Integrate what you have learned from the course resources.
What happens to the rest of the world external wealth : What is Argentina's external wealth W in year 0 and later? Suppose Argentina has a one-year debt (i.e., not a perpetual loan) that must be rolled over.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd