Described a layered model of networking

Assignment Help Computer Networking
Reference no: EM13742517 , Length:

Described a layered model of networking along with details of physical implementations that together support a wide range of possible networking scenarios.

Willowvale Primary School  was built in 1968 to cater for between 300 and 450 local students in Grades Prep-6.

State government funding has allowed the school to provide all students with their own tablets for eLearning applications, writing and publishing assignments, accessing the Internet and undertaking school projects.

Each tablet can access the school's wireless network.   There are PCs in the library, the staff office and reception, all of which are wired to the school's LAN. Each staff member has a laptop and a tablet. The school has four wings.  The Junior Wing houses 6 classrooms for students in grades Prep - 2.  The Middle Years Wing has a further 4 classrooms for grades 3-4 and the Senior Wing has 4 classrooms for years 5-6.  The final wing is the Administration Centre, containing the school reception, staffroom, Principal's Office, library, multipurpose room, server room, equipment storage areas and the cleaners' store cupboard.

The school has 18 teaching staff, a principal, 2 administrative staff and 4 cleaners.

The school principal has the following basic requirements:

  • Support for all staff laptops
  • Desktop support for all PCs
  • An online printer for each wing, with two additional printers (a total of 3) in the administration centre
  • Support for student and staff tablets
  • Web Server support and Web content management
  • Maintenance of the central file server in the server room

All Internet access is provided through a Proxy server which redirects all web requests to cached web content  managed by  the  Department of  Education and  Early Childhood Development (DEECD). This provides safe Web access to students and staff. It also ensures no student or staff member is exposed to pornographic or otherwise illicit or unsafe web content.

Common Assumptions to all Scenarios

The following assumptions are to be considered common:

  • Certain computers (e.g. the web server) require a higher capacity network
  • Separate sections/departments require separate networks that are interconnected
  • The school networks are connected to the Internet but require protection
  • Some transactions, with stakeholders or other institutions/companies, require security

Verified Expert

Reference no: EM13742517

Questions Cloud

Case study on padding the expense account : Case Study On Padding the Expense Account. Chester "Chef' House-division manager for United. He is 61 years old and is located at company headquarters about 30 miles from Midland. He is Stan's boss and is also a close personal friend of the preside..
Write research paper on genetic mutations and influence : Write Research paper on genetic mutations and influence
Explain permanent settlements established by english in usa : This essay assignment will require you to compare and contrast the first permanent settlements established by the English in the Americas.
Research paper on george emil palade : Research Paper on George Emil Palade, What they were known for contributing to the field of biochemistry; background on this discovery; any other contributions they made to science
Described a layered model of networking : Described a layered model of networking along with details of physical implementations that together support a wide range of possible networking scenarios.
Operating cash flow per year : Longstreet Pharmaceutical is considering opening a new Compound Pharmacy in San Antonio. The company's top Pharmacists estimates that the new pharmacy would be productive for eight years,
Primary roles of the us federal reserve : Briefly explain the primary roles of the U.S. Federal Reserve, the Federal Reserve Chairman, and the Federal Reserve Board. Indicate each party's effectiveness in today's economic environment. Provide support for your explanation.
Discuss two areas of the united states economy : discuss two areas of the United States economy that Ronald Reagan deregulated in the eighties. Explain at least two methods the Reagan Administration used to deregulate these particular agencies or programs.
Monthly compounding-annualizing a monthly rate : If you bought a $1,000 face value CD that matured in nine months, and which was advertised as paying 9% annual interest, compounded monthly, how much would you receive when you cashed in your CD at maturity?

Reviews

Write a Review

Computer Networking Questions & Answers

  Suppose a client computer with ip address 1271929230 in

suppose a client computer with ip address 127.192.92.30 in building zz requests a large web page from the server in

  Describe your technical recommendation for addressing

Describe your technical recommendation for addressing the security requirements in the overall technical design of the ABC Healthcare network. This should include both internal and external (untrusted and trusted) aspects.

  Write and briefly describe five-component model of

list and briefly explain the five-component model of an information system. how can you use them? why is mis one of the

  What to make sure network infrastructure is more secured

The CIO has asked you to explain why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities, explain to your CIO what you can do to make sure your network infrastructure is more secur..

  Which of the following statements is true in a data center

1. a network engineer is preparing an implementation plan of xumuc. she is not certain as to which layer of the cisco

  In the previous unit you learned about the importance of a

in the previous unit you learned about the importance of a well-designed and constructed user experience in the

  Explain effect of tcp flow control

Host A can send application data into link at 100Mbps but Host B can read out of its TCP receive buffer at maximum rate of 50Mbps. Explain the effect of TCP flow control.

  Describe the function or purpose of a virtual machine

Which of the following is the best definition/description of the chroot jail Linux/Unix security control?

  The cto informed you that the board of executives showed

the cto informed you that the board of executives showed great interest in building a new network based on the work you

  Selecting the network

She has bids from several companies in order to install (1) Wi-Fi, or (2) a switched Ethernet 100 Base T network. She wishes you to provide her some sense of relative performance of the alternatives so that it may be related to the costs of each o..

  Examine whether your risk assessment methodology is

global finance inc. gfi network diagram. a hypothetical company gfi has grown rapidly this past year and implemented a

  Question 1 write a technical description of the functions

question 1 write a technical description of the functions which are available on a workstation for new students who may

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd