Reference no: EM132540517
Problem # 1
You are the network administrator for small firm GemTech with 8 sites and 1600 employees. You currently manage the network infrastructure and are migrating from static to dynamic routing. Each of the eight sites has 200 employees configured on a single LAN segment, and all sides are connected back a central office at the corporate headquarters receiving their IP addresses through DHCP. Each office is a separate subsidiary and has its own server systems for web services and its own connection to the internet in the past, issues have come up concerning network traffic taking sub-optimal pass through the corporate network out onto the internet. Corporate headquarter office has 4 departments. These 4 departments have 64, 127, 254 and 510 employees respectively. Management wants the new network configuration to be able to control traffic into and out of the corporate network as well as route around a link failure at any of the sites.
Identify which type of network is required here? Why?
Design a network for GemTech, Draw a complete architecture of the network.
What are the Network Address and Subnet Mask of this network?
Label the architecture you have drawn in 1.2 with correct IP configuration. Utilize maximum host IP addresses do not waste unnecessary IP hosts.
What routing protocol would you recommend for the internal network?
What strategy would you recommend for routing to and from the internet?
Given the constraints imposed by management, would static routing to the internet be sufficient?
Does your new design require a reconfiguration of the current IP address in configuration?
Could a routing hierarchy be developed and deployed? Justify your answer.
What is the importance of network firewall in GemTech network? And what are the policies must be applied here?
Problem # 2
Write down the summary of the following research paper:
Singh, S. K., Singh, M. P., & Singh, D. K. (2011). "A survey on network security and attack defense mechanism for wireless sensor networks". International Journal of Computer Trends and Technology, 1(2), 9-17.
Also, provide answers of the following questions referring the above article
What are wireless sensor networks? and how they are different from traditional networks?
What are the security challenges mentioned in the paper?
How internal and external attacks exploit networks?
The authors have defined sinkhole and Hello flood attacks through directed graphs. Define their working along with the severity of these attacks.
Various security techniques against different attacks in the paper. Mention at-least 5 attacks from them with their security techniques. Define how these techniques protect from attacks.
What is the future value of the fund at the end
: Helen contributed $1,350 at the end of every 3 months into an RRSP fund earning 2.22% compounded quarterly for 14 years.
|
What was the principal balance of the loan
: Falco Inc. financed the purchase of a machine with a loan at 3.18% compounded monthly. This loan will be settled by making payments of $8,600
|
How much money should helen invest today
: How much money should Helen invest today in a fund that earns interest at 4.02% compounded quarterly, if she wants to receive $6,000 at the end
|
Compute the breakeven point in total units
: Jonah Hill Company manufactures two products.Determine the level of sales (in dollars) necessary to generate operating income of $185,000
|
Design a network for gemtech
: Design a network for GemTech, Draw a complete architecture of the network and What routing protocol would you recommend for the internal network
|
The measurement of central tendencies
: The Measurement of Central Tendencies The central measure of tendencies for the data sets of years of school completed and mother's education
|
Accumulated value of the resp at the end
: Since the birth of her daughter, 19 years ago, Liz has deposited $75 at the beginning of every month into a Registered Education Savings Plan (RESP).
|
What is the advantage and disadvantage
: Is it better to take a lump sum payout or take an annuity, and receive the payments over time if you win a jackpot of $300,000,000. What is the advantage
|
Describe the hierarchy of factory operating expenses
: Describe the Hierarchy of Factory Operating Expenses. Explain how the manager can use ABC to analyse a company's operation beyond factory.
|