Design a network for gemtech

Assignment Help Computer Networking
Reference no: EM132540517

Problem # 1

You are the network administrator for small firm GemTech with 8 sites and 1600 employees. You currently manage the network infrastructure and are migrating from static to dynamic routing. Each of the eight sites has 200 employees configured on a single LAN segment, and all sides are connected back a central office at the corporate headquarters receiving their IP addresses through DHCP. Each office is a separate subsidiary and has its own server systems for web services and its own connection to the internet in the past, issues have come up concerning network traffic taking sub-optimal pass through the corporate network out onto the internet. Corporate headquarter office has 4 departments. These 4 departments have 64, 127, 254 and 510 employees respectively. Management wants the new network configuration to be able to control traffic into and out of the corporate network as well as route around a link failure at any of the sites.

Identify which type of network is required here? Why?

Design a network for GemTech, Draw a complete architecture of the network.

What are the Network Address and Subnet Mask of this network?

Label the architecture you have drawn in 1.2 with correct IP configuration. Utilize maximum host IP addresses do not waste unnecessary IP hosts.

What routing protocol would you recommend for the internal network?

What strategy would you recommend for routing to and from the internet?

Given the constraints imposed by management, would static routing to the internet be sufficient?

Does your new design require a reconfiguration of the current IP address in configuration?

Could a routing hierarchy be developed and deployed? Justify your answer.

What is the importance of network firewall in GemTech network? And what are the policies must be applied here?

Problem # 2

Write down the summary of the following research paper:

Singh, S. K., Singh, M. P., & Singh, D. K. (2011). "A survey on network security and attack defense mechanism for wireless sensor networks". International Journal of Computer Trends and Technology, 1(2), 9-17.

Also, provide answers of the following questions referring the above article

What are wireless sensor networks? and how they are different from traditional networks?

What are the security challenges mentioned in the paper?

How internal and external attacks exploit networks?

The authors have defined sinkhole and Hello flood attacks through directed graphs. Define their working along with the severity of these attacks.

Various security techniques against different attacks in the paper. Mention at-least 5 attacks from them with their security techniques. Define how these techniques protect from attacks.

Reference no: EM132540517

Questions Cloud

What is the future value of the fund at the end : Helen contributed $1,350 at the end of every 3 months into an RRSP fund earning 2.22% compounded quarterly for 14 years.
What was the principal balance of the loan : Falco Inc. financed the purchase of a machine with a loan at 3.18% compounded monthly. This loan will be settled by making payments of $8,600
How much money should helen invest today : How much money should Helen invest today in a fund that earns interest at 4.02% compounded quarterly, if she wants to receive $6,000 at the end
Compute the breakeven point in total units : Jonah Hill Company manufactures two products.Determine the level of sales (in dollars) necessary to generate operating income of $185,000
Design a network for gemtech : Design a network for GemTech, Draw a complete architecture of the network and What routing protocol would you recommend for the internal network
The measurement of central tendencies : The Measurement of Central Tendencies The central measure of tendencies for the data sets of years of school completed and mother's education
Accumulated value of the resp at the end : Since the birth of her daughter, 19 years ago, Liz has deposited $75 at the beginning of every month into a Registered Education Savings Plan (RESP).
What is the advantage and disadvantage : Is it better to take a lump sum payout or take an annuity, and receive the payments over time if you win a jackpot of $300,000,000. What is the advantage
Describe the hierarchy of factory operating expenses : Describe the Hierarchy of Factory Operating Expenses. Explain how the manager can use ABC to analyse a company's operation beyond factory.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd