Design a network for the local business

Assignment Help Computer Network Security
Reference no: EM13744342

Network Design Imagine that you have been hired as a contractor by a local business that has recently purchased new office space for its growing business.

Design a network for the local business based on the following information: The business has approximately fifty (50) employees, and the new office space will stretch across the third and fifth floors of a building.

The fourth floor is currently occupied by another tenant. Write a two to four (2-4) page paper in which you: Suggest the equipment that you would utilize to design and implement a network, based on the scenario. Justify the need for your suggestions.

Recommend the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Suggest a solution that includes the cabling / connecting of the two (2) differing office space floors. Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.

Detail the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia.

Note: The graphically depicted solution is not included in the required page length Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources

Verified Expert

Reference no: EM13744342

Questions Cloud

Analyze the historical origins of the war on drugs : Analyze the historical origins of the War on Drugs. What are the events that have led to the present day situation the Americas face today?
Four different types of solar energy collectors were tested. : Four different types of solar energy collectors were tested. Each was tested at five randomly chosen times, and the power (in watts) was measured. The results were as follows.
Estimate the difference between the population average time : Sammy the Statistics Student wanted to estimate the difference between the population average time of his AM(x1) and PM(x2) commutes. Using 40 AM commutes and 31PM commutes, he found a 95% confidence interval for the difference of mean times of 3 to ..
What is gel electrophoresis : DNA Analysis via Gel Electrophoresis-Gel electrophoresis is an important analytical technique in the fields of chemistry and biochemistry. In this virtual experiment, we will explore the process of using gel electrophoresis to analyze DNA samples
Design a network for the local business : Design a network for the local business based on the information: The business has approximately fifty (50) employees, and the new office space will stretch across the third and fifth floors of a building.
Assignment on db public relation : Search company Web sites to find a backgrounder that you think can be improved. Provide a direct link to it. Rewrite the backgrounder in 2 paragraphs.
Develop a compelling presentation to the operations manager : Develop a compelling presentation to the operations manager that will explore the benefits of implementing supply chain management on his floor.
Return paid to the debt holders : 1. In the case of debt, the return paid to the debt holders is not the same as the cost to the firm.
Why did some northerners oppose the war : Why did some northerners oppose the war? how did president Lincoln respond when oppositions turned violent?

Reviews

Write a Review

Computer Network Security Questions & Answers

  The performance of a wimax network appears to be lower than

the performance of a wimax network appears to be lower than expected and you suspect interference to be the cause.

  How to collect data for traffic analysis

Suppose a terrorist is known to use Skype for encrypted email from internet cafes, using a known email ID in small city. How could you collect data for traffic analysis (i. e, what kind of technology or access could you use)?

  Prepare research paper on defending against virus attacks

Prepare a research paper on Defending against Virus Attacks - You will create a 6 to 8 page research paper. Please include an introduction, body and conclusion. You need to also include at least eight references with in-text citations.

  Based on your understanding of networking concepts make a

based on your understanding of networking concepts create a 2- to 3-page report in a microsoft word document with

  Determine plaintext and key from vigenere cipher

Below are ciphertext from Vigenere cipher. Determine plaintext and key. Give a clearly written description of steps you followed to decrypt each ciphertext.

  Identify a recently announced security vulnerability

Identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies.

  Questions on cyber security

Question 1: Submit a list of five cybersecurity breach case studies. Question 2: For each breach, write a brief statement covering the following points: a\ When did the incident take place (dates)? b\ What went wrong? c\ What was the outcome?

  Define encryption

In a given encryption system where the messages are expressed only as numbers and "e" is an integer.

  How security can be configured and provide configuration

Describe how the security can be configured, and provide configuration examples (such as screen-shots and configuration files). Marks are based on demonstrating technical detail and understanding, and choice of examples.

  Problem on network security planning

Securing a large internetwork remains a daunting challenge. Cloud computing and social networks add to this complexity. In two to three (2-3) pages, and using the CISCO SAFE reference architecture.

  Define the repository usernames and passwords

Install the distributed revision control system subversion from the Debian package of the same name. After installation you will need to configure subversion to be usable.

  Description and understanding of a newict service

Provides a thorough and detailed description and understanding of a newICT service in the workplace, worthy of analysis and provides a comprehensive description and understanding of a new ICT service in the workplace, worthy of analysis.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd