Develop a network design to meet the requirements

Assignment Help Computer Networking
Reference no: EM131977185

Telecommunications - Case Assignment

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed. As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.
2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.
3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.
4. The primary data center will be located at the Atlanta location.
5. There will be a failover data center at the Cincinnati location.
6. Each location should be protected from intrusions that are not limited to state change attacks.
7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.
8. There will be database servers located at the Cincinnati site.
9. The servers must have redundancy.
10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.
1. You should submit a network drawing listing the network's topology including any necessary hardware.
2. You should list any recommended cable.
3. You can recommend wiring closets wherever you need them.
4. You should recommend ways to assure that you are not getting attacked.
5. You should build traps to stop attackers.
6. You should recommend any WAN or wireless technologies.
7. You should recommend any technology needed in the data center for high availability.
8. Justify your recommendations.

Verified Expert

In the given task the there is network in which database server and web server are present. In other hand there is branch network but branch having only database server. So for the given network design is required. security implementation is required and company wanted to trap attacker so that source of attack can be known. DMZ is recommended for the given assignment to provide security. and server redundancy is created for providing high availability.

Reference no: EM131977185

Questions Cloud

Determine the possible reductions of human capital : Determine the possible reductions of human capital that can be realized from implementing cloud and virtualization technologies.
Explain the concepts in psychological theory : Explain the concepts in psychological theory
Energy output is in the visible range : Assuming that 10.0% of a 100 W light bulb's energy output is in the visible range (typical for incandescent bulbs) with an average wavelength of 580 nm
What is the average power of the engine : A 1300 kg sports car accelerates from 0 m/s to 32 m/ in 13 s. What is the average power of the engine?
Develop a network design to meet the requirements : Telecommunications - Case Assignment - develop a network design to meet the requirements - You should submit a network drawing listing the network's topology
How was your overall experience : How was your overall experience using the software to document the patient encounter? Did you experience any issues while using the software?
What fraction of the object is above the surface of fluid : What fraction of the object is above the surface of the fluid?
Calculate the percentage changes each day : For each of four consecutive 9 month periods, starting October 1, 2013, derivate the historical annual standard deviation for Chevron stock.
Journalize the entries to record the foregoing transactions : Journalize the entries to record the foregoing transactions. Round all amounts to the nearest dollar. Be sure to include the year in the date for the entries.

Reviews

Write a Review

Computer Networking Questions & Answers

  1 potential malicious attacksthree specific potential

1. potential malicious attacksthree specific potential malicious attacks that could be carried out against the

  Design a modern network for a private high school

You are required to design the network you would recommend and how it would be configured - Design a Modern Network for a Private High School.

  What are reliability and cumulative distribution functions

The Air Force maintains enormous amounts of data on engine failure times. A particular engine has experienced a failure pattern whose failure rate function.

  Do you support net neutrality or why or why not

Do you support net neutrality? Why or Why not?How many bits (not bytes) are there in a 10 page text document?- What services do they provide and what pricing plans do they have for residential users?

  What is a bottleneck and how can you locate one

What is a bottleneck and how can you locate one?  - Describe three ways to improve network performance on the server?

  Describe how symmetric encryption and decryption work

Explain how a Trojan horse works.- Compare and contrast symmetric and asymmetric encryption.- Describe how symmetric encryption and decryption work.

  Write a report on a network plan and configurations

There is an organisation which is primarily e-commerce business. It is going through a major transformation because of its expansion.

  Discuss the relationship between autonomous systems

COIT20261 Network Routing and Switching (Term 1, 2017) Assignment. Define the terms and discuss the relationship between Autonomous Systems

  Explain the usefulness of a traffic analysis

Explain the importance of communication protocols. Identify the protocols in your design and provide rationale for your decision. Define the overall network architecture. Explain the usefulness of a traffic analysis.

  What is the most important item to take away from article

Post a summary of an article about the investigation of wireless devices and the article link. What is the most important item to take away from the article?

  What major risks behind implementing cloud computing program

What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world?

  Internetworking for contemporary organisations

Analyse and discuss the significance of internetworking for contemporary organisations - Draw architectural internetworking design for the business in Netsim.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd