Discuss the primary data center will be located at atlanta

Assignment Help Computer Engineering
Reference no: EM131757607

Telecommunications Case Assignment

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed. As a security professional, you have been employed todesign a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network's topology including any necessary hardware.
2. You should list any recommended cable.
3. You can recommend wiring closets wherever you need them.
4. You should recommend ways to assure that you are not getting attacked.
5. You should build traps to stop attackers.
6. You should recommend any WAN or wireless technologies.
7. You should recommend any technology needed in the data center for high availability.
8. Justify your recommendations.

Verified Expert

In the given task the there is network in which database server and web server are present. In other hand there is branch network but branch having only database server. So for the given network design is required. security implementation is required and company wanted to trap attacker so that source of attack can be known. DMZ is recommended for the given assignment to provide security. and server redundancy is created for providing high availability.

Reference no: EM131757607

Questions Cloud

How would you improve the level of job satisfaction : How would you improve the level of job satisfaction in both facilities? List methods and tools for implementation and cite sources to support
Is punishment best justified by a utilitarian : The Justification of Punishment. Is punishment best justified by a utilitarian or a retributivist theory, or by a mixed theory?
What should be the possible initial outlay : The projects cost of capital is 10% and the project has a 10% IRR. What should be the possible initial outlay?
Explain the internal control system : Explain the Internal control system, its role in a business and its significance in the auditing process
Discuss the primary data center will be located at atlanta : Discuss the primary data center will be located at the Atlanta location. Each location should be protected from intrusions that are not limited to state change.
What is the probability that a driver wears a seat belt : ABC Insurance Co. estimates that 80% of drivers wear seat belts regularly. They also estimate that 50% of drivers are over age 35.
Discuss a contract for a purchase commitment specifies : A contract for a purchase commitment specifies a price of $10 per unit for a commodity
What are the specialized forms of business organizations : What are the principal forms of business organizations? What are the specialized forms of business organizations?
Total real return on investment : Suppose that you decide to sell your bonds today, when the required return on the bonds is 8.25 percent. If the in?ation rate was 4.3 percent over the past year

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd