Employed to design a network infrastructure for two campuses

Assignment Help Computer Networking
Reference no: EM131395871

Telecommunications Case Assignment

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed. As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network's topology including any necessary hardware.
2. You should list any recommended cable.
3. You can recommend wiring closets wherever you need them.
4. You should recommend ways to assure that you are not getting attacked.
5. You should build traps to stop attackers.
6. You should recommend any WAN or wireless technologies.
7. You should recommend any technology needed in the data center for high availability.
8. Justify your recommendations.

Verified Expert

In the given task the there is network in which database server and web server are present. In other hand there is branch network but branch having only database server. So for the given network design is required. security implementation is required and company wanted to trap attacker so that source of attack can be known. DMZ is recommended for the given assignment to provide security. and server redundancy is created for providing high availability.

Reference no: EM131395871

Questions Cloud

Whether given are definitions by subclass - tale : Determine whether the following are demonstrative definitions, enumerative definitions, definitions by subclass, synonymous definitions, etymological definitions, operational definitions, or definitions by genus and difference.
Whether the given enumerative definitions - error : Determine whether the following are demonstrative definitions, enumerative definitions, or definitions by subclass.- "Error" means mistake.
Explain concepts of server virtualization to management : Determine the strategy you would use to explain the concepts of server virtualization to senior management so that they understand the concepts and can form an opinion on the solution. Provide a rationale for using your chosen strategy.
Whether given enumerative definitions - professional person : Determine whether the following are demonstrative definitions, enumerative definitions, definitions by subclass, synonymous definitions,or etymological definitions.- "Professional person" means a person such as a doctor, a lawyer, a professor, or a..
Employed to design a network infrastructure for two campuses : As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications.
Demonstrative or enumerative definitions - philosopher : Determine whether the following are demonstrative definitions, enumerative definitions, definitions by subclass, synonymous definitions, etymological definitions, operational definitions, or definitions by genus and difference.
Write a program that prompts user for an unsigned int value : Write a program that prompts the user for an unsigned int value. Compute and display the result when the bits are shifted one position to the left. Save the file as ShiftToLeft.cpp.
How could you have been a better team member : Based on your knowledge from a past or present job, explain the difference between a group and a team. Would you say you were a part of a group or a team while working in that job?Now, identify a team that you were a part of and describe the advant..
Identify four possible market segments : Select a consumer product or service you are familiar with and identify four possible market segments. Use the categories seen in class (geographic regions, demographics, psychographics and behavioral variables

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe domain name system

Describe Domain Name System. Describe Hierarchical Namespace. Define Fully Qualified Domain Name and Partially Qualified Domain Name. What is transmission impairment?

  What are congestion window size after a period of time

Iif both C1 and C2 at time t0 have congestion window of 10 segments what are their congestion window size after 2200 msec

  Explain the need and importance of virtualisation

Briefly explain the need and importance of Virtualisation in today's IT organisations with some examples.

  Adoption of new technology by the organisational employees

The cloud solutions are not well formulated at the moment due to some misunderstanding of what the term actually means. Describe the type of cloud services available, the benefits and disadvantages of each solution - maximise the adoption of new ..

  What forest/domain model should shiv llc implement

What forest/domain model should Shiv LLC implement? What is the domain name? Where should the domain controllers be place? Should RODC be part of the consideration

  Draw potential network architecture of data network

Draw the potential network architecture of the data network for secondary campus to main campus of university (Detail and describe the function of each component in the network.

  Purpose of non routable protocols

In your opinion, what is the purpose of nonroutable protocols? Is there a legitimate reason for having nonroutable protocols? Do you think they can be replaced and with another type of protocol or innovative system?

  This assignment requires you to research into recent

this assignment requires you to research into recent advances in lsquobroadband adsl asymmetric digital subscriber line

  Determine the primary security concerns

Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns

  Implement stream socket for communication

You are required to implement stream socket for communication and both client and Server to be implemented on the same machine for demonstration

  Network utilization between office and hospital mainframe

Discussion of network utilization between office and hospital mainframe and Decreased turn time for test results

  Why may the client program be executed

For the client-server application over TCP why must the server program be executed before the client program? why may the client program be executed before the server program.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd