Employed to design a network infrastructure for two campuses

Assignment Help Computer Networking
Reference no: EM131395871

Telecommunications Case Assignment

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed. As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network's topology including any necessary hardware.
2. You should list any recommended cable.
3. You can recommend wiring closets wherever you need them.
4. You should recommend ways to assure that you are not getting attacked.
5. You should build traps to stop attackers.
6. You should recommend any WAN or wireless technologies.
7. You should recommend any technology needed in the data center for high availability.
8. Justify your recommendations.

Verified Expert

In the given task the there is network in which database server and web server are present. In other hand there is branch network but branch having only database server. So for the given network design is required. security implementation is required and company wanted to trap attacker so that source of attack can be known. DMZ is recommended for the given assignment to provide security. and server redundancy is created for providing high availability.

Reference no: EM131395871

Questions Cloud

Whether given are definitions by subclass - tale : Determine whether the following are demonstrative definitions, enumerative definitions, definitions by subclass, synonymous definitions, etymological definitions, operational definitions, or definitions by genus and difference.
Whether the given enumerative definitions - error : Determine whether the following are demonstrative definitions, enumerative definitions, or definitions by subclass.- "Error" means mistake.
Explain concepts of server virtualization to management : Determine the strategy you would use to explain the concepts of server virtualization to senior management so that they understand the concepts and can form an opinion on the solution. Provide a rationale for using your chosen strategy.
Whether given enumerative definitions - professional person : Determine whether the following are demonstrative definitions, enumerative definitions, definitions by subclass, synonymous definitions,or etymological definitions.- "Professional person" means a person such as a doctor, a lawyer, a professor, or a..
Employed to design a network infrastructure for two campuses : As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications.
Demonstrative or enumerative definitions - philosopher : Determine whether the following are demonstrative definitions, enumerative definitions, definitions by subclass, synonymous definitions, etymological definitions, operational definitions, or definitions by genus and difference.
Write a program that prompts user for an unsigned int value : Write a program that prompts the user for an unsigned int value. Compute and display the result when the bits are shifted one position to the left. Save the file as ShiftToLeft.cpp.
How could you have been a better team member : Based on your knowledge from a past or present job, explain the difference between a group and a team. Would you say you were a part of a group or a team while working in that job?Now, identify a team that you were a part of and describe the advant..
Identify four possible market segments : Select a consumer product or service you are familiar with and identify four possible market segments. Use the categories seen in class (geographic regions, demographics, psychographics and behavioral variables

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd