Network configuration with physical and logical topologies

Assignment Help Basic Computer Science
Reference no: EM133056487

Scenario

The Corporation Techs' current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4).The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company's business goals and has determined the features and functions required to meet those goals.

The senior network architect has asked you to create a network design that includes the following components:

 Current infrastructure elements

 A logical topology that separates the Accounting and Sales departments

 Redundant communications

 Justification for continuing with IPv4 or upgrading to IPv6

Tasks

For this part of the project, perform the following tasks:

1. Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.

2. Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.

3. Include a high-level plan that ensures communications are available 24/7.

4. Recommendwhether to continue using IPv4 or upgrade to IPv6, and explain why.

5. Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network.The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.

6. Create a draft report detailing all information as supportive documentation.

7. Cite sources, where appropriate.

Reference no: EM133056487

Questions Cloud

Cruisin fusion contest : Research and assess the ethical issues related to data customer collection and information management. How will customer information be protected?
Describe the benefits of clinical workflow : Describe the benefits of a clinical workflow and explain how an EHR-related workflow applies to informatics.
Electronic health record application used in health care : Describe an example of an electronic health record application used in health care setting. Describe the key elements of design usability for that application
Contingency planning is risk mitigation process : Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual'.
Network configuration with physical and logical topologies : Design a network configuration with physical and logical topologies. Create a draft report detailing all information as supportive documentation.
What do you think the future of big data : What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be?
Organizations need to know value of their data : Describe why data classification and categorization are important. Describe three data sets (PII, ePHI, trade secrets, etc.) an organization might have.
Satisfying the requirement of data collection : Why are the traditional methods insufficient in satisfying the requirement of data collection?
Definition of data mining : What is the definition of data mining that the author mentions? How is this different from our current understanding of data mining?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Result of the project execution or completion

Stakeholders include everyone who are actively involved in the project or whose interests may be affected as a result of the project execution or completion. Why should they be involved in the creation of lessons learned, at closure of a project

  Difference between information governance-data governance

What is the difference between Information Governance, Data Governance, and IT Governance?

  Information between the employee and the employer

In the case of hiring decisions, there is asymmetric information between the employee and the employer.

  Create the file by entering five customer records

After the file is created, write a C++ program that requests a user-input account number and displays the corresponding name and account balance from the file.

  Compare and contrast the application of it

Determine how information systems have allowed police departments that implement tools such as COMPSTAT to respond to crime faster. Apply the strengths, weaknesses, opportunities, and threats analysis (SWOT analysis) on behalf of police department..

  Managing An IT Infrastructure Audit-3

Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization.

  Determining the role of societal values

Elaborate in detail the role of societal values and social myths utilizing examples as well as importance of critical thinking. Provide references in APA format.

  Write test program that creates objects of each type package

(Package Inheritance Hierarchy) Package-delivery services, such as FedEx®, DHL® and UPS®, offer a number of different shipping options.

  Discuss the importance of vulnerability management

Discuss the importance of vulnerability management and ongoing vulnerability management planning. Performing a Vulnerability Assessment

  Explain the basic primary tasks

Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist.Provide an overview of how computing devices are used in crimes of today and how these crimes can affect a company's data and infor..

  Efficiency as per the efficient market hypothesis

Do you still believe in a classification of the markets according to their efficiency as per the Efficient Market Hypothesis?

  Discuss the relationship between data-information-knowledge

Discuss the relationship between data, information, and knowledge.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd