Telecommunications

Assignment Help Basic Computer Science
Reference no: EM132600173

Telecommunications

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed. As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

The primary data center will be located at the Atlanta location.

There will be a failover data center at the Cincinnati location.

Each location should be protected from intrusions that are not limited to state change attacks.

The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

There will be database servers located at the Cincinnati site.

The servers must have redundancy.

The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

You should submit a network drawing listing the network's topology including any necessary hardware.

You should list any recommended cable.

You can recommend wiring closets wherever you need them.

You should recommend ways to assure that you are not getting attacked.

You should build traps to stop attackers.

You should recommend any WAN or wireless technologies.

You should recommend any technology needed in the data center for high availability.

Reference no: EM132600173

Questions Cloud

What is sbr software and how does it improve efficiency : What type of budget would you refer to if you wanted to analyse revenue, cost of sales and expenses for the business in a specific period?
The reputation service and the needs of customers : As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious
AI perceived as different in various industries and location : What is your definition of AI? How is AI perceived as different in various industries and locations? Please explain.
Assignment - Capitalism Vs Socialism Template : Assignment - Capitalism Vs. Socialism Template. Define in your own words the definition of capitalism. Define the concepts of capitalism and socialism
Telecommunications : Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, more secure version of the phone to business organization
Determine what is the size of the monthly payments : A $248 000.00 mortgage amortized by monthly payments, What is size of the monthly payments? How much of the principal is repaid during the first five-year term?
Determine the balance in the investment account on december : Prepare the required journal entries to record the Teal Mountain Inc. investment assuming significant influence exists. Teal Mountain shares are trading at $22
Prepare the journal entries that were recorded by church : Prepare the journal entries that were recorded by Church to record the sale of the investment and the holding gain on fair value adjustment at December
Prepare any required adjusting journal entry at october : Prepare any required adjusting journal entry at October 31. Purchased a 100-day, $35,200 treasury bill maturing on May 1 for $34,989.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the marginal product of labor

Given the production function q=6L+2k, what is the marginal product of labor when capital is fixed at 15?

  Importance of application maintenance in organizations

Explain the importance of application maintenance in organizations and assess the need for robust patch and update management programs and procedures. From the e-Activity, compare and contrast the update styles of Microsoft's Internet Explorer and Go..

  The evolution of information systems infrastructure

Briefly describe the evolution of information systems infrastructure?

  Subtracting distribute the minus

In the numerator, you should expand the binomial, distribute, when subtracting you should distribute the minus. When done, anything without an "h" in the numerator should be gone. If not, there is an error.

  What is the data or micro-labor need

Think about a company with which you are affiliated or familiar and some kind of data. What is the data or micro-labor need? Could it be crowd-sourced?

  What are the memory requirements for this type of search

Describe how exactly you would perform a collision search to find a pair x1, x2, such that h(x1) = h(x2) for a given hash function h. What are the memory requirements for this type of search if the hash function has an output length of n bits?

  How many datatransfer connections are needed

In FTP, if the client needs to retrieve one file from the server site and store one file on the server site, how many control connections and how many datatransfer connections are needed?

  Does your graph tell you anything else

How different is your computer's dock from true time after one week? Does your graph tell you anything else?

  Family reliant on wood products from the forest

You have moved to a small village in a developing country. The people in this village rely on the nearby forest for the wood they use for cooking. The forest officially is a park and should not be harvested, but there are very few park rangers, and m..

  Show how to solve this problem using the single

Show how to solve this problem using the single origin/single destination algorithms of Section 2.5

  Write a recursive method that returns the smallest integer

Write a recursive method that returns the smallest integer in an array of integers. If you divide the array into two pieces- halves, for example-and find the smallest integer in each of the two pieces, the smallest integer in the entire array will..

  How is software and hardware firewalls different

How can organizational management measure the success of their network security? How is software and hardware firewalls different?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd