The fourth floor is currently occupied by another tenant

Assignment Help Basic Computer Science
Reference no: EM13754218

Imagine that you have been hired as a contractor by a local business that has recently purchased new office space for its growing business. Design a network for the local business based on the following information: The business has approximately fifty (50) employees, and the new office space will stretch across the third and fifth floors of a building. The fourth floor is currently occupied by another tenant.

Write a two to four (2-4) page paper in which you:

Suggest the equipment that you would utilize to design and implement a network, based on the scenario. Justify the need for your suggestions.
Recommend the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Suggest a solution that includes the cabling / connecting of the two (2) differing office space floors.
Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.
Detail the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Explain the complexities in an information technology environment by applying best practices and using appropriate technologies and methodologies.
Describe protocols for inter process communication for communication across networks.
Outline why the Information Assurance and Security perspective needs to pervade all aspects of information technology.
Use technology and information resources to research issues in information technology.
Write clearly and concisely about introductory information technology topics using proper writing mechanics and technical style conventions.

Click here to view the grading rubric for this assignment. 

Reference no: EM13754218

Questions Cloud

The new subnet mask after the subnetting : The new subnet mask after the subnetting The following information for the four subnets identified:Subnet's network address
Pros and cons of the current alcan technology : What are the pros and cons of the current Alcan technology infrastructure? What are the pros and cons of the new Alcan technology infrastructure proposed by Robert Ouelette
Summary of the competitive analysis : Next, write up a summary of the competitive analysis and add it to the design document. The competitive analysis itself should be included as an appendix. Remember to publish these results so that everyone can see them." Your "publication" consist..
What was the purpose of the spanish armada : What was the purpose of the Spanish Armada? What happened to it and what was the historical impact of its outcome? What happened to the Spanish economy during Philip II's reign?
The fourth floor is currently occupied by another tenant : Imagine that you have been hired as a contractor by a local business that has recently purchased new office space for its growing business. Design a network for the local business based on the following information: The business has approximately fif..
Evaluate effect of organizational structure and governance : Evaluate the effect of organizational structure and governance, culture, and social responsibility focus on what happened in your chosen situation.
Despite the growing number of security incident : Despite the growing number of security incidents, cybersecurity risks and threatsare still notoriously hard to quantify and estimate.
Driver class called fliprace whose main method created : PP 5.6: Using the Coin class defined in this chapter, design and implement a driver class called FlipRace whose main method created two Coin objects, then continually flips them both to see which coin first comes up heads three flips in a row. Contin..
What are the predominant electronic and physical threats : What are the predominant electronic and physical threats to communications networks?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write pseudocode algorithms addition subtraction multiply

Describe the classes and write pseudo-code algorithms to perform addition, subtraction and multiplication of polynomial expressions.

  Assess and evaluate key aspects of legal

Identify ethical, social and legal issues relevant to Information Systems within a context of application and assess and evaluate key aspects of legal, ethical and cultural issues relevant to an IT professional

  Describe the model''s strengths and weaknesses

Describe the model's strengths and weaknesses

  Describe what each of the two-dimensional characters

Describe what each of the two-dimensional characters might represent and the data that would be held in the array. Also, provide an example array declaration.

  What does it mean to spawn a process?

Process can be in different states to allocate the resources better. List the symbol and meaning for each of these states. 2. What does it mean to spawn a process?

  Discuss the role of cognitive psychology

Explain and justify the need for good HCR practice and discuss the role of cognitive psychology in the design of user interfaces and select appropriate communication styles for interactive systems.

  Describe how upper is adjusted to allow simpler code to work

Describe how A_upper is adjusted to allow this simpler code to work. (Hint: A_upper requires to be adjusted because A_lower will be sign-extended.)

  Why cannot technology totally solve problem of co-channel

Ultra Wide Band (UWB) appears like noise to other transmitters. Why cannot this technology totally solve the problem of co-channel interference for any type of wireless communication?

  Show her to install and used it in my network administration

and show her to install and used it in my network admistaion class

  How do i put three numbers ascending order in ocaml pattern

how do i put three numbers in ascending order in ocaml using pattern matching?

  Intelligent systems for health maintenance organization

Aacquiring a company in the health maintenance organization (HMO) field. DSS, ES, ESS, or intelligent systems can be used in such a situation.

  Cloud storage carries potent security risk

See this article about "Cloud storage carries potent security risk", including reading the information and viewing the short video (on Financial Services).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd