The interconnections between network devices

Assignment Help Computer Networking
Reference no: EM13866216

Oftentimes, the process of implementing security opens one's eyes to other forms of security they hadn't thought of previously. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following:

Corporate Site (Chicago)

All servers exist here (Web server, file server, print server, mail server, ftp server)
Connection to the Internet (50mbps)
300 employees who only need access to local corporate resources and the Internet

20 employees who need access to all resources at corporate plus the Internet

Connection to the Internet (3mbps)

Write a four to five (4-5) page paper in which you:

Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind which depicts:

All network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and / or others)

The interconnections between network devices

The end user (client) devices (desktops, laptops)

The Internet cloud, generically, to represent your network's interface to the Internet

Note: The graphically depicted solution is not included in the required page length.

Describe the flow of data through your network, and explain how your network design provides multiple layers of security.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Reference no: EM13866216

Questions Cloud

Straight line depreciation for income tax : The Hunter Company purchased a light truck on January 2, 2010 for $18,000. The truck, which will be used for deliveries, has the following characteristics:Estimated life:
Equivalent unit for department using weighted-average method : During January, the production department of a process operations system completed and transferred to finished goods a total of 78,000 units. At the end of January, 9,000 additional units were in process in the production department and were 65% comp..
Stages of successful large-scale organizational change : summarize the eight stages of successful large-scale organizational change and discuss the resistance to change you anticipate from the Top-Down employees and how you would deal with this resistance. Discuss the pros and cons of using the approach..
The interconnections between network devices : The interconnections between network devices
Depletion cost charged to expense for the year : Land containing a mine having an estimated 1,000,000 tons of economically extractable ore is purchased for USD 375,000. After the ore deposit is removed, the land will be worth USD 75,000. If 100,000 tons of ore are mined and sold during the first ye..
Total cost to be assigned to the ending work in process : In the Shaping Department of Rollins Company the unit materials cost is $5.00 and the unit conversions cost is $3.00. The department transferred out 20,000 units and had 2,500 units in ending work in process 20% complete. If all materials are added a..
Targeting costing : Red back Networks Inc. a subsidiary of Ericsson, provides networking services and related systems for 75 percent of the world's largest telephone companies. Assume that it is developing a networking system for smaller, private telephone companies. wh..
What is the adjusted basis of the rental house : Kareem bought a rental house in March 2010 for $300,000, of which $50,000 is allocated to the land and $250,000 to the building. Early in 2012, he had a tennis court built in the backyard at a cost of $7,500. Kareem has deducted $30,900 for depreciat..

Reviews

Write a Review

Computer Networking Questions & Answers

  Analyze the result obtained regarding http page response

Analyze the result we obtained regarding the HTTP page response time. Collect four other statistics, of your choice, and rerun the simulation of the Simple and the Busy network scenarios.

  What is the definition of information security what

part 1 review questions what is the definition of information security? what essential protections must be in place to

  Managing intrusion detection environment

As security manager at XYZ Corporation, you are responsible for managing intrusion detection environment. If you were given the ability to build the environment from scratch, would you use network based IDS, host based IDS, or a combination?

  Remote accessing and related issues

Remote Accessing and Related Issues- An organization's head office is connected to its branch office over the Internet. The network connection works fine without errors. The users at the branch office connect to the head office by using telnet to ..

  Find the most challenging crimes

Find the most challenging crimes that could be based on P2P networks and write a report on how to do forensic investigations on these crimes.

  Case study - diane the consultant

Construct a diagram using Rationale to map the arguments about a moral claim that you have identified in the article/case study:

  How do you go in inprivate browsing mode

Using internet explorer, how do you go in inPrivate browsing mode- Click on the lock, who secures their website encryption. what level of encryption. Using google chrome, how do you go in new incognito mode

  Explain how the relative speed of the 100baset lans used

Explain how the relative speed of the 100BaseT LANs used at each location compares to accessing the WAN link between the two sites.

  Using microsofts threat analysis amp modelling tool create

using microsofts threat analysis amp modelling tool create a threat model for your own blog setup. additionally explain

  Explain information security body of knowledge

Look for the information security body of knowledge(CBK). When you review list of 10 areas in CBK, is policy listed? why do you think this is so?

  Using a microsoft windows xp vista or 7 open internet

using a microsoft windows xp vista or 7 open internet explorer. click internet options on the tools menu. examine the

  Given the narrow usable audio bandwidth of the telephone

given the narrow usable audio bandwidth of the telephone transmission facility nominal snr of 56 db 400000 and a

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd