Unit 35 Networking Management Solution

Assignment Help Computer Networking
Reference no: EM132483494

Unit 35 Networking Management Solution - Level 5 Pearson BTEC HND in Computing

Purpose of this assignment
The purpose of this assignment is assess the trainees' knowledge and skills when it comes to designing and implementing network management.

Design and practical must used Packet Tracer

Scenario

DELITECH is a Small Business Enterprise providing computing services to local SMEs including Networking Management, Planning, Setup, Configurations, Testing and Security in Dubai. DELITECH prides itself on providing unrivalled support to its customers. Due to the recent business growth, DELITECH has recently acquired new Middle East Headquarters in Bahrain. DELITECH therefore requires someone who can setup and manage their network at their new Middle East HQ in Bahrain. DELITECH is very conscious about security, especially Network Security for their new Middle East HQ in Bahrain.

You have recently been employed by DELITECH as their Middle East Junior Network Manager and your principal duties include among other things setting up and managing their network at their new Middle East HQ in Bahrain including implementing a secure working environment in terms of their Network Management. Your task as their newly appointed Middle East junior network manager is to create and manage a prototype network as a proof-of-concept. Your prototype must be accompanied by written material that explains how your networking management solution can increase security and scalability as well as address issues of reliability and availability.

The solution must have suitable technology to support a wired LAN, as well as a secure connection to the Network Cloud via Internet.

• The network must support over 200 workstations over 5 different sub-networks.
• While each system will be a conventional wired LAN, it must also support wireless access for a range of mobile devices.
• Each system is connected to a Core Router or Multilayer Switch, which will provide the secured access to the Internet.
• In addition, all the services running on network will be configured at Network Cloud, there will be an Infrastructure Server and a File Storage server which will be stored over the Network Cloud.
• The Gateway Firewall be configured to provide a robust and secured network. All the network management will be done through the firewall configure at the gateway of network.
• All the workstations in the prototype will communicate through copper cable only. OFC can be used for communication between network devices.

Also, you need to provide a network security drill using any management tools to identify risk and its mitigation. Your demonstration for the security of DELITECH's network must align with the design you have planned and implemented.

Task 1

• Prepare a report covering the following topics:
1. Conduct a detailed analysis of Networking Management principles and concepts covering devices needed to implement a secure network.
2. A discussion of the importance of Networking Management principles in regards to security protocols and associated technologies that will enable a secure network for DELITECH's new Middle East HQ in Bahrain.

• Design and implement a network prototype using a network simulator (or Lab devices), which incorporates high levels of Network Security features with the following requirements:

1. Firewall Configuration
2. Switches configuration
3. Routers configuration
4. VoIP Configuration (IP Telephony)
5. WAN Links
6. Devices configuration
7. IP addressing
8. Subnetting

Guidance/notes to trainees
Please review the grading criteria for more details on the expected elements and topics that needed to be included

Evidence for this task
Present your answer in the form of a presentation. Submit a softcopy and a hardcopy.
A working prototype (using either a network simulator or lab devices) along with the configuration.

Task 2

Provide the following written material as a formal report.

• A detailed explanation of how the Network Protocols will work with IPv4 or IPv6 in regards of network management
• In depth analyse of any two network protocols
• Justification about the selection of networking protocols for the prototype to help facilitate a secure networking management environment.

Guidance/notes to trainees
Refer to the unit's assessment criteria for guidance.

Evidence for this task
A formal individual written report (saved in either a Microsoft® Word® or PDF format). All work must be supported with research and referenced using the Harvard referencing system. Please also provide a bibliography using the Harvard referencing system. The recommended word limit is 1,000- 1,500 words, although you will not be penalised for exceeding the total word limit.

Task 3

Using any Network Security Management tools demonstrate the following:

• Creating Network Object Group
• Content Filtering (url and app)
• IP Filtering
o User based
o Bandwidth management
o Time scheduling
• Policy defining for Risk Management
• Risk Identification and Avoidance
o Object Blocking

Justify the importance of network Security management in your network.

Guidance/notes to trainees
Refer to the unit's assessment criteria for guidance.

Evidence for this task
Screenshot or screen recording of your network security management. PowerPoint Presentation for justification.


Attachment:- Networking Management Solution.rar

Reference no: EM132483494

Questions Cloud

Calculate by how much each partners account will increase : Calculate by how much each partner's account will increase or decrease as a result of a Bautista, Pineda, and Feliciano have average capital
Hypothesis of zero difference between two population : If a 90% confidence interval for the difference in the two population means contains zero, then the null hypothesis of zero difference
What were net realizable values of the accounts receivable : An account receivable from Stuart Company of $150. The net realizable values of the accounts receivable before and after the write off were
Distributed in population-collinsville construction company : Collinsville Construction Company purchases steel rods for its projects. Based on previous tests, Claude Carter, Quality Assurance Manager, has recommended
Unit 35 Networking Management Solution : Unit 35 Networking Management Solution Assignment help and solution, Level 5 Pearson BTEC HND in Computing - assessment writing service
How much would sinads account increase or decrease : By how much would Sinad's account increase or decrease (indicate a decrease by placing parenthesis), assuming a profit of P720,000
What is the probability that all are introverts : 80% of all marketing personnel are extroverts, whereas about 70% of all computer programmers are introverts. Rounding your answer to three decimal places.
Create the current and long-term liability sections : Create the current and long-term liability sections of the December 31, 2019 balance sheet. Trade accounts payable on that date were $252,000
What is the probability that 10 or more are extroverts : Approximately 80% of all marketing personnel are extroverts, whereas about 70% of all computer programmers are introverts. Round answers to three decimal places

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd