What cabling would be required to create the lans

Assignment Help Computer Networking
Reference no: EM131941809

Assignment: Maggie's Electronics - Network Design

Maggie's Electronics is a manufacturing firm that has recently undergone some expansion. Originally, they had one location with 2 buildings: 1 office building and a manufacturing plant but since have added another location. The original location of the company is in Dallas with 150 computers in the office building and 50 computers in the plant. The new location is in Phoenix with one office building that will house 75 computers. Currently, Dallas is running 10BaseT within each building. The networks at this location are heavily overloaded. In Phoenix, there is no network installed at this time; the building is an older structure and did not come with any network infrastructure. There is currently no network connection between the buildings in Dallas, but this is one objective in building the new network. There is also no WAN connection between Dallas and Phoenix, but this is another objective of the company.

Describe the wired network you would recommend by providing answers to the following questions. Make sure to number your responses to coincide with the questions presented by design section. You must document all assumptions and explain why you have designed the network in this way.

Access Layer Design

1. What is the speed and specification of the network recommended for each location?

2. What cabling would be required to create the LANs? Provide the price per foot and place to purchase (website link) the cable. You do not need to specify the amount of cable to buy.

3. What network devices do you recommend the company use to create the LANs?

4. How many devices will be needed? You will need to consider the number of ports on the devices you are recommending to answer this question. Provide price and place to purchase the specific equipment you recommend (website link).

5. If the organization needs a data center or e-commerce solution, where would they be located?

6. What assumptions did you make in analyzing the needs of the company and designing the access layer of the network?

Distribution Layer Design

1. What network devices do you recommend the company use to connect the LANs within the buildings? Provide price and place to purchase the specific equipment you recommend (website link).

2. What cabling would be recommended to connect the LANs? Provide the price per foot and place to purchase (website link) the cable. You do not need to specify the amount of cable to buy.

3. What assumptions did you make in analyzing the needs of the distribution layer?

Core Layer Design

1. What network devices would be required to create the core network? Provide price and place to purchase the specific equipment you recommend (website link).

2. What cabling is required for creating the recommended core network? Provide the price per foot and place to purchase (website link) the cable. You do not need to specify the amount of cable to buy.

3. What assumptions did you make in analyzing the needs of the core layer?

WAN Design

1. What type of WAN connection (be specific to the type of technology and speed) should the company use to connect its two locations?
2. What assumptions did you make in designing the WAN?

Belmont State Bank

Read the mini case for Belmont State Bank on page 334 of your textbook. You are to then perform a risk assessment. The steps of the risk assessment include:

1. Develop risk measurement criteria
2. Inventory IT assets
3. Identify threats
4. Document existing controls
5. Identify improvements

Make sure your answers are numbered based on the question presented.

I. Belmont State Bank Belmont State Bank is a large bank with hundreds of branches that are connected to a central computer system. Some branches are connected over dedicated circuits and others use Multiprotocol Label Switching (MPLS). Each branch has a variety of client computers and ATMs connected to a server. The server stores the branch's daily transaction data and transmits it several times during the day to the central computer system. Tellers at each branch use a four-digit numeric password, and each teller's computer is transaction-coded to accept only its authorized transactions. Perform a risk assessment.

Reference no: EM131941809

Questions Cloud

Describe factors that account for the misuse of these funds : Consider different concrete arguments for and against lending to developing countries by the IMF and the World Bank. Cite specific examples of such arguments.
Determine the gain or loss on redemption of the bonds : If the Amortization of Discount/Premium is recorded up to date, determine the gain or loss on redemption of the bonds
Probability that they have more than 100 volunteer hours : a. For a randomly selected in-state student, what is the probability that they have more than 100 volunteer hours?
System requirement of open-source intrusion detection system : CSD3999 Computer Science Project - Assessing the performance and system requirements of open-source intrusion detection systems
What cabling would be required to create the lans : What cabling would be required to create the LANs? Provide the price per foot and place to purchase (website link) the cable.
Dealer mean significantly greater than national average : Is the dealer's mean significantly greater than the national average of 29,493 miles for 2-year leases? Using the 10 percent level of significance
Compute the price and efficiency variances : Question - Price and efficiency variances - Compute the price and efficiency variances. Compute the flexible-budget variance
What decision would you suggest regarding raises for tellers : Tellers, what decisions would you suggest regarding raises for the tellers? Explain and discuss your answer. Must be at least 500 words.
Performing the chi-square test for independence : 1. What are the assumptions/requirements for performing the Chi-Square Test for Independence?

Reviews

Write a Review

Computer Networking Questions & Answers

  Design network infrastructure case study

Discuss what changes have to incorporated to make the switch to a fully IPv6 environment, the commands that need to be configured on the devices

  Define a computer virus

Anti-virus software is used to keep your computer free from viruses. Define a computer virus.

  Headless system in a remote area

You are remoted in to a headless system in a remote area. You have no physical access to the hardware and you need to perform an OS installation.

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Probability of collision in computer network

In CSMA/CD, after the 6th collision, what is the probability that a node chooses k=7? The result k=7 corresponds to a delay of how many seconds on a 10 Mbps Ethernet?

  Explain the events that can change the state of the system

Explain the events that can change the state of the system and write a programming code to generate 100 random variates according to exponential distribution and store them in an array.

  What are some merits and demerits of using centralized

question 1. when working on a design what are some of the typical business goals you can expect to find for todays

  Social networking site to gain information

Discuss how a cyber warrior can use a social networking site to gain information?

  Fiction corporation is a large national retail chain of

fiction corporation is a large national retail chain of 10000 employees and 500 retail outlets. fiction is moving its

  How big is the mac address space

How big is the MAC address space? The IPv4 address space? The IPv6 address space?

  Describe the benefits and drawbacks

You are required to choose an infrastructure model that you think will achieve the DTGOV Roadmap; Describe the benefits and drawbacks, excluding costs, of your chosen infrastructure model.

  Network security

A firewall is generally set up to protect a particular network or network component from attack, or unauthorized penetration, by outside invaders. However, a firewall also may be set up to protect vital corporate or institutional data or resource..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd