What kind of naming structure would you give to servers

Assignment Help Computer Networking
Reference no: EM13478227

Mr. Smith is the Director of IT at a law firm located in downtown Chicago. He needs to plan for a network upgrade. He has decided that he would like to have a network analysis done before the upgrade so that he can find out which systems would require upgrades and to create a strategy to present to the senior partners that will include return on investment.

The law offices occupy four floors of a high-rise building. The customer is experiencing network latency, especially in the Accounting department and in Human Resources, which both reside on the 32nd floor. The director of the Accounting department has expressed concerns about the security of his files. The Research, IT, and Corporate Administration departments all share the 33rd floor. The senior and junior partners and their support staff occupy the 35th floor, and the 36th floor is used for reception and conference rooms. The firm has decided that video conferencing is an essential component of its business and is looking to implement video conferencing as soon as possible so it can communicate with two new satellite offices that will be occupied in six months.

The firm has one network segment for each floor, but has been experiencing latency. Each floor except the 36th has 10 to 20 printers. Each floor has a 100Mb uplink to the Data Center on the 33rd floor. There are approximately 50 PCs on the 36th floor, 150 PCs on the 35th floor, and 40 PCs on both the 32nd and 33rd floors. The servers for each department reside on their respective floors. Mr. Smith is concerned about network security and wants a recommendation to secure traffic of three specific departments: Human Resources, Accounting, and Corporate Administration.

Answer these questions:

What type of testing program (Prototype or Pilot) would you recommend to test the video conferencing among the remote offices? Justify your choice of one testing program over the other.

What type of naming structure would you give to servers, network devices and end nodes in this network? Provide a few examples.

Explain why Mr. Smith's existing network does not provide adequate security for the data in each department. How do you want to optimize the network?

Explain to Mr. Smith the function of each network device.

Recommended a prototype or pilot testing method and explained reasons for choice.

Defined a naming convention for servers, network devices, end nodes, etc. Included examples for each.

Detailed reasons that the current environment was inadequate for each of the departments.

Proposed network optimization and offered reasons.

Described the functions of the various network devices, in laymen's terms.

Answered the question regarding how requirements of key departments impact the network design.

Reference no: EM13478227

Questions Cloud

Dbe the role of hospitals and other health care : public health surveillance and prevention efforts in the u.s. reflect the involvement of numerous health care providers
Kathleen dancewear co has bought some new machinery at a : kathleen dancewear co. has bought some new machinery at a cost of 1250000. the impact of the new machinery will be felt
Estimate the expected real rate of return on ten- year u s : a thirty- year u. s. treasury bond has a 4.0 percent interest rate. in contrast a ten- year treasury bond has an
Financial statement analysis our purpose this week learning : financial statement analysis our purpose this week learning how to measure the performance of companies by analyzing
What kind of naming structure would you give to servers : mr. smith is the director of it at a law firm located in downtown chicago. he needs to plan for a network upgrade. he
Yuve been offered following investment opportunity if you : you have been offered the following investment opportunity if you invest 16000 today you will receive 4000 two years
How has mobile computing changed shopping behavior of : your response should be at least 200 words in length. you are required to use at least your textbook as source material
The companys financial experts say that the appropriate : 21st century cat is a film producing company which is contemplating the productionof a new film. they estimate thatthe
Analyze whether risk assessment methodology is quantitative : above is the global finance inc. gfi network diagram. a hypothetical company gfi has grown rapidly this past year and

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd