Which should be on a separate vlan at each location

Assignment Help Computer Network Security
Reference no: EM133363659

Assignment:

1. An enterprise has a main branch and 7 branches located at different locations. Each location has 200 users each. You should plan for expansion in your design.

2. The main location has a server which is required to be accessed by all users in the other locations. The server is on its own VLAN.

3. The network should use either Class A, B or C private IP Addresses and is to be subnetted for the required number of networks and hosts.

4. There should be a wireless network in all 7 locations and that wireless network should be a separate subnet at each location.

5. The company has an enterprise VOIP phone system, which should be on a separate VLAN at each location with a phone gateway at the main location.

6. All buildings have network video surveillance and that should be a separate network as well.

7. There is a physical door access security system that uses badges for entry. This should be on a separate network at each location.

8. Internet access all comes through the WAN to the main branch and there is a firewall at this location.

9. There are no fiber facilities between these branches due to geographical distances. We will assume a T1 WAN has been setup.

Please provide labeled diagram(s) of your design as well as explanation. The diagram should be clearly labeled and explanation must include all VLAN IDs and IP subnetting schemes explained.

Reference no: EM133363659

Questions Cloud

Describe tcp-ip application-layer protocols : Describe the purpose of a network protocol and the layers in the TCP/IP architecture. Describe TCP/IP Application-layer protocols.
Determine the appropriate communications media : Determine the appropriate communications media and mode of data transport for the new network.
Discuss the evolution of cyber warfare russian : In your own words use reference material to discuss the evolution of cyber warfare Russian used against Ukraine since the beginning of the war in Feb 22.
What is the strength of each brand : What is the strength of each brand? Which did the article recommend? Which would you purchase based on how you use your computer?
Which should be on a separate vlan at each location : The company has an enterprise VOIP phone system, which should be on a separate VLAN at each location with a phone gateway at the main location.
Describe disadvantages for creamy ice if the organization : Identify and describe significant disadvantages for Creamy Ice if the organization were to change to using the Internet model.
Discuss the tcp-ip protocols in each layer of tcp-ip model : Discuss the TCP/IP protocols in each layer of the TCP/IP model with a partner. For each layer, write the names of at least two protocols.
What is a shipping profile : What is a shipping profile? Why is most business activity conducted today in hierarchical organizations rather than in markets?
What do you foresee when gathering cybersecurity data : What organizational challenges do you foresee when gathering cybersecurity data? How could these be overcome?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Considering the k-means algorithm

Considering the K-means algorithm, after current iteration,

  Peer entity authentication security service

Draw a matrix similar to the table presented in class that shows the relationship between security services and attacks - Peer entity authentication security service

  How must one-s privacy be legally protected or secured

What does privacy mean to you? Is privacy a right or a privilege? How should one's privacy be legally protected or secured, especially when using the Internet?

  Policies and fundamentals of cybersecurity

Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data

  Creates for system forensics investigators

Explain why you believe the trend of threats targeting large enterprises is rising and what you believe is the greatest tool these hackers have at their disposal. Provide a rationale.

  Discuss the network id and the host id of that address

You need to find the class of the IP address, the subnet mask, the network ID and the host ID of that address.

  Identify the risks of most critical systems for organization

Identify the Risks of the most critical systems for organization - this helps you to narrow down. For example Point of Sale or the Patient Health Information Management system could be most critical systems for some company.

  Describe the organization''s email privacy policy

Describe the organization's email privacy policy.

  Define physical secuirty and three types of threats

Define Physical secuirty and three types of threats related with physical security. Write down the steps in designing and choosing a secure site in detail.

  Operations of an atm machine

Simulate the operations of an ATM machine. First, the customer is prompted to enter his personal identification number pin (for this case study, we test only if this pin is formed by 4 digits, otherwise a message like "Invalid PIN, try again..." w..

  Analyze a method for consolidating core network services

Explain the key considerations behind establishing trust relationships between the two domains. Analyze a method for consolidating Core Network services.

  Evaluating the balance between security and accessibility

The amount and kinds of risks that organizations accept after evaluating the balance between Security and accessibility and applying the controls, is called

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd