Define the term enterprise network, Computer Network Security

Assignment Help:

a) Define the term "Enterprise Network".

b) Briefly discuss the similarity and differences between a switch and a router.

c) A company XYZ has been renting the 1st Floor of a building for the past few years. The 1st Floor consists of 4 rooms and the company has 4 Departments (Sales, Marketing, Design and Management). Company XYZ has now decided to set-up a network. The following user requirements have been identified:

a. Sales Department (20 Users)

Network Usage: Email per user: 10 Kb/s, Database queries per user: 1500 b/s, Internet per user: 0.5 Kb/s

b. Marketing Department (10 Users)

Network Usage: Email per user: 0.1 Mb/s, Database queries per user: 1 Kb/s, Internet per user: 2 Kb/s

c. Design Department (5 Users)

Network Usage: Email per user: 500 b/s, File Transfer per user: 5 Kb/s, Internet per user: 2 Kb/s

d. Management Department (15 Users)

Network Usage: Email per user: 2 Kb/s, Internet per user: 2 Kb/s

Note that 10% network overhead and a safety margin of 60% for future expansion has not been accounted for.

Given that the company has 3 servers: An Email Server which is found in the Sales Department, a Database Server which is also found in the Sales Department and a FTP server found in the Design Department, carry out the following:

a) Give a logical network design for company XYZ.

b) Justify the types of medium to be used as links between each department.

c) Justify the network equipments that used to building the network.

d) Specify the Internet Connection Speed that would be needed from an ISP.

d) Using an example, explain what is meant by Access, Distribution and Core Layers of a Geographical Scope.


Related Discussions:- Define the term enterprise network

Function of key secrecy and algorithm secrecy in security, What is the func...

What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm

Security policies, implementing password policy in organisation

implementing password policy in organisation

Define multimedia and application of multimedia, Describe the salient featu...

Describe the salient features of the multimedia. Also explain the applications of it. Multimedia can be understood as follows: Multimedia is on the whole a media which makes

Explain the close procurement project process, Question 1: Why do we ne...

Question 1: Why do we need a Law of Contract? a Explanation Reasons to have a law of contract b Explain the close procurement project process - Explanation (causes,

Gateways, Gateways They transfer packets among network machines that h...

Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change

Functional areas in network management, Question 1 a) Explain how CSMA...

Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

Describe how a cellular network works, Problem 1 . Show various features of...

Problem 1 . Show various features of a 1G network Total three features for each feature of 1G Problem 2. Describe how a cellular network works with functional block diagram

Ip datagrams, on LAN,where are IP datagrams transported?

on LAN,where are IP datagrams transported?

Security goals, what is relation ship between computer security goals?

what is relation ship between computer security goals?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd