Define the term enterprise network, Computer Network Security

Assignment Help:

a) Define the term "Enterprise Network".

b) Briefly discuss the similarity and differences between a switch and a router.

c) A company XYZ has been renting the 1st Floor of a building for the past few years. The 1st Floor consists of 4 rooms and the company has 4 Departments (Sales, Marketing, Design and Management). Company XYZ has now decided to set-up a network. The following user requirements have been identified:

a. Sales Department (20 Users)

Network Usage: Email per user: 10 Kb/s, Database queries per user: 1500 b/s, Internet per user: 0.5 Kb/s

b. Marketing Department (10 Users)

Network Usage: Email per user: 0.1 Mb/s, Database queries per user: 1 Kb/s, Internet per user: 2 Kb/s

c. Design Department (5 Users)

Network Usage: Email per user: 500 b/s, File Transfer per user: 5 Kb/s, Internet per user: 2 Kb/s

d. Management Department (15 Users)

Network Usage: Email per user: 2 Kb/s, Internet per user: 2 Kb/s

Note that 10% network overhead and a safety margin of 60% for future expansion has not been accounted for.

Given that the company has 3 servers: An Email Server which is found in the Sales Department, a Database Server which is also found in the Sales Department and a FTP server found in the Design Department, carry out the following:

a) Give a logical network design for company XYZ.

b) Justify the types of medium to be used as links between each department.

c) Justify the network equipments that used to building the network.

d) Specify the Internet Connection Speed that would be needed from an ISP.

d) Using an example, explain what is meant by Access, Distribution and Core Layers of a Geographical Scope.


Related Discussions:- Define the term enterprise network

Describe how ipsec provides data source authentication, Question: (a) ...

Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite

Address resolution , Mapping between a hardware address and a protocol addr...

Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another dev

Provide a labelled drawing of a standard serial port, Question 1: (a) W...

Question 1: (a) With the help of a diagram show the basic structure of a computer system. (b) Explain as fully as you can each of the parts mentioned above. (c) What are

Network intrusion system, In this work a network intrusion system (package)...

In this work a network intrusion system (package) must implement based on high interaction honeypots. There are two honeypots with different platforms (ubuntu and windows server 20

The major decision hierarchy for disclosing security problem, QUESTION ...

QUESTION The major decision hierarchy for disclosing security problems is if the problem is with the product owned by the business or if it is used by the business. Although th

Negative cycle algorithm in minimum cost flows, QUESTION: (a) Show the...

QUESTION: (a) Show the Negative Cycle Algorithm in Minimum Cost Flows. (b) List the steps added in finding a Negative Cycle. (c) Apply Dijkstra's algorithm on the subs

Attackers motives behind the cyber attack, Attacker's Motives behind the Cy...

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

Explain web defacement, QUESTION (a) Compare and contrast phishing and ...

QUESTION (a) Compare and contrast phishing and pharming attacks (b) Nowadays, web defacement may not always be visual (i) Explain web defacement (ii) What is the main

Packet filtering firewall-stateless packet filtering, Stateless Packet Filt...

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

Risk determination, Risk Determination For purpose of relative risk asse...

Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd