Define the term enterprise network, Computer Network Security

Assignment Help:

a) Define the term "Enterprise Network".

b) Briefly discuss the similarity and differences between a switch and a router.

c) A company XYZ has been renting the 1st Floor of a building for the past few years. The 1st Floor consists of 4 rooms and the company has 4 Departments (Sales, Marketing, Design and Management). Company XYZ has now decided to set-up a network. The following user requirements have been identified:

a. Sales Department (20 Users)

Network Usage: Email per user: 10 Kb/s, Database queries per user: 1500 b/s, Internet per user: 0.5 Kb/s

b. Marketing Department (10 Users)

Network Usage: Email per user: 0.1 Mb/s, Database queries per user: 1 Kb/s, Internet per user: 2 Kb/s

c. Design Department (5 Users)

Network Usage: Email per user: 500 b/s, File Transfer per user: 5 Kb/s, Internet per user: 2 Kb/s

d. Management Department (15 Users)

Network Usage: Email per user: 2 Kb/s, Internet per user: 2 Kb/s

Note that 10% network overhead and a safety margin of 60% for future expansion has not been accounted for.

Given that the company has 3 servers: An Email Server which is found in the Sales Department, a Database Server which is also found in the Sales Department and a FTP server found in the Design Department, carry out the following:

a) Give a logical network design for company XYZ.

b) Justify the types of medium to be used as links between each department.

c) Justify the network equipments that used to building the network.

d) Specify the Internet Connection Speed that would be needed from an ISP.

d) Using an example, explain what is meant by Access, Distribution and Core Layers of a Geographical Scope.


Related Discussions:- Define the term enterprise network

Explain the approaches to lric modeling, (a) Cost allocation mechanisms ar...

(a) Cost allocation mechanisms are important when it comes to establishing other aspects of inter-firm compensations and how these are transferred to the users. There are two pri

Introduction to security and personnel, INTRODUCTION TO SECURITY AND PERSON...

INTRODUCTION TO SECURITY AND PERSONNEL When implementing information security, there are several human resource issues that should be addressed. They are •    Positioning and n

Explain any two types of security policies, Question 1 Explain any two typ...

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

Asymmetric encryption-cryptography, Asymmetric Encryption Asymmetric encr...

Asymmetric Encryption Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is freque

Provide a labelled drawing of a standard serial port, Question 1: (a) W...

Question 1: (a) With the help of a diagram show the basic structure of a computer system. (b) Explain as fully as you can each of the parts mentioned above. (c) What are

Explain the concept behind digital signature, Question: a) Differenti...

Question: a) Differentiate between ‘Gross Settlement' and ‘Multilateral Net Settlement' providing suitable examples where necessary to support your answer. b) Differentia

Audit or review of the information security issues, Using the selected appr...

Using the selected approach, you should then conduct an audit or review of the information security issues associated with the use of computing facility and report on the findings.

What are the intermediate systems and how they work, Question: a) Expla...

Question: a) Explain what the following intermediate systems are and how they work? i. Repeater ii. Bridge b) A service is formally specified by a set of primitives (op

Http request message, Question (a) Consider that you enter the subsequent ...

Question (a) Consider that you enter the subsequent URL in the address bar of a popular web client and that both the server and client accepts HTTP version 1.1. i. What can be

Explain the random key distribution, Q. Explain the random key distribution...

Q. Explain the random key distribution? The triple key management mechanisms ensure a better and complete security solution using the random key distribution mechanism. In this

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd