Define the term enterprise network, Computer Network Security

Assignment Help:

a) Define the term "Enterprise Network".

b) Briefly discuss the similarity and differences between a switch and a router.

c) A company XYZ has been renting the 1st Floor of a building for the past few years. The 1st Floor consists of 4 rooms and the company has 4 Departments (Sales, Marketing, Design and Management). Company XYZ has now decided to set-up a network. The following user requirements have been identified:

a. Sales Department (20 Users)

Network Usage: Email per user: 10 Kb/s, Database queries per user: 1500 b/s, Internet per user: 0.5 Kb/s

b. Marketing Department (10 Users)

Network Usage: Email per user: 0.1 Mb/s, Database queries per user: 1 Kb/s, Internet per user: 2 Kb/s

c. Design Department (5 Users)

Network Usage: Email per user: 500 b/s, File Transfer per user: 5 Kb/s, Internet per user: 2 Kb/s

d. Management Department (15 Users)

Network Usage: Email per user: 2 Kb/s, Internet per user: 2 Kb/s

Note that 10% network overhead and a safety margin of 60% for future expansion has not been accounted for.

Given that the company has 3 servers: An Email Server which is found in the Sales Department, a Database Server which is also found in the Sales Department and a FTP server found in the Design Department, carry out the following:

a) Give a logical network design for company XYZ.

b) Justify the types of medium to be used as links between each department.

c) Justify the network equipments that used to building the network.

d) Specify the Internet Connection Speed that would be needed from an ISP.

d) Using an example, explain what is meant by Access, Distribution and Core Layers of a Geographical Scope.


Related Discussions:- Define the term enterprise network

Explain rsa encryption, (a) Describe RSA encryption. (b) For an RSA encr...

(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

Explain the operation of the matchmaker middle agent, Question 1: (a) E...

Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to

What is information security, What is information security Information s...

What is information security Information security protects information (and facilities and systems which store, use and transmit it) from a broad range of threats, in order to p

Define full-duplex., A  full-duplex (FDX) , accepts communication in both...

A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

What is the benefit of adopting a password aging policy, QUESTION (a) H...

QUESTION (a) Hashing and salting is commonly used as password storage techniques for most applications. Describe how hashing and salting enable secure storage of password (b

Analysis phase in the building-block approach, QUESTION: a) Explain fou...

QUESTION: a) Explain four issues that are generally addressed in the Needs Analysis phase in the building-block approach to network design. b) Sketch a typical hybrid star-b

Business needs-information security, BUSINESS NEEDS Information security...

BUSINESS NEEDS Information security performs four main functions for an organization. 1. Protects the ability of organization to function. 2. Enables safe operation of applicat

Explain the various costs of quality, Problem 1: Show what are the bene...

Problem 1: Show what are the benefits of project quality management? • Customer satisfaction • Reduced cost • Increased competitiveness • Fulfilment of social and economic r

Describe the procedure known as byte stuffing, Question: (a) For the b...

Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1

Fragment identification, FRAGMENT IDENTIFICATION: IDENT field in every...

FRAGMENT IDENTIFICATION: IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd