Access options from the home to an isp

Assignment Help Basic Computer Science
Reference no: EM131330346

Your manager has tasked you with creating a Remote Employee Connection guide for IT. This guide will assist IT in setting up remote (work-from-home) employees to access the company's Intranet. These employees will use a VPN connection from their PC in home to a remote VPN server located in the employee's work campus. 

Create a 2- to 3-page guide using Visio® including the following: 

  • WAN access options from the home to an ISP
  • WAN access options from the work campus to another ISP (assuming a different ISP is used)
  • An end-to-end (from PC to VPN server) network diagram showing routers, switches, hosts and connections. Show on the diagram your choice of one of options considered; i.e., WAN access from home, or WAN access from work.
  • Major TCP/IP protocols with which the home PC is involved, from the moment it boots up until its first IPv4 packet reaches the VPN server.
  • Illustration of how the first IPv4 is forwarded through the network, showing:
    • Source and destination IPv4 addresses
    • Source and destination MAC addresses for the initial 2 hops in the header of the packet
    • Entries in the routers' forwarding tables
  • Major routing protocols involved in building the forwarding tables
  • Repeat the last two items in the case of IPv6

Note: It is recommended that Visio® be used to create network diagrams for the presentation.

Reference no: EM131330346

Questions Cloud

Describe the game as a game in strategic form : Describe the game as a game in strategic form and find all its Nash equilibria.- Describe the new situation as a game in strategic form and find all its Nash equilibria.
Explain the revenue principle and its implication : Explain the revenue principle and its implication on the financial statements. Define the matching principle and why it is critical in the preparation of the accrual-based financial statements.
What are all the nash equilibria of the game : Describe this situation as a strategic-form game, in which each driver chooses the route he will take.- What are all the Nash equilibria of this game? At these equilibria, how much time does the trip take at an early morning hour?
Comment on formulation of the null and alternate hypotheses : Comment on the formulation of the null and alternate hypotheses. State whether you believe the research information cited supports or rejects the null hypothesis.
Access options from the home to an isp : Your manager has tasked you with creating a Remote Employee Connection guide for IT. This guide will assist IT in setting up remote (work-from-home) employees to access the company's Intranet. These employees will use a VPN connection from their P..
Write a paragraph for each quotation : ''here's the smell of the blood still.All the perfumes of Arabia will not seeten this title hand''.‘'He has no children. All my pretty ones? Did you say all? O hell-kite!All?what,all my pretty chickens and their dam at one full swoop?''''Then live,..
Inventory of finished products : Develop a high-level class diagram that shows the relationships among a manufacturer's inventory of finished products in its warehouses. The company has many warehouses that are managed by the inventory-control supervisor. Each warehouse contains ..
What limitations are evident in cera individual performance : What limitations are evident in CERA's individual performance measurement, taking into account its organisational strategy and recent developments in this HRM practice as reported in professional literature provided in Topic 4
Explain major differences between equity and debt financing : Explain the major differences between equity and debt financing, and discuss the primary ways in which each would affect the future of the partners' business.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compare your er model with the answer er model

Compare your ER model with the answer ER model and justify any differences found.

  Osi security architecture

1. What is the OSI security architecture? 2. What is the difference between passive and active security threats? 3. List and briefly define categories of passive and active security attacks.

  Bellman-ford algorithm for finding shortest paths

Suppose that a directed graph G has the property that every shortest path from the starting vertex s to every other vertex has at most four edges. What would this fact imply about the running time of the Bellman-Ford algorithm for finding shortest..

  In what ways do different types of seismic waves differ

In what ways do different types of seismic waves differ from waves on water.

  Traditional data warehouse and a data mart

Identify the major differences between a traditional data warehouse and a data mart? Explain the differences between the traditional data warehousing process compared to newly designed data warehouse in less than 90 days?

  Find a difficult task that network will be unable to learn

Try to find a difficult task that the network will be unable to learn no matter how much it is taught.

  Assume that each item contains only a search key

Assume that each item contains only a search key.

  Application-information security laws

You probably obey most laws; however, you may not view some seriously enough to obey them. For example, you might be someone who is comfortable going faster than the posted speed limit. Is it all right to ignore some laws because they do not seem ..

  Normalization crucial for effective database design

Discuss the relationship between data redundancy and normalization. What are the consequences if databases are not normalized? What problems is normalization addressing? Why is normalization crucial for effective database design and development?

  Large role in the outcome of the second world war

Encryption and decryption played a large role in the outcome of the Second World War. After the war and for the next few decades, encryption played little or no role in the life of the average person. But over the last couple of years, encryption ..

  Determine whether these parameters should have default value

Use the find Globals () function available in code tools to check that the function is not relying on any global variables.

  Determining the efficiency analysis

Baryla Inc. manufactures high quality decorator lamps in a plant located in eastern Tennessee. Last year the firm had sales of $93 million and a gross profit margin of 45 percent.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd