Access the accounting database from their home

Assignment Help Computer Networking
Reference no: EM13803698

Suppose the image below is your company's network diagram after a merger and you have recently added access controls to your network. The CSO would like to:

  • Change the internal network address to incorporate variable length subnet mask (VLSM) with EIGRP routing protocol.
  • Set up all of the accountants on a separate VLAN.
  • Create a VPN connection to allow accountants to access the accounting database from their home.

Write a two to three (2-3) page paper in which you:

  1. Re-create the diagram provided in the assignment summary using VLSM, through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. (The starting address is 172.16.0.0.) Note: The graphically depicted solution is not included in the required page length. 
  2. Specify the commands that you would use to set up the routers to use EIGRP.
  3. Outline the requirements to set up a VLAN and VPN access for the accountants.
  4. Specify the VLAN assignment, and incorporate a Spanning Tree protocol into your design to eliminate loops.

2230_NETWORK.png

Reference no: EM13803698

Questions Cloud

Write a draft paper about deep sleep : Write a draft paper about Deep sleep.
Describe three to five observation of the success of agency : Describe your final three to five (3-5) observations about the success of the agency, highlighting the value of the agency to U.S. citizens, its success at meeting its goals, and areas where it can improve.
Write a research paper on middle east culture and economy : Write a research paper on Middle East culture, economy, religion, terrorism, marriage, etc. You can cover multiple topics for any number of countries in the Middle East.
Give examples of elements fiction and non fiction : Gave two examples of each of the elements fiction and non fiction from the text read character
Access the accounting database from their home : Change the internal network address to incorporate variable length subnet mask (VLSM) with EIGRP routing protocol. Set up all of the accountants on a separate VLAN. Create a VPN connection to allow accountants to access the accounting database from t..
Write a reflection on an art project : Write a reflection on an art project.
Write an essay about the movie x-man : Write an essay about the movie "X-man".
Campaign process in maintaining the two-party system : Analyzekey reasons why third parties have never been successful at the presidential level. Determine the role of the campaign process in maintaining the two-party system. Use examples to support your response.
Write an essay about the movie let the right one in : Write an essay about the movie "Let the right one in".

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Use the below mentioned parameters to setup the networks

use the below mentioned parameters to setup the networks that will be needed. please list the i networks used in each

  Find features and capacities for web server computer

Find out the features and capacities (RAM, disk storage, processor speed) that Amy should include in the Web server computer that she will require for her site.

  1how is a network layer protocol different from a transport

1.how is a network layer protocol different from a transport layer protocol?2.into which class of networks do the

  Why you think dynamically assigning ip addresses are useful

Is the IP address 192.168.12.254 a valid address for use by a computer connected directly to the Internet? Explain your answer. c) Is it possible to divide a class C network into 14 subnets with 15 computers connected to each sub network? Explain..

  A client-server environment

You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would y..

  Alter minix three to count sent processes

The assignment is to alter Minix 3 to count sent processes and print it into table saying who sent and who's receiving. He said we require place to store counts and then print in readable fashion.

  Question 1a describe the following security services

question 1a describe the following security services confidentiality availabilityb explain known plaintext attack?c

  Write four addresses broadcast and network number

How many networks will be available? Write down the four addresses (broadcast and network number) for network starting at 131.204.18?

  Write a description of the path a packet

Write a description of the path a packet takes across the Internet from destination A to destination B. What types of network devices does the packet pass through?

  Several network connections in the operation

By using a laptop computer along with a wireless connection into company’s local area network, you download a Web page from Internet. State all several network connections involved within this operation.

  Find data transmission rate in bits per second of system

Assume that the airliner carries 10,000 kg of those floppies at the speed of 1000 km/h over the distance of 5000 km. Determine the data transmission rate in bits per second of this system?

  Explain the terms latency response time and jitter and

write a 2- to 4-page paper that includes the following based on your organizationmiddot explain the importance

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd