Create a diagram showing the overall network

Assignment Help Computer Networking
Reference no: EM13752286

Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment:

Overall network diagram: One (1) page
Datapath diagrams: Three (3) pages (one for each diagram)
Write-up: six to ten (6-10) pages

Part 1: Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you've designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:

Follow the access, core, distribution layer model.

Include at a minimum:
Authentication server (i.e. Microsoft Active Directory)
Routers
Switches (and / or hubs)
Local users
Remote users
Workstations
Files share (i.e. CIFS)
Mail server
Web servers (both internal and external)
Firewalls
Internet cloud
Web proxy
Email proxy
FTP server (for internal-to-external transport)

Explain each network device's function and your specific configuration of each networking device.

Design and label the bandwidth availability or capacity for each wired connection.

Part 2: Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Local user sends email to a Yahoo recipient.

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.

Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.

Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.

Explain how your overall design protects the organization from both inside and outside attacks. Give examples.

Explain how your layered design compensates for possible device failures or breaches in network security.

Determine whether any possible bottlenecks exist in your design.

Explain how to make the file transfer process more secure.

Part 3: Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13752286

Cyber law or internet law

The director of your department has requested that you conduct some research on the topic of cyber law or Internet law. He has asked you to draft a memo including the followin

Draft a enterprise-wide telecommunications network

draft a top-level design of an enterprise-wide telecommunications network for a fictitious company, including LAN topology and WAN infrastructure that will handle a constant

What are the problems with existing protocols with satellite

Differentiating among the protocols used in wireless (Media Access Control layer, FDMA, TDMA, and CDMA), what are the problems with existing protocols with satellite communi

One disadvantage of using layered protocol structures

In a layered protocol structure, both network services and network protocols are defined. Should the network services and the network protocols be coupled or decoupled? Expl

Derive general expression for width of bit propagation speed

Derive a general expression for the width of a bit in terms of the propagation speed s, the transmission rate R, and the length of the link m.

Provide all specific details regarding packet information

Describe the need of encapsulation. Elaborately describe the process of encapsulation and creation of packets as a result of encapsulation. Analyze and provide all specific de

Create diagrams that illustrate remote employee connection

Your manager has tasked you to create two network diagrams that illustrate the Remote Employee Connection options for VPN connectivity. These diagrams will assist IT in sett

What is the value of the network on a college campus

What is the value of the network on a college campus? Consider students, faculty, and staff perspectives in your answer. What might be some of the tangible and intangible cost

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd