Create a diagram showing the overall network

Assignment Help Computer Networking
Reference no: EM13752286

Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment:

Overall network diagram: One (1) page
Datapath diagrams: Three (3) pages (one for each diagram)
Write-up: six to ten (6-10) pages

Part 1: Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you've designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:

Follow the access, core, distribution layer model.

Include at a minimum:
Authentication server (i.e. Microsoft Active Directory)
Routers
Switches (and / or hubs)
Local users
Remote users
Workstations
Files share (i.e. CIFS)
Mail server
Web servers (both internal and external)
Firewalls
Internet cloud
Web proxy
Email proxy
FTP server (for internal-to-external transport)

Explain each network device's function and your specific configuration of each networking device.

Design and label the bandwidth availability or capacity for each wired connection.

Part 2: Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Local user sends email to a Yahoo recipient.

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.

Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.

Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.

Explain how your overall design protects the organization from both inside and outside attacks. Give examples.

Explain how your layered design compensates for possible device failures or breaches in network security.

Determine whether any possible bottlenecks exist in your design.

Explain how to make the file transfer process more secure.

Part 3: Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13752286

Questions Cloud

Reasons for changes in beta : A Beta factor represents risk in a financial instrument or commodity. Explain the reasons for changes in beta and explain if one should be more concerned with a negative versus positive factor.
Understand the components of the cost of capital : Finance managers must understand the components of the cost of capital. The focus here is on on the cost of equity capital. Since capital, or money, is a limited resource to a business, finance managers may need to raise capital to fund projects t..
Develop at least three methods to monitor strategic plan : Develop at least three methods to monitor and control your proposed strategic plan, being sure to analyze how the measures will advance organizational goals financially and operationally.
Write a paper that addresses advantages of usa patriot act : Write a 1,050- to 1,200-word paper that addresses advantages and disadvantages of authorizing the USA Patriot Act of 2001 as a permanent change to American statutory authority.
Create a diagram showing the overall network : Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you've designed from the user or endpoint device to the Internet cloud
Find a symbolic representation for the function f : The charges for renting a moving van are $50 for the first 20 miles and $8 for each additional mile. Assume that a fraction of a mile is rounded up. (i) Determine the cost of driving the van 88 miles. (ii) Find a symbolic representation for the funct..
Exposure risk of business ventures : We are discussing the use of derivatives to reduce the exposure risk of business ventures.
What does the brand promise recommendation reveal : What are the advantages/disadvantages of an observation study for this research? 3. If you were designing such an observation study, what would you direct researchers to record/look for/listen for?
International investment portfolio : If you were planning your international investment portfolio, what regions would you explore?

Reviews

Write a Review

 

Computer Networking Questions & Answers

  What is the type of block of the abbreviated ipv6 address

Given the following IPv6 addresses in hexadecimal colon notation, answer the following questions. Where applicable leave your answers in fully expanded hexadecimal colon notation.

  What information is contained in the websites of cms

What information is contained in the websites of CMS, JC, CARF, and CLIA?What information is contained in the websites of CMS, JC, CARF, and CLIA?

  Give three network addresses to satisfy constraints

Subnet 3 is required to support up to 16 interfaces. Give three network addresses (of the form a.b.c.d/x) which satisfy these constraints.

  Adoption of new technology by the organisational employees

The cloud solutions are not well formulated at the moment due to some misunderstanding of what the term actually means. Describe the type of cloud services available, the benefits and disadvantages of each solution - maximise the adoption of new ..

  Storage systems increasingly rely on the internet

Storage systems increasingly rely on the Internet infrastructure as a transport medium. What are the advantages of this approach? What problems are present in terms of security and reliability?

  What are some merits and demerits of using centralized

question 1. when working on a design what are some of the typical business goals you can expect to find for todays

  Provide an information security assessment

Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind et al, and the ASD Cloud Computing Security Considerations as your primary references. This assessment should be no m..

  Aloha network

In a pure ALOHA network with G=1/2, how is the throughout affected in each of the subsequent cases?

  At the end of the report there must be a section for works

each student will choose one topic either from the following list or something they have a particular interest in.

  Evaluate the light from the surface or object

Diffusing surfaces are those that possess surface colour. Their colour attributes come from diffuse reflection and their geometric attribute is glossiness from specular reflection. Their colour attributes are described in terms of lightness, hu..

  Which of the given is a cisco ios feature which can collect

question which of the following is a cisco ios feature that can collect timestamps of traffic sent between a particular

  Determine mean time to spend frame to another station

Determine the mean time to spend frame of 1000 bits to another station, measured from beginning of transmission to end of reception? Suppose propagation speed of 100 m/μs.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd