Create a diagram showing the overall network

Assignment Help Computer Networking
Reference no: EM13752286

Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment:

Overall network diagram: One (1) page
Datapath diagrams: Three (3) pages (one for each diagram)
Write-up: six to ten (6-10) pages

Part 1: Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you've designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:

Follow the access, core, distribution layer model.

Include at a minimum:
Authentication server (i.e. Microsoft Active Directory)
Routers
Switches (and / or hubs)
Local users
Remote users
Workstations
Files share (i.e. CIFS)
Mail server
Web servers (both internal and external)
Firewalls
Internet cloud
Web proxy
Email proxy
FTP server (for internal-to-external transport)

Explain each network device's function and your specific configuration of each networking device.

Design and label the bandwidth availability or capacity for each wired connection.

Part 2: Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Local user sends email to a Yahoo recipient.

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.

Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.

Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.

Explain how your overall design protects the organization from both inside and outside attacks. Give examples.

Explain how your layered design compensates for possible device failures or breaches in network security.

Determine whether any possible bottlenecks exist in your design.

Explain how to make the file transfer process more secure.

Part 3: Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13752286

Describe concept of subnetting and subnet mask

Describe the concept of subnetting and concept of subnet masks. Why do we utilize subnetting? How do we know which bits are used to recognize network?

What is the internet and how does it work

What is the internet and how does it work?Make sure you answer the question at the level to explain protocols, domain names and domain name servers, web browsers, and HTML.

Write your own testing program

COSC 2006 -Data Structures -  You are to write a class AssassinManager that allows a client to manage a game of assassin. Each person playing assassin has a particular target

Identify the operating systems

Identify the operating systems that support it, the maximum number of files allowed, the size of the disk volume possible, any fault tolerant features, all security features

Create a small network for an organization

You are to create a small network (less than 50 but greater than 20 nodes) for organization of choice consisting of multiple operating systems, security mechanisms, and de

Assignment on social media and networking presentation

Social Media and Networking Presentation, Imagine that you have been hired as a consultant for a university that wants to leverage social media and networking technologies to

Provide network addresses which satisfy constraints

Subnet 1 is needed to support up to 125 Interfaces, and Subnet 2 and 3 are each needed to support up to 60 interfaces. Give three network addresses which satisfy these const

Research both legacy and voip telecommunications

Research both legacy and VoIP telecommunications. Determine which one is more secure and why.Define what it is and how it will be used in the telecommunications model. Provide

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd