Creating a remote employee connection guide

Assignment Help Basic Computer Science
Reference no: EM131339452

Your manager has tasked you with creating a Remote Employee Connection guide for IT. This guide will assist IT in setting up remote (work-from-home) employees to access the company's Intranet. These employees will use a VPN connection from their PC in home to a remote VPN server located in the employee's work campus. 

Create a 2- to 3-page guide using Visio® including the following: 

  • WAN access options from the home to an ISP
  • WAN access options from the work campus to another ISP (assuming a different ISP is used)
  • An end-to-end (from PC to VPN server) network diagram showing routers, switches, hosts and connections. Show on the diagram your choice of one of options considered; i.e., WAN access from home, or WAN access from work.
  • Major TCP/IP protocols with which the home PC is involved, from the moment it boots up until its first IPv4 packet reaches the VPN server.
  • Illustration of how the first IPv4 is forwarded through the network, showing:
    • Source and destination IPv4 addresses
    • Source and destination MAC addresses for the initial 2 hops in the header of the packet
    • Entries in the routers' forwarding tables
  • Major routing protocols involved in building the forwarding tables
  • Repeat the last two items in the case of IPv6

Note: It is recommended that Visio® be used to create network diagrams for the presentation.

Reference no: EM131339452

Develop a class for feasible-flow problems

Develop a class for feasible-flow problems that includes methods allowing clients to set supply-demand values and to check that flow values are properly related at each vert

Euclid construction of the circle inscribed

Question: Show that Euclid's construction of the circle inscribed in a triangle (IV.4) is valid in any Hilbert plane. Be sure to explain why two angle bisectors of a triangl

Initiate a compaction of free memory

In this exercise, we simulate a memory allocation (we just want to see the effect of fragmentation and of compacting memory fragments into larger ones). For this, we manage

Practices when deploying group policy

As a system administrator, what are some of the things you can control to secure end user computers on your network with Group Policy. What are best practices when deploying

Determining the attorney of union rep

Can an employee request that an attorney of union rep. Attend a private conference with the compliance officer? If the union demands to have a rep. present does the employee

How many tries would you expect it to take to implement

Assuming real RTTs can be estimated to within 40 ms, about how many tries would you expect it to take to implement the strategy of part (a) with the un simplified "increment

Knowledge of two dierent ciphertext sequences

Explain how only the knowledge of two dierent ciphertext sequences C = C1C2 Cn and C0 = C01 C02 C0n, obtained by applying the same secret key, can compromise the security o

Determine how to set up the server for the future expansion.

Habibi's has a small network of 20 client workstations and a Windows Server 2008. Seven of those workstations are inside the restaurant and are used by the table servers

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd