+1-415-670-9189
info@expertsmind.com
Design a network and recommend security features
Course:- Computer Networking
Reference No.:- EM131072218




Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Networking

The Final Project

Your Business Case: You are an eager new networking consultant, and a school district has hired you for your first consulting job.

Currently, the district has no links between its buildings. School personnel share files by transferring CDs and diskettes between the buildings. The district is putting in new school management software for student and financial records. The software requires that the buildings be networked together.

That district has a grade school, junior high, and high school. The grade school and the junior high are smaller buildings on the same plot of land but they are in separate buildings about 50 yards apart. The high school is newer and larger; it is several miles away on the other side of town.

The school district has thirty teachers, three principals, three administrative assistants, fifteen staff members, and 500 students.

Security is always an issue. The school offers courses in computer science at the high school. The principal is concerned that the students will be tempted to hack into the school management software. The superintendent requests a security plan to help prevent student hackers from accessing the school management software. Also, the superintendent has a vague worry about students accessing pornography on the Internet. The district would like to know if you can configure routers and/or switches to prevent this. Or, is extra equipment or software needed to prevent students from accessing pornography from school computers?

The school superintendent bought some equipment and then realized that no one knew how to make it work. The equipment includes one 2600 series router, two 2500 series routers, and six 1900 series switches.

Your mission: Design a network to connect the three buildings and recommend security features for this network. You will plan your solution step by step, and then present your overall design to your client

Milestone 5: A brief PowerPoint presentation for the school principals, technical staff, and superintendent. Introduce your project. Outline the main points/diagrams/recommendations. Be sure to have a conclusion that offers to continue your duties as consultant - you want to be hired to implement your design!

A good PowerPoint presentation has the following characteristics:

1. An introductory slide.

2. Separate slides for each main point.

3. Short phrases and headlines. Do not use complete sentences and paragraphs!

4. A good, solid conclusion.

5. A closing slide that states what you want to happen next. (You want to implement this design! Tell them how to contact you).

Attachment:- Project.zip




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
Consider the following string of ASCII characters that were captured by Wireshark when the browser sent an HTTP GET message (i. e., this is the actual content of an HTTP GET
the Network Design Executive PowerPoint Presentation- You are a small network design company called Wide-IP that is looking for that big break. As the CTO of the Wide-IP com
Subnet the following address - 130.4.8.74 The goal is to subnet the above address and to produce 7 subnets and 350 hosts/subnet. Please show all of your work. I am looking f
Individual employees also should be able to control resources their own machines. Would you select peer-to-peer, a server-based, or a hybrid network? Explain why?
Draw the potential network architecture of the data network for secondary campus to main campus of university (Detail and describe the function of each component in the netw
Calculate its nearest neighbor distance DMIN and farthest neighbor distance DMAX. Calculate ratio r = DMAX/DMIN. Repeat this 100 times for each d, and report he average r fo
Name four socket functions (C functions) used to create client/server applications. Name the five layers in a typical TCP/IP computer network. What are the services provided b
Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtu