Design a network and recommend security features

Assignment Help Computer Networking
Reference no: EM131072218

The Final Project

Your Business Case: You are an eager new networking consultant, and a school district has hired you for your first consulting job.

Currently, the district has no links between its buildings. School personnel share files by transferring CDs and diskettes between the buildings. The district is putting in new school management software for student and financial records. The software requires that the buildings be networked together.

That district has a grade school, junior high, and high school. The grade school and the junior high are smaller buildings on the same plot of land but they are in separate buildings about 50 yards apart. The high school is newer and larger; it is several miles away on the other side of town.

The school district has thirty teachers, three principals, three administrative assistants, fifteen staff members, and 500 students.

Security is always an issue. The school offers courses in computer science at the high school. The principal is concerned that the students will be tempted to hack into the school management software. The superintendent requests a security plan to help prevent student hackers from accessing the school management software. Also, the superintendent has a vague worry about students accessing pornography on the Internet. The district would like to know if you can configure routers and/or switches to prevent this. Or, is extra equipment or software needed to prevent students from accessing pornography from school computers?

The school superintendent bought some equipment and then realized that no one knew how to make it work. The equipment includes one 2600 series router, two 2500 series routers, and six 1900 series switches.

Your mission: Design a network to connect the three buildings and recommend security features for this network. You will plan your solution step by step, and then present your overall design to your client

Milestone 5: A brief PowerPoint presentation for the school principals, technical staff, and superintendent. Introduce your project. Outline the main points/diagrams/recommendations. Be sure to have a conclusion that offers to continue your duties as consultant - you want to be hired to implement your design!

A good PowerPoint presentation has the following characteristics:

1. An introductory slide.

2. Separate slides for each main point.

3. Short phrases and headlines. Do not use complete sentences and paragraphs!

4. A good, solid conclusion.

5. A closing slide that states what you want to happen next. (You want to implement this design! Tell them how to contact you).

Attachment:- Project.zip

Reference no: EM131072218

Questions Cloud

The process steps in the simulation model : Based on the process steps in the simulation model, tell why the bin states: occupied with a subassembly of type one, two, three, or four that is committed to the final assembly process are necessary.
Graph this cost and demand structure : What price would the monopolist charge if he were unregulated, and what would be his profit per unit?
The business scenario provided to create a purchasing : • OEM manufacturer of refrigerated cases for grocery stores that sell their products in all 50 states. They have sales of $20 million a year and predict they have 25% market share.
Plot the lorenz curve for gross income to scale : Plot the Lorenz curve for income after taxes have been levied. Note that the total income will now be less than 100 and so you will have to compute the quintile shares using a new total.
Design a network and recommend security features : Design a network to connect the three buildings and recommend security features for this network. You will plan your solution step by step, and then present your overall design to your client
What was price per unit of goods being sold by me fastner co : What was the price per unit of the goods being sold by mE FASTNER co.? Calculate common-size statements for the income statements of THE FASTNER CO. On the basis of this analysis, determine how well the company did.
Compute his earnings for his lifespan : Plot the two earnings functions you have computed. During what year does John pass Ivan?
Determine the optimal number of employees : Determine the optimal number of employees
A strategic view of industrial and organizational markets : What are the chief differences between consumer-goods marketing and business marketing? Use the following matrix as a guide in organising your response! (please be specific)

Reviews

Write a Review

Computer Networking Questions & Answers

  Since mac address is unique for each device

Since MAC address is unique for each device, why Internet does not use MAC address for routing and communications, instead, they assign an IP address to each machine? Here we do not count that MAC address is longer than IPv4 address (since IPv6 ha..

  Constructing an outline for the research paper

In preparation for constructing an outline for the research paper, discuss the topic that you may have selected for the paper, and attempt to layout your approach to the research, and the sub-topics

  Determine percentage of ip datagram will be overhead

Determine percentage of each IP datagram will be overhead and percentage will be application data? Illustrate all computations required.

  End to end encryption

How is end to end encryption different from other types of encryption? At what layer does it take place?

  Discuss the design approach that will control traffic flow

Discuss the design approach that will control traffic flow, hence improving performance. Use diagrams where possible support your discussion points.

  What is the total efficiency of the protocol

What would the value of the field containing the parity bits be for the case of a two-dimensional parity scheme? Your answer should be such that a minimum-length checksum field is used.

  Explain use of virtual private network-tunneling protocol

Can they use virtual private network and tunneling protocol, or is a better technique available? Justify your answer.

  Estimate the maximum aggregate io transfer rate in this

question a 32-bit computer has two selector channels and one multiplexor channel. each selector channel supports two

  Explain main components of good security policy

Write down the main components of good security policy? Write down some of the most common attacks, and how can the network be protected against these attacks?

  Produce a test plan for the new inventory system

Produce a report detailing how you will manage the transition to the new platform so as to assure the quality of the process and hence the outcome.

  Describe wi-fi and telecommuting

Describe Wi-Fi and telecommuting. What are the issues associated with allowing this technology to access the organization's network? Do you see either as being applicable for your selected organization

  Identify the protocols in your design

Q1. Explain the importance of communication protocols. Q2. Identify the protocols in your design and provide rationale for your decision.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd