Design a network solution considering the topology of lan

Assignment Help Computer Network Security
Reference no: EM131183269

Choose ONE of the 2 Case Study cases below:

Case Study 1: You are hired as a consultant by Alpha Omega Technical Industries (ΑΩ TechInd). Your job is to provide a network solution to meeting the demands on the vertical growth the company has been experiencing during the last six months. ΑΩ TechInd has its headquarters in Los Angeles, California and divisions in

• Miami, Florida
• Rio de Janeiro, Brazil
• Frankfurt, Germany
• Dubai, UAE
• Shanghai, China

You are asked to create a network that houses the storage file server(s) keeping all files related to contract transactions between all divisions and their clients.

Your task is to design only this segment of the network. Do not worry about the rest of the network and do not worry about database and web servers. You will not be using them in your designed solution. The main file storage server must reside with the headquarters.

Please do consider the following in your solution discussion:

• File sharing between divisions
• Storage server backup and recovery in case of failure
• Security issues related to file transfers (optional)
• File concurrency - in case two files with the same name are trying to be saved at the same time on the same location
• File access logs
• File archival method
• Network diagram

Your report should be about 4 to 6 pages long (not including the title page and the reference page) in APA format with proper citations and references (if any), and it should include a diagram of the network solution (please embed the diagram to the Word document, and make sure it's viewable). Your report will be automatically checked against plagiarism upon submission.

Case Study 2:

America One Car (AOC) dealership is moving into a newly built facility in a suburb town of Washington, D.C.. You are retained as a consultant by AOC dealership to design a network solution for their new location. The new facility is assumed to be wired with UTP and fiber, with outlets in specific locations. The basic network is to be a LAN that serves desktop computers in the general manager's office, in the salesmen's area, and the showroom area; mobile devices (laptops, smartphones, tablets, etc.); and various accessories (printers, etc.). A major component of the network is a file server (for storing the sale contracts, and other files). Of primary importance is the Internet access solution (e.g., leased lines, Cable, DSL, broadband wireless, fiber to the home, satellite). Other components (such as web server, and database server) may be added for completeness (to earn extra credit).

Design a network solution, considering the following:

• Type and topology of LAN
• LAN cabling
• Storage file server: data back-up/archiving, file consistency, file access logs, and data recovery
• Internet access method (assume maximum availability of solutions)
• Security (all pertinent issues)
• Any other specific issues, such as web and database servers (for extra credit)

Your deliverable is a Word document of 4-6 pages (not including the title page and the reference page). It's required to include in the report a diagram of your network solution, and a table of the components (hardware and software) proposed. References must be listed and cited in APA format. Please embed the diagram into the Word document.

Reference no: EM131183269

Questions Cloud

Find the probability that the city will experience black-out : Suppose that two power plants are necessary to keep the city from a black-out. Find the probability that the city will experience a black-out.
Identify the degree and cardinalities of the relationship : Identify the degree and cardinalities of the relationship and express the relationships graphically with an E-R diagram.
Calculate time required to produce 64th batch of product z : Calculate the time required to produce the 64th batch of Product Z. -  Calculate the total variable cost of the 64th batch of Product Z.
Difference between indirect and direct spectrophotometry : What is the role of each constituent (CDTA, acetic acid, NaCl and NaOH) in total ionic strength adjustment buffer? What is the difference between indirect and direct spectrophotometry?. What is the advantage of each method of spectrophotometry?
Design a network solution considering the topology of lan : America One Car (AOC) dealership is moving into a newly built facility in a suburb town of Washington, D.C. Design a network solution, considering the Type and topology of LAN.
What is the energy change : What is the energy change when 72 g of H2O (g) condense to a liquid at 373 K? (ΔHvap of water = 40.68 kJ/mol; molar mass of H2O = 18 g/mol)
Difference between hard and soft power negotiating strategy : Explain the difference between hard power and soft power negotiating strategies in the context of international business negotiations. Share an example from recent news (within the last one or two years) that demonstrates either a hard power or so..
Risks of synthetic and natural food dyes : What is the difference between a natural food coloring and natural-identical colors? What are the most common food additives? What are some of risks of synthetic and natural food dyes and what are some of the benefits?
Discuss the security policy options to minimise the damage : Discuss the security policy options available to your client to minimise the damage that a member of staff could do.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Define the concepts of symmetric key encryption

Define the concepts of symmetric key encryption, public key encryption, and hashing and explain which of these techniques are used for confidentiality and authentication.

  Compare symmetric encryption to asymmetric encryption

Compare and contrast symmetric encryption to asymmetric encryption. PKI uses digital certificates to encrypt / decrypt data. Analyze the process of encrypting and decrypting data using a digital certificate.

  Explain why shared accounts is considered bad practice

In your own words, explain why each of the following is considered bad practice:

  Cyber weapon

Single Sign On (SSO), Single Sign On (SSO), netstat -an, arp -a, ipconfig /displaydns, MS Config. Means, MS Config. Means, network reconnaissance

  Analyze personal privacy issues

Objective: Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios. Competencies: Critical thinking, communication skills

  Network security protocols

Explain several network security protocols and their similarities and differences. Evaluate a variety of network security and management tools.

  Create a network diagram illustrating the solutions

Write a cumulative 4- to 5-page paper (not including any diagrams or charts) incorporating your prior work. Solve the design problems of your organization. Create a network diagram Illustrating the solutions.

  Describe various functions within information systems area

Describe the various functions and activities within the information systems area, including the role of IT management and the CIO, structuring of IS management within an organization, and managing IS professionals within the firm.

  Describe the main objectives of the anba drp

Explain the key ways that ANBAs DRP can help mitigate risk in the organization and defend the need for DRPs in an enterprise organization such as ANBA.

  How to set up or improve their cyber security

How should government justify telling private industry how to set up or improve their cyber security

  Demonstrate a good cryptanalysis process

Discuss your cryptanalysis process as you attempt to decipher the message. Note - it is more important that you demonstrate a good cryptanalysis process than that you are able to decrypt the message.

  It project management

Assume your corporation is trying to decide whether it should buy special equipment to prepare some of its high-quality publications itself or lease the equipment from another corporation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd