Design a network to connect the three buildings

Assignment Help Computer Networking
Reference no: EM131028739

And Can you answer the following question and please put the answer on a different page What kinds of activities would you use a job-scheduler for?

In your answer, be sure to include a real world example of your activity in your answer.

Please be sure to included your cited your source(s) to support your position. Read all postings and respond to at least two other postings, following the guidelines for participation.

The Final Project

Your Business Case: You are an eager new networking consultant, and a school district has hired you for your first consulting job.

Currently, the district has no links between its buildings. School personnel share files by transferring CDs and diskettes between the buildings. The district is putting in new school management software for student and financial records. The software requires that the buildings be networked together.

That district has a grade school, junior high, and high school. The grade school and the junior high are smaller buildings on the same plot of land but they are in separate buildings about 50 yards apart. The high school is newer and larger; it is several miles away on the other side of town.

The school district has thirty teachers, three principals, three administrative assistants, fifteen staff members, and 500 students.

Security is always an issue. The school offers courses in computer science at the high school. The principal is concerned that the students will be tempted to hack into the school management software. The superintendent requests a security plan to help prevent student hackers from accessing the school management software. Also, the superintendent has a vague worry about students accessing pornography on the Internet. The district would like to know if you can configure routers and/or switches to prevent this. Or, is extra equipment or software needed to prevent students from accessing pornography from school computers?

The school superintendent bought some equipment and then realized that no one knew how to make it work. The equipment includes one 2600 series router, two 2500 series routers, and six 1900 series switches.

Your mission: Design a network to connect the three buildings and recommend security features for this network. You will plan your solution step by step, and then present your overall design to your client.

Milestone 1: A high level diagram of the network that shows the subnetworks and the equipment. You do not assign IP addresses yet. The general idea is to get your client to agree to the general design before adding the details.

A good general design has the following characteristics:

1. It fits on one page.

2. It has a title or heading.

3. It is formatted nicely to make it easy to understand.

4. Each building and/or LAN is clearly identified.

5. The hardware and circuits are easy to identify.

You can use any drawing tool, but Visio is available in the lab. Please copy your diagram into Word to make sure that your instructor can view it, and then submit that document to your instructor.

Assignment 1

About 30% of the Internet is already on IPv6. Navigate to the Hurricane Electric site at the following URL: http://ipv6.he.net/certification/

Read the information about IPv6. Then, register for a certification login and complete the Newbie certification. When you have completed it, download the HTML for your certificate and use the HTML editor to paste it into the comment block for this assignment.

Please note that you don't have to stop with the Newbie cert. They will show you how you can create a tunnel and access the 30% of the Internet that is already on IPv6.

Assignment 2

Milestone 1 of our Semester Project is due this week! Please attach your draft diagram here AND post it on the discussion board. See the information in the Projects area of the course for details about this milestone.

The posting with the attached Word document is due at least two days before the end of the week. Review all postings and respond to at least two. Earlier postings are much appreciated - your fellow students need time to read your paper and offer feedback for improvement. Remember that you need to comment on at least two of your follow students' posting to earn full credit for this assignment.

Reference no: EM131028739

How can the chipping code be protected

Explain the differences between a 4G and a 4G lite cellular network, choose two or three major features. Explain in detail these differences. Where, in your opinion, are th

How does iscsi handle the process of authentication

How does iSCSI handle the process of authentication? Research the available options? Why should an MTU value of at least 2,500 bytes be configured in a bridged iSCSI envir

Conduct a feasibility study of your project

Discuss the whole experience of hypothetical project design exercise-what you learned, what you found frustrating, and any suggestions you have as to how it could be improve

Discuss how the mcqm system connects all processes

Start the paper with a brief overview and description of FDA and ISO regulations that exist to protect consumers. Briefly discuss how the MCQM system connects all processes

Define the computing and network platforms

IT Infrastructure: Define the computing and network platforms. Has the organization adopted industry standards? Is the necessary technical expertise and talent residing inte

How do you use the product rule to simplify exponents

How do you use the product rule to simplify exponents? Give an example and explain? What are the practical usages of scientific notation? Why is scientific notation so importa

Difference between standard and extended access lists

What is the difference between standard and extended access lists? Is this difference rational in your mind? Does there need to be a separation of the two types?Couldn't the

Do you think ids like snort can easily detect covert channel

Do you think IDS like Snort can easily detect a covert channel? For example, can you write an effective set of Snort rules to prevent any information leak through a covert c

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd