Develop a suitable vpn network for an sme

Assignment Help Computer Networking
Reference no: EM132281320

Assignment: Tasks: There are two parts to this assignment, i.e. part A and part B.

A. Investigate, design and develop a suitable VPN network for an SME by addressing the following criteria. See detailed instruction in the next section.

B. Presentation

Part A description: There are two areas to consider for VPN network design in this assignment.

1. Design a network for an SME

2. Build VPN services for the users

Contents must include:

? Introduction

? Scopes and Limitations

? Requirements (Network parts and VPN service parts)

? Solution Design

a. Logical Design

b. Physical Design

c. Network Topologies

d. IP addressing

e. Security features and Policies

f. Redundancy and Failover plans

g. VPN service implementation

? Refer the sample document included in below for network design, and consider how to implement VPN services onto the network. Do not copy the contents of the sample in your work as it is regarded as plagiarism.

Part B description: Prepare slides (between 10 - 15 slides) for presentation during the lab class. The solution of VPN services and network design shall be presented with 15 minutes for a group during week 11 Lab class. Presentation slides should be submitted in Moodle prior to the presentation for marking. No other options (e.g. hard copy, memory stick, website, email etc) will be considered but the presentation file submitted in Moodle.

Students should be able to demonstrate their achievements in the following unit learning outcomes:

1. Develop architectural VPN designs for small, medium and large businesses and corporations

2. Report on the health of the existing VPN architecture, solution, data, application, and technology

3. Investigate and justify the appropriate design and solution for different organisations

4. Analyse and report on the current and future state of the management of VPN infrastructure and its technologies

5. Define a roadmap process to transform the VPN architecture to support long-term organisational goals

6. Implement a process to support the administration and the management of VPN

Reference no: EM132281320

Questions Cloud

How do law enforcement organizations regulate the use : How do law enforcement organizations regulate the use of social media? Research the best practices related to the regulation of police officers.
Identify and define the allied health team members : NUR250 Medical Surgical Nursing - Charles Darwin University - Identify and define the Allied Health team members that should be involved in the patient's care
Work competition causes conflict when you have teams : Making sure that everyone is equally aware of things such as dates, deadlines, changes and other details when working together will minimize confusion.
How you think a diversion-oriented shift might impact case : How you think a diversion-oriented shift might impact case processing and case-flow management. APA , References, and in-cite citations
Develop a suitable vpn network for an sme : Investigate, design and develop a suitable VPN network for an SME by addressing the following criteria. See detailed instruction in the next section.
Estimating the cost of capital : In this case, is it worse to commit a 10% error in estimating the cash flow, or to commit a 10% error in estimating the cost of capital?
What is the units impact on the community : What is the unit's impact on the community? What options do the police have for containment of a person they have contact with?
Draw a UML domain model class diagrams : Case Study- University Enrolment system. Draw a UML domain model class diagrams for the new information system
Discuss how kelsey care plans for future cases and services : Articulate case management responsibilities and the importance of strategic planning and vision as foundations of successful case management services.

Reviews

Write a Review

Computer Networking Questions & Answers

  Insert these items into a bst

Insert these items into a BST (using alphabetical order): Hockey, Baseball, Football, Tennis, Swimming, Ice skating, Badminton, Hopscotch, Basketball, Water polo, Crew.

  Compare digital transmission to analog transmission

Compare and contrast the data communication technologies of guided media and unguided media. Compare digital transmission to analog transmission.

  What is the minimum size of an icmpv4 packet

What is the minimum size of an ICMPv4 packet? What is the maximum size of an ICMPv4 packet?

  Discuss the lifo method of valuing inventories

We used the LIFO method of valuing our inventories for approximately 50% and 53% of total inventories at June 30, 2007 and 2006, respectively.

  Describe the characteristics of the worst reports

Describe the characteristics of the worst reports. Consider different aspects of the report that could go wrong such as format, layout and content, and describe what could go wrong with them under different categories

  What elements of the existing network could be eliminated

What elements of the existing network could be eliminated if cloud-based hosting is used? What service would you recommend and why?

  How ip addresses are assigned

Identify how IP addresses are assigned in the local area network at your scool or workplace. Were any other methods used to assign IP adreess prior to the current configuration? Why was the current configuration chosen?

  Explaining protocol to avoid defeat

Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.

  Different components difficult to incorporate into a network

Do you believe that a network with different types of computers, maybe different operating systems, or different components would be difficult to incorporate into a network. Why or why not.

  How many more bytes can be sent

The host has sent 4,000 bytes, which have not been acknowledged. How many more bytes can be sent?

  Explain what the open systems interconnection model is

Explain what the open systems interconnection (OSI) model is and its different layers.

  Analysis of human-centric design aspects

Overview of Internetworking - Network requirement analysis and plan - Analysis of Human-centric design aspects, for example the layered approach in networking

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd