Employed to design a network infrastructure for two campuses

Assignment Help Computer Networking
Reference no: EM131395871

Telecommunications Case Assignment

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed. As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network's topology including any necessary hardware.
2. You should list any recommended cable.
3. You can recommend wiring closets wherever you need them.
4. You should recommend ways to assure that you are not getting attacked.
5. You should build traps to stop attackers.
6. You should recommend any WAN or wireless technologies.
7. You should recommend any technology needed in the data center for high availability.
8. Justify your recommendations.

Verified Expert

In the given task the there is network in which database server and web server are present. In other hand there is branch network but branch having only database server. So for the given network design is required. security implementation is required and company wanted to trap attacker so that source of attack can be known. DMZ is recommended for the given assignment to provide security. and server redundancy is created for providing high availability.

Reference no: EM131395871

Questions Cloud

Whether given are definitions by subclass - tale : Determine whether the following are demonstrative definitions, enumerative definitions, definitions by subclass, synonymous definitions, etymological definitions, operational definitions, or definitions by genus and difference.
Whether the given enumerative definitions - error : Determine whether the following are demonstrative definitions, enumerative definitions, or definitions by subclass.- "Error" means mistake.
Explain concepts of server virtualization to management : Determine the strategy you would use to explain the concepts of server virtualization to senior management so that they understand the concepts and can form an opinion on the solution. Provide a rationale for using your chosen strategy.
Whether given enumerative definitions - professional person : Determine whether the following are demonstrative definitions, enumerative definitions, definitions by subclass, synonymous definitions,or etymological definitions.- "Professional person" means a person such as a doctor, a lawyer, a professor, or a..
Employed to design a network infrastructure for two campuses : As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications.
Demonstrative or enumerative definitions - philosopher : Determine whether the following are demonstrative definitions, enumerative definitions, definitions by subclass, synonymous definitions, etymological definitions, operational definitions, or definitions by genus and difference.
Write a program that prompts user for an unsigned int value : Write a program that prompts the user for an unsigned int value. Compute and display the result when the bits are shifted one position to the left. Save the file as ShiftToLeft.cpp.
How could you have been a better team member : Based on your knowledge from a past or present job, explain the difference between a group and a team. Would you say you were a part of a group or a team while working in that job?Now, identify a team that you were a part of and describe the advant..
Identify four possible market segments : Select a consumer product or service you are familiar with and identify four possible market segments. Use the categories seen in class (geographic regions, demographics, psychographics and behavioral variables

Reviews

Write a Review

 

Computer Networking Questions & Answers

  How ip addresses are assigned

Identify how IP addresses are assigned in the local area network at your scool or workplace. Were any other methods used to assign IP adreess prior to the current configuration? Why was the current configuration chosen?

  What type of naming structure would you give to servers

What type of naming structure would you give to servers, network devices and end nodes in this network? Provide a few examples.

  Will it travel through any routers

A host with IP address 122.34.23.11 sends a message to a host with IP address 136.34.23.11. Does the message travel through any routers? Explain why. (Assume no sub-netting)

  Discuss performance benefits relative to network design

Discuss performance benefits relative to network design, system placement, and configuration. Describe a situation in which you had to modify the logical design of your environment to improve the performance

  Find out which scripting language is supported by web server

As web developers, we must find out which scripting language is supported by the web server to understand what kind of rights and privileges we must take into account.

  Use the internet or the strayer library

Computer literacy and information literacy Using information systems and information technologies management information systems.

  Introduction to network channels-processors and media

OSI Model, Switching Systems, Network Channel Processors, and Media

  Describe the three stages of standardization

Describe the three stages of standardization. How are Internet standards developed?-  Describe two important data communications standards-making bodies. How do they differ?

  Service details for high speed internet service providers

Provide the service details (e.g., pricing and data rates) for at least two high-speed Internet access service providers in your area.

  Operating systems

The figure below shows a tunnel going through a mountain and two streets parallel to each other-one at each end of the tunnel. Traffic lights are located at each end of the tunnel to control the cross flow of traffic through each inter¬section.

  What is the information in bits conveyed by a report

What is the information in bits conveyed by a report that the first event occurred? -  What is the entropy of the source?

  Obtain a trace file of the tcp handshake process.

Obtain a trace file of the TCP handshake process and Explore the preferences and configuration options in Wireshark. Share your findings with the class

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd