Explain the basics of networking and security issues

Assignment Help Computer Networking
Reference no: EM13544033

Convince the owners of a small up and coming company that they need to update equipment in their IT due to increased Internet use by focusing on Internet threats and the OSI model.

Now it is time to implement your ideas. You are going to design a new network for your small company. The network design will include routers, switches, servers, laptops, workstations and any other hardware you choose. Be specific about what hardware you want to use and why (e.g., Dlink 8 port switch model XYZ). Make sure to include what type of Internet connection and equipment is proposed. Be specific about what protocols are running on each device. Pick an IP scheme for the internal network and state it (i.e., the internal network will run an IP range of xxx.xxx.x>xxxx to xxx.xxx.xxx, with a subnet of xxx.xxx.xxx). Include a gateway IP and location (by location I mean make sure it is in your diagram). What will connect to the gateway device?

Try to diagram the new network either through a plan or through a verbal description. You can make up what the small company has for hardware to begin with and then design a better network for them. For example, you could state that the company has five employees with computers that are peer-to peer networked. The book provides many different ways to diagram networks. Microsoft Word and Excel will allow you to draw shapes and connectors for diagrams. Visio is another diagramming application you might use for your diagram. The project can be a combination of text and diagrams just as long as it is logical.

The project text needs to be grammatically correct with correct spelling and sentence structure when applicable. Remember to cite ideas that are not your own. Follow the APA guidelines for the paper and citations. Sentenceworks is available to assist you with the grammar and sentence structure.

The final project is weighted towards logical thinking and knowledge from the textbook. By this point and time you should be able to explain the basics of networking and security issues to other people.

Verified Expert

Reference no: EM13544033

Questions Cloud

Differences between kerouac and burroughs as novelist : Find some differences between Kerouac and Burroughs as Novelist. Teacher wants to integrating material from "Naked Angel"
How to calculate the mole fraction of nitrogen : The partial pressures of CH4 , N2 , and O2 in a sample of gas were found to be 143, 451 and 555 mmHg respectively. Calculate the mole fraction of nitrogen
Maximum height to which m1 rises after the elastic collision : Two blocks are free to slide along the frictionless wooden track shown below. The block of mass m1 = 5.06 kg is released from the position shown, at height h = 5.00 m above the flat part of the track. Protruding from its front end is the north pol..
What is the weight of the motor in this case : Two people carry a heavy electric motor by placing it on a light board 2.60 m long. What is the weight of the motor in this case
Explain the basics of networking and security issues : The project text needs to be grammatically correct with correct spelling and sentence structure when applicable. Remember to cite ideas that are not your own - Explain the basics of networking and security issues to other people.
What is the velocity of the truck right after the collision : A 1 255.0 kg car traveling initially with a speed of 25.000 m/s in an easterly direction crashes into the back of a 9 400.0 kg truck moving in the same direction at 20.000 m/s. The velocity of the car right after the collision is 18.000 m/s to the..
Define what will happen to the pressure of the gas : A given mass of a real gas in a rigid container is heated from 400 to 1200K. Which of the following responses best describes what will happen to the pressure of the gas
Find what is the magnification of the real image : A microscope has an objective lens with a focal length of 12.0 mm. A small object is placed 0.8 mm beyond the focal point of the objective lens. What is the magnification of the real image
What is the girls velocity relative to the ice surface : A 45.6-kg girl is standing on a 155-kg plank. Both originally at rest on a frozen lake that constitutes a frictionless, flat surface. The girl begins to walk along the plank at a constant velocity of 1.40 m/s relative to the plank. (a) What is the ve..

Reviews

Write a Review

Computer Networking Questions & Answers

  Business processes ultimately drive type of cable media

Business processes and needs ultimately drive the type of cable media and hardware you select. What factors might determine how we select which ones are appropriate for our organization?

  Describe how signal and signal management calls are used

Describe how signal and signal management calls are used in creating a process and terminating it after certain interval. Give a simple example to illustrate this routine.

  Sequential circuit with two inputs

Derive a sequential circuit with two inputs (S1 and S2) and one output (z) using D flip flops that will output z=1 if a S1=S2=0 is input, then a S1=S2=1 is input, then a S1=S2=0 is input.

  Question 1 a member of a project team that is implementing

question 1 a member of a project team that is implementing a new credit card payment process at a bank has direct

  Optimal algorithm for mutual exclusion in computer networks

In Ricart and agrawala's An optimal algorithm for mutual exclusion in computer networks paper if we are updating the code with taking the priorities.

  What is the missing subnet id

What is the missing subnet ID for SUB3 assuming they are assigning the subnets in subnet ID  order? What is the range of IP addresses that may be used for hosts on SUB3?

  Beyond the literal meaning write down the broader

beyond its literal meaning what are the broader implications of the clicheacute keeping the family name alive? or has

  Intercept message and generates alternative message

Computed hash value for the message. Alice is able to intercept message, and generates alternative message that has a hash value that collides with Bob's original hash value. Show.

  Remote network implementation plan

Remote Network Implementation Plan

  The fiber distributed data interface fddi backbone is the

based of your understanding of remote monitoring rmonin a microsoft word document configure a rmon and create a 3- to

  I need you to write about optical code division multiple

i need you to write about optical code division multiple access. introduction and overview historical background

  Explain relationship between privacy and it

Explain the relationship between privacy and IT. Describe some of the threats to information security and some of the measures you can take to protect information resources.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd