Create a diagram showing the overall network

Assignment Help Computer Networking
Reference no: EM13752286

Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment:

Overall network diagram: One (1) page
Datapath diagrams: Three (3) pages (one for each diagram)
Write-up: six to ten (6-10) pages

Part 1: Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you've designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:

Follow the access, core, distribution layer model.

Include at a minimum:
Authentication server (i.e. Microsoft Active Directory)
Routers
Switches (and / or hubs)
Local users
Remote users
Workstations
Files share (i.e. CIFS)
Mail server
Web servers (both internal and external)
Firewalls
Internet cloud
Web proxy
Email proxy
FTP server (for internal-to-external transport)

Explain each network device's function and your specific configuration of each networking device.

Design and label the bandwidth availability or capacity for each wired connection.

Part 2: Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Local user sends email to a Yahoo recipient.

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.

Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.

Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.

Explain how your overall design protects the organization from both inside and outside attacks. Give examples.

Explain how your layered design compensates for possible device failures or breaches in network security.

Determine whether any possible bottlenecks exist in your design.

Explain how to make the file transfer process more secure.

Part 3: Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13752286

Questions Cloud

Reasons for changes in beta : A Beta factor represents risk in a financial instrument or commodity. Explain the reasons for changes in beta and explain if one should be more concerned with a negative versus positive factor.
Understand the components of the cost of capital : Finance managers must understand the components of the cost of capital. The focus here is on on the cost of equity capital. Since capital, or money, is a limited resource to a business, finance managers may need to raise capital to fund projects t..
Develop at least three methods to monitor strategic plan : Develop at least three methods to monitor and control your proposed strategic plan, being sure to analyze how the measures will advance organizational goals financially and operationally.
Write a paper that addresses advantages of usa patriot act : Write a 1,050- to 1,200-word paper that addresses advantages and disadvantages of authorizing the USA Patriot Act of 2001 as a permanent change to American statutory authority.
Create a diagram showing the overall network : Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you've designed from the user or endpoint device to the Internet cloud
Find a symbolic representation for the function f : The charges for renting a moving van are $50 for the first 20 miles and $8 for each additional mile. Assume that a fraction of a mile is rounded up. (i) Determine the cost of driving the van 88 miles. (ii) Find a symbolic representation for the funct..
Exposure risk of business ventures : We are discussing the use of derivatives to reduce the exposure risk of business ventures.
What does the brand promise recommendation reveal : What are the advantages/disadvantages of an observation study for this research? 3. If you were designing such an observation study, what would you direct researchers to record/look for/listen for?
International investment portfolio : If you were planning your international investment portfolio, what regions would you explore?

Reviews

Write a Review

Computer Networking Questions & Answers

  Find maximum value of l if tcp sequence number not exhausted

Determine the maximum value of L such that TCP sequence numbers are not exhausted? Recall that TCP sequence number field has 4 bytes.

  A security policy is a statement that partitions the states

a security policy is a statement that partitions the states of the system into a set of authorized or secure states and

  What kind of security issues require to be considered when

q1. what are some of the reasons an organization might consider using a wireless lan?q2. what type of security issues

  The university has recently leased a building in adelphi

the university has recently leased a building in adelphi maryland.nbsp the building will house some offices classrooms

  Explain the steps take to stop cybersquatter

You are a owner of the register trademark, and you just found that domain name is being held hostage for large sum of money. In around 300 words, Explain the steps which you would take to stop cybersquatter.

  Explain transit systems for both avl and tsp

Outcome of this process must then be incorporated into ITS regional architecture. Are there plans to give ems vehicles with signal priority/pre-emption?

  Problem on subnet masking and designing small networks

Subnet masking and designing small networks for fictitious organizations - provides system administration and networking services to organizations

  Use the below mentioned parameters to setup the networks

use the below mentioned parameters to setup the networks that will be needed. please list the i networks used in each

  Write down a 700- to 1050-word business report explaining

scenario your boss wants to know how to detect an intrusion into or an attack on the ecommerce network. your boss also

  How does server stack deliver packet to http server software

A computer in the Computing Department has just been turned on. The user starts up their web browser and requests to see the Macquarie University home page. The home page www.mq.edu.au resides on a server on the administration subnet.!

  How many transactions could the server process

How many transactions/second could the server process if it had 2 threads?

  How to interconnect two areas using twisted-pair ethernet

Provided that both engineering and front office areas use 10BaseT (twisted-pair Ethernet), how might you interconnect two areas?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd