Create a network design for a fictitious organization and

Assignment Help Computer Networking
Reference no: EM13477389

Create a network design for a fictitious organization. Each week, you will be completing a part of the assignment based on the content covered in the week. You will do this by adding new content to the assignment document every week to arrive at the final design.

This week's assignment will enable you to develop the skills for designing a network. The focus will be on the considerations and tasks required for designing a network.

Dreamz Inc. develops software and learning solutions for clients worldwide. The main office of the organization is located on six floors of a building in Chicago where hundred users occupy each floor. While the first floor houses the corporate office, the other floors house the administrative, finance, human resources (HR), engineering, marketing, information technology (ID, and research departments. All users need e-mail, file and print, and Internet services.

To provide these services, the organization has ten servers that are used as LAN, proxy, and database servers. The users in the finance and HR departments require sufficient bandwidth and access applications from an Oracle server. This server is accessible only to users in the finance and HR departments; and these users can also access the server from the Internet. Dreamz Inc. is also connected to the Internet from the same network and has web and e-mail servers hosted for Internet access with expanding business, Dreamz Inc. has setup three branch offices in St. Louis, Detroit, and New Jersey. These three branch offices need to be connected to the main office and other branch offices. A fourth office at San Francisco comprises a network of five users and requires a single Internet connection.

Tasks

As the network manager for the organization, you need to design the networks for connecting various branches of the organization.

You also need to study the requirements of each branch of the organization. In addition, you need to ensure that the network uptime is 99% with a downtime of not more than five hours.

Reference no: EM13477389

Questions Cloud

Cmpare current 2013 market price of the stock and stock : in the world of trendsetting fashion instinct and marketing savvy are prerequisites to success. michael geno had both.
The data were collected using a simple sampling method : the data were collected using a simple sampling method. people were chosen randomly to fill the questionnaire with the
How do demand variability and lead time impact a firms : a.how do demand variability and lead time impact a firms inventory levels?b.consider a firm redesigning its logistics
Provide two examples each of functional product and : a. give two examples each of a functional product and an innovative product.nbspnbspb. characterize
Create a network design for a fictitious organization and : create a network design for a fictitious organization. each week you will be completing a part of the assignment based
What is the significance of precedent to judicial : as a new manager in your department you are tasked with the job of providing employee training for members of your
Research team role the team will determine if the : managers dilemmathe client tess motors have hired the three amigos research firm to solve some challenges in the
The firm has decided on capital structure consisting : as a financial consultant you have contracted with wheel industries to evaluate their procedures involving the
Find the following journal entries in a standard cost : question 1. the difference between the total actual overhead cost incurred during a period and budgeted total factory

Reviews

Write a Review

Computer Networking Questions & Answers

  Your friend has a small design shop with windows nt 40

your friend has a small design shop with windows nt 4.0 windows 2000 and windows xp workstations. he has one older

  Write rule sets for two firewalls to permit traffic to flow

Computers on three internal subnets use dynamic NAT pools as follows when making connections to internet. Write down two rule sets for two firewalls which will permit only traffic described to flow.

  Write primary advantage of deterministic local area network

Write the primary advantage of a deterministic local area network protocol over a nondeterministic local area network protocol.Give a real-life example of this advantage.

  Explain network communication simulation using vector

Network Communication Simulation using multidimensional vector. We want to simulate the communication cost between different nodes in a network. How to model the network nodes and communication cost

  Write three big problems with m-m-s process

Then he asks you if they require to make any modifications to their software development process. Write down name three big problems with M. & M.'s process. How would you fix those problems?

  How big is the mac address space

How big is the MAC address space? The IPv4 address space? The IPv6 address space?

  Make case for assigning unique flow label to each long-term

The question arises as to which packets generated by a source should carry nonzero IPv6 flow labels. For some applications, the answer is obvious. Small exchanges of data should have a zero flow label because it is not worth creating a flow for a ..

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Determine number of samples are included in each packet

Assume that sender sends silence suppressed RTP stream of G.711 audio to receiver. During talk spurt 20 msecs chunks of quantized audio samples are encapsulated. Determine number of samples are included in each packet?

  Explaining labels in dns domain names

From RFC 1034, DNS domain names are composed of labels. Are there any labels which nodes are not allowed to allot to their data? If so, what are they?

  Implement buffer overflow in cthe effect of launching new

implement buffer overflow in cthe effect of launching new applications is the growth of vulnerabilities to attacks. the

  Case studynetworks are evolving scalability presentation

case studynetworks are evolving. scalability presentation acts reliability safety measures and cost considerations are

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd