Current network design

Assignment Help Basic Computer Science
Reference no: EM13718126

Imagine that you are the administrator for a small accounting company, which currently employees 200 people. The CEO announces a merger that would double the number employees to 400. Your current network design is as follows:

Current network design

200 host machines running Windows 8 with 10/100 auto sensing NIC
9 Cisco Catalyst 2960 Switches (100 Mb)
1 Cisco Catalyst 2960 Switch as the Core Switch
1 Cisco 2651XM Router with T1 module for Internet/WAN
Category 5 Ethernet cabling
Class C network address (supporting 254 addresses)

Write a two to three (2-3) page proposal in which you:

Recommend one (1) strategy to upgrade the company's current infrastructure to support the new / additional employees.
Recommend one (1) strategy to create a high-performance network.
Recommend one (1) new network address that will allow you to scale your network in the event of additional mergers which (assume double the number of users again).
Design the new addressing scheme for the network through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

I want my paper to be very good without any plagiarism and it should explain whatever the question is asking. I have uploaded the question on upload reference. If it is not done accordingly I want my money back. It should include a diagram as well and the writing should only be 2 pages without a diagram. So diagram has to be in separate page.

Reference no: EM13718126

Questions Cloud

Cell that faces convective and radiative ht transfer : Steel-reinforced concrete pillars are used in the construction of large buildings. Structural failure can occur at high temperatures due to fire because of softening of the metal core. Consider a 200mm thick composite pillar consisting of central ste..
What is the meaning of leadership : What is the meaning of leadership - vitality of leadership in the field of education
Determine the shear modulus of the eraser material : A cylindrical eraser of negligible mass is dragged across a paper at a constant velocity to the right by its pencil. Determine the shear modulus of the eraser material
Consider three lans interconnected by two routers : Consider three LANs interconnected by two routers as shown in Figure below. Assign IP addresses to all of the interfaces. For Subnet 1 use addresses of the form 192.168.1.xxx; for Subnet 2 use addresses of the form 192.168.2.xxx; and for Subnet..
Current network design : Imagine that you are the administrator for a small accounting company, which currently employees 200 people. The CEO announces a merger that would double the number employees to 400. Your current network design is as follows:   Current network ..
Heat engine operating on the carnot cycle : A heat engine operating on the Carnot cycle has an efficiency of 65%. The waste heat from the cycle is rejected to the atmosphere at 20 deg. C. at a rate of 250 kW. What is the temperature of the heat source driving the engine in deg. C? For the heat..
Magnitude of the support reaction on the left end of beam : A 20ft long beam has a support reaction at each end and a 12ft long uniformly distributed load of 20lb/ft starting on the left edge. The uniformly distributed load is modeled as a normal concentrated load of how many pounds?
Closed piston-cylinder arrangement : One half of a mole of air is taken through the following processes in a closed piston-cylinder arrangement. From the initial state (V1 = 10 L, p1 = 1 atm) the gas is expanded at constant pressure to a volume of 20 L. It is then heated at constant vol..
Find that she cannot move either leg. advise aurelie : Explain how the common law and statutory rules of interpretation could be applied to the situations - Winnie is caught by a security guard as she is licking white aspirin powder.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find the error in the pseudocode

Find the error in the pseudocode. Constant Real GRAVITY = 9.81 Display "Rates of acceleration of an object in free fall:

  Describe how cpu can achieve i-o with teletype by registers

Consider a computer system that contains an I/O module controlling a simple keyboard/ printer Teletype. Describe how de CPU, using the first four registers listed in this problem, can achieve I/O with the Teletype.

  Create a hierarchy chart depicting the chosen situation

Create a hierarchy chart depicting the chosen situation, develop a flowchart and provide a brief explanation for it and develop an algorithm and provide a brief explanation for it.

  Compute price-output if firm-oligopolstic industry collude

If firms in an oligopolstic industry successfully collude and form a cartel, what price and output will result? Price lower than the competitive price and because there are only a few firms in the industry, less output than the competitive amount

  Create application that lets user select two primary colors

when the user clicks mix button,the form's background should change to the color that you get when you mix the two selected primary colors. note: i want the solution in visual c# not in c++ plz

  How does a network based idps differ from a host based idps

How does a network based IDPS differ from a host based IDPS?

  The privacy protection act

The Privacy Protection Act (PPA) as it relate to computer forensics

  Discuss why the user needs are important

Discuss why the User Needs are important or stood out to you. Cite specific examples from readings. Include personal experience with the topic if appropriate.

  Critique the idea which the cio can be a bridge between

critique the idea that the cio can be a bridge between enterprise finance marketing and sales functions. justify the

  Protecting browsers from dns rebinding attacks

Write a Review/Critique paper of the following articles: Collin Jackson et al., "Protecting Browsers from DNS Rebinding Attacks", In Proceedings of ACM CCS, 2009.Robin Sommer and Vern Paxson, "Enhancing Byte-Level Network Intrusion Detection Signat..

  The mft data block allocation algorithm

Write a program that implements the MFT data block allocation algorithm

  Explain and justify the need for good hcr practice

Demonstrate an alternative screen design for a user with a visual impairment beyond the usability level appropriate for your main design. What would you do to make your app accessible for them?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd