Described a layered model of networking

Assignment Help Computer Networking
Reference no: EM13742517 , Length:

Described a layered model of networking along with details of physical implementations that together support a wide range of possible networking scenarios.

Willowvale Primary School  was built in 1968 to cater for between 300 and 450 local students in Grades Prep-6.

State government funding has allowed the school to provide all students with their own tablets for eLearning applications, writing and publishing assignments, accessing the Internet and undertaking school projects.

Each tablet can access the school's wireless network.   There are PCs in the library, the staff office and reception, all of which are wired to the school's LAN. Each staff member has a laptop and a tablet. The school has four wings.  The Junior Wing houses 6 classrooms for students in grades Prep - 2.  The Middle Years Wing has a further 4 classrooms for grades 3-4 and the Senior Wing has 4 classrooms for years 5-6.  The final wing is the Administration Centre, containing the school reception, staffroom, Principal's Office, library, multipurpose room, server room, equipment storage areas and the cleaners' store cupboard.

The school has 18 teaching staff, a principal, 2 administrative staff and 4 cleaners.

The school principal has the following basic requirements:

  • Support for all staff laptops
  • Desktop support for all PCs
  • An online printer for each wing, with two additional printers (a total of 3) in the administration centre
  • Support for student and staff tablets
  • Web Server support and Web content management
  • Maintenance of the central file server in the server room

All Internet access is provided through a Proxy server which redirects all web requests to cached web content  managed by  the  Department of  Education and  Early Childhood Development (DEECD). This provides safe Web access to students and staff. It also ensures no student or staff member is exposed to pornographic or otherwise illicit or unsafe web content.

Common Assumptions to all Scenarios

The following assumptions are to be considered common:

  • Certain computers (e.g. the web server) require a higher capacity network
  • Separate sections/departments require separate networks that are interconnected
  • The school networks are connected to the Internet but require protection
  • Some transactions, with stakeholders or other institutions/companies, require security

Verified Expert

Reference no: EM13742517

Questions Cloud

Case study on padding the expense account : Case Study On Padding the Expense Account. Chester "Chef' House-division manager for United. He is 61 years old and is located at company headquarters about 30 miles from Midland. He is Stan's boss and is also a close personal friend of the preside..
Write research paper on genetic mutations and influence : Write Research paper on genetic mutations and influence
Explain permanent settlements established by english in usa : This essay assignment will require you to compare and contrast the first permanent settlements established by the English in the Americas.
Research paper on george emil palade : Research Paper on George Emil Palade, What they were known for contributing to the field of biochemistry; background on this discovery; any other contributions they made to science
Described a layered model of networking : Described a layered model of networking along with details of physical implementations that together support a wide range of possible networking scenarios.
Operating cash flow per year : Longstreet Pharmaceutical is considering opening a new Compound Pharmacy in San Antonio. The company's top Pharmacists estimates that the new pharmacy would be productive for eight years,
Primary roles of the us federal reserve : Briefly explain the primary roles of the U.S. Federal Reserve, the Federal Reserve Chairman, and the Federal Reserve Board. Indicate each party's effectiveness in today's economic environment. Provide support for your explanation.
Discuss two areas of the united states economy : discuss two areas of the United States economy that Ronald Reagan deregulated in the eighties. Explain at least two methods the Reagan Administration used to deregulate these particular agencies or programs.
Monthly compounding-annualizing a monthly rate : If you bought a $1,000 face value CD that matured in nine months, and which was advertised as paying 9% annual interest, compounded monthly, how much would you receive when you cashed in your CD at maturity?

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine internet address for domain name

Determine an Internet address for this domain name. Under what situations is each of the following statements true of the name resolution process?

  Explaining pretty good privacy and s-mime

It is essential to encrypt it, by using solutions like PGP (Pretty Good Privacy), S/MIME (Secure Multi-Purpose Internet Message Exchange), and steganography. Research these different mechanisms.

  First prepare an abstract of your business recommendations

first create an abstract of your business recommendations for network solutions for large businesses. an abstract is a

  Advantages and disadvantages of connection method

Prepare a three-column table (one column for each technology) in which you list the advantages and disadvantages of each connection method.

  What was the most important aspect of the csiro patent

Investigate the history of the CSIRO Wifi patent which was recently up-held in courts in the United States. This patent covers significant aspects of the OFDM implementation which is used in modern Wifi devices.

  Determine maximum number of ip addresses assigned

Determine the smallest size subnet which can be utilized to fulfil this requirement? _______. Determine the maximum number of IP addresses which can be assigned in this size subnet?

  Outline a new network security design

Utilize the following information to outline a new network security design. Employee breakdown; 2 partners, 28 accountants, 5 administrative assistants, 2 technology specialists, 1 human resources manager.

  Explain graphic files were transmitted by a e-mail

Several graphic files were transmitted by a e-mail from the unknown source to suspect in the ongoing investigation. Lead investigator provides you these graphics files and tells you that at least four messages must  be embedded in them.

  Kind of network crimes may use p to p networks

What kind of network crimes may use P2P networks? Find the most challenging crimes that could be based on P2P networks and write a report on how to do forensic investigations on these crimes.

  Assignment related to mobile application

You are employed in the corporate IT department of URCovered, Inc., which is one of the largest major auto insurance companies in North America. Based on a yearlong study, your company management has identified a mobile application as an opportuni..

  Explain the difference among client-server architecture

list and describe the four primary functional components of a software application and the three primary hardware

  What is the definition of information security what

part 1 review questions what is the definition of information security? what essential protections must be in place to

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd