Design a network solution considering the topology of lan

Assignment Help Computer Network Security
Reference no: EM131183269

Choose ONE of the 2 Case Study cases below:

Case Study 1: You are hired as a consultant by Alpha Omega Technical Industries (ΑΩ TechInd). Your job is to provide a network solution to meeting the demands on the vertical growth the company has been experiencing during the last six months. ΑΩ TechInd has its headquarters in Los Angeles, California and divisions in

• Miami, Florida
• Rio de Janeiro, Brazil
• Frankfurt, Germany
• Dubai, UAE
• Shanghai, China

You are asked to create a network that houses the storage file server(s) keeping all files related to contract transactions between all divisions and their clients.

Your task is to design only this segment of the network. Do not worry about the rest of the network and do not worry about database and web servers. You will not be using them in your designed solution. The main file storage server must reside with the headquarters.

Please do consider the following in your solution discussion:

• File sharing between divisions
• Storage server backup and recovery in case of failure
• Security issues related to file transfers (optional)
• File concurrency - in case two files with the same name are trying to be saved at the same time on the same location
• File access logs
• File archival method
• Network diagram

Your report should be about 4 to 6 pages long (not including the title page and the reference page) in APA format with proper citations and references (if any), and it should include a diagram of the network solution (please embed the diagram to the Word document, and make sure it's viewable). Your report will be automatically checked against plagiarism upon submission.

Case Study 2:

America One Car (AOC) dealership is moving into a newly built facility in a suburb town of Washington, D.C.. You are retained as a consultant by AOC dealership to design a network solution for their new location. The new facility is assumed to be wired with UTP and fiber, with outlets in specific locations. The basic network is to be a LAN that serves desktop computers in the general manager's office, in the salesmen's area, and the showroom area; mobile devices (laptops, smartphones, tablets, etc.); and various accessories (printers, etc.). A major component of the network is a file server (for storing the sale contracts, and other files). Of primary importance is the Internet access solution (e.g., leased lines, Cable, DSL, broadband wireless, fiber to the home, satellite). Other components (such as web server, and database server) may be added for completeness (to earn extra credit).

Design a network solution, considering the following:

• Type and topology of LAN
• LAN cabling
• Storage file server: data back-up/archiving, file consistency, file access logs, and data recovery
• Internet access method (assume maximum availability of solutions)
• Security (all pertinent issues)
• Any other specific issues, such as web and database servers (for extra credit)

Your deliverable is a Word document of 4-6 pages (not including the title page and the reference page). It's required to include in the report a diagram of your network solution, and a table of the components (hardware and software) proposed. References must be listed and cited in APA format. Please embed the diagram into the Word document.

Reference no: EM131183269

Questions Cloud

Find the probability that the city will experience black-out : Suppose that two power plants are necessary to keep the city from a black-out. Find the probability that the city will experience a black-out.
Identify the degree and cardinalities of the relationship : Identify the degree and cardinalities of the relationship and express the relationships graphically with an E-R diagram.
Calculate time required to produce 64th batch of product z : Calculate the time required to produce the 64th batch of Product Z. -  Calculate the total variable cost of the 64th batch of Product Z.
Difference between indirect and direct spectrophotometry : What is the role of each constituent (CDTA, acetic acid, NaCl and NaOH) in total ionic strength adjustment buffer? What is the difference between indirect and direct spectrophotometry?. What is the advantage of each method of spectrophotometry?
Design a network solution considering the topology of lan : America One Car (AOC) dealership is moving into a newly built facility in a suburb town of Washington, D.C. Design a network solution, considering the Type and topology of LAN.
What is the energy change : What is the energy change when 72 g of H2O (g) condense to a liquid at 373 K? (ΔHvap of water = 40.68 kJ/mol; molar mass of H2O = 18 g/mol)
Difference between hard and soft power negotiating strategy : Explain the difference between hard power and soft power negotiating strategies in the context of international business negotiations. Share an example from recent news (within the last one or two years) that demonstrates either a hard power or so..
Risks of synthetic and natural food dyes : What is the difference between a natural food coloring and natural-identical colors? What are the most common food additives? What are some of risks of synthetic and natural food dyes and what are some of the benefits?
Discuss the security policy options to minimise the damage : Discuss the security policy options available to your client to minimise the damage that a member of staff could do.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd