Determine the primary security concerns

Assignment Help Computer Networking
Reference no: EM13754955

Network Design

Imagine that you have been hired as a contractor by a local business that has recently purchased new office space for its growing business. Design a network for the local business based on the following information: The business has approximately fifty (50) employees, and the new office space will stretch across the third and fifth floors of a building. The fourth floor is currently occupied by another tenant.

Write a two to four (2-4) page paper in which you:

Suggest the equipment that you would utilize to design and implement a network, based on the scenario. Justify the need for your suggestions.

Recommend the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Suggest a solution that includes the cabling / connecting of the two (2) differing office space floors.

Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.

Detail the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13754955

Questions Cloud

When was the war of 1812 : When was the war of 1812?
Describe the goal of operation torch : Describe the goal of operation Torch and its eventual impact on italy in the war.
Evaluate the companys adoption of the new accounting policy : Prepare general journal entries to record the above transactions and the depreciation journal entries required at the end of each reporting period up to June 2014 - Evaluate the companys adoption of the new accounting policy with respect to the req..
What are some similarities between soviet union and china : What are some similarities between the Soviet Union and china? What are some of the differences between the Soviet Union and china?
Determine the primary security concerns : Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns
Why did communism look like a good solution to china : China Had been searching for a way to escape exploitation and political dominatation by foreign powers since the 19th century. Why did communism look like a good solution to them? Did it work?
Were taiwan and south korea free democracies dictatorship : Discuss the character of these regimes. Were Taiwan and South Korea free democracies or fascist dictatorship? How or how not?
Evaluate the natural settings of the test environment : Evaluate the natural settings of the test environment for Web users. Note: Test environments are usually labs designed to conduct testing. Natural settings refer to the user's normal operating environment
What is the probability : If n = 7 and n = 0.35, what is the probability of the following

Reviews

Write a Review

Computer Networking Questions & Answers

  Illustrate direct mapping and address bits for tag field

The main memory of a computer is organized as 128 blocks, with a block size of 16 words. The cache has eight block frames. Illustrate direct mapping and address bits that recognize the tag field, the block number, and the word number.

  Discussion on web open and free

Tim Berners Lee is known as father of the Web. In The Man who Invented the Web in 2005 it states that Berners Lee has fought to keep it open, non proprietary and free.

  Solution for multilevel tdm problem ten sources seven with

ten sources seven with a bit rate of 250 kbps and three with a bit rate of 400kbps are to be combined using multi level

  1 as a supervisor of a production department you must

1. as a supervisor of a production department you must decide the daily production totals of a certain product that has

  Explain when station a detects first collision

A draws K=0 and B draws K=2n-1 in exponential backoff protocol. Ignore jam signal and interframe space and suppose that signal propagation speed in medium is 2*108 m/sec. When does station A detects first collision?

  An effective information technology manger must be as adept

an effective information technology manger must be as adept at the application of data storage techniques relative to

  In this assignment you will research the graphical

in this assignment you will research graphical troubleshooting tools for a microsoft windows network. using the course

  Arrangement of subnet masks

An organization has a class C network 200.1.1 and wishes to form subnets for four departments, with hosts as follows:

  Need a 1000 word paper on the various recentnews on the

need a 1000 word paper on the various recentnews on the united states particular the group known as anonymous and

  Information systems securitysuppose you are the it

information systems securitysuppose you are the it professional in charge of security for a small pharmacy that has

  Question 1ai why has stuxnet virus been named as a

question 1ai why has stuxnet virus been named as a cyber-weapon?ii what has been the first identified target of the

  What does this propose to you about how to future-proof the

question consider what the book describes about mpls being originally envisioned to improve routing speed over the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd