Develop a network diagram using microsoft visio

Assignment Help Computer Networking
Reference no: EM132233674

Question: Review the Network Configuration Visio document of the Mayberry Satellite Campus. This diagram will be used throughout the course.

Scenario: As an IT networking trainee for your organization, your supervisor has given you an assignment to extend the Mayberry Network to an additional space (see existing diagram). The organization has obtained a space to create a 20-station learning center and two classrooms at the existing location. Each classroom will have one computer for the instructor and a wireless access point for the students. Typically, your supervisor has used computers with an Intel Core i5 processor, 16 GB of RAM, a 500 GB hard drive and a 10/100/1000 Ethernet NIC, but wonders if a better solution is available and would like you to recommend a solution.

Develop a 1-page network diagram using Microsoft Visio, or one of the free network diagramming programs you researched in Week One, to create a drawing of the learning center. The diagram should include:

• 22 computers that you specify

• Detailed specification for cabling, routing and switching, and wireless or VLAN options to connect to the existing network

Information related to above question is enclosed below:

Attachment:- Diagram.rar

Reference no: EM132233674

Questions Cloud

Difference between invention and innovation : ENGG6005 - Innovation and Commercialisation - University of newcastle - Explanation of the difference between invention and innovation
Discuss three challenges that cloud organizations could face : Companies that collect data on citizens in European Union (EU) countries will need to comply with strict new rules around protecting customer data by May 25.
What steps can companies take to protect trade secrets : What steps can companies take to protect trade secrets? With more persons working from home, how does one separate data intended for the employer.
How does the choice of encryption impact vpns : Encryption and a secure VPN are virtually inseparable. A secure VPN exists only because its traffic is encrypted. But some trusted VPNs may or may not use.
Develop a network diagram using microsoft visio : As an IT networking trainee for your organization, your supervisor has given you an assignment to extend the Mayberry Network to an additional space.
How system interacts or communicates with other resources : Access control is a procedure that is incorporated into an organization's information technology environment. The system identify and regulate the authorization
What would you do in the given situation : You are a professionally certified project manager working for a consulting company. Your manager has just let you know that you will be assigned to work.
Identify emerging technology that poses ethical challenges : Conduct research and find one article that identifies one emerging technology that poses ethical challenges. Describe the technology and ethical issues raised.
Write an essay describing that information : There may be personal information that you want considered as part of your admissions application. Write an essay describing that information.

Reviews

Write a Review

Computer Networking Questions & Answers

  What ipv-six addresses should you assign to each location

What IPv6 addresses should you assign to each location? When constructing your answer, list each location as Location 1, Location 2, and so forth.

  What types of networks have you used

What types of networks have you used? How does a network topology affect data communication?

  Power point presentation on knapsack problem

Prepare a 35 to 37 slides Power Point Presentation on the given topic "Knapsack problem"

  What are name of routing protocols that currently are in use

What are the names of some of the routing protocols that currently are in use on the Internet? Can you describe each protocol with a sentence or two?

  Managing intrusion detection environment

As security manager at XYZ Corporation, you are responsible for managing intrusion detection environment. If you were given the ability to build the environment from scratch, would you use network based IDS, host based IDS, or a combination?

  What command is used to find out the version of the ios

Repeat problem 8 if the destination IP address for the data packet is 10.5.10.2. The subnet mask is still the same. Show your work.

  How can network fail for one of the perceptrons

Show that in the limit as c→∞ the behaviour of this network of sigmoid neurons is exactly the same as the network of perceptrons. How can this fail when w⋅x+b=0 for one of the perceptrons?

  Describe snmp architecture and model function

Describe SNMP Architecture and Model Function. Discuss about Three-Tier Organization Model- RMON (Remote Monitoring).

  A company with headquarters at 1 talavera rd north ryde

a company with headquarters at 1 talavera rd north ryde wishes to obtain internet access. they require unlimited data

  Research on wireless standards

Research the 802.11 wireless standards, select 3 implementations (802.11e, 802.11i, 802.11n, 802.11ac, etc.), and describe each of them in 1-2 paragraphs.

  Find two examples of the TCP-IP protocol suite

Find two examples of the TCP/IP protocol suite that differ from this book's layering and cite sources. How are those two suites alike, and how do they differ?

  Security concerns that a web designer

What are the security concerns that a web designer must address and be aware of? How much of the responsibility for securing the site lies with the host, and how much lies with the designer? How can you, as a web designer, implement good security ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd