Develop a suitable vpn network for an sme

Assignment Help Computer Networking
Reference no: EM132281320

Assignment: Tasks: There are two parts to this assignment, i.e. part A and part B.

A. Investigate, design and develop a suitable VPN network for an SME by addressing the following criteria. See detailed instruction in the next section.

B. Presentation

Part A description: There are two areas to consider for VPN network design in this assignment.

1. Design a network for an SME

2. Build VPN services for the users

Contents must include:

? Introduction

? Scopes and Limitations

? Requirements (Network parts and VPN service parts)

? Solution Design

a. Logical Design

b. Physical Design

c. Network Topologies

d. IP addressing

e. Security features and Policies

f. Redundancy and Failover plans

g. VPN service implementation

? Refer the sample document included in below for network design, and consider how to implement VPN services onto the network. Do not copy the contents of the sample in your work as it is regarded as plagiarism.

Part B description: Prepare slides (between 10 - 15 slides) for presentation during the lab class. The solution of VPN services and network design shall be presented with 15 minutes for a group during week 11 Lab class. Presentation slides should be submitted in Moodle prior to the presentation for marking. No other options (e.g. hard copy, memory stick, website, email etc) will be considered but the presentation file submitted in Moodle.

Students should be able to demonstrate their achievements in the following unit learning outcomes:

1. Develop architectural VPN designs for small, medium and large businesses and corporations

2. Report on the health of the existing VPN architecture, solution, data, application, and technology

3. Investigate and justify the appropriate design and solution for different organisations

4. Analyse and report on the current and future state of the management of VPN infrastructure and its technologies

5. Define a roadmap process to transform the VPN architecture to support long-term organisational goals

6. Implement a process to support the administration and the management of VPN

Reference no: EM132281320

Questions Cloud

How do law enforcement organizations regulate the use : How do law enforcement organizations regulate the use of social media? Research the best practices related to the regulation of police officers.
Identify and define the allied health team members : NUR250 Medical Surgical Nursing - Charles Darwin University - Identify and define the Allied Health team members that should be involved in the patient's care
Work competition causes conflict when you have teams : Making sure that everyone is equally aware of things such as dates, deadlines, changes and other details when working together will minimize confusion.
How you think a diversion-oriented shift might impact case : How you think a diversion-oriented shift might impact case processing and case-flow management. APA , References, and in-cite citations
Develop a suitable vpn network for an sme : Investigate, design and develop a suitable VPN network for an SME by addressing the following criteria. See detailed instruction in the next section.
Estimating the cost of capital : In this case, is it worse to commit a 10% error in estimating the cash flow, or to commit a 10% error in estimating the cost of capital?
What is the units impact on the community : What is the unit's impact on the community? What options do the police have for containment of a person they have contact with?
Draw a UML domain model class diagrams : Case Study- University Enrolment system. Draw a UML domain model class diagrams for the new information system
Discuss how kelsey care plans for future cases and services : Articulate case management responsibilities and the importance of strategic planning and vision as foundations of successful case management services.

Reviews

Write a Review

Computer Networking Questions & Answers

  Design requirements of lan, voip and wireless

You are required to submit business need and Design Requirements of Entire WWTC Project. The requirements include but are not limited to- Design Requirements of LAN, VOIP and Wireless and Design Requirements of Security.

  Create both a firewall architecture and acls

A firm has the following firewall policy: Employee access to Internet servers should be unrestricted and external clients should only be able to access the firm's public webserver.

  Examine cable maintenance tools that you would consider

Examine three cable maintenance tools that you would consider essential for a network team. Of the three tools that you have examined.

  How would you use ti frame relay atm or mpls

How would you use TI, Frame Relay, ATM or MPLS? How would you use DSL or Cable modems? How would you use VPN? What type of attacks would you expect and how would you protect from those attacks?

  Write a paper on cloud computing services

Write a 1- to 1.5-page paper on cloud computing services, paying particular attention to cloud storage, security, and application services. Begin with a brief history of cloud computing, and relate your paper to a current business that is using th..

  Server management with linux commands

System Administration - Write down your understanding on this in your own words in one paragraph - Server management systems and tools

  Implement network for an small and medium sized enterprise

ME504 - Advanced Networking - A thorough verification and evaluation analysis should be presented to meet he ULO mapping in the Unit Description

  Create spreadsheet analyzing cost-savings of replacing lan

Create a spreadsheet analyzing cost and savings of replacing the LAN with wi-fi network for organization of 450 people.

  What is a reader or an interrogator

What is a reader or an interrogator? What security issues are associated with RFID tags? How can these concerns be mitigated? One class of active tags is called beacons. What does a beacon do?

  How can network segmentation protect cardholder data

When you arrive at work one morning, your Inbox is full of messages complaining of a network slowdown. You collect a capture from your network monitor.

  Determine whether you would use static or dynamic routing

Determine whether you would use static or dynamic routing to connect the routers. Justify your response with the key benefits that your choice provides.

  Describe the objective of the communication

Writing Skills Problem Staff members from the marketing department of your firm are doing a splendid job selling products to customers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd