Develop a unified network with an ip addressing distribution

Assignment Help Computer Engineering
Reference no: EM133926751

Assignment: IP Distribution

As an investor, you've secured a three-story building, comprising two apartments per floor. While most apartments boast four rooms, the first-floor units are uniquely designed with five rooms each. To enhance your investment's appeal and profitability, you've decided to lease these apartments to businesses, offering the added incentive of complimentary internet access. Each apartment is equipped with a single internet outlet, all of which are centrally managed from a control room located on the building's side. This control room is directly linked to the local Internet Service Provider (ISP), ensuring reliable connectivity for all tenant businesses.

To establish an IP distribution network that caters to each apartment/office's specific needs within a building equipped with five routers offering wireless capabilities, the following structure is proposed:

I. First Floor Configuration:

1. The first-floor houses two distinct businesses: a medical center and a medical lab, each occupying one side of the floor. Although separate entities, they share the use of a printer. This printer allows the lab to produce patient reports for the medical center.

2. Design Strategy: Implement two separate networks, each with its own IP addressing scheme, catering to the medical center and the medical lab, respectively. Within each network, two computers will have the capability to access a shared printer. This setup enables the exchange of printed patient reports between the two businesses. To comply with HIPAA regulations and ensure privacy, these networks are isolated from each other, with the exception of the two designated computers connected to the shared printer.

II. Second Floor Configuration:

1. The entire second floor is occupied by a single business entity that utilizes both apartments/offices.

2. Design Strategy: Develop a unified network with an IP addressing distribution that serves the entirety of the second floor, accommodating the needs of the single business entity operating there. Get the instant assignment help.

III. Third Floor Configuration:

1. Each apartment/office on the third floor houses an independent business entity, requiring individual networks.

2. Design Strategy: Create two distinct networks with separate IP addressing distributions for each office. These networks should afford each business private access to its specific resources, such as servers and printers, while preventing visibility or access to and from the neighboring business's network.

IV. Router Optimization:

1. To ascertain whether the number of routers could be reduced without compromising network efficiency and privacy, consider adopting VLAN (Virtual Local Area Network) technology. Research VLANs and write your findings if this could be feasible (you need to search the web on how to implement a VLAN don't forget citation).

Reference no: EM133926751

Questions Cloud

Explain what elements of your personality assessment results : Explain what elements of your personality assessment results surprised you, if any, and explain how accurate you felt the results were and why.
Importance of preserving digital information on the business : Identify the types of digital evidence that need to be preserved (e.g., emails, files, system logs, databases), and specify how employees should handle them
Draw on your understanding of the literature : DSMG29006 Volunteerism and the Community, CQUniversity - Describe the role volunteering plays within your selected organisation and its impact on the community
Explain how the evidence supports your argument : Write an argument-driven historical essay of not more than 500 words. Explain how the evidence supports your argument.
Develop a unified network with an ip addressing distribution : Develop a unified network with an IP addressing distribution that serves the entirety of the second floor, accommodating the needs of the single business entity
Should employers be allow to take adverse employment actions : Should employers be allowed to take adverse employment actions regarding what employees do on their off-hours? If not, why not?
How educator implements a range of contemporary approaches : EDEC101 Foundations of Teaching and Learning, Excelsia University College - Write a Critical Analysis (1000 words) on how the educator implements a range
What considered a normal left ventricular ejection fraction : What is considered a normal left ventricular ejection fraction (LVEF)? List important teaching points that nurses need to teach to patients with heart failure.
How do we prioritize daily tasks : How do we prioritize daily tasks? What causes the most stress when faced with a long to-do list? How can you alleviate some of that stress?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd