Employed to design a network infrastructure for two campuses

Assignment Help Computer Networking
Reference no: EM131395871

Telecommunications Case Assignment

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed. As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network's topology including any necessary hardware.
2. You should list any recommended cable.
3. You can recommend wiring closets wherever you need them.
4. You should recommend ways to assure that you are not getting attacked.
5. You should build traps to stop attackers.
6. You should recommend any WAN or wireless technologies.
7. You should recommend any technology needed in the data center for high availability.
8. Justify your recommendations.

Verified Expert

In the given task the there is network in which database server and web server are present. In other hand there is branch network but branch having only database server. So for the given network design is required. security implementation is required and company wanted to trap attacker so that source of attack can be known. DMZ is recommended for the given assignment to provide security. and server redundancy is created for providing high availability.

Reference no: EM131395871

Questions Cloud

Whether given are definitions by subclass - tale : Determine whether the following are demonstrative definitions, enumerative definitions, definitions by subclass, synonymous definitions, etymological definitions, operational definitions, or definitions by genus and difference.
Whether the given enumerative definitions - error : Determine whether the following are demonstrative definitions, enumerative definitions, or definitions by subclass.- "Error" means mistake.
Explain concepts of server virtualization to management : Determine the strategy you would use to explain the concepts of server virtualization to senior management so that they understand the concepts and can form an opinion on the solution. Provide a rationale for using your chosen strategy.
Whether given enumerative definitions - professional person : Determine whether the following are demonstrative definitions, enumerative definitions, definitions by subclass, synonymous definitions,or etymological definitions.- "Professional person" means a person such as a doctor, a lawyer, a professor, or a..
Employed to design a network infrastructure for two campuses : As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications.
Demonstrative or enumerative definitions - philosopher : Determine whether the following are demonstrative definitions, enumerative definitions, definitions by subclass, synonymous definitions, etymological definitions, operational definitions, or definitions by genus and difference.
Write a program that prompts user for an unsigned int value : Write a program that prompts the user for an unsigned int value. Compute and display the result when the bits are shifted one position to the left. Save the file as ShiftToLeft.cpp.
How could you have been a better team member : Based on your knowledge from a past or present job, explain the difference between a group and a team. Would you say you were a part of a group or a team while working in that job?Now, identify a team that you were a part of and describe the advant..
Identify four possible market segments : Select a consumer product or service you are familiar with and identify four possible market segments. Use the categories seen in class (geographic regions, demographics, psychographics and behavioral variables

Reviews

Write a Review

Computer Networking Questions & Answers

  How to access remoteapp applications from partner server

In the TS RemoteApp Manager console, there are currently two warning indicators showing in the Overview area. Will any of these warnings make it impossible to access your RemoteApp applications from your partner server?

  Do you think cert should continue to post security holes

Some experts argue that CERT's posting of security holes on its Web site causes more security break-ins than it prevents and should be stopped. - What are the pros and cons on both sides of this argument?

  Weigh in on the debate between gsm and cdma

The first student to post will respond to the last student to post. In addition, you should comment on at least one other person's response.

  Attack can be detected and mitigated by stateless firewall

For each of the following attacks, say whether the attack can be detected and mitigated (to a significant degree) by a stateless or stateful firewall. Explain briefly.

  Question 1one of the criticisms of measurement of the work

question 1one of the criticisms of measurement of the work of software engineers is that they will probably change how

  What is the last byte number that can be sent without an ack

Which bytes will be sent next? What is the last byte number that can be sent without an ACK being sent by the receiver?

  Write a plan like digital evidence for investigation

You decide to carry out an investigation. Write a plan for this investigation. The plan should include: digital evidence source identification, recovery, collection, documentation, and report.

  Cisco router perform all the ip subnetting

The network administrator at Netstack College has chosen Cisco to provide the routers on his network. Recall that there are six buildings on campus with 250 connections each in four buildings, 180 connections in the fifth building, and 80 connecti..

  Question 1a describe what a turtle shell architecture is

question 1a describe what a turtle shell architecture is and give an instance.b briefly clarify the principle of least

  Write a report on network design and management trends

Networking Trends Paper: In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization and security.

  What is needed to accelerate its deployment

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Homework 555 to guide you in your research you will be

to guide you in your research you will be answering various questions on can. you should answer each question fully.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd