It network consultant mainly switches and routers

Assignment Help Computer Networking
Reference no: EM13766166

You have been hired as an IT/ network consultant for a start-up company. The company, " Inetwork", sells used Cisco equipment

-mainly switches and routers. Inetwork will consist of seven departments:

As an IT consultant you have been tasked to design a secure network:for the internal network as well as access to the Internet.

They are planning on using the following servers: databases, e-mail, and web.

Write a detailed report as a proposal for this network design by addressing the requirements below (not necessarily in the order shown):

Cabling

Computers - and IOS

VOIP connection and voice network

Wired and wireless connections

Switches and routers

IP addressing scheme and VLANs

Internet access, type of WAN service-

Server placements and Network OS

Security and firewalls

Data storage and backup

Any hardware and software

Cost estimate of the proposed network

Reference no: EM13766166

Questions Cloud

How has the us'' adoption of functional managers : Explain how what Clark describes as strategies- to- task methodologies seek to allocate resources? How has the US' adoption of "functional managers" changed the way collection is planned and executed
Views concerning decriminalization of status offenses : Your individual work assignment is to complete and explore the following: Express your views concerning decriminalization of status offenses
Rewrite a c++ program : I have Assign in C++ , I create evrething but my project not work also Iput it all documents.
Environment of open communication : It is important for the leader to create an environment of open communication where ideas, solutions, and problems can all be discussed without fear. When employees understand that communication is open and encouraged, they will perform better.
It network consultant mainly switches and routers : You have been hired as an IT/ network consultant for a start-up company. The company, " Inetwork", sells used Cisco equipment
Attributes of the transformational style of leadership : What are the key attributes of the transformational style of leadership? Explain why you think these attributes are required of a transformational leader.
Differences between juvenile diversion and probation : Now that you are familiar with the juvenile correctional process write a 2 to 3 page APA-formatted paper discussing the differences between juvenile diversion and probation
Journal entry to pay a cash dividend : 1. The journal entry to pay a cash dividend is to:
Functions of management issues : What is the importance of these communication methods within this organizational structure?

Reviews

Write a Review

Computer Networking Questions & Answers

  Purpose of non routable protocols

In your opinion, what is the purpose of nonroutable protocols? Is there a legitimate reason for having nonroutable protocols? Do you think they can be replaced and with another type of protocol or innovative system?

  What is snmp and what are its major parts

What are the five areas of network management defined by the ISO - define the terms; managing entity, managed device, management agent, MIB, network management protocol.

  Explain the importance of communication protocols

Explain the importance of communication protocols and Define the overall network architecture

  Reserved route takes over when device or connection fails

It determines new tree topology when switch or cable link failures. Reserved route takes over when device or connection fails. To aggregate ....to gather together Which is better, 10x100Mbps or 1Gbps?

  Modules in c functions

Modules in C are called functions. C programs are typically written by combining user-created functions as well as "pre-packaged" functions found in the C Standard Library.

  Rize nos which can be implemented to achieve this

you work for a small computer reseller located in the southeast united states. the company started 2 years ago and has

  Weigh in on the debate between gsm and cdma

The first student to post will respond to the last student to post. In addition, you should comment on at least one other person's response.

  Determine result of scrambling sequence using techniques

Determine the result of scrambling sequence 11100000000000 by using one of the following scrambling techniques? Suppose that last non-zero signal level has been positive.

  A computer that can test 2^40 keys each second

Given a computer that can test 2^40 keys each second. What is the expected time to find a key by exhaustive search given a key space, say 2^88. How do you go about figuring this out? Is there a formula or standard equation that is used?

  Electromycycle a manufacturer of a new electric motorcycle

electromycycle a manufacturer of a new electric motorcycle has chosen you to design a new network that will let the

  Create subnet assignment which give contiguous address space

Provide subnet assignment which gives contiguous address space to each department. (b) Do same in (a) but with department B having 70 hosts.

  Investigate the weaknesses that arise in elgamal encryption

investigate the weaknesses that arise in Elgamal encryption if a public key of small order is used. We look at the following example. Assume Bob uses the group Z

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd