Prepare a lan design using visio for service request

Assignment Help Computer Networking
Reference no: EM13924749

Assignment Preparation: Activities include completing the SkillSoft® courses, independent student reading, and research.

Background: Hugh Generic of Generic Financial Services has hired XYZ Systems Consulting to help with the LAN design of two offices. Mary Prince of XYZ Systems Consulting met with Hugh Generic and a transcript of their conversation can be found in the student download section on the right within the XYZ Systems Consulting folder.

Resources:

To gain additional insight on how to analyze network needs and possible vulnerabilities, download and use NMap which also contains Zenmap GUI as the graphical interface to show scan results. NMap is a free open source tool used to gain additional information on how to review network traffic and determine additional hosts, operating systems being used, scan ports, and application versions used on a network. The instructions for use can be downloaded using the link under the materials section on the right. Be sure to follow these instructions and then review the types of information provided.

Assignment:

Determine how use of this tool can be used to make decisions and provide the modification needed for this LAN Design project.

Prepare a LAN design using Visio for service request SR-mf-005 & SR-mf-007.

Reference no: EM13924749

Questions Cloud

Essay- effects of unrestricted freedom among teenagers : EFFECTS OF UNRESTRICTED FREEDOM AMONG TEENAGERS- Drug abuse, Examples: cigarettes, drugs, alcohols, It might be hazardous
Compact fluorescent lamps-make financial sense : Compact fluorescent lamps (CFLs) have become required in recent years, but do they make financial sense? Suppose a typical 60-watt incandescent lightbulb costs $.46 and lasts for 1,000 hours. If you require a 11 percent return, at what cost per kilow..
Trying to determine the actual cost : Describe three issues/problems that a company could encounter when trying to determine the actual cost of a good or service to be used in the cost of goods sold. For each of your issues, provide an example of a company or industry where these issu..
Prepare the income statement and balance sheet : Prepare the income statement, balance sheet, and statement of cash flows for 2013 and 2014.
Prepare a lan design using visio for service request : Determine how use of this tool can be used to make decisions and provide the modification needed for this LAN Design project. Prepare a LAN design using Visio for service request SR-mf-005 & SR-mf-007
What are the consequences of credit bubbles : What are the consequences of credit bubbles? Explain the steps to be taken to control credit bubbles. Explain the reasons for the housing sector boom in the US prior to 2006.
Accounting period to the ending of an accounting period : Which of the following presents a summary of the changes in a firm’s balance sheet from the beginning of an accounting period to the ending of an accounting period? A) The statement of cash flows B) The statement of working capital C) The statement o..
Components of the organization supply chain : Choose an organization delivering goods and/or services globally. Provide a background of the organization and fully describe six components of the organization's supply chain. Examine the potential problems related to each of the components descr..
Resold the treasury stock : Trigg Corporation purchased treasury stock in 2014 of a price of $22 per share and resold the treasury stock in 2015 at a price of $42 per share. What amount should Trigg report on its income statement for 2015?

Reviews

Write a Review

Computer Networking Questions & Answers

  What motivates you to use wireless technology at work

What motivates you to use wireless technology at work or home?

  Ways to stop interference from arc welders

Provided that both the design shop and front office utilizes areas? What medium guarantees immunity from the interference?

  Recognize the differences between the php get and post

develop the footer that will be used on the rest of your submissions in this course.the footer should have the

  Development and growth of the organization

This assignment consists of two (2) sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assign..

  Some nefarious computer activities

Write a brief description of what they are, and include your assessment of whether the activities are something to worry about or not. This assignment requires two to three pages, based upon the APA style of writing.

  Identify and describe the processes involved in the windows

identify and describe the processes involved in the windows client server environment.explain the role of clientserver

  What should the subnet mask

How would you implement availability in this network? From an efficiency perspective, what should the subnet mask be for the connection between R1 and R2

  What is the missing subnet id

What is the missing subnet ID for SUB3 assuming they are assigning the subnets in subnet ID  order? What is the range of IP addresses that may be used for hosts on SUB3?

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

  Provide an information security assessment

Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind et al, and the ASD Cloud Computing Security Considerations as your primary references. This assessment should be no m..

  Benefits company will realize as result of unified network

benefits the company will realize as a result of a unified network and The types of networks (Internet, intranet, extranet)

  For aes with a 128 bit block length and a 128-bit key length

For AES with a 128 bit block length and a 128-bit key length, what is the output of the first round of AES if the plaintext consists of 128 1's and the first subkey also consists of 128 ones?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd