Propose one 1 strategy to upgrade the companys present

Assignment Help Computer Networking
Reference no: EM13463697

Imagine that you are the administrator for a small accounting company, which currently employees 200 people. The CEO announces a merger that would double the number employees to 400. Your current network design is as follows:

  • 200 host machines running Windows 8 with 10/100 auto sensing NIC
  • 9 Cisco Catalyst 2960 Switches (100 Mb)
  • 1 Cisco Router
  • Category 5 Ethernet cabling
  • Class C network address (supporting 254 addresses)

Write a two to three (2-3) page proposal in which you:

1) Recommend one (1) strategy to upgrade the company's current infrastructure to support the new / additional employees.

2) Recommend one (1) strategy to create a high-performance network.

3) Recommend one (1) new network address that will allow you to scale your network in the event of additional mergers.

4) Design the new addressing scheme for the network through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

Reference no: EM13463697

Questions Cloud

With the five kinds of scripting languages what sets each : write a 200- to 300-word short-answer response to the followingwith the five types of scripting languages what sets
Consider recent trends in migration and immigration in us : globalization has caused extensive shifts in the mobility of people between countries. economics political shifts and
Choose a phase in the systems development life cycle and : choose a phase in the systems development life cycle and describe the tasks that make up the phase. what are some
Computer architecture is the combination of software and : computer architecture is the combination of software and hardware that is organized in such a fashion as to deliver
Propose one 1 strategy to upgrade the companys present : imagine that you are the administrator for a small accounting company which currently employees 200 people. the ceo
Design three security posters on various aspects of : part 1 review questions what functions constitute a complete information security program? what is the typical size of
Dscribe epistemological perspective from text or outside : explain the epistemological perspective from the text or outside sources that most coincides with your view of truth
Examine the trade-offs between inputs for productivity : outsourcing especially to low labor-cost countries has grown substantially. be sure to address the following in your
Discuss the advantages and disadvantages of nesting the : discuss the advantages and disadvantages of nesting the information security role within the information technology it

Reviews

Write a Review

Computer Networking Questions & Answers

  How company ensure adequate destruction of materials

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

  Calculate the end-to-end delay

Suppose a propagation speed of 100 km/hour. Assume caravan travels 150 km, beginning in front of tollbooth. Calculate the end-to-end delay.

  How company can back up and protect network data

Develop the disaster plan for selected organization which includes how you would suggest company back up and protect network data.

  What role does dns play with active directory

For the second part, consider the use of DNS in Server 2008 and describe how you would employ DNS within your infrastructure. What advantages does DNS provide? What role does DNS play with Active Directory?

  Determine the throughput for file transfer

Assume Host A wishes to send large file to Host B. Path from Host A to Host B has three links, of rates R1=500kbps, R2=2Mbps, and R3=1Mbps. Suppose no other traffic in network, Determine the throughput for file transfer.

  1 we are building a network using radios that operate at

1. we are building a network using radios that operate at 1ghz in an urban area.nbsp once end of the link will have the

  Explain the osi model and tcp-ip protocol

Define and explain the OSI model, TCP/IP protocol, File transfer protocol, or wireless workstation giving examples of its usage and explaining its' background and history

  End to end encryption

How is end to end encryption different from other types of encryption? At what layer does it take place?

  A review full headers of a sample email message you

a. review full headers of a sample email message you received in your gmail account create one if you dont have one

  Snmp securitybullsnmpv1 is the most commonly used version

snmp securitybullsnmpv1 is the most commonly used version of snmp even though it provides little support for security.

  Describe two important defensive steps or mechanisms

Identify any of the "measures that may be used for intrusion detection" (things/events that IDS look for) AND discuss how monitoring this measure might lead to a "false alarm" by your IDS.

  Question 1aregister the owasp top 10 web application

question 1aregister the owasp top 10 web application security risks for 2010.bwhy does software have to be intensively

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd