Provide a new network design diagram in powerpoint format

Assignment Help Computer Network Security
Reference no: EM132308874 , Length: 4

Data Communications Assignment -

This assignment is designed to help you develop skills and strengthen your understanding of how data communications networks are designed.

Each question has a word limit of between 300 and 400 words which is a little under a page per question (the total length should be around 4 pages including diagrams).

Scenario -

Jim runs a small consulting firm, Soylent Co, with 30 employees spread between accounts, human resources, administration, and engineering. Jim's son, Tony, knows a bit about computers and so Jim has asked him to upgrade the company network. You went to high school with Tony.

You receive a panicked phone call from Tony telling you that he has spent the last two days trying to find why his father's newly upgraded network is having significant stability problems. You've agreed to come and take a look at what he's done and to help him fix things.

Although Tony is an acquaintance of yours, he and Jim are asking you, as a professional, to provide a report for the company. The report should be written at an appropriate professional standard, and marking will take this into account.

Question 1 - Identifying network design faults

Jim has given you a diagram showing the current state of the network using the only tool he has available to him: PowerPoint.

Examine the associated PowerPoint file and write a report identifying and describing any problems you find. (300-400 words).

Question 2 - Improving network design

Jim is impressed by your report and asks you to write a proposal to improve the network, although his budget is limited he tells you that if you can justify your design choices you may be able to purchase some more equipment.

You will need to provide a new network design diagram in PowerPoint format, thankfully Jim has included a couple of slides with various network equipment elements that you can use as templates.

What would you recommend? Justify your recommendation. (300-400 words).

Question 3 - Security

Whilst doing your evaluation Soylent Co suffers a data breach. Jim asks you to add any necessary security controls to your design. As you do so you also become aware of cross departmental security issues as the engineering department are able to see all the human resources information on the file server. What controls do you put in place to rectify these problems? (300-400 words).

Reference no: EM132308874

Questions Cloud

Describe the health care organization recruitment strategy : Describe the health care organization's recruitment and retention strategy you selected. Create a strategic recruitment plan for the healthcare organization.
Discuss what c-diff is in detail : You are caring for a patient with c-diff as part of your workload assignment. Discuss what c-diff is and how it is transmitted (how you can get it)?
How does the author suggest research results : How practical does this work seem to you? How does the author suggest research results could be applied and how do you believe they could be applied?
What program can be created to help the transgender patient : Research Paper - Transgender Care and the Health Care Professional. Transgender patients face an extreme amount of resistance and discrimination within.
Provide a new network design diagram in powerpoint format : COMP247 Data Communications Assignment - Macquarie University, Sydney, Australia. Provide a new network design diagram in PowerPoint format
Calculate the balance in connecttas work in process : ACC200 INTRODUCTION TO MANAGEMENT ACCOUNTING T119 : King's Own Institute- Describe when it is appropriate for a company to use a job costing system.
Design a relational database schema for the data provided : COSC210 - Database Management Systems - University of New England - Discuss insertion, deletion and modification anomalies and illustrate with simple examples
Identify a research or evidence-based article for treatment : Identify a research or evidence-based article that focuses comprehensively on a specific intervention or new diagnostic tool for the treatment of diabetes in.
Describe how the new tool or intervention may be integrated : A descriptive and reflective discussion of how the new tool or intervention may be integrated into practice that is supported by sound research.

Reviews

len2308874

5/20/2019 3:15:02 AM

Each question has a word limit of between 300 and 400 words which is a little under a page per question (the total length should be around 4 pages including diagrams). Ensure that you read and adhere to the following instructions: Your answer will require supporting arguments and references that cite your research, since this is a networking unit you should use IEEE referencing style. Your assignment will be submitted electronically via TurnItIn on the COMP247 iLearn page. All submissions must be in PDF format -- do not submit a MS-Word file. Also, ensure that your report does not include the question text. Any diagrams you create must be computer generated, not scanned and/or hand drawn. Your submission needs to be a single PDF file). Questions 2 and 3 should each be thought of as extensions to your initial report from Question 1 and should therefore be in the same style.

len2308874

5/20/2019 3:14:52 AM

For all questions in this assignment not only content but also presentation will affect your mark. You will lose marks if there are problems with the presentation, particularly with clarity. This means that your answers to each question should be a coherent statement and that the spelling and grammar of your submission will be taken into account in assessing its presentation. For full marks, your answers should be well argued, clear, and coherent.

len2308874

5/20/2019 3:14:44 AM

In addition, the following particular standards will be applied in marking this assignment: Spelling and grammar: Assignment submissions with more than 4 spelling or grammatical errors will not achieve a grade higher than distinction; submissions with more than 8 such errors will not achieve a grade higher than credit. Clarity: Ambiguous or poorly worded answers will receive a grade no more than a pass for the individual question. Minor issues of clarity will receive a grade no more than credit for the individual question.

len2308874

5/20/2019 3:14:38 AM

Correctness of approach taken and answer obtained: Incorrect answers with the correct logic or approach will receive no more than a pass for the individual question. Correct answers with incorrect logic or approach will receive no more than pass for the individual question. Incorrect answers with no explanation of the approach taken or with the incorrect approach will receive a fail grade for the individual question. The questions will be marked individually, the marks totalled, and a final grade assigned that is no more than indicated by the total marks, and no more than allowed by the standards specified above and in the unit outline.

len2308874

5/20/2019 3:14:31 AM

Submission - Submit on the iLearn page under ‘Assignments Section’. The submission is with a tool called TurnItIn. In short – DON’T COPY – or get others to do your assignment, we are pretty good at catching people out and the consequences can be severe. Do not trust anyone who will take money to do assignments. They can take money from several students, return the same assignment, and you get caught. They don’t care, but we do!

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd