Recommend security features for network

Assignment Help Computer Networking
Reference no: EM131034789

Can you please put the answer with the question and please use the worksheet.

Your Business Case: You are an eager new networking consultant, and a school district has hired you for your first consulting job.

Currently, the district has no links between its buildings. School personnel share files by transferring CDs and diskettes between the buildings. The district is putting in new school management software for student and financial records. The software requires that the buildings be networked together.

That district has a grade school, junior high, and high school. The grade school and the junior high are smaller buildings on the same plot of land but they are in separate buildings about 50 yards apart. The high school is newer and larger; it is several miles away on the other side of town.

The school district has thirty teachers, three principals, three administrative assistants, fifteen staff members, and 500 students.

Security is always an issue. The school offers courses in computer science at the high school. The principal is concerned that the students will be tempted to hack into the school management software. The superintendent requests a security plan to help prevent student hackers from accessing the school management software. Also, the superintendent has a vague worry about students accessing pornography on the Internet. The district would like to know if you can configure routers and/or switches to prevent this. Or, is extra equipment or software needed to prevent students from accessing pornography from school computers?

The school superintendent bought some equipment and then realized that no one knew how to make it work. The equipment includes one 2600 series router, two 2500 series routers, and six 1900 series switches.

Your mission: Design a network to connect the three buildings and recommend security features for this network. You will plan your solution step by step, and then present your overall design to your client.

Milestone: The previous milestone in a Word document, formatted nicely. Plus, a new page with a more detailed diagram of the network. Be sure to include all of the information about IP addresses, subnets, and subnet masks.

A good detailed design adds to the general design diagram. Be sure to add the following:

1. The overall network address and subnet mask.

2. The addresses of the subnets.

3. IP addresses for hosts and router interfaces.

Be sure that the diagram is still easy to read even though it contains more information than the general design! Please copy your diagram into the Word document that contains Milestone 1, also. Then, submit that document to your instructor.

Assignment:

For this week's discussion forum, discuss one of the following questions:

- Layer 2 switches work at a simple level for communication and switching. With technology advancing and routers being able to make more complex decisions, why is this method still used?

- At layer 2, there are three switching functions that can be performed. List and explain them and then give your feelings on which one is most efficient in its duties and discuss why.

- STP is good at what it does, according to the book. Is it necessary? Would a system using Layer 2 switching still work without it?

Read all postings and respond to at least two. Remember that earlier postings are much appreciated - your fellow students need time to read your posting and respond to it. Your answer should be well thought out (showing that you have engaged in some critical thinking about the subject matter) and be at the very least, 2 substantial paragraphs in content. Be sure to cite your sources. It is very important to be prepared to support your position. Failure to do so will result in a zero grade for your assignment.

Please note that Wikipedia is not a credible cited source. Feel free to go to Wikipedia to look up general information about your topic but no direct material listing "Wikipedia" as the source will be accepted.

One additional note of caution: Do not cut and paste directly from the Internet to the discussion forum. That is plagiarism, and, as a minimum, you will receive a grade of zero for the discussion assignment. Instead, summarize what you find in your own words. Remember to properly cite your sources. Read all postings and respond to at least two for minimal credit. These postings are due by the end of the academic week to get credit.

Again, "Wikepedia" and "My Personal experience" are not acceptable in this class as credible cited sources.

Assignment - Semester Project - Milestone

Begin working on Milestone 2 of your Semester Project. This milestone will be due at the end of Week 8. It includes the IP addressing information that you need for your draft diagram you handed in earlier. You can access the detailed instructions for this milestone by clicking on the Semester Project button on the left-hand side of your course. Post any problems you are having to this week's discussion forum.

You will be submitting your diagram as an attached Word document.

Reference no: EM131034789

Questions Cloud

Problem regarding the financial security investments : David Brooks was one of the most liked managers at the Financial Security Investments. In an industry known for its cutthroat competitiveness, high employee turnover, low loyalty, and high employee mobility, the 20 brokers who reported to Brooks h..
Sort a n-element integer array with different elements : comparisons required by the Quicksort, and Mergesort algorithms to sort a n-element integer array with different elements
Identifies the social marketing elements of the program : Describes the health education components of the program. Identifies the social marketing elements of the program. Summarizes information provided to the media regarding the program.
Different sets of constituents to satisfy : Hulu has three different sets of constituents to satisfy. Who are they and how does Hulu serve each of them? Do the needs of these customer groups converge?
Recommend security features for network : You are an eager new networking consultant, and a school district has hired you for your first consulting job - Design a network to connect the three buildings and recommend security features for this network. You will plan your solution step by ste..
Do an equilibrium analysis to explain your answer : The rope is used to tow the refrigerator. In order to prevent yourself from slipping while towing, is it best to pull up as shown, pull horizontally, or pull downwards on the rope? Do an equilibrium analysis to explain your answer
Calculate the fugacity of methane in a mixture of 80 mol% : Using the Lewis fugacity rule, calculate the fugacity of methane in a mixture of 80 mol% meth- ane and 20 mol% ethane atT5190.6 K andP532.2 bar.
Write a program to swap 2 numbers using reference variables : Write a program to swap 2 numbers using reference variables.
What other examples can you think of : The chapter mentions internal and external locus of control. This theory was developed by Rotter. If we have an internal locus of control we feel that we have control over our lives and are responsible for our actions. If we have an external locus..

Reviews

Write a Review

Computer Networking Questions & Answers

  Impact of a particular trend in technology

Analyze the impact of a particular trend in technology on education and analyses of various authors on innovations and technological transformations in education and in other fields.

  Internal network address to incorporate variable length sub

Change the internal network address to incorporate variable length subnet mask (VLSM) with EIGRP routing protocol. Set up all of the accountants on a separate VLAN. Create a VPN connection to allow accountants to access the accounting database from..

  How the arp cache poisoning attack work

In this task, you need to demonstrate how the ARP cache poisoning attack work. Several commands can be useful in this task. In linux we can use command arp to check the current mapping between IP address and MAC

  Design communication system for transmission of four sources

Design a communication system (block diagram) that will allow the transmission of these four sources over the telephone channel using FDM with SSB(single sideband) subcarriers

  Define in your own words what is meant by the term

write a five to six 5-6 page paper in which youdefine in your own words what is meant by generative software

  What are network performance characteristics

What are network performance characteristics?

  Explain the concepts and building blocks of networks

Explain the concepts and building blocks of today's data communication networks, such as switches, routers, and cabling

  Explain personnel implication setting up wan on global basis

Explain what the personnel implications are when setting up a WAN on a global basis. What are some of the barriers involved with global teams?

  Network security policy plan-administrator

As the new network administrator, one of your first responsibilities is to draft a network security policy plan that employees must sign and follow when using the company's network.Research and discuss the items that you would place in such a plan..

  What technique is used to exchange messages

What technique is used to exchange messages between two parties ensuring confidentiality? Discuss.  What technique is used to exchange messages between two parties ensuring authenticity? Discuss.

  Internet of things

This is one of the current topic worth discussing. It describes the attempt of social media to use Internet to obtain much information from people than accepted by the privacy and confidential laws. If the principle or idea of Internet of Things i..

  Design an algorithm to achieve the byzantine agreement for

design an algorithm to achieve the byzantine agreement for the case that there are four processes amongst which one is

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd