What kind of naming structure would you give to servers

Assignment Help Computer Networking
Reference no: EM13478227

Mr. Smith is the Director of IT at a law firm located in downtown Chicago. He needs to plan for a network upgrade. He has decided that he would like to have a network analysis done before the upgrade so that he can find out which systems would require upgrades and to create a strategy to present to the senior partners that will include return on investment.

The law offices occupy four floors of a high-rise building. The customer is experiencing network latency, especially in the Accounting department and in Human Resources, which both reside on the 32nd floor. The director of the Accounting department has expressed concerns about the security of his files. The Research, IT, and Corporate Administration departments all share the 33rd floor. The senior and junior partners and their support staff occupy the 35th floor, and the 36th floor is used for reception and conference rooms. The firm has decided that video conferencing is an essential component of its business and is looking to implement video conferencing as soon as possible so it can communicate with two new satellite offices that will be occupied in six months.

The firm has one network segment for each floor, but has been experiencing latency. Each floor except the 36th has 10 to 20 printers. Each floor has a 100Mb uplink to the Data Center on the 33rd floor. There are approximately 50 PCs on the 36th floor, 150 PCs on the 35th floor, and 40 PCs on both the 32nd and 33rd floors. The servers for each department reside on their respective floors. Mr. Smith is concerned about network security and wants a recommendation to secure traffic of three specific departments: Human Resources, Accounting, and Corporate Administration.

Answer these questions:

What type of testing program (Prototype or Pilot) would you recommend to test the video conferencing among the remote offices? Justify your choice of one testing program over the other.

What type of naming structure would you give to servers, network devices and end nodes in this network? Provide a few examples.

Explain why Mr. Smith's existing network does not provide adequate security for the data in each department. How do you want to optimize the network?

Explain to Mr. Smith the function of each network device.

Recommended a prototype or pilot testing method and explained reasons for choice.

Defined a naming convention for servers, network devices, end nodes, etc. Included examples for each.

Detailed reasons that the current environment was inadequate for each of the departments.

Proposed network optimization and offered reasons.

Described the functions of the various network devices, in laymen's terms.

Answered the question regarding how requirements of key departments impact the network design.

Reference no: EM13478227

Questions Cloud

Dbe the role of hospitals and other health care : public health surveillance and prevention efforts in the u.s. reflect the involvement of numerous health care providers
Kathleen dancewear co has bought some new machinery at a : kathleen dancewear co. has bought some new machinery at a cost of 1250000. the impact of the new machinery will be felt
Estimate the expected real rate of return on ten- year u s : a thirty- year u. s. treasury bond has a 4.0 percent interest rate. in contrast a ten- year treasury bond has an
Financial statement analysis our purpose this week learning : financial statement analysis our purpose this week learning how to measure the performance of companies by analyzing
What kind of naming structure would you give to servers : mr. smith is the director of it at a law firm located in downtown chicago. he needs to plan for a network upgrade. he
Yuve been offered following investment opportunity if you : you have been offered the following investment opportunity if you invest 16000 today you will receive 4000 two years
How has mobile computing changed shopping behavior of : your response should be at least 200 words in length. you are required to use at least your textbook as source material
The companys financial experts say that the appropriate : 21st century cat is a film producing company which is contemplating the productionof a new film. they estimate thatthe
Analyze whether risk assessment methodology is quantitative : above is the global finance inc. gfi network diagram. a hypothetical company gfi has grown rapidly this past year and

Reviews

Write a Review

Computer Networking Questions & Answers

  Justify whether or not network design will support vpn

Justify whether or not your network design will support dial-up or VPN remote access using descriptions of the following aspects: the advantages and disadvantages of your remote access solution.

  How client process in given end system find location of user

Explain how a client process in a given end system can find the location of a given user to establish a connection, for example, Internet telephone, at a given point in time.

  Diagram of simplest connection between two computers

Using Ethernet Network Interface Cards or NICs, diagram simplest connection between two computers which will allow for communications and resource sharing.

  Explain the reasons for your selection

Select a preferred supplier and briefly explain the reasons for your selection - provide the information that you are summarising. Higher marks will be awarded to answers which contain more complete information.

  Recommend a network to accommodate the office locations

power networks has opened offices in toledo columbus and cleveland. the corporate headquarters are located in toledo.

  Data center managers sometimes find that the most

data center managers sometimes find that the most conventional solutions to their data storage problems are not solved

  Question 1aname five significant activities involved in a

question 1aname five significant activities involved in a digital forensic investigation.bwhy is computer forensic

  Describe the features and benefits of csma-cd

For the purposes of this question you do not need to know about the token access method. You just want to explain the features and benefits of CSMA/CD.

  Tools to enhance password protectionfrom atm to accessing

tools to enhance password protectionfrom atm to accessing ones email accounts everything today needs creation and

  Compute the throughput for file transfer

Host A wishes to send the large file to Host B. Path from Host A to Host B has three links, of rates R1=10 Mbps, R2=500 kbps, and R3=750 Kbps. (1Kbit=210bit) Suppose no other traffic in network, determine the throughput for file transfer?

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Decision-making process to help the company grow

How would you utilize this information in the decision-making process to help the company grow?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd