What type of naming structure would you give to servers

Assignment Help Computer Networking
Reference no: EM131321516

Assignment

Mr. Smith is the Director of IT at a law firm located in downtown Chicago. He needs to plan for a network upgrade. He has decided that he would like to have a network analysis done before the upgrade so that he can find out which systems would require upgrades and to create a strategy to present to the senior partners that will include return on investment.

The law offices occupy four floors of a high-rise building. The customer is experiencing network latency, especially in the Accounting department and in Human Resources, which both reside on the 32nd floor. The director of the Accounting department has expressed concerns about the security of his files. The Research, IT, and Corporate Administration departments all share the 33rd floor. The senior and junior partners and their support staff occupy the 35th floor, and the 36th floor is used for reception and conference rooms. The firm has decided that video conferencing is an essential component of its business and is looking to implement video conferencing as soon as possible so it can communicate with two new satellite offices that will be occupied in six months.

The firm has one network segment for each floor, but has been experiencing latency. Each floor except the 36th has 10 to 20 printers. Each floor has a 100Mb uplink to the Data Center on the 33rd floor. There are approximately 50 PCs on the 36th floor, 150 PCs on the 35th floor, and 40 PCs on both the 32nd and 33rd floors. The servers for each department reside on their respective floors. Mr. Smith is concerned about network security and wants a recommendation to secure traffic of three specific departments: Human Resources, Accounting, and Corporate Administration.

Answer these questions:

• What type of testing program (Prototype or Pilot) would you recommend to test the video conferencing among the remote offices? Justify your choice of one testing program over the other.

• What type of naming structure would you give to servers, network devices and end nodes in this network? Provide a few examples.

• Explain why Mr. Smith's existing network does not provide adequate security for the data in each department. How do you want to optimize the network?

• Explain to Mr. Smith the function of each network device.

• Will the needs of key departments change your network design? Explain your answer.

Write a 3 - 5 page paper using the APA style that summarizes your findings, and provides enough detail to fully support your opinion.

Reference no: EM131321516

Questions Cloud

What is the firm average cost of capital : PrintQuik Inc. has a cost of equity of 14% and a cost of debt of 6%. If the firm is financed with 70% equity and 30% debt, and they operate under the conditions of a perfect capital market, what is the firm’s average cost of capital?
Discuss the interest group efforts in these policy areas : In Chapter Nine the authors discuss three policy areas -- Health care, Finance, Energy - that have benefited from interest group efforts. Discuss the interest group efforts in these policy areas. Make specific reference to the American Amnesia ..
Research and discuss such dilemma and propose solutions : The IEEE 802.11 Task Group i (TGi) is developing new WLAN security protocols named TKIP and CCMP. CCMP is envisioned to supersede WEP and TKIP. Research and study these efforts and comment on the progress.
Coefficient of kinetic friction between block and ramp : The coefficient of kinetic friction between the block and the ramp is 0.20. If the distance for the to reach the top of the ramp or the bottom of the ramp are both 10 m, how long will it reach the top or bottom of the ramp after the setup is relea..
What type of naming structure would you give to servers : What type of naming structure would you give to servers, network devices and end nodes in this network? Provide a few examples.
Prepare the entries for both conceptual and parole inc : Prepare the entries for both Conceptual and Parole Inc. from the start of the lease through the rental payment on April 1, 2011.
Identify structure and function of gastrointestinal system : Identify the structure and function of the gastrointestinal system. Identify the major structures found in the system. Define the function of this system
What will be the aftertax cash flow from the sale : Custom Cars purchased some $39,000 of fixed assets two years ago that are classified as 5-year MACRS property. The MACRS rates are 20 percent, 32 percent, 19.2 percent, 11.52 percent, 11.52 percent, and 5.76 percent for Years 1 to 6, respectively. Th..
Determine the magnitude of net force that acts : Both fields point in the same direction. A positive 1.6-μC charge moves at a speed of 3.3 × 106 m/sin a direction that is perpendicular to both fields. Determine the magnitude of the net force that acts on the charge.

Reviews

Write a Review

Computer Networking Questions & Answers

  Nternet access methods are the dsl modem and the cable modem

In not less than 300 words, discuss in a comparative sense the broadband access solutions, with particular attention to FTTH as an ultimate contender.

  Organization security plan

Identify threats and vulnerabilities.

  Create spreadsheet analyzing cost-savings of replacing lan

Create a spreadsheet analyzing cost and savings of replacing the LAN with wi-fi network for organization of 450 people.

  How might you interconnect those two areas

Some say that one of the great problems in networking is the lack of enforceable standards, so that the equipment of any manufacturer can work with any other manufacturer "off the shelf". Do you agree? Justify your answers

  Aspects of security that are just as important as encryption

People who are new to security often assume that security simply means encryption. Why is this a naïve assumption? What are some other aspects of security that are just as important as encryption

  Discuss the many uses of gre and how you could secure it

Protocol 47 or GRE is one of the most flexible IP protocols in networking but it is insecure. Discuss the many uses of GRE and how you could secure it across insecure networks like the Internet

  What are the two limitations of static packet filtering

Write between 600 to 800 words for each of the short-essay questions. All questions are of equal value. You should provide credible references for each question according to the Faculty of Business guidelines.

  Technique to create tcp connection without nat configuration

Try to devise a technique that will allow Arnold to establish a TCP connection with Bernard without application-specific NAT configuration. If you have difficulty devising such a technique, discuss why.

  Find the network diameter

Develop a different way to connect the switches and count the number of computers again. Does one topology give better results than the other?

  Description of the network components

Description of the network components

  Could you reduce the amount of data that would be lost

Could you get enough information from the Internet to take out a loan in another person's name? You should provide any recent cases in Australia to support your explanation.

  Outline a plan for the development of an addressing and

write a three to four 3-4 page paper in which youq1. outline a plan for the development of an addressing and naming

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd