Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

City Campus enrolled 600 students each year.It was proposed to house 2 computer servers, 2 IBM campatible labs and 1 multimedia lab on the 1st floor. 2 servers: 1 for staff & 1 server for student. Applications to run: Lotus Note,remote access, video conferencing with overseas university partner.

2IBM server compatible labs each housing 20pcs.

Access point for wireles within the building.

1 multimedia lab housing 20pcsequipped with latest multimedia tools .

The faulty staff and students of CityCampus need the ability to communicate with each other via email and to access to internet.
Plan and design a LAN/WAN for CityCampus based on the following considerations:

1. To provide mail services, intranet and internet anywhere, anytime in th vicinity of the campus.

2. Linking up classroom to the network.

3. Provide a secure, private wireless network for students to access the campus network and internet.

4. Provide a security to protet network.
Report should include the following:
1. Hardware requirements: The basic specification of servers and associated hardware(routers,switch,firewall,etc.)
2.Software requirements: Detail requirements(OS,applicationsoftware etc) and the justification.
3. Outline tand discuss 3 major network security considerations that have to be addressed so that the school can be reasonablysure of truble-free continued operation.
4.Proposea 1st cut of your network diagram, to include the architectures and all the physical media used in the network.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9883253
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Lab activity investigate system backup and restore

Lab Activity: Investigate System Backup and Restore Tools Purpose: Assess and Document Tools to Backup and Restore the System Hard Drive for a Windows 8.1 Workstation. - Assess and document the use of a system backup too ...

What are three ways that even every forecast model should

What are three ways that even every forecast model should be evaluated to obtain the best forecast result.

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Part - athe assignmentwrite a critique review of the

Part - A The assignment Write a critique / review of the following paper: Mark Pollitt Eoghan Casey David-Olivier Jaquet-Chiffelle Pavel Gladyshev, "A Framework for Harmonizing Forensic Science Practices and Digital/Mult ...

Americans purchase a lot of coffee grown in brazil and

Americans purchase a lot of coffee grown in Brazil and elsewhere in Latin America. It would seem that in order to avoid the huge transportation costs of bringing coffee here and to provide jobs for Americans, we should g ...

How would you explain the concept of a quality adjusted

How would you explain the concept of a quality adjusted life year? When is it appropriate to use "QALYs" instead of simply improved life expectancy as the outcome measure in an economic evaluation?

Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: a. What is the network mask used by the router? (in dotted de ...

Rsa internet securitywhy is rsa believed to be hard to

RSA, Internet security Why is RSA believed to be hard to break? I. E. The complexity of what computational problem leads to the belief that it is secure? RSA can be used to authenticate messages by concatenateing to the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As