Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Aims and Objective:
• Introduce students to real networks plans and design using cisco packet tracer.
• Understand the relationship between different network components and the flow of data among them.
• Understand different networks services and protocols.

Assignment Description:
Two organizations (universities, hospitals, airports, etc), which are geographically separated, wish to build their own computer networks and be able to connect and communication with each other. Each organization consists of many departments (e.g. Finance, Admin, Services, IT, etc). Your team is asked to design the computer networks for both organizations and show your plan and design using cisco packet tracer.

The requirements are:
•    Each department in the organization will have its own LAN.
•    The Network of the organization should support wireless connection.
•    All LANs in the organization should be connected to the outside world viaa single Gateway (router).
•    The physical plan should show that network is well organized into rooms and offices.
•    Each network should provide mailing service.
•    Each network will have its own website hosted locally.
•    Users in one network should be able to communicate via emails with users of the other network and vice versa.
•    Users should be able to access the website of their network and the website of the other network.

Assignment requirements:
• Deliver a packet tracer file which contains your plan and design that satisfy the networks requirements for both organizations.
• A report describes your plan and design, the specifications, the services, the data flow and communications.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9329

Have any Question? 


Related Questions in Computer Network & Security

Assignmentyou have been hired as the chief security officer

Assignment You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that a ...

Project infrastructure and securitythis assignment consists

Project: Infrastructure and Security This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of t ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Security configuration managementkey assignmentsignificant

Security Configuration Management Key Assignment Significant work has been completed over the past few weeks on the Network Security Architecture Design document, including the following: • Security Requirements • Perime ...

Proposal projectchoose one of the following for this

Proposal Project Choose one of the following for this project and See attachment for complete instruction and please remember to send a turnitin report. 1) Metasploit 2) Wireshark 3) Back Track 4) Nessus 5) Cain & Abel P ...

Assignmentyou have been tasked with reconfiguring the

Assignment You have been tasked with reconfiguring the network for your company, which has grown considerably over the past year. You have used only static routing in the past, but you do not wish to spend the administra ...

Case studyyour company security professionals inc has been

Case study Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as "Case # 2 - W ...

Develop a network security plan for a medical record

Develop a Network Security Plan for a Medical Record Company. As a network administrator you are required to develop a brand new security plan. The medical record company consists of the following individuals: Doctors, N ...

Information securityfor this weeks discussion consider the

Information Security For this week's discussion, consider the following prompts: A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows ...

Networking trendsnetworking trends paper in this paper you

Networking trends. Networking Trends Paper: In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, h ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro