Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Aims and Objective:
• Introduce students to real networks plans and design using cisco packet tracer.
• Understand the relationship between different network components and the flow of data among them.
• Understand different networks services and protocols.

Assignment Description:
Two organizations (universities, hospitals, airports, etc), which are geographically separated, wish to build their own computer networks and be able to connect and communication with each other. Each organization consists of many departments (e.g. Finance, Admin, Services, IT, etc). Your team is asked to design the computer networks for both organizations and show your plan and design using cisco packet tracer.

The requirements are:
•    Each department in the organization will have its own LAN.
•    The Network of the organization should support wireless connection.
•    All LANs in the organization should be connected to the outside world viaa single Gateway (router).
•    The physical plan should show that network is well organized into rooms and offices.
•    Each network should provide mailing service.
•    Each network will have its own website hosted locally.
•    Users in one network should be able to communicate via emails with users of the other network and vice versa.
•    Users should be able to access the website of their network and the website of the other network.

Assignment requirements:
• Deliver a packet tracer file which contains your plan and design that satisfy the networks requirements for both organizations.
• A report describes your plan and design, the specifications, the services, the data flow and communications.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9329

Have any Question? 


Related Questions in Computer Network & Security

What is the typical relationship between the untrusted

What is the typical relationship between the untrusted network, the firewall, and the trusted network? How is an application-layer firewall different from a packet filtering firewall? Why is an application-layer firewall ...

Discussionip basic concepts please respond to the

Discussion "IP Basic Concepts" Please respond to the following: - Suppose that you work for a company that has been using IPv4 in each of its networks. After hearing a discussion about the differences between IPv4 and IP ...

Web and data securitybullyour company security

Web and Data Security • Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as ...

The us government has put in place ipv6-compliance mandates

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6. Let' ...

In order to provide for the new services at the akron ohio

In order to provide for the new services at the Akron, Ohio facility, the site must be added to the existing domain and configured. Create a security matrix spreadsheet and security strategy summary. Include the user rol ...

Term paper planning an it infrastructure audit for

Term Paper: Planning an IT Infrastructure Audit for Compliance Note: Chapter 5 of the required textbook may be helpful in the completion of the assignment. The audit planning process directly affects the quality of the o ...

Assignmentnetwork architecture paper using either the osi

Assignment Network Architecture Paper: Using either the OSI Reference Model or the TCP/IP Protocol Suite, describe how each layer of the Model/Suite represents the communication flow between organizational levels and acr ...

Problem -an advanced drinks vending machine allows a mobile

Problem - An advanced drinks vending machine allows a mobile user to pay for a drink using a mobile phone billing account based on his/her fingerprint. The user is assumed to have data related to one of his/her fingerpri ...

Technical paper project disseminating organizational it

Technical Paper Project: Disseminating Organizational IT Security and Troubleshooting Best Practices Part 1 Write a ten to fifteen page paper in which you analyze and solve the following issues: Imagine you are a senior ...

Assignmentyou have been hired as the chief security officer

Assignment You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro