Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Aims and Objective:
• Introduce students to real networks plans and design using cisco packet tracer.
• Understand the relationship between different network components and the flow of data among them.
• Understand different networks services and protocols.

Assignment Description:
Two organizations (universities, hospitals, airports, etc), which are geographically separated, wish to build their own computer networks and be able to connect and communication with each other. Each organization consists of many departments (e.g. Finance, Admin, Services, IT, etc). Your team is asked to design the computer networks for both organizations and show your plan and design using cisco packet tracer.

The requirements are:
•    Each department in the organization will have its own LAN.
•    The Network of the organization should support wireless connection.
•    All LANs in the organization should be connected to the outside world viaa single Gateway (router).
•    The physical plan should show that network is well organized into rooms and offices.
•    Each network should provide mailing service.
•    Each network will have its own website hosted locally.
•    Users in one network should be able to communicate via emails with users of the other network and vice versa.
•    Users should be able to access the website of their network and the website of the other network.

Assignment requirements:
• Deliver a packet tracer file which contains your plan and design that satisfy the networks requirements for both organizations.
• A report describes your plan and design, the specifications, the services, the data flow and communications.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9329

Have any Question? 


Related Questions in Computer Network & Security

Computer scienceunauthorized access to networks and the

Computer Science Unauthorized access to networks and the information they contain can present significant problems to an organization. Part of a good network improvement includes a review of system security and identific ...

Create a spreadsheet that takes eight values that a user

Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the ...

Assignmentplanning is an important aspect with any

Assignment Planning is an important aspect with any enterprise network structure. However, planning must encompass several aspects including not only the assessment of the technology required, but also keeping the stakeh ...

Develop a network security plan for a medical record

Develop a Network Security Plan for a Medical Record Company. As a network administrator you are required to develop a brand new security plan. The medical record company consists of the following individuals: Doctors, N ...

Services in your arearesearch dsl and cable modem services

Services in your area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem services. Resea ...

Assignmentwan technologies paper research point-to-point

Assignment WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies as ...

Module discussion questionpersonal factors such as anger

Module Discussion Question Personal factors, such as anger, revenge, and lack of rewards and recognition, may increase the risk of someone stealing from or spying against employees. Organizations should apply adequate se ...

Assignment description1overview of the assessmentthe

Assignment Description 1 Overview of the assessment: The purpose of this assignment is to develop skills to independently think of a situation and Apply skills to analyze complex problems in network security under superv ...

Q1 the rijndael algorithm was chosen for the advanced

Q1: The Rijndael algorithm was chosen for the Advanced Encryption Standard (AES). Using either the attached tutorial, or your own sources of information, pick one (or more) steps of the algorithm and explain it in some d ...

This assignment assumes that you are one of the network

This assignment assumes that you are one of the Network Engineer of a small Company which has two branch offices, Branch 1 (BR1), Branch 2 (BR2) and a Headquarter (HQ). The branches need to be interconnected to the Headq ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen