Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

You are developing an alternative processing site you need a network diagram, estimated bandwidth, rack diagram, and estimate of power based on the following.

Consider the LAN for a small 100-person business, Pixel Inc. The business occupies one floor in an office building. Everybody has a computer on his or her desk, and there are servers for the Web, file & print sharing, email, database, and a small 3D render farm, a rack of 20 dual processor Xeon servers running Red Hat Linux that generates the actual high-resolution video animations that Pixel produces for its clients. The desktop systems consist of Apple Mac Pro desktops running Mac OS X Leopard for the creative staff, and Windows Vista PC computers for general use. The servers are Windows Server 2003 running Microsoft Exchange, Web server, and file & print service. The network is gigabit Ethernet and the network hardware is a mixture from Cisco and Hewlett-Packard.
Employees, business partners, and clients may visit Pixel's office with laptop computers in order to collaborate on projects. The laptops will obtain their IP configuration from the DHCP server at Pixel.
Pixel has 10 megabit/second Internet access, and uses a SOHO firewall that doubles as a DHCP server. This firewall filters out Internet-based attempts to access Pixel's servers and desktop computers, but admits email, web, and SFTP (Secure FTP) traffic destined for specifically hardened servers.
Pixel produces short animation movies for advertiser clients. These clients are located worldwide and need to communicate securely with Pixel as they collaborate on their advertising shorts. Pixel uses its high- speed Internet connection both to support the exchange of movie shorts as well as for email and general Internet web connectivity.
The network has the following additional specifications:
1. The network is all TCP/IP based
2. The network is based on Cisco routers and switches
3. All desktop computers include email, Web, database access, and office productivity software
4. Creative users also have multimedia authoring software installed
5. All server and critical network equipment is in a secure server room
6. Printers are located around the office area
7. The multimedia department uses high-end workstations for video rendering and animation
8. A load-balancing dual firewall connects the network to the Internet
There is a wee security policy in place:
1. All email must be secure so it cannot be inadvertently sent to the wrong party or intercepted
2. All network resources and equipment must be password protected
3. Company equipment may not be used for personal business
4. All Windows-based PCs must run approved anti-virus and anti-spyware programs
5. All servers and desktops should run host-based intrusion detection software
6. Clients may use the Secure FTP (SFTP) server to send or receive multimedia files but under no circumstances should one client be able to view the files of any other client
7. The mail server must be configured not to forward email that originated on the Internet
8. Password aging must be enforced on all servers and desktops
9. All server configurations must be readily available to rebuild a failed system
10. Off-site backup is required, with 24x7 access to that location
11. All employees will demonstrate they understand the security policy
12. The security officer reports directly to Pixel's CEO 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9112105

Have any Question?


Related Questions in Computer Engineering

Compare remote authentication dial-in user service radius

Compare Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access-Control System Plus (TACACS+).

How does the learning environment effect the success of

How does the learning environment effect the success of students? Provide examples.

Take a tour of your building on campus or at work what is

Take a tour of your building on campus or at work. What is secured at night when workers are absent? Record the location and type of physical access control devices. How do these access controls change at night when work ...

Reminder all files must be closed when you are done with

Reminder: All files must be closed when you are done with them, even if it stops early due to an IOError. If you're using with, this will happen automatically. If you're trying to close things manually using .close(), th ...

1 why is it unlikely for magnesium to form a cation with a

1) Why is it unlikely for magnesium to form a cation with a charge of +1? 2) How can you tell whether disilicon hexabromide is considered an ionic or molecular compound according to its formula or name?

Sorting algorithms are one kind of algorithm whose

Sorting algorithms are one kind of algorithm whose performance may depend upon the data. Choose one of the sorting algorithms or any other algorithm and explain whether the there are any differences in the best, average ...

In terms of reducing the total number of memory accesses a

In terms of reducing the total number of memory accesses a program might require. Using the arithmetic expression S = (A+B)-(C+D), support this statement.

A orange juice producer buys all of his oranges from a

A orange juice producer buys all of his oranges from a large orange orchard in Florida. Suppose that the amount of juice squeezed form each of these oranges is normally distributed with a mean of 4.70 and a standard devi ...

Need a use case diagram for a case studythe case studypaul

Need a use case diagram for a case study: The case study Paul is the Director of IT Services for a consulting firm Avant. The firm has been growing fast since it was launched in 2010. With over 100 employees and hundreds ...

Suppose you make 30 annual investments in a fund that pays

Suppose you make 30 annual investments in a fund that pays 6% compounded annually. If your first deposit is $7,500 and each successive deposit is 6% greater than the preceding deposit, how much will be in the fund immedi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As