Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

ICT run a successful training organisation based in London, they produce bespoke training packages for the engineering industry as well as generic application software training in all of the Linuux products.

The organisation infrastructure is divided into four departments: Administration Office, Video Training, Application Training and ICT Services. Staff usually work within one department but are expected to be able to work in any department at a time of crisis. The Administration Office workspace is open plan and staffs are expected to be able to access any computer resources within the network environment.
All the computers run the same applications software and they are all capable of being used for training purposes. When any training materials are commissioned by clients a copy of the materials are written to CD and posted to the client.

Scenario

You are employed as the Network Manager at ICT and the ICT Manager has secured funding for two further training rooms. He has also identified two possible locations one in Essex and the other in Chiswick.

The Essex building has 5 training rooms contains 20 terminals each, and the rooms are evenly split on the first floor plus a conference room with 2 terminals. There are also accounts, admin and personnel departments 5, 6, 7 terminals respectively on the ground floor.

The Chiswick building has 2 floors and 2 training rooms on each with 25 terminals in each room. Chiswick also has a IS support and admin department with 4 and 3 terminals respectively. The two sites need to be linked together and there must be an internet connection to the Essex site via an ISP.

Your task is to design the network infrastructure and produce a report concerning the scalability and feasibility of the proposed design as well as justification for your design.

Your report should include the following.

You have been allocated the network address 204.191.21.0/26*****

Your task is to design and specify the networking infrastructure for the company. You are not to consider any software issues. Your design report must include the following:

1. Physical maps of the proposed network

2. Location of the main distribution facility and any other wiring closets you think are needed.

3. The assignment of IP network numbers and address ranges to all sub-nets.

4. Recommended media and network devices including hardware specification, costs and service costs.

5. A brief statement concerning the scalability and feasibility of the proposed design as well as justification for your design.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91964

Have any Question? 


Related Questions in Computer Network & Security

1 assume a system with two processors in series where each

1. Assume a system with two processors in series where each processor has an unlimited queue in front of it; also assume FIFO queue disciplines for both servers. We need to collect data on individual entity total time in ...

Cryptography assignment1 decrypt the following message

Cryptography Assignment 1. Decrypt the following message. Assume direct letter substitution. blf szev yvvm z tivzg xozhh. I drhs blf zoo hfxxvhh zmw hzkkrmvhh. 2. Research the RSA cryptographic algorithm. a. If the Publi ...

Problem -an advanced drinks vending machine allows a mobile

Problem - An advanced drinks vending machine allows a mobile user to pay for a drink using a mobile phone billing account based on his/her fingerprint. The user is assumed to have data related to one of his/her fingerpri ...

What is the typical relationship between the untrusted

What is the typical relationship between the untrusted network, the firewall, and the trusted network? How is an application-layer firewall different from a packet filtering firewall? Why is an application-layer firewall ...

Assignmentnetwork architecture paper using either the osi

Assignment Network Architecture Paper: Using either the OSI Reference Model or the TCP/IP Protocol Suite, describe how each layer of the Model/Suite represents the communication flow between organizational levels and acr ...

Networking and server landscape of rays foodusing the

Networking and server landscape of Ray's Food. Using the Configuration Scenario Instructions, create a 1-page Systems Diagram in Microsoft Visio, or another diagramming tool, that shows the technical networking and serve ...

What are the main components of cryptology explain the

What are the main components of cryptology? Explain the relationship between plaintext and ciphertext ? Define asymmetric encryption. Why would it be of interest to information security professionals? One tenet of crypto ...

1 what attributes do organizations seek in a candidate when

1. What attributes do organizations seek in a candidate when hiring InfoSec professionals? Prioritize this list of attributes and justify your ranking 2. What are the critical actions that management must consider taking ...

Term paper chief security officeryou have been hired as the

Term Paper: Chief Security Officer You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security ...

Cloud networking and service provisioning - standard

Cloud Networking and Service Provisioning - Standard project: Auction System in the Cloud 1. Introduction The project consists of designing and implementing an auction system (AS) which offers its services as SaaS to end ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro