Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

You have been hired as a network designer to design a network for Acme Limited, a medium-sized Engineering Company. They have provided you with the specifications below and asked you to design the network in full.
The corporate network consists of three offices, in Dublin, Cork and Galway. There is also a remote site located in Donegal, which should be connected to the corporate site through a VPN.

Detail of problems

•    You are required to design all aspects of the network, including cabling, network diagrams, hub/switch/router locations and configurations, IP Addressing scheme, subnetting, routing protocols and configurations, redundancy, scalability, security, LANs, WANs, WLANs, VLANs, VPNs and DMZ.

•    Your design should be done to best practice and should be logical, efficient, practical, scalable and secure.

Deliverables:

•    Research paper of approximately 4,500-5,000 words, discussing your research into network design and describe and justifying your own network design.

•    Network diagrams mapping in detail the entire network.

Structured report containing research. Sources of information MUST be referenced. Your report should also include your network topology diagrams. The report MUST be formatted according to the IEEE authoring style guidelines for conference papers. A copy of the guidelines is available at: http://www.cms.livjm.ac.uk/iwna5/authoringtemplate.pdf.

There is no strict word limit but the report would be expected to be in the region of 4,500-5000 words, including references.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91166

Have any Question? 


Related Questions in Computer Network & Security

1 assume a system with two processors in series where each

1. Assume a system with two processors in series where each processor has an unlimited queue in front of it; also assume FIFO queue disciplines for both servers. We need to collect data on individual entity total time in ...

Select one of the following topics in which you will base

Select one of the following topics in which you will base your responses in the form of a term paper: • Network Neutrality • Web2.0 • Wireless Technology • Broadband Convergence • U.S. Telecommunication Policy • Internet ...

Lab assignment- assessment questions1 explain the two

Lab Assignment- Assessment Questions 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? 2. Compare and ...

Wireless and remote access securitykey assignment

Wireless and Remote Access Security Key Assignment Draft Great progress has been made on the design of the network with the addition of the client and server security models in the previous assignment. With the increasin ...

Project infrastructure and securitythis assignment consists

Project: Infrastructure and Security This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of t ...

Introduction to information systems securityphysical

Introduction to Information Systems Security Physical Security Paper Research the following topic: Physical Security • What types of physical controls can be implemented to protect the perimeter of a building? • What typ ...

Go to csrcnistgov and locate federal information processing

Go to csrc.nist.gov and locate "Federal Information Processing Standard (FIPS) 197." What encryption standard does the address use? Examine the contents of this publication and describe the algorithm discussed. How stron ...

Proposal projectchoose one of the following for this

Proposal Project Choose one of the following for this project and See attachment for complete instruction and please remember to send a turnitin report. 1) Metasploit 2) Wireshark 3) Back Track 4) Nessus 5) Cain & Abel P ...

What are the main components of cryptology explain the

What are the main components of cryptology? Explain the relationship between plaintext and ciphertext ? Define asymmetric encryption. Why would it be of interest to information security professionals? One tenet of crypto ...

Case study cyber security in business Case Study: Cyber Security in Business

Case Study: Cyber Security in Business Organizations Protecting organizational assets and information within the company has become a top priority for many organizational leaders. Review the article titled "Missed Alarms ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen