The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Somebody already asked this question just need the answer
Â
IntroductionIn this project we will design a network solutionthat is suitable for a small business. Our businessis located in an oFce park in one ±oor of a newoFce building. Our oFce has all of the modernfeatures of a contemporary workplace, includingadequate, clean power, air conditioning and goodlighting. We are fortunate in that our oFce wasbuilt with a secure computer room that already hasa direct connection to a local Internet ServiceProvider’s regional network, and we will use thisconnection for our access to the Internet.Our oFce will include cube space and oFce spacefor 18 workstations. ²our of the workstations willbe located in private oFces for the companyexecutives, and the remaining 14 workstations willbe deployed into cubicles for the employees. Thecubicles are located in a spacious, open cubiclearea. Our computer room is directly adjacent toour cubicle area, and it has power and cooling thatis adequate for server needs. Our computer roomhas been built with appropriate physical security,so we have controlled access to our servers. Allworkstations and servers in all oFces, cubicles andother areas are all easily within 30 meters of eachother, so no cable run will exceed 30 meters.²or basic security reasons, we have been taskedwith producing a network design that separatesany servers that must be accessible from theInternet in an area that is logically separate from aprivate internal area where our internal servers andworkstations will reside. Regardless of where theymay reside, our servers and workstations must beprotected from attack! We are required to describehow we will logically separate our network into thearea that is accessible from the Internet from theinternal area, how we will secure our network, andhow we will secure the servers and workstations inour network. We are admonished to pay particularattention to the security of the servers that mustbe accessible from the Internet. So, our design willinclude at a minimum two logically di³erent areas
Attachments: