Network topology and proposal for RMDC Project

Question # 00651683
Subject: Computer Science
Due on: 01/03/2024
Posted On: 01/03/2024 01:54 AM
Tutorials: 1
Rating:
4.9/5
Question Dot Image

Colorado State University Network topology and proposal for RMDC Project

Question Description

Scenario

Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up.

You have been hired to secure the RMC network and ensure that the company has a properly designed network that allows for future growth (500 users in 12 months) and for the highest levels of security to protect against internal and external attacks.

RMC has scheduled a meeting with its key executives and you in order to provide you with any additional information you may need.

Instructions

In an 8- to 10-page proposal, address the following three sections and their action items to provide a comprehensive secure environment:

Section 1: Topology (type of network) and Network Devices

RMC needs to set up a network; it requires clarification regarding the type of network (or topology) in order to properly configure the connections among all PCs within the organization. The company is looking for guidance regarding the type of network devices that will connect devices to the local area network (LAN).

  • The company asks that you explain what internal and external networking components are required (explain each and justify why you chose the network devices you did).
  • Provide a cryptography method that will ensure vital data is encrypted. Provide an explanation of what network protocols will be used on the LAN and why.
  • Ensure that the network has the capacity to:
    • Connect all users to company resources (e.g. printers, scanners, and other items);
    • Provide file sharing options;
    • Manage these resources in a central location;
    • Allow for internal users to access the internet; and,
    • Allow external users and vendors to access the LAN remotely.
  • Your proposal should include budgetary cost estimates for the chosen topology.

Section 2: IP Infrastructure

RMC has asked that you provide details regarding an IP structure (which includes static, DHCP—or the possibility of both—and proper IP class assignment), which is mindful of the company’s expectation of continued growth.

  • Provide a remote access plan to ensure that users who access the network remotely do so in a secure and efficient manner.

Section 3: Security

Basic security has been in place and now the company would like you to make this a more secure facility in hopes of protecting against internal and external security threats.

  • Generate a plan to provide secure access control methods for all internal-user access including a viable password policy, which includes complexity, duration, and history requirements.
  • Provide a thorough plan to protect the network from malware and various types of malicious attacks.

Submission Requirements

Your proposal should include all of the bulleted elements in the three sections above, with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with outside sources.

  1. Your paper must be 8-10 pages in length, not including the required cover and references pages.
  2. Include a minimum of six sources. (For each of the three sections, include at least two scholarly references as well as material from the Network Pro LabSim.) The CSU-Global Library is a great place to find your sources.
    • You cannot use your textbook as your primary source of information. You must draw on other sources such as books, websites, business and trade journals, legal and compliance journals, government agencies, professional associations, and industry standards, for example.
    • Visit the Library’s special research guide (Links to an external site.)Links to an external site. for this discipline.
    • If you have questions about the format or content of references, discuss it with your instructor.
  3. Ensure your entire document, including citations of sources, is in conformity with the CSU-Global Guide to Writing and APA (Links to an external site.)Links to an external site.. Visit the CSU Global Writing Center (Links to an external site.)Links to an external site. to find numerous guides on how to write and research papers including an APA template paper (Links to an external site.)Links to an external site..
  4. Your submission should include the following (title each portion accordingly):
    • Cover page.
    • Abstract: The abstract is an “executive overview” of your paper. It must be a 50- to 100-word summary that would be appropriate to present to a manager. The abstract provides the reader with the essence of your project without reading the paper in its entirety.
    • Table of Contents: This lists the sections of your paper with corresponding page numbers. Include tables and figures (if you have more than two in your paper), and any appendices.
    • Introduction: In this section, state the basis of the Detailed Technical Proposal—Comprehensive and Secure Solution example that you will be presenting. Discuss how this analysis will be based upon the concepts studied in the course.
    • Body of the paper: Include discussion, implications, and conclusion/recommendations. Provide a thorough discussion of your findings and the implications of your study. Use as headings each of the three sections under Instructions.
    • References.
Dot Image
Getsolution Posted By :
Questions: 15503 Tutorials: 15502
Tutorials for this Question

Network topology and proposal for RMDC Project

Tutorial # 00650574
Posted On: 01/03/2024 01:56 AM
Feedback Score: Not rated yet!
Purchased By: 2
Getsolution
Posted By:
Questions:
15503
Tutorials:
15502
Report this Tutorial as Inappropriate
Tutorial Preview
The solution of Network topology and proposal for RMDC Project...
Attachments
Network_topology_and_proposal_for_RMDC_Project.ZIP (18.96 KB)

Great! We have found the solution of this question!

Related Questions
Examine the several different types of data insights that occur
Question Examine the several different types of data insights that occur in big data analytics:  ? Offer novel knowledge  ? Provide causation relationships  ? Add a competit …
Computer science - Is virtualisation cost effective
Computer science question Is virtualisation cost effective and does it support green IT? Contents Introduction Is Virtualisation cost effective? Running out of space? Needing Virtualisa …
Studying Computing involves developing both subject
Studying Computing involves developing both subject-specific and transferable skills. Describe the skills you have used prior to university, and discuss how you would expect those skills to develop wh …
Computer Science - Discuss the critical characteristics
Computer Science Question Assignment 1 - Question 1: Discuss the critical characteristics of communication channels in data communications. Explain how bandwidth and communication medium affe …
List and explain two browser add-ons(plug-ins)that improve the security
1- List and explain two browser add-ons(plug-ins)that improve the security of a user’s browser. Why are these features not built-into the browser? 2- What are two security risks associated wi …
How are browsers being used to mine crypto currency
Part A: How are browsers being used to mine crypto currency? (1 pt) Find an example of malvertising. Provide a screen shot of the malvertising. (2 pts) Provide the details on how and where you …
What are the seven categories of cybersecurity functions in the NICE
security awareness What are the seven categories of cybersecurity functions in the NICE Cybersecurity Workforce Framework (https://www.nist.gov/itl/applied-cybersecurity/nice/resources/nice-cybe …
The Computer Mouse - Once a nondescript box perched on a large
The Computer Mouse Once a nondescript box perched on a large ball bearing, today the computer mouse comes in a wide range of shapes with a variety of capabilities. There are cordless mice, ergonomi …
CMSC350 Program that accepts an arithmetic expression
CMSC350 Program that accepts an arithmetic expression The second programming project involves writing a program that accepts an arithmetic expression of unsigned integers in postfix notation and bu …
Week 6 Discussions - Local Security Good Practices
Week 6 Discussions Please respond to at least two main topics  1. Local Security Good Practices Discuss in detail several effective local security practices to harden your Linux distribu …
Recent Questions
Walden HLTH6475 Complete Course Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 1 Discussion INDIVIDUAL RESPONSIBILITY VERSUS VICTIM BLAMING IN HEALTH PROMOTION Part of what makes a discussion a discussion and not a lectur …
Walden HLTH6475 All Quizzes Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 1 Quiz Question 1 Which factors have been found to influence behavior? Socioeconomic Status Skills Culture Attitude Gender A …
Walden HLTH6475 Module 6 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 6 Quiz Question 1 Which method allows study participants to tell their stories?  Observations In-depth individual interview &nbs …
Walden HLTH6475 Module 5 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 5 Quiz Question 1 What alternative term has been suggested recently for hard-to-reach? Marginalized Inaccessible Hard to access Ha …
Walden HLTH6475 Module 4 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 4 Quiz Question 1 Outreach workers from the CeaseFire program spent a total of 500 combined hours with program participants during the first y …
Walden HLTH6475 Module 3 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 3 Quiz Question 1 Which of the following is the construct of the Theory of Reasoned Action that explains behavior based on what we think other …
Walden HLTH6475 Module 2 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 2 Quiz Question 1 If the program is aimed at a true population, the term is called ______________. Intended population Intended audience …
Walden HLTH6475 All Assignments Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 2 Assignment LANNING MODELS ARTICLE REVIEW The published literature is rich with examples of health promotion programs that have utilized the …
Walden HLTH6475 Module 6 Assignment Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 6 Assignment EVALUATION PLAN Once the program has been designed, it is time to consider how the program will be evaluated. To design an evalu …
Walden HLTH6475 Module 5 Assignment Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 5 Assignment  DEVELOPING EVALUATION QUESTIONS Evaluation takes place at various points within a program's life cycle. It requires di …