Network Design for Office Building . VPN Testing


This is an individual project. Each student must complete a network design for an office building that proposes a telecommunications solution to address an organization that is moving into a new office space. The target audience will be the organization’s Chief Technology Officer (CTO). The network design deliverable is an Microsoft Word document. The completed network design deliverable is due by 11:59 PM Eastern Time on the due date shown in the Course Schedule. See the Additional Information section of the syllabus for the penalty for late or missed assignments and projects. The Network Design is valued at 15% of the course grade. Scenario Congratulations! After graduating from UMUM with your degree, you’ve been hired by a local company that is in the process of moving into new space. Your job is design out the local area network for this new space. The office building has 3 floors with cubicle and office space for 24 workstations on each floor. Additionally, on the second floor, there is a separate space designated for four file servers, which will be used company-wide. Finally, there are two telecommunications closets on each end of each floor for housing network equipment. Please review the accompanying office diagram for specifics before you begin designing the network. Your design assumption is that the network should support the following on each desktop workstation: a)Office applications such as Microsoft Office Suite (housed on one of the local servers)b)Electronic Mail (housed on one of the local servers)c)Network file sharing (housed on one of the local servers)d)Internet Access e)Database access to one of the local serversf)Occasional data streaming (live video conferencing, etc.) Your specific assignment is to complete the following: Specify what type of cabling would run to each workstation;Specify the network device(s) housed on each floor;Specify the connections between the network devices and servers (what type of network are you proposing); andExplain your rationale for each of the decision above. In other words, why did you select the device/cabling/connections.Develop a physical network diagram that shows cabling choices, network devices and connections to devices and servers. The Deliverable The CTO has asked you to develop a network design that provides the following: A Microsoft word document that spells out your network design, the recommended network cabling, device(s), and connections between workstations, device(s), and servers (in other words, summarize in writing your recommendations to the above), and developA physical network diagram that displays the components specified above. Your network diagram can be produced using any drawing software package available if you save it in a format that is viewable to your instructor, such as a pdf (check with your instructor to ensure she/he can open your particular network diagram). In addition, you may choose to draw your physical diagram by hand, which is okay. Please make the diagram neat and legible, use color to identify specific components and cable paths, label all components, and upload a high-resolution photo of your design to the assignment tab. You may break your diagram into sections (photograph and upload those separately) if you include an illustration of how these sections fit together. If you utilize external references, your sources must be cited correctly in APA format. Your paper will be graded according to the Scoring Rubric below. Be sure you have incorporated all required aspects of the assignment.Please see the instructions attached.The assignment are in part a and bPart a: IFSM 370 Project 1a Network Design Instructions.docxPart b: IFSM 370 Project 1b_VPN Testing Intructions.docx VPN Log.xlsxNOTE: please answer the questions separately, different papers and make sure all sources being used are cited correctly APA formatplease follow the grading rubic

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

As a future advanced practice nurse, it is important that you can connect your classroom experience to your practicum experience.

WARNING:

THIS POST WAS COPIED FROM www.Academicheroes.com Study Tutors Online.

FOR HELP, VISIT THEIR WEB PAGE AT:
https://www.Academicheroes.com

GET QUALITY ESSAY HELP BY VISITING www.Academicheroes.com HERE:

https://www.Academicheroes.com

As a future advanced practice nurse, it is important that you can connect your classroom experience to your practicum experience. As a future advanced practice nurse, it is important that you can connect your classroom experience to your practicum experience. By applying the concepts, you study in the classroom to clinical settings, you enhance your […]

WARNING:

THIS POST WAS COPIED FROM www.Academicheroes.com Study Tutors Online.

FOR HELP, VISIT THEIR WEB PAGE AT:
https://www.Academicheroes.com

GET QUALITY ESSAY HELP BY VISITING www.Academicheroes.com HERE:

https://www.Academicheroes.com

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

PhD Questionnaire

  1. What are your research interests in the area of Information Technology? Why are you inspired to research in this area, and why do you think it is important to research in this area?
  2. Why did you select PhD in Information Technology? Why did you select University of the Cumberlands?
  3. As an individual, what are your strengths and weaknesses and how will they impact you as a PhD IT student?
  4. Where do you see the future of Information Technology going and where do you see yourself in this mix after obtaining PhD in Information Technology from University of Cumberlands?

 

“Is this question part of your assignment? We Can Help!”


PhD Questionnaire was first posted on August 31, 2019 at 7:17 pm.
©2019 "Classroom Essays". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at karlmick10@gmail.com

Source link

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


PhD Questionnaire was first posted on August 31, 2019 at 7:17 pm.
©2019 "nursing Writers". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at Academicheroes.com

 

“Are you looking for this answer? We can Help click Order Now”



 

(function() {
var occ = document.createElement(‘script’); occ.type = ‘text/javascript’; occ.async = true;
occ.src = (‘https:’ == document.location.protocol ? ‘https://’ : ‘http://’) + ‘www.onlinechatcenters.com/code.a-28559-64888.js’;
var s = document.getElementsByTagName(‘script’)[0]; s.parentNode.insertBefore(occ, s);
})();


PhD Questionnaire was first posted on August 31, 2019 at 7:18 pm.
©2019 "Nursing Assignment Tutor". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at support@nursingassignmenttutor.com

 

(function() {
var occ = document.createElement(‘script’); occ.type = ‘text/javascript’; occ.async = true;
occ.src = (‘https:’ == document.location.protocol ? ‘https://’ : ‘http://’) + ‘www.onlinechatcenters.com/code.a-28559-64888.js’;
var s = document.getElementsByTagName(‘script’)[0]; s.parentNode.insertBefore(occ, s);
})();

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Analysis Of Mobile Phone Usage

Question:

Scenario

You are Grace Park, an analyst for BI Intelligence. BI Intelligence is the Business Insider’s paid

research service. Business Insider is the world’s fastest‐growing business news website and its

articles include the latest technology, money and market news. BI Intelligence produces a number of

reports on key digital areas, including the mobile industry. Information from those reports is then

subsequently published on the Business Insider’s website by their respective writers.

Michelle Yeoh, a tech journalist at Business Insider, wants to publish an article on the current smart

mobile phone usage in Australia. This is in light of Australia being ranked 2nd in the world behind

Singapore for smart phone usage. Businesses, including telcos, find this information useful and

subsequently use it to improve their own operations, marketing strategies, etc., for the digital age.

Michelle’s article will be wide ranging and include commentary on the user’s expenditure, usage

patterns and demographics. Michelle has asked you to conduct the market research.

You subsequently take a random sample of 150 smart phone users in Australia and survey them on

their usage, as well as other related data.

Michelle’s specific analysis requirements are outlined in his email, which is reproduced on the next

page.

Memorandum

Memorandum

Date: 14th April, 2018

To: Grace Park, Research and Analysis Department

From: Michelle Yeoh, Chief Data Analyst

Subject: Analysis of Mobile Phone Data

Dear Grace,

Can you please carry out an analysis of the recent Mobile Phone market data (contained in the file

MobileData.xlsx) and prepare a Memorandum reply to me containing answers to the following

questions. In your Memorandum, please use plain language as I will provide your reply directly to

people who do not necessarily understand statistical jargon.

My specific questions are:

Q1. An Overall View of Mobile Phone spend per month

Can you provide an overall summary of how much consumers spend on their smart phones per

month? A summing up of the variable “Monthly Bill” just by itself, would be useful.

Q2. Monthly Bill vs Lifestyle Factors

I am interested in how the monthly smart phone bill relates to lifestyle factors. In particular, does

there appear to be any difference in how much consumers spend on their smart phone per month,

across the three most common geoTribe categories – Achievers, Independents and Suburban

Splendour.

Q3. Mobile Phone Affordability

(a) Can you estimate the average monthly bill for all smart phone owners in Australia?

(b) Using your smart phone as a payment device is the next frontier in a cashless society. Can

you estimate the proportion of all smart phone owners in Australia that use their phone as a payment device?

(c) Additionally, can we conclude that there is a difference between the proportion of male and

female owners when it comes to using their smart phone as a payment device?

Q4. Mobile Phone Usage

(a) A previous report, published by Business Insider, indicated that the proportion of smart

phone owners in Australia who use their smart phone for work‐related activities is no more

than 75%. A colleague of mine believes that the proportion is higher, given that the smart

phone synchronises email, calendars and documents. Can you check my colleague’s claim?

(b) A business rival stated that the average number of phone calls made by Australian smart

phone owners last month was at least 27 calls. I feel that this average may be overstated as

there are other ways in which communication can occur, including popular Internet based

alternatives. Is there any evidence to suggest that the average calls last month is less than

27?

Q5. Relationships

I would like to see whether factors listed below provide any explanation in the variation of monthly

phone bills between consumers. If so, can you also indicate which factor is the most important?

(a) Number of Calls

(b) SMS’s

(c) Data Allowance

Q6. Appropriate Sample Size

Finally, I am concerned that the sample of 150 smart phone users in Australia is too small to provide

accurate results as this seems hardly enough data. For a study we intend to undertake next year, we

would like to be able to:

(a) estimate the proportion of Mobile Phone users that have purchased an item online to within

6%, and

(b) accurately estimate the average monthly bill to within $4.

How many Mobile Phone users would we need to include in next year’s survey to satisfy both of

these requirements?

Regards, Michelle

  1. Harvard referencing is required
  2. Can provide sample also
  3.  Not more that 2000 words for assignment plus calculation on excel sheet required.

 

“Is this question part of your assignment? We Can Help!”


Analysis Of Mobile Phone Usage was first posted on August 31, 2019 at 7:26 pm.
©2019 "Classroom Essays". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at Academicheroes.com

Source link

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


Analysis Of Mobile Phone Usage was first posted on August 31, 2019 at 7:31 pm.
©2019 "Essay Associates". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at admin@Academicheroes.com.com

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Web Application Attack Scenario

Suppose that you are currently employed as an Information Security Manager for a medium-sized software development and outsourcing services company. The Software Development Director has asked you to provide a detailed analytical report for her department regarding the most common web application threats and the manner in which their products could compromise customer financial data.

She wants your recommendations on which threats and/or vulnerabilities the company should focus on and your recommendation for mitigation.  The products in question use Microsoft SQL Server databases and IIS Web servers.

Write a paper with no less than four pages in which you:

  1. Analyze the common threats/vulnerabilities to data systems such as web applications and data servers. Speculate on the greatest area of vulnerability and potential for damage and/or data loss of such data systems.
  2. Devise at least one attack scenario, as an example, where a hacker could use the area of vulnerability that you chose above in order to gain access to a network or sensitive data. Examine the primary ways in which the hacker could execute such an attack, and suggest the strategic manner in which a security professional could prevent the attack.
  3. Explore the primary role that the human element could play in adding to the attack scenario, if appropriate.  You may wish to decide if the human component is critical in protection from that type of attack.
  4. Draw specific lessons and recommendations as part of the conclusion, and have a strong concluding paragraph.  Be sure to revise your introduction to reflect what the paper accomplished once you finish your first draft.
  5. Use no less than five quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

“Is this question part of your assignment? We Can Help!”


Web Application Attack Scenario was first posted on August 31, 2019 at 7:28 pm.
©2019 "Classroom Essays". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at Academicheroes.com

Source link

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


Web Application Attack Scenario was first posted on August 31, 2019 at 7:29 pm.
©2019 "Academicheroes.com". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at admin@Academicheroes.com.com

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Biology Discussion

WARNING:

THIS POST WAS COPIED FROM www.Academicheroes.com Study Tutors Online.

FOR HELP, VISIT THEIR WEB PAGE AT:
https://www.Academicheroes.com

GET QUALITY ESSAY HELP BY VISITING www.Academicheroes.com HERE:

https://www.Academicheroes.com

Consider reviewing the information about proteins, carbohydrates and fats in the OLI modules. Pick a type of food that you enjoy. Before you start researching, state a hypothesis about the nutritional content of this food. Remember a hypothesis is an educated guess (and may be wrong), and a good hypothesis is specific. Then summarize what […]

WARNING:

THIS POST WAS COPIED FROM www.Academicheroes.com Study Tutors Online.

FOR HELP, VISIT THEIR WEB PAGE AT:
https://www.Academicheroes.com

GET QUALITY ESSAY HELP BY VISITING www.Academicheroes.com HERE:

https://www.Academicheroes.com

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Bob Wells is an 82-year old male who has returned to the orthopaedic ward yesterday

THIS POST WAS COPIED FROM Academicheroes.com Best Essays.

FOR HELP, VISIT THEIR WEB PAGE AT : https://www.Academicheroes.com/

GET QUALITY ESSAY HELP BY VISITING Best Essays – Academicheroes.com HERE :

https://www.Academicheroes.com/

Bob Wells is an 82-year old male who has returned to the orthopaedic ward yesterday Bob Wells is an 82-year old male who has returned to the orthopaedic ward yesterday following internal fixation of his right hip. Mr. Wells fractured his hip when he tripped and fell in the long-term care facility where he lives. […]

THIS POST WAS COPIED FROM Academicheroes.com Best Essays.

GET QUALITY ESSAY HELP BY VISITING Academicheroes.com HERE :

https://www.Academicheroes.com/

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Knowledge Strategy Principle Application

Knowledge sharing and management provide the continuous building blocks of an effective KMS. Consideration should be given to how data transition into valuable information and how knowledge is shared throughout an organization. The transition of data to information to knowledge is paramount for successful managers and organizations. It is important to consider how information is acquired, knowledge is stored, and how knowledge is accessed and shared by decision-makers throughout a competitive business environment.

After reading the assigned resources this week, please utilize the NCU Library and other academic sources of your choice to formulate a strategy for implementing a knowledge strategy and KMS within an organization of your choice. In your write-up, ensure that you address how knowledge is gathered, stored, and disseminated for all corporate stakeholders. Please include a diagram demonstrating your understanding of knowledge strategy principles with your deliverable.

Length: 7-10 pages (not including title and reference pages)

References: Include a minimum of 5 scholarly resources

Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards.

References:

Becerra-Fernandez, I., Leidner, D. E., & Leidner, D. (2008). Knowledge management: An evolutionary view. New York, NY: Routledge.

Garcia-Perez, A., & Ayres, R. (2010). Wikifailure: The limitations of technology for knowledge sharing. Electronic Journal of Knowledge Management…

 

“Is this question part of your assignment? We Can Help!”


Knowledge Strategy Principle Application was first posted on August 31, 2019 at 7:23 pm.
©2019 "Classroom Essays". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at Academicheroes.com

Source link

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


Knowledge Strategy Principle Application was first posted on August 31, 2019 at 7:25 pm.
©2019 "Essay Associates". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at admin@Academicheroes.com.com

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Public Policy Debate

The authors in chapter 10 draw many conclusions about using models to create public policy. Below are three different quotations from the book, each representing one conclusion.

Choose only ONE conclusion from the 1) – 3) below. Explain how this conclusion might be true in a public policy debate.

Rules: You must refer to the textbook chapter at least once, using ideas from the debate about values in technology, the case studies, the analysis section, and/or the conclusion. Use quotation marks ” ” and give the page number if you use wording from the textbook. Otherwise, paraphrase all ideas coming from the textbook. Only use the textbook an​​d your own knowledge and experience as sources for ideas.

1) “Such a concentration of power, where both the research and the final decision are strongly linked, causes the actors to develop a bias towards their own ideas…When such close links are contested or absent, the diversity raises because of the possibility of questioning current ideas and beliefs” (pg. 217).

2) “We observed often that belief in the model as the right descriptor and predictor of reality was almost absolute at the level of policy makers. ‘If it has a number it must be true.’ We argue that this number is as much a reflection of the developers’ ideas as it reflects reality” (pg. 217).

3) “Furthermore, we can conclude that not only the designer of the model is able to place values into the model but these values are also incorporated by the users of the application. Not because through a technological frame, they attribute a certain meaning to a technology but because the data in the model itself is not flawless.This means that is possible that models used by different actors generate entirely different outcomes” (pg. 217).

 

 

“Is this question part of your assignment? We Can Help!”


Public Policy Debate was first posted on August 31, 2019 at 7:19 pm.
©2019 "Classroom Essays". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at Academicheroes.com

Source link

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


Public Policy Debate was first posted on August 31, 2019 at 7:19 pm.
©2019 "Academicheroes.com". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at admin@Academicheroes.com.com

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Existing Publishing Houses

1. Now that digital publishing is so accessible to everyone, how should a publishing business respond? Are there ways that existing publishing houses can take advantage of the easy access readers have to publish extensions of stories? What about in the fields of video or music—how might a business encourage the involvement of the fan base of a movie or a band by using the media-creation tools available? (Chapter 8)

2. After reading Chapter 9, you know you should have a good backup strategy in place for your key data. Consider the following:

How often do you back up critical data files such as homework files? What type of device do you use for backing up files? Where do you store the backups to ensure they won’t be destroyed if a major disaster (such as a fire) destroys your computer? Do you use online sites for file backups?

 

“Is this question part of your assignment? We Can Help!”


Existing Publishing Houses was first posted on August 31, 2019 at 7:22 pm.
©2019 "Classroom Essays". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at Academicheroes.com

Source link

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


Existing Publishing Houses was first posted on August 31, 2019 at 7:23 pm.
©2019 "Essay Associates". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at admin@Academicheroes.com.com

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"