Order # 12530

Title: Network Design

Paper type Essay

Paper format APA

Course level Undegraduate

Subject Area

Other (Not listed)

# pages 1   ( or 300 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

For this assessment, ABC Consulting has hired you to create a design document about how to build remote access to their organization.

Preparation

Complete the practice labs provided in the Virtual Resource Portal activity for this assessment.

Directions

Create a diagram for ABC Consulting and then explain how to design the LAN at the remote site and discuss how it will interconnect through a WAN to ABC Consulting’s site.

Part 1: Diagram

Use Visio to create a diagram for your project (described above). You may access Visio via the Toolwire resources in this assessment. Include the following in your diagram:

•Display the basic LAN and WAN topology for your remote sites.

•Display router and switch placement.

•Display computers and workstations.

Part 2: Written Explanation

After creating your diagram, write the narrative part of the design document. The narrative should do the following:

•Describe your diagram. Include specifications about the topologies, cabling, routers, and switches.

•Provide an analysis of your diagram. Explain the role that the devices on your network play in network communication.

•Support your diagram. Provide reasoning for choosing the switching and routing, transmission media, and topology.

Additional Requirements

•Written communication: Written communication is free of errors that detract from the overall message.

•APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.

•Font and font size: Times New Roman, 12 point.

RIPV2

computer

The term paper for this class is worth 200 points, and it requires you to do a research and write a 2000-2500 word paper describing  RIPv2 Protocol

 The paper will include the following:

  • The paper must have a distinct and well written Introduction, Supporting Body and Conclusion; 
    • In the body include the following 
      • The history of the protocol chosen;
      • The programmable parameters of the protocol and how they affect traffic flow;
      • The major differences between the routing protocol chosen and the others that were not chosen;
      • How the chosen protocol can be used in a modern day routed network environment.
  • ·  Site at least two advantages and two disadvantages, of your chosen routing protocol subject

·  Site at least two of the most common programmable parameters of the protocol, and how they affect traffic flow

·  Discuss the major differences between the routing protocol chosen and all others that were not chosen

In the Conclusion of your Paper 

·  Discuss how your chosen protocol can be used in a modern day routed network environment. (seen in Conclusion)

Paper Sections:

Description: Your Paper MUST contain the following sections. 

* Title Page

– Title of Paper

– Author

– Class

– Professor

* Introduction

* Body

– Support Introduction 

– Elements (see above)

– History

– Advantages/Dis-advantages

– Two Programmable Parameters

– How do they effect traffic flow

– Compared your chosen Protocol to all Routing Protocols we have studied

* Conclusion

– Your Opinion of selected Routing Protocol

– A Summary

– Modern Day Usage 

digital project

 Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it. 

300 words

 

Each student will prepare a final project on a digital forensic topic or on a criminal investigation that involved digital forensics.. The primary deliverables for the project will be a paper and and also a presentation that will be presented by the student during the residency period.

  

Anonymous

Citizen Rights vs Security

Cloud Computing

Computer Forensics

Data Center Security

Disaster Recovery

Edward Snowden – Traitor or Hero

Encryption

Hardware and Software Security

I Love You virus

Keyloggers

Mobile Malware

Mobile Security

Pharming

Phishing

Presidential Election 2016

Quantum Computers – Impact on Encryption

Ransomware, malware, business security

Security and the Cloud

Smart Grid

SOFTWARE CRACKERS

Stuxnet Virus

Undersea Cable

United State Cyber Command

Web War I – Estonia Attack

White Hat Hacking

Wi-Fi Security: Wireless Network Encryption

Creating Exploits

Home Automation Security and Vulnerabilities

Car Hacking

Cyber Law – Discussion 3

 A. Explain why there are two types of legal systems in the United States: State and Federal systems. How are they similar and how are they different?

Post should be 500 words and add references in APA format.

Strategic Plans

Describe how a strategic plan for information technology can differ across organizations. 

Provide a real-world example. 

  1. In your first paragraph describe how a strategic plan for information technology can differ across organizations. Use examples in your description.
  2. In your second paragraph, use the example in the posting and discuss how an information technology strategic plan for a global company may differ than for a national (US) company.
  3. In the third paragraph, provide a real-world example, based upon the examples used in the first post.

Research paper – Organisation leader and decision making

 This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

  1. How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  2. How does servant leadership assist with transferring knowledge in an organization?
  3. When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. 

 Required Reading

Optional Resources:Chapter 5 Journal articles

FP

 

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  • This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  • Introduction
  • Roles and Responsibilities
  • Incident Response
  • Plan Activation
  • Document History
  • Procedures

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.