Advanced Network Case Study

In: Computers and Technology

Submitted By djbr
Words 2719
Pages 11
Advanced Networks Lab Book 2015/2016

Module Leader: Nauman Israr
Office Location: IT 1.06
Email: N.Israr@tees.ac.uk
Telephone no: 2693

Course Number and Name:
Advanced Networks(COM3038-N-BJ1-2015)
Year:
2015/2016
Working Time:
Timetable Tutorial Time Only in Lab

Name of Student:

Name of Lab Instructor:

Submission Date:
TBA

Grade:

Submission Method:

Introduction
The purpose of this lab book is to document your solution for a given set of exercises. The relevant concepts used in each exercise will be covered during the lecture. You must complete these exercises within your timetabled tutorial session. The lab book will count towards your final grade. You will be required to submit completed lab book before the submission deadline. Please check with your tutor about the deadline date, time and submission method. This lab book is
10% of your overall mark.

1

Exercise 1:
Duration- One Hour
You are a network engineer who has been asked to attend an initial meeting with the management team of ABC, LLC. ABC manufactures electric cars. Its new electric car was just picked up by a Government promotional scheme. ABC is upgrading its manufacturing capacity and hiring new employees.
Recently, ABC employees have started saying, “The network is too slow.” They are also

experiencing

problems

sending

email,

accessing

web-based

applications, and printing. In the past, when the company was small, it didn’t have these problems. The operations manager outsourced computer services to a local business called Network Plus, which installed new workstations and servers as needed, provided desktop support, and managed the switches, router, and firewall. ABC is now considering bringing computer services in-house and is wondering how its network should evolve as it increases production of its electric
Cars.…...

Similar Documents

Ac503 Advanced Auditing Unit 2 Case Study

...Unit 2: Case Study - The North Face, Inc. Julia Harmon AC503 – Advanced Auditing Unit 2: Case Study – The North Face, Inc. Should Auditors insist that their clients accept all proposed audit adjustments, even those that have an “immaterial” effect on the given financial statements? Defend your answers. The auditor would not be able to insist that their client accept all proposed audit adjustments. The auditor must advise management, the Board of Directors and the audit committee of all proposed adjustments and advise them of what the effect of the adjustments will have on the financial statement. The omission or misstatement of an item in a financial report is material if, in the light of surrounding circumstances, the magnitude of the item is such that it is probable that the judgment of a reasonable person relying upon the report would have been changed or influenced by the inclusion or correction of the item. (SAB 99). If after determining if the omission or misstatement is material, then the auditor should insist the adjustment be made. If the client refuses, then the auditor should issue a qualified opinion. Should auditors take explicit measures to prevent their clients from discovering or becoming aware of the materiality thresholds used on individual audit engagements? Would it e feasible for auditors to conceal this information from their audit clients? No the auditor should not take explicit measures to prevent their clients from discovering or becoming......

Words: 458 - Pages: 2

Case Study 1-2 Performance Management at Network Solution, Inc.

...Performance Management Case Study 1-2 Case Study 2 Performance Management at Network Solutions, Inc 1. Overall, what is the overlap between Network Solutions’ system and ideal system? a. Some of the solutions that overlap between Network Solutions’ and ideal system are that, Network Solutions’ created their PM to align directly with employee’s goals and the company. Another addition is that Network Solutions’ wants to standardize the system completely throughout the entire company. Network solutions’ also implemented two way communications which allows employees to add their own input which creates openness in the work place. The development programs incorporated are also created to enhance employees’ performance. In addition to the developmental programs Network Solutions’ also included the rating system of 1,2,3 that allows mangers to rate employees from one the highest, to three the lowest. Lastly I found that Network Solutions’ PM and the ideal system had the overlapping similarity of consistency year round. 2. What are the features of the system implemented at Network Solutions that correspond to the features of the ideal characteristics? Which of the ideal characteristics are missing? For which of the ideal characteristics do we need additional information to evaluate whether they are part of the system at Network Solutions? a. The features that I have found that correspond with the ideal system are strategic congruence, validity, identification of......

Words: 281 - Pages: 2

The Impact of Antenna Tilt to the Performance of Cellular Network Case Study Mnt Nigeria

...RUNNING HEAD: The impact of antenna tilt to the performance of cellular network THE IMPACT OF ANTENNA TILT TO THE PERFORMANCE OF CELLULAR NETWORK: CASE STUDY MNT NIGERIA By [Student full name] [Course of study] [Institution of study] A dissertation is submitted for the degree of [name of course of study] [Level of study eg. IF 50 Doctor of philosophy] Principal supervisor: [Name of supervisor] Associate supervisor: [name of associate supervisor] Faculty of [faculty name e.g. science and technology] Name of collage [Queens university of technology] [Location eg. Brisbane, Austrialia] Date 1 RUNNING HEAD: The impact of antenna tilt to the performance of cellular network Acknowledgement I would like to extend my sincere thanks to those who has provided support towards my thesis writing and research. The study would have been much overwhelming and thesis topic more complicated, if it was not the guidance and support of the people First of all, my sincere thanks credit to the dedication of my academic supervisors, [name of the supervisors], for their useful inputs and discussions during the study. Secondly, am grateful to the support from the MTN Nigeria of the data provided during the study to make these research a success. Thanks also to my family for the support and understanding over the research period. Lastly, is my sincere gratitude to my fellow student writing thesis who have contributed immensely in the discussion for a deeper understanding of this......

Words: 5647 - Pages: 23

Preferences of Mobile Network Customers - a Case Study

...PREFERENCES OF MOBILE NETWORK CUSTOMERS: - A CASE STUDY Project submitted to the Mahatma Gandhi University in partial fulfillment of the requirements for the award of the Degree of Bachelor of Arts in Economics Submitted by Jithin Thomas [Reg. No. SAAD10158223] Under the Supervision of Prof. Mr. Johnson K Joyce. MA, Assistant Professor Department of Economics, St. Berchmans College, Changanacheery DEPARTMENT OF ECONOMICS St. Berchmans College NAAC Reaccredited A+ College with potential for Excellence (Mahatma Gandhi University) Changanacherry 2010 - 2013 | St Berchmans CollegeNAAC Reaccredited A+ College with potential for Excellence | Changanacherry, Kottayam, Kerala, India – 686 101Tel: 0481 2420025, 2411121Fax: 91 481 2401472 | CERTIFICATE This is to certify that Jithin Thomas, is Sixth Semester BA Economics students (2010-2013) of this college and is submitted to Mahatma Gandhi University, Kottayam, in partial fulfillment of the requirement for the Degree of Bachelor of Arts in Economics and that this project has not been submitted earlier for the award of any degree, diploma, associateship, title or any recognition. Rev. Dr. Tomy Joseph Padinjareveetti, MA, Phd Principal St. Berchmans College Changanacherry Changanacherry Date: 12-04-2013 CERTIFICATE This is to certify that Jithin Thomas, is Sixth Semester BA Economics students (2010-2013) of this college and is submitted to Mahatma Gandhi University, Kottayam, in......

Words: 9718 - Pages: 39

Case Study I Advanced Managemnt

...Case Study 1: The Union’s Demand for Recognition and Bargaining Rights Sean Kail Columbia Southern University This case study is from 1975 and regards a union trying to recruits new members from an apartment building and townhouse complex. There are 11 employees that work for the Thomas Hall the property manager, in which he did not want involved in any union matters so he passed the burden onto the vice president Carl Alton. The maintenance supervisor got wind of the union trying to recruit the employees and started asking questions. Melton called and confronts multiple employees about the alleged union meetings. Melton was released by the company 15 days after the alleged phone calls and questionings. The union alleged the company violated Section 8(a)(1) of the LMRA, in which they repeatedly interrogated employees. Melton did call and question multiple employees when he got wind of the union; he was definitely in violation of the LMRA, if such were true. The company claimed that they were unaware of Melton questioning the employees and since he was let go the union can not use his actions against them. Also with the election not being held for another 36 days after Melton was let go his actions had no influence on the employee’s decisions. Melton did state “You are either on my side of the fence or your side of the fence… You always had is good. I have given you… you got a nice job, you got an apartment… this is your last chance.” (Ivancevich J. p503). ......

Words: 943 - Pages: 4

Case Study - Securing the Network

...Case Study Strayer University SEC 305 It is vital to ensure the safety of a central computer system that is accessed by multiple branches, staff members and remote users. The diversity of an enterprise environment dictates the need to consider multiple aspects when planning for access. Normally, an internal LAN is considered a secure network. Due to its broadcast nature, wireless communications are not considered as secure. Such networks are vulnerable to eavesdropping, rogue access points, and other cracking methods. For remote access, VPN solutions such as dial-up, IPSec VPN, and SSL VPN are commonly used and any access to data center devices must be protected and secured. In the data center, access lists are used to prevent unauthorized access, and reverse-proxy servers use authentication mechanisms to provide a higher degree of security for applications. The need for security is constantly evolving. Maintaining individual security methods for each access scenario can be expensive. There are better alternatives for securing enterprise access. Some that is cost-effective, easy to manage and secure, while addressing performance and scalability requirements. Basic security requirements consist of: • Verification of user credentials and services to define user access. • Client integrity checks that consists of endpoint security verification and of redirecting users to predefined subnets to download compliant anti-virus......

Words: 612 - Pages: 3

Sec 280 Week 2 Case Study Network Infrastructure Vulnerabilities

...SEC 280 Week 2 Case Study Network Infrastructure Vulnerabilities Purchase here http://chosecourses.com/sec-280-week-2-case-study-network-infrastructure-vulnerabilities Product Description You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities, explain to your CIO what you can do to make sure your network infrastructure is more secured. This assignment requires 3 pages in length (500 words minimum), based upon the APA style of writing. Use transition words, thesis statement, Introduction, Body, Conclusion and Reference Page with at least two references. Double spaced Arial 12 Font. SEC 280 Week 2 Case Study Network Infrastructure Vulnerabilities Purchase here http://chosecourses.com/sec-280-week-2-case-study-network-infrastructure-vulnerabilities Product Description You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities, explain to your CIO what you can do to make sure your network infrastructure is more secured. This assignment requires 3 pages in length (500 words minimum), based upon the APA style of writing. Use transition words,...

Words: 961 - Pages: 4

Cis 512 Week 3 Case Study 1 Advanced Persistent Threats Against Rsa Tokens Cis512 Week 3 Case Study 1 Advanced Persistent Threats Against Rsa Tokens

...CIS 512 Complete Course Assignments Click below link for Answer visit www.workbank247.com http://workbank247.com/q/cis512-cis-512-cis-512-complete-course-assignments/11301 http://workbank247.com/q/cis512-cis-512-cis-512-complete-course-assignments/11301 CIS 512 Week 3 Case Study 1 Advanced Persistent Threats Against RSA Tokens Due Week 3 and worth 100 points Authentication breach by impersonation or password crack has been popular for attackers to breach our assets. The latest RSA APT attack to breach one of the most secure RSA tokens alerted the industry and reminded all of us that there is no security that can last forever. We must remain vigilant and stay ahead of the game. Read the following document titled, “APT Summit Findings”, as well as the document titled “RSA Security Brief”. Write a five to eight (5-8) page paper in which you: Analyze the Advanced Persistent Threats (APT) Summit Findings article as well as the RSA Security Brief article and identify the vulnerabilities that existed in the system. Analyze the attack methods carried out in pursuit of the authentication breach and explain which methods were successful and why. Suggest three (3) techniques or methods to protect against APT attacks in the future as the CSO for a large organization. Determine what types of technologies would help alleviate the problems identified in the articles assuming you are the CSO or CTO in an organization. Use at least three (3) quality resources in this assignment. Note:......

Words: 2720 - Pages: 11

Advanced Laser Case Study

...Case 2: Advanced Laser Clinics In the case, “Advanced Laser Clinics,” a clinic in Austin Texas is a bottom-performing store that is desperate for some positive changes. Elizabeth Ryan is the new manager who was hired to bring about those changes. There were several issues identified within this case. The first issue that I recognized was the inexperience of Ryan as a manager within this particular field. Her experience was working with the Navy, where she dealt with mainly men. Even though she has years of leadership experience, the beauty industry is completely new to her as well as working with other women. She also only received four days of training, which seems minimal. The other issue presented in the case was between the two technicians. Gulford complained about the body odor of Moore. Gulford stated that it was directly affecting their work environment when the customers could not stand the odor and even had to take breaks during treatments because of it. Gulford also mentioned some issues with the location and marketing of the clinic, but the odor seemed to be the most pressing issue. Ryan needs to address this issue with Moore and prepare for a meeting with her. The most important thing that Ryan needs to focus on is trying her best not to upset Moore. She does not want Moore to have low self-confidence and question her ability to do her job. This is particularly important in the beauty industry where appearance has a big effect on advertising. Since the......

Words: 623 - Pages: 3

Advanced Networks

...Exercise 3: Duration: 3-4 weeks In Exercise 1, you learned about ABC, a manufacturer of new electric cars. ABC has chosen you to design a new network that will let the company scale to a larger size. The campus network will support about 1200 employees and a new data center. Another feature of the campus network will be a state-of-the-art manufacturing facility with networked equipment that communicates with servers in the data center that support real-time control and management. Engineers will access the servers from their PCs in the access layer of the campus network. ABC will sell its new Cars both online and through a large national car retail company. For online sales, ABC plans to have a DMZ that connects a public web server, a DNS server, and an email server. The web server needs to communicate with back-end servers in the data center that hold customer billing data. Design and draw a logical topology that will support ABC’s needs. In addition to meeting the specified needs, be sure to consider security. 1. Explain why you think your design meets the needs of ABC. 2. List the major user communities for your design. 3. List the major data stores and the user communities for each data store. 4. Identify major network traffic flows in your network topology drawing. 5. How does your design provide security for ABC’s network? 6. What questions will you ask ABC about this project as you do your work? ......

Words: 875 - Pages: 4

Advanced Network

...Advanced Networks Lab Book 2015/2016 Module Leader: Nauman Israr Office Location: IT 1.06 Email: N.Israr@tees.ac.uk Telephone no: 2693 Course Number and Name: Advanced Networks(COM3038-N-BJ1-2015) Year: 2015/2016 Working Time: Timetable Tutorial Time Only in Lab Name of Student: Name of Lab Instructor: Submission Date: TBA Grade: Submission Method: Introduction The purpose of this lab book is to document your solution for a given set of exercises. The relevant concepts used in each exercise will be covered during the lecture. You must complete these exercises within your timetabled tutorial session. The lab book will count towards your final grade. You will be required to submit completed lab book before the submission deadline. Please check with your tutor about the deadline date, time and submission method. This lab book is 10% of your overall mark. 1 Exercise 1: Duration- One Hour You are a network engineer who has been asked to attend an initial meeting with the management team of ABC, LLC. ABC manufactures electric cars. Its new electric car was just picked up by a Government promotional scheme. ABC is upgrading its manufacturing capacity and hiring new employees. Recently, ABC employees have started saying, “The network is too slow.” They are also experiencing problems sending email, accessing web-based applications, and printing. In the past, when the company was small, it didn’t have these problems. The operations manager outsourced computer......

Words: 2719 - Pages: 11

Sec 280 Week 2 Case Study Network Infrastructure

...SEC 280 WEEK 2 CASE STUDY NETWORK INFRASTRUCTURE To purchase this visit following link: http://www.activitymode.com/product/sec-280-week-2-case-study-network-infrastructure/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 280 WEEK 2 CASE STUDY NETWORK INFRASTRUCTURE SEC 280 Week 2 Case Study Network Infrastructure Vulnerabilities You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities, explain to your CIO what you can do to make sure your network infrastructure is more secured. This assignment requires 3 pages in length (500 words minimum), based upon the APA style of writing. Use transition words, thesis statement, Introduction, Body, Conclusion and Reference Page with at least two references. Double spaced Arial 12 Font. Activity mode aims to provide quality study notes and tutorials to the students of SEC 280 Week 2 Case Study Network Infrastructure in order to ace their studies. SEC 280 WEEK 2 CASE STUDY NETWORK INFRASTRUCTURE To purchase this visit following link: http://www.activitymode.com/product/sec-280-week-2-case-study-network-infrastructure/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 280 WEEK 2 CASE STUDY NETWORK INFRASTRUCTURE SEC 280 Week 2 Case Study Network Infrastructure Vulnerabilities You are the Information Security Officer at a medium-sized company (1,500...

Words: 866 - Pages: 4

Sec 280 Week 2 Case Study Network Infrastructure Vulnerabilities

...SEC 280 Week 2 Case Study Network Infrastructure Vulnerabilities Purchase here http://devrycourse.com/sec-280-week-2-case-study-network-infrastructure-vulnerabilities Product Description You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities, explain to your CIO what you can do to make sure your network infrastructure is more secured. This assignment requires 3 pages in length (500 words minimum), based upon the APA style of writing. Use transition words, thesis statement, Introduction, Body, Conclusion and Reference Page with at least two references. Double spaced Arial 12 Font. SEC 280 Week 2 Case Study Network Infrastructure Vulnerabilities Purchase here http://devrycourse.com/sec-280-week-2-case-study-network-infrastructure-vulnerabilities Product Description You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities, explain to your CIO what you can do to make sure your network infrastructure is more secured. This assignment requires 3 pages in length (500 words minimum), based upon the APA style of writing. Use transition words, thesis statement, Introduction, Body, Conclusion...

Words: 1201 - Pages: 5

Sec 280 Week 2 Case Study Network Infrastructure Vulnerabilities

...SEC 280 Week 2 Case Study Network Infrastructure Vulnerabilities Purchase here http://devrycourse.com/sec-280-week-2-case-study-network-infrastructure-vulnerabilities Product Description You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities, explain to your CIO what you can do to make sure your network infrastructure is more secured. This assignment requires 3 pages in length (500 words minimum), based upon the APA style of writing. Use transition words, thesis statement, Introduction, Body, Conclusion and Reference Page with at least two references. Double spaced Arial 12 Font. SEC 280 Week 2 Case Study Network Infrastructure Vulnerabilities Purchase here http://devrycourse.com/sec-280-week-2-case-study-network-infrastructure-vulnerabilities Product Description You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities, explain to your CIO what you can do to make sure your network infrastructure is more secured. This assignment requires 3 pages in length (500 words minimum), based upon the APA style of writing. Use transition words, thesis statement, Introduction, Body, Conclusion...

Words: 1321 - Pages: 6

Social Network Case Study Analysis

...ENT 201-50 Fall 2015 | The Social Network Case Study Analysis | | Austin Tiller 12-6-2015 | CASE SUMMARY The founding of Facebook is portrayed in the movie, “The Social Network.” The movie depicts the early years of Facebook, from the origin of the idea through its growth to a multimillion dollar company. In the film, Mark Zuckerberg is hired by the Winklevoss Twins to help them design and program an idea they came up with. Mark decides to create his own version of their idea and begins to work on it with the help of his best friend, Eduardo Saverin. Shortly after, Mark’s version begins to be successful and the Twins realize what he has done and plan to prosecute him. Mark’s successful version also catches the eye of a wealthy entrepreneur, Shawn Parker, who invented Napster. The film continues with the involvement of Shawn in the company that Mark and Eduardo started. It ends with the end of a friendship between Eduardo and Mark due to Mark knowingly tricking Eduardo in giving up most of his shares to the company and betraying a verbal agreement between the two. This situation is just one of the many large bumps in the road near the end of the film as the three main characters deal with many different situations on the road to success. The end of the film also shows Mark/Facebook being sued by the Winklevoss Twins for stealing their idea. Throughout the entire film, it is incredibly interesting to compare and contrast the personalities and......

Words: 2818 - Pages: 12