Premium Essay

Cyptography

In:

Submitted By Bethy123
Words 995
Pages 4
IT 340: Final Project
Newton Ad Agency

06/22/15
IT340: Network and
Telecommunication Management
Professor:
Date:
To: Newton Ad Agency, Management Team
From: Computer Network Enterprises, Bethany A Schub (IT Business Analyst)
RE: Networking Proposal

Thank you for the opportunity to work with your company. As requested, we have evaluated your company’s business and technical networking requirements. Our analysis is based on current industry products that will provide your company with fast and reliable networking capabilities.
Overview
Newton Ad Agency has three locations. The main headquarters are located in Austin, TX. A satellite office is located two miles away from the main headquarters and is in clear line of sight between the two offices. The third location is in New York, NY. It is imperative that NY be able to share files with the TX office. The NY office will also require the use of a web server so that its clients can download large media files quickly.
IP Address Assignments
Main Headquarters, Austin, TX
For the Austin, TX site, since there are 500 hosts both wired and wireless, I would separate the IP assignments into 2 separate groups: approximately 250/250. To do this I would assign the IP assignments as follows: 192.168.100.1 through 192.168.100.254 for all the wired hosts and 192.168.101.1 through 192.168.101.254 for all wireless hosts. This location will also need a router. The subnet mask for these locations will be 255.255.254.0.
Rural Satellite Office, Austin, TX For the Rural Satellite Office site, since there are 200 hosts, I would apply the IP Assignment in one group. To do this I would assign the IP assignments as follows: 192.168.103.0 through 192.168.103.254. This location will also need a router. The subnet mask for these locations will be 255.255.255.0.
New York Office, New York, NY

Similar Documents

Premium Essay

Communications Technologies

...Student’s Name Case Study 1: Florida Department of Management Services, Part 1 CIS 505 Communication Technologies Professor’s name May 5, 2013 Analyze the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the internet: Department of Management Services (DMS) has chosen to expand their applications and services via TCP/IP and Internet access. DMS uses a widely used proprietary scheme: IBM’s Systems Network Architecture (SNA) which provides support for TCP/IP (Transmission Control Protocol/Internet Protocol). SNA architecture is projected to remain important for some years to come. Implementing standardized protocol architectures allow DMS ongoing communication with suppliers, vendors, customers, and employees across the state, thereby improving overall productivity. Two protocols architectures have served as the basis for the development of interoperable protocol standards: the TCP/IP protocol suite and the OSI (Open Systems Interconnection) reference model which organizes the communication task in relatively five independent layers: Application layer, Host–to-host, or transport layer, Internet layer, Network access layer, and physical layer as each layer provides a portion of the total communications function required for distributed applications. (Stallings, 2009). Furthermore, TCP/IP operates in a packet-switched format as it seeks to transmit in the most efficient manner at high rates of speed. The packet-switching...

Words: 1800 - Pages: 8