Premium Essay

Cyptography

In: Other Topics

Submitted By Bethy123
Words 995
Pages 4
IT 340: Final Project
Newton Ad Agency

06/22/15
IT340: Network and
Telecommunication Management
Professor:
Date:
To: Newton Ad Agency, Management Team
From: Computer Network Enterprises, Bethany A Schub (IT Business Analyst)
RE: Networking Proposal

Thank you for the opportunity to work with your company. As requested, we have evaluated your company’s business and technical networking requirements. Our analysis is based on current industry products that will provide your company with fast and reliable networking capabilities.
Overview
Newton Ad Agency has three locations. The main headquarters are located in Austin, TX. A satellite office is located two miles away from the main headquarters and is in clear line of sight between the two offices. The third location is in New York, NY. It is imperative that NY be able to share files with the TX office. The NY office will also require the use of a web server so that its clients can download large media files quickly.
IP Address Assignments
Main Headquarters, Austin, TX
For the Austin, TX site, since there are 500 hosts both wired and wireless, I would separate the IP assignments into 2 separate groups: approximately 250/250. To do this I would assign the IP assignments as follows: 192.168.100.1 through 192.168.100.254 for all the wired hosts and 192.168.101.1 through 192.168.101.254 for all wireless hosts. This location will also need a router. The subnet mask for these locations will be 255.255.254.0.
Rural Satellite Office, Austin, TX For the Rural Satellite Office site, since there are 200 hosts, I would apply the IP Assignment in one group. To do this I would assign the IP assignments as follows: 192.168.103.0 through 192.168.103.254. This location will also need a router. The subnet mask for these locations will be 255.255.255.0.
New York Office, New York, NY…...

Similar Documents

Premium Essay

Communications Technologies

...Retrieved from http://www.dms.myflorida.com Rohill. (2003). Whitepaper Softswitch Technology. Retrieved from www.rohill.com/www/download/89‎ Smith, E. (n.d.). Glossary. Retrieved from http://www.tunza.com/books/hpux/gloss1.html#S Stallings, W. (2009). Business Data Communications, Sixth Edition (Custom Edition). Upper Saddle River, New Jersey: Prentice Hall Stallings, W. (n.d.). Cryptography and Network Security Overview. Retrieved from www.cise.ufl.edu/~nemo/crypto/stallings/ch01_nemo.ppt‎ Whitman, M. E., & Mattord, H. J. (2010). Management of Information Security (3rd ed.). Boston: Course Technology-Cengage. Xue, Y., (n.d.). Lecture 4: Security Mechanism Overview. Retrieved from https://tao.truststc.org/Members/yuanxue/cyptography.../lecture4.pdf‎...

Words: 1800 - Pages: 8