Authentic Assessment Project (AAP) Jan 2017
Background Information for World-Wide Trading Company
World-Wide Trading Company (WWTC) is a large online broker firm in the Hong Kong. The trading company has a staff of 9,000 who are scattered around the globe. Due to aggressive growth in business, they want to establish a regional office in New York City. They leased the entire floor of a building on Wall Street. You were selected as a contractor (your group) to build a state of the art high availability, secure network. The President of the company asked you to set up the state of the art network by end of this year. He shared with you the organizational structure and a list of the 100 employees. The current floor of the new site is solid and gigabit network can be set up on existing network wiring. Also, the existing power supply will meet the client’s current and future demand. The President has required these business goals:
Business and Technical Goals
· Increaserevenue from 10 billion to 40 billion in three to four years
· Reduce the operating cost from 30 to 15 percent in two to three years by using an automated system for buying and selling.
· Provide secure means of customer purchase and payment over Internet.
· Build a high availability, moderate confidentiality and moderate integrity unclassified network (based on The National Institute of Standards and Technology- NIST)
· Build a classified network with high confidentiality, moderate integrity, and moderate availability (based on NIST)
· Allow employee to attach their notebook computers to the WWTC network and wireless Internet services.
· Provide state of the art VoIP and Data Network
· Provide Active Directory, DNS, and DCHP services
· Provide faster Network services
· Provide fast and secure wireless services in the lobby, conference rooms (100x60), and the cubical areas.
On the basis of these business goals, your group is responsible for designing, configuring, and implementing fast, reliable and secure networks (classified and unclassified).
WWTC LAN/WLAN/VoIP
· Propose a secure network design that solves the network and security challenges, to meet business needs, and the other technical goals. You are also required to provide a modular and scalable network. Provide redundancy at building core layer, building distribution layer, and access layer to avoid single point of failure. For Building Access layer provide redundant uplinks connection.
· Select appropriate Cisco switch model for each part of your enterprise campus model design from the Cisco Products Link, and use the following assumptions in your selection process:
1. Selecting the Access layers’ switches:
0. Provide one port to each device
0. Make provision for 100% growth
1. Server farm switches
a. Assume 6 NIC cards in each server and one NIC card uses one port of switch
b. Dual processors and dual power supply
· Propose an IP addressing redesign that optimizes IP addressing and IP routing (including ...
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
Background Information for World-Wide Trading Company
World-Wide Trading (WWTC) is a large online broker firm in the Hong Kong. The trading company has a staff of 9,000 who are scattered around the globe. Due to aggressive growth in business, they want to establish a regional office in New York City. They leased the entire floor of a building on Wall Street. You were hired as the director of the IT Department. The President of the company asked you to set up the state of the art network by December 15, 2013. He shared with you the organizational structure and a list of the staff. You hired a consultant to test the network infrastructure and power requirement at WWTC office space. The consultant reported that the network infrastructure is solid and gigabit network can be set up on existing network wiring. Also, the existing power supply will meet their current and future demand. The President has reiterated these business goals.
Business and Technical Goals
· Increaserevenue from 10 billion to 40 billion by the year 2015
· Reduce the operating cost from 30 to 15 percent by the year 2015 by using an automated system for buying and selling.
· Provide secure means of customer purchase and payment over Internet.
· Allow employee to attach their notebook computers to the WWTC network and Internet services.
· Provide state of the art VoIP and Data Network
· Provide faster Network services
· Provide fast and secure wireless services in the lobby and two large conference rooms (100x60)
On the basis of these business goals, you prepared a RFP to solicit a proposal for designing and implementing a fast, reliable and secure network.
The purpose of this Request for Proposal is to solicit from qualified vendors proposals for a
secure and fast network to ensure proper operation of the network.
To prepare a design for a state of the art network at the Wall Street location of World-Wide Trading.
Propose a Network design that solves the current security audit problems (see security sections), to meet business and technical goals.
Provide a modular, scalable and network.
Provide redundancy at building core layer and building distribution layer and access layer and at workstation level to avoid failure at one point. For Building Access layer provide redundant uplinks connection to Building Distribution layer.
Select appropriate Cisco switch model for each part of your enterprise campus model design from the Cisco Products Link, listed below and use the following assumptions in your selection process.
Selecting the Access layers switches:
0. Provide one port to each device
0. Make provision for 100% growth
Server farm switches
· Assume 6 NIC cards in each server and one NIC card uses one port of switch
· Dual processors and dual power supply
Propose an IP addressing redesign that optimizes IP addressing and IP routing (including the use of route summarization). Provide migration provision to IPv6 protocol in future.
Propose a High Level securi ...
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxericbrooks84875
WWTC Office Layout Diagram.html
Background Information for World-Wide Trading Company
World-Wide Trading (WWTC) is a large online broker firm in the Hong Kong. The trading company has a staff of 9,000 who are scattered around the globe. Due to aggressive growth in business, they want to establish a regional office in New York City. They leased the entire floor of a building on Wall Street. You were hired as the director of the IT Department. The President of the company asked you to set up the state of the art network by December 15, 2013. He shared with you the organizational structure and a list of the staff. You hired a consultant to test the network infrastructure and power requirement at WWTC office space. The consultant reported that the network infrastructure is solid and gigabit network can be set up on existing network wiring. Also, the existing power supply will meet their current and future demand. The President has reiterated these business goals.
Business and Technical Goals
· Increaserevenue from 10 billion to 40 billion by the year 2015
· Reduce the operating cost from 30 to 15 percent by the year 2015 by using an automated system for buying and selling.
· Provide secure means of customer purchase and payment over Internet.
· Allow employee to attach their notebook computers to the WWTC network and Internet services.
· Provide state of the art VoIP and Data Network
· Provide faster Network services
· Provide fast and secure wireless services in the lobby and two large conference rooms (100x60)
On the basis of these business goals, you prepared a RFP to solicit a proposal for designing and implementing a fast, reliable and secure network.
The purpose of this Request for Proposal is to solicit from qualified vendors proposals for a
secure and fast network to ensure proper operation of the network.
To prepare a design for a state of the art network at the Wall Street location of World-Wide Trading.
Propose a Network design that solves the current security audit problems (see security sections), to meet business and technical goals.
Provide a modular, scalable and network.
Provide redundancy at building core layer and building distribution layer and access layer and at workstation level to avoid failure at one point. For Building Access layer provide redundant uplinks connection to Building Distribution layer.
Select appropriate Cisco switch model for each part of your enterprise campus model design from the Cisco Products Link, listed below and use the following assumptions in your selection process.
Selecting the Access layers switches:
0. Provide one port to each device
0. Make provision for 100% growth
Server farm switches
· Assume 6 NIC cards in each server and one NIC card uses one port of switch
· Dual processors and dual power supply
Propose an IP addressing redesign that optimizes IP addressing and IP routing (including the use of route summarization). Provide migration provision to IPv6 protocol in fut.
WWTC is opening a new regional office in New York City and has hired an IT director to design and implement a new network. The network must support increasing revenue, reducing costs, providing secure customer transactions, and accommodating employee and guest devices. It must also integrate voice and data, provide fast wired and wireless access, and enhance security to address prior issues. The proposed design includes firewalls, intrusion detection, encryption, separate networks for classified and unclassified data, and wireless access in lobby and conference rooms. The LAN solution includes subnets divided by job function with capacity for growth. EIGRP routing and wireless access points are included to connect all parts of the network securely and reliably.
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docxericbrooks84875
WWTC Office Layout Diagram.html
American State & Local Politics
This is a series of six questions that needs to be done in APA format with in text citations and references. My book needs to be used as at least one of the references. NO PLAGIARISM! Each question has a minimum amount of words that are required--the amount required will follow each question in parenthesis. Please keep questions together as they are numbered so it doesnt get confusing when submitting awnsers back to me. I need this assignment back by Sunday 11/02/14 by 10:00 P.M No later unless you can get it back to me by today late evening. I have a lot of errands to run today so I will be looking for handshake off and on today please go ahead and start working on the assignments because as always I dont let anyone else do my work--I always give it all to you. I have a paper coming up for this clas for Unit 7 that I will soon be submitting to you-please be looking for that! Thanks for all your hard work and Please NO PLAGIARISM!!!
My book is:
Dye, T. R., & MacManus, S. A. (2012). Politics in states and communities (14th ed.). Upper Saddle River, NJ: Pearson Education.
Unit 6--Question 1
Discuss the factors that tend to distance local government from citizen control. ( Min. 75 words)
Unit 6--Question 2
Compare and contrast the roles of city managers and mayors. (Min. 200 words)
Unit 6--Question 3
Describe the trends in representation of minorities and women in local politics and the impact of their participation. (Min. 500 words)
Unit 7--Question 1
Compare and contrast the elite and pluralist models of community power. (Min. 75 words)
Unit 7--Question 2
Contrast four major planning practices: PUDs, impact fees, exaction, and developer agreements. ( Min. 200 words)
Unit 7--Question 3
Discuss the types of taxes state and local communities implement and the necessity of these taxes. Explain how governments manage budgets when there is a lack of revenue. (Min. 500 words)
Background Information for World-Wide Trading Company
World-Wide Trading (WWTC) is a large online broker firm in the Hong Kong. The trading company has a staff of 9,000 who are scattered around the globe. Due to aggressive growth in business, they want to establish a regional office in New York City. They leased the entire floor of a building on Wall Street. You were hired as the director of the IT Department. The President of the company asked you to set up the state of the art network by December 15, 2013. He shared with you the organizational structure and a list of the staff. You hired a consultant to test the network infrastructure and power requirement at WWTC office space. The consultant reported that the network infrastructure is solid and gigabit network can be set up on existing network wiring. Also, the existing power supply will meet their current and future demand. The President has reiterated these business goals.
Business and Technical Goals
· Increaserevenue from 10 billion to 40 b.
The document provides information about building a small network including devices, applications, protocols, and connectivity verification. It discusses selecting devices for a small network based on factors like cost and speed. Common network applications and protocols used in small networks are also identified, including protocols for real-time voice and video. The document explains how a small network design can scale to support larger networks as business needs grow. Methods for verifying connectivity between devices using commands like ping and traceroute are presented. Finally, commands for viewing host IP configurations on Windows and Linux systems are covered.
The document provides information about building a small network including devices, applications, protocols, and connectivity verification. It discusses [1] selecting common devices for a small network like routers, switches, and end devices, [2] applications and protocols used in small networks such as HTTP, SMTP, and DHCP, and [3] using the ping and traceroute commands to verify connectivity between devices and troubleshoot connectivity issues.
I need cmit 495 wireless design paper.Background Information for.docxanthonybrooks84958
I need cmit 495 wireless design paper.
Background Information for World-Wide Trading Company
World-Wide Trading Company (WWTC) is a large online broker firm in the Hong Kong. The trading company has a staff of 9,000 who are scattered around the globe. Due to aggressive growth in business, they want to establish a regional office in New York City. They leased the entire floor of a building on Wall Street. You were selected as a contractor (your group) to build a state of the art high availability, secure network. The President of the company asked you to set up the state of the art network by end of this year. He shared with you the organizational structure and a list of the 100 employees. The current floor of the new site is solid and gigabit network can be set up on existing network wiring. Also, the existing power supply will meet the client’s current and future demand. The President has required these business goals:
Business and Technical Goals
Increase
revenue from 10 billion to 40 billion in three to four years
Reduce the operating cost from 30 to 15 percent in two to three years by using an automated system for buying and selling.
Provide secure means of customer purchase and payment over Internet.
Build a high availability, moderate confidentiality and moderate integrity unclassified network (based on The National Institute of Standards and Technology- NIST)
Build a classified network with high confidentiality, moderate integrity, and moderate availability (based on NIST)
Allow employee to attach their notebook computers to the WWTC network and wireless Internet services.
Provide state of the art VoIP and Data Network
Provide Active Directory, DNS, and DCHP services
Provide faster Network services
Provide fast and secure wireless services in the lobby, conference rooms (100x60), and the cubical areas.
------------------------------------
WWTC Active Directory Design
WWTC office at New York is largely autonomous and few IT personnel to take care of day-to-day IT support activities such as password resets troubleshoot virus problems. You are concerned about sensitive data store in this location. You want to deploy a highly developed OU structure to implement security policies uniformly through GPO automatically at all domains, OU, and workstations.
At this location Windows Server 2012 R2 is required providing the following
10 AD features
:
1.
Use BitLocker encryption technology for devices (server and Work station) disc space and volume.
2.
Enables a BitLocker system on a wire
d network to automatically unlock the system volume during boot (on capable Windows Server 2012 R2 networks), reducing internal help desk call volumes for lost PINs.
3.
Create group policies settings to enforce that either Used Disk Space Only or Full Encryption is used when BitLocker is enabled on a drive.
4.
Enable BranchCache in Windows Server 2012 for substantial performance, manageability, scalability, and availability improvements
5.
Imple.
Option #1: Mastery Finance Calculations
Problem 1
Hologram Corporation is a holding company with four main subsidiaries. The percentage of its business coming from each of the subsidiaries, and their respective betas, are as follows:
Subsidiary
Percentage of Business
Beta
Water Company
60%
.70
Cable Company
25%
.90
Real estate
10%
1.30
Technology companies
5%
1.50
1. What is the company’s beta?
2. Assume that the risk-free rate is 6% and that the market risk premium is 5%. What is the holding company’s required rate of return?
Problem 2
Surf Bicycles Inc. Will manufacture and sell 200,000 units next year. Fixed costs will total $500,000, and variable costs will be 60% of sales. The bicycles will sell for $200 each.
The firm wants to achieve a level of earnings before interest and taxes of $250,000. How many units must they sell to achieve that result?
Problem 3
Alpha Electronics has the following income statement:
Sales
400,000
Total variable costs
240,000
Contribution margin
160,000
Fixed costs
140,000
EBIT
20,000
Calculate the new EBIT and percent change, assuming:
1. Sales increase by 20%
2. Sales decrease by 20%
Problem 4
Given the following information:
Total asset turnover
2.0 times
Accounts receivable turnover
25 times
Fixed asset turnover
5 times
Inventory turnover (based on cost of goods sold)
5 times
Current ratio
2
Sales (all on credit)
$5,000,000
Cost of goods sold
70% of sales
Debt ratio
60%
Calculate:
Cash
Accounts receivable
Inventories
Net fixed assets
Total assets
Current liabilities
Long-term debt
Total liabilities
Common equity
Total liabilities and common equity
Problem 5
Given the following information:
Sales Growth Rate
25%
COGS / Sales
65%
Operating Expense / Sales
20%
Depreciation Expense (000)
$40
Interest Expense (000)
$10
Tax Rate
40%
Dividends (000)
$20
Calculate the following information for 20X1:
Income Statement (000)
20X0
20X1
Sales
1500
Cost of goods sold
975
Gross profit
525
Operating costs
300
Depreciation expense
40
Net Operating Profit
185
Interest Expense
10
Earnings Before Taxes
175
Taxes
70
Net Income
105
Dividends
$20
Addition to Retained Earnings
$85
Network LAN Design with VoIP and Wireless Services
This section will provide a detailed LAN-design of network with VoIP services, Wireless services, protocols, devices, and interconnectivity, with WAN.
This section includes but not limited to
· Equipment List
· Hierarchical IP scheme and VLAN
· Link IP addresses
· High Level Diagram
· Voice and Wireless Design
Equipment List:
Select all networking hardware
Suggested Template
Device
Cisco Model#
Quantity
Comments
Distribution Switches
Cat 3850 Series Swiches
2
48 port model, wireless capacity/PoE
Branch office router
RV220W Wireless
2
4 port switch, built in firewall
Access Switches
Cat 2600
10
48 ports
IDS
Network Monitoring System
Fire wall
Cisco Unified Call Manger
2
Voice services
Step 2:
Now name each device as per naming convention (.
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
Background Information for World-Wide Trading Company
World-Wide Trading (WWTC) is a large online broker firm in the Hong Kong. The trading company has a staff of 9,000 who are scattered around the globe. Due to aggressive growth in business, they want to establish a regional office in New York City. They leased the entire floor of a building on Wall Street. You were hired as the director of the IT Department. The President of the company asked you to set up the state of the art network by December 15, 2013. He shared with you the organizational structure and a list of the staff. You hired a consultant to test the network infrastructure and power requirement at WWTC office space. The consultant reported that the network infrastructure is solid and gigabit network can be set up on existing network wiring. Also, the existing power supply will meet their current and future demand. The President has reiterated these business goals.
Business and Technical Goals
· Increaserevenue from 10 billion to 40 billion by the year 2015
· Reduce the operating cost from 30 to 15 percent by the year 2015 by using an automated system for buying and selling.
· Provide secure means of customer purchase and payment over Internet.
· Allow employee to attach their notebook computers to the WWTC network and Internet services.
· Provide state of the art VoIP and Data Network
· Provide faster Network services
· Provide fast and secure wireless services in the lobby and two large conference rooms (100x60)
On the basis of these business goals, you prepared a RFP to solicit a proposal for designing and implementing a fast, reliable and secure network.
The purpose of this Request for Proposal is to solicit from qualified vendors proposals for a
secure and fast network to ensure proper operation of the network.
To prepare a design for a state of the art network at the Wall Street location of World-Wide Trading.
Propose a Network design that solves the current security audit problems (see security sections), to meet business and technical goals.
Provide a modular, scalable and network.
Provide redundancy at building core layer and building distribution layer and access layer and at workstation level to avoid failure at one point. For Building Access layer provide redundant uplinks connection to Building Distribution layer.
Select appropriate Cisco switch model for each part of your enterprise campus model design from the Cisco Products Link, listed below and use the following assumptions in your selection process.
Selecting the Access layers switches:
0. Provide one port to each device
0. Make provision for 100% growth
Server farm switches
· Assume 6 NIC cards in each server and one NIC card uses one port of switch
· Dual processors and dual power supply
Propose an IP addressing redesign that optimizes IP addressing and IP routing (including the use of route summarization). Provide migration provision to IPv6 protocol in future.
Propose a High Level securi ...
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxericbrooks84875
WWTC Office Layout Diagram.html
Background Information for World-Wide Trading Company
World-Wide Trading (WWTC) is a large online broker firm in the Hong Kong. The trading company has a staff of 9,000 who are scattered around the globe. Due to aggressive growth in business, they want to establish a regional office in New York City. They leased the entire floor of a building on Wall Street. You were hired as the director of the IT Department. The President of the company asked you to set up the state of the art network by December 15, 2013. He shared with you the organizational structure and a list of the staff. You hired a consultant to test the network infrastructure and power requirement at WWTC office space. The consultant reported that the network infrastructure is solid and gigabit network can be set up on existing network wiring. Also, the existing power supply will meet their current and future demand. The President has reiterated these business goals.
Business and Technical Goals
· Increaserevenue from 10 billion to 40 billion by the year 2015
· Reduce the operating cost from 30 to 15 percent by the year 2015 by using an automated system for buying and selling.
· Provide secure means of customer purchase and payment over Internet.
· Allow employee to attach their notebook computers to the WWTC network and Internet services.
· Provide state of the art VoIP and Data Network
· Provide faster Network services
· Provide fast and secure wireless services in the lobby and two large conference rooms (100x60)
On the basis of these business goals, you prepared a RFP to solicit a proposal for designing and implementing a fast, reliable and secure network.
The purpose of this Request for Proposal is to solicit from qualified vendors proposals for a
secure and fast network to ensure proper operation of the network.
To prepare a design for a state of the art network at the Wall Street location of World-Wide Trading.
Propose a Network design that solves the current security audit problems (see security sections), to meet business and technical goals.
Provide a modular, scalable and network.
Provide redundancy at building core layer and building distribution layer and access layer and at workstation level to avoid failure at one point. For Building Access layer provide redundant uplinks connection to Building Distribution layer.
Select appropriate Cisco switch model for each part of your enterprise campus model design from the Cisco Products Link, listed below and use the following assumptions in your selection process.
Selecting the Access layers switches:
0. Provide one port to each device
0. Make provision for 100% growth
Server farm switches
· Assume 6 NIC cards in each server and one NIC card uses one port of switch
· Dual processors and dual power supply
Propose an IP addressing redesign that optimizes IP addressing and IP routing (including the use of route summarization). Provide migration provision to IPv6 protocol in fut.
WWTC is opening a new regional office in New York City and has hired an IT director to design and implement a new network. The network must support increasing revenue, reducing costs, providing secure customer transactions, and accommodating employee and guest devices. It must also integrate voice and data, provide fast wired and wireless access, and enhance security to address prior issues. The proposed design includes firewalls, intrusion detection, encryption, separate networks for classified and unclassified data, and wireless access in lobby and conference rooms. The LAN solution includes subnets divided by job function with capacity for growth. EIGRP routing and wireless access points are included to connect all parts of the network securely and reliably.
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docxericbrooks84875
WWTC Office Layout Diagram.html
American State & Local Politics
This is a series of six questions that needs to be done in APA format with in text citations and references. My book needs to be used as at least one of the references. NO PLAGIARISM! Each question has a minimum amount of words that are required--the amount required will follow each question in parenthesis. Please keep questions together as they are numbered so it doesnt get confusing when submitting awnsers back to me. I need this assignment back by Sunday 11/02/14 by 10:00 P.M No later unless you can get it back to me by today late evening. I have a lot of errands to run today so I will be looking for handshake off and on today please go ahead and start working on the assignments because as always I dont let anyone else do my work--I always give it all to you. I have a paper coming up for this clas for Unit 7 that I will soon be submitting to you-please be looking for that! Thanks for all your hard work and Please NO PLAGIARISM!!!
My book is:
Dye, T. R., & MacManus, S. A. (2012). Politics in states and communities (14th ed.). Upper Saddle River, NJ: Pearson Education.
Unit 6--Question 1
Discuss the factors that tend to distance local government from citizen control. ( Min. 75 words)
Unit 6--Question 2
Compare and contrast the roles of city managers and mayors. (Min. 200 words)
Unit 6--Question 3
Describe the trends in representation of minorities and women in local politics and the impact of their participation. (Min. 500 words)
Unit 7--Question 1
Compare and contrast the elite and pluralist models of community power. (Min. 75 words)
Unit 7--Question 2
Contrast four major planning practices: PUDs, impact fees, exaction, and developer agreements. ( Min. 200 words)
Unit 7--Question 3
Discuss the types of taxes state and local communities implement and the necessity of these taxes. Explain how governments manage budgets when there is a lack of revenue. (Min. 500 words)
Background Information for World-Wide Trading Company
World-Wide Trading (WWTC) is a large online broker firm in the Hong Kong. The trading company has a staff of 9,000 who are scattered around the globe. Due to aggressive growth in business, they want to establish a regional office in New York City. They leased the entire floor of a building on Wall Street. You were hired as the director of the IT Department. The President of the company asked you to set up the state of the art network by December 15, 2013. He shared with you the organizational structure and a list of the staff. You hired a consultant to test the network infrastructure and power requirement at WWTC office space. The consultant reported that the network infrastructure is solid and gigabit network can be set up on existing network wiring. Also, the existing power supply will meet their current and future demand. The President has reiterated these business goals.
Business and Technical Goals
· Increaserevenue from 10 billion to 40 b.
The document provides information about building a small network including devices, applications, protocols, and connectivity verification. It discusses selecting devices for a small network based on factors like cost and speed. Common network applications and protocols used in small networks are also identified, including protocols for real-time voice and video. The document explains how a small network design can scale to support larger networks as business needs grow. Methods for verifying connectivity between devices using commands like ping and traceroute are presented. Finally, commands for viewing host IP configurations on Windows and Linux systems are covered.
The document provides information about building a small network including devices, applications, protocols, and connectivity verification. It discusses [1] selecting common devices for a small network like routers, switches, and end devices, [2] applications and protocols used in small networks such as HTTP, SMTP, and DHCP, and [3] using the ping and traceroute commands to verify connectivity between devices and troubleshoot connectivity issues.
I need cmit 495 wireless design paper.Background Information for.docxanthonybrooks84958
I need cmit 495 wireless design paper.
Background Information for World-Wide Trading Company
World-Wide Trading Company (WWTC) is a large online broker firm in the Hong Kong. The trading company has a staff of 9,000 who are scattered around the globe. Due to aggressive growth in business, they want to establish a regional office in New York City. They leased the entire floor of a building on Wall Street. You were selected as a contractor (your group) to build a state of the art high availability, secure network. The President of the company asked you to set up the state of the art network by end of this year. He shared with you the organizational structure and a list of the 100 employees. The current floor of the new site is solid and gigabit network can be set up on existing network wiring. Also, the existing power supply will meet the client’s current and future demand. The President has required these business goals:
Business and Technical Goals
Increase
revenue from 10 billion to 40 billion in three to four years
Reduce the operating cost from 30 to 15 percent in two to three years by using an automated system for buying and selling.
Provide secure means of customer purchase and payment over Internet.
Build a high availability, moderate confidentiality and moderate integrity unclassified network (based on The National Institute of Standards and Technology- NIST)
Build a classified network with high confidentiality, moderate integrity, and moderate availability (based on NIST)
Allow employee to attach their notebook computers to the WWTC network and wireless Internet services.
Provide state of the art VoIP and Data Network
Provide Active Directory, DNS, and DCHP services
Provide faster Network services
Provide fast and secure wireless services in the lobby, conference rooms (100x60), and the cubical areas.
------------------------------------
WWTC Active Directory Design
WWTC office at New York is largely autonomous and few IT personnel to take care of day-to-day IT support activities such as password resets troubleshoot virus problems. You are concerned about sensitive data store in this location. You want to deploy a highly developed OU structure to implement security policies uniformly through GPO automatically at all domains, OU, and workstations.
At this location Windows Server 2012 R2 is required providing the following
10 AD features
:
1.
Use BitLocker encryption technology for devices (server and Work station) disc space and volume.
2.
Enables a BitLocker system on a wire
d network to automatically unlock the system volume during boot (on capable Windows Server 2012 R2 networks), reducing internal help desk call volumes for lost PINs.
3.
Create group policies settings to enforce that either Used Disk Space Only or Full Encryption is used when BitLocker is enabled on a drive.
4.
Enable BranchCache in Windows Server 2012 for substantial performance, manageability, scalability, and availability improvements
5.
Imple.
Option #1: Mastery Finance Calculations
Problem 1
Hologram Corporation is a holding company with four main subsidiaries. The percentage of its business coming from each of the subsidiaries, and their respective betas, are as follows:
Subsidiary
Percentage of Business
Beta
Water Company
60%
.70
Cable Company
25%
.90
Real estate
10%
1.30
Technology companies
5%
1.50
1. What is the company’s beta?
2. Assume that the risk-free rate is 6% and that the market risk premium is 5%. What is the holding company’s required rate of return?
Problem 2
Surf Bicycles Inc. Will manufacture and sell 200,000 units next year. Fixed costs will total $500,000, and variable costs will be 60% of sales. The bicycles will sell for $200 each.
The firm wants to achieve a level of earnings before interest and taxes of $250,000. How many units must they sell to achieve that result?
Problem 3
Alpha Electronics has the following income statement:
Sales
400,000
Total variable costs
240,000
Contribution margin
160,000
Fixed costs
140,000
EBIT
20,000
Calculate the new EBIT and percent change, assuming:
1. Sales increase by 20%
2. Sales decrease by 20%
Problem 4
Given the following information:
Total asset turnover
2.0 times
Accounts receivable turnover
25 times
Fixed asset turnover
5 times
Inventory turnover (based on cost of goods sold)
5 times
Current ratio
2
Sales (all on credit)
$5,000,000
Cost of goods sold
70% of sales
Debt ratio
60%
Calculate:
Cash
Accounts receivable
Inventories
Net fixed assets
Total assets
Current liabilities
Long-term debt
Total liabilities
Common equity
Total liabilities and common equity
Problem 5
Given the following information:
Sales Growth Rate
25%
COGS / Sales
65%
Operating Expense / Sales
20%
Depreciation Expense (000)
$40
Interest Expense (000)
$10
Tax Rate
40%
Dividends (000)
$20
Calculate the following information for 20X1:
Income Statement (000)
20X0
20X1
Sales
1500
Cost of goods sold
975
Gross profit
525
Operating costs
300
Depreciation expense
40
Net Operating Profit
185
Interest Expense
10
Earnings Before Taxes
175
Taxes
70
Net Income
105
Dividends
$20
Addition to Retained Earnings
$85
Network LAN Design with VoIP and Wireless Services
This section will provide a detailed LAN-design of network with VoIP services, Wireless services, protocols, devices, and interconnectivity, with WAN.
This section includes but not limited to
· Equipment List
· Hierarchical IP scheme and VLAN
· Link IP addresses
· High Level Diagram
· Voice and Wireless Design
Equipment List:
Select all networking hardware
Suggested Template
Device
Cisco Model#
Quantity
Comments
Distribution Switches
Cat 3850 Series Swiches
2
48 port model, wireless capacity/PoE
Branch office router
RV220W Wireless
2
4 port switch, built in firewall
Access Switches
Cat 2600
10
48 ports
IDS
Network Monitoring System
Fire wall
Cisco Unified Call Manger
2
Voice services
Step 2:
Now name each device as per naming convention (.
This document discusses virtual private networks (VPNs) and network access control (NAC). It defines VPNs as creating a secure "tunnel" across a public network like the internet to extend a private network. The two endpoints are the local and remote machines. NAC systems enforce network access policies to control which devices and users can access the network, placing non-compliant devices in quarantine if needed. NAC capabilities include policy management, profiling devices, guest networking access, security checks, and integration with other security systems.
Eliminate the need to buy and manage premise-based, security devices and applicances and let XO Communications security experts monitor and manage the authorized use of your security policies.
This document provides a project plan proposed by Network Solutions Inc. to upgrade the computer network for Healthmark Medical, a medical supply company. The plan outlines the defining problems with the current network having issues supporting demands. It then provides details on the scope, requirements, stakeholders, work breakdown structure, cost analysis, technical implementation approach including network diagrams, risks, and security measures to ensure compliance with HIPAA/Title II privacy guidelines. The network upgrade aims to solidify Healthmark's technology needs for years to come by replacing outdated hardware and software with a new network infrastructure designed to handle their workload demands.
The document discusses planning and designing a small network, including:
- Identifying common devices used such as routers, switches, wireless access points, and IP phones.
- Design considerations for a small network like IP addressing, redundancy, traffic prioritization.
- Common network applications and protocols used, including VoIP, DHCP, DNS.
- Ensuring the network can support real-time applications like voice and video.
- Planning for future growth of the network through documentation, traffic analysis, and protocol analysis.
Security Design Considerations Module 3 - Training SampleContent Rules, Inc.
This module provides an overview of network security design considerations and configurations for the Sentriant CE150 device. It describes the vulnerabilities companies face and factors to consider in security solution design, such as performance, user transparency, and compliance. The module also outlines basic Sentriant CE150 network designs for non-router and router environments, including redundancy options, and provides worksheets to gather required configuration information.
Logic Networks provides a comprehensive range of IT support services including PC and server hardware maintenance, network infrastructure support, network analysis and management services, and bespoke software development. They operate 24/7/365 from their London office to provide continuous support to over 120 business customers. Logic Networks aims to be one of the leading providers of integrated technical services in the UK and Middle East through a consistent approach of high quality, tailored support services.
kavya cn ppt.pdf.pptx Hotel Management system using computer networkDevPratapSinghTomar1
The document outlines a proposed network design solution for a hotel management company that includes upgrading outdated network switches to modern IP-based switches, implementing dynamic IP allocation for improved scalability and efficiency, and enabling remote network access for more efficient management. The proposed solution also involves introducing VLAN configurations to logically segment the network and improve security by isolating traffic flows within departments.
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
1) COLLINS is a state agency that stores confidential information and needs improved security for its database and telecommuters.
2) The proposal aims to implement the best security measures to protect data in the database and ensure security for telecommuters.
3) Methods like installing firewalls, encrypting sensitive data, and using digital signatures are proposed to provide database and network security.
The document provides an overview of commands and techniques used to verify connectivity and acquire device information in a small network. It describes using ping and traceroute to test connectivity between devices and troubleshoot connectivity issues. It also explains using the ipconfig command on Windows and ifconfig/ip commands on Linux to view a host's IP configuration, and introduces commands like show ip interface brief for viewing IP information on routers.
To beat a hacker, you need to think like one!
"Our Clients, Intelligence, Air force, Army, Navy, Defense, Police, Justice, Banks ,Stock Exchanges, Airports , Hospital,Ministry,University, Government and Pvt Sectors".
All government authorities and private sectors , financial institutions, banks, intelligence agencies, corporate and factories are really worried of the internet threats. They could not have gained the advantage of the internet as the normal entrepreneur.
This document provides information about Medley Marketing Pvt Ltd (MMPL), an IT solutions provider. Some key points:
- MMPL has 30 years of experience in IT and over 50,000 satisfied customers. It provides quality IT products and services across Northern India through over 100 partners.
- MMPL offers thin clients, networking solutions, security products, software, and services. It has expertise in areas like Linux, Windows, servers, storage, and network security.
- MMPL has over 30 trained personnel and a component-level repair center. It provides solutions for sectors like retail, education, healthcare, and more.
- Testimonials provided indicate that MMPL's thin clients have helped
Scenario Overview Now that you’re super knowledgeable about se.docxtodd331
This document proposes a security infrastructure design for a fictional online retail organization with 50 employees. It recommends securing the external website for customer purchases, internal intranet site, remote access for engineers, and wireless network. It also suggests implementing firewall rules, securing laptop configurations, and protecting customer data with intrusion detection. The goal is to securely enable e-commerce transactions while maintaining privacy of user information.
How to minimize threats in your information system using network segregation? PECB
We will discuss the importance of network infrastructure and how we can minimize risks of attacks in our IT by segregating and segmenting our network infrastructure.
Main points that have been covered are:
• Why it’s always a primary target for attacks?
• What are the segmented networks?
• How can it be used?
Presenter:
Our presenter for this webinar is Mohamed Tawfik, who is a qualified Technocrat, and a seasoned IT/Telecom Professional having over 20 years of solid experience with multi-national corporate organizations planning, deployment, governance, audit and enforcing policy on Information Security Practice, while having in-depth knowledge of IT/Telecom Infrastructure and with a proven record of customer satisfaction.
Link of the recorded session published on YouTube:https://youtu.be/sKhihzgElH8
This document discusses virtual private networks (VPNs). It defines a VPN as a private network that uses a public network like the Internet instead of leased lines. VPNs provide secure remote access to corporate resources over the Internet and connect branch office networks to head office networks securely. The document outlines common VPN protocols like PPTP, L2TP, and IPsec. It discusses VPN components such as user authentication, address management, data encryption, and key management. Finally, it highlights benefits of VPNs such as reduced costs and increased flexibility compared to leased lines.
This document discusses securing enterprise networks against threats. It notes that digital transformation is disrupting businesses and video traffic will grow significantly. New network priorities include wireless connectivity, intelligent WAN, cloud, and security everywhere. Network threats are getting smarter using techniques like advanced persistent threats. Cisco's solution leverages the network as a sensor and enforcer using technologies like Flexible NetFlow, Lancope StealthWatch, Cisco TrustSec and Cisco ISE for deep visibility and strong defense against network threats.
The document discusses the Aerohive Personalized Engagement Platform which provides a flexible and secure Wi-Fi network that addresses PCI 3.0 compliance requirements for retailers. It includes features like strong encryption, authentication, intrusion detection and a firewall to isolate cardholder data. The platform also offers PCI compliance reporting through HiveManager to identify issues and vulnerabilities. Maintaining PCI compliance is important as wireless networks become critical for retail customer engagement and sales.
This document provides an overview of Accouronicx Solution Link (ASL), an IT solutions provider in Pakistan. ASL offers integrated technology solutions and services including Cisco services, LAN/WAN solutions, VoIP solutions, wireless solutions, security solutions, and after sales support. The document describes each of ASL's solutions and service offerings in 1-2 sentences. It also provides details on ASL's quality assurance processes, network products, team members, and some of its satisfied clients. Contact information for ASL's Karachi office is provided at the end.
The document discusses building a smarter, simpler network architecture using intelligent access and application monitoring. It argues that next generation networks need high scalability, availability, and self-healing capabilities to handle growing traffic and complexity. The author advocates for an approach where network access and security/monitoring tools work intelligently together as a cohesive system, with the access providing context about network traffic to help tools like firewalls and intrusion detection systems operate optimally. Automating functions like load balancing and "heartbeat" packets that check tool health are presented as ways to proactively monitor the network and optimize tool performance.
We are a Network solutions provider & Hardware aggregator. We offer comprehensive solutions for all sectors - Turnkey Project solutions for IT Infrastructure, IT Services, Security Surveillance Systems & Services, Hardware Consulting and Aggregation After Sales Management & Maintenance Services.
1. Final Project - This project provides you an opportunity to solTatianaMajor22
1. Final Project - This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network (VPN) implementation at various levels. You will play the role of an employee participating in network design and planning of a specific business situation.
Required Source Information and Tools
The following tools and resources are needed to complete this project:
· A web browser and access to the Internet to perform research for the project
· (Optional) A tool for creating basic network diagrams, such as draw.io or Microsoft Visio
Learning Objectives and Outcomes
· Apply core competencies learned throughout the course to a single project.
· Analyze and apply knowledge of firewalls, VPNs, and other network defense measures.
· Demonstrate logical reasoning and decision-making skills.
Overall Project Scenario
Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.
Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.
You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.
Deliverables
The project is divided into several parts. Details for each deliverable can be found in this document.
· Project Part 1: Network Design
· Project Part 2: Firewall Selection and Placement
· Project Part 3: Remote Access and VPNs
· Project Part 4: Final Network Design Report
Project Part 1: Network Design
Scenario - The Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following components:
· Current infrastructure elements
· A logical topology that separates the Accounting and Sales departments
· Redundant communications
· Justification for continuing with IPv4 or upgrading to IPv6
Tasks
For this part ...
In a two- to three-page paper (excluding the title and reference pag.docxrock73
In a two- to three-page paper (excluding the title and reference pages), explain the purpose of an income statement and how it reflects the firm’s financial status. Include important points that an analyst would use in assessing the financial condition of the company. Also, analyze Ford Motor Company’s income statement from its
2012 Annual Report
.
Your paper must be formatted according to APA style, and must include citations and references for the text and at least two scholarly sources.
.
In a substantial paragraph respond to either one of the following qu.docxrock73
In a substantial paragraph respond to either one of the following questions:
1.) Choose one source of energy, explain its origins, how does it impact our Earth, and what effect does it have on our planet?
OR
2.) Explain, with details, how geology influences the distribution of natural resources.
NO MINIMUM WORD LENGTH REQUIRED.
.
More Related Content
Similar to Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
This document discusses virtual private networks (VPNs) and network access control (NAC). It defines VPNs as creating a secure "tunnel" across a public network like the internet to extend a private network. The two endpoints are the local and remote machines. NAC systems enforce network access policies to control which devices and users can access the network, placing non-compliant devices in quarantine if needed. NAC capabilities include policy management, profiling devices, guest networking access, security checks, and integration with other security systems.
Eliminate the need to buy and manage premise-based, security devices and applicances and let XO Communications security experts monitor and manage the authorized use of your security policies.
This document provides a project plan proposed by Network Solutions Inc. to upgrade the computer network for Healthmark Medical, a medical supply company. The plan outlines the defining problems with the current network having issues supporting demands. It then provides details on the scope, requirements, stakeholders, work breakdown structure, cost analysis, technical implementation approach including network diagrams, risks, and security measures to ensure compliance with HIPAA/Title II privacy guidelines. The network upgrade aims to solidify Healthmark's technology needs for years to come by replacing outdated hardware and software with a new network infrastructure designed to handle their workload demands.
The document discusses planning and designing a small network, including:
- Identifying common devices used such as routers, switches, wireless access points, and IP phones.
- Design considerations for a small network like IP addressing, redundancy, traffic prioritization.
- Common network applications and protocols used, including VoIP, DHCP, DNS.
- Ensuring the network can support real-time applications like voice and video.
- Planning for future growth of the network through documentation, traffic analysis, and protocol analysis.
Security Design Considerations Module 3 - Training SampleContent Rules, Inc.
This module provides an overview of network security design considerations and configurations for the Sentriant CE150 device. It describes the vulnerabilities companies face and factors to consider in security solution design, such as performance, user transparency, and compliance. The module also outlines basic Sentriant CE150 network designs for non-router and router environments, including redundancy options, and provides worksheets to gather required configuration information.
Logic Networks provides a comprehensive range of IT support services including PC and server hardware maintenance, network infrastructure support, network analysis and management services, and bespoke software development. They operate 24/7/365 from their London office to provide continuous support to over 120 business customers. Logic Networks aims to be one of the leading providers of integrated technical services in the UK and Middle East through a consistent approach of high quality, tailored support services.
kavya cn ppt.pdf.pptx Hotel Management system using computer networkDevPratapSinghTomar1
The document outlines a proposed network design solution for a hotel management company that includes upgrading outdated network switches to modern IP-based switches, implementing dynamic IP allocation for improved scalability and efficiency, and enabling remote network access for more efficient management. The proposed solution also involves introducing VLAN configurations to logically segment the network and improve security by isolating traffic flows within departments.
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
1) COLLINS is a state agency that stores confidential information and needs improved security for its database and telecommuters.
2) The proposal aims to implement the best security measures to protect data in the database and ensure security for telecommuters.
3) Methods like installing firewalls, encrypting sensitive data, and using digital signatures are proposed to provide database and network security.
The document provides an overview of commands and techniques used to verify connectivity and acquire device information in a small network. It describes using ping and traceroute to test connectivity between devices and troubleshoot connectivity issues. It also explains using the ipconfig command on Windows and ifconfig/ip commands on Linux to view a host's IP configuration, and introduces commands like show ip interface brief for viewing IP information on routers.
To beat a hacker, you need to think like one!
"Our Clients, Intelligence, Air force, Army, Navy, Defense, Police, Justice, Banks ,Stock Exchanges, Airports , Hospital,Ministry,University, Government and Pvt Sectors".
All government authorities and private sectors , financial institutions, banks, intelligence agencies, corporate and factories are really worried of the internet threats. They could not have gained the advantage of the internet as the normal entrepreneur.
This document provides information about Medley Marketing Pvt Ltd (MMPL), an IT solutions provider. Some key points:
- MMPL has 30 years of experience in IT and over 50,000 satisfied customers. It provides quality IT products and services across Northern India through over 100 partners.
- MMPL offers thin clients, networking solutions, security products, software, and services. It has expertise in areas like Linux, Windows, servers, storage, and network security.
- MMPL has over 30 trained personnel and a component-level repair center. It provides solutions for sectors like retail, education, healthcare, and more.
- Testimonials provided indicate that MMPL's thin clients have helped
Scenario Overview Now that you’re super knowledgeable about se.docxtodd331
This document proposes a security infrastructure design for a fictional online retail organization with 50 employees. It recommends securing the external website for customer purchases, internal intranet site, remote access for engineers, and wireless network. It also suggests implementing firewall rules, securing laptop configurations, and protecting customer data with intrusion detection. The goal is to securely enable e-commerce transactions while maintaining privacy of user information.
How to minimize threats in your information system using network segregation? PECB
We will discuss the importance of network infrastructure and how we can minimize risks of attacks in our IT by segregating and segmenting our network infrastructure.
Main points that have been covered are:
• Why it’s always a primary target for attacks?
• What are the segmented networks?
• How can it be used?
Presenter:
Our presenter for this webinar is Mohamed Tawfik, who is a qualified Technocrat, and a seasoned IT/Telecom Professional having over 20 years of solid experience with multi-national corporate organizations planning, deployment, governance, audit and enforcing policy on Information Security Practice, while having in-depth knowledge of IT/Telecom Infrastructure and with a proven record of customer satisfaction.
Link of the recorded session published on YouTube:https://youtu.be/sKhihzgElH8
This document discusses virtual private networks (VPNs). It defines a VPN as a private network that uses a public network like the Internet instead of leased lines. VPNs provide secure remote access to corporate resources over the Internet and connect branch office networks to head office networks securely. The document outlines common VPN protocols like PPTP, L2TP, and IPsec. It discusses VPN components such as user authentication, address management, data encryption, and key management. Finally, it highlights benefits of VPNs such as reduced costs and increased flexibility compared to leased lines.
This document discusses securing enterprise networks against threats. It notes that digital transformation is disrupting businesses and video traffic will grow significantly. New network priorities include wireless connectivity, intelligent WAN, cloud, and security everywhere. Network threats are getting smarter using techniques like advanced persistent threats. Cisco's solution leverages the network as a sensor and enforcer using technologies like Flexible NetFlow, Lancope StealthWatch, Cisco TrustSec and Cisco ISE for deep visibility and strong defense against network threats.
The document discusses the Aerohive Personalized Engagement Platform which provides a flexible and secure Wi-Fi network that addresses PCI 3.0 compliance requirements for retailers. It includes features like strong encryption, authentication, intrusion detection and a firewall to isolate cardholder data. The platform also offers PCI compliance reporting through HiveManager to identify issues and vulnerabilities. Maintaining PCI compliance is important as wireless networks become critical for retail customer engagement and sales.
This document provides an overview of Accouronicx Solution Link (ASL), an IT solutions provider in Pakistan. ASL offers integrated technology solutions and services including Cisco services, LAN/WAN solutions, VoIP solutions, wireless solutions, security solutions, and after sales support. The document describes each of ASL's solutions and service offerings in 1-2 sentences. It also provides details on ASL's quality assurance processes, network products, team members, and some of its satisfied clients. Contact information for ASL's Karachi office is provided at the end.
The document discusses building a smarter, simpler network architecture using intelligent access and application monitoring. It argues that next generation networks need high scalability, availability, and self-healing capabilities to handle growing traffic and complexity. The author advocates for an approach where network access and security/monitoring tools work intelligently together as a cohesive system, with the access providing context about network traffic to help tools like firewalls and intrusion detection systems operate optimally. Automating functions like load balancing and "heartbeat" packets that check tool health are presented as ways to proactively monitor the network and optimize tool performance.
We are a Network solutions provider & Hardware aggregator. We offer comprehensive solutions for all sectors - Turnkey Project solutions for IT Infrastructure, IT Services, Security Surveillance Systems & Services, Hardware Consulting and Aggregation After Sales Management & Maintenance Services.
1. Final Project - This project provides you an opportunity to solTatianaMajor22
1. Final Project - This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network (VPN) implementation at various levels. You will play the role of an employee participating in network design and planning of a specific business situation.
Required Source Information and Tools
The following tools and resources are needed to complete this project:
· A web browser and access to the Internet to perform research for the project
· (Optional) A tool for creating basic network diagrams, such as draw.io or Microsoft Visio
Learning Objectives and Outcomes
· Apply core competencies learned throughout the course to a single project.
· Analyze and apply knowledge of firewalls, VPNs, and other network defense measures.
· Demonstrate logical reasoning and decision-making skills.
Overall Project Scenario
Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.
Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.
You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.
Deliverables
The project is divided into several parts. Details for each deliverable can be found in this document.
· Project Part 1: Network Design
· Project Part 2: Firewall Selection and Placement
· Project Part 3: Remote Access and VPNs
· Project Part 4: Final Network Design Report
Project Part 1: Network Design
Scenario - The Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following components:
· Current infrastructure elements
· A logical topology that separates the Accounting and Sales departments
· Redundant communications
· Justification for continuing with IPv4 or upgrading to IPv6
Tasks
For this part ...
Similar to Authentic Assessment Project (AAP) Jan 2017Background Informat.docx (20)
In a two- to three-page paper (excluding the title and reference pag.docxrock73
In a two- to three-page paper (excluding the title and reference pages), explain the purpose of an income statement and how it reflects the firm’s financial status. Include important points that an analyst would use in assessing the financial condition of the company. Also, analyze Ford Motor Company’s income statement from its
2012 Annual Report
.
Your paper must be formatted according to APA style, and must include citations and references for the text and at least two scholarly sources.
.
In a substantial paragraph respond to either one of the following qu.docxrock73
In a substantial paragraph respond to either one of the following questions:
1.) Choose one source of energy, explain its origins, how does it impact our Earth, and what effect does it have on our planet?
OR
2.) Explain, with details, how geology influences the distribution of natural resources.
NO MINIMUM WORD LENGTH REQUIRED.
.
In a study by Dr. Sandra Levitsky, she considers why the economic,.docxrock73
In a study by Dr. Sandra Levitsky, she considers why the economic, physical, and emotional challenges of providing chronic care for a family member have not produced more salient political demands for aggressive policy intervention (Hudson, 2014).
Discuss her findings as well as your own theory on why there has not been a stronger demand from the public for policy intervention to assist caregivers.
Support your statements with evidence from the Required Studies and your research. Cite and reference your sources in APA style.
References
Hudson, R. (Ed). (2014).
The new politics of old age policy
(3rd ed.). Baltimore, John Hopkins.
.
In a response of at least two paragraphs, provide an explanation o.docxrock73
In a response of at least two paragraphs, provide an explanation of the steps you took to rewrite the Romantic poem you selected. Your explanation should point out at least three typically modernist qualities in your work with regard to elements such as
language, style, literary elements, and themes. Here, as an example, is a brief explanation of the modernist rewrite of the first stanza of Wordsworth
’s “I Wandered Lonely as a Cloud”:
.
in a minimum of 1000 words, describe why baseball is Americas past .docxrock73
in a minimum of 1000 words, describe why baseball is America's past time. As part of your paper you can share some of your memories of baseball. How did baseball mirror society(good and bad?) as a reflection of American society. Be sure to cite all of your sources and you must show direct evidence of integrating your textbook once per chapter as part of your final exam. Your paper should at include at least one resource from the library.
.
In a minimum 200 word response, describe some ways how the public .docxrock73
In a minimum 200 word response, describe some ways how the public has responded to the October 2001 USA Patriot Act. Has the public’s response been positive or negative? What are some pros and cons of the USA Patriot Act with the American public? Explain your answer.
Dempsey, J. S., & Forst, L. S. (2011, Pg. 213-214).
Police
. Clifton Park, NY: Delmar.
.
In a weekly coordination meeting, several senior investigators from .docxrock73
Senior investigators from a state crime lab requested that AB Investigative Services create standard operating procedures for processing computer evidence, as recent investigators have not properly understood how computer data works and technical issues related to evidence processing. ABIS was asked to provide 4 general guidelines for processing evidence to ensure investigators follow standard procedures.
In a memo, describe 1) the form and style of art as well as 2) the e.docxrock73
In a memo, describe 1) the form and style of art as well as 2) the engineering phenomenon – a substantial paragraph for each. You will need to research both the art and engineering, so each section of the memo should include citations from credible sources.
i need to wrote two paragraph also incloude two citation for each one
.
In a minimum 200 word response explain the problems that law enforce.docxrock73
In a minimum 200 word response explain the problems that law enforcement officials have faced regarding the issues of federal, state, and local jurisdictions attempting to intervene in tribal policing. How has this issue contributed to confusion and discontent with law enforcement? Dempsey, J. S., & Forst, L. S. (2011, Pg. 22-25). Police. Clifton Park, NY: Delmar.
.
In a minimum 200 word response explain some of the reasons why, in.docxrock73
In a minimum 200 word response explain some of the reasons why, in the context of span of control, it is more beneficial to
limit the number of officers reporting to one supervisor.
What factors can affect how many employees are supervised at one time?
Dempsey, J. S., & Forst, L. S. (2011, Pg.
Pg. 35-40
).
Police
. Clifton Park, NY: Delmar.
.
In a maximum of 750 words, you are required to1. Summarize the ar.docxrock73
In a maximum of 750 words, you are required to:
1. Summarize the article (include all necessary background information);
2. Identify, discuss and analyze the main issue covered in the article, making links to all secondary
issues, theories and concepts;
3. Critique the actions taken by management and the union, (i.e., what did each do particularly
well or poorly); and
4. Discuss how the event in the article affects the lives of people other than those in management
or the union
.
in a two- to- three page paper (not including the title and referenc.docxrock73
in a two- to- three page paper (not including the title and reference pages), explain how Foreign Direct Investment (FDI) would cause an increase in the BRIC (Brazil, Russia, India, and China) countries’ Gross Domestic Product (GDP).
Your paper must be formatted according to APA Style and include at least two scholarly sources to support your assertions.
.
In a two- to three-page paper (not including the title and reference.docxrock73
A balance sheet shows a company's financial position at a point in time by listing its assets, liabilities, and shareholders' equity. It reflects a company's financial status by indicating what it owns, owes, and the portion owned by shareholders. An analysis of Ford Motor Company's 2012 balance sheet from its Annual Report shows its assets, liabilities, and shareholders' equity at the end of 2012.
In a group, take a look at the two student essays included in this f.docxrock73
In a group, take a look at the two student essays included in this folder. For each of these essays: (1) outline the organization of the components, (2) label the components, (3) name the audience and purpose, (4) decide if you found the organization of the components to be effective, and if the components themselves were well written or poorly written. You'll type your notes into a Microsoft Word document, include the names of all group members, and then upload the document individually to your own iLearn dropbox.
.
BASEBALLRuns Scored (X)Wins (Y)7086987590654797048078795730716678661963867976457455667707918559674381731946418965471735797357361556
Develop a position paper on best practices for teaching English Learners. This paper should contain the student’s personal beliefs about and the best models to practice. Statements must be supported with research data. There must be at least THREE references. The textbook may serve as ONE reference (Education English Learners for a Transformed World) The paper must be typed using APA style, double spaced, and with a title page and a reference page. The paper should be no less than three pages in length.
The positon paper: why two way is the best method in Bilingual Education
1) Please explain the components of the Prism Model and why these components are important in creating a welcoming school that promotes success for English Learners.
2) There have been many programs and ideas in the US Public schools for how best to serve English Learners and close the gap between those who enter school speaking English and those who have to learn English along the way.
Following is a list of Bilingual Education Models that have been tried. According to the text book and the research of Virginia Collier and Wayne Thomas, please rate the following programs from 1-6 with 1 being the most effective program for student success and 6 being the least effective program for learning English:
__________Maintenance Bilingual Ed., Self-Contained
__________Transitional Bilingual Ed.
__________One-way Dual Language
__________Pull-out Bilingual Ed.
__________Two-way Dual Language
__________Enrichment Bilingual Education (30 min. per day)
The following programs are designed for ELs who do not live in an area where bilingual ed. is available or do not qualify for bilingual education due to the language they speak. Please rate the following ESL programs on a scale of 1-4 with 1 being the most successful way to teach English and 4 being the least effective program:
__________ESL Pull-out
__________Sheltered Instruction in the regular classroom
__________Total emersion with no language support
__________English enrichment, 30 minutes per day, by classroom teacher
3) Please explain the difference between a 50/50 model and a 90/10 model of Dual Language Education.
4) Why does 2-way Dual Language Education usually have better results than 1-way Dual Language Education?
5) In order to have an effective Dual Language program, there are two important things teachers should not do. What are they?
6) What does it mean to see other cultures not as a deficit but as a difference? Why is this idea important to your classroom?
7) We are required to have many formal assessments in our educational curriculum. However, informal assessment can be much more informative to the teacher of language learners. Please explain why Informal Assessments might be a better way for the teacher to know the true level of the student.
...
Based on Santa Clara University Ethics DialogueEthics .docxrock73
Based on Santa Clara University Ethics Dialogue
Ethics case studies
This is an extra credit assignment that I am offering for the first time this term. In this booklet, you will find 38 separate case studies. You are free to respond to any or all of these cases.
You may earn up to 5 extra credit points per question, based on the complexity of the case and the logic of your response. You may not earn more than 100 points (10 percent of your final grade).
You may find it helpful to read the paper “Four Tough Ethical Dilemmas” prior to responding.
While these are your opinions, citations are not expected; however, if you make use of the work of others, include APA style citations for complete credit.
Either cut and paste the cases you select to a separate file or use this file for your submission. If you use this file to submit a response, please delete those cases to which you are not responding.
Dr. Frick
Case 1: Family Loyalty vs. Meritocracy
A man was appointed president of the newly-acquired Philippine subsidiary of a large American company. He was reviewing the organization with the company's head of human resources. One thing the president noted was that the same names reoccurred frequently in several departments. "It is our tradition," commented the HR head. "Families take care of their own. If one family member gets a good job in a Philippine company, other members of the family apply to join that company and the first member there can help the whole family become successful by helping them get hired and by coaching them to be successful. The company benefits. Our costs of recruiting are lower, we know more about the people we hire, and the commitment to family success results in fewer performance and discipline problems because family members want to please their older relatives."
The president wondered how these practices would be regarded in a large American firm, and whether or not he should take action to change them.
1. Nepotism is not illegal, but is it ethical?
2. If the business is family-owned, does that make a difference?
3. How does national culture affect this discussion?
Case 2: Is the Two-Tier System Ethically Problematic
Employees at a cereal makers plant were “locked-out” from their jobs producing cereal for over 3 months. Company management and the union representing the employees reached a stalemate in negotiations resulting in the lockout. The union claims that the primary issue is the company’s demand of dramatically increasing the number of temporary workers, who would earn $6 less per hour and receive fewer benefits. Critics claim this effectively creates a two-tier system at the plant. Under the current agreement, the company may use temporary workers for up to 30% of the workforce, but the union claims the company is now pushing for 100%. The workers, who have had their health insurance suspended, fear that their jobs will either be replaced entirely by temporary workers, or they will be f ...
Barbara Corcoran Learns Her Heart’s True Desires In her.docxrock73
Barbara Corcoran Learns Her Heart’s True Desires
In her hilarious and lighthearted book, Shark Tales: How I Turned $1,000 Into a
Billion Dollar Business, Barbara Corcoran demonstrates the importance of knowing what
you really want out of life (Corcoran & Littlefield, 2011). As her title suggests, Barbara
founded her real estate company, The Corcoran Group, with only $1,000 and some big
dreams. Shortly after founding the company, Barbara took out a piece of paper and wrote
down some big goals for herself and the company. In 1978, she had only 14 sales agents
working for her, who earned a total of $250,000 in commissions. She set a goal of
doubling the number of agents and the commissions every year. So she put down 28 sales
people for 1979, 56 for 1980, and so on, all the way up to 1,792 salespeople in 1985 with
total commissions of $32,000,000. Barbara was amazed when she saw the fantastic sums
projected for 1985, and of course many people, when they see such amazing sums, would
dismiss the calculations as fantasy But as Barbara put it, she went to work the next day
hustling hard for her $32 million.
Real estate agents are paid largely by commission, which is about as close as you
can get to a pure form of contingent reward for performance. However, Barbara didn’t
rely solely on the commissions to motivate her workers. She threw theme parties and held
numerous social events to build a committed workforce. Good sales agents could always
move to another firm, but not every firm had Barbara’s positive attitude and fun-filled
atmosphere. In the early years of the firm, when money was tight, Barbara and her
relatives did the cooking for the outings and parties, and she found clever ways to
entertain people with skating parties and other lively activities. As the firm became larger
and more profitable, she even hired professional entertainers for the company’s midweek
picnics, which included elephant shows, daring rides on hot air balloons, horses, or
Harley Davidsons, etc. Barbara stated “I built my company on pure fun, and believe that
fun is the most underutilized motivational tool in business today. All of my best ideas
came when I was playing outside the office with the people I worked with” (Corcoran &
Littlefield, 2011, p. 283). What did she get in return for the fun atmosphere? She had the
“most profitable real estate company per person in the United States” (p. 284). By the
time she sold her agency in 2001, she had 1,000 agents working for her, and she had the
largest real estate agency in New York – clearly her motivational strategies attracted a
large number of productive employees.
Barbara Corcoran had sold her firm for $66 million. She thought that would make
her happy, but instead, it made her sad. Although she pretended to be happy with her new
wealth and freedom, she was “secretly miserable” (Corcoran & Littlefield, 2011, p. 232).
She had lost her purpose ...
This document provides context and summaries about Bapsi Sidhwa's novel Cracking India and Deepa Mehta's film adaptation Earth. It discusses the characters and plot of Earth, focusing on the abduction of Ayah. It analyzes themes in the novel like the child narrator, fallen women, masculinity, and the metaphor of India cracking. It also discusses the film adaptation and historical context of violence against women during the 1947 Partition of India and Pakistan, including government estimates of abductions.
Barriers of therapeutic relationshipThe therapeutic relations.docxrock73
Barriers of therapeutic relationship:
The therapeutic relationship between patient and nurse is often filled with barriers that can generate obstacles for the relationship and, in the end, the health system as a whole (Sfoggia et al.,2014). There are many factors that hinder building a therapeutic relationship: language, professional jargon, communication impairment, and cultural diversity (ibid).
Language:
Language can be an obstacle to nurse-patient communication because a patient may not be able to speak the same language and therefore communication is not possible (Levin,2006). The best way to overcome this barrier is providing a translator who can explain a professional facilitator's message easily to the patient(ibid). For instance, if the nurse only speaks English but the patient is only able to speak Arabic, a translation to the patient of what the professional facilitator is saying leads to less chance of misunderstanding (ibid). Translation also allows a patient to feel comfortable through being able to speak in their own language (ibid).
Medical jargon:
Jargon is a technical language that is comprehended by people in a specific industry or area of work (Leblanc et al.,2014). Health professionals often use jargon to communicate with each other(ibid). For example, T.B. disease stands for tubercle bacillus and HIV stands for human immunodeficiency virus (Mccrary & Christensen,1993). Jargon often makes sense to health professionals but a patient who does not understand these acronyms will not understand such communication, leading to a barrier in therapeutic relationship between patient and health professional (Leblanc et al.,2014).
Communication impairment:
Patients with communication impairment such as blindness, deafness and speech impairment often feel isolated, frustrated and self-conscious (O’Halloran et al.,2009). Some patients are born with such disabilities or have developed them as a result of disease (ibid). Therefore, nurses should provide enough time in order to describe any issue to such patients so that they do not feel uncomfortable or censured by health professionals, who must remain impartial (ibid).
Cultural diversity:
Patients often have various differences (Leblanc et al.,2014).Some of these differences are due to a patient's illness, social status, economic class, education and personality(ibid). However, according to Kirkham (1998), the deepest differences might be cultural diversity. Beheri (2009) points out that many nurses believe if they just treat patients with respect, they will avoid most cultural issues. Nevertheless, avoiding misunderstanding can be achieved through some knowledge of cultural customs, which might help and enable nurses to provide better health care to patients (ibid).
Facilitators of therapeutic relationship:
UNCRPD (2006) states that the most fundamental human right in hospital is communication. Patients are required to be provided with an effective communication method by nurs ...
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docxrock73
Barada 2
Mohamad Barada
Professor Andrew Durdin
Religions of the World Hum 201-02
March 23rd, 2018
References:
1. Rachel. Rachel’s Musings: Buddhism is a Religion. Retrieved from https://www.rabe.org/thoughts-on-buddhism/buddhism-is-a-religion/
2. Winfield, Pamela. The Conversation: Why so many Americans think Buddhism is just a philosophy. Retrieved from https://theconversation.com/why-so-many-americans-think-buddhism-is-just-a-philosophy-89488
Critical Analysis of the religious nature of Buddhism
The religious community often debates on whether Buddhism is categorized as a religion or as philosophical teaching. The answer to the question varies depending on an individual’s point of view. There are three main types of Buddhism practices across the world with each of them having smaller branches with slights variances in their teachings and beliefs. The different styles of Buddhist mainly encompass Theravada Buddhism, Vajrayana Buddhism, and Mahayana Buddhism. The various forms often have deities that are worshipped while others do not. Some often have scriptures while others do not usually believe in any physical form of the Buddhist teachings. The first article is authored by Rachel, a blogger, presenting the argument that Buddhism is a religion (Rachel, 1). On the other hand, the second article authored by Pamela Winfield recognizes Buddhism as a philosophy. Analyzing and comparing the two pieces having divergent views on the religious nature of Buddhism is crucial for understanding whether it is a religion or philosophy.
Summary of the articles
Rachel in her article considers Buddhism as a religion. The author acknowledges the fact that Mahayana Buddhism which is often found in greater part of Asia that includes Japan, Korea, and China often teaches on attaining enlightenment (Rachel, 1). The Mahayana often accept that every individual wishes to ensure the effective attainment of enlightenment and thus end the cycle of rebirth which others recognize as “Karma.” The article proceeds to state that Buddha is the greatest of the deities but is not worshipped. Instead, Buddha often inspires all those who practice doing as he once did. The author states that Buddhism often requires that the individuals that choose the wrong path attempt to re-accomplish these tasks in their next life alongside other punishments imposed on them by karma. The characteristics of this type of Buddhism thus often play a significant role in showing the religious nature of Buddhism. The author concludes by stating that Buddhism often contains all the different elements of a religion. Moreover, the article associates Buddhism with fallacies that characterize other religions and just as dangerous as other religions as well. A quote proves the claim on the dangerous nature of Buddhism that the author uses to summarize the teachings of Buddhism.
On the other hand, Winfield tends to focus on enlightening the readers on some of the aspects of Buddhism that ensures its a ...
Physiology and chemistry of skin and pigmentation, hairs, scalp, lips and nail, Cleansing cream, Lotions, Face powders, Face packs, Lipsticks, Bath products, soaps and baby product,
Preparation and standardization of the following : Tonic, Bleaches, Dentifrices and Mouth washes & Tooth Pastes, Cosmetics for Nails.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Assessment and Planning in Educational technology.pptxKavitha Krishnan
In an education system, it is understood that assessment is only for the students, but on the other hand, the Assessment of teachers is also an important aspect of the education system that ensures teachers are providing high-quality instruction to students. The assessment process can be used to provide feedback and support for professional development, to inform decisions about teacher retention or promotion, or to evaluate teacher effectiveness for accountability purposes.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
1. Authentic Assessment Project (AAP) Jan 2017
Background Information for World-Wide Trading Company
World-Wide Trading Company (WWTC) is a large online broker
firm in the Hong Kong. The trading company has a staff of
9,000 who are scattered around the globe. Due to aggressive
growth in business, they want to establish a regional office in
New York City. They leased the entire floor of a building on
Wall Street. You were selected as a contractor (your group) to
build a state of the art high availability, secure network. The
President of the company asked you to set up the state of the art
network by end of this year. He shared with you the
organizational structure and a list of the 100 employees. The
current floor of the new site is solid and gigabit network can be
set up on existing network wiring. Also, the existing power
supply will meet the client’s current and future demand. The
President has required these business goals:
Business and Technical Goals
· Increaserevenue from 10 billion to 40 billion in three to four
years
· Reduce the operating cost from 30 to 15 percent in two to
three years by using an automated system for buying and
selling.
· Provide secure means of customer purchase and payment over
Internet.
· Build a high availability, moderate confidentiality and
moderate integrity unclassified network (based on The National
Institute of Standards and Technology- NIST)
· Build a classified network with high confidentiality, moderate
integrity, and moderate availability (based on NIST)
· Allow employee to attach their notebook computers to the
WWTC network and wireless Internet services.
· Provide state of the art VoIP and Data Network
2. · Provide Active Directory, DNS, and DCHP services
· Provide faster Network services
· Provide fast and secure wireless services in the lobby,
conference rooms (100x60), and the cubical areas.
On the basis of these business goals, your group is responsible
for designing, configuring, and implementing fast, reliable and
secure networks (classified and unclassified).
WWTC LAN/WLAN/VoIP
· Propose a secure network design that solves the network and
security challenges, to meet business needs, and the other
technical goals. You are also required to provide a modular and
scalable network. Provide redundancy at building core layer,
building distribution layer, and access layer to avoid single
point of failure. For Building Access layer provide redundant
uplinks connection.
· Select appropriate Cisco switch model for each part of your
enterprise campus model design from the Cisco Products Link,
and use the following assumptions in your selection process:
1. Selecting the Access layers’ switches:
0. Provide one port to each device
0. Make provision for 100% growth
1. Server farm switches
a. Assume 6 NIC cards in each server and one NIC card uses
one port of switch
b. Dual processors and dual power supply
· Propose an IP addressing redesign that optimizes IP
addressing and IP routing (including the use of route
summarization). Provide migration provision to IPv6 protocol in
3. future.
· Propose a High Level security plans to secure key applications
and servers but encryption of all application is not acceptable.
Develop security policy to stop sniffing and man-in-the-middle
attack. Your security plan must be based on current industry
standards. Multilayer security or defense-in-depth.
· Integrate voice and data network to reduce cost. For dialing
outside, the World-Wide Trading Company proposes a plan for
100% connectivity with a minimum number of outside lines.
For telephone requirements, see the Organization Chart and
Telephone Equipment Table.
· Provide state of the art VoIP and Data Network.
· Provide aggregate routing protocols with hierarchal IP
scheme.
· Centralize all services and servers to make the network easier
to manage and more cost-effective.
· Provide LAN speed minimum 100 MB and Internet speed
minimum 54 MB.
· Provide wireless network access to network users and guest
users with a minimum 54 Mbps of bandwidth. (You can assume
that site survey is done and no sources of interference or RF
were discovered.)
· Provide provisions for video conference and multicast
services.
· Standardize on TCP/IP protocols for the network. Macintoshes
will be accessible only on guest notebook but must use TCP/IP
protocols or the Apple Talk Filling Protocol (AFP) running on
4. top of TCP.
· Provide extra capacity at switches so authorized users can
attach their notebook PCs to the network
· Configure DHCP on notebook PCs
· The World-Wide Trading Company will use the following
applications/services:
· Microsoft Office 365 plan (Office 2016, Exchange, Active
Directory, SharePoint, One Drive, and Skype for Business)
· Sending and receiving e-mail
· Accessing the library card-catalog
· File Server application.
· Adobe Pro
· Secure Zip
· Associate will use the following Custom Applications
· Market Tracking Application. This application will provide
real-time status of stock and bond market to brokers and their
clients.
· Stock and Bond Analytical Application. This application will
provide analysis of stock and Bond to Brokers only.
· On Line Trading. The Company wishes to train new clients in
online trading to attract new customer. The Company will sign
up new client to receive streaming video and instructions
Assume any information (with proper justification) which you
think is missing and critical to the development of the design.
WWTC Security
WWTC has strong security requirements to ensure strong
authentication, data confidentiality and separations between
internal protected server and public server.
5. Classified Network
In addition to the required unclassified network, WWTC is
requiring a classified network:
0. The classified network must be physically separated from the
unclassified network.
0. Only VPs and Department heads are allowed to access the
classified network
0. Control should be put in place to prevent local users from
accessing the classified network or removing data in any way.
This includes removing media, AV recorders, pen and paper,
and any form of printer.
0. All data transmitted on the classified network must be
cryptographically protected throughout the network (Crypto
devices are highly recommended).
0. All classified data must be centrally stored and secured in a
physically separate area from the unclassified network.
0. The classified network is used for classified email only.
WWTC needs to be able to send classified email from the NYC
office to their HQ office.
0. No redundancy, AD, Wireless, or VoIP required for the
classified network – just a simple network for classified email
only.
Unclassified Network:
The security design must ensure:
· Confidentiality, Integrity, and Availability of the data
· Physical, Logical, and Administrative security controls
· Secure e-mail used to communicate business sensitive
information.
· Confidential business information and public data are not
connected to the same physical network.
· the use of two-factor authentication mechanism is enabled.
· Sensitive business information must not be transmitted in clear
text between server and client.
6. Secure WAN Connectivity
In addition to the cryptographic protections of the data within
the classified network, all data crossing wide-area links should
undergo another layer of cryptographic protection such as
IPSec/VPN/SSL.
Public Servers
All public servers must be configured HTTPS connections and
accept all requests that are on valid IP addresses and pass
through firewall. Server must ask some identity of the
connecting party.
Site-to-site VPN tunnels
All devices must be mutually authenticated and cryptographic
protection should be provided.
User Education
All users should undergo periodic user awareness security
training program on network threats and good security
practices.
Other Security Deliverables:
1. Determine the most important assets of the company, which
must be protected
1. Determine general security architecture for the company
1. Develop a list of 12 specific security policies that could be
applied.
1. Write specific details along with the rationale for each policy
1. Integrate and write up the final version of the Security Policy
Document for submittal
1. Develop a High availability secure design for this locations
addressing above considerations and mitigating 4 primary
networks attacks categories mentioned below.
7. Protect the Network from Four Primary Attack Categories:
1. Reconnaissance attacks: An intruder attempts to discover and
map systems, services, and vulnerabilities.
2. Access attacks: An intruder attacks networks and systems to
retrieve data, or gain access, or escalate access privileges
3. Denial of Service attacks: An intruder attacks your network
in a way that damages or corrupts your computer system or
denies you and others access to your networks, system, or
services.
4. Worms, viruses, and Trojan horses: Malicious software is
inserted onto a host in order to damage a system, corrupt a
system, replicate itself, or deny services or access to networks,
system or services.
Sample Security Policies:
1. Policies defining acceptable use
2. Policies governing connections to remote network
3. Polices outlining the sensitivity level of the various types of
information held within an organization
4. Policies protecting the privacy of the network’s user and any
customer data
5. Policies defining security baselines to be met by devices
before connecting them to the network.
6. Policies for incident response handling
WWTC Active Directory Design
WWTC office at New York is largely autonomous and few IT
personnel to take care of day-to-day IT support activities such
as password resets troubleshoot virus problems. You are
concerned about sensitive data store in this location. You want
to deploy a highly developed OU structure to implement
security policies uniformly through GPO automatically at all
domains, OU, and workstations.
8. At this location Windows Server 2012 R2 is required providing
the following 10 AD features:
1. Use BitLocker encryption technology for devices (server and
Work station) disc space and volume.
2. Enables a BitLocker system on a wired network to
automatically unlock the system volume during boot (on capable
Windows Server 2012 R2 networks), reducing internal help desk
call volumes for lost PINs.
3. Create group policies settings to enforce that either Used
Disk Space Only or Full Encryption is used when BitLocker is
enabled on a drive.
4. Enable BranchCache in Windows Server 2012 for substantial
performance, manageability, scalability, and availability
improvements
5. Implement Cache Encryption to store encrypted data by
default. This allows you to ensure data security without using
drive encryption technologies.
6. Implement Failover cluster services
7. Implement File classification infrastructure feature to provide
automatic classification process.
8. IP Address Management (IPAM) is an entirely new feature in
Windows Server 2012 that provides highly customizable
administrative and monitoring capabilities for the IP address
infrastructure on a corporate network.
9. Smart cards and their associated personal identification
numbers (PINs) are an increasingly popular, reliable, and cost-
effective form of two-factor authentication. With the right
controls in place, a user must have the smart card and know the
PIN to gain access to network resources.
10. Implement Windows Deployment Services to enables you to
remotely deploy Windows operating systems. You can use it to
set up new computers by using a network-based installation.
Other AD Deliverables:
9. · Create Active directory infrastructure to include recommended
features
· Create OU level for users and devices in their respective OU
· Create Global, Universal, Local group. Each global group will
contain all users in the corresponding department. Membership
in the universal group is restrictive and membership can be
assigned on the basis of least privileged principle. (For design
purpose, you can assume that WTC as a Single Forest with
multiple domains).
· Create appropriate GPO and GPO policies and determine
where they will be applied.
Reference:
WWTC Organization Chart
VP of Operation (CIO, CFO, CHRO)
Regional VPs: VP NW USA, VP SW USA, VP NE USA, VP SE
USA, VP M USA
Note: WWTC is opening an office only at New York location.
Please do not confuse Office holder’s title (VP NW USA) with
the location.
Table: -1 Sample Equipment Inventory (this is just a sample;
you would need to insert your own equipment and comments)
Subnet
Offices
Telephone
Devices
10. Comment
VP OPR
VP OPR Office
2
1
Work Stations
CEO IT
2
1
Work Stations
CEO FIN
2
1
Work Stations
CEO HR
2
1
Work Stations
CEO IT’s Staff
2
1
Work Stations
CEO FIN’s Staff
2
1
Work Stations
CEO HR’s Staff
2
1
Work Stations
11. VP NW USA,
VP Office
2
2
Work Stations
Manager 1
2
2
Work Stations
Manager 2
2
2
Work Stations
Broker 1
2
2
Work Stations
Broker 2
2
2
Work Stations
Broker 3
2
2
Work Stations
12. Broker 4
2
2
Work Stations
Staff
2
2
Work Stations
VP SW USA
VP SW Office
2
2
Work Stations
Manager 1
2
2
Work Stations
Manager 2
2
2
Work Stations
Broker 1
2
2
Work Stations
Broker 2
13. 2
2
Work Stations
Broker 3
2
2
Work Stations
Broker 4
2
2
Work Stations
Staff
2
2
Work Stations
VP NE USA
VP NE Office
2
2
Work Stations
Manager 1
2
14. 2
Work Stations
Manager 2
2
2
Work Stations
Broker 1
2
2
Work Stations
Broker 2
2
2
Work Stations
Broker 3
2
2
Work Stations
Broker 4
2
2
Work Stations
Staff
2
2
Work Stations
15. VP SE USA
VP SE Office
2
2
Work Stations
Manager 1
2
2
Work Stations
Manager 2
2
2
Work Stations
Broker 1
2
2
Work Stations
Broker 2
2
2
Work Stations
Broker 3
2
2
Work Stations
Broker 4
2
2
Work Stations
16. Staff
2
2
Work Stations
VP M USA
VP M Offices
2
2
Work Stations
Manager 1
2
2
Work Stations
Manager 2
2
2
Work Stations
Broker 1
2
2
Work Stations
17. Broker 2
2
2
Work Stations
Broker 3
2
2
Work Stations
Broker 4
2
2
Work Stations
Staff
2
2
Work Stations
Printer
20
At various offices. Exact location to be determined.
Server
18. WLC and AP ordering Guide
Table 4. Sample Ordering Information for Cisco Wireless LAN
Controllers (you need to provide your own list)
Product
Features
Customer Requirements
Part Number
Wireless LAN Controllers
Cisco 4400 Series Wireless LAN Controller
• Modular support of 12, 25, 50, or 100 Cisco Aironet access
points
• The Cisco 4402 with 2 Gigabit Ethernet ports supports
configurations for 12, 25, and 50 access points
• The Cisco 4404 with 4 Gigabit Ethernet ports supports
configurations for 100 access points
• IEEE 802.1D Spanning Tree Protocol for higher availability
• IPSec encryption
• Industrial-grade resistance to electromagnetic interferences
(EMI)
• For midsize to large deployments
• High availability
• AIR-WLC4402-12-K9
• AIR-WLC4402-25-K9
• AIR-WLC4402-50-K9
• AIR-WLC4404-100-K9
See the Cisco Wireless LAN Controllers Data Sheet for more
information.
Cisco 2100 Series Wireless LAN Controller
• Supports up to 6, 12 or 25 Cisco Aironet access points
19. • Eight Ethernet ports, two of which can provide power directly
to Cisco APs
• Desk mountable
• For retail, enterprise branch offices, or SMB deployments
• AIR-WLC2106-K9
• AIR-WLC2112-K9
• AIR-WLC2125-K9
See the Cisco 2106 Wireless LAN Controller Data Sheet for
more information.
Cisco Catalyst® 6500 Series /7600 Series Wireless Services
Module (WiSM)
• Wireless LAN Controller for Cisco Catalyst 6500 or Cisco
7600 Series Router
• Supports 300 Cisco Aironet access points
• IPSec encryption
• Industrial-grade resistance to electromagnetic interferences
(EMI)
• Intrachassis and interchassis failover
• Interoperable with Cisco Catalyst 6500 Series Firewall and
IDS services modules
• Embedded system for the Cisco Catalyst 6500 Series and
Cisco 7600 Series Router infrastructure
• For large-scale deployments
• High availability
• WS-SVC-WISM-1-K9
• WS-SVC-WISM-1-K9= (spare)
See the Cisco Catalyst Wireless Services Module Data Sheet for
more information.
Cisco Catalyst 3750G Integrated WLAN Controller
• Cisco Catalyst 3750G Series Switch with wireless LAN
controller capabilities
• Modular support of 25 or 50 Cisco Aironet access points per
switch (and up to 200 access points per stack*)
• IPSec encryption
• Industrial-grade resistance to electromagnetic interferences
(EMI)
20. • For midsize to large deployments
• High availability
• WS-C3750G-24WS-S25
• WS-C3750G-24WS-S50
See the Cisco Catalyst 3750G Integrated Wireless LAN
Controller Data Sheet for more information.
Cisco Wireless LAN Controller Module for Cisco Integrated
Services Routers
• Wireless LAN controller integrated into Cisco integrated
services routers
• Supports 6, 8, 12, or 25 Cisco Aironet access points
• Embedded system for Cisco 2800/3800 Series and Cisco 3700
Series routers
• For retail, small to medium-sized deployments or branch
offices
• NME-AIR-WLC6-K9
• NME-AIR-WLC6-K9= (spare)
• NME-AIR-WLC8-K9
• NME-AIR-WLC8-K9= (spare)
• NME-AIR-WLC12-K9
• NME-AIR-WLC12-K9= (spare)
• NME-AIR-WLC25-K9
• NME-AIR-WLC25-K9= (spare)
See the Cisco WLAN Controller Modules Data Sheet for more
information.
Please refer to the Cisco Wireless LAN Controller Ordering
Guide supplement to learn when to add the following SKUs to
track the deployment of voice and context-aware mobility
applications.
Table 2. Cisco Aironet Indoor Rugged, Indoor, Wireless Mesh,
and Outdoor Rugged Access Points
Product
Features
Customer Requirements
21. Part Number
Indoor Rugged Access Points
Cisco Aironet 1250 Series
• Industry's first business-class access point based on the IEEE
802.11n draft 2.0 standard
• Provides reliable and predictable WLAN coverage to improve
the end-user experience for both existing 802.11a/b/g clients
and new 802.11n clients
• Offers combined data rates of up to 600 Mbps to meet the
most rigorous bandwidth requirements
• Designed for both office and challenging RF environments
• Especially beneficial for environments with the following
characteristics:
• Challenging RF environments (for example, manufacturing
plants, warehouses, clinical environments)
• Bandwidth-intensive applications (for example, digital
imaging, file transfers, network backup)
• Real-time, latency-sensitive applications such as voice and
video
• Need to support existing 802.11a/b/g and new 802.11n
wireless clients
Access point platform with pre-installed radio modules:
• AIR-AP1252AG-x-K9: 802.11a/g/n-draft 2.0 2.4/5-GHz
Modular Autonomous Access Point; 6 RP-TNC
• AIR-AP1252G-x-K9: 802.11g/n-draft 2.0 2.4-GHz Modular
Autonomous Access Point; 3 RP-TNC
• AIR-LAP1252AG-x-K9: 802.11a/g/n-draft 2.0 2.4/5-GHz
Modular Unified Access Point; 6 RP-TNC
• AIR-LAP1252G-x-K9: 802.11g/n-draft 2.0 2.4-GHz Modular
Unified Access Point; 3 RP-TNC
See the Cisco Aironet 1250 Series Ordering Guide for more
information.
Cisco Aironet 1240AG Series
• Second-generation 802.11a/g dual-band indoor rugged access
point
• 2.4-GHz and 5-GHz antenna connectors for greater range or
22. coverage versatility and more flexible installation options using
the broad selection of Cisco antennas available
• Ideal for challenging indoor RF environments
• Recommended for offices and similar environments
• Ideal for deployments above suspended ceilings
• Recommended for outdoors when deployed in a weatherproof
NEMA-rated enclosure
• AIR-AP1242AG-x-K9: 802.11a/g Nonmodular Cisco IOS
Software- Based Access Point; RP-TNC
• AIR-LAP1242AG-x-K9: 802.11a/g Nonmodular LWAPP
Access Point; RP-TNC
See the Cisco Aironet 1240AG Series 802.11a/b/g Data Sheet
for more information.
Indoor Access Points
Cisco Aironet 1130AG Series
Low-profile, enterprise-class 802.11a/g access point with
integrated antennas for easy deployment in offices and similar
RF environments
Ideal for offices and similar environments
• AIR-AP1131AG-*X-K9
See the Cisco Aironet 1130AG Series Ordering Guide for more
information.
Wireless Mesh Access Points
Cisco Aironet 1520 Series
• Next-generation outdoor wireless mesh access point
• Integrated dual band 802.11 a/b/g radios, Ethernet, fiber and
cable modem interface
• Provides easy and flexible deployments for outdoor wireless
network
• Available in a lightweight version only
• Ideal for outdoors
• Recommended for industrial deployments and local
government, public safety, and transit agencies
• AIR-LAP1522AG-X*-K9:
See the Cisco Aironet 1520 Series Lightweight Outdoor Mesh
Access Point Ordering Guide for more information.
23. Cisco Aironet 1500 Series
• Mesh access point that enables cost-effective, scalable
deployment of secure outdoor wireless LANs for metropolitan
networks or enterprise campuses
• Available in a lightweight version only
• Ideal for outdoors
• Recommended for providing wireless services and applications
to local government, public safety, and transit agencies
• AIR-LAP1510AG-*X-K9:
• Cisco Aironet 1510AG Lightweight Outdoor Mesh Access
Point, FCC configuration
See the Cisco Aironet 1500 Series Ordering Guide for more
information.
Outdoor Rugged Access Points
Cisco Aironet 1400 Series
• High-speed, high-performance outdoor bridging solution for
line-of-sight applications
• Offers affordable alternative to leased-line services
• Available in a standalone version only
• High-speed building-to-building or campus connectivity
• Share LAN/Internet access between two or more sites
• Fast installation
• AIR-BR1410A-*X-K9: With integrated antenna
• AIR-BR1410A-A-K9-N: With N-Type connector for use with
external antennas
See the Cisco Aironet 1400 Series Bridge Data Sheet for more
information.
Cisco Aironet 1300 Series
Outdoor access point/bridge offers high-speed and cost-
effective wireless connectivity between multiple fixed or mobile
networks and clients
Ideal for outdoor areas, network connections within a campus
area, temporary networks for portable or military operations, or
outdoor infrastructure for mobile networks
● AIR-BR1310G-X-K9: With integrated antenna
● AIR-BR1310G-X-K9-R: With RP-TNC connector for use with
24. external antennas
● AIR-BR1310G-A-K9-T: For transportation applications
See the Cisco Aironet 1300 Series Ordering Guide for more
information.
*X = regulatory domain
(Source: Curtsy Cisco Web site
http://cisco.com/en/US/prod/collateral/wireless/ps5679/ps6548/
prod_brochure0900aecd80565e00_ps2706_Products_Brochure.h
tml)
WLC and AP Placement Templates
Suggested Placement Table Wireless Network
Building
Access Point
Requirements
Wireless LAN Controller
Requirements
Total AP
Total WLC
Building
Lobby
Cafeteria
Conference room
25. Suggested Product Table (WLC)
WLC
Cisco Part Number
Quantity
Cost
Cisco 2100 Series Wireless LAN Controller
AIR-WLC2106-K9
2
26. Suggested Product Table (AP)
AP
Cisco Part Number
Quantity
Cost
Cisco Aironet 1250 Series
AIR-AP1252AG-x-K9: 802.11a/g/n-draft 2.0 2.4/5-GHz
Modular Autonomous Access Point; 6 RP-TNC
20
VP OPER
10 staff
CEO IT
20 Staff
CEO HR
20 staff
CEO FIN
2 Staff
VP Operational Office
President
Manager 2
Manager 1
VP NW USA
27. CEO HR
CEO FIN
CEO IT
VPOPR
Manager 2
Manager 1
VP SW USA
Manger 2
Manager 1
VP M USA
Manager 2
Manager 1
VP SE USA
Manager 2
Manger 1
VP NE USA
World-Wide Trading Company Organizational Chart
VP
Broker 4
Broker 3
Broker 2
Broker 1
3 staff
Manager 2
Broker 4
Broker 3
Broker 2
Broker 1
3 Staff
Manager 1
2 Staff
Vice President Office