SlideShare a Scribd company logo
1 of 39
Case
1
Network
Design
Abstract
The
company
in
this
case
is
a
small
consulting
firm
whose
specialty
is
providing
their
customers
with
Microsoft
Windows
and
Citrix
networked
business
solutions.
They
believed
their
internal
servers
are
secure
due
to
their
diligence
in
keeping
the
Operating
Systems
up
to
date
with
the
latest
service
packs,
hotfixes
and
patches.
Virus
signatures
and
scanning
software
is
also
kept
current.
Your
security
company
has
been
given
the
task
of
evaluating
the
security
of
the
network
perimeter
and
to
make
recommendations
for
securing
our
network
perimeter
and
Internet
connection.
Examination
of
the
perimeter
infrastructure
showed
the
network
to
be
virtually
defenseless.
There
is
no
Firewall
installed
and
very
little
filtering
of
inbound
or
outbound
Internet
traffic
on
either
the
router
at
the
corporate
office
or
the
router
at
the
branch
office.
The
Linux,
Help
Desk,
Mail
server
and
the
two
Active
Directory
servers
had
direct
network
links
to
both
the
internal
network
and
the
Internet
making
them
prime
targets
for
intruders.
Your
proposal
is
to
completely
redesign
the
network
perimeter
to
provide
a
layered
Defense
in
Depth.
Current
Network
design
The
original
perimeter
network
design
included
two
Cisco
routers
and
five
publicly
addressed
servers,
four
of
which
were
Windows
based
and
the
fifth,
RedHat
Linux.
As
stated,
the
network
did
not
have
a
Firewall
device
and
the
perimeter
routers
performed
extremely
limited
inbound
packet
filtering.
The
corporate
router
is
configured
with
a
serial
interface
for
connection
to
the
Internet,
an
Ethernet
interface
for
the
public
network,
and
an
Ethernet
interface
for
the
internal
(private)
network.
The
branch
office
router
had
a
serial
interface
to
the
Internet
and
an
Ethernet
interface
to
their
internal
network
(diagram
1).
The
branch
and
corporate
routers
were
connected
by
VPN
tunnel
over
the
Internet.
The
various
network
devices
at
the
corporate
office,
both
internal
and
external,
were
connected
via
three
cascaded
switches.
Each
of
the
external
(public)
servers
had
a
direct
link
to
the
internal
network
and
represented
a
significant
danger
if
they
were
compromised.
The
branch
office
network
consisted
of
four
PCs
on
a
hub
connected
to
the
router.
A
brief
description
of
each
network
device
follows.
Routers
Corporate
Router
The
Cisco
router
at
the
corporate
office
provided
Network
Address
Translation
(NAT)
for
outbound
Internet
connections.
The
five
public
servers
were
assigned
static
NAT
addresses.
All
other
traffic
is
given
the
public
address
of
the
serial
interface
by
the
NAT
“overload”
feature
of
the
Cisco
Internetwork
Operating
System
(IOS).
The
router
also
acted
as
one
end
of
a
point-­‐to-­‐point
VPN
tunnel
to
the
branch
office
router.
This
provided
secure
access
to
the
corporate
Microsoft
Active
Directory
servers
and
other
network
resources.
The
serial
interface
had
an
inbound
access
list
to
block
port
1433
(SQL
Server)
traffic
to
a
single
internal
server.
All
other
traffic,
inbound
and
outbound
is
permitted.
Branch
Office
Router
The
Branch
office
router
is
configured
to
provide
NAT
for
outgoing
Internet
traffic,
in
addition
to
a
VPN
tunnel
to
the
corporate
router.
An
inbound
access
list
is
applied
to
the
serial
interface
making
it
somewhat
more
secure.
The
access
list
is
designed
to
block
packets
with
spoofed
private
network
addresses.
No
other
security
measures
were
in
place.
Public
Servers
Help
Desk
Server.
This
is
a
Windows
2003
server
providing
web
based
Help
Desk
services
to
clients
and
staff.
It
runs
Microsoft
Internet
Information
Server
(IIS)
and
Microsoft
SQL
to
support
the
Help
Desk
application.
There
were
two
network
interfaces
installed,
one
connected
to
the
public
network,
the
other
connected
to
the
private
network.
The
patch
levels
and
virus
signatures
on
this
server
were
kept
up
to
date.
Mail
Server
The
second
server
is
also
Windows
2003
based.
It
acts
as
a
mail
server
using
Microsoft
Exchange
and
provides
file
and
print
services
to
the
internal
network
through
a
second
network
interface.
Mail
sent
to
this
server
is
forwarded
to
the
internal
Exchange
mail
server,
storing
it
if
the
internal
server
is
unavailable.
This
server
also
acted
as
a
public
NFuse
front
end
to
the
internal
Citrix
server.
Linux
Server
The
Linux
server
runs
the
Redhat
9.2
operating
system
and
Apache
web
server
software.
This
server
has
a
total
of
five
network
interfaces.
One
public,
one
private,
and
three
others
used
to
provide
routing
and
Internet
gateway
services
to
other
companies
in
our
building
for
a
monthly
fee.
There
is
a
minimal
host
firewall
in
place,
allowing
the
three
companies
to
access
the
Internet,
but
preventing
them
from
accessing
the
other
networks
in
the
building.
All
Internet
traffic
inbound
or
outbound
is
permitted
to
their
networks
with
no
additional
filtering.
Our
service
agreement
with
these
clients
does
not
require
us
to
provide
any
additional
type
of
security
services.
The
Linux
machine
also
acts
as
a
web
server
providing
portal
access
to
our
internal
servers.
Clients
and
staff
can
access
each
portal
service
by
providing
their
name
and
password.
Credentials
are
passed
to
the
internal
Active
Directory
server
for
validation
using
LDAP.
Active
Directory
Servers
The
Primary
and
Secondary
Active
Directory
Servers
had
two
interfaces
each,
one
connected
to
the
internal
network
and
the
other
to
the
Internet.
The
reason
for
the
dual
attachment
is
to
provide
Active
Directory
services
to
the
PCs
in
the
branch
office
over
the
VPN.
Without
the
internal
interface,
the
branch
office
is
unable
to
browse
the
corporate
network.
Vulnerability
Assessment
The
network
does
not
have
a
Firewall
installed
for
protection
against
outside
probes
or
attacks.
This
is
a
critical
weakness
because
even
the
most
well
patched,
up
to
date
operating
system
is
vulnerable
to
a
determined
attack.
The
same
is
true
of
web
services
and
other
applications.
Compromised
resources
on
our
network
could
be
used
to
unknowingly
participate
in
a
Distributed
Denial
of
Service
(DDOS)
attack
launched
against
another
network.
There
is
insufficient
filtering
on
the
routers.
As
with
the
lack
of
firewall,
this
leaves
the
network
wide
open
to
attack
and
exploitation.
Logs
are
not
kept
of
the
types
or
frequency
of
Internet
traffic.
Without
logs
there
is
no
way
to
determine
if
the
network
is
being
probed
or
attacked.
Each
of
the
public
servers
also
had
links
to
the
company’s
internal
network.
If
any
of
these
machines
were
compromised,
they
could
act
as
gateways
to
the
rest
of
the
company’s
data
and
servers.
The
Linux
server
is
built
and
is
maintained
by
one
of
the
consulting
engineers.
Patches,
bugfixes
and
other
administrative
tasks
were
performed
whenever
his
schedule
allowed.
There
is
no
one
else
in
the
company
familiar
enough
with
Linux
to
assume
this
responsibility.
There
are
no
written
policies
concerning
the
frequency
or
responsibility
for
maintaining
the
security
levels
of
hardware
and
software.
Wireless and Remote connectivity Challenge – Sanford
University
Sanford University is a medium-sized university in the outskirts
of Philadelphia. Formed
in 1966, it has grown steadily through the incorporation of
additional colleges and
further education providers, but retains an emphasis on
engineering, science and
technology.
Today, it numbers around 15,000 students and 2,000 staff.
As part of a five-year strategic plan, the university’s “Open
Kingdom” project aims to
create a consistent user experience across the campus, including
the provision of
wireless network access. This last issue became critical in the
summer of 2012, when
the Students body insisted on wireless access for all residential
buildings before starting
negotiations on 2013 rents.
“We’d traditionally viewed wired as good enough for
everybody,” says John Patrick.
network and data center manager for the University. “What
became very clear was that
wired wasn’t good enough for our students. Wired wasn’t their
typical network
experience. They expect the same experience on campus as they
have at home.
Students wanted to do their computing anywhere, anyhow, on
the go, inside the
campus, outside the campus. They didn’t want to be a slave to
the cable.”
Patrick and his team needed a solution in place before the
January 2013 deadline.
The solution needs to provide wireless access coverage in the 7
buildings across
campus, four of them residential, and for the solution to provide
a robust remote access
system (VPN) for faculty and staff.
The solution should not discriminate between devices; students
would be free to use
smartphones, games consoles or tablets on the network, for
work or play. However, the
network needed to differentiate between staff, students,
conference visitors and guests,
granting the appropriate access to services. Ultimately, with
thousands of users bringing
their own devices onto the network, it needed to maintain the
security of the university’s
systems.
Sanford University layout
Residential buildings - 6 stories with 25 rooms per floor
Classroom / conference building - 4 stories and 40 classrooms
per floor. Auditorium
and Cafeteria located on ground floor.
Classroom / Admissions / Library building - 7 stories with 20
offices or classrooms per
floor.
Data center on campus - provides IT services to the entire
campus.
Case  1  Network  Design  Abstract    The .docx

More Related Content

Similar to Case  1  Network  Design  Abstract    The .docx

Desktop Management Services Bhubaneswar
Desktop Management Services BhubaneswarDesktop Management Services Bhubaneswar
Desktop Management Services Bhubaneswardesklink
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfaquazac
 
Case1–NetworkDesignAbstractThecompanyinthisc.docx
Case1–NetworkDesignAbstractThecompanyinthisc.docxCase1–NetworkDesignAbstractThecompanyinthisc.docx
Case1–NetworkDesignAbstractThecompanyinthisc.docxwendolynhalbert
 
Ebook Guide To Data Centers
Ebook Guide To Data CentersEbook Guide To Data Centers
Ebook Guide To Data Centersrobgross144
 
Daniel Senior Resume
Daniel Senior ResumeDaniel Senior Resume
Daniel Senior ResumeDaniel Senior
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxtodd581
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docxglendar3
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - FerdonSusan Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorialSusan Ferdon
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationGambari Amosa Isiaka
 
Network Project Report
Network Project ReportNetwork Project Report
Network Project ReportTiffany Graham
 
Ben Hay CV External - 14.02.15
Ben Hay CV External - 14.02.15Ben Hay CV External - 14.02.15
Ben Hay CV External - 14.02.15Ben Hay
 
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxRunning head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxtoltonkendal
 
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxWest Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxphilipnelson29183
 

Similar to Case  1  Network  Design  Abstract    The .docx (20)

Desktop Management Services Bhubaneswar
Desktop Management Services BhubaneswarDesktop Management Services Bhubaneswar
Desktop Management Services Bhubaneswar
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Raghunathreddy Updated Resume
Raghunathreddy Updated ResumeRaghunathreddy Updated Resume
Raghunathreddy Updated Resume
 
G04734450
G04734450G04734450
G04734450
 
Case1–NetworkDesignAbstractThecompanyinthisc.docx
Case1–NetworkDesignAbstractThecompanyinthisc.docxCase1–NetworkDesignAbstractThecompanyinthisc.docx
Case1–NetworkDesignAbstractThecompanyinthisc.docx
 
Ebook Guide To Data Centers
Ebook Guide To Data CentersEbook Guide To Data Centers
Ebook Guide To Data Centers
 
Daniel Senior Resume
Daniel Senior ResumeDaniel Senior Resume
Daniel Senior Resume
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docxRunning head NETWORK INFRASTRUCTURE AND SECURITY  1NETWOR.docx
Running head NETWORK INFRASTRUCTURE AND SECURITY 1NETWOR.docx
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentation
 
Week2
Week2Week2
Week2
 
2010fall ch31 naymka
2010fall ch31 naymka2010fall ch31 naymka
2010fall ch31 naymka
 
Network Project Report
Network Project ReportNetwork Project Report
Network Project Report
 
Ben Hay CV External - 14.02.15
Ben Hay CV External - 14.02.15Ben Hay CV External - 14.02.15
Ben Hay CV External - 14.02.15
 
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxRunning head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
 
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxWest Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
 
Solution
SolutionSolution
Solution
 

More from wendolynhalbert

What appropriate sources of information did you use in finding your .docx
What appropriate sources of information did you use in finding your .docxWhat appropriate sources of information did you use in finding your .docx
What appropriate sources of information did you use in finding your .docxwendolynhalbert
 
Western Civilization before The Thirty Years WarInstructions .docx
Western Civilization before The Thirty Years WarInstructions .docxWestern Civilization before The Thirty Years WarInstructions .docx
Western Civilization before The Thirty Years WarInstructions .docxwendolynhalbert
 
Western Civilization – Week 7 Discussion ForumPlease choose just o.docx
Western Civilization – Week 7 Discussion ForumPlease choose just o.docxWestern Civilization – Week 7 Discussion ForumPlease choose just o.docx
Western Civilization – Week 7 Discussion ForumPlease choose just o.docxwendolynhalbert
 
Wendy was addicted to her morning cup of coffee.  She had one cup be.docx
Wendy was addicted to her morning cup of coffee.  She had one cup be.docxWendy was addicted to her morning cup of coffee.  She had one cup be.docx
Wendy was addicted to her morning cup of coffee.  She had one cup be.docxwendolynhalbert
 
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docxWEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docxwendolynhalbert
 
Week 8The Trouble with Aid Please respond to the following.docx
Week 8The Trouble with Aid Please respond to the following.docxWeek 8The Trouble with Aid Please respond to the following.docx
Week 8The Trouble with Aid Please respond to the following.docxwendolynhalbert
 
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docxWeek 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docxwendolynhalbert
 
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docxWeek1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docxwendolynhalbert
 
Week 8 -- Provide an example of some form of misrepresentation in me.docx
Week 8 -- Provide an example of some form of misrepresentation in me.docxWeek 8 -- Provide an example of some form of misrepresentation in me.docx
Week 8 -- Provide an example of some form of misrepresentation in me.docxwendolynhalbert
 
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docxWEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docxwendolynhalbert
 
weeks Discussion link in the left navigation.Description and .docx
weeks Discussion link in the left navigation.Description and .docxweeks Discussion link in the left navigation.Description and .docx
weeks Discussion link in the left navigation.Description and .docxwendolynhalbert
 
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docxWeek1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docxwendolynhalbert
 
Week-2Here I attached two file. First one is poem file. In thi.docx
Week-2Here I attached two file. First one is poem file. In thi.docxWeek-2Here I attached two file. First one is poem file. In thi.docx
Week-2Here I attached two file. First one is poem file. In thi.docxwendolynhalbert
 
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docxWeek 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docxwendolynhalbert
 
Week4 Project Human Resources and Procurement Management.docx
Week4 Project Human Resources and Procurement Management.docxWeek4 Project Human Resources and Procurement Management.docx
Week4 Project Human Resources and Procurement Management.docxwendolynhalbert
 
Week4 DiscussionWireless CommunicationsSupporting Activity.docx
Week4 DiscussionWireless CommunicationsSupporting Activity.docxWeek4 DiscussionWireless CommunicationsSupporting Activity.docx
Week4 DiscussionWireless CommunicationsSupporting Activity.docxwendolynhalbert
 
Week3 Project Cost and Quality ManagementSupporting .docx
Week3 Project Cost and Quality ManagementSupporting .docxWeek3 Project Cost and Quality ManagementSupporting .docx
Week3 Project Cost and Quality ManagementSupporting .docxwendolynhalbert
 
Week Two IndividualReliability and ValidityWrite a 1,0.docx
Week Two IndividualReliability and ValidityWrite a 1,0.docxWeek Two IndividualReliability and ValidityWrite a 1,0.docx
Week Two IndividualReliability and ValidityWrite a 1,0.docxwendolynhalbert
 
Week 7 DiscussionDiversity in the work environment promotes ac.docx
Week 7 DiscussionDiversity in the work environment promotes ac.docxWeek 7 DiscussionDiversity in the work environment promotes ac.docx
Week 7 DiscussionDiversity in the work environment promotes ac.docxwendolynhalbert
 
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docxWeek Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docxwendolynhalbert
 

More from wendolynhalbert (20)

What appropriate sources of information did you use in finding your .docx
What appropriate sources of information did you use in finding your .docxWhat appropriate sources of information did you use in finding your .docx
What appropriate sources of information did you use in finding your .docx
 
Western Civilization before The Thirty Years WarInstructions .docx
Western Civilization before The Thirty Years WarInstructions .docxWestern Civilization before The Thirty Years WarInstructions .docx
Western Civilization before The Thirty Years WarInstructions .docx
 
Western Civilization – Week 7 Discussion ForumPlease choose just o.docx
Western Civilization – Week 7 Discussion ForumPlease choose just o.docxWestern Civilization – Week 7 Discussion ForumPlease choose just o.docx
Western Civilization – Week 7 Discussion ForumPlease choose just o.docx
 
Wendy was addicted to her morning cup of coffee.  She had one cup be.docx
Wendy was addicted to her morning cup of coffee.  She had one cup be.docxWendy was addicted to her morning cup of coffee.  She had one cup be.docx
Wendy was addicted to her morning cup of coffee.  She had one cup be.docx
 
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docxWEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
 
Week 8The Trouble with Aid Please respond to the following.docx
Week 8The Trouble with Aid Please respond to the following.docxWeek 8The Trouble with Aid Please respond to the following.docx
Week 8The Trouble with Aid Please respond to the following.docx
 
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docxWeek 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
 
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docxWeek1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
 
Week 8 -- Provide an example of some form of misrepresentation in me.docx
Week 8 -- Provide an example of some form of misrepresentation in me.docxWeek 8 -- Provide an example of some form of misrepresentation in me.docx
Week 8 -- Provide an example of some form of misrepresentation in me.docx
 
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docxWEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
 
weeks Discussion link in the left navigation.Description and .docx
weeks Discussion link in the left navigation.Description and .docxweeks Discussion link in the left navigation.Description and .docx
weeks Discussion link in the left navigation.Description and .docx
 
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docxWeek1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
 
Week-2Here I attached two file. First one is poem file. In thi.docx
Week-2Here I attached two file. First one is poem file. In thi.docxWeek-2Here I attached two file. First one is poem file. In thi.docx
Week-2Here I attached two file. First one is poem file. In thi.docx
 
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docxWeek 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
 
Week4 Project Human Resources and Procurement Management.docx
Week4 Project Human Resources and Procurement Management.docxWeek4 Project Human Resources and Procurement Management.docx
Week4 Project Human Resources and Procurement Management.docx
 
Week4 DiscussionWireless CommunicationsSupporting Activity.docx
Week4 DiscussionWireless CommunicationsSupporting Activity.docxWeek4 DiscussionWireless CommunicationsSupporting Activity.docx
Week4 DiscussionWireless CommunicationsSupporting Activity.docx
 
Week3 Project Cost and Quality ManagementSupporting .docx
Week3 Project Cost and Quality ManagementSupporting .docxWeek3 Project Cost and Quality ManagementSupporting .docx
Week3 Project Cost and Quality ManagementSupporting .docx
 
Week Two IndividualReliability and ValidityWrite a 1,0.docx
Week Two IndividualReliability and ValidityWrite a 1,0.docxWeek Two IndividualReliability and ValidityWrite a 1,0.docx
Week Two IndividualReliability and ValidityWrite a 1,0.docx
 
Week 7 DiscussionDiversity in the work environment promotes ac.docx
Week 7 DiscussionDiversity in the work environment promotes ac.docxWeek 7 DiscussionDiversity in the work environment promotes ac.docx
Week 7 DiscussionDiversity in the work environment promotes ac.docx
 
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docxWeek Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
 

Recently uploaded

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Recently uploaded (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Case  1  Network  Design  Abstract    The .docx