Question

In: Computer Science

[5 marks] An organization has 2 server computers and a number of desktop computers and a...

[5 marks] An organization has 2 server computers and a number of desktop computers and a few printers. All of them are connected together via an internal network, and the network is connected to the Internet via the border router of the organization. From the outside of the organization, on the Internet, only these 2 server computers are visible. One of them is the email server (IP address: e1.e2.e3.e4), and the other one is the web server (IP address: w1.w2.w3.w4). In other words, only these 2 server computers accept requesting incoming network traffic. All desktop computers are allowed to access the Internet, without any restriction. Therefore, they accept responding incoming network traffic, but not accepting any requesting incoming network traffic.

• [3 marks] Please design the network and draw the network diagram. You have the freedom to assume the internal network structure. In the diagram, in addition to the 2 servers, you should also include a few desktop computers and a printer. Please explain the rationale on why you put a computer or a printer in its designated location, 1 example for each location. A subnet (or a segment) is regarded as the same location. (hint: a firewall or a few firewalls, depending on your design, are needed to regulate the network traffic)

• [2 mark] Please write down the firewall rules to fulfil the access requirement of the organization. Please follow the sample firewall rule (below) format to write down your firewall rules.

action ourhost port their host port comment
block * * * * default

Solutions

Expert Solution

Rationale for the Network Diagram

All computers are connected to the scanner and the printer. The printers are connected to

one of the computers in the network. The computer is also linked to the network through a switch.

The server will serve both as an email server and file server to the rest of the network. The server

computer has a firewall to configure data as it comes through the network.

Firewall implementation :

The firewall is one of the essential elements in the network security and today's group. The

firewall remains a critical bit in for all intents and purposes any useful framework security

outline, and today's associations have a couple of sorts to discover. It's key that specialists

recognize the kind of firewall that best suits the affiliation's framework security needs. When

picked, one of the fundamental part worries that outlines a security strategy is "The spot should

the firewall be put?" You will find three essential firewall topologies: the bastion has, screened

subnet and two times firewall models. Beginning security relies on in the wake of picking the

right firewall topology.


Related Solutions

Jivraj and Juma are accountants at Desktop Computers. Desktop Computers has not adopted the revaluation model for accounting for its property, plant, and equipment.
P11.8B: Jivraj and Juma are accountants at Desktop Computers. Desktop Computers has not adopted the revaluation model for accounting for its property, plant, and equipment. The accountants disagree over the following transactions that occurred during the fiscal year ended December 31, 2021: Identify elements, assumptions, constraints, and recognition and measurement criteria. Desktop purchased equipment for $60,000 at a going-out-of-business sale. The equipment was worth $75,000. Jivraj believes that the following entry should be made: Equipment 75,000     Cash   60,000   Gain on...
1. The Industries has 50 obsolete desktop computers that are carried in inventory at a total...
1. The Industries has 50 obsolete desktop computers that are carried in inventory at a total cost of $27,800. If these computers are upgraded at a total cost of $12,000, they can be sold for a total of $32,000. As an alternative, the computers can be sold in their present condition for $12,200. The sunk cost in this situation is: 2. In order to maintain consistency, a cost that is relevant in one decision should be regarded as relevant in...
An organization has decided to move from a windows server environment to a Linux Server Environment....
An organization has decided to move from a windows server environment to a Linux Server Environment. The organization requires to offer email, web, fileshare, printing services to its users which are predominantly using MAc OS and windows clients. These services would be provisioned from the newly created Linux server. a) Outline some of the issues the system administrator needs to consider when designing the solution? b) How would you resolve the issues ? c) What tools would you use in...
Tablet computers are rapidly becoming more mainstream and replacing traditional desktop and laptop computers with the...
Tablet computers are rapidly becoming more mainstream and replacing traditional desktop and laptop computers with the first IPAD becoming available in 2010 and an assortment of Linux and Windows-based tablets following. How do you believe that tablet computers have changed or contributed to the ways Forensic Scientists have to think or function on a daily basis? Do you believe that tablet computers have made a Forensic Scientist's job easier or harder? Can you think of any other technologies that have...
Rundle Manufacturing produces two keyboards, one for laptop computers and the other for desktop computers. The...
Rundle Manufacturing produces two keyboards, one for laptop computers and the other for desktop computers. The production process is automated, and the company has found activity-based costing useful in assigning overhead costs to its products. The company has identified five major activities involved in producing the keyboards. Activity Allocation Base Allocation Rate Materials receiving & handling Cost of material 2 % of material cost Production setup Number of setups $ 108.00 per setup Assembly Number of parts $ 6.00 per...
Rundle Manufacturing produces two keyboards, one for laptop computers and the other for desktop computers. The...
Rundle Manufacturing produces two keyboards, one for laptop computers and the other for desktop computers. The production process is automated, and the company has found activity-based costing useful in assigning overhead costs to its products. The company has identified five major activities involved in producing the keyboards. Activity Allocation Base Allocation Rate Materials receiving & handling Cost of material 2 % of material cost Production setup Number of setups $ 108.00 per setup Assembly Number of parts $ 6.00 per...
Franklin Manufacturing produces two keyboards, one for laptop computers and the other for desktop computers. The...
Franklin Manufacturing produces two keyboards, one for laptop computers and the other for desktop computers. The production process is automated, and the company has found activity-based costing useful in assigning overhead costs to its products. The company has identified five major activities involved in producing the keyboards. Activity Allocation Base Allocation Rate Materials receiving & handling Cost of material 1 % of material cost Production setup Number of setups $ 113.00 per setup Assembly Number of parts $ 5.00 per...
Discuss different service-based server operating systems, server computers, and server software that a network administrator must...
Discuss different service-based server operating systems, server computers, and server software that a network administrator must choose between. Applied Concepts (AC) - Week/Course Learning Outcomes Using your textbook, LIRN-based research, and the Internet, apply the learning outcomes for the week/course and lecture concepts to one of the following scenarios: As applied to your current professional career As applied to enhancing, improving, or advancing your current professional career As applied to a management, leadership, or any decision-making position As applied to...
A computer manufacturer produces three types of computers: laptop, desktop, and tablet The manufacturer has designed...
A computer manufacturer produces three types of computers: laptop, desktop, and tablet The manufacturer has designed their supply chain in such a way so that the final assembly of their computers entails putting together different quantities of the same parts. We will assume that the costs for parts unique to the model have already been accounted for in the reported per-unit profits, and that inventory levels for these other parts do not change the optimal allocation. We assume that there...
The host computers used in peer-to-peer systems are often simply desktop computers in users’offices or homes....
The host computers used in peer-to-peer systems are often simply desktop computers in users’offices or homes. What are the implications of this for the availability and security of any shared data objects that they hold and to what extent can weaknesses be overcome?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT