Computer Network is assumed to be the backbone of any company, hence securing and maintaining security in this day of age needs some consideration which should be based on technical and analytical dimension, your company based in London is opening a new branch in Berlin, a third party company in Berlin proposed new network infrastructure for the Local area network in the branch, with an internet connection to provide a Wide Area Network connectivity to London HQ.
The network infrastructure schematic diagram shown in figure 1, illustrates the solution provided by the third party company with the following consideration:
The company director expressed concern and asked you to evaluate the proposed third party network and design a better security solutions adding a consideration for IoT devices and to monitor network and secure network components. The company consists of HR, Finance, Admin and users group, the servers needed are email and web servers adding to the local File Servers located to each department, Table 1, shows the users distribution.
Your director asked you to evaluate the given proposed network showing any flaws and reasoning, as well as the impact of the flaws, in addition you are to design a new secured network including:
Task 1
Task 2
Task 3: Lab Work
NB: For Task 5 of the coursework please attach the running configurations of your networking devices in one document and submit it including the topology diagram as well.
Part 2: This part is worth 20% of the total marks
Task Demonstration of work
NB: Do not use more than 15 slides.
Note: The coursework should be submitted as one document in a report format in final submission. For the simulation part of the coursework, copy the running configurations of the networking device in one document and submit it together with the topology diagram of your solution.
Construct reusable and deployable Software systems, with appropriately verified functional coherence. None
Architect Refactor software systems in correspondence with relevant theories, practice, and discourse in the computing sector.
Solve Synthesise knowledge of computing to address complex technical challenges. Application
Assess the legal, social, ethical, and professional issues in research and development contexts in correspondence with the relevant law, codes of conduct, and theory.
Defend an argument that addresses a research question(s), using appropriate primary and secondary sources and academic conventions. Evaluate
Plan your post-graduation pathway, with reference to how you will overcome obstacles, and how you will build a personal brand that highlights your professional attributes Produce work as part of a multidisciplinary team critically appraising practices, approaches, and tools; applying them to enhance development pipelines.
Evaluate existing artefacts to identify opportunities, emphasise unique features that would fill a gap, and suggest optimal routes to audiences.
Produce prototypes based on your own intellectual property that deliver distinguished experiences, justifying how and why it could engage, immerse an audience, and/or lead to innovation.