Chat with us, powered by LiveChat Details on each topic area are provided below to p - Writemia

Details on each topic area are provided below to p

Details on each topic area are provided below to provide further understanding of expectations for the Network Research Project (NRP). You will select one topic area to conduct the NRP. At a minimum, you should address the details provided for each topic area. However, you are not limited by these additional details. You are encouraged to research and discuss additional aspects under any of these approved topic areas.You should consider the additional details below to guide you through completion of the NRP.Quality is valued over quantity, but quantity is necessary for a quality paper. It is estimated that 4 – 6 pages (not including the title page) would be necessary to address each Network Research Project (NRP) topic.Each Network Research Project (NRP) must have an Introduction. The introduction should address the purpose of your project, and an overview of what you will convey to the reader. Each NRP must have a Conclusion. The conclusion should summarize your findings in a succinct manner. The remaining format will be at your discretion. It is suggested that you review the NRP details under each approved topic and outline their paper accordingly. You should maintain a consistent format throughout the entirety of the document.All sources must be cited using the IEEE format. This is an excellent guide that covers all aspects of citing in IEEE style. Why do we use IEEE format? IEEE format is used in technical fields when writing research papers. Do not plagiarize any material or content. Compare and contrast the characteristics of network topologies, types and technologies. Wired Topologies (logical vs physical, star, ring, mesh, and bus)Wireless Topologies (mesh, ad hoc, other infrastructure)Types (LAN, WLAN, MAN, WAN, CAN, SAN, and PAN)Technologies that facilitate the Internet of Things (Z-Wave, Ant+ Bluetooth, NFC, IR, RFID, and 802.11)Summarize cloud concepts and their purposes.Types of services (SaaS, PaaS, IaaS)Cloud delivery models (Private, Public, and Hybrid)Connectivity methodsSecurity implications / considerationsRelationships between local and cloud resourcesExplain devices, applications, protocols and services at their appropriate OSI layers.Layer 1 (Physical)Layer 2 (Data Link)Layer 3 (Network)Layer 4 (Transport)Layer 5 (Session)Layer 6 (Presentation)Layer 7 (Application)Explain the functions of network services.DNS service (record types, internal vs external DNS, third-party/cloud hosted DNS, hierarchy, forward vs reverse zone)DHCP service (MAC reservations, pools, IP exclusions, scope options, lease time, TTL, DHCP relay)NTPIPAMVoIPSimple Network Management ProtocolFile sharingWWWPrintingExplain the purposes of virtualization and network storage technologies.Virtual Networking Component (Virtual switch, firewall, NIC, router, hypervisor)Network storage types (NAS, SAN)Connection Type (FCoE, Fibre Channel, iSCSI, InfiniBand)Jumbo FrameCompare and contrast business continuity and disaster recovery concepts.Availability Concepts (Fault tolerance, high availability, load balancing, NIC teaming, port aggregation, clustering)Power Management (Battery backups/UPS, power generators, dual power supplies, redundant circuits)Recovery (Cold sites, warm sites, hot sites)Backups (Full, differential, incremental, snapshots)MTTRMTBFSLA requirementsExplain common scanning, monitoring and patching processes and summarize their expected outputs.Process (log reviewing, port scanning, vulnerability scanning, patch management, reviewing baselines, packet/traffic analysis)Event management (notifications, alerts, SIEM)SNMP monitors (MIB)Metrics (Error rate, utilization, packet drops, bandwidth/throughput)Explain authentication and access controls.Authorization, authentication, and accounting (RADIUS, TACACS+, Kerberos, Single sign-on, Local authentication, LDAP, Certificates, Auditing and logging)Multi-factor authentication (something you know, have, are, do, or somewhere you are)Access Control (802.1x, NAC, port security, MAC filtering, captive portal, access control lists)Summarize common networking attacks.DoS (Reflective, amplified, distributed)Social engineeringInsider threatLogic bombRogue access pointEvil twinWar-drivingPhishingRansomwareDNS poisoningBrute forceExploits vs. VulnerabilitiesCompare and Contrast network policies and best practices.Privileged user agreementPassword policyOn-boarding/off-boarding proceduresLicensing restrictionsInternational export controlsData loss preventionRemote access policiesIncident response policiesBYODAUPNDASystem life cycle (asset disposal)Safety procedures and policies

Do you need an answer to this or any other questions?

About Writemia

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Place Order” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order