Got this email the other day after a very odd phone call with an individual (The Son) named Fahad.
They were willing to compensate me very well for my time........
but of course the funds would be paid to me by his father through a certified official check which was to be in a sum larger then was intended for the payment. Something about after I receive the Check to please send an official payment back for the difference.........
"work hard my son, I am waiting for you.........
Hey Fahad, as we discussed on the phone, we are working in opening a brokerage firm and we want you to tell us in an academic way how to design and setup the LAN. We don?t have Wireless Consulting Firms in here, and I believe that there is a lot in US. So, if you can find a time to do or just let anybody expert in this stuff to do.
The firm will have a staff of 25 brokers, 2 secretaries and an administrative assistant. Each broker will have his/her own latest model laptop including a desktop computer. The area in which the brokers work contains 8 X 8 cubicles with 10 X10 offices for the company president, one secretary and a file room. Each employee has access to a printer, a copier, and a FAX machine. The company is providing a dedicated T-1 line to the local Security and Exchange Commission for downloading market reports to a Data Base Server which is accessible by each broker, secretary to the president and admin. assistant.
Because the new building is of brick construction, cat 5 wiring to each cubicle and presidents office is not possible. A wireless network must be established.
The phone system is VOIP.
Market data, customer info., graphics may be exchanged among brokers.
The printer is wireless accessible. Users must walk to the copier or FAX machine.
All data is considered highly confidential and transmission security must be provided.
It will be great if you can do the following tasks in details:
1. Develop a LAN scenario with a diagram.
2. Describe the LAN setup
3. Discuss the company policy as to how this LAN will be used and by whom.
? How will the data base be accessed?
? Will customers be given permission to access the data base? How?
? Will a broker be able to access the data base while away from the office? If so, how?
4. Discuss the type of security you will implement
? Which security protocol would be appropriate?
? How is authentication achieved?
The output of your work should be on MS-Word and MS-Visio files. I need it ASAP...Work hard my Son. I am waiting for you.
Kind Regards,
Your Father