Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Module 8: Case Study III: Testing the security of the Dental Office PreviousNext Instructions Submit your Case Study III assignment here. Introduction: In this case

Module 8: Case Study III: Testing the security of the Dental OfficePreviousNext Instructions

Submit your Case Study III assignment here.

Introduction:

In this case study, we will be discussing the networking requirements of a company with 8 locations that need to be connected through a secure and reliable data network. The company has been assigned a 209.0.113.0/24 public IP address, which needs to be subnetted to meet the needs of each location. Additionally, we will be discussing best practices for cybersecurity to ensure the network is protected from potential threats and attacks.

Networking Requirements:

The company has 8 locations that need to be connected through a data network. The locations are spread across different geographic locations, and each location has its unique requirements. The network needs to be designed in a way that ensures high availability, scalability, and reliability. To achieve this, we will be using a combination of different networking technologies, including WAN, LAN, VPN, and cloud services.

Subnetting:

To subnet the 209.0.113.0 public IP address, we will be using the Variable Length Subnet Mask (VLSM) technique. VLSM allows us to divide a network into smaller subnets with varying subnet masks. We will be using a Class C network, which has 24 bits in the network portion of the IP address and 8 bits in the host portion. We will allocate different subnets to each location based on their requirements.

Location 1 requires 20 IP addresses for their computers, printers, and other devices. They are anticipating growth and additional devices in the future.

Location 2 requires 40 IP addresses.

Location 3 requires 80 IP addresses.

Location 4 requires 60 IP addresses.

Location 5 requires 30 IP addresses.

Location 6 requires 50 IP addresses.

Location 7 requires 70 IP addresses.

Location 8 requires 120 IP addresses.

Networking Technologies:

To connect the 8 locations, we will be using a combination of different networking technologies. We will use WAN to connect the different locations, and LAN to connect devices within each location. We will also use VPN to provide secure remote access to the network. Additionally, we will be using cloud services to provide centralized management and backup of network resources.

The following needs to be taken into consideration and a solution needs to be provided accordingly.

  • The WAN reliability and predictable performance
  • Lan Segmentation (Physical and Logical)
  • Wireless
  • Secure Remote access
  • Cloud Service Management (Monitor, Backup Service, and Cybersecurity)
  • Best Practices for Cybersecurity for the network.
  • Physical and Logical Network Diagram
  • Bill of Material (BOM)

In addition to the wired network infrastructure, wireless connectivity is an essential component of the network design. Wireless networks provide flexibility and convenience for users, but they also introduce security and performance challenges.

Quality of Service Considerations:

The business relies on high-quality video conferencing and VoIP communications to provide services to their customers. You will need to design a network that prioritizes these applications to ensure that they have sufficient bandwidth and minimal latency.

Physical and Logical Network Diagrams:

You will need to provide physical and logical network diagrams for the network. The physical diagram should show the physical layout of the network, including the location of routers, switches, and access points. The logical diagram should show the logical layout of the network, including IP addresses, VLANs, and routing protocols.

What considerations must be taken into account for wireless networks and what are the best practices that must be adhered to when designing and wireless network? Be sure to include cybersecurity considerations as well as infrastructure.

A case study on network infrastructure should typically include the following sections:

Introduction: This section should provide an overview of the network infrastructure and the organization that owns it. It should describe the purpose of the case study and the scope of the analysis.

Background: This section should provide the context for the network infrastructure, including its history, development, and current state. It should also describe the business or organizational goals that the infrastructure supports.

Technical Details: This section should describe the technical specifications of the network infrastructure, including the hardware and software components, network topology, and protocols used.

Network Design: This section should describe the design principles and decisions that went into building the network infrastructure, including the rationale behind the network architecture, routing, and security.

Deployment and Implementation: This section should describe the process of deploying and implementing the network infrastructure, including any challenges or obstacles encountered and how they were overcome.

Performance Analysis: This section should evaluate the performance of the network infrastructure, including its reliability, availability, and scalability. It should also describe any tools or methods used to monitor and manage the network.

Conclusion: This section should summarize the key findings of the case study and highlight any important insights or lessons learned.

References: This section should list any sources cited in the case study, including academic papers, technical documentation, and industry reports.

HI THERE, COULD YOU HELP ME WITH MY CASE STUDY. THANK YOU.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Exploring Economics

Authors: Robert L Sexton

5th Edition

978-1439040249, 1439040249

Students also viewed these General Management questions