Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Read the scenario below and then answer the questions that follow: You as a junior network engineer you have been tasked to design a secure

Read the scenario below and then answer the questions that follow:
You as a junior network engineer you have been tasked to design a secure network for a small business. Additionally, you were tasked to design and build a cost-effective network for the business.
The current setup is such that every PC and laptop user uses a 3G dongle to connect to the Internet.
When users need to print, they either copy the work that needs to be printed to USB flash drives or email their work to any one of the five users whose PCS are attached to a printer-all printers connect via USB cables. The new network, according to the CEO, should cater to at least thirty devices, fifteen desktops (PCS), seven laptops including the CEO's laptop, two servers and four BYOD deviges. Additionally, the CEO wants to allow visitors such as customers and suppliers to connect mobile devices to get Internet connectivity. All users with PCs and laptops should still be able to print. The premises where CEO runs his business has six offices (rooms). All the rooms are located on the same floor. CEO has an office and does not share office space.
There are two open- plan offices, the first open-plan office houses seven desktops and the remainder of the PCs are housed in the second open-plan office. Two laptop users share an office while the other three laptop users share a separate office. A small storeroom has been selected for use as a server room.
The CEO decides to expand the Business to other cilies across South Africa on which the branches are in the following cities:
Bloemfontein
Johannesburg
Durban
Pietermaritzhurg
Polokwane
Pretoria
The Head of Office is in Cape town, the CEO assigned you to researsh on the WAN technologies to use for the Business network, the appropriate IP addreas to use for the network and to come up with a WAN design for the network.
In assisument 2, you are required to research on the WAN Technologies, the research should answer the following questions:
What are the technologies used in a WAN network?
What is the best WAN technology to use for the Small Business? And why?
What are some common issues you might face while setting up the selected WAN technology?
Why will the selected WAN technology suitable for Small Business?
Provide a conclusion for your research?
\table[[Marking Rulbic:,Mark],[Allocation,],[What are the technologies used in a WAN network?,(2)],[What is the best WAN technology to use? And why?,(2)],[\table[[What are some common issues you might face while selting yo the selected],[WAN technology?]],]]
Why will the selected WAN technology suitable for the Small Business?Providea conclusion for your research?Total(2)(1)(10)
In assigument 2 given the details in the scenario as well as making your oum assumptions, using cisco packet tracer or Visio provide a fully labelled WAN diagram for the Small Business new network showing the connections of the branches in all cities.
Your diagram must show the inclusion of the wireless network infrastructure. Accompany your diagram with a detailed explanation of how the WAN network will work and how it will support and solve the Small Business identified problems.
\table[[Marking Rubric:,Mark],[5 marks-outstandlig.,],[3-4 marks-adequate-,],[2 marks - partially adequate.,],[1-inadequate.,],[An adequate fully labelled diagram is provided.,],[The diagram adequately shows the wireless network infrastructure.,5],[\table[[The diagram is accompanied by an adequate explanation of how],[the wAN network will work]],5],[\table[[The diagram is accompanied by an adequate explanation of how it],[will support and solve the Business identified problems.]],]]
Provide the appropriate IP addresses subnet masks and default gateway that you would use for the WAN network, motivate what you provided is appropriate for the network.
\table[[Marking Fimbric:,Mark Allocalion],[Adequate IP addresses are provided(range),2],[Subnet mask is provided,2],[Default gateway is provided,2],[Motivation is provided,4],[Total Marks,10]]
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Big Data Fundamentals Concepts, Drivers & Techniques

Authors: Thomas Erl, Wajid Khattak, Paul Buhler

1st Edition

0134291204, 9780134291208

More Books

Students also viewed these Databases questions

Question

In what ways can confl ict enrich relationships?

Answered: 1 week ago

Question

How do listening and hearing diff er?

Answered: 1 week ago

Question

How does eff ective listening diff er across listening goals?

Answered: 1 week ago