Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Slugworth Candies, LLC, has grown extensively over the last few months. In addition to the substantial increase in the size of each department, the Research

image text in transcribed

Slugworth Candies, LLC, has grown extensively over the last few months. In addition to the substantial increase in the size of each department, the Research and Development and Security sections have moved to a remote site in the mountains. Slugworth now consists of the Executive Staff (28)[1], Human Relations (16), Finance and Accounting (20), Marketing and Sales (25), IT Section 1 (8), and Bakery (210) at the main site; and located at the remote site, Research & Development (225-250), IT Section 2 (8), and Security (40).

Although the bakery has over 200 employees, it requires only 50 workstations plus secure access to the local database which contains top-secret recipes.

Your group has been chosen to design a new network for Slugworth Candies, LLC.

Ensure all the following details are included:

IP Addresses

Public IP addresses

The IP address 214.73.107.128/25 is assigned to the company from a new ISP.

Assign static addresses for security and ease of management

Assign ranges of available public IP addresses for NAT services

Private IP addresses

Assign private IP subnet addresses to each department

Use variable-length addressing as needed to provide the closest number of addresses required plus an additional 25% to accommodate future growth

List each department showing the (1) private IP network address, (2) range of host addresses on the sub-network, and (3) broadcast address.

Assign static addresses where required for security and ease of management

Include DMZs with secure data store for top-secret candy recipes

Diagram two wireless networks at each campus location: (1) one secure, private network that spans the campus, and (2) one open, public wireless network that spans the campus.

Device name (diagram)

Describe strategy and assign names to distribution and core devices (diagram)

Protocols

Include Layer 2 and Layer 3 protocols, as needed

Cabling (diagram)

Specify cabling for each link

Be cost efficient using best infrastructure for the situation

Security (diagram)Specify strategy for security

Firewalls

Wireless protocol

Services (DHCP, DNS, NAT, Database, Email, Web, File, Print)

Include content of DHCP and NAT services

Redundancy (diagram)

Routing Tables

Statically assign local internetwork addresses with summariztion

Routing table for each router

Identify access, distribution, and core layers (diagram)

[1] The number of employees in each department follows the department name.

Need ASAP!~!

1. List the user communities, size, location, and IP address with CIDR assigned to each LAN. (20 points) User Community Name (LAN) Size of CommunityLocation(s) of Number of Users) Community Network Address and CIDR 2. Describe the strategy used to name devices on this network. Include names of firewalls, routers, switches, servers, and access points on the diagram. Provide examples of access layer naming convention. (10 point) Click here to enter text. What layer 2 and layer 3 protocols are used? Explain the decision. (5 points) Click here to enter text. 3. 4. List the content of any static routing tables. Most routers contain several entries. (10 points) Router Name Network Address Subnet Mask Next Hop 1. List the user communities, size, location, and IP address with CIDR assigned to each LAN. (20 points) User Community Name (LAN) Size of CommunityLocation(s) of Number of Users) Community Network Address and CIDR 2. Describe the strategy used to name devices on this network. Include names of firewalls, routers, switches, servers, and access points on the diagram. Provide examples of access layer naming convention. (10 point) Click here to enter text. What layer 2 and layer 3 protocols are used? Explain the decision. (5 points) Click here to enter text. 3. 4. List the content of any static routing tables. Most routers contain several entries. (10 points) Router Name Network Address Subnet Mask Next Hop

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Databases DeMYSTiFieD

Authors: Andy Oppel

2nd Edition

0071747990, 978-0071747998

More Books

Students also viewed these Databases questions