The company uses 176.41.0.0/16 at the company headquarters in Los Angeles with 50000 users and needs to
Question:
The company uses 176.41.0.0/16 at the company headquarters in Los Angeles with 50000 users and needs to use a subnetting structure to incorporate the new cities. Adhering to the subnetting scheme and using VLSM, assign a subnet address to the networks and their links. Each branch's offices have 8 levels of building and access to the Internet is crucial for each office, as well as inter-branch-office networking. Each branch has 6 servers which are located on the Fifth floor of each branch. The large company headquarter is in Los Angeles and the new subnets must have connectivity from Los Angeles and other cities in Australia. You need to think about cost-effectiveness and also Holywood company is aiming to create an INTRANET for its branches in Australia and USA. You need to think about creating a VPN for this company. Recently two branches in Australia were impacted by phishing attacks and also ransomware attacks. Some new movies that are supposed to be released this Christmas were postponed because of a ransomware attack. Find some solutions to mitigate these types of attacks in future.
You are required to design the topology for the four new sub-networks and their connection to the Los Angeles office. You must document each step you have taken, including your research sources. You need to come up with a design report and send it to your technical manager. Report: The report must contain the following sections: 1. Introduction: Critical analysis of networking requirements 2. Local Area Network (LAN): Design and description of Local Area Network for all subnets which must include: 1. Network topology: Discuss the reasons for choosing the particular network topology. 2. LAN design connections to the servers, connection to other subnets and also the internet/intranet, you need to add your design in your report.
3. Hardware: Provide a complete description of all interconnecting devices (switches, routers, hubs and access points) and wiring used to build the network. Justify your choice. 4. Resolving the security issues related to the case study in detail. 5. Conclusion: Comprehensive summary of the work done and recommendations.
Smith and Roberson Business Law
ISBN: 978-0538473637
15th Edition
Authors: Richard A. Mann, Barry S. Roberts