I know this was asked before but this is an update to the other version. I was
Fantastic news! We've Found the answer you've been seeking!
Question:
I know this was asked before but this is an update to the other version. I was wondering if I could get some help with building a SOHO network. Document is 2017-2018.
Transcribed Image Text:
Final Project: SOHO Network Design 125 Points For this lab, you will design a network solution that is suitable for a small business. The business is located in an office park in one floor of a new office building. The office has all of the modern features of a contemporary workplace, including adequate, clean power, air conditioning and good lighting. The office was built with a secure computer room that already has a direct connection to a local Internet Service Provider's regional network; this connection will be used for access to the Internet. The office will include cubical space and office space for 18 workstations. Four of the workstations will be located in private offices for the company executives, and the remaining 14 workstations will be deployed into cubicles for the employees. The cubicles are located in a spacious, open cubicle area. The computer room is directly adjacent to the cubicle area, and it has power and cooling that is adequate for server needs. The computer room has been built with appropriate physical security, so there is controlled access to the servers. All workstations and servers in all offices, cubicles and other areas are all easily within 30 meters of each other, so no cable run will exceed 30 meters. For basic security reasons, the network design must separate any servers accessible from the Internet in an area that is logically separate from a private internal area where the internal servers and workstations will reside (see Figure 19.10 in your textbook: "Tasty Firewall Sandwich"). Regardless of where they may reside, the servers and workstations must be protected from attack. The design must describe how to logically separate the network into the area that is accessible from the Internet from the internal area, how to secure the network, and how to secure the servers and workstations in the network. Pay particular attention to the security of the servers that must be accessible from the Internet. The design must include at a minimum two logically different areas in our network; one area will be accessible from the Internet, and a second internal area for the workstations and internal servers which will not be directly accessible from the Internet. In the internal area, there are several requirements: 1) Provide wireless service to all employees. Make sure that the wireless access point is secure enough to prevent any unauthorized personnel from connecting to the internal network. 2) Management is particularly concerned that employees not abuse their access to websites while they are at work, so employee access to external websites should be controlled. All attempts to visit any external website which originate from within the internal area will be required to use to a proxy server. All workstations in the internal area shall be wireless DHCP clients, so there must be a DHCP server to manage IP address requests. Other servers in the internal area will include a database server and the proxy server mentioned in the previous paragraph. There will be two network printers in the internal area. The IP addresses of the wireless access point, the IP addresses of Final Project: SOHO Network Design 125 Points For this lab, you will design a network solution that is suitable for a small business. The business is located in an office park in one floor of a new office building. The office has all of the modern features of a contemporary workplace, including adequate, clean power, air conditioning and good lighting. The office was built with a secure computer room that already has a direct connection to a local Internet Service Provider's regional network; this connection will be used for access to the Internet. The office will include cubical space and office space for 18 workstations. Four of the workstations will be located in private offices for the company executives, and the remaining 14 workstations will be deployed into cubicles for the employees. The cubicles are located in a spacious, open cubicle area. The computer room is directly adjacent to the cubicle area, and it has power and cooling that is adequate for server needs. The computer room has been built with appropriate physical security, so there is controlled access to the servers. All workstations and servers in all offices, cubicles and other areas are all easily within 30 meters of each other, so no cable run will exceed 30 meters. For basic security reasons, the network design must separate any servers accessible from the Internet in an area that is logically separate from a private internal area where the internal servers and workstations will reside (see Figure 19.10 in your textbook: "Tasty Firewall Sandwich"). Regardless of where they may reside, the servers and workstations must be protected from attack. The design must describe how to logically separate the network into the area that is accessible from the Internet from the internal area, how to secure the network, and how to secure the servers and workstations in the network. Pay particular attention to the security of the servers that must be accessible from the Internet. The design must include at a minimum two logically different areas in our network; one area will be accessible from the Internet, and a second internal area for the workstations and internal servers which will not be directly accessible from the Internet. In the internal area, there are several requirements: 1) Provide wireless service to all employees. Make sure that the wireless access point is secure enough to prevent any unauthorized personnel from connecting to the internal network. 2) Management is particularly concerned that employees not abuse their access to websites while they are at work, so employee access to external websites should be controlled. All attempts to visit any external website which originate from within the internal area will be required to use to a proxy server. All workstations in the internal area shall be wireless DHCP clients, so there must be a DHCP server to manage IP address requests. Other servers in the internal area will include a database server and the proxy server mentioned in the previous paragraph. There will be two network printers in the internal area. The IP addresses of the wireless access point, the IP addresses of
Expert Answer:
Related Book For
Posted Date:
Students also viewed these computer network questions
-
Managing Scope Changes Case Study Scope changes on a project can occur regardless of how well the project is planned or executed. Scope changes can be the result of something that was omitted during...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
A gaseous mixture consists of 80.0 mole percent N2 and 20.0 mole percent O2 (the approximate composition of air). Suppose water is saturated with the gas mixture at 25C and 1.00 atm total pressure,...
-
With reference to a particular example, explain how an organisation might seek to communicate its corporate brand identity.
-
Use the computer output for the Business Week magazine data of Problem 13 in Chapter 8, as well as the additional output here, to answer the following questions. a. Perform the overall F test for the...
-
Consumer Reports safety ratings of cars: 0 = unsafe up to 3 = safest Meaningful ratios? Identify the level of measurement (nominal, ordinal, interval, or ratio).
-
The three princes of Serendip Went on a little trip. They could not carry too much weight; More than 300 pounds made them hesitate. They planned to the ounce. When they returned to Ceylon They...
-
Create a new branch from your existing main branch. Give the branch a name that will be recognizable to you later as button factory works. 2. On your newly created branch, create a new class called...
-
Fresno Industries Inc. manufactures and sells high-quality camping tents. The company began operations on January 1 and operated at 100% of capacity (150,000 units) during the first month, creating...
-
Write an executive summary to form a Strategic Information Technology Plan related to Audit. This final paper should incorporate any comments or suggestions made by the instructor on the audit...
-
The Constitution provided for a stronger national government for the United States, but raised new concerns about centralized and concentrated power. Drawing on the Constitution, Antifederalist...
-
identify the constraints and suggest some recommendations for improving the sustainable long-term economic growth and development in the African countries mineral beneficiation process.
-
Find the objectives of Go2Joy hourly hotel booking app would like to evaluate their current brand performance and maximize it with better marketing programs? What types of research design (...
-
Competition Authority initiated an investigation about competitors A, B, C and D because of no-poach agreements between their HR teams. They agreed a gentlemens agreement about not transfering their...
-
For each of the three curves (AD, SRAS, and LRAS) explain what they each represent and list the things that will shift each of them. AD: What does this curve represent? list of things that will shift...
-
14. Annual payments of P2,500 for 24 years that will start 12 years from now. What is the period of deferral in the deferred annuity? e.) 12 periods f.) 10 periods g.) 11 periods h.) 13 periods 15....
-
Hardin Services Co. experienced the following events in 2016: 1. Provided services on account. 2. Collected cash for accounts receivable. 3. Attempted to collect an account and, when unsuccessful,...
-
Which issues do you see as most likely to create boundary-spanning problems for employees in a customer-contact center at a major cable service provider? Select four issues and indicate how you would...
-
How do the concepts of theater, role theory, and script theory help to provide insights into consumer behavior during the service encounter?
-
I just hope the quality differences are visible to our patients, mused Dr. Barbro Beckett as she surveyed the new office that housed her well-established dental practice. She had recently moved to...
-
What accounts for the disparity in NPMO between the statistical 6 and the popular Six Sigma approach?
-
What is the most common use of stratification?
-
What purpose is served by flowcharts?
Study smarter with the SolutionInn App