Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Please help me with this. You don't need to include shapes for the cubicles or executive offices, a simple dashed line defining the boundaries of
Please help me with this.
- You don't need to include shapes for the cubicles or executive offices, a simple dashed line defining the boundaries of those general areas would suffice. It is more important to show the components and label them properly (e.g. with descriptions,hostnames, and IP addresses, where applicable). For groups of components (e.g. the cubicle workstations) you can provide the naming pattern as a range, e.g. "ws1 -ws14" and IP address range in a similar format.In other words, you don't need to explicitly draw shapes for each component in a group.
- Remember that you need to identify IP addresses for all components (including printers). Refer to the previous bullet regarding labels for groups of similar equipment.You also need to distinguish the connection type, e.g. use dashed arrows vs. solid forWiFiconnections.
- Use separate shapes (not necessarily different, just separate) for the servers unless they are truly integrated systems (component labels must indicate this).
- Pay particular attention to the description of the network in the instructions, getting this correct is asimportant asthe visual representation of the components. In particular, you have an Internet-accessible area which means you need a DMZ configuration where the applicable servers will reside, with the internal network on one side and Internet connection on the other. The DMZ is bounded by a firewall on either side.
- In the final document, you need an inventory table that describes in more detail each of the components, there should be a one-to-one correlation with everything on the diagram (multiple quantities of the same component can be grouped together).
Final Project: SOHO Network Design 125 Points For this lab, you will design a network solution that is suitable for a small business. The business is located in an office park in one floor of a new office building. The office has all of the modern features of a contemporary workplace, including adequate, clean power, air conditioning and good lighting. The office was built with a secure computer room that already has a direct connection to a local Internet Service Provider's regional network; this connection will be used for access to the Internet. The office will include cubical space and office space for 18 workstations. Four of the workstations will be located in private offices for the company executives, and the remaining 14 workstations will be deployed into cubicles for the employees. The cubicles are located in a spacious, open cubicle area. The computer room is directly adjacent to the cubicle area, and it has power and cooling that is adequate for server needs. The computer room has been built with appropriate physical security, so there is controlled access to the servers. All workstations and servers in all offices, cubicles and other areas are all easily within 30 meters of each other, so no cable run will exceed 30 meters. For basic security reasons, the network design must separate any servers accessible from the Internet in an area that is logically separate from a private internal area where the internal servers and workstations will reside (see Figure 19.10 in your textbook: "Tasty Firewall Sandwich"). Regardless of where they may reside, the servers and workstations must be protected from attack. The design must describe how to logically separate the network into the area that is accessible from the Internet from the internal area, how to secure the network, and how to secure the servers and workstations in the network. Pay particular attention to the security of the servers that must be accessible from the Internet. The design must include at a minimum two logically different areas in our network; one area will be accessible from the Internet, and a second internal area for the workstations and internal servers which will not be directly accessible from the Internet. In the internal area, there are several requirements: 1) Provide wireless service to all employees. Make sure that the wireless access point is secure enough to prevent any unauthorized personnel from connecting to the internal network. 2) Management is particularly concerned that employees not abuse their access to websites while they are at work, so employee access to external websites should be controlled. All attempts to visit any external website which originate from within the internal area will be required to use to a proxy server. All workstations in the internal area shall be wireless DHCP clients, so there must be a DHCP server to manage IP address requests. Other servers in the internal area will include a database server and the proxy server mentioned in the previous paragraph. There will be two network printers in the internal area. The IP addresses of the wireless access point, the IP addresses of
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started