Question

In: Computer Science

Overview Your assignment is to complete a wireless network design for a small company. You will...

Overview

Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please review a description of ABC Corporation’s network resources and how they are allocated.

You may find the following Floor Plan helpful in completing this lab.

ABC Corporation’s Network Description

ABC Corporation is a small business in the heart of Central Pennsylvania. They provide services to their clients all over the region. The three-story main office building is where all of the employees report to work each day. There are no remote users. ABC Corporation is a very traditional business. While they have a computer network and are connected to the Internet, they aren’t very fancy and don’t yet have a need for telecommuting, wireless networks, or smart phones. All of their computers are desktop machines and are connected with wired Ethernet connections. All of the network wiring is CAT-6 twisted pair wiring that goes from the office location to a wiring closet. There is one wiring closet on each floor. Each closet is connected to the basement wiring closet via fiber.

There are several departments of the company. The administrative office has ten employees including the CEO, executive Vice-President, a human resources manager, and several assistants and secretaries. The finance office has fifteen employees. Both of these divisions are on the third floor.

The second floor has the Sales and R&D departments. There are a total of twenty employees in the Sales Department and includes sales executives and assistants. All of the sales department personnel have laptop computers, but they are still connected via the wired network. The R&D department has ten engineers who have two computers each – one in their office and one in their lab spaces.

The first floor has the shipping/receiving department, manufacturing department and the receptionist. The receptionist shares a computer with the night watchman, since they work opposite shifts. There are 20 people in manufacturing, but they only use three computers to enter their production details into the company’s ERP system. The shipping/receiving department has six people, each with a computer that connects to UPS, Fedex and USPS systems, prints packaging labels and shipping documents. There is also a conference room/training room on the first floor with a multimedia system that includes a podium computer, projector, and all of the bells and whistles.

The basement houses the maintenance department, information technology, and the mail room. The mail room clerk doesn’t use the computers at all. The two maintenance workers have computers at their desks that they use to enter reports of work performed. The IT Department has seven employees, each with a desktop computer. They also manage the server farm, which includes two domain controllers, one print server, one mail server, one database server, one internal web server, one external web server (on the DMZ interface of the firewall), a file server, a special server for the ERP system, and a backup server.

Add Wireless Network Access Points

Each floor, with the exception of the basement (the basement does not need wireless), needs to have two wireless access points, one for the north end of the building, and the other for the south. However, the wireless access points will overlap in the middle of the building, so you need to pick different wireless network channels for each end. On the first floor, there should be an additional wireless access point in the conference room for guests.

The “guest” network should have a different SSID than the company’s wireless network. It should be configured to allow anyone to connect with a password. The password will be provided by the receptionist to any visitors and will be changed each week. The company wireless network should be configured to have the same SSID on all of the wireless network access points (but different from the “guest” network). It should be configured with WPA-2 Enterprise with AES and should be connected to the company’s servers for authentication (Windows Server with RADIUS server enabled for the Active Directory).

Note: You might want to review this informative webpage to see how to configure Windows Server to handle the authentication for the access points.

Place your network access points on your network diagram you did for Homework #2. Segment the wireless network separately from the wired network so that it is on its own subnet. Segment the visitor wireless network so it’s on its own subnet, separate from both the wired network and the company wireless network.

Label each access point with its own IP address and basic configuration. Each device should have its own name, IP address and should list its configuration in terms of encryption protocol (TKIP, AES, 3-DES or None) and authentication protocol (WPA, WPA-Enterprise, WPA2-Enterprise, WPA-2, WEP, etc, none, etc). Identify the SSIDs that are used for each device.

Place the wireless access points in the building. You may use the floor plan provided in the attached PDF.  

Create a Network Diagram

Your network diagram needs to include the following elements:

  • Each Wireless Access Point (WAP)
  • Each WAP’s critical configuration details – name, IP address, SSID, connection protocols, encryption protocols and wireless channel
  • The Windows authentication server – including name, IP address, and important configuration details
  • Additional switches and connections between the building’s floors to establish the network(s)
  • IP Address ranges that will be assigned to network devices when they join the wireless networks

Network Documentation

Your network design document needs to explain each of the elements in your wireless network design. Explain how you segmented your wireless network from other parts of the network. Describe what security settings you might want to implement in your router. Describe the reason for the number of access points that you need on each floor.

What to Turn In

For assignments that require you to submit Visio work, please export your file and submit as a PDF. Also, please submit your original Visio file.
You also need to turn in a Word document (.doc or .docx) file that explains your network diagram elements. Include snapshots from your network diagram in your Word doc file – and annotate your diagram snapshots to better help your explanation of your network.

I want the answer in Microsoft VISIO screenshot

Solutions

Expert Solution

We have to make a complete wireless Network Design for a small company, Software used for Network Diagram Is Microsott \fisio. Company Name is ABC Corporation. As shown in Figure.

ABC Corporation is a small organization present in Central Pennsylvania. There are no remote users.

All the network wiring is CAT-6 Twisted-pair wiring.

There are Total departments eight departments are shown in the figure. And 3 noors including basement.

Departments:

1) Basement -Maintenanoe department. IT department. Mail Room 2) First tloor-Shipping/Receiving Depanment, Manufacturing Department. Receptionist 3) Second floorSales department and R&D department

4) Third floorFinance depanment and Admin department.

There is a conference room/Guest room in the first floor having Acoess-point(Router) Which have SSID different from rest of the SSID. That is, In our diagram it is ssuzt-1.

The company wireless network has the same SSID for all the Acoess-points.

In the figure, we have segmented the wireless network separately from the wired network So that it is on its own subnet.

The topology used will be Bus-topology. The Encryption protocol used is AES. That is, Advanced Encryption Standard. The authentication protocol is WPA That is. Wi-Fi protected access.

Access points details:

Access point 1:

Ssid 001

IP-address-192.168.1.1I24

Encryption protocol used-AES Authentication protocol used WPA Access point 2:

Ssid-1

lP-address-192.168.1.2124 Encryption protocol used AES Authentication protocol used WPA Access point 3:

Ssid-001

IP address-192.168.1 .3124 Encryption protocol used AES Authentication protocol used WPA Access-point 4:

Ssid 001

lP-address-1 92168.1 .4I24 Encryption protocol used-AES Authentication protocol used-WPA Access point 5:

Ssid 001

IP address 192.168.1.5/24 Encryption protocol used-AES Authentication protocol used-WPA Access point 6:

Ssid 001

lP-address 192.168.1 .6/24 Encryption protocol used-AES Authentication protocol used-WPA Access-point 7:

Ssid-001

IP address-192.168.1.1/24 Encryption protocol used AES Authentication protocol used-WPA So. there are in total 7 access-points. Two Access points in each Goor and one at

conference mom for guest or visitors. Moreover, the access point at conference room has diflerem subnet mask men the rest of the access points.

Windows Authentication server details:

Pon number-O IP-Address-193.45.12.4

Encryption protocol used-AES Encryption A networking protocol used for communication is TCP/IP protocol

The Network design containing few switches which are used to connect devices 1oge1her on me computer network.

You can see that the access points with IP addresses 192.168.1.3 And 192.168.1.4 overlaps in the middle. So we use two different channels for them. One access point using channel-G and another one using channeI-11.

For Security purpose in wireless networking of the organization, we are using WPA That is. Wireless protected access. It is a Security standard used by usets for authentication purpose.

Now. the question comeshow you segmented your wireless network from other parts 0! the network.

In the figure, at the top. we have the router which shown the two segments. One for the wired network and another for the wireless network.

Moreover, the routers are connected to the main server for all authentication details which have a port number 0.


Related Solutions

Overview Your assignment is to complete a network diagram for a small company. You will place...
Overview Your assignment is to complete a network diagram for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators, and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please review...
Your assignment is to complete a network diagram for a small company. You will place a...
Your assignment is to complete a network diagram for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators, and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please review a...
In this assessment you are required to design a wireless campus network for Faber University. This...
In this assessment you are required to design a wireless campus network for Faber University. This assessment is group assessment and you may work in groups of upto 4 students. To design the wireless campus network for the university you are required to conduct a requirement analysis, propose a design of the network considering the university requirements, carry out a security analysis and propose a WLAN monitoring tool for monitoring the network in the future. The network needs to be...
You have been asked to design a network (wired, wireless, or a combination) for a home...
You have been asked to design a network (wired, wireless, or a combination) for a home on which construction will start soon. The home is serviced by a cable TV provider and local phone company, and both provide Internet connectivity. It has two levels totaling 250 meters2 (2700 feet2). Five people will live in the home and use three laptop/tablet computers, a desktop computer, a multimedia server, an Internet-connected TV device (for example, TiVo or digital cable DVR), two multifunction...
Design your home network.  Experiment. Go beyond your home network. Design the network you want. Pick a...
Design your home network.  Experiment. Go beyond your home network. Design the network you want. Pick a networking problem from the internet and design the networking solution. Use lucidchart or vision.
Overview For this assignment, design and implement the methods for a class that can be used...
Overview For this assignment, design and implement the methods for a class that can be used to represent a quadratic equation. int main() has already been written for this assignment. It is available for download from Blackboard or by using the following link: http://faculty.cs.niu.edu/~byrnes/csci240/pgms/240pgm8.cpp All that needs to be done for this assignment is to add the class definition and method implementation to the above CPP file. The Quadratic class Data Members The class contains three data members: an integer...
Assume you have a wireless network of 90m coverage and this network is connectionless oriented. There...
Assume you have a wireless network of 90m coverage and this network is connectionless oriented. There are two networks topology (WIFI or WIMAX). Critically analyse the given networks and answer the following: 1- Compare between WIFI and WIMAX 2- Which are of them is better to be used in this case
Do you have a wireless network at home? What kind of wireless equipment do you have?...
Do you have a wireless network at home? What kind of wireless equipment do you have? Is your wireless network encrypted? If so, what level of encryption and other security options are you utilizing? If not, how can you take care of protecting your network?
can someone please complete this for me? losing my mind Assignment Overview The Case Assignment in...
can someone please complete this for me? losing my mind Assignment Overview The Case Assignment in Module 2 will accomplish three tasks: Demonstrate how to use pseudo code to help programming. Use Scanner class to get user input from a keyboard (allow user interaction). Demonstrate how to use class and objects (OOP concepts). Case Assignment Write a java program to help you calculate property tax. The program will perform the following tasks: Prompt the user to enter the property value...
Network Design proposal for a University Problem: Suppose you are asked to design of a network...
Network Design proposal for a University Problem: Suppose you are asked to design of a network infrastructure for a university. The university has 7 departments namely, IT, Finance, HR, Management, Faculty, students and R&D. The university also has an ADSL internet connection which is shared for the different departments. It is required that all the departments should have intercommunication. The R&D department should not have access to the internet. Each of the department contain 50-100 users. Explain your design giving...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT