Question

In: Computer Science

imagine you are a network engineer who has been hired to design a network for a...

imagine you are a network engineer who has been hired to design a network for a small company consisting of a headquarters office in Indianapolis, Indiana, and a branch office in Minneapolis, Minnesota. The company has hired you to design and build the network infrastructure from the ground up.

Following is a brief summary of the business structure: Indianapolis, IN This office is the headquarters for the company. It has 61 employees divided across the following three departments:
• Administration: 19
• Research and Development: 25
• Accounting: 17 Minneapolis,

MN This branch office has 34 employees in the following three departments:
• Administration: 9
• Research and Development: 12
• Advertising: 13
: Following are the design instructions/requirements: • The company locations should be connected to each other via a WAN that supports ALL types of traffic generated at each office. • An IP-based physical security solution should be in place, with all physical security traffic logically separated from all other traffic

Solutions

Expert Solution

We assume a Private address space: 192.168.210.0/24
Therefor with this address space we have a 254 usable IPs.

-> Let us first subnet this into 2 subnets with 128 IPs (only 126 usable) each so that it can be assigned to Indianapolis and Minneapolis
Therefore let us assign 192.168.210.0/25 address space to Indianapolis having IPs in range 192.168.210.0 - 192.168.210.127
Hence Minneapolis gets the address space 192.168.210.128/25 with IPs in range 192.168.210.128 - 192.168.210.255

-> Now let us work with Indianapolis:
we need 3 subnets for Administration(19), R&D(25), Accounting(17).
Address space for Indianapolis = 192.168.210.0/25
On further subnetting into 2 subnets with 64 IPs (62 usable though) each
we get 192.168.210.0/26 and 192.168.210.64/26

Since R&D requires highest IPs among the 3 departments, we will assign
192.168.210.64/26 to R&D

The subnet left over is 192.168.210.0/26
We will have to break this again into 2 subnets (for Administration and Accounting depts)
therefore we get 192.168.210.0/27 and 192.168.210.32/27 with 32 IPs each (30 usable though)
hence we assign:
192.168.210.0/27 to Administration
192.168.210.32/27 to Accounting


-> Now let us work with Minneapolis on similar lines
we need 3 subnets for Administration(9), R&D(12), Advertising(13).
Address space for Minneapolis = 192.168.210.128/25
On further subnetting we get 2 subnets with 64 IPs (62 usable) each
we get 192.168.210.128/26 and 192.168.210.192/26
let us assign 192.168.210.192/26 to R&D

The subnet leftover is 192.168.210.128/26
Breaking this again into 2 subnets:
we get 192.168.210.128/27 and 192.168.210.160/27
hence we assign:
192.168.210.128/27 to Administration
192.168.210.160/27 to Advertising

There is enough room for growth within each department subnet/network

-> Also Virtual local-area networks (VLANs) provide a logical separation of physical security information from other network applications.

When properly used and configured, IP networks deliver formidable security protection. Network security features authenticate and segment users, monitor anomalous behavior and implement policy-based responses.

A single network wire or a network switch can support multiple applications that are virtually isolated, as if the application(s) were on a separate wire or a separate switch. Even in large campus-spanning physical security operations, you can logically group all your video surveillance cameras, access control devices, and safety and security monitoring and recording platforms into one or a handful of protected VLAN groups.

VLANs are one way to ensure that only specific employees can view security video or gain access to the security server log files. Network administrators can put all security devices and users into one VLAN and general business users into other VLANs.


Related Solutions

You have been appointed as a design engineer and assigned to design a secured network for...
You have been appointed as a design engineer and assigned to design a secured network for a private organization. Evaluate your approach to improve the security posture of your network before, during, and after your network implementation.
Imagine your class has been hired to secure the network of a relatively small public school...
Imagine your class has been hired to secure the network of a relatively small public school system. The system's network(s) includes administrative offices, classroom computers, Web servers, e-mail servers, and other typical features. Your class decides that multiple layers of firewall protection are required. As a group, discuss the firewall options described in this chapter and decide which ones to use. Where would you place each type of firewall, and why?
Imagine that you are project engineer that has been asked to project (forecast) a cash flow...
Imagine that you are project engineer that has been asked to project (forecast) a cash flow for a new project. What would you do for the following: a. Can the forecasts be biased in any way? b. If so, in what direction and why do you think that’s the case? c. How can a manager and/or their firm neutralize the bias?
You are a business consultant who has just been hired by a young entrepreneur who is...
You are a business consultant who has just been hired by a young entrepreneur who is beginning a new business. The entrepreneur plans to start a privately owned business (i.e. grocery, clothing, hairdresser, auto repair, cleaning service, etc.). Your client is uncertain where to locate the business and is looking for your professional advice. Your client's initial thoughts are to establish sales of $200,000 the first year and grow the business at an average annual rate of 20% each year...
Shearwater company has been hired you to make the network up and running. Company asked you...
Shearwater company has been hired you to make the network up and running. Company asked you to configure the network which that allows the employee to share files through the network. Employees must also be able to control resources on their machines. The company wants the most inexpensive solution and only minimal training for employees. The company needs to expand, and its LAN has grown to include several servers and more than 60 workstations. Shearwater has recently purchased another company...
   Shearwater company has been hired you to make the network up and running. Company asked you...
   Shearwater company has been hired you to make the network up and running. Company asked you to configure the network which that allows the employee to share files through the network. Employees must also be able to control resources on their machines. The company wants the most inexpensive solution and only minimal training for employees. The company needs to expand, and its LAN has grown to include several servers and more than 60 workstations. Shearwater has recently purchased another company...
Shearwater company has been hired you to make the network up and running. Company asked you...
Shearwater company has been hired you to make the network up and running. Company asked you to configure the network which that allows the employee to share files through the network. Employees must also be able to control resources on their machines. The company wants the most inexpensive solution and only minimal training for employees. The company needs to expand, and its LAN has grown to include several servers and more than 60 workstations. Shearwater has recently purchased another company...
Shearwater company has been hired you to make the network up and running. Company asked you...
Shearwater company has been hired you to make the network up and running. Company asked you to configure the network which that allows the employee to share files through the network. Employees must also be able to control resources on their machines. The company wants the most inexpensive solution and only minimal training for employees. The company needs to expand, and its LAN has grown to include several servers and more than 60 workstations. Shearwater has recently purchased another company...
Imagine you, a Certified Health Education Specialist (CHES) has been hired as the program director of...
Imagine you, a Certified Health Education Specialist (CHES) has been hired as the program director of a new after school program called "Get Healthy". "Get Healthy" is focused on educating the importance of increasing physical activity among elementary children as well as educating the importance of consuming a healthy diet. You are required to develop the program's mission statement, program goals, and program objectives before the program begins. 1) Provide 1 program mission statement for the"Get Healthy" program 2) Provide...
Imagine you are a consultant who has been asked to summarize the strengths and weaknesses of...
Imagine you are a consultant who has been asked to summarize the strengths and weaknesses of Agoria, a nation with a pure market economy. Which of the following would you include in your report as weaknesses of Agoria's economy? Check all that apply. - Occupational choices can be restricted. - Firms have no incentive to produce the so-called public goods, such as national defense, because private firms cannot prevent nonpayers from enjoying the benefits of public goods. - People with...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT