Design a network solution for the requirements

Assignment Help Computer Networking
Reference no: EM133004262

ITNE2003R Network Configuration & Management

This assessment item will assess the unit learning outcomes specified in the unit descriptors. It checks your understanding about configuring and troubleshooting medium-size networks.

In this project you will demonstrate your knowledge and skills in subnetting an IP address space, configuring VLANs, routing protocols, NAT and ACL on routers and switches as per the requirement of the given scenario.

Scenario

You are working for a networking solution provider. Your team has asked you to design a network solution for the requirements specified by Initech and test it using Packet Tracer simulation platform before deploying the real network and document the specifications.

Initech is a company founded in 2009 which provides IT management software solutions. Initech has 2500 employees and is headquartered in Houston, USA and has branches in different countries such as UK, China, and Australia.

Company Requirements
Initech Australia provides management software solutions to companies in Australia. The head office of the company is situated in Melbourne. It has branches in Sydney and Perth. Company wants to Implement a network which supports potential growth over the next five years, and they have hired your company to layout the network with an expectation of 20% growth of current IP requirements. (For the simplicity of the case study and to limit the scope we have ignored the connections to the international branches.)

At present, there are 80 employees at department of Support Services, 30 employees in department of Consulting, 15 employees in department of Marketing, and 5 employees in the department of Finance providing their service to the head office which is stationed in Melbourne. Company has also 6 employees working as Technicians who travel between all sites to audit and provide onsite troubleshooting services to customers. Melbourne head office also hosts the server farm for the network. These servers contain web servers, Domain Controllers, DHCP and file servers which carry company sensitive information.

Melbourne head office is spread across 2 major buildings which are 10 km apart from each other. Building A is a two-storied building with Support Services and Consulting department employees on 2nd floor. Marketing and Finance department employees are stationed on 1st floor. Building B also contains department of Support Services and department of consulting. Server Farm is hosted in building A.

The Sydney branch spans across a single area which is 50 meters x 30 meters and has a building floor of size 25 meters x 20 meters. It includes all departments in company.

Perth branch spans across a land of 25 meters x 25 meters with 15 meters x 15 meters building floor dimensions and it includes department of Support and Consulting.

Company requests at least one separate printer for each department in each Branch. Each department also has a separate server reserved which acts as a domain controller. Network Administrators group who is working for the Support group in Melbourne should have access to all the devices over the network to both monitor and configure if necessary, using a secured connection. Initech insists the network to be reliable and secured to the maximum extend.

Company prefers to use private addresses as a security concern and prefers to buy a range of public addresses which could be used for internet connections using Network Address Translation (NAT).

The company requires the implementation of following security policies to control the flow of IP traffic within its network and to the Internet.

For clarity, all the requirements requested by the company is listed in point form bellow.

• Access Rules for Group Access VLANs
• All VLANs are permitted to access internet unless specifically denied below. ?
• VLAN to VLAN access, is denied unless specifically permitted below. ?
• PC hosts in the Consulting VLAN are permitted access to the Marketing, Finance, and printers VLAN.?
• PC hosts in the Finance VLAN are permitted access to the Marketing VLANs and printers. ?
• PC hosts in the Marketing VLAN are permitted access to the Internet and printers. • PC hosts in Support VLANs are permitted access to all VLANs.

(Use a Table G to record the testing of the ACLs - add Rows as needed)

Your Task
The Service Delivery Manager of your company has asked you to design and configure the network infrastructure for Initech company, specify all the details about network devices and technologies to be used and implement the simulation using Packet Tracer. After creating the topology, you need to configure the network based on the given requirements and test to make sure it is working properly. You will submit screenshots of your topology, conficuration and verification and testing in the report. You also will demonstrate your simulation on week 12 and test the connectivity of your network based on the given requirements.

Attachment:- Network Configuration.rar

Reference no: EM133004262

Questions Cloud

What is risk management and why is important : What is Risk Management and Why is it Important? Effective risk management is process of controlling what threats to an organization?
Benefits of establishing solid financial acumen in a company : Keeping abreast of the financial measures and metrics employed by a company allows employees to better understand its health and position at any given time.
Application forms on behalf of an applicant : In what circumstances might someone, other than the applicant, complete home loan application forms on behalf of an applicant?
Define inherent risk and control risk : Audit risk is the risk that an auditor expresses an inappropriate audit opinion when a financial report is materially misstated. In other words, the auditor giv
Design a network solution for the requirements : Design a network solution for the requirements specified by Initech and test it using Packet Tracer simulation platform before deploying the real network
How much must be cet capital out of parwadabank : How much ($million) must be CET1 capital out of ParwadaBank's total capital requirement if it is to meet APRA's unquestionably strong CET1 ratio of 10.5%?
Desired rate of return : XYZ Company announced today that it will begin paying annual dividends next year. The first dividend will be $0.1 a share. The following dividends will be $0.2,
Find the wacc market values of capital : Find the WACC Market Values of capital: Cost of Equity = 14% before tax Equity 30 million Cost of Preferred = 6% before tax Debt 50 million Tax rate = 30% Prefe
Compute the annual gross profit for the peanut division : Compute annual gross profit for the Peanut Division using a transfer price of $1.04. Plains Peanut Butter Company recently acquired a peanut-processing company.

Reviews

Write a Review

Computer Networking Questions & Answers

  Diagram of simplest connection between two computers

Using Ethernet Network Interface Cards or NICs, diagram simplest connection between two computers which will allow for communications and resource sharing.

  How should ellen structure distribution from suppliers

How should Ellen structure distribution from suppliers to the store in Illinois? What annual saving can she expect

  Authentication factor utilized by authentication server

which authentication factor is being utilized by authentication server which respond to login request by creating a random number or code.

  Explain graphic files were transmitted by a e-mail

Several graphic files were transmitted by a e-mail from the unknown source to suspect in the ongoing investigation. Lead investigator provides you these graphics files and tells you that at least four messages must  be embedded in them.

  What applications are mapped to the database

What applications are mapped to the database, and are they the correct ones? The next step is to continuously monitor what is going on between your application and the database.

  What cable and connector types are required

Perform a comparative assessment of ADSL2+ equipment versus Cable modem equipment to determine which offers a better capability

  How are pentium chips manufactured

How are Pentium chips manufactured?

  Osi layer-tcp/ip model

The OSI Layer 3 (Network Layer) is one of the layers that perform packet segmentation. The OSI Layer 3 is roughly equivalent to the Internet Layer of the TCP/IP model and the Layer 4 (Transport Layer) of the OSI model is roughly equivalent to the ..

  Hackers system

I believe the hackers were able to break into their systems online rather than the pos. It is probably more risky to go into a store and use some type of card or product to hack into the system.

  Prepare presentation on the topic of networking

Networking Technologies - Topic- Wireless Under Ground Communication Networks. Your assignment is to write a research paper and presentation. The paper must be.

  Addresses and to make ip to hostname mappings

Experience in configuring IP addresses and to make IP to hostname mappings - Configure IP addresses for each interface on the router.

  Threat categories and associated business

What are the threat categories and associated business impact for each. give one major disaster in the plan.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd