Explain each of the elements in your wireless network design

Assignment Help Computer Engineering
Reference no: EM132087428

Overview

Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please review a description of ABC Corporation's network resources and how they are allocated.

ABC Corporation's Network Description

ABC Corporation is a small business in the heart of Central Pennsylvania. They provide services to their clients all over the region. The three-story main office building is where all of the employees report to work each day. There are no remote users. ABC Corporation is a very traditional business. While they have a computer network and are connected to the Internet, they aren't very fancy and don't yet have a need for telecommuting, wireless networks, or smart phones. All of their computers are desktop machines and are connected with wired Ethernet connections. All of the network wiring is CAT-6 twisted pair wiring that goes from the office location to a wiring closet. There is one wiring closet on each floor. Each closet is connected to the basement wiring closet via fiber.

There are several departments of the company. The administrative office has ten employees including the CEO, executive Vice-President, a human resources manager, and several assistants and secretaries. The finance office has fifteen employees. Both of these divisions are on the third floor.

The second floor has the Sales and R&D departments. There are a total of twenty employees in the Sales Department and includes sales executives and assistants. All of the sales department personnel have laptop computers, but they are still connected via the wired network. The R&D department has ten engineers who have two computers each - one in their office and one in their lab spaces.

The first floor has the shipping/receiving department, manufacturing department and the receptionist. The receptionist shares a computer with the night watchman, since they work opposite shifts. There are 20 people in manufacturing, but they only use three computers to enter their production details into the company's ERP system. The shipping/receiving department has six people, each with a computer that connects to UPS, Fedex and USPS systems, prints packaging labels and shipping documents. There is also a conference room/training room on the first floor with a multimedia system that includes a podium computer, projector, and all of the bells and whistles.

The basement houses the maintenance department, information technology and the mail room. The mail room clerk doesn't use the computers at all. The two maintenance workers have computers at their desks that they use to enter reports of work performed. The IT Department has seven employees, each with a desktop computer. They also manage the server farm, which includes two domain controllers, one print server, one mail server, one database server, one internal web server, one external web server (on the DMZ interface of the firewall), a file server, a special server for the ERP system, and a backup server.

Add Wireless Network Access Points

Each floor, with the exception of the basement (the basement does not need wireless), needs to have two wireless access points, one for the north end of the building, and the other for the south. However, the wireless access points will overlap in the middle of the building, so you need to pick different wireless network channels for each end. On the first floor, there should be an additional wireless access point in the conference room for guests.

The "guest" network should have a different SSID than the company's wireless network. It should be configured to allow anyone to connect, with a password. The password will be provided by the receptionist to any visitors and will be changed each week. The company wireless network should be configured to have the same SSID on all of the wireless network access points (but different from the "guest" network). It should be configured with WPA-2 Enterprise with AES and should be connected to the company's servers for authentication (Windows Server with RADIUS server enabled for the Active Directory).

Note: You might want to review this informative webpage (Links to an external site.) to see how to configure Windows Server to handle the authentication for the access points.

Place your network access points on your network diagram you did for Homework #2. Segment the wireless network separately from the wired network so that it is on its own subnet. Segment the visitor wireless network so it's on its own subnet, separate from both the wired network and the company wireless network.

Label each access point with its own IP address and basic configuration. Each device should have its own name, IP address and should list its configuration in terms of encryption protocol (TKIP, AES, 3-DES or None) and authentication protocol (WPA, WPA-Enterprise, WPA2-Enterprise, WPA-2, WEP, etc, none, etc). Identify the SSIDs that are used for each device.

Place the wireless access points in the building. Use a building floorplan similar to this one (Links to an external site.).

Create a Network Diagram

Your network diagram needs to include the following elements:

Each Wireless Access Point (WAP)

Each WAP's critical configuration details - name, IP address, SSID, connection protocols, encryption protocols and wireless channel.

The Windows authentication server - including name, IP address, and important configuration details

Additional switches and connections between the building's floors to establish the network(s).

IP Address ranges that will be assigned to network devices when they join the wireless networks

Network Documentation

Your network design document needs to explain each of the elements in your wireless network design. Explain how you segmented your wireless network from other parts of the network.

Describe what security settings you might want to implement in your router. Describe the reason for the number of access points that you need on each floor.

What to Turn In

Turn in your Visio Diagram (.vsd/.vsdx) that includes your entire network. You also need to turn in a .doc/.docx file that explains your network diagram elements. Include snapshots from your network diagram in your .doc/.docx file - and annotate your diagram snapshots to better help your explanation of your network.

Reference no: EM132087428

Questions Cloud

Organisational and individual influences on management : Critically analyse the institutional, organisational and individual influences on management accounting systems - professional judgments about
Importance of space exploration : The Universe is all of space and time and their contents that include planets, stars, galaxies, and all other forms of energy and matter.
Create an ipo chart for the problem : Create an IPO chart for the problem, and then desk-check the algorithm seven times, using sales of 20000, 20001, 30000, 50000, 50001, 75000, and -3.
What total amount should be credited to additional paid : What total amount should be credited to additional paid-in capital from common stock as a result of the conversion of the preferred stock into common stock
Explain each of the elements in your wireless network design : Describe what security settings you might want to implement in your router. Describe the reason for the number of access points that you need .
Compute the cost of the ending inventory : At the end of the year, Lisa had 146 units in ending inventory. Compute the cost of the ending inventory and the cost of goods sold under FIFO and LIFO
Discuss the elements of a thesis statement : Discuss the elements of a Thesis Statement / Main Idea / Main Point of an essay. Describe what it is, perhaps what it is not, and why it is important to the wor
Can the attacker cause the server to create many fully open : Can the attacker create half-open or fully open connections by simply sending an ACK packet to the target? Why or why not?
Determining the wuthering heights : Identify who the speaker in each of the following passage. Explain your rationale with at least three complete sentences.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd