Provide a detailed networking plan

Assignment Help Computer Networking
Reference no: EM131187564

The Advanced Digital Computer Company

THE SCENARIO

The Advanced Digital Computer Company is a new company with its Head Quarters building in the city, and with branches in Parramatta, Hornsby and Sutherland. In addition, there are two small home offices in Bankstown and Epping. There are WAN connections between each site and Head Office, with all Internet access through the Head Office site.

The Advanced Digital Computer Company is a retail company for all types of computing devices. The company is planning a restructuring of its network to allow for an expected 100% expansion over the next 5 years. Whilst the numbers of sites are expected to remain the same, the number of employees, and so end computing devices, is expected to double. However, the server farm, currently 4 servers, is expected to be adequate for the foreseeable future.

The Advanced Digital Computer Company has consulted your group to provide a detailed Networking Plan. To assist you the below diagram is supplied.

REQUIREMENTS

You must design the network requirements for the Advanced Digital Computer Company. As the network consultant you will be required to develop a plan for the Company network, including all costs, for all of the following:

1. The type of media you propose to use. This must be adequate to allow for a 100% expansion of the Company network within 5 years, and must be sufficient for all bandwidth requirements for each Company site. It should also be sufficient for increased bandwidth needs in the future. Whilst the actual lengths of media chosen are not required, the cost of media chosen should be included as a cost per metre price. You must justify your choice of media. Remember this might include copper, fibre and wireless options. The serial links between each site will be supplied by the company's ISP and are therefore not to be included in the above media requirements.

2. You are required to subnet the Company's network IPv4 Address using VLSM as appropriate. You will be required to provide summary tables with IP Address ranges for all hosts in your network. When allocating addresses you must allow enough addresses for the 100% expected future expansion of hosts for the Advanced Digital Computer Company. As well, you need to allocate one printer for each 50 computers (or part thereof) on each subnet. If there are, for example, 70 computers required on a subnet, then two printers are required for that subnet. Printers will have the last usable address/es for the subnet to which they belong. The servers will be located in a separate subnet, and must be allocated static IPv4 Addresses within that network. The number of servers is not expected to grow.

3. The ADC Company is anticipating a move to IPv6 in the future, and so needs to use a Dual Stack environment for IPv4 and IPv6 addresses. You are required to address the network for IPv6.

4. You must detail the hardware (ONLY switches, routers) that the ADC Company will require. This must include full reasons for selecting particular hardware, which must be adequate for the ADC Company's requirements. Again, consideration must be made with regard to future expansion and bandwidth requirements. The details about computers, servers and printers are not required.

5. You must justify the type of network topology you propose to use at each ADC Company location. A topology diagram for each location should be included in your report.

6. Communication on the Internet is essential. Select and fully justify the type of Internet access you propose to have for this Company. This must be scalable to allow for future growth and needs. The Point of Presence (POP) is located at Head Office.

IPv6 Addressing

The Advanced Digital Computer Company has purchased the IPv6 Address (Given by your Instructor) from its ISP for addressing all hosts within its network. Subnet, using VLSM, this IP Address to provide addresses for all required hosts. This addressing scheme should allow for the 100% expected growth. Complete the table below.

Additional Information

1. Apart from the IP Addresses, you are not required to supply any WAN link information. This included serial cables, VPN connections, or any security issues relating to those links.

2. Head Office employees are in three separate networks as follows:

a. Sales 60 Hosts
b. Marketing 35 hosts
c. Accounts 30 Hosts

3. There will be a Server Network, with 4 Servers, for the entire Company. This will be situated in a separate LAN in the Head Office building. It is expected that the 4 servers will be sufficient for the next 5 years, and so will not be subject to the 100% growth requirement.

4. All branch offices and Home Offices can be considered an extension of the Head Office network, and so the IP Addresses allocated must be reflected in the overall addressing scheme for the company. The only media requirements required are those internal for each site.

5. Hardware (such as routers and switches) should reflect expected usage. Therefore, low usage environments such as those for the Home Offices, would require different hardware than high usage areas, such as those of the Head Office.

6. Internet Access for the entire company, the Point of Presence (POP), is through the Head Office. This connection should be sufficient for all current users, and scalable to allow for the expected increase over the next 5 years.

Packet Tracer

Model You are required to make a Packet Tracer Model of this network. This model should include the following:

1. All routers and switches you propose for the network.
2. All routers and switches need to be named on the topology diagram.
3. All interconnections between these routers and switches.
4. Addresses, both IPv4 and IPV6 (where appropriate) configured on all devices, and placed on the working model topology.
5. All subnets must be placed on the model.
6. A single host PC is required for each subnet. This PC should have an appropriate IPv4 address configured on it. IPv6 Addresses for PCs is not required. Do not include any printers in this model.
7. Routing, as shown below in the documentation, needs to be included.
8. The connection for the Internet, at the point of presence, should be shown by a connection on the router in the Main Distribution Room.
9. The link to the Internet does not require an IPv4 or IPv6 address. It is assumed that this link will be managed by the ISP.

Reference no: EM131187564

Questions Cloud

How does the law affect society and society affect : Then in a short paper, discuss how current societal mores and beliefs seemed to affect (or not affect) the SCOTUS decision and if the decisions themselves became the catalyst for societal change. How does the law affect society and society affect ..
Discuss the implications of this strategy : This connection would be used to carry control signals relating to all user transport connections between the two entities. Discuss the implications of this strategy
In what ways has each leader proven to be ideal : In what ways has each leader proven to be ideal (e.g. performance, leadership, growth)?- How has each leader shaped his or her organizational culture?
Write a function called circle that takes a scalar input r : Write a function called circle that takes a scalar input r. It needs to return an output called area that is the area of a circle with radius r and a second output, cf that is the circumference of the same circle.
Provide a detailed networking plan : The Advanced Digital Computer Company has consulted your group to provide a detailed Networking Plan. To assist you the below diagram is supplied.
Evaluating and selecting the best dbms product : Describe the process of evaluating and selecting the best DBMS product. List examples of the requirements and features you used and justify any assumptions you make
Evaluate judy stokley level of success : Evaluate Judy Stokley's level of success in developing a culture of trust while implementing her drawdown plan as Eglin Air Base's new Advanced Medium Range Air-to-Air Missile (AMRAAM) program director. Provide three (3) specific examples to supp..
Amount of time and changes in annual rate of return : What annual rate of return is earned on a $5,000 investment when it grows to $9,500 in five years? Recalculate the rate of return, assuming the growth occurred in four years and again, assuming the growth occurred in six years. Describe the relati..
What you learned from the research by writing a report : Choose an area of psychology that you find particularly interesting. You then conduct research to learn more about your topic area. Finally, you summarize what you learned from the research by writing a report that describes the topic and its rela..

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine the essential items on network deployment

you are preparing to deploy EIGRP in a network. Determine the essential items that you will need to consider prior to the network deployment, and explain the importance of each item in the deployment process.

  Social media networking power point

Social Media Networking Power point

  Overview of data communications

Overview of Data Communications. What three disciplines are involved in data communications. What are the conceptual pieces of a data communications system

  Write essay about the social and diversity in the community

Write an essay that should talk about the social and diversity in the community. However, i want you to write about an imaginary best friend named (Mohammed).

  Analog and digital technology

Analyze the technologies for analog-to-digital and digital-to-analog conversions in telecommunications

  For aes with a 128 bit block length and a 128-bit key length

For AES with a 128 bit block length and a 128-bit key length, what is the output of the first round of AES if the plaintext consists of 128 1's and the first subkey also consists of 128 ones?

  Assignment on domain design for security worksheet

Assignment on Domain Design for Security Worksheet, Research and examine a domain model for security that is different from the one you previously developed for this course. Assume that recent compromises of sensitive information require security e..

  Case study on ping sweeps and port scans

Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your asses..

  Draw a simple graph to show conflict degree

Draw a simple graph to show conflict degree. Use channels as colors and show the algorithm step by step to color the graph. Explain what does thismean i.e. what have you constructed?

  Describe the effects of spyware and adware

Describe the effects of spyware and adware. How has spyware and adware influenced public's confidence in security of the Internet?

  Discuss some of the problems nats create for ipsec security

discuss some of the problems nats create for ipsec security. see phifer 2000. can we solve these problems by using

  What type of media is typically used for connectivity

What are the advantages and disadvantages of your selection? What type of media is typically used for connectivity? What are the performance specs in terms of reliability, speed capabilities, and nominal distance for reliable spans with the typica..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd