subject

Instruction Sheet Slugworth Candies, LLC, has grown extensively over the last few months. In addition to the substantial increase in the size of each department, the Research and Development and Security sections have moved to a remote site in the mountains. Slugworth now consists of the Executive Staff (28)[1], Human Relations (16), Finance and Accounting (20), Marketing and Sales (25), IT Section 1 (8), and Bakery (210) at the main site; and located at the remote site, Research & Development (225-250), IT Section 2 (8), and Security (40).
Although the bakery has over 200 employees, it requires only 50 workstations plus secure access to the local database which contains top-secret recipes.
Your group has been chosen to design a new network for Slugworth Candies, LLC.
Ensure all the following details are included:
IP Addresses
Public IP addresses
The IP address 214.73.97.128/25 is assigned to the company from a new ISP.
Assign static addresses for security and ease of management
Assign ranges of available public IP addresses for NAT services
THE PUBLIC PART OF THE NETWORK SHOULD BE SEPARATE BOTH IN DIAGRAM AND LAYOUT. USERS WILL NOT DIRECTLY USE THESE IPs, THEY ARE FOR DMZ, PUBLIC SERVERS, NAT, ETC.
Private IP addresses
Assign private IP subnet addresses to each department
Use variable-length addressing as needed to provide the closest number of addresses required plus an additional 25% to accommodate future growth
List each department showing the (1) private IP network address, (2) range of host addresses on the sub-network, and (3) broadcast address.
Assign static addresses for security and ease of management
Include DMZs with secure data store for top-secret candy recipes
Diagram two wireless networks at each campus location: (1) one secure, private network that spans the campus, and (2) one open, public wireless network that spans the campus.
Device name (diagram)
Describe strategy and assign names to distribution and core devices (diagram)
Devices
Device name (diagram)
Describe strategy and assign names to distribution and core devices (diagram)
Redundancy (diagram)
Protocols
Include Layer 2 and Layer 3 protocols, as needed
Cabling (diagram)
Specify cabling for each link
Be cost efficient using best infrastructure for the situation
Security (diagram)
Specify strategy for security
Firewalls
Wireless protocol
Services (DHCP, DNS, NAT, Database, Email, Web, File, Print)
Include content of DHCP and NAT services
Routing Tables
Statically assign local internetwork addresses with summariztion
Routing table for each router
Identify access, distribution, and core layers (diagram)
[1] The number of employees in each department follows the department name.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 22:00
What operating system is a smartphone most likely to use? 1.bsd 2.mac os x 3.symbian 4.linux
Answers: 1
question
Computers and Technology, 22.06.2019 17:40
Consider the simple 3-station assembly line illustrated below, where the 2 machines at station 1 are parallel, i.e., the product only needs to go through one of the 2 machines before proceeding to station 2.what is the throughput time of this process?
Answers: 2
question
Computers and Technology, 22.06.2019 20:00
Which type of file can be used to import data into a spreadsheet?
Answers: 1
question
Computers and Technology, 23.06.2019 06:30
Which option correctly describes a dbms application? a. software used to manage databases b. software used to organize files and folders c. software used to develop specialized images d. software used to create effective presentations
Answers: 1
You know the right answer?
Instruction Sheet Slugworth Candies, LLC, has grown extensively over the last few months. In addit...
Questions
question
Spanish, 30.11.2021 21:00
Questions on the website: 13722367