subject

Opening in Manhattan, NY in 6 months, you have just been given the network requirements for this business. There will be 55 employees in this office: 5 - shipping and receiving, 3 – accounting, 2 – human resources, 3 – managers, 10 – technicians, 20 – sales personnel, 10 – customer service, and 2 – marketing. Each employee will have a computer that requires network access. Cisco routing and switching infrastructure will be used and all equipment will be in one physical building. It is your job to design, configure, and implement all required network infrastructure. Create a subnet for each department and a subnet for 7 servers. Make the last usable IP address for each subnet the gateway for that subnet. Use private IPv4 addressing. Size your subnets appropriately – use the smallest prefix to accommodate the number of nodes required. Use Cisco Packet Tracer to complete this project. Objectives Design the network displaying logical segmentation, connectivity, and layout of the required devices. - Show network address and subnet prefix on each link - - Use subnets that do not overlap – -

Implement Network Infrastructure Configure a DHCP server to provide IP addresses to each department computer - -

Configure a workstation in each subnet so it has network access - -

Configure a server in the server subnet and apply a static IP address so it has full network access – -

Ensure only the subnets you have assigned to your LAN have access to the server – - -

Ensure the network is fully converged and meets infrastructure requirements - -

Ensure all computers can communicate to all nodes on the network -

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 20:50
What is the difference between windows 7 and windows 10?
Answers: 1
question
Computers and Technology, 22.06.2019 22:30
Which of the following factors would your hypothetical supervisor look at when deciding whether to test a biological material sample for dna? the amount of other evidence you have implicating a suspect in a crime the annual budget for the crime lab both of the above none of the above; you would almost always order a test
Answers: 3
question
Computers and Technology, 23.06.2019 08:30
When you interpret the behavior of others according to your experiences and understanding of the world your evaluation is
Answers: 1
question
Computers and Technology, 23.06.2019 11:30
Auser is given read permission to a file stored on an ntfs-formatted volume. the file is then copied to a folder on the same ntfs-formatted volume where the user has been given full control permission for that folder. when the user logs on to the computer holding the file and accesses its new location via a drive letter, what is the user's effective permission to the file? a. read b. full control c. no access d. modify e. none of the above
Answers: 1
You know the right answer?
Opening in Manhattan, NY in 6 months, you have just been given the network requirements for this bus...
Questions
Questions on the website: 13722363