Create a shared mental model between different technologists

Assignment Help Computer Networking
Reference no: EM131184447

Networking Assignment

Overview

Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please review a description of ABC Corporation's network resources and how they are allocated.

ABC Corporation's Network Description

ABC Corporation is a small business in the heart of Central Pennsylvania. They provide services to their clients all over the region. The three-story main office building is where all of the employees report to work each day. There are no remote users. ABC Corporation is a very traditional business. While they have a computer network and are connected to the Internet, they aren't very fancy and don't yet have a need for telecommuting, wireless networks, or smart phones. All of their computers are desktop machines and are connected with wired Ethernet connections. All of the network wiring is CAT-6 twisted pair wiring that goes from the office location to a wiring closet. There is one wiring closet on each floor. Each closet is connected to the basement wiring closet via fiber.

There are several departments of the company. The administrative office has ten employees including the CEO, executive Vice-President, a human resources manager, and several assistants and secretaries. The finance office has fifteen employees. Both of these divisions are on the third floor.

The second floor has the Sales and R&D departments. There are a total of twenty employees in the Sales Department and includes sales executives and assistants. All of the sales department personnel have laptop computers, but they are still connected via the wired network. The R&D department has ten engineers who have two computers each - one in their office and one in their lab spaces.

The first floor has the shipping/receiving department, manufacturing department and the receptionist. The receptionist shares a computer with the night watchman, since they work opposite shifts. There are 20 people in manufacturing, but they only use three computers to enter their production details into the company's ERP system. The shipping/receiving department has six people, each with a computer that connects to UPS, Fedex and USPS systems, prints packaging labels and shipping documents. There is also a conference room/training room on the first floor with a multimedia system that includes a podium computer, projector, and all of the bells and whistles.

The basement houses the maintenance department, information technology and the mail room. The mail room clerk doesn't use the computers at all. The two maintenance workers have computers at their desks that they use to enter reports of work performed. The IT Department has seven employees, each with a desktop computer. They also manage the server farm, which includes two domain controllers, one print server, one mail server, one database server, one internal web server, one external web server (on the DMZ interface of the firewall), a file server, a special server for the ERP system, and a backup server.

Add Wireless Network Access Points

Each floor, with the exception of the basement (the basement does not need wireless), needs to have two wireless access points, one for the north end of the building, and the other for the south. However, the wireless access points will overlap in the middle of the building, so you need to pick different wireless network channels for each end. On the first floor, there should be an additional wireless access point in the conference room for guests.

The "guest" network should have a different SSID than the company's wireless network. It should be configured to allow anyone to connect, with a password. The password will be provided by the receptionist to any visitors and will be changed each week. The company wireless network should be configured to have the same SSID on all of the wireless network access points (but different from the "guest" network). It should be configured with WPA-2 Enterprise with AES and should be connected to the company's servers for authentication (Windows Server with RADIUS server enabled for the Active Directory).

Note: You might want to review https://www.windowsnetworking.com/articles-tutorials/windows-server-2008/Setting-up-Wi-Fi-Authentication-Windows-Server-2008-Part1.html (Links to an external site.) to see how to configure Windows Server to handle the authentication for the access points.

Place your network access points on your network diagram you did for Homework #2. Segment the wireless network separately from the wired network so that it is on its own subnet. Segment the visitor wireless network so it's on its own subnet, separate from both the wired network and the company wireless network.

Label each access point with its own IP address and basic configuration. Each device should have its own name, IP address and should list its configuration in terms of encryption protocol (TKIP, AES, 3-DES or None) and authentication protocol (WPA, WPA-Enterprise, WPA2-Enterprise, WPA-2, WEP, etc, none, etc). Identify the SSIDs that are used for each device.

Place the wireless access points in the building. Use a building floorplan similar to this one: https://www.architecturenewsplus.com/projects/2668 (Links to an external site.)

Create a Network Diagram

Your network diagram needs to include the following elements:

Each Wireless Access Point (WAP)

Each WAP's critical configuration details - name, IP address, SSID, connection protocols, encryption protocols and wireless channel.

The Windows authentication server - including name, IP address, and important configuration details

Additional switches and connections between the building's floors to establish the network(s).

IP Address ranges that will be assigned to network devices when they join the wireless networks

Network Documentation

Your network design document needs to explain each of the elements in your wireless network design. Explain how you segmented your wireless network from other parts of the network. Describe what security settings you might want to implement in your router. Describe the reason for the number of access points that you need on each floor.

What to Turn In

Turn in your Visio Diagram (.vsd/.vsdx) that includes your entire network. You also need to turn in a .doc/.docx file that explains your network diagram elements. Include snapshots from your network diagram in your .doc/.docx file - and annotate your diagram snapshots to better help your explanation of your network.

Reference no: EM131184447

Questions Cloud

Analyze the emerging security threats presented : Analyze the emerging security threats presented within the "Security Threat Report 2014" report. Analyze the major threats to mobile devices, and suggest at least two methods to mitigate the concerns.
What are some of the key tenets of existential psychology : What are some of the key tenets of existential psychology? The significant of Carl Rodger's contribution to the field of psychology. What is client-centered therapy
Analyze five google technologies that are under research : Analyze five Google technologies that are current under research and development, including the self-driving automobile and four other technologies of your choice.
Write a program that asks for the number of units sold : Write a program that asks for the number of units sold and computes the total cost of the purchase. Write a program that asks for the number of checks written durign the past month, then computes an displays the bank's fees for the month.
Create a shared mental model between different technologists : It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram.
Configure and test a dns server : You are required to configure and test a DNS server. Configure a DNS server with both forward and reverse lookup.
Calculate the maximum surface charge density : If one line is positively charged and one is negatively charged, calculate the maximum surface charge density allowable on the conductors
Describe four methods of learning and listening : Describe four methods of learning and listening. How does a person learn (auditory, visual, etc.) if he or she has a preferred method? How can the person adjust to learning in ways not in his or her preferred method
Which policing style utilizes the least amount of discretion : In the formal criminal justice process all defendants must go through which stage to ensure proper sentencing/punishment/dismissal/closure?

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain a matrix that identifies specific departmental needs

Develop a matrix that identifies specific departmental needs for a company that you are familiar with.

  File transfer protocol

The File Transfer Protocol (FTP) uses which transport protocol, TCP or UDP

  Analyze the benefits of bpm mashups in terms of composition

a web service is a set of technologies used for exchanging data between applications. web services allow businesses to

  Access control lists

Per the text, ACLs help by allowing or disallowing a subset of packets from reaching a particular destination. ACLs give network engineers a way to identify and control different types of packets.

  What subnet mask would you use

What subnet mask would you use with having the max amount of hosts at each site 1000?

  Distinguish between lan and wan

Distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies.

  Find a companyorganization who has misused statistics or

find a companyorganization who has misused statistics or who has been unethical in their marketing research. write a

  Would a packet-switched network or a circuit-switched

consider an application that transmits data at a steady rate for example the sender generates an n-bit unit of data

  Explain standard can versus extended can

What is CAN protocol and where is it used, what is LIN and where is it used and explain "Standard CAN" versus "Extended CAN".

  Windows utility program

Which of the following is NOT a Windows utility program?A.) Disk Defragmenter B.)System Restore C.)Disk Clean Up D.)Desktop

  Explain public-key cryptography standard

Explain in detail how PKCS (Public-Key Cryptography Standard), when combined with the RSA algorithm, can thwart Eve's attempt at discovering the encrypted figure.

  Riordan manufacturing telephone and data network

What type of security issues need to be considered when implementing a Wireless LAN? Riordan Manufacturing Telephone and Data Network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd