Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Case Study: Network Design for EZY-Books

EZY-Books is a specialised publisher for customised book publication services based in Brisbane. The company has recently purchased a two-story building in a Brisbane suburb as its new office. It will move about 40 employees to the new building.

The ground floor will be used for the teams of Marketing, HR, and other managerial duties (20 computers and 2 servers). The first floor will be used for the teams of Editorial, design and typography (25 computers and 1 server). The printing and production operation are outsourced to partners.

In addition, EZY-Books has settled its business at Sydney with a marketing team of 8 local employees (10 computers) located in a leased office.

Because of the new office site, EZY-Books hopes to have a future-proof network infrastructure deployed. The aim is to enable the easy and efficient connection of all devices, offices, staff, partners, and customers.

Assignment Task

You are a member of the network planning team, and need to write a technical report to explain your solutions and recommendations about the network plan for the new office building of EZY-Books.

Your target audience also includes executive business people, who have extensive business experience but limited ICT knowledge. Therefore, besides the technical design for the network, the report needs to explain why the recommended networking technologies/solutions are the most appropriate and how they will benefit their business. You may need to compare your recommendations with other available technologies.

Specifically, you should discuss possible solutions for the following 4 topics in the report.

Topic 1: The structured cabling plan for the new office building. You need to explain the key components included, as well as the recommendations for cable types and connecting devices.

Topic 2: IP addressing plan for the new office building.

With regards to IPv4 needs, the ISP has recommended the following topology diagram.

1. EZY-Books will continue using its current public IPv4 address, which is 120.154.191.2 (255.255.255.0) with the gateway as 120.154.191.1. The link is shown as the network interface between the router ISP and router R1.

2. R1 is the entry to the internal network of the company. R2 is recommended to provide better network segmentation. Private IPv4 addresses are used for the internal network. To simplify the discussion, each subnet uses a separate class C private network address (192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24, and 192.168.3.0/24).

3. PC1, PC2, and PC3 are computers inside each subnet. Please assign the last available IP address of each respective subnet to them.

4. The discussions for the IP addresses of servers are not required in the report.

5. Sydney office will keep its current network deployment and require no change. Therefore, it is excluded from the discussion.

Based on this diagram, provide the solutions for subnetting and IP assignment.

1528_figure.jpg

Your report needs to complete the following Addressing Table. If a field is not applicable, fill in "N/A".

Device

Interface

IP Address

Subnet Mask

Default Gateway

ISP

Se2/0

120.154.191.1

255.255.255.0

N/A

R1

Se2/0 (DCE)

120.154.191.2

255.255.255.0

N/A

Se3/0

192.168.0.1

255.255.255.0

N/A

Fa0/0

 

 

 

R2

Se2/0 (DCE)

 

 

 

Fa0/0

 

 

 

Fa1/0

 

 

 

PC1

NIC

 

 

 

PC2

NIC

 

 

 

PC3

NIC

 

 

 

You also need to use Cisco Packet Tracer to build the proposed topology. A screenshot of your PT drawing should be included in the report.

Topic 3: Essential network services

You also need to recommend some key network related services, addressing the following requirements:
1. Users should not configure their IP addresses manually. This becomes more important since some users take their own laptops to the company.
2. There are only a few public addresses available from the ISP. However, every device need to gain Internet access.

Topic 4: Network security

The owner and most staff have concerns about the security of their assets. You need to recommend the type of security policy and technologies that should be used.

Report Format

Your report should be no less than 1,500 words and it would be best to be no longer than 2,500 words long.

Attachment:- Task.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93136047
  • Price:- $80

Guranteed 48 Hours Delivery, In Price:- $80

Have any Question?


Related Questions in Computer Network & Security

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: a. What is the network mask used by the router? (in dotted de ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Cybersecurity policy design issues describe cybersecurity

Cybersecurity Policy Design Issues Describe cybersecurity policy features that are needed to protect against the Insider Threat, Operations Security, Access Control and Biometric Authentication What features can be added ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of all ITECH1102 theoretical and practical material. - To encourage students to use content analysis s ...

Nbspfor the remaining questions consider a 4-bit block

For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 2 f 1 You c ...

Overviewthis assignment has three major aims- to help

Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to prepare for tests, examination ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

Prof gs farmer friend claims that aliens made crop circles

Prof G's farmer friend claims that aliens made crop circles in his farm. Using economic theory, prove his farmer friend wrong.

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to pr ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As