Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Prior to implementing any design we need to first write-up our proposed network design on paper. With that in mind, we begin by performing a network discovery. Once we have identified all the network devices and the needs of the organization, we can document the TCP/IP information that is needed for our design. In this exercise you will determine the subnet information for each department and assign IP addresses for the network devices.

You have been assigned as a networking tech for a new client, AAA Fabricating. The network is configured with a Class C network and the current allocation of IP addresses has been depleted. You have been tasked to reconfigure the network with a Class B address and assign a subnet to each of the 10 departments and the three routers.

Your network audit consists of the following information:

AAA Fabrication consists of 10 departments spread across three buildings.

Each building is connected using three Cisco 2800 Series routers. The three routers are located in the MIS wiring closet in Building 2.
Each department has its own Cisco 2950 switch.

There are at least two workstations in each department.

The company plans to use a class B address range starting at 172.16.0.0.

Each department must be assigned a subnet. Subnets should be designed to allow for the maximum number of hosts on each department subnet using classful subnetting.

The company also wants the three routers to communicate on the minimum quantity of IP addresses using three subnets.

Part 2

Create a logical Network Diagram

795_Logical Network Diagram.png

Logical Network topology represents a high level overview of the signal topology of the network. Every LAN has two different topologies, or the way that the devices on a network are arranged and how they communicate with each other.

The physical topology represents the way that the workstations are connected to the network through the actual cables that transmit data; the physical structure of the network.

The logical topology is the way that the signals or the data passes through the network from one device to the next without regard to the physical interconnection of the devices.

Logical topologies represent the network protocols that direct how the data moves across a network. The Ethernet protocol is a common logical bus topology protocol.

A logical topology is not necessarily the same as its physical topology.

Using the information from the IP addressing exercise create a logical network diagram showing how the current network is interconnected.

Part 3

Create access lists to restrict traffic between departments.

You have been tasked to create the following access list.

The HR and Payroll departments both reside in the same building. The company has devised a new benefits system. The HR department is the only department that should access the Payroll subnet. All hosts on the network should be able to access the HR department.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91549513
  • Price:- $60

Priced at Now at $60, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

This is from a practical exercise the answers are below but

This is from a practical exercise. The answers are below BUT, I do not know how they came up with them. I'd like a step-by-step explanation of how they got the answers. Practical Exercise 1: Assume the demand for teacher ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

Question calculate the total time required to transfer a

Question: Calculate the total time required to transfer a 1.5-MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 KB data, and an initial 2 × RTT of "handshaking" before data is sent: (a) The ban ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Data communications and networks assignment -aim a library

Data Communications and Networks Assignment - Aim: A library research and industry related project is to be carried out on a topic of your choice. The project topic must be related to Data Communications and Networking. ...

About rsa please answer the following questionsa suppose

About RSA, please answer the following questions. (a) Suppose p=11 and q=7. What is ? (n), where n=p?q? (b) If the public key e is 11, find the private key d. (c) If the ciphertext is 4, what is the plaintext? (d) For en ...

Since quotas do not raise revenues but have the same trade

Since quotas do not raise revenues but have the same trade effects as do tariffs, why not just have tariffs? Why would the government impose quotas when tariffs not only would reduce imports but also bring in new revenue ...

Suppose that third national bank has reserves of 20000 and

Suppose that Third National Bank has reserves of $20,000 and check able deposits of $200,000. The reserve ratio is 10 percent. The bank sells $20,000 in securities to the Federal Reserve Bank in its district, receiving a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As