Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Wireless Network for ABC Corporation

Overview

Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately.  A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts.  It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram.  Please review a description of ABC Corporation's network resources and how they are allocated.

ABC Corporation's Network Description

 ABC Corporation is a small business in the heart of Central Pennsylvania. They provide services to their clients all over the region.  The three-story main office building is where all of the employees report to work each day.  There are no remote users. ABC Corporation is a very traditional business.  While they have a computer network and are connected to the Internet, they aren't very fancy and don't yet have a need for telecommuting, wireless networks, or smart phones.  All of their computers are desktop machines and are connected with wired Ethernet connections.  All of the network wiring is CAT-6 twisted pair wiring that goes from the office location to a wiring closet.  There is one wiring closet on each floor.  Each closet is connected to the basement wiring closet via fiber.

There are several departments of the company. The administrative office has ten employees including the CEO, executive Vice-President, a human resources manager, and several assistants and secretaries.  The finance office has fifteen employees.  Both of these divisions are on the third floor.

The second floor has the Sales and R&D departments. There are a total of twenty employees in the Sales Department and includes sales executives and assistants.  All of the sales department personnel have laptop computers, but they are still connected via the wired network.  The R&D department has ten engineers who have two computers each - one in their office and one in their lab spaces.

The first floor has the shipping/receiving department, manufacturing department and the receptionist.   The receptionist shares a computer with the night watchman, since they work opposite shifts. There are 20 people in manufacturing, but they only use three computers to enter their production details into the company's ERP system.  The shipping/receiving department has six people, each with a computer that connects to UPS, Fedex and USPS systems, prints packaging labels and shipping documents.  There is also a conference room/training room on the first floor with a multimedia system that includes a podium computer, projector, and all of the bells and whistles.

The basement houses the maintenance department, information technology and the mail room. The mail room clerk doesn't use the computers at all.  The two maintenance workers have computers at their desks that they use to enter reports of work performed.  The IT Department has seven employees, each with a desktop computer.  They also manage the server farm, which includes two domain controllers, one print server, one mail server, one database server, one internal web server, one external web server (on the DMZ interface of the firewall), a file server, a special server for the ERP system, and a backup server.

Add Wireless Network Access Points

 Each floor, with the exception of the basement (the basement does not need wireless), needs to have two wireless access points, one for the north end of the building, and the other for the south. However, the wireless access points will overlap in the middle of the building, so you need to pick different wireless network channels for each end.  On the first floor, there should be an additional wireless access point in the conference room for guests.

The "guest" network should have a different SSID than the company's wireless network. It should be configured to allow anyone to connect, with a password.  The password will be provided by the receptionist to any visitors and will be changed each week.  The company wireless network should be configured to have the same SSID on all of the wireless network access points (but different from the "guest" network). It should be configured with WPA-2 Enterprise with AES and should be connected to the company's servers for authentication (Windows Server with RADIUS server enabled for the Active Directory).

Note: You might want to review http://www.windowsnetworking.com/articles-tutorials/windows-server-2008/Setting-up-Wi-Fi-Authentication-Windows-Server-2008-Part1.html (Links to an external site.) to see how to configure Windows Server to handle the authentication for the access points.

Place your network access points on your network diagram you did for Homework #2. Segment the wireless network separately from the wired network so that it is on its own subnet.  Segment the visitor wireless network so it's on its own subnet, separate from both the wired network and the company wireless network.

Label each access point with its own IP address and basic configuration. Each device should have its own name, IP address and should list its configuration in terms of encryption protocol (TKIP, AES, 3-DES or None) and authentication protocol (WPA, WPA-Enterprise, WPA2-Enterprise, WPA-2, WEP, etc, none, etc).  Identify the SSIDs that are used for each device.

Place the wireless access points in the building. Use a building floorplan similar to this one: http://www.architecturenewsplus.com/projects/2668 (Links to an external site.)

Create a Network Diagram

 Your network diagram needs to include the following elements:

  • Each Wireless Access Point (WAP)
  • Each WAP's critical configuration details - name, IP address, SSID, connection protocols, encryption protocols and wireless channel.
  • The Windows authentication server - including name, IP address, and important configuration details
  • Additional switches and connections between the building's floors to establish the network(s).
  • IP Address ranges that will be assigned to network devices when they join the wireless networks

Network Documentation

Your network design document needs to explain each of the elements in your wireless network design. Explain how you segmented your wireless network from other parts of the network. Describe what security settings you might want to implement in your router.  Describe the reason for the number of access points that you need on each floor.

What to Turn In

Turn in your Visio Diagram (.vsd/.vsdx) that includes your entire network. You also need to turn in a .doc/.docx file that explains your network diagram elements.  Include snapshots from your network diagram in your .doc/.docx file - and annotate your diagram snapshots to better help your explanation of your network.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91874523
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Question discuss the principle of least privilege in at

Question: Discuss the principle of least privilege in at least 250 words. Explain how this principle impacts data security. The response must be typed, single spaced, must be in times new roman font (size 12) and must fo ...

What is the example of social behavior or a social

What is the example of social behavior or a social situation that seems inconsistent with the fundamental presupposition, and why this example could be inconsistent?

What steps are required in determining the big-oh notation

What steps are required in determining the Big-Oh notation for the algorithm when sorting an array of integers 5 7 4 9 8 5 6 3 and showing the contents each time a selection sort changes it while sorting the array into a ...

Imagine you are employed by a large city police department

Imagine you are employed by a large city police department as the leader of the digital forensics division. A large corporation in the city has contacted the police for assistance in investigating its concerns that the c ...

Given a list of numbers l a value x is said to be a

Given a list of numbers L, a value x is said to be a majority value if the value of over half the elements in L is x; in other words, if L has n elements and nx is the number of elements in L with value x, then x is a ma ...

Question take screenshots of functions running in clisp

Question : Take screenshots of functions running in cLISP. Provide a description for each screenshot. 1. Create the function DecTree that will implement decision tree. Your function should accept input of decimal string ...

What is unified threat management utm and the services it

What is Unified Threat Management (UTM) and the services it combines into one device. Does UTM holds true to the principle of defense-in-depth

Today is your 35th birthday and it occurs to you that your

Today is your 35th birthday and it occurs to you that your current retirement savings may be insufficient to maintain for you the lifestyle to which you have become accustomed. • The value of your retirement account toda ...

Question subroutines and pointers in assembly languagewhat

Question : Subroutines and Pointers in Assembly Language. What is a subroutine and how to improve the assembly code? What are the different components of a subroutine, how they work?

Identify and evaluate at least three considerations that

Identify and evaluate at least three considerations that one must plan for when designing a database. Suggest at least two types of databases that would be useful for small businesses, two types for regional level organi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As