There is a diverse computing environment with no standards in place including a
ID: 3769099 • Letter: T
Question
There is a diverse computing environment with no standards in place including a combination of devices (e.g. network printers) and desktop operating systems (e.g. Macintosh OS, UNIX, Linux and Microsoft Windows). There are three different data centers in operation. The first data center is located in New York, NY being used as the main corporate data center (e.g. email, file, print, database and intranet web servers) the second is located in San Diego, CA being used for R&D (e.g. high performance computing, technical application servers and video-streaming services), and the third is located in Houston, TX being used for disaster recovery. The company does large file transfers (e.g. video and graphics) between San Diego, CA and Houston, TX. There is one Internet connection located in the corporate data center that services all company locations.
Provide a proposed network topology design using a software program capable of developing a diagram such as Microsoft PowerPoint, Microsoft Visio, or an evaluation copy of business graphics software such as SmartDraw or EDraw Max. The final product should be submitted in a Microsoft Word document.
Specify the type(s) of media (fiber and copper), network devices (switches and routers), protocols, WAN circuits and connectivity, remote access method and authentication, fault tolerance and security in your design.
Explanation / Answer
Topology used for this design is a star topology, the computers in each office are connected to a central device (switch). The reason for this topology is because it allows for the network to be expanded without disruption, it is easy to implement troubleshooting and a break in any single cable does not cause the entire network to fail . The only downside to this topology is cost. It requires more cable than most other topologies as well as networking devices.
Switch x11 – For each office that requires more than one computer and the server rooms. The reason for this is so that ports can be allocated accordingly to staff or students as well.
Patch Panel x11 – For each office that has a switch so that multiple computers can access the ports on the switch. The patch panel will provide the network with a connection point between network equipment and the ports to which the PCs are connected.
Router x1 – This is where the default gateway for the network will be and is located at the demarcation point. It is used to route information obtained by the network and deliver packets returned by the Internet.
Wireless Access Point x1 – The WAP will be located in the Library and is used to grant wireless access to the internet via the router to those who need it.
Select network security devices to use to secure the network. Include setup and location information for the devices. Provide comprehensive list of devices including the quantity of each device needed.Shielded Cat5 Twisted pair cabling that are plenum-rated. These cables will be used within the drop ceiling of the building when connecting computers to the switch
Network devices proposed will allow the network to be fast, reliable and secure. The switches allow for intelligent packet distribution which minimizes unnecessary traffic between subnets while also providing local connectivity in case of a connectivity interruption in some other segment.
The firewalls allow for security against threats both coming from the internet and from the local subnets. With two firewalls we create a DMZ for the servers to operate with minimized exposure.
Implement networking services such as DNS server to easily find and access network services, and DHCP server for automatic, centralized IP address management
2-
Routers
Routers Are networking devices used to extend or segment networks by forwarding packets from one logical network to another. Routers are most often used in large internetworks
Bridges
A bridge is used to join two network segments together, it allows computers on either segment to access resources on the other. They can also be used to divide large networks into smaller segments.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.