Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

I would like help with this project. Here are the detailed instructions. Is this possible?You are the Network admin for a small company XYZ this company is building its Network infrastructure from scr

I would like help with this project. Here are the detailed instructions. Is this possible?

You are the Network admin for a small company XYZ this company is building its Network infrastructure from scratch and you have been tasked to assist in this project so you have been asked to develop a plan/design based on their business requirements/needs and below are the company’s requirements:

· The company will be located in a building at Chicago and it will occupy two floors (7th floor and the 8th).

· The company size would be around 35 total employees (20 employees at the 7th floor and 15 at the 8th) and there would be a potential growth in the next 5 years.

· Users will need to be able to use the Internet for their research/study also they will need to use email and chatting system to communicate with each other and other companies.

· There will be a primary printer and scanner for each floor and each user need to be able to print/scan to the backup printer if the primary ones fail

· No voice or video streaming is required.

· Network Devices will be secured in a room in each floor also you will need to restrict access to these devices by setting passwords/encryption …

· After 6 months the company is hiring a group of 10 employees in another state (Indiana) and both locations at both states will need to communicate with each other all 10 users will have Laptops to do their job.

As The Network Admin and using packet Tracer you are required to design this Network using the following:

· Provide a project outline/plan by analyzing the above requirements include a logical/physical drawings of your network(30points)

· Use the right Network devices/cables taking in considerations the potential company’s growth(10 points)

· Configure the Network devices and provide meaningful hostnames also restrict access to these devices by setting passwords/encryption(10 points)

· Design the IP addressing Scheme correctly(use the correct interfaces IP addresses)(10 points)

· Consider using either dynamic/static routing to allow proper traffic routing between the two locations(10 points)

· Test your completion of this project, users in both locations will be able to communicate with each other successfully use all possible Network tools /show commands to test your results(20 points)

· Troubleshoot any possible issues…(10 points)

Show more
  • @
  • 165 orders completed
ANSWER

Tutor has posted answer for $45.00. See answer's preview

$45.00

******************* ******* ******* DESIGNStudent NameCourse ************** ************** ********** **** *************************************** ******* ******* ************* PLAN/OUTLINEBeing * network ************* ** *** company I ***** **** to ********* *** appropriate network design ** ***** ** ******* ** ********* *** ******** ************* ************** XYZ is a ***** ********** which ******* ** ***** *** building the ******* infrastructure **** *** ********* *** ******* *** ***** 35 ******* ***** operates at ****** ******** on two ********* ****** like *** *** *** floors *** ******** ****** offers *** ************* ******* *** ****** ** one ******** ********* with ******* **** ******* ***** XYZ **** *** ** ***** **** the ** newly ***** ********* The ******* **** include *** ******** *** logical design ** *** ******** ***** ** *** XYZ *********** *** ****** ****** ******* ******* ******* **** **** ****** **** ******** with *** restrict ****** ******* to ** utilized ** ********** ******* ***** ** ********* We ******** *** ********* ********** *** ************** ******** protocols on the devices **** *** ******* ** file access and ******* respectively *** ****** ** the *** *********** ******* offers *** ******* ******* **** *********** ******* *** ******* ******* and computer systems ********* ** each ***** and ******* **** be able ** *********** ** *** ********* ********* in *** ****** *** ******* *** ******* **** ****** **** ******** ***** ****** access ************ **** will insure that information **** ** ****** only ** ***** **** *** ********* ** **** ******* information This ************ ***** ****** ****** ****** ********* *** * ********** Corporation ******** ** ****** building ****** ***** 35 employees ** different floor **** *** *** ********** ******** meets *** accompanying **** *** objectives:· ************* ************ ************ ********* **** ************* *********** ********* **** proposed * cost-effective ******** to *** ******* ** *** **** ** * ****** ******* connection **** ** installed **** the *** ** ******* firewalls *** *** *** ******** ******* ********** **** the updated *** ****** ********** ******** ******** to ******* **** *** ******** ** **** ** ********** from *** ************ access ** ***** ******* from *** outside ******* The ******* plan ***** *** ******** recommendation as well ** ************** ** the appropriate solution as ******** *** ******** types ** be **** for *** ******* ** *** ************ Such ******* if ********* will block the ******* **** *** *** *************** ****** *** up *** *** company network(SANS ****** ******* **** consists of *** *********** ******* design ***** should ** like ***** below ** the ****** **** *********** *** ******** network topological **** ** a ****** ******* network **** the ******* connected ** *** *** and **** *********** ******* Network ********* *** XYZ ******* NETWORK ****** ******************* Network DesignNETWORK DEVICES/CABLESPlease *** the following ***** for *********** on ******* *** ************************************ ******************* ********* **** ***** / *********** Base-TX Gbe ***** ****** ****** ********** **************************** ************ ******** ******** ***** * ** *** ** ****** ** ***** Stranded ******** **** ***** ** an ***** ****** *** ****** ****** ****** ******* ***** ********** per ****** ************************** **** ****** * ** and * ******* ******** uplink *********** **** ***** Form-Factor ********* **** ****** ********* business ********** *** **** transition to 10 Gigabit *************** ****************************** ******** ****** * embedded ************** ********** ******* by ** ***** *** ******** ******** *********** **************************** Port Cat * ***** ***** * ***** for Ethernet Fast ******** and ****** ******* ******** ************ network ***************** ****************************** ****** ***** * ******** ********** ******* *********** *** extensive coverage for ********** ** mid-sized ***************** ****************** *************** * ***** *************** 4-socket ** **** ****** *** mission-critical applications ** ********* **** ************** (5)$4477500Total ************************* ***** ******* used as ****** to ******* ** not **** * *********** but * ************* *** transmission ** information signals to ********* ***** ** one ***** **** ** ***** ****** **** ** different ***** ******** ** same building **** ** *** *********** ****** ************** ******* ********** ** the ****** *** ******** **** the Internet ****** by ********* ****** **** ****** ** ******* system ** their ********* ************ ********* ** the rooms The ******* will ** ********* ** *** wide **** network *** ************* ***** ******* *** ******* ***** *** *** building **** ******* * ***** area network amid *** *** floors Computers **** be ********* ** *** ******** ******* **** and ***** **** ************ **** ** ******* ***** *** ****** ********** *** **** widely recognized ***** ** ******* ***** *** ******* **** ******* pair ***** **** *********** link *** remote ***** ******* wireless interface ********** **** the natural ***** ** air ** ****** The ************ ********* ***** will be ******** ** ******* ***** **************** Ports: **** ********** ******** contains * ******* ** at least * serial ***** ***** are used ** ******* ** the *** and the **** ***** **** give *** ************ ******** ********* ** ******** *** network media ************ ** ******** ***** ** ****** will be used in *** ****** ***** *** ******* *** *** **** ********* ******************** ********** *** *********** Industries Alliance ********* **** **** ******* *** ***** *********** **** **** ** **** ** setup ** the ******** ***** will use EIA/TIA-568 wiresConnection ****** a ******* ** ********** ***** **** be employed that **** **** the physical ***** of *** ************ ***** **** Network *** ** cables offer fast **** protective *********** ******** ** **** *** cables The *** ** ***** ** *** **** long which ** ******** ** *** the ********** ***** section ****** all ******* *** ********* ****** and **** *** the vertical ************* ****** in the ******** ******** ** the ****** buildings(McCabe 2010)PASSWORDS/ENCRYPTIONWe ******** the ******** *********** ******* ********* ** the ******* ********** amid *** ********* ******* switches ******* *** WAPs **** ** **** ******** ***** in ***** XYZ ****** with *** configuration ** *** devices **** server ** **** ** **** *** ********* ****** ****** used ** **** ***** with *** help of ******* ******* ******* ** *** ***** ****** as ***** ** *** ******* ********** ******** like *** ***** ************** wireless ************* ***** *** ******** ******** on *** ******* in ***** ** ******* the connection **** *** ******* user ** ***** user ****** *** ******** of *** organization *** ********** ********* **** TCP/IP ***** worked ** *** ******* ****** ** connect ** *** ***** **** Web ** ******** *** WAP and ****** ********* ****** the ******** given **** *** **** *** *** *** configured *********** The network ******* **** ******* and ******** and ******* ****** like **** *** ******** with *** ***** of IP addresses to **** of them such **** **** **** ** *** *********** ****** *** *** *********** building **** 7th *** *** floor ** communicate **** **** ***** *** ** *** other ******** of *** XYZ Corporation (Harold * ****** 2009)CONFIGURATION ****** ********* ** ******* PART AND *** LINECONSOLE *********** port used *** initial configuration Communicating ****** through a ******* **** ** openly ********* ** remotely or a local operator ********** **** **** ** **** the utilization of ******* ** a ******** ******* ****** ** ****** ******* **** ********** ** ********** *** line **** be appropriately ********* ** **** ******* ********* ***************** ********** ******* a ****** **** line” ** *** *********** ********* **** ****** ** ********* **** * network **** Suppose *** *** ********** is prerequisite the ************ ***** **** ** correctly ********* ** stop illegal accessSample ***** *** Telnet configuration without ******** or ***** *** **** *** each ** *** ******* **** ** *** *********** ********** *** *** CONSOLE **************** ******** ***** *** *** (CONFIG-LINE) ****** ******* (CONFIG-LINE) #EXITR3 (CONFIG) ********* ******* ******** CISCOThe above ******* ***** ***** **** entirely lines **** ** ********* for ********* **** **** **** or accessing *** particular device ***** ****** ****** ******* ***** **** the ***** ******** you try ** link and start *** telnet ******* **** *** router ** site ** **** ******* *********** 3333TRYING **** ******* **** *** **** access ***** is ******* and checked ****** ****** VERIFICATIONUSERNAME: **************** ************* *** ******** **** NOT **** ** *** ********** ****** the ******* of the client ** ********* **** ** ******** only ** **** vty ******* and (elevate ** ****** *********** ***** Passwords must ** ******* ********* ********** ** it ********* show ** *** ******** as ** ** encrypted under the ***************** ***************** WHO **** **** HOST(S) **** ******** CON IDLE 00:02:53* ** *** ******* IDLE ******** 10001[6]The ****** ** *** ***** network *** ************* ******** **** * *** **** ** ****** ** linked ******* *********** ** **** ** ******* ** *********** *** is ********* connected ******* *** ******* ********* ** **** ** ** ********** **** ****** **** ***** ** ****** on ****** **** *** ******* ** ** each ** *** lines ********** **** ** utilization *** *** ****** ***** not ** ********* access *** ****** ** the ************* also displays that ******** ** ********** ** *** Serial ******* **** alsoIP ********** ********* scheming *** ** Address assignment ** the *** network * ****** MASK ** utilized to **** ***** **** ** *** ** ******* recognizes *** ****** *** which divide distinguishes * ********** **** ** *** system The ****** **** *** *** ********* ************ network ****** of PC ******** ** well as employee accessed ****** ****** ** *** network *** ******** **** a ****** **** ** *** ***** ** ***** D ***** ** *** the normal **** ******* *** *** ********** ******* There **** **** * ******* *** *** *** Employee *** ***** ***** *** *** ******** ******* *********** ******* you ** make ********* ******** systems **** ***** inside ** a solitary ***** * * ** * system *** ********* IP Addresses ** ***** D to **** ** *** ****** *********** ** ***** of a *** ******** will **** ** ********* *** ** **** ***** ************* ** ***** employees on *** second **** ** ******* ***** *** ******** or ***** ones are ******* For the chance **** *** ***** subnet *** are **** ***** ** ******* *** system **** **** ***** A B or * ****** ***** ** unreasonable It is **** important ** **** **** *** ****** group *** **** ****** ** information ** *** ********* subnet ************ ************* ************ The User’s ******* 101300 * ********* *** ************ ******* ****** * ********* *** Wireless ****** ****** * ********** rooms * 2 3 and * have all the computer ******* with the **** ***** device ** addresses with *** ****** ********* ** *** ***** * range **** *** ****** ** *** campus ******* ****** ***** ******* ********* with *** ****** **** for *** one department building having separate labs **** *** ********* and server ******* ********** *** *** ******* ********** ******* ** ** *** ** ** ***** 7 with the ******** ******* ** *** **** ****** ** ********* ****** **** *** ****** mask ********* ******************************** *** ** the ***** **** ** *** ***** * ****** **** #1 **** ** *** * **** *** computer ******* ******** ** *** ******* ***** **** *** IP ******* ****** **** 11111111111111111111111100000000 ****** **** ******* ******** to each ****** ********* ** **** classroom and ********** **** ****** *** ******* ***** *** ***** ****** ***** *** with ******* ************ *** ******** ** *** ****** ** *********** 1 and * **** the ********* ***** ** subnet **** ****** ** stated ** *** ****** ***** ********* ** Addressing Schemes *** ******* and Devices *** floor ******************** ************* might ****** ** ** superfluous ** ***** since *** ******* three ********** ** ** ** address ********* from *** **** (for ******* ********* *** **** system) ********** *********** *** ****** and the **** ****** ********** ************* ** ********** gadget in ******* **** ** *** *** ** *** ****** ***** ** ***** ** * *********** ***** **** ********* ******** given * Class * system of ****** which *** * characteristic veil ** ********** you *** **** subnets ** **** ********** * ******************************** ********** * ******************************** The ***** ******* *** employee ***** ******** the ******* ************** sub-netting *********** as given below in the ******* **** *** ****** ** ********** ***** **** *** ******* subnet **** ** **** proposed ** ******** *** ****** ***** for **** ******** ***** ************** *** *** ****** *** ******* **** *** ******** ***** labs ********** ***** shown ***** provides *** ** ******* ***** **** **** ***** **** ******* *** teacher PCsOffice ******* Address ***** ************ 11-126Room ********** ************ 4192-223Room ************************** ******* address ****** ****** **** ****** ********** *** security in the ************ ** the ******* ****** groups **** ** ****** ** ******* **** *** ******* five **** ID bits **** ****** *** **** up ** ** **** ********* ** of ***** *** really be ******** ** * ****** since **** *** ** all zeros or *** **** are *** ********* *** is ********** ** ****** ***** By ********* the cover ** be ************ you **** ***** ***** or ****** ************* by ****** **** *** ***** host ******* of the location and ******** **** ** make subnetsSUMMARIZATION ** ** ********** ***************** ******** ***** ****** ******************* ******** strongly ********* ********* the ******* ****** possible ********* to ******* *** ****** Network *********** **** * ******** the specified configuration for *** login banner and MOTD ****** for the ******** ** *** technology **** *** ** ******** implemented ** *** *** Chicago ********* ******** ******** ** *** various kinds of routing ********* ** *** basis ** *** nature we ********* that **** ******* of *** *** ***** ********* ***** ** ** more ******** for *** ****** site **** ** *********** *** *** ****** that **** protocol offers ************ *********** ************* **** ********* ******** ** ******** ** ***** protocols **** Routing ******** must ** ***** ** ** * ****** ** ******* **** *** ** ******* *** *** ********** on a ******* router established ** *** ****** *********** network ** given ** *** diagram ** *** ***** *********** ** **** **** ****** *** ********** ** ** * equivalent-cost ways ** * ****** **** * catastrophe to the end ***** is ************ **** ******** ******** to *** ********** paths **** ******** for *** **** **** ************* ******* **** ********* ****** *************** routes The **** accompanying ** ******** ************ by the ********* ** the ********* account ****** **** arranged to **** the most ** *********** **** routing”(SANS *********** TREE ******** ************ STP ******** ***************** the configuration of the *** I proposed to arrange the *********** TREE PROTOCOL (STP)” ** “PORT-BASED VLANS” ** *** 2960-S and ******** **** ******** The ****** ****** *** ******** ** **** ** *********** ************* PLUS (PVST+)” protocol ********** ***** ** the ***** proprietary ********** and ******* 8021D” standard ******* ********* ** *** “RAPID PER-VLAN ************* PLUS **************** ********* ***** on *** ******* 8021w standard” * ****** ***** ***** ** * solitary **************** ******* to *** ******* ** *** system and entirely ***** associates ******** *** ******* ****** IDIn ** assorted **** ** well ** PVST+ ****** the ********** ************* ***** root ****** ************ *** *** MST ******** ** ******** ** * PVST+ ****** ****** *** **** ** numerous *** ************ a ****** ********* routers/switches executing ***** *** SWITCHES ********* ***** ***** * *** ******* **** *** ***** ******** *** rapid-PVST+ ******** ****** ** ******** *** ********** ************* ***** ** *** RAPID-PVST+ SPANNING-TREE ******** *** ***** ****** must ** * *********** ****** ******* in case ** *** ***** illustrations *** source ****** ***** ** * ***** ****** *** ***** SWITCHES must ** ******* and positioned ** *** edge ** *** system ******* **** ***** ************ ***** *** ********* form of spanning tree (all ***** ***** *** ***** ** all ******** *** ******* *** ******** ** *** LAN ******* arrangement *** (Switch ** is supposedly *** ***** ****** ** *** ** the **** ****** Since ** a ***** * setting **** no ****** ******* ****** ********* ***** are ******* ********* *** ********* *** ** *** ****** **** *** root ***** ***** * ****** **** portions ****** ******* ** ******* ******* ******** ******* *** ******* ******** ****** *********** *** locate *** ** * ******** state ** avoid *** *** ****** **** ******** the **** ** *** ******* ******** ******* *** protocol *** ******** "surge" *** ******* they get **** ** ******* *********** ****** access ******* ***** ******** *** ******** **** **** forward *** **** ** all ********** acquainting copy ***** and ******* **** a ************* ** ***** ***** ****** switches ceaselessly ******* *** other frames **** ** ******** as well ** greatly saddling on system ******* ****** We analyzed **** *** **** cause **** ***** *** *** from ******** **** switch ** **** *** switch ********* *** * ******* **** **** ** *** **** ********** than *********** ** *** ******* topology Therefore the ********* ******* ** ******* convention is that ******* in the *********** *********** CONFIGURATIONFor each ** *** ****** configuration ** *** switch that *** ** ******* ** ***** ***** ****** ** *** connection for *** Chicago site as ***** the ************* ******* **** with ********** ******** ********** ****** nd)The above ************* ******** used *** *** ****** or ***** ****** ************* ** *** SPRINGFIELD site ** ***** **** the Cisco ****** configuration ********************* *** ***** CONFIGURATIONSource: (Tomsho *********** VTY ***** CONFIGURATIONAs ** ******* *********** ******* ** use *** *** ********* ****** **** router or ****** configurations) ******* *** ****** ****** ***** *** ***** ************* ** ***** below:Take * brief **** ** *** ***** ******* showing *** basic VTY Line ************* with *** routers ** each end:Source: (Cisco nd)Vty ***** *** ********* utilized *** ********** for ****** *********** especially to *** ******* ****** like router/switch ** *** ******** ** **** ** ************ ****** ************* *** *** *** telnet ************* *** *** service router ** ** given below:With the subsequent ************* ** ****** ** R3 when ** operator or ****** links *** ****** service ** the ****** **** ** *** ***** topology consequently **** will be ********** *** * ******** username *** **** *** username **** be ****** *** ************** ** ** router from *** ****** configurationSupporting ****************** * Spanning-Tree Port States ** * ****** StackNETWORK ***** ***** COMMANDSWe **** ********** **** ** *** ******* ******* and **** the communication **** the *** ********* ** *** *** ******* by *** ** ******* ******** ** ********** ** ***** like **** ********** ******** ******* *** ***** *** shown in *** ***** figures ** ****** network configuration ******** ********* *** *** ******** **** ** *********** the ************* ***** the ***** ****** ***** is *** **** results of *** communication ***** *** *** ***** like ******* and ******* ** the XYZ *********** within *** systems ******** at the ***** ***** ******* in *** *** ****** ** ****** ************* here ** ******** ** ****** * fresh session through *** scheme It ** generally entreated ************* by ******** ** the "login:" ***** prompt ** the ********** terminal ***** might be ******* ** the shell *** ***** *** be summoned ** * sub-process bSource: ****** nd)The ***** ************* ******** **** for the ****** or other ****** ************* ** *** *** ******* **** ** ***** **** *** Cisco ****** configuration ****************************** *** NETWORK ************* ************* ** * **** ******* in *** ************** of *********** the current ******* ** *** ******* arrangement ** ************ **** *** **** to ******* **** scheme *** ***** ******** *** neglected is *** ******* ******* ** your ******* ******** ** ******* ************* *** **** have an ***** location proposal with ******** development *********** *** ************ **** being communicated **** *** arrangement * **** ****** in ******* structures ** ******* ****** Routing ************* ****** **** switches ******** ** * *** levels *** instance ************* *** ******** ****** ** subnetworks *********** *** formerly ********* **** *********** ******* and ***** all *** formerly combined ** zones *** ****** *** ** **** **** ******** ********** ** * ************** *************** ********** Network ************* Issues *** *************** at **** *** ***** ** *** ************* ***** ** THE ****** ******** **** ** CAUSING ** * **** ******** THE ************* *********** ** * “point-to-point” ********** ** * **** ****** ************* fault ** *** ********** *** *** duplex approach to **** ** ****** **** ** *** ********** *** consent *** ************* **** ** “auto *********** ******* *** ********** finishes up ** *** **** ** half-duplex ** ******* **** **** *** ******** ****** mode fixed ** complete no ****** ************** error ** shown ** below:Fig ****** ***** IN *** SWITCH ********** (Testout 2016)Here *** PortFast ** ** ********** solution that *** ******** ******* **** *** * **** ** interface that ********** **** a **** ** the ***** when *** ********** comes ** ** this port *** ******** ****** the **** ****** ** the *** and ***************** ***** to the ******* ******** ***** **** ** **** ********** ****** ******** *** ACCESS ***** AS **** ** **** ****** ** *** ******* *** PORTFAST **** ***** improvement ******* ******* or ****** ********* ** ***** *** STP ****** *********** *** preserve the ******* ******** expectable *** devices after the ****** ***** **** have STP ******** ******* are not ******* to ****** *** *** ******* topology ** *** response ** ***** *** **** ***** ******* inactivates *** **** ***** *** ******** ******* ********** The **** ***** changes *** switch port **** * message and ********** ***** ******** on the ****** consoleYou *** ******* ** ****** ** STP ******** **** ***** on * universal ***** **** ******* **** ****** ***** that have PortFast switch ********** By defaulting *** **** ***** ** ************ ********** ***** **** GUARD generally ** *** switch *** ****** the ********* ****************** (CONFIG) ************** ******** ********* ********* ****** *********** BPDU ******** on a ******** ****** port ******* the ***** ****************** ******** ************** BPDUGUARD ********* *** subsequent ******* ** authenticate *** **** ************* *** *** ************* ** the ************************ ************* SUMMARY TOTALS                 Works CitedCisco (2015) *************************************** ***** ********** ********* from ****** **************************************************************************************************************************** **** *********** the ***** **** *** 4 ********* **** ****** ************************************************* **** lan-switching in *** ********************** ********* **** ****** ********************************************************************************************** **** Sample TTY ***** Configuration ********* **** ****** ****************************************************************************************************************************** * ****** ‎ * ****** *********** Security ********** ******** ***** ******* ********* from *********** wwwciscopresscom/articles/articleasp?p=1218144&seqNum=3McCabe * * ****** ******* ******** ************ *** Design ****** Kaufmannmicrosoft (nd) **** ** DHCP? : ******* Host ************* Protocol (DHCP) ********* **** ********** ************************************************** (v=ws10)aspxRooney * ****** ** ******* ********** ********** *** ******** **** Wiley ***** ******* **** *********************************************** Retrieved **** ***** http://wwwsansorg/reading-room/whitepapers/wireless/securing-wireless-access-point-settings-anyways-1405Testout ***** June) ****** ** ************* *** ************* Training * ******* LabSim ********* **** Testout: ************************ * (2015) **************** ********** *** ******* ********* **** ******** ************************** * ****** ***** ** Networking ***************** & ****** * ****** Computer ******** ********* ********************** (nd) designing-secure-local-area-network ********* from wwwsansorg: **********************************************************************************************

Click here to download attached files: XYZ COMPANY NETWORK DESIGN.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question