subject

Instruction Sheet Slugworth Candies, LLC, has grown extensively over the last few months. In addition to the substantial increase in the size of each department, the Research and Development and Security sections have moved to a remote site in the mountains. Slugworth now consists of the Executive Staff (28)[1], Human Relations (16), Finance and Accounting (20), Marketing and Sales (25), IT Section 1 (8), and Bakery (210) at the main site; and located at the remote site, Research & Development (225-250), IT Section 2 (8), and Security (40).
Although the bakery has over 200 employees, it requires only 50 workstations plus secure access to the local database which contains top-secret recipes.
Your group has been chosen to design a new network for Slugworth Candies, LLC.
Ensure all the following details are included:
IP Addresses
Public IP addresses
The IP address 214.73.97.128/25 is assigned to the company from a new ISP.
Assign static addresses for security and ease of management
Assign ranges of available public IP addresses for NAT services
THE PUBLIC PART OF THE NETWORK SHOULD BE SEPARATE BOTH IN DIAGRAM AND LAYOUT. USERS WILL NOT DIRECTLY USE THESE IPs, THEY ARE FOR DMZ, PUBLIC SERVERS, NAT, ETC.
Private IP addresses
Assign private IP subnet addresses to each department
Use variable-length addressing as needed to provide the closest number of addresses required plus an additional 25% to accommodate future growth
List each department showing the (1) private IP network address, (2) range of host addresses on the sub-network, and (3) broadcast address.
Assign static addresses for security and ease of management
Include DMZs with secure data store for top-secret candy recipes
Diagram two wireless networks at each campus location: (1) one secure, private network that spans the campus, and (2) one open, public wireless network that spans the campus.
Device name (diagram)
Describe strategy and assign names to distribution and core devices (diagram)
Devices
Device name (diagram)
Describe strategy and assign names to distribution and core devices (diagram)
Redundancy (diagram)
Protocols
Include Layer 2 and Layer 3 protocols, as needed
Cabling (diagram)
Specify cabling for each link
Be cost efficient using best infrastructure for the situation
Security (diagram)
Specify strategy for security
Firewalls
Wireless protocol
Services (DHCP, DNS, NAT, Database, Email, Web, File, Print)
Include content of DHCP and NAT services
Routing Tables
Statically assign local internetwork addresses with summariztion
Routing table for each router
Identify access, distribution, and core layers (diagram)
[1] The number of employees in each department follows the department name.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 19:50
Python write an expression that executes the loop body as long as the user enters a non-negative number. note: if the submitted code has an infinite loop, the system will stop running the code after a few seconds and report "program end never reached." the system doesn't print the test case that caused the reported message. sample outputs with inputs: 9 5 2 -1
Answers: 3
question
Computers and Technology, 21.06.2019 21:00
The mode is generally used when delivering a presentation to an need now
Answers: 1
question
Computers and Technology, 22.06.2019 06:30
What result from the passage of this amendment
Answers: 1
question
Computers and Technology, 22.06.2019 07:00
Our primary purpouse as electricians is to do wich of the following core concepts? a: install electrical components in a way they can be upgraded b: install electrical equiptment in a way that reduces heat c: install electrical systems in a safe manner d: only b and c
Answers: 1
You know the right answer?
Instruction Sheet Slugworth Candies, LLC, has grown extensively over the last few months. In addit...
Questions
question
Mathematics, 08.04.2021 03:50
Questions on the website: 13722367