subject

Instruction Sheet Slugworth Candies, LLC, has grown extensively over the last few months. In addition to the substantial increase in the size of each department, the Research and Development and Security sections have moved to a remote site in the mountains. Slugworth now consists of the Executive Staff (28)[1], Human Relations (16), Finance and Accounting (20), Marketing and Sales (25), IT Section 1 (8), and Bakery (210) at the main site; and located at the remote site, Research & Development (225-250), IT Section 2 (8), and Security (40).
Although the bakery has over 200 employees, it requires only 50 workstations plus secure access to the local database which contains top-secret recipes.
Your group has been chosen to design a new network for Slugworth Candies, LLC.
Ensure all the following details are included:
IP Addresses
Public IP addresses
The IP address 214.73.97.128/25 is assigned to the company from a new ISP.
Assign static addresses for security and ease of management
Assign ranges of available public IP addresses for NAT services
THE PUBLIC PART OF THE NETWORK SHOULD BE SEPARATE BOTH IN DIAGRAM AND LAYOUT. USERS WILL NOT DIRECTLY USE THESE IPs, THEY ARE FOR DMZ, PUBLIC SERVERS, NAT, ETC.
Private IP addresses
Assign private IP subnet addresses to each department
Use variable-length addressing as needed to provide the closest number of addresses required plus an additional 25% to accommodate future growth
List each department showing the (1) private IP network address, (2) range of host addresses on the sub-network, and (3) broadcast address.
Assign static addresses for security and ease of management
Include DMZs with secure data store for top-secret candy recipes
Diagram two wireless networks at each campus location: (1) one secure, private network that spans the campus, and (2) one open, public wireless network that spans the campus.
Device name (diagram)
Describe strategy and assign names to distribution and core devices (diagram)
Devices
Device name (diagram)
Describe strategy and assign names to distribution and core devices (diagram)
Redundancy (diagram)
Protocols
Include Layer 2 and Layer 3 protocols, as needed
Cabling (diagram)
Specify cabling for each link
Be cost efficient using best infrastructure for the situation
Security (diagram)
Specify strategy for security
Firewalls
Wireless protocol
Services (DHCP, DNS, NAT, Database, Email, Web, File, Print)
Include content of DHCP and NAT services
Routing Tables
Statically assign local internetwork addresses with summariztion
Routing table for each router
Identify access, distribution, and core layers (diagram)
[1] The number of employees in each department follows the department name.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 03:00
State 7 common key's for every keyboard
Answers: 1
question
Computers and Technology, 24.06.2019 00:50
3. what is the output of the following statements? temporary object1; temporary object2("rectangle", 8.5, 5); temporary object3("circle", 6, 0); temporary object4("cylinder", 6, 3.5); cout < < fixed < < showpoint < < setprecision(2); object1.print(); object2.print(); object3.print(); object4.print(); object1.set("sphere", 4.5, 0); object1.print();
Answers: 1
question
Computers and Technology, 24.06.2019 02:30
Which option completes the explanation for conflict of interest in an organization
Answers: 1
question
Computers and Technology, 24.06.2019 16:00
"gps interaction and cognitive process" respond to the following: imagine that you have been asked to design a gps product that will have voice recognition and bluetooth capability. discuss and conceptualize a user interaction model. predict two (2) problems that may arise in gps products with voice recognition and bluetooth capability. recommend solutions for each of these issues. attention is one of the six cognition processes. when attention is applied to a design, the goal is to make it easier for the end user to quickly locate where he / she should type information on the computer or mobile device screen. compare and contrast how the google search engine and the microsoft bing search engine employ the attention cognition process. provide your opinion as to which search engine better employs the attention cognition process and explain why.
Answers: 3
You know the right answer?
Instruction Sheet Slugworth Candies, LLC, has grown extensively over the last few months. In addit...
Questions
question
English, 24.11.2021 14:00
question
Mathematics, 24.11.2021 14:00
question
English, 24.11.2021 14:00
question
English, 24.11.2021 14:00
question
Mathematics, 24.11.2021 14:00