SlideShare a Scribd company logo
1 of 5
1
2
Intro To Networking: Assignment 3
Plan to how to bring the network online
The devices that will be used include:
Router
A router is an essential device in network connecting to the
internet. The router functions by; Joining the network to the
internet, managing the network's traffic, and offering basic
security. Three separate routers are required to connect the
networks with the internet as the offices are remote.
Firewall
A firewall is also required for the protection of the network
from illegal access to the network. Firewall is used to evaluate
all traffic, that is, incoming and outgoing.
Core Switch
A core switch is used where all departments' servers are
attached.
Switches
In this case, a separate switch is needed for each department.
Wires and connectors
Here CAT-6 cable and RJ-45 connectors are used for the
connection.
Wireless Access point
We need to use a Wireless Access point to use the WI-FI
facility
Basic Switch Configuration performed for each switch
· Assign a name to each switch.
· The access passwords should be set
· Set a command mode password.
· Configure the Layer 3 (network layer) address of each switch.
· Set the switch default gateway.
· Check the settings of the management LANs.
· Configure the default gateway and IP address for PC1, in each
department.
· Verify the connectivity.
· Set the port speed and duplex configuration for the Fast
Ethernet interface
· Now save the configuration made
· Examine the configuration file for a startup.
Connections (On each office)
Computers of each department are attached to a switch,
considering that separate switches should be used for each
department. All the five departments' servers are connected to
the Core Switch, a standard switch where all departments are
connected. CAT -6 cable with RJ-45 connector can be used for
this connection. The wireless access point gets connected to the
main switch. Router is used, configured, and attached to the
main switch. The firewall is then installed between the routers.
References
Hasan, M. M., Ahmed, E., & Hossain, M. F. (2019). Developing
Network Security-Enhanced Model for an Enterprise Network.
Goni, O. (2021). Design, Deployment and Implementation of
Local Area Network (LAN) at BAEC Head Quarter.
1
2
Introduction to networking
Student’s Name
Institution Name
Course Title
Instructor’s Name
Due Date
Introduction to networking
Estimated Purchases List
Safe Stream Gigabit Broadband VPN Router TP-Link TL-
R600VPN = 52.93 dollars
Switch (409.21 x 5) + TP-Link T1600G-52PS Jetstream 48-Port
Gigabit Smart PoE = 2046.05) = $2,046.05
Data Rack 390mm Deep = 77.49 dollars
Cyber Power Smart App Sine wave PR1500LCD UPS - 1050W
- 1500 VA - 17 Ah = 449.95 dollars
(Estimated 840ft) CE Cat6 Cable U/UTP Dca LS0H 305 Meter
Box = 102.67
Total amount: 2,626.42 dollars (Internet Set up Cost, 2020).
Estimated timeline of installation
A 2,000-foot network is anticipated to take 30 to 40 hours to
establish by professionals. However, as this network is
projected to be 840 feet long, I've estimated that the setup will
take over 25 hours.
Chosen Typology
The chosen typology is the star typology. In star-type
networking, one central switch connects the network's remote
ends, which connect to a shared switch. This architecture is the
most popular choice in terms of efficiency, survivability, and
ease of troubleshooting. It is possible to reduce the amount of
connection media needed for the network because each remote
end does not need to be connected to every other component
(Computer Network Topology, 2020). This topology has a
certain level of expected survivability since it recognizes that
even if a remote end of the network loses connectivity, the
network as a whole will still be usable. This design has
additional benefits for troubleshooting because defects may be
quickly discovered at a central place.
Basic Network Configuration
Internet/network sharing and application installations are
supported in the Basic Network configuration. Four independent
networks, each with its switch, will be joined into a single
network by a single popular switch when the network is
installed. Tenant-specific firewall configurations and port
assignments will be possible thanks to this feature. The single
popular switch will be linked to the shared router, which will
allow the workplace network to access the Internet.
References
Computer Network Topology - Mesh, Star, Bus, Ring, and
Hybrid. (2020). https://beginnersbook.com/2019/03/computer -
network-topology-mesh-starbus-ring-and-hybrid/
2020 Computer Network Installation Cost | Internet Set Up
Cost. (2020) https://www.fixr.com/costs/hardwired-computer-
network

More Related Content

More from EttaBenton28

1Child Development Observation and Reflection
1Child Development Observation and Reflection1Child Development Observation and Reflection
1Child Development Observation and Reflection
EttaBenton28
 
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
EttaBenton28
 
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
EttaBenton28
 
1CHAPTER 01G L O B A L R E P O R T O N2G
1CHAPTER 01G L O B A L  R E P O R T  O N2G1CHAPTER 01G L O B A L  R E P O R T  O N2G
1CHAPTER 01G L O B A L R E P O R T O N2G
EttaBenton28
 
1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHous1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHous
EttaBenton28
 
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
EttaBenton28
 
1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of the1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of the
EttaBenton28
 
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
EttaBenton28
 
1Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond21Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond2
EttaBenton28
 
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
EttaBenton28
 
1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of a1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of a
EttaBenton28
 
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
EttaBenton28
 
1Chapter 3 JAPANIntroductionJAPAN is an island countr
1Chapter 3 JAPANIntroductionJAPAN is an island countr1Chapter 3 JAPANIntroductionJAPAN is an island countr
1Chapter 3 JAPANIntroductionJAPAN is an island countr
EttaBenton28
 
1Chapter 10The InternetMass Communication Gets
1Chapter 10The InternetMass Communication Gets 1Chapter 10The InternetMass Communication Gets
1Chapter 10The InternetMass Communication Gets
EttaBenton28
 
1CHAPTER 1. INTRODUCTIONIntroduction to the Problem
1CHAPTER 1. INTRODUCTIONIntroduction to the Problem 1CHAPTER 1. INTRODUCTIONIntroduction to the Problem
1CHAPTER 1. INTRODUCTIONIntroduction to the Problem
EttaBenton28
 
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction 1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
EttaBenton28
 
1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS
1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS
1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS
EttaBenton28
 
1Change Proposal Summary ReportJessica RamosCapell
1Change Proposal Summary ReportJessica RamosCapell1Change Proposal Summary ReportJessica RamosCapell
1Change Proposal Summary ReportJessica RamosCapell
EttaBenton28
 
1Case Study Cystic FibrosisCystic Fibrosis Case Study
1Case Study Cystic FibrosisCystic Fibrosis Case Study1Case Study Cystic FibrosisCystic Fibrosis Case Study
1Case Study Cystic FibrosisCystic Fibrosis Case Study
EttaBenton28
 
1Causes and Effects of Literature Review ChallengesJamiah
1Causes and Effects of Literature Review ChallengesJamiah 1Causes and Effects of Literature Review ChallengesJamiah
1Causes and Effects of Literature Review ChallengesJamiah
EttaBenton28
 

More from EttaBenton28 (20)

1Child Development Observation and Reflection
1Child Development Observation and Reflection1Child Development Observation and Reflection
1Child Development Observation and Reflection
 
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
 
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
 
1CHAPTER 01G L O B A L R E P O R T O N2G
1CHAPTER 01G L O B A L  R E P O R T  O N2G1CHAPTER 01G L O B A L  R E P O R T  O N2G
1CHAPTER 01G L O B A L R E P O R T O N2G
 
1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHous1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHous
 
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
 
1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of the1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of the
 
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
 
1Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond21Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond2
 
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
 
1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of a1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of a
 
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
 
1Chapter 3 JAPANIntroductionJAPAN is an island countr
1Chapter 3 JAPANIntroductionJAPAN is an island countr1Chapter 3 JAPANIntroductionJAPAN is an island countr
1Chapter 3 JAPANIntroductionJAPAN is an island countr
 
1Chapter 10The InternetMass Communication Gets
1Chapter 10The InternetMass Communication Gets 1Chapter 10The InternetMass Communication Gets
1Chapter 10The InternetMass Communication Gets
 
1CHAPTER 1. INTRODUCTIONIntroduction to the Problem
1CHAPTER 1. INTRODUCTIONIntroduction to the Problem 1CHAPTER 1. INTRODUCTIONIntroduction to the Problem
1CHAPTER 1. INTRODUCTIONIntroduction to the Problem
 
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction 1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
 
1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS
1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS
1CHANGES OF ORGANIZATIONS9CHANGES OF ORGANIZATIONS
 
1Change Proposal Summary ReportJessica RamosCapell
1Change Proposal Summary ReportJessica RamosCapell1Change Proposal Summary ReportJessica RamosCapell
1Change Proposal Summary ReportJessica RamosCapell
 
1Case Study Cystic FibrosisCystic Fibrosis Case Study
1Case Study Cystic FibrosisCystic Fibrosis Case Study1Case Study Cystic FibrosisCystic Fibrosis Case Study
1Case Study Cystic FibrosisCystic Fibrosis Case Study
 
1Causes and Effects of Literature Review ChallengesJamiah
1Causes and Effects of Literature Review ChallengesJamiah 1Causes and Effects of Literature Review ChallengesJamiah
1Causes and Effects of Literature Review ChallengesJamiah
 

12Intro To Networking Assignment 3Plan to how to bring th

  • 1. 1 2 Intro To Networking: Assignment 3 Plan to how to bring the network online The devices that will be used include: Router A router is an essential device in network connecting to the internet. The router functions by; Joining the network to the internet, managing the network's traffic, and offering basic security. Three separate routers are required to connect the networks with the internet as the offices are remote. Firewall A firewall is also required for the protection of the network from illegal access to the network. Firewall is used to evaluate all traffic, that is, incoming and outgoing. Core Switch A core switch is used where all departments' servers are attached. Switches In this case, a separate switch is needed for each department. Wires and connectors Here CAT-6 cable and RJ-45 connectors are used for the connection. Wireless Access point We need to use a Wireless Access point to use the WI-FI facility Basic Switch Configuration performed for each switch
  • 2. · Assign a name to each switch. · The access passwords should be set · Set a command mode password. · Configure the Layer 3 (network layer) address of each switch. · Set the switch default gateway. · Check the settings of the management LANs. · Configure the default gateway and IP address for PC1, in each department. · Verify the connectivity. · Set the port speed and duplex configuration for the Fast Ethernet interface · Now save the configuration made · Examine the configuration file for a startup. Connections (On each office) Computers of each department are attached to a switch, considering that separate switches should be used for each department. All the five departments' servers are connected to the Core Switch, a standard switch where all departments are connected. CAT -6 cable with RJ-45 connector can be used for this connection. The wireless access point gets connected to the main switch. Router is used, configured, and attached to the main switch. The firewall is then installed between the routers. References Hasan, M. M., Ahmed, E., & Hossain, M. F. (2019). Developing Network Security-Enhanced Model for an Enterprise Network. Goni, O. (2021). Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter. 1
  • 3. 2 Introduction to networking Student’s Name Institution Name Course Title Instructor’s Name Due Date Introduction to networking Estimated Purchases List Safe Stream Gigabit Broadband VPN Router TP-Link TL- R600VPN = 52.93 dollars Switch (409.21 x 5) + TP-Link T1600G-52PS Jetstream 48-Port Gigabit Smart PoE = 2046.05) = $2,046.05 Data Rack 390mm Deep = 77.49 dollars Cyber Power Smart App Sine wave PR1500LCD UPS - 1050W - 1500 VA - 17 Ah = 449.95 dollars (Estimated 840ft) CE Cat6 Cable U/UTP Dca LS0H 305 Meter Box = 102.67 Total amount: 2,626.42 dollars (Internet Set up Cost, 2020). Estimated timeline of installation A 2,000-foot network is anticipated to take 30 to 40 hours to establish by professionals. However, as this network is projected to be 840 feet long, I've estimated that the setup will take over 25 hours.
  • 4. Chosen Typology The chosen typology is the star typology. In star-type networking, one central switch connects the network's remote ends, which connect to a shared switch. This architecture is the most popular choice in terms of efficiency, survivability, and ease of troubleshooting. It is possible to reduce the amount of connection media needed for the network because each remote end does not need to be connected to every other component (Computer Network Topology, 2020). This topology has a certain level of expected survivability since it recognizes that even if a remote end of the network loses connectivity, the network as a whole will still be usable. This design has additional benefits for troubleshooting because defects may be quickly discovered at a central place. Basic Network Configuration Internet/network sharing and application installations are supported in the Basic Network configuration. Four independent networks, each with its switch, will be joined into a single network by a single popular switch when the network is installed. Tenant-specific firewall configurations and port assignments will be possible thanks to this feature. The single popular switch will be linked to the shared router, which will allow the workplace network to access the Internet. References Computer Network Topology - Mesh, Star, Bus, Ring, and Hybrid. (2020). https://beginnersbook.com/2019/03/computer - network-topology-mesh-starbus-ring-and-hybrid/ 2020 Computer Network Installation Cost | Internet Set Up