0% found this document useful (0 votes)
31 views

This Study Resource Was: Question # 1

A virtual local area network (VLAN) would be suitable for GemTech's network needs. The network requires a design that can control traffic into and out of the corporate network, as well as route around link failures. The network addresses and subnet masks for the four departments are provided. Dynamic routing and BGP would allow the network to dynamically learn routes and advertise destinations to other routers to handle failures and routing to the internet. A network firewall with defined policies is important for security.

Uploaded by

Umm e Ayesha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

This Study Resource Was: Question # 1

A virtual local area network (VLAN) would be suitable for GemTech's network needs. The network requires a design that can control traffic into and out of the corporate network, as well as route around link failures. The network addresses and subnet masks for the four departments are provided. Dynamic routing and BGP would allow the network to dynamically learn routes and advertise destinations to other routers to handle failures and routing to the internet. A network firewall with defined policies is important for security.

Uploaded by

Umm e Ayesha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

QUESTION # 1

You are the network administrator for small firm GemTech with 8 sites and 1600 employees. You
currently manage the network infrastructure and are migrating from static to dynamic routing.
Each of the eight sites has 200 employees configured on a single LAN segment, and all sides are
connected back a central office at the corporate headquarters receiving their IP addresses through
DHCP. Each office is a separate subsidiary and has its own server systems for web services and
its own connection to the internet in the past, issues have come up concerning network traffic
taking sub-optimal pass through the corporate network out onto the internet. Corporate
headquarter office has 4 departments. These 4 departments have 64, 127, 254 and 510 employees

m
er as
respectively. Management wants the new network configuration to be able to control traffic into

co
and out of the corporate network as well as route around a link failure at any of the sites.

eH w
o.
1.1 Identify which type of network is required here? Why?
rs e
A virtual local area network (VLAN) would be suitable for above scenario. A VLAN
ou urc

allows a network of computers and users to communicate in a simulated environment
as if they exist in a single LAN and are sharing a single broadcast and multicast
o
aC s

domain. VLANs are implemented to achieve scalability, security and ease of network
vi y re

management and can quickly adapt to changes in network requirements and


relocation of workstations and server nodes.
1.2 Design a network for GemTech, Draw a complete architecture of the network
ed d
ar stu
is
Th
sh

This study source was downloaded by 100000826978244 from CourseHero.com on 05-28-2021 03:06:44 GMT -05:00

https://www.coursehero.com/file/67036956/CCN-assignmentdocx/
m
er as
co
eH w
o.
rs e
ou urc
o
aC s
vi y re
ed d
ar stu

1.3 What are the Network Address and Subnet Mask of this network?
Network Address Subnet Mask
Dept 1 (Class C) 195.101.1.0 225.0.0.0
is

Dept 2 (Class C) 199.110.5.0 225.0.0.0


Dept 3 (Class C) 210.187.4.0 225.0.0.0
Th

Dept 4 (Class B) 174.150.0.0 225.0.0.0


sh

1.4 Label the architecture you have drawn in 1.2 with correct IP configuration. Utilize
maximum host IP addresses do not waste unnecessary IP hosts.
1.5 What routing protocol would you recommend for the internal network?

This study source was downloaded by 100000826978244 from CourseHero.com on 05-28-2021 03:06:44 GMT -05:00

https://www.coursehero.com/file/67036956/CCN-assignmentdocx/
An interior gateway protocol (IGP) is a type of protocol used for exchanging routing
information between gateways within an autonomous system. This routing information can
then be used to route network-layer protocols like IP. Specific examples of IGPs include;
 Open Shortest Path First (OSPF),
 Routing Information Protocol (RIP),
 Intermediate System to Intermediate System (IS-IS)
1.6 What strategy would you recommend for routing to and from the internet?
Internet routing today is handled through the use of a routing protocol known as BGP
(Border Gateway Protocol). Individual networks on the Internet are represented as an
autonomous system (AS). Each individual autonomous system establishes BGP peering

m
sessions to other autonomous systems to exchange routing information.

er as
1.7 Given the constraints imposed by management, would static routing to the internet

co
eH w
be sufficient?

o.
Static routing is simply the process of manually entering routes into a device’s routing table
rs e
ou urc
via a configuration file. These routes can be entered by a network administrator who
configures the routes manually.
o

Static routing also does not handle failures in external networks well because any route that
aC s

is configured manually must be updated or reconfigured manually to fix or repair any lost
vi y re

connectivity.
In that case, dynamic routing would be sufficient because dynamic routing system
ed d

dynamically learn network destinations and how to get to them and also advertise those
ar stu

destinations to other routers. This function allows all the routers to learn about all the
destination networks that exist.
is

1.8 Does your new design require a reconfiguration of the current IP address in
Th

configuration?
Yes, as new configuration has been made in order to solve the problem, IP reconfiguration is
sh

required because multiple LANs are connected as VLAN.


1.9 Could a routing hierarchy be developed and deployed? Justify your answer
The Hierarchical routing system consists of several distributed Routing systems where each
of it is responsible for one network of the hierarchical network. The route optimization is

This study source was downloaded by 100000826978244 from CourseHero.com on 05-28-2021 03:06:44 GMT -05:00

https://www.coursehero.com/file/67036956/CCN-assignmentdocx/
done with an adapted version of the AntNet-algorithm. This algorithm explore the network
and find the shortest routes in time.
1.10 What is the importance of network firewall in GemTech network? And what
are the policies must be applied here?

Network firewalls are security devices used to stop or mitigate unauthorized access to private
networks connected to the Internet, especially intranets. The only traffic allowed on the
network is defined via firewall policies.
A network firewall can be configured so that any data entering or exiting the network has to
pass through it

m
Network Firewall Policies:

er as
co
Network Connections: All external and network connections must pass through a

eH w

network firewall.

o.
rs e
ou urc
 Network Firewall Change Control: Network firewall configuration rules and
permissible services rules must not be changed unless the permission of the
o

Information Security Officer and Network Manager has first been obtained.
aC s
vi y re
ed d
ar stu
is
Th
sh

This study source was downloaded by 100000826978244 from CourseHero.com on 05-28-2021 03:06:44 GMT -05:00

https://www.coursehero.com/file/67036956/CCN-assignmentdocx/
Powered by TCPDF (www.tcpdf.org)

You might also like