ACME, Inc. is growing like crazy! Now, we need to put into place a more secure and faster connection


ACME, Inc. is growing like crazy! Now, we need to put into place a more secure and faster connection between our headquarters and our satellite offices. The two locations are approximately one mile apart and are in a heavily populated area.You can make assumptions as to what technologies, cabling, etc. are available.In a Word document, you need to lay out, how you would connect these two facilities together using what you feel to be the best solution.Include a budget, figures are going to be a range, which is understoodWhat technologies, hardware, software, cabling, etc. are you using to make the connectionWhy is your choice the best choice (justify!)?Attached are my two previous assignments.


Don't use plagiarized sources. Get Your Custom Essay on
ACME, Inc. is growing like crazy! Now, we need to put into place a more secure and faster connection
Just from $13/Page
Order Essay

Unformatted Attachment Preview

ACME Inc Network Proposal
ISSC 341
July 12, 2019
ACME Inc Network Proposal
A reliable and secure network is a common goal for any organization. The level of an
organizations information in our current times is greatly depended on the existence of a network
infrastructure with the capability of providing this as well as being efficient. Therefore, when
coming up with a plan for a proposed network for the ACME Inc we must consider many factors
ranging from the cost to set up the network to the client network requirements. The client needs
and expectations guide us to develop a network that is secure and can provide the needed
services with no hustle at all. When developing a network infrastructure for ACME based on
office schematics provided it is important to look at all the details necessary for this network
setup. Therefore, we look at all aspects of the network from equipment needed and their cost,
timeline of installation of the equipment, the overall network topology and the basic network
The ACME network will employ a hybrid type of topology that involves a star-bus network
topology. This topology is more suited to cater for the form of network distribution from room B
to the offices. Each office will form a star topology that connects to the main network through a
fast connection from room B forming a type of bus. The main cable will run through the wall
plates across the office walls providing connection to that office through a central switch or
router. This topology is more efficient since it will easily support expansion of the network and
allow for new nodes to be added to the network easily. With main topology decided on, the basic
network configuration will depend on how many offices and number of floors on the building.
Each floor will have its own router that is connected to the core router in room B. Each router
will further have a unique IP address that will be used to route information between users and the
internet. Furthermore, multiple switches will exist in the building with every office having one to
connect various devices to the network. Medium sized switches with 24 ports can be used.
The switches will have direct connections to the router which will further be connected to our
original bus cable. Since the switches only provide physical access to the network, multiple
access points will be setup on each floor with unique WPA2 password encryption to protect the
network. The main control center of the network is room B which has the network closet. This
structure will house multiple network devices like the network servers. The closet will contain
the DHCP server which is expected to handle automatic IP configurations, Web server to handle
web requests, VPN server to handle security, an ASA firewall, the authentication, vulnerability,
storage and FTP servers. The FTP, Web server and VPN can be configured to exist in a
demilitarized zone to provide an extra layer of security to the network. To install and configure
all the devices is a task that will take some time. The table below shows an estimate of the
timeline to setup everything.
Lay Cabling
Connect Port Plates and Terminate Cables
Connect & Configure Routers
Expected Duration
2 days
11/2 days
/2 day
Add Servers & Configure firewalls
Setup Access points and Switches
Final Configurations
/2 day
1 day
1 day
61/2 days
The above timeline provided is only an estimate of the expected duration in installing and
configuring devices on the network. In reality any of these actions/processes may take longer
than expected or take less time. All this can be determined during the time of setting up the
Most of the devices used for the network setup are from Cisco vendor. Apart from the estimated
time of installation a list of the devices that will be required to the entire network setup is
provided below.
Access point
Ups and Power
Port Plates
Punch Boards
Price per Item
Gao, J., Yang, Z., Chen, K., Sun, C., & Nevatia, R. (2017). Turn tap: Temporal unit regression network for
temporal action proposals. In Proceedings of the IEEE International Conference on
Vision (pp. 3628-3636).
Zhu, Y., Zhang, C., Zhou, D., Wang, X., Bai, X., & Liu, W. (2016). Traffic sign detection and recognition
using fully convolutional network guided proposals. Neurocomputing, 214, 758-766.
Running Head: NETWORK PLAN
Network Plan
ISSC 341
July 19, 2019
Network Plan
With the initial proposal for network infrastructure and preferred network topology
chosen, the next step will include coming up with a detailed report on how to setup the network.
Configuration of network devices plus network subnetting is also a needed step that must be
taken. Any network especially large corporate networks must have subnetworks that exist within
the organization as virtual LAN networks. This is an approach that ensures it is easy to manage
the corporate network as well as expand the network when the time comes. As earlier proposed,
each and every department is to exist in its own virtual LAN. This approach will see each
department receive a unique network address provided by the DHCP server. Furthermore, each
department will thus have a network router which will exist to control and route information
between that particular network subnet and the rest of the network. The five expected
departments will obviously not be on the same floors of the building. With this in mind, it will be
easier to map the entire network based on the department floor (Iversen, 2015).
Assuming the facility has about three floors, the ideal place to have the core of the
network i.e. the servers, main gateways, firewall, router and modem would be the third floor of
the facility. The departments can have access to the rest of the floors. The network setup
therefore will have the top floor of the facility to be the main floor depending on number of
floors available in the facility. In our efforts to bring the network online, we first start with the
internal network. We bring the internal network online and when its fully functional we then
provide access to the internet via the company main firewall. For this process, we first setup the
network skeleton which includes connecting all the routers and switches together. The next step
would be to configure the switches and routers with the needed configuration. The network
servers will have static IP addresses on the corporate network. This will make them easier to
manage and control. This will also ensure their easy use since access is through firewall through
a static route. We then setup a DHCP server and configure it with all the network subnets and
their address pools.
With this in mind, it becomes easier to add hosts to the various network segments since
we have an online DHCP server. Therefore, we can now setup the various servers that will be
needed on the network. The server configuration is the next step since each server will have a
role on the network. The cooperate network is designed so that each employee has a company
account they can use to logon to the network. This information is handled by an authentication
server. This is a step that will ensure security to the network by preventing unauthorized access
to the network. Furthermore, the users have limited access to the network. This simply means
they do not have administrator access to the network (Klonidis, 2015). They therefore cannot
access certain information from company servers without authorization. After all servers are
setup, we can go forward and add users to the network by creating accounts with passwords for
them plus allocating them company emails. The final step will then be connecting the internal
network to internet. This will be achieved by using an ISP of choice. A DSL modem will then be
connected to the main company router which is further connected to a firewall to filter out
network traffic. The firewall needs configuration to set policies and protocols allowed through it.
The modem will provide a dialup connection to the internet. The routers on the other
hand will have to have configured routing tables. Dynamic routing tables would be the most
convenient. This will involve each router constantly updating its routing table in reference to the
previous router. Loopback addresses will be needed when accessing the internet. Sample
network IP Addressing table and sample configurations are provided below (Wang, 2015).
Sample Configuration of a router
>(config)# int vlan 1
>(config-if)# No shutdown
>(config)# int fa0/0
>(config-if)# >ip address
IP Addressing Table
Net ID
Usable Range
Outside Sales
Subnet Mask
Value 24
Broadcast 24 24 24 24
Iversen, V. B. (2015). Teletraffic engineering and network planning.
Klonidis, D., Cugini, F., Gerstel, O., Jinno, M., Lopez, V., Palkopoulou, E., … & Betoule, C.
spatially flexible
operations. IEEE Communications
Magazine, 53(2), 69-78.
Wang, Z., Zhang, B., & Wang, Y. (2016). Review of power distribution network planning.
In Electrical and
Control Engineering & Materials Science and Manufacturing: The
Proceedings of Joint Conferences
(ICMSM2015) (pp. 141-150).

Purchase answer to see full

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more