Touchstone Task 2.2_ Planning IP Address Assignments Questions

docx

School

Portland Community College *

*We aren’t endorsed by this school

Course

212

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

8

Uploaded by BaronRoseGuineaPig68

Report
Name: Date: Touchstone Task 2.2: Planning IP Address Assignments Review the scenario and client expectations about Greenfield Properties. Make sure you also review the additional client expectations related to this Touchstone Preparation. Based on the information provided by the client, answer the following questions in 2-4 sentences each. Be sure to explain your answers in detail. Although this network is rather small, subnetting it can still be beneficial. What are some reasons why? If you need some help, this article may be useful. Subnetting increases performance and speed by creating proper routing for internet traffic. It also increases network security by increasing awareness of route maps. Subnetting is valuable because it makes networks more organized. It also helps make sure that networks are uncongested from large quantities of data being uploaded onto one network. How do you plan to segment the network? Explain your strategy, and list the subnets you would create. I plan to segment my network by consolidating network resources. I established that combining similar network resources goes a long way in enhancing the protection
of these resources against threats from third-party individuals. The subnets will comprise low-sensitive resources and the most sensitive data. In this regard, the low-sensitive resources would be grouped with low-sensitive resources (Zhao et al., 2014, 988). On the other hand, the most sensitive data would be kept with resources of similar importance. The
segmentation will thus be based on the functions or permissions assigned to each user. This would ensure that the organization has maintained tighter security controls in many areas of its operations, thus resulting in increased flexibility. I plan to segment my network by consolidating network resources. I established that combining similar network
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
resources goes a long way in enhancing the protection of these resources against threats from third-party individuals. The subnets will comprise low-sensitive resources and the most sensitive data. In this regard, the low-sensitive resources would be grouped with low-sensitive resources (Zhao et al., 2014, 988). On the other hand, the most sensitive data would be
kept with resources of similar importance. The segmentation will thus be based on the functions or permissions assigned to each user. This would ensure that the organization has maintained tighter security controls in many areas of its operations, thus resulting in increased flexibility. I plan to segment my network by consolidating network resources. I
established that combining similar network resources goes a long way in enhancing the protection of these resources against threats from third-party individuals. The subnets will comprise low-sensitive resources and the most sensitive data. In this regard, the low-sensitive resources would be grouped with low-sensitive resources (Zhao et al., 2014, 988). On the other
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
hand, the most sensitive data would be kept with resources of similar importance. The segmentation will thus be based on the functions or permissions assigned to each user. This would ensure that the organization has maintained tighter security controls in many areas of its operations, thus resulting in increased flexibility. By combining network resources, I intend to divide my network into segments. I proved that grouping related network resources together significantly improves their defense against intrusions by unauthorized users. The most sensitive data will be in the subnets along with low-sensitivity resources. The low-sensitive resources would be grouped with other low-
sensitive resources in this sense. Conversely, the most private information would be stored with equally important resources. As a result, the division will be predicated on the roles or authorizations allotted to every user. This would guarantee that the company has kept more stringent security measures in place across a wide range of its activities, leading to more flexibility. Looking at the scenario document, how many subnets do you think you will need, and how many hosts must each of them support? The scenario document indicates that the number of subnets I'll need depends upon the kind of features that the company will support. I would need seven subnets based on the features in the scenario that was presented. Five hosts would be supported by each subnet. Given the needed numbers of hosts that each subnet will support, what subnet masks should be used for each of them? For each subnet, state the number of mask bits (for example, /27) and the subnet mask to use (for example, 255.255.255.224). You may find it useful to use a subnetting calculator, such as this calculator . (Ref: IP Subnetting ) Do you think it would be useful to implement VLANs in the proposed network? Why or why not? (Ref: Virtual LANs ) Given all the advantages that VLANs offer, it would be beneficial to incorporate them into the proposed network. Having the ability to access the internet for visitors without them needing to be on the same network as staff members is one advantage of setting up a VLAN. Other benefits of installing a VLAN include cost savings for the company, a decrease in threats and hazards to sensitive data, and ease of problem-solving due to people operating on different VLANs.