Need Help With This Assignment?

Let Our Team of Professional Writers Write a PLAGIARISM-FREE Paper for You!

Touchstone Task 2.2 – Planning IP Address Assignments

Touchstone Task 2.2 – Planning IP Address Assignments

Review the scenario and client expectations about Greenfield Properties. Make sure you also review the additional client expectations related to this Touchstone Preparation.

Based on the information provided by the client, answer the following questions in 2-4 sentences each. Be sure to explain your answers in detail.

Although this network is rather small, subnetting it can still be beneficial. What are some reasons why? If you need some help, this article may be useful.
Subnetting a network yields various benefits for an organization. For example, subnetting divides broadcast domains, leading to proper routing of traffic that necessitates improved speed and network performance. Subnetting is also important because it boosts the network’s security. Subnets make employees within the organization more aware of route maps, easily identifying potential threats. Also, subnetting brings sound organization in running a large business, hence the organization enjoying full control over their traffic, network, data packets, and routers (Zhao et al., 2014, 986). Lastly, subnetting is also beneficial because it ensures that only a proportional amount of data is transferred over the network, reducing congestion that would otherwise cause the network performance to decline.
How do you plan to segment the network? Explain your strategy, and list the subnets you would create.
I plan to segment my network by consolidating network resources. I established that combining similar network resources goes a long way in enhancing the protection of these resources against threats from third-party individuals. The subnets will comprise low-sensitive resources and the most sensitive data. In this regard, the low-sensitive resources would be grouped with low-sensitive resources (Zhao et al., 2014, 988). On the other hand, the most sensitive data would be kept with resources of similar importance. The segmentation will thus be based on the functions or permissions assigned to each user. This would ensure that the organization has maintained tighter security controls in many areas of its operations, thus resulting in increased flexibility.
Looking at the scenario document, how many subnets do you think you will need, and how many hosts must each of them support?
Based on the scenario document, the number of subnets that I will require is pegged on the category of functionalities that will be maintained within the organization. Therefore, based on the functionalities in the scenario provided, I would require seven subnets. Each subnet would then support five hosts.
Given the needed numbers of hosts that each subnet will support, what subnet masks should be used for each of them? For each subnet, state the number of mask bits (for example, /27) and the subnet mask to use (for example, 255.255.255.224). You may find it useful to use a subnetting calculator, such as this calculator. (Ref: IP Subnetting)
Subnet Mask          CIDR Value

255.255.255.0        /24

255.255.255.128    /25

255.255.255.192    /26

255.255.255.22      /27

255.255.255.24      /28

255.255.255.24      /29

255.255.255.25      /30

Do you think it would be useful to implement VLANs in the proposed network? Why or why not? (Ref: Virtual LANs)
It would be useful to implement VLANs in the proposed network because of the numerous benefits that are brought by it. One of the benefits of implementing a VLAN is that it permits the guest users accessibility to the internet without necessarily being on the same network as the staff. The other significance of implementing a VLAN is saving money for an organization, reducing risks and threats of sensitive data, and resolving problems easily since the users operate on various VLANs (Gentile et al., 2021, p. 430).

References

Gentile, A. F., Fazio, P., & Miceli, G. (2021, November). A Survey on the Implementation and Management of Secure Virtual Private Networks (VPNs) and Virtual LANs (VLANs) in Static and Mobile Scenarios. In Telecom (Vol. 2, No. 4, pp. 430-445). MDPI.

Zhao, S. X., Zhang, P. L., Li, J., Tan, A. M., & Ye, F. Y. (2014). Abstracting the core subnet of weighted networks based on link strengths. Journal of the Association for Information Science and Technology65(5), 984-994.