Submitted by: Submitted by domino33
Views: 610
Words: 1121
Pages: 5
Category: Science and Technology
Date Submitted: 11/23/2010 07:14 AM
Taylor & Sons Financial Consulting Co.
By:
Bryan Sutherland, Daniel Goodsell and Marc Goldberg
NTC/240
University of Phoenix Online
Robert Chow
Network Logic
We are recommending a network layout that consists of a single leased T1 line as our internet backbone. The main communications closet will be on the second floor putting it in the middle of the network; this will help with cable running. From here we would use a Cisco 520 Secure Router with a 24 Channelized T1/E1 Trunk Card. This router offers flexibility, easy management and security for small businesses. It combines Internet access, advanced security, virtual private network (VPN) access and optional wireless networking. To enhance security even more we recommend implementing a Cisco PIX Firewall. This will allow for better security as well as the ability to set up a DMZ for all servers that will be on the network.
From the Firewall, six Cisco Catalyst 2950 Series switches will be connected to provide network access for all network devices. Taylor & Sons has 100 users so well over 100 network devices. Three 48-port switches would allow all devices to be connected and allow for expansion. The Cisco Catalyst 2950 switches provide the ability to cascade switches to allow them to be managed as a cluster. There would be one switch per floor distributing the access equally. Each switch will be connect to two other switches providing redundancy and increased availability. Trunk connections will be used between switches at 10Gbps speed using CAT 6 cabling. These switches also are capable of using Virtual LAN technology which will help in securing the network even further. VLANs allow for segmenting the network by using switches and not routers. We could use them to segment departments in the company as well as liked devices. If VoIP phones will be used then a call manager will be needed to manage these phones and their options.
The servers that may be required to run this network could consist of but...