Network Proposal
Network Proposal
Student’s Name:
Institutional Affiliation:
Course:
Instructor:
Due Date:
Introduction
The project is a network proposal for a small business. The business has 18 workstations on a
one-floor office. the workstations consist of 4 private offices and 14 workstations divided into
cubicles. The office already has internet from a local internet service provider. The network will
require different firewalls to ensure the protection of databases. In this project, we will determine
the hardware and software requirements for the Local Area Network as well as provide protected
internet access.
There are various network components required including hardware and software. The hardware
components include routers, switches, access points, and servers. The software is mainly the
firewalls needed for network protection. The LAN will require the configuration of IP addresses.
The network illustration will give a visual description of the requirements mentioned in the
inventory. This will show the layout of the network and how all the components will be
interconnected.
Security is paramount for any network. Network security protocols like firewalls will be key
components of this project. The network requires protection from access by unauthorized users.
Secondly, the workstation and given servers are required to be inaccessible from the internet. We
will create an internal area that cannot be accessed from the internet and still allow the business
The business is run solely on one floor hence requires 3 (10 ports) switches for the servers
workstations. There will be one access point and 1 router. Servers needed for the internal area are
DHCP, Proxy, and database servers. The DHCP server is needed for the IP address
configuration. The web and mail servers will be accessible from the internet bastion host server.
To be able to create an internal area in the network, we will require the DMZ network to create a
barrier that prohibits access from the internet with 2 routers. Web filter firewall will be used to
prohibit employees access to specified websites. We need a network security protocol like a
secure socket layer (SSL) to safeguard internal data from access by unauthorized personnel.
ITEM QUANTITY
1. Access point 1
2. Router 3
3. Switch 3
4. Firewalls 2
5. Network security protocol 1
6. DHCP server 1
7. Proxy Server 1
8. Database Server 1
9. Web Server 1
10. Mail Server 1
11. Bastion Host 1
IP Address Range
ADDRESS RANGE
192.158.1.38 192.158.1.38.0- 192.158.1.38.18
Hostname Range- main computer is SOHO, the hostname range is 1.SOHO.com-18.soho.com.
NETWORK DIAGRAM
External firewall
ISP
Server router
DHCP
Server
Database
server
PRIVATE OFFICES
switch
PC
PC PC PC PC
PC PC
PC PC
C3 C2 C1
PC PC
PC
PC
PC PC
PC
PC
PC
Network Security
a) To prohibit the access of the DHCP, Proxy, and Database servers as well as the
In order to prohibit the access of a specific part of the network from the internet, we will use the
DMZ. The DMZ is a perimeter network that creates an internal and external firewall by the use
of two routers. The external firewall will allow access of the internet and protects from known
attacks. The internal firewall which sits between the perimeter network and the LAN ensures
The network security protocols will be essential in ensuring the data is not accessed by
unauthorized personnel. In this case, we recommend the SSL (system security layer) as it ensures
end to end encryption of the data in the internal network area. this will guarantee security in case
Moreover, the business requires its employees to be barred from accessing various websites in
order to maximize productivity. For this, we will use a web filter firewall. This will prohibit the
access of specific websites from the workstations. The employees will face fewer distractions at
the workstation.