Information technologists, particularly network administrations, routinely document networks by creating diagrams. A good network diagram may represent the primary features and design of a particular network’s logical and physical configuration.
In this assignment, you create three diagrams that depict various parts of a coffee retailer’s cloud-managed network. Your diagrams should depict how the coffee shop retailer might effectively configure its LANs, WLAN, and WAN.
Preparation
- Read the Coffee Retailer Description document located in the resources.
Directions
Complete the following two parts of the assignment:
Part 1 – Network Diagrams
Draw diagrams that reasonably depict a network infrastructure that will enable Coffee Retailer to achieve the company’s strategic goal of offering customers public wireless Internet access. Make sure to list any assumptions regarding the company or your design that you need to make in order to design and draw a realistic diagram.
Make sure to do the following:
- Create a logical wide area network (WAN) diagram showing major enterprise locations including the corporate headquarters, one typical retail location, and a cloud service provider.
- Create a physical WAN diagram that places core and distribution-layer routers and switches in locations that optimize network performance. Justify your choices.
- Create a physical local area network (LAN) and wireless LAN (WLAN) diagram for a typical retail location.
- Evaluate how well one of your diagrams depicts a working cloud-based solution for Coffee Retailer. What are the most important criteria?
Submission Requirements
- Submit a single Word document with both parts of this assignment.
- Font: Times New Roman, 12 point.
- Format: Double spaced lines. Use current APA style and format.
ResourcesAPA style and format.
ITEC50
1
0 – Security and Enterprise Networks
IT4774 – Software Construction
Coffee Retailer Description
Coffee Retailer is a company that operates 300 cafés nationwide.
Each location offers customer access to Internet connectivity via a cloud-managed wireless local area network (WLAN). Customer authentication to the WLAN requires a one-time use password that is generated at checkout and printed on the customer’s receipt. Each password authorizes WLAN access and Internet connectivity that expires after twenty minutes, which is a feature designed to keep customers from lingering too long.
Customers who need extended Internet access need to make another purchase to authenticate an additional network session. The authentication scheme is also part of a broader information security initiative designed to tie all network activity to specific users, either via bank card transaction records or via in-shop surveillance camera data for cash purchases.
Local switches and wireless access points in each Coffee Retailer shop are controlled via a cloud-hosted centralized management platform. Local switching and wireless access point (AP) configurations and policies are available to devices via site-to-site virtual private network (VPN) tunnels to a public cloud service provider.
Currently, all sales data generated by the point-of-sale (POS) system in each shop are uploaded to on-premises database servers located at Coffee Retailer’s corporate headquarters. The company is planning a project to enable each local POS system to also upload approximately two gigabytes of daily sales data to cloud-based storage provided by a public cloud service provider.
Coffee Retailer is a publicly traded company that generates bank card transactions and, consequently, needs to comply with both Sarbanes–Oxley (SOX) regulations and the Payment Card Industry Data Security Standard (PCI DSS).
Please feel free to make and state any reasonable assumptions you make about additional details related to Coffee Retailer as you work through the related course assignments.
1
2