Create A Network Drawing For NetWay Corporation

Create a network drawing, specific to NetWay Corporation, listing the network’s topology including any necessary hardware

Develop a comprehensive network diagram tailored to NetWay Corporation that clearly illustrates the topology, including all essential hardware components such as routers, switches, firewalls, servers, wireless access points, and interconnecting links. The diagram should depict both campuses in Atlanta and Cincinnati, detailing connections between floors, data centers, and the communication link between the two sites. Show the placement of primary and failover data centers, security devices, and connections to external networks. The layout must encapsulate network segments, security zones, and redundancy pathways to facilitate a thorough understanding of the infrastructure's design.

Your network diagram must be drawn professionally and you must discuss your drawing and justify your choices

The network diagram should be created using professional diagramming tools such as Microsoft Visio or Lucidchart, ensuring clarity, accuracy, and proper labeling of all components. Justify each choice by explaining the placement of devices based on security policies, scalability, and redundancy requirements. For instance, place core switches in secure data center locations to manage traffic efficiently, and position firewalls at network perimeters to ward off external threats. Use high-capacity links (e.g., fiber optic cables) for inter-campus connectivity to meet the 50 Mbps minimum data transfer requirement. Justify the selection of hardware—such as enterprise-grade routers and switches—and the topology (e.g., hybrid star or mesh), explaining how it supports security, redundancy, and operational efficiency.

Address any recommended cabling for this installation

Advocate for the use of high-quality cabling such as Category 6a or fiber optic cables to support high bandwidth and long-distance requirements. Fiber optic cabling is recommended for the connection between campuses to ensure high speed, minimal latency, and future scalability, especially since a minimum of 50 Mbps throughput is required. For internal wiring within buildings, Category 6a Ethernet cables are suitable to connect desktops, servers, and network devices across floors. Cabling should adhere to industry standards for structured cabling systems, including proper shielding and cable management practices to prevent interference and facilitate maintenance.

Recommend wiring closets for both campuses and their configuration wherever you determine they are needed

Designate wiring closets at each floor of both campuses, ideally in secured, ventilated spaces to house network switches and patch panels. Each closet should connect to a central data room or server room serving as the backbone, equipped with core switches capable of handling high traffic volumes. The wiring closet setup must incorporate proper cooling, fire suppression, and physical security measures. For scalability, use hierarchical cabling infrastructure — with fiber links connecting wiring closets to the main data centers — to support future addition of devices and increased bandwidth demands. Consider redundancy by installing dual switches and power supplies within wiring closets to minimize network failure risks.

Recommend ways to ensure that the network is safe from being attacked

Implement layered security measures including perimeter firewalls to block unauthorized external access, intrusion detection/prevention systems (IDS/IPS) to monitor and react to malicious activities, and robust anti-virus and anti-malware software across all endpoints. Use VPNs for secure remote access, ensuring encrypted transmissions. Segregate the network into security zones—such as internal staff, development teams, server farms, and public-facing Web servers—using VLANs and ACLs to restrict traffic flows. Regular security audits, patch management, and user access controls are critical. Employ multi-factor authentication for sensitive resources and enforce strong password policies to enhance access security. Continuous monitoring with Security Information and Event Management (SIEM) systems can help detect and respond to threats proactively.

Make recommendations for laying traps to stop attackers and prevent damage to the NetWay network infrastructure

Establish deception technology such as honeypots and honeytokens within the network to detect and analyze attacker activities clandestinely. Deploy decoy servers and dummy network segments to mislead potential intruders, thereby gaining intelligence about attack vectors and adapting defenses accordingly. Implement network segmentation to contain breaches and limit lateral movement. Use intrusion detection and prevention systems configured with signatures to identify anomalous behaviors—such as port scans or unusual data flows—and automatically quarantine affected systems. Conduct regular vulnerability scans and penetration testing to identify potential weaknesses before malicious actors exploit them. Establish incident response protocols and conduct training exercises to prepare for potential breaches.

Include recommendations for WAN connections that takes into considerations the geographical factor of the two locations

Given the geographic separation between Atlanta and Cincinnati, a high-bandwidth, low-latency Wide Area Network (WAN) connection is essential. Fiber optic leased lines or MPLS (Multiprotocol Label Switching) services are ideal options due to their reliability, speed, and security. MPLS can provide Quality of Service (QoS) guarantees, prioritizing critical traffic such as secure data transmissions and voice over IP (VoIP). To enhance resilience, implement redundant WAN links—possibly via two different service providers—to ensure continuous connectivity in case of link failure. Establish VPN tunnels over the WAN for secure data exchange, with implement wide-area backup solutions to mitigate potential outages, and consider SD-WAN technologies for centralized management and dynamic path selection based on network performance metrics.

Include recommendations for wireless technology and the type of wireless communications to be used in both locations

Adopt enterprise-grade Wi-Fi 6 (802.11ax) wireless technology within both campuses to provide high-speed, reliable wireless coverage for employees and devices. Deploy multiple access points strategically to ensure comprehensive coverage across all floors, with dedicated SSIDs for secured and guest networks. Use WPA3 encryption for enhanced security. Implement wireless intrusion detection systems (WIDS) to monitor wireless traffic and detect rogue access points or malicious activities. For sensitive areas, consider the use of physical security controls—such as locked access points—and wireless management tools that enable centralized control, monitoring, and intrusion prevention. For remote and mobile connectivity, supplement Wi-Fi with Bluetooth Low Energy (BLE) for IoT or location-based services if needed.

Include recommendations for any technology needed in the data center for high availability

Design the data centers with redundant power supplies, uninterruptible power supplies (UPS), and backup generators to ensure continuous operation during power outages. Use high-availability clustering and load balancing for critical servers such as databases and web services to prevent downtime. Implement server virtualization to enhance resource utilization and facilitate rapid failure recovery. Adopt redundant network hardware, including dual switches, routers, and firewalls, configured in a high-availability architecture with automatic failover capabilities. Incorporate storage solutions with RAID configurations, SANs, or NAS systems with replication to safeguard data. Establish comprehensive disaster recovery plans with geographically dispersed backup sites to ensure resilience against catastrophic failures.

References

  • Cisco Systems. (2020). Cisco Networking Architecture for Data Centers. Cisco Press.
  • Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach. Pearson.
  • Stallings, W. (2018). Network Security Essentials: Applications and Standards. Pearson.
  • Rouse, M. (2022). VLAN. TechTarget. https://searchnetworking.techtarget.com/definition/VLAN
  • Andrews, M. (2021). SD-WAN Technology and Deployment. Journal of Network Innovation, 12(3), 45-58.
  • Gibson, D., & Hill, P. (2019). Wireless Security: WPA2/WPA3 Protocols. IEEE Communications Magazine, 57(11), 120-126.
  • Odom, W. (2019). Enterprise Network Testing and Security. CRC Press.
  • Broussard, C. (2020). Implementing Honeypots for Detection and Defense. Cybersecurity Journal, 8(4), 139-147.
  • Baumgartner, J. (2022). High-Availability Data Center Design. Data Center Knowledge. https://datacenterknowledge.com/solutions/high-availability-datacenter
  • Harrison, K. (2021). WAN Optimization and SD-WAN. TechRadar. https://www.techradar.com/reviews/wan-optimization