Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Networking Case Study

Introduction

This case study has been divided into five components.

You are to design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc.), subnet the network using VLSM, and assign IP addresses to the appropriate devices. You will also be required to implement security by applying access control lists to filter traffic.

Deliverables

1. A single Word document(.docx) - containing all parts

Assignment breakdown

Scenario

 major Australian data analytics company has asked you to assess and redesign their network. They are opening new branches in Brisbane and Adelaide, which will require new equipment. They have existing contracts and hardware to maintain fibre optic leased line WAN links between sites.


PART 1 - Network specifications and diagram

PART 2 - Subnet the network using VLSM, and assign IP addresses to the appropriate devices

PART 3 - Research and source appropriate devices justifying choices (feasibility, efficiency, etc.) with a Weighted Scoring Model (WSM) and documented report

PART 4- Security by applying Access Control Lists (ACLs) to filter traffic

PART 5 - Cloud computing proposal


PART 1 - Network specifications and diagram

Network Specifications

You have been given a rough sketch of the network topology below. You are to draw the network using Visio, subnet the network (see case study part 2), and assign port numbers and IP addresses to ports.

Network Structure

 

 

617_Network-structure.jpg

 

Hardware

Only include one switch in you diagram for each LAN and one wireless access point for each WLAN (even if more are required)

The Internet router port address is 104.200.16.26/30

The Sydney router is connected to the Internet, and provides access to the public backbone containing a web server and a database server.

 

PART 2 - Subnet the network using VLSM, and assign IP addresses to the appropriate devices.

Each location has the following number of hosts

Sydney, Melbourne, and Brisbane each include a wireless LAN for clients to use.

 

Location

Workstations

WLAN addresses

Sydney

910

14

Melbourne

200

6

Brisbane

40

6

Canberra

120

 

Adelaide

70

 

Hobart

20

 

 

Subnetting

Use VLSM to subnet the network topology using a public class B network. You are to use the table format below to provide the subnet details.

Table 1. Subnets (including WAN subnets)

Spreadsheet Columns:  Subnet name, subnet address, subnet mask (in slash format), first useable address, last useable address, broadcast address, static address range and DHCP address range (all addresses to be in dotted decimal notation)

Table 2. Router Interfaces

Spreadsheet Columns:  Location, interface, IP address, subnet mask (in slash format)

Table 3. Servers

Spreadsheet Columns:  Location, server name, IP address, subnet mask (in slash format)

 

Additional requirements:

Choose one public B class network address for the entire network and subnet this block of addresses to optimise spare addresses for future expansion.

Place the WAN subnets in the blocks directly following the LAN address space.

Add 100% to each subnet to allow for growth in the number of hosts specified for each LAN (i.e. workstations ×2). Do not allow for any growth in the number of servers or size of WLANs

DHCP will to be used for IP address allocation for hosts in each subnet and these ranges are to be allocated for each LAN.

Static IP addresses are to be allocated where appropriate.

The ISP has given us an IP address of 104.200.16.26/30 for our Internet connection at Sydney.

You must also provide your working to show how you calculated the subnet sizes and determined the appropriate addresses and ranges. Do not include working in your tables, present it after the tables.

 

PART 3 - Research and source appropriate devices justifying choices (feasibility, efficiency, etc.)

You are to research and submit a project procurement plan for the Adelaide and Brisbanenetworks. The devices you must include are routers, switches, and wireless access points.Make sure the devices you select can handle the number of workstations required at each site, and provide a good quality of service to wired and wireless users.

Your project plan and final recommendations should be based on a Weighted Decision Matrix (similar to the WDM you did in the Procurement Practical). You are to compare five (5) devices from each category and to base the decision on reasonable and well-justified attributes.

The budget for all procurement is $10,000. You may exceed this if you can justify it well.

Your project plan is to contain the following components:

Executive summary

Briefly describe the goals of the procurement plan

Weighted Decision Matrix - hardware resource requirements analysis

Include a written justification for priorities and attributes given in the matrix

Create your WDMs in Excel and copy and paste them into your Word doc

Budget

Create a well-presented table of the prices of all devices and the total cost

Include hardware only, not labour

 

PART 4- Security by applying access control lists to filter traffic

Write ACL tables, in the format taught in the lectures, to address the following security requirements.

Requirements for all ACLs

ACLs are to be placed in the optimal position to minimise bandwidth unless the location of the ACL is specified

You are not to rely on the implicit deny any any.

No ACL is required on a port where all traffic is permitted.

Create one ACL table per router.

a) Access to the Internet and public backbone:

Apply these ACL/s to serial 0/0 on the SydneyRouter

 

External hosts outside the organisation (on the Internet) must only be able to access the Sydney Web server on the public backbone using HTTP and HTTPS.

No other external access is permitted into the organisation from the Internet.

Internal hosts must only be able to communicate out to the Internet using HTTP and HTTPS (Hint: established connections must be allowed to communicate back into the private network).

b) Sydney and Melbourne

The Sydney and Melbourne LANs should have unrestricted access to the Internet, and to the Sydney servers.

The Sydney and Melbourne WLANs should have HTTP and HTTPS access to the Internet, and to the Sydney Web server, but no access to anywhere else on the corporate network.

The Sydney Web server should have unrestricted communication via HTTP and HTTPS, and be able to respond to ping requests from internal hosts.

The Sydney Database server should be able to respond to established connections via port 1433.

c) Brisbane, Adelaide, and Canberra

The Brisbane, Adelaide, and Canberra WANs should have HTTP and HTTPS access to the Internet and to the Sydney Web server

9. The Brisbane WLAN should have HTTP and HTTPS access to the Internet, and to the Sydney Web server, but no access to anywhere else on the corporate network.

d) Hobart

The Hobart servers should be able to initiate connections anywhere within the corporate network without restriction.

Only traffic from established connections and from the Hobart LAN is permitted to reach the Hobart servers. All other access should be blocked.

The Hobart LAN should have unrestricted access to the Internet, the Sydney servers, and the Hobart servers.

 

PART 5-Cloud computing proposal

You have been asked to prepare a proposal about how cloud computing could be used to reduce the company's hardware, service, and energy costs. You are to consider the following three scenarios, and make a recommendation on which to choose:

1. Replacing ALL workstations within the organisation with thin clients, which will access a desktop environment provided by a cloud service provider (such as Amazon).

2. Replacing ALL workstations within the organisation with thin clients, which will access a desktop environment provided by a private cloud infrastructure, created in-house and based in Sydney.

3. Continuing to use workstations.

The company's current contract is $800 per workstation, per year, for hardware and service. On average, each workstation currently consumes 200 kWh per year of electricity. In making your recommendation, you should consider not just costs, but the security implications of moving to a cloud service.

Your proposal should not exceed 2000 words. You must provide citations for any references that you use.

 

 

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92501373
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Prof gs farmer friend claims that aliens made crop circles

Prof G's farmer friend claims that aliens made crop circles in his farm. Using economic theory, prove his farmer friend wrong.

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

Topic is impacts of data breaches the report will divide in

Topic is "Impacts of data breaches". the report will divide in to 5 section which is : "" 1-Abstract: comprehensive overview of the report in 150 to 200 words. 2- Introduction: Describe the topic and its issue in 250 to ...

Question what is active threat in terms of network security

Question: What is active threat in terms of network security? Provide an example. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format. Note: minimum 300 wor ...

Suppose alice wants to communicate with bob using symmetric

Suppose Alice wants to communicate with Bob using symmetric key cryptography with a session key KS. They have no public key cryptography and they intend to use a key distribution center (KDC). The KDC is a server that sh ...

Short answers1 the discussion question to debate is how

Short Answers: 1. The discussion question to debate is how have companies like Apple, Microsoft and the big providers (ATT, Verizon, Sprint, etc) impacted communication today? 2. Technology wise what do you imagine for t ...

Autonomous consumptionnbsp 660marginal propensity to

Autonomous consumption  = 660 Marginal propensity to consume  = 0.8 Autonomous taxation  = 200 Income tax rate =  0.2 Planned investment  = 500 Government spending  = 500 Autonomous net exports  = 300 NX  = 0.04 Calculat ...

With smaller companies saving thousands and larger

With smaller companies saving thousands and larger companies saving billions through flexible manufacturing, if you are a discrete parts manufacturer seeking to be more lean, it is important to consider whether this migh ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As