Network specifications and topology diagram

Assignment Help Computer Networking
Reference no: EM131227064

Introduction

This case study has been divided into six components.

You are to design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc), subnet the network using VLSM, and assign IP addresses to the appropriate devices. You will also be required to implement security by applying access control lists to filter traffic and provide a plan for performance management.

Scenario
A large accounting company has asked you to assess and redesign their corporate network. They are also opening two new branches in Australia (Brisbane and Sydney), which will require new equipment. They wish to maintain Frame Relay for all WAN links.
PART 1 - Network specifications and topology diagram
PART 2 - Subnet the network using VLSM, and assign IP addresses to the appropriate devices.
PART 3 - Research and source appropriate devices justifying choices (feasibility, efficiency, etc) with a Weighted Scoring Model (WSM) and documented report.
PART 4- Security by applying Access Control Lists (ACLs) to filter traffic

PART 1 - Network specifications and topology diagram Network Specifications
You have been given the rough sketch for the network topology below. You are to draw the network using Visio, subnet the network (see case study part 2), and assign port numbers and IP addresses to ports.
You must save your Visio diagram as a .gif and import to your Excel spreadsheet (use one worksheet for the diagram (i.e., nothing else on that worksheet).

Network Structure

961_Figure1.jpg

Hardware
- Only include one switch in you diagram for each LAN (even if more are required)
- The Internet router port address is 200.37.21.1/30
- There is no user LAN on the New York router, only the Internet connection and the public backbone containing a Web and mail server.

PART 2 - Subnet the network using VLSM, and assign IP addresses to the appropriate devices.

Each location has the following number of hosts

Chicago

1000

Orlando

500

Brisbane

250

Sydney

48

Singapore

300

Deli

150

Subnetting
Use VLSM to subnet the network topology using a public class B network. You are to use the table format below to provide the subnet details.

Table 1. Subnets (including WAN subnets)
Spreadsheet Columns: Subnet name, subnet address, subnet mask (in slash format), first useable address, last useable address, broadcast address, static address range and DHCP address range (all addresses to be in dotted decimal notation)
Table 2. Router Interfaces
Spreadsheet Columns: Location, interface, IP address, subnet mask (in slash format)
Table 3. Servers
Spreadsheet Columns: Location, server name, IP address, subnet mask (in slash format)
Additional requirements:
- Choose one public B class network address for the entire network and subnet this block of addresses to optimise spare addresses for future expansion.
- Place the WAN subnets in the blocks directly following the LAN address space.
- Add 100% to each subnet to allow for growth in the number of hosts specified for each LAN. Do not allow for any growth in the number of servers
- DHCP will to be used for IP address allocation for hosts in each subnet and these ranges are to be allocated for each LAN
- Static IP addresses are to be allocated where appropriate
- The ISP has given us an IP address of 200.37.21.1/30 for our Internet connection at New York

PART 3 - Research and source appropriate devices justifying choices (feasibility, efficiency, etc).
You are to research and submit a project procurement plan for the Brisbane and Sydney networks. The devices you must include are all relevant network devices (Layer 2 and 3 only) and user PCs.
Your project plan and final recommendations should be based on a Weighted Decision Matrix (similar to the WDM you did in the Procurement Practical.
Your plan should use the following structure:
Your project plan is to contain the following components:
Executive summary
- Give an overview of the project plan and feasibility outcome.
- This should briefly describe the project's goals and/or purpose, the scope and how it will be achieved within time and budget.
- Should be approximately 500 words.
Introduction and Project organisation.
- Project overview - Purpose and detailed scope analysis
- User and stakeholder analysis
- Budget declaration
Weighted Decision Matrix - hardware resource requirements analysis.
- Justifications for priorities and attributes given in the matrix.
Budget
- Final project costing of hardware only (do not include labour)

PART 4- Security by applying access control lists to filter traffic
Write the ACL configuration commands required to address the following security requirements. You must also provide the configuration commands required to apply the security rules to the appropriate router interface.
Requirements for all ACLs
- Do not include the commands to enter configuration mode
- Provide only the commands required to address the questions
- Do not include router prompts
- ACLs are to be placed in the optimal position to minimise bandwidth unless the location of the ACL is specified
- Each ACL must use the next lowest available ACL number on that router
- You are not to rely on the implicit deny any any.
- If a protocol has multiple port numbers (as per RFC 1700) use only the lowest port number for this exercise
- If a protocol operates on both UDP and TCP then apply a rule for both
- No ACL is required on a port where all traffic is permitted.
- Remember to state the question number and the router to which you are applying the ACL.

a) Access to the Internet and public backbone:
Apply these ACL/s to serial 0/0 on the New York Router

1. External hosts outside the organisation (on the Internet) must only be able to access the web server on the public backbone using HTTP and HTTPS

2. No other external access is permitted into the organisation from the Internet

3. Internal hosts must only be able to communicate out to the Internet using HTTP and HTTPS .

b) The United States LANs

4. The Chicago and Orlando LANs are to have unrestricted access to the web server and other LANs in the United States - except that both LANs are to be restricted from initiating ping requests

5. They are to have no other access outside of the United States, except for New York and Chicago who are to be able to communicate with the database server at Brisbane using TCP port 1433. In addition, the Orlando LAN is to be able to communicate to all three servers at Brisbane using SSH

6. Apply the rules above for the Chicago and Orlando LANs separately on the router associated with each LAN.

c) The Australian LANs

7. The Brisbane and Sydney LANs are to have HTTP and HTTPS internal access only to the web server on the public backbone. They will also require access to DNS which is also running on the web server. Implement these ACLs on the Brisbane router only.

8. The Brisbane LAN is to have unrestricted access to all 3 servers - except for Telnet and FTP which are to be blocked.

d) Asian and Indian LANs

9. Singapore and Deli LANs are to have access to the database server (SQL Server) using TCP port 1433. All other access from the LANs is to be blocked.

Reference no: EM131227064

Questions Cloud

Calculate and plot the required line-to-line voltage : If such a motor is to produce a rated torque at hrequencies below 60 Hz while maintaining a constant air gap flux, calculate and plot the required line-to-line voltage as a function of frequency.
Write a post on initial investment : Write a post on Initial Investment. How much do you need to invest today to reach that desired amount 12 years from now?
What is sarbanes-oxley and why was this law created : Discuss the role of an Auditor (both internal and external). Who are the Big 4 Accounting Firms? What is Sarbanes-Oxley and why was this law created?
Write a draft policy on the topic of discrimination : Consider the Australian Human Right Commission guide on writing an effective policy on discrimination and harassment and write a draft policy on the topic of discrimination that you have chosen
Network specifications and topology diagram : Networking Case Study - CP1402/CP2012/CP1802 Network specifications and topology diagram and Subnet the network using VLSM, and assign IP addresses to the appropriate devices.
Steps taken by both the fasb and iasb : What are some steps taken by both the FASB and IASB to move to fair value measurement for financial instruments?
Plot its torque-speed characteristics at following values : It is driven by an adjustable-frequency sinusoidal supply such that the air gap flux is held constant. Plot its torque-speed characteristics at the following values of frequency f: 60, 45, 30, and 15 Hz
Write a post on managing earnings : Write a post on Managing Earnings. What are two tactics that a financial manager can use to manage earnings? What are the implications for cash flow and shareholder wealth?
What is the impact that technology has had on our society : What is the impact that technology has had on our society? What would our world be like without it?

Reviews

Write a Review

Computer Networking Questions & Answers

  What are the three main types of network media

Question 1: What are the advantages and disadvantages of network processors, such as hubs, switches, routers, and gateways? Question 2: What are the three main types of network media?

  How to load a vhd file

Write a guide on how to load a VHD file converted from a ProDiscover.eve image file into VirtualBo

  What is voip and how is it different from pots

Voice over the Internet Protocol (VoIP). What is VoIP and how is it different from the Plain Old Telephone Service (POTS)? What are some issues an organization (not individuals) should analyze when evaluating the move from a traditional phone sy..

  Identify types of network cables and connectors

Identify types of network cables and connectors. Categorize characteristics of connectors and cabling. Explain properties and characteristics of TCP/IP. Explain common TCP and UDP ports, protocols, and their purpose.

  Create a technical proposal for a network services

You will create a technical proposal for a Windows Server-based set of network services given the simplified RFP (Request for Proposal) provided below

  From the second e-activity decide which you would select to

envision that you are a systems administrator managing five different web servers for your company. each web server

  What are some merits and demerits of using centralized

question 1. when working on a design what are some of the typical business goals you can expect to find for todays

  Kind of networking hardware used-dsl for internet connection

Most homeowners select to install a DSL for Internet connection what kind of networking hardware would you suggest?

  Business requirements driving the need for the system

The presentation must include the following: A full description of the new system, a description of its components, and the benefit it will provide to Riordan A discussion of the business requirements driving the need for the system A discussion o..

  Consider the following system enforcing bibas strict

consider the following system enforcing bibas strict integrity policy for a software vendor.the defined integrity

  Describing how information is used and organization

Explain this use in your current place of employment or an organization you are familiar with.

  How many users can be supported if circuit switching is used

Suppose users share a 1Mbps link. Also suppose each user requires 100Kbps when transmitting, but each user transmits only 20% of the time. When circuit switching is used, how many users can be supported?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd