Problem on subnet masking and designing small networks

Assignment Help Computer Networking
Reference no: EM13269007

The aim of this assignment is to become familiar with subnet masking and designing small networks for fictitious organizations.

Imagine you work for a firm which provides system administration and networking services to organizations. One day an organization which runs a hotel contracts to your organization. They provide the attached plans.

The hotel has a class C public address space. The network number is 203.220.72.0/24. The hotel provides a number of eatery, office, accommodation and conference like services. This particular organization would like to claim that all facilities have access to the Internet.

The Hotel has the following features.

1. 90 hotel rooms which have access to the Internet, spread over 5 floors (that is five floors of hotel rooms). Each room is to have one fixed Ethernet interface. Please note on each floor there is a hotel room which has got an attached bedroom. That room will also require a fixed Ethernet connection.

2. Each floor consisting of hotel rooms has a rack in a communications closet - there is a suitable riser between floors.

3. A large conference room capable of housing up to 15 fixed users is located the ground floor. Fixed networking is required in this room.

4. The owners of the hotel recommend supporting up to 200 wireless users concurrently. Users of such facilities should have access to the Internet through out all floors of the hotel.

5. The hotel has a small office that manages reservations and the hotel's programs/ facilities. There are no more then 20 people in these offices (very crowded) requiring access to the Internet. These offices are situated on the ground floor and are directly attached to the Administrative Offices.

6. The hotel wishes to have Internet functionality in the lobby bar providing customers with access to the Internet. There would be no more then 5 concurrent customers - these are built into the tables adjacent to the concierge desks.

7. The concierge and reception tables will require at least 3 network connections each.

8. The hotel also wishes to have machine room. The machine room would have no more then 16 hosts and is situated on the ground floor in the communications room.

9. Your carrier gives you a high end DSL (perhaps a Juniper) router that advertises your network to the rest of the world. The external interface of your router will be bound to an address, which you nominate from your address space. The internal interface of the router should connect directly to your routing core. You not need to worry about routing from the outside worlds perspective. But you will need to worry about routing for your entire internal network. You should advise your infrastructure that the public interface is you default gateway.

A basic floor plan is attached.

You now know what the hotel requires in terms of connectivity. Using this partial specification, proposes a structure for the network to be used by the hotel. Your design of the network should describe the infrastructure you have and how it is connected from both a Layer 1 perspective. Some of the considerations to address include:

1. Do have switches on each floor?
2. How will these switches be connected to one another?
3. What kind of switches do you plan to use?
4. What media will you use to connect edge devices to the switches and/or routers?
5. What kind of routers will you use?
6. How many interfaces will they have of what type?
7. How will you distribute the cabling up the floors of the building and within the floors?
8. What components will you need in addition to the switches and routers required?

Once you have done a physical design of the network you are then to define a network structure. When doing this you are to work out network numbers and sizes along with the number of routers you wish to have. You should provide a logical diagram of this.

Once a design is complete for each device you are to provide a configuration - as this hotel has an alliance with Cisco you can assume you will be using Cisco kit. You will need to outline the routing rules you put in place (only inside and default gateway). You should aim to use as much of your address space as possible but you MAY need to use NAT/PAT.

You will also need to nominate an address for a DHCP server for both wired and wireless infrastructure, you can use the DHCP servers on the switches. You will need to set up these DHCP servers the DHCP can come hosted in the machine room. Your network configuration should include whats needed to support this from a routing/ switching perspective.

To do this task you will have to make assumptions as to security, segmentation, isolation and other aspects. For each assumption you make be sure justify it using common sense and/or evidence provided above. You are free to use VLANS and VLAN trunking protocols such as 802.1q where appropriate.

You will need to define appropriate ACL's on your infrastructure. The rules are as follows:

1. Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks.

2. Users on the hotels corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.

Finally you will need to set up a DNS server. The server should be in the machine room network and assigned a static address. The server will be accessible from both inside and outside the hotel. The server will have forward and reverse zones, the forward zone will be myhotel.net. The DNS server should have a secondary server in the machine room network which is a replica of the primary. For now you can leave the zone empty. Please document your configuration.

Attachment:- Assignment.rar

Reference no: EM13269007

Questions Cloud

What is the difficulty with the original tcp srtt estimator : In the absence of any special knowledge of network conditions, the typical approach is to pick an arbitrary value, such as 3 s, and hope that this will converge quickly to an accurate value. If this estimate is too small, TCP will perform unnecess..
Competitive intelligence community : Buffalo Wild Wings with a Strengths, Weaknesses, Opportunities, and Threats analysis also referred to as SWOT in the competitive intelligence community.
What kind of business law system would you adopt : what kind of business law system would you adopt -a civil law system or a common law system, and why? 2) What kind of business regulations would you impose?
What is the apparent weight of a cube of iron : What is the apparent weight of a cube of iron of volume 0.2 m3 when it is submerged in water? The density of iron is 7800 kg/m3
Problem on subnet masking and designing small networks : Subnet masking and designing small networks for fictitious organizations - provides system administration and networking services to organizations
Find the rate of change in entropy of the ice : A copper rod 25 cm long having a cross-sectional area of 7.5 cm2 is used to connect a boiler maintained at 100 oC to a large block of ice at 0 oC. What is the rate of change in entropy of the ice
What is now the angular speed of the carousel : A woman stands at the edge of a carousel that is rotating without friction at 0.80 rad/s. The carousel has a radius of 2.0m and a moment of inertia of 600 kg m2. What is now the angular speed of the carousel
How far will object travel in first 2 seconds of its journey : Suppose an object with initial acceleration of 10 ft/s^2 is dropped from 300 ft. above the earth, how far would it travel in the first 2 seconds of its journey. Assume initial velocity is zero.
Management-union relationship-legislation : Why are the laws you chose important and what role did they play in shaping today’s management-union relationship?

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain a network storage technology

Explain a network storage technology that can use the existing network to make data on network-connected hard disks accessible to comapny users.

  Explaining protocol to avoid defeat

Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.

  Find maximum number of telephone supported by office

Average telephone is used to make four calls per 8-hour workday, with mean call duration of six minutes. Ten percent of calls are long distance. Determine maximum number of telephones an end office can support?

  Explaining registration department becoming decentralized

A consulting firm has narrowed the choice of programming language to Java and C#. Which language do you think would be more appropriate for this application and why?

  What allows the ip layer to determine where to send a packet

what allows the IP layer to determine where to send a packet next? What settings are used to make that decision?

  Describe what happens in getting this request message

Describe what happens in getting this request message to the server and how the server gets the response message back to the client.

  Find finish actual packet completion-order of transmission

Arrival at time t = 1, length 3; arrival at t = 2, length 1. Buffer 3: arrival at time t = 3, length 5. You need to find out the finish tag, order of transmission and actual packet completion times for each packet arrival.

  How company can manage snmp from corporate location

Write one-page proposal of how company can manage SNMP from corporate location. Include details on versions, basic operations, and MIBs. Describe the benefits of this kind of centralized monitoring.

  Presentation to a civic organization on the ''best practices''

presentation to a civic organization on the 'best practices' for home and small business wireless network security. Provide an outline of the contents of that presentation which includes suggestions for best practices for home/SOHO security.

  Threat, risk and vulnerability

Threat, Risk and Vulnerability are related to Cybersecurity. Describe these three terms and provide a business case example.

  Networking the computers

Cathi required to network three computers for herself and her roommates, Sharon and Emily. She decided that a(n) (1)___________________ network was the right kind to install in their dorm suite since a(n) (2)____________________ network was too co..

  Explaining language of all strings in alphabet sigma

For a language L over alphabet Sigma, let sup(L) denote language of all strings in Sigma* that contain a string of L as s substring.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd