Redesign the university ip addressing space

Assignment Help Computer Network Security
Reference no: EM13328382

The University is running out of IPv4 in a number of areas due to the current addressing scheme being to granular. This was done to help with billing internet usage in the past. The University needs to create free IP addressing space through consolidating IP addressing, especially to deal with the current growth in BYOD technologies. Staff and students are now using more than one device connected to the wireless infrastructure.

In 2015 La Trobe University expects to have over 25,000 concurrent wireless devices connected to the Infrastructure during peak periods. The public IP addressing space is being reserved for Students, Staff, Researchers and Guests networks on Wireless. The wired network is currently being used for VOIP, Computer LABs, Audio Visual, Security, Servers and Research equipment.

You only need to make allowance for Research Equipment, Servers (Virtual IP) and Computer Labs to remain on the Public IP addressing scheme.

Redesign the University IP addressing space. The University owns 2 x Class B (144.149.0.0 and 131.172.0.0) IPv4 Public IP addressing space and also utilizes IPv4 Private IP addresses including 10.0.0.0 and 192.168.0.0.

Design an addressing scheme that best utilizes the addresses available and simplify management whilst ensuring the best security in the design. Your design needs to cater for the following.

1) Sites
Bundoora - 64000 IP Addresses
Bendigo - 16000 IP Addresses
Wodonga - 4000 IP Addresses
MilduraDeakinstreet - 800 IP Addresses
Mildura TAFE - 400 IP Addresses
Franklin Street - 800 IP Addresses
City Campuses - 800 IP Addresses
Austin Hospital - 400 IP Addresses
Alfred Hospital - 400 IP Addresses
3rd Party Networks (Research Bundoora) 12 x 60 IP Addresses
3rd Party Networks (Research Bendigo) 4 x 100 IP Addresses
3rd Party Networks (Research Wondoga) 1 x 100 IP Addresses

2) Other than at Research Locations at least 50% of the IP addressing needs to be allocated to Wireless services.

3) The network needs to be able to distinguish between staff, researchers and students networks.

4) The wired Connections are broken down into VOIP 20%, Computers\LABs 40%, Audio Visual 5%, Security 10%, Servers 15%, Research Equipment 5% and Printers 5%.

5) Servers should not be directly able to be accessed from their IP address to the Internet and typically are accessed via a load balancer devices which has a Virtual IP allocated for external access.

6) Printers and Security must not be accessible via the internet or student networks.


Attachment:- addressing scheme.xlsx

Reference no: EM13328382

Questions Cloud

Describe why may the corporate bond be preferred : An investor in the 35 percent tax bracket may purchase a corporate bond that is rated double A and is traded on the New York Stock Exchange (the bond division). This bond yields 9.0 percent.
Explain the fluoride ion concentration at equilibrium : Calcium fluoride has a Ksp of 3.9 x 10^-11 at 25 C. What is the fluoride ion concentration at equilibrium
Prepare an income statement for year using single-step form : Two accountants for the firm of Allen and Wright are arguing about the merits of presenting an income statement in a multiple-step versus a single-step format.
Explain how many disintegrations of ^40k nuclei : Due to decay of ^40K, cow's milk has a specific activity of about 6x10^-11 mCi per milliliter. How many disintegrations of ^40K nuclei are there per minute in 1.0 qt of milk
Redesign the university ip addressing space : Redesign the University IP addressing space. The University owns 2 x Class B (144.149.0.0 and 131.172.0.0) IPv4 Public IP addressing space and also utilizes IPv4 Private IP addresses
Estimate the total mass of the galaxy in solar masses : he Sun has an orbital speed of about 220 km/s around the centre of the Galaxy, Estimate the total mass of the Galaxy in Solar masses
Explain a voltaic cell is constructed that uses : A voltaic cell is constructed that uses the following reaction and operates at 298 K. Zn(s) + Ni2+(aq) Zn2+(aq) + Ni(s) (a) What is the emf of this cell under standard conditions
What is probability that person has attended multiple games : Interested in learning more about its fans, the marketing office of the Arena Football League (AFL) conducted a survey at one of its games. The survey had 898 respondents, 676 males and 222 females.
Find the maximum and minimum orbital speeds : Te orbit of an asteroid extends from Earths to Jupiter's, just touching both. Find the maximum and minimum orbital speeds of the asteroid

Reviews

Write a Review

Computer Network Security Questions & Answers

  Federal government regulates labels

The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur?

  Explaining asymmetric encryption algorithms

Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob. You should include any steps taken by Bob that allow him to read the message.

  Intrusion detection system (ids)

concept of Data, information and knowledge in information warfare, politically motivated computer misdeeds, McClintock Manufacturing, Percentage of Windows systems that run antivirus software that is updated each day, network traffic that is evaluate..

  Dos and ddos attack

Denial of Service attack (DoS) and Distributed Denial of service (DDoS) attack, two-factor authentication system, password ageing, biometric devic,  cryptographic attack made Double DES (2DES), Demilitarized Zone (DMZ), SSL protocols

  Determine primary security risk that users must acknowledge

Based on the article by Lenning (2005), determine a primary security risk that users must acknowledge when using macros? Why is it significant to educate users of these risks once their dilemma is resolved?

  Is protocol secure for sharing secrets on server computer

Suppose that Alice shares secret with her company's server computer. When Alice is on trip, she tries to store important message in CEO's account directory. Is this protocol secure? If not, how do you feel it could be modified to make it so?

  How would you divide up your network to satisfy requirements

You are an ISP that has been assigned a class B network with the address 145.34.0.0. You know you will service 200 to 250 small companies.

  Strong ciphers produced by the enigma machine

Concur with, dispute, or qualify following statement: "The strong ciphers produced by Enigma machine are  result of complex mathematical trapdoor functions used to encrypt messages."

  Expected time to find all users passwords

Assume that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

  What encryption mechanism is used in the cquroam

What wireless security type does CQUniversity implement to enable roaming? Explain how this wireless security type work and what encryption mechanism is used in the CQURoam?  Explain  how this mechanism works

  Design an algorithm to achieve the byzantine agreement

Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted.

  Illustrate three security services-confidentiality-integrity

Illustrate that three security services: Confidentiality, Integrity, and Availability are enough to deal with threats of: (a) Disclosure, (b) Disruption, (c) Deception (deceive = to cause to accept as true.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd