Redesign the university ip addressing space

Assignment Help Computer Network Security
Reference no: EM13328382

The University is running out of IPv4 in a number of areas due to the current addressing scheme being to granular. This was done to help with billing internet usage in the past. The University needs to create free IP addressing space through consolidating IP addressing, especially to deal with the current growth in BYOD technologies. Staff and students are now using more than one device connected to the wireless infrastructure.

In 2015 La Trobe University expects to have over 25,000 concurrent wireless devices connected to the Infrastructure during peak periods. The public IP addressing space is being reserved for Students, Staff, Researchers and Guests networks on Wireless. The wired network is currently being used for VOIP, Computer LABs, Audio Visual, Security, Servers and Research equipment.

You only need to make allowance for Research Equipment, Servers (Virtual IP) and Computer Labs to remain on the Public IP addressing scheme.

Redesign the University IP addressing space. The University owns 2 x Class B (144.149.0.0 and 131.172.0.0) IPv4 Public IP addressing space and also utilizes IPv4 Private IP addresses including 10.0.0.0 and 192.168.0.0.

Design an addressing scheme that best utilizes the addresses available and simplify management whilst ensuring the best security in the design. Your design needs to cater for the following.

1) Sites
Bundoora - 64000 IP Addresses
Bendigo - 16000 IP Addresses
Wodonga - 4000 IP Addresses
MilduraDeakinstreet - 800 IP Addresses
Mildura TAFE - 400 IP Addresses
Franklin Street - 800 IP Addresses
City Campuses - 800 IP Addresses
Austin Hospital - 400 IP Addresses
Alfred Hospital - 400 IP Addresses
3rd Party Networks (Research Bundoora) 12 x 60 IP Addresses
3rd Party Networks (Research Bendigo) 4 x 100 IP Addresses
3rd Party Networks (Research Wondoga) 1 x 100 IP Addresses

2) Other than at Research Locations at least 50% of the IP addressing needs to be allocated to Wireless services.

3) The network needs to be able to distinguish between staff, researchers and students networks.

4) The wired Connections are broken down into VOIP 20%, Computers\LABs 40%, Audio Visual 5%, Security 10%, Servers 15%, Research Equipment 5% and Printers 5%.

5) Servers should not be directly able to be accessed from their IP address to the Internet and typically are accessed via a load balancer devices which has a Virtual IP allocated for external access.

6) Printers and Security must not be accessible via the internet or student networks.


Attachment:- addressing scheme.xlsx

Reference no: EM13328382

Questions Cloud

Describe why may the corporate bond be preferred : An investor in the 35 percent tax bracket may purchase a corporate bond that is rated double A and is traded on the New York Stock Exchange (the bond division). This bond yields 9.0 percent.
Explain the fluoride ion concentration at equilibrium : Calcium fluoride has a Ksp of 3.9 x 10^-11 at 25 C. What is the fluoride ion concentration at equilibrium
Prepare an income statement for year using single-step form : Two accountants for the firm of Allen and Wright are arguing about the merits of presenting an income statement in a multiple-step versus a single-step format.
Explain how many disintegrations of ^40k nuclei : Due to decay of ^40K, cow's milk has a specific activity of about 6x10^-11 mCi per milliliter. How many disintegrations of ^40K nuclei are there per minute in 1.0 qt of milk
Redesign the university ip addressing space : Redesign the University IP addressing space. The University owns 2 x Class B (144.149.0.0 and 131.172.0.0) IPv4 Public IP addressing space and also utilizes IPv4 Private IP addresses
Estimate the total mass of the galaxy in solar masses : he Sun has an orbital speed of about 220 km/s around the centre of the Galaxy, Estimate the total mass of the Galaxy in Solar masses
Explain a voltaic cell is constructed that uses : A voltaic cell is constructed that uses the following reaction and operates at 298 K. Zn(s) + Ni2+(aq) Zn2+(aq) + Ni(s) (a) What is the emf of this cell under standard conditions
What is probability that person has attended multiple games : Interested in learning more about its fans, the marketing office of the Arena Football League (AFL) conducted a survey at one of its games. The survey had 898 respondents, 676 males and 222 females.
Find the maximum and minimum orbital speeds : Te orbit of an asteroid extends from Earths to Jupiter's, just touching both. Find the maximum and minimum orbital speeds of the asteroid

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd