Implement network for an small and medium sized enterprise

Assignment Help Computer Networking
Reference no: EM132219617

Assignment - Propose/design a VPN for the scenario given below including LAN and WAN settings.

Purpose of the Assessment

The purpose of this assignment is to implement a VPN network for an SME (small and medium sized enterprise), details are given below.

A thorough verification and evaluation analysis should be presented to meet he ULO mapping in the Unit Description.

In preparing the assignment, students should acquire not only the knowledge of current technical aspects of IP networks but also research, data collection, analysis and writing skills.

Assignment Description

There are two parts to this assignment, part A and part B.

A. Design and model Implement (in Netsim) of VPN for Sigma Inc. by addressing the following criteria. See detailed instructions in the next section.

B. Presentation

Part A: Design and Report

Two broad areas to be considered for VPN network design in this assignment are as under;
1. Propose/design a VPN for the scenario given below including LAN and WAN settings.
2. Configure and implement the network at low-level design, this part should be done using BOSON NETSIM Simulator.
Contents must include:
High-level network design summary Solution Design
i. Network Topologies
ii. IP addressing
iii. Configuration details and screenshots to present low-level design
iv. Verification methodologies and evaluation analysis

Scenario
In this scenario, Sigma, Inc. wants to establish a VPN between the subnets of its Human Resources and Finance departments through a system models which does not have any firewall deployed at either end. Both systems will act as VPN gateways. In terms of VPN configurations, a gateway performs key management and applies IPSec to the data that flows through the tunnel. The gateways are not the data endpoints of the connection.

The objectives of this scenario are as follows:

- The VPN must protect all data traffic between the Human Resources department's subnet and the Finance department's subnet.
- Data traffic does not require VPN protection once it reaches either of the department's subnets.
- All clients and hosts on each network have full access to the other's network, including all applications.
- The gateway systems can communicate with each other and access each other's applications.

Details

The following figure illustrates the network characteristics of Sigma Inc.

1900_Sigma Inc Office configuration.png

Figure-1: Sigma Inc. Office configuration

Human Resources Department

• System A acts as the Human Resources Department's VPN gateway.
• Subnet is 10.6.0.0 with mask 255.255.0.0. This subnet represents the data endpoint of the VPN tunnel at the Sigma Inc., Melbourne site.
• System A connects to the Internet with IP address 204.146.18.227. This is the connection endpoint. That is, System A performs key management and applies IPSec to incoming and outgoing IP datagrams.
• System A connects to its subnet with IP address 10.6.11.1.
• System B is a production system in the Human Resources subnet that runs standard TCP/IP applications.

Finance Department

• System C acts as the Finance Department's VPN gateway.
• Subnet is 10.196.8.0 with mask 255.255.255.0. This subnet represents the data endpoint of the VPN tunnel at the Sigma Inc., Sydney site.
• System C connects to the Internet with IP address 208.222.150.250. This is the connection endpoint. That is, System C performs key management and applies IPSec to incoming and outgoing IP datagrams.
• System C connects to its subnet with IP address 10.196.8.5.

Configuration tasks
You must complete each of these tasks to configure the branch office connection described in this scenario:

Completing the planning: The planning checklists illustrate the type of information you need before you begin configuring the VPN. All answers on the prerequisite checklist must be YES before you proceed with VPN setup.

Configuring VPN on System A: Complete these task to configure System A

Configuring VPN on System C: Follow the same steps you used to configure VPN on System A, changing IP addresses as necessary. Use your planning worksheets for guidance.

Starting VPN: After you have configured your VPN connection on System A and C you need to start your VPN connection.

Testing a connection: After you finish configuring both systems and you have successfully started the VPN servers, test the connectivity to ensure that the remote subnets can communicate with each other.

Part B: Presentation

Task B

The proposed network design will be presented in a 5-minute presentation during the week 12 Lab class. Presentation slides should be submitted in Moodle prior to the presentation for marking.

Verified Expert

In this assignment, a low level design is presented.Network topology is designed, device configuration done and verification and analysis done.In the configuration area, I provided names to the networking devices, assigned IP addresses to the devices, configured RIP routing protocol to the routers and finally configured VPN.

Reference no: EM132219617

Questions Cloud

Branch of sizable international company : You are the office manager of a branch of a sizable international company.
Define what changes would you want and why : Consider a job you hold now or have held recently. Would you want this job to be redesigned to place more emphasis on efficiency, motivation, ergonomics.
Prepare a statement of income : Prepare a statement of income, a statement of changes in equity, a statement of financial position (unclassified), and a statement of cash flows for 2016
What resources would health information consultant : What resources would a health information consultant find helpful in consulting for ESRD facilities? What has changed in the buying process?
Implement network for an small and medium sized enterprise : ME504 - Advanced Networking - A thorough verification and evaluation analysis should be presented to meet he ULO mapping in the Unit Description
What is the supply value chain : What is the supply value chain? How does the supply value chain help organisation manage their supply chains?
What is the financial advantage for the company : What is the financial advantage (disadvantage) for the company from processing one batch of sugar cane into the end products industrial fiber and molasses
Strict product liability apply in context of cyberspace : In what circumstances might the doctrine of strict product liability apply in the context of cyberspace?
Determine any gains or income that may be recognized : Determine any gains/losses or income that may be recognized incident to the formation of ABCD Corp. What would be the result if Beth's property were worth $250,

Reviews

len2219617

1/20/2019 10:45:06 PM

Reference Style Clear styles with excellent source of references Clear referencing/ style Generally good referencing/style Unclear referencing/style Lacks consistency with many errors Presentation and Diagrams Proper writing and drawings professionally presented Properly written and drawing, with some minor deficiencies Mostly good, but some structure or presentation problems Acceptable presentation Poor structure, careless presentation

len2219617

1/20/2019 10:45:00 PM

Grade Mark HD 80%+ D 70%-79% CR 60%-69% P 50%-59% Fail <50% Excellent Very Good Good Satisfactory Unsatisfactory Identification and Analysis and description Highly valid and appropriate Valid and appropriate Generally valid and appropriate Valid but not appropriate Not Valid and not appropriate Explanation/ Justification All elements are present and well integrated. Components present with good cohesion Component present and mostly well integrated Most components present Lacks structure

len2219617

1/20/2019 10:44:46 PM

3 Screenshots and procedures (steps, commands, results) This section should include appropriate commands executed and results. There must be heading and steps with proper explanation, e.g. the purpose of the steps and expected outcome. 10 4 Analysis and Evaluation Include a section for results analysis and evaluate the outcome of the implementation of the network. Critical analysis and evaluation should be addressed. 5 Total 25

len2219617

1/20/2019 10:44:39 PM

No Categories Description Marks 1 Report Quality The document should include all necessary headings and content to depict a Level 2 (e.g. Ethernet, VPWS, VPLS) and Level 3 (e.g. VPRN) services and network design. It should not omit any necessary section to be used for network evaluation. 5 2 Low Level Design Multiple figures and tables should be included to show the requirements development. All sections need to be in line with the high-level design proposed by the group. Any changes made should be addressed properly and clearly by ‘Change request’ section. 5

Write a Review

Computer Networking Questions & Answers

  Write a detailed setup of network devices only for a lan

Local Area Network Design and Setup - Advanced Network Design - Analyse the need for the network for above case study - Write a detailed setup of network

  Assessment plan of the applications for network performance

Develop a questionnaire to gather requirements from users, sports complex management, and staff. What kinds of questions would you ask to better understand

  Explain plan and design a lan/wan for citycampus

The faulty staff and students of CityCampus need the ability to communicate with each other via email and to access to internet. Plan and design a LAN/WAN for CityCampus based on the following considerations

  What are the different types of networks

What are the principal components of telecommunications networks and key networking technologies? Describe the features of a simple network and the network infrastructure for a large company.

  Reliable deal with supplier and client reluctance

How might reliable deal with supplier and client reluctance to provide detailed information about their internal operation?

  I outlinethis case study will require you to1 build a small

i. outlinethis case study will require you to1 build a small network using three switches and one router2 one switch

  Explain systems security certifications consortium web site

What are the areas addressed in CBK? Was policy explicitly listed? If not, where do you feel it is addressed in the CBK?

  Calculate the data rate required for robot

MITS5003 Wireless Networks and Communication Assignment, Victorian Institute of Technology, Australia. Calculate the data rate required for robot

  Explain the topology and its types

In Question 1, suppose a new switch is connected to the first switch by way of a network cable and three computers are connected to the new switch.

  Draw a simple graph to show conflict degree

Draw a simple graph to show conflict degree. Use channels as colors and show the algorithm step by step to color the graph. Explain what does thismean i.e. what have you constructed?

  Describe the general type of wan connections

Describe the general type of WAN connections and network hardware that will be used to interconnect the offices. Consider the following while responding:

  Differences between lan and wan management

What are some differences between LAN and WAN management? What is firefighting? Why is combining voice and data a major organizational challenge?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd