Problem on subnet masking and designing small networks

Assignment Help Computer Networking
Reference no: EM13269007

The aim of this assignment is to become familiar with subnet masking and designing small networks for fictitious organizations.

Imagine you work for a firm which provides system administration and networking services to organizations. One day an organization which runs a hotel contracts to your organization. They provide the attached plans.

The hotel has a class C public address space. The network number is 203.220.72.0/24. The hotel provides a number of eatery, office, accommodation and conference like services. This particular organization would like to claim that all facilities have access to the Internet.

The Hotel has the following features.

1. 90 hotel rooms which have access to the Internet, spread over 5 floors (that is five floors of hotel rooms). Each room is to have one fixed Ethernet interface. Please note on each floor there is a hotel room which has got an attached bedroom. That room will also require a fixed Ethernet connection.

2. Each floor consisting of hotel rooms has a rack in a communications closet - there is a suitable riser between floors.

3. A large conference room capable of housing up to 15 fixed users is located the ground floor. Fixed networking is required in this room.

4. The owners of the hotel recommend supporting up to 200 wireless users concurrently. Users of such facilities should have access to the Internet through out all floors of the hotel.

5. The hotel has a small office that manages reservations and the hotel's programs/ facilities. There are no more then 20 people in these offices (very crowded) requiring access to the Internet. These offices are situated on the ground floor and are directly attached to the Administrative Offices.

6. The hotel wishes to have Internet functionality in the lobby bar providing customers with access to the Internet. There would be no more then 5 concurrent customers - these are built into the tables adjacent to the concierge desks.

7. The concierge and reception tables will require at least 3 network connections each.

8. The hotel also wishes to have machine room. The machine room would have no more then 16 hosts and is situated on the ground floor in the communications room.

9. Your carrier gives you a high end DSL (perhaps a Juniper) router that advertises your network to the rest of the world. The external interface of your router will be bound to an address, which you nominate from your address space. The internal interface of the router should connect directly to your routing core. You not need to worry about routing from the outside worlds perspective. But you will need to worry about routing for your entire internal network. You should advise your infrastructure that the public interface is you default gateway.

A basic floor plan is attached.

You now know what the hotel requires in terms of connectivity. Using this partial specification, proposes a structure for the network to be used by the hotel. Your design of the network should describe the infrastructure you have and how it is connected from both a Layer 1 perspective. Some of the considerations to address include:

1. Do have switches on each floor?
2. How will these switches be connected to one another?
3. What kind of switches do you plan to use?
4. What media will you use to connect edge devices to the switches and/or routers?
5. What kind of routers will you use?
6. How many interfaces will they have of what type?
7. How will you distribute the cabling up the floors of the building and within the floors?
8. What components will you need in addition to the switches and routers required?

Once you have done a physical design of the network you are then to define a network structure. When doing this you are to work out network numbers and sizes along with the number of routers you wish to have. You should provide a logical diagram of this.

Once a design is complete for each device you are to provide a configuration - as this hotel has an alliance with Cisco you can assume you will be using Cisco kit. You will need to outline the routing rules you put in place (only inside and default gateway). You should aim to use as much of your address space as possible but you MAY need to use NAT/PAT.

You will also need to nominate an address for a DHCP server for both wired and wireless infrastructure, you can use the DHCP servers on the switches. You will need to set up these DHCP servers the DHCP can come hosted in the machine room. Your network configuration should include whats needed to support this from a routing/ switching perspective.

To do this task you will have to make assumptions as to security, segmentation, isolation and other aspects. For each assumption you make be sure justify it using common sense and/or evidence provided above. You are free to use VLANS and VLAN trunking protocols such as 802.1q where appropriate.

You will need to define appropriate ACL's on your infrastructure. The rules are as follows:

1. Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks.

2. Users on the hotels corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.

Finally you will need to set up a DNS server. The server should be in the machine room network and assigned a static address. The server will be accessible from both inside and outside the hotel. The server will have forward and reverse zones, the forward zone will be myhotel.net. The DNS server should have a secondary server in the machine room network which is a replica of the primary. For now you can leave the zone empty. Please document your configuration.

Attachment:- Assignment.rar

Reference no: EM13269007

Questions Cloud

What is the difficulty with the original tcp srtt estimator : In the absence of any special knowledge of network conditions, the typical approach is to pick an arbitrary value, such as 3 s, and hope that this will converge quickly to an accurate value. If this estimate is too small, TCP will perform unnecess..
Competitive intelligence community : Buffalo Wild Wings with a Strengths, Weaknesses, Opportunities, and Threats analysis also referred to as SWOT in the competitive intelligence community.
What kind of business law system would you adopt : what kind of business law system would you adopt -a civil law system or a common law system, and why? 2) What kind of business regulations would you impose?
What is the apparent weight of a cube of iron : What is the apparent weight of a cube of iron of volume 0.2 m3 when it is submerged in water? The density of iron is 7800 kg/m3
Problem on subnet masking and designing small networks : Subnet masking and designing small networks for fictitious organizations - provides system administration and networking services to organizations
Find the rate of change in entropy of the ice : A copper rod 25 cm long having a cross-sectional area of 7.5 cm2 is used to connect a boiler maintained at 100 oC to a large block of ice at 0 oC. What is the rate of change in entropy of the ice
What is now the angular speed of the carousel : A woman stands at the edge of a carousel that is rotating without friction at 0.80 rad/s. The carousel has a radius of 2.0m and a moment of inertia of 600 kg m2. What is now the angular speed of the carousel
How far will object travel in first 2 seconds of its journey : Suppose an object with initial acceleration of 10 ft/s^2 is dropped from 300 ft. above the earth, how far would it travel in the first 2 seconds of its journey. Assume initial velocity is zero.
Management-union relationship-legislation : Why are the laws you chose important and what role did they play in shaping today’s management-union relationship?

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine maximum number of ip addresses assigned

Determine the smallest size subnet which can be utilized to fulfil this requirement? _______. Determine the maximum number of IP addresses which can be assigned in this size subnet?

  Create a report exploring the stages

Create a report exploring the stages involved in a specific attack (of your choice) against a computing system.

  End to end encryption

How is end to end encryption different from other types of encryption? At what layer does it take place?

  Threat, risk and vulnerability

Threat, Risk and Vulnerability are related to Cybersecurity. Describe these three terms and provide a business case example.

  Explain concept of wireless access to employees

Explain the concept of providing wireless access to employees from perspective of employee benefits and effect to organization.

  List host addresses

Subnet the following address - 130.4.8.74 The goal is to subnet the above address and to produce 7 subnets and 350 hosts/subnet. Please show all of your work. I am looking for the following: 1. List Custom Subnet Mask 2. List Network Addresses 3. ..

  Explain how the relative speed of the 100baset lans used

Explain how the relative speed of the 100BaseT LANs used at each location compares to accessing the WAN link between the two sites.

  Explain networking concepts by using osi model as framework

Explain networking concepts by using OSI Model as framework. Explain protocols at different layers of the OSI model and describe their functionality.

  What information in packet does switch use to find link

When one of these packets arrives to packet switch, what information in packet does switch use to determine link onto which packet is forwarded?

  Disadvantages of building three separate models

Write down the advantages and disadvantages of building these three separate models? What representations are used for each of these models?

  Determine prefixes for four subnets

Assume it wishes to create four subnets from this block, with each block having same number of IP addresses. Determine the prefixes (of form a.b.c.d/x) for four subnets?

  A computer that can test 2^40 keys each second

Given a computer that can test 2^40 keys each second. What is the expected time to find a key by exhaustive search given a key space, say 2^88. How do you go about figuring this out? Is there a formula or standard equation that is used?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd