Redesign the university ip addressing space

Assignment Help Computer Network Security
Reference no: EM13328382

The University is running out of IPv4 in a number of areas due to the current addressing scheme being to granular. This was done to help with billing internet usage in the past. The University needs to create free IP addressing space through consolidating IP addressing, especially to deal with the current growth in BYOD technologies. Staff and students are now using more than one device connected to the wireless infrastructure.

In 2015 La Trobe University expects to have over 25,000 concurrent wireless devices connected to the Infrastructure during peak periods. The public IP addressing space is being reserved for Students, Staff, Researchers and Guests networks on Wireless. The wired network is currently being used for VOIP, Computer LABs, Audio Visual, Security, Servers and Research equipment.

You only need to make allowance for Research Equipment, Servers (Virtual IP) and Computer Labs to remain on the Public IP addressing scheme.

Redesign the University IP addressing space. The University owns 2 x Class B (144.149.0.0 and 131.172.0.0) IPv4 Public IP addressing space and also utilizes IPv4 Private IP addresses including 10.0.0.0 and 192.168.0.0.

Design an addressing scheme that best utilizes the addresses available and simplify management whilst ensuring the best security in the design. Your design needs to cater for the following.

1) Sites
Bundoora - 64000 IP Addresses
Bendigo - 16000 IP Addresses
Wodonga - 4000 IP Addresses
MilduraDeakinstreet - 800 IP Addresses
Mildura TAFE - 400 IP Addresses
Franklin Street - 800 IP Addresses
City Campuses - 800 IP Addresses
Austin Hospital - 400 IP Addresses
Alfred Hospital - 400 IP Addresses
3rd Party Networks (Research Bundoora) 12 x 60 IP Addresses
3rd Party Networks (Research Bendigo) 4 x 100 IP Addresses
3rd Party Networks (Research Wondoga) 1 x 100 IP Addresses

2) Other than at Research Locations at least 50% of the IP addressing needs to be allocated to Wireless services.

3) The network needs to be able to distinguish between staff, researchers and students networks.

4) The wired Connections are broken down into VOIP 20%, Computers\LABs 40%, Audio Visual 5%, Security 10%, Servers 15%, Research Equipment 5% and Printers 5%.

5) Servers should not be directly able to be accessed from their IP address to the Internet and typically are accessed via a load balancer devices which has a Virtual IP allocated for external access.

6) Printers and Security must not be accessible via the internet or student networks.


Attachment:- addressing scheme.xlsx

Reference no: EM13328382

Questions Cloud

Describe why may the corporate bond be preferred : An investor in the 35 percent tax bracket may purchase a corporate bond that is rated double A and is traded on the New York Stock Exchange (the bond division). This bond yields 9.0 percent.
Explain the fluoride ion concentration at equilibrium : Calcium fluoride has a Ksp of 3.9 x 10^-11 at 25 C. What is the fluoride ion concentration at equilibrium
Prepare an income statement for year using single-step form : Two accountants for the firm of Allen and Wright are arguing about the merits of presenting an income statement in a multiple-step versus a single-step format.
Explain how many disintegrations of ^40k nuclei : Due to decay of ^40K, cow's milk has a specific activity of about 6x10^-11 mCi per milliliter. How many disintegrations of ^40K nuclei are there per minute in 1.0 qt of milk
Redesign the university ip addressing space : Redesign the University IP addressing space. The University owns 2 x Class B (144.149.0.0 and 131.172.0.0) IPv4 Public IP addressing space and also utilizes IPv4 Private IP addresses
Estimate the total mass of the galaxy in solar masses : he Sun has an orbital speed of about 220 km/s around the centre of the Galaxy, Estimate the total mass of the Galaxy in Solar masses
Explain a voltaic cell is constructed that uses : A voltaic cell is constructed that uses the following reaction and operates at 298 K. Zn(s) + Ni2+(aq) Zn2+(aq) + Ni(s) (a) What is the emf of this cell under standard conditions
What is probability that person has attended multiple games : Interested in learning more about its fans, the marketing office of the Arena Football League (AFL) conducted a survey at one of its games. The survey had 898 respondents, 676 males and 222 females.
Find the maximum and minimum orbital speeds : Te orbit of an asteroid extends from Earths to Jupiter's, just touching both. Find the maximum and minimum orbital speeds of the asteroid

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe the security features available on a platform

Describe the security features available on a platform of your choice (for example, Linux/Android/Mac OS X/Windows/Apache/Java/Perl), to mitigate a specific type of attack (for example, adware/malware/SQL injection/spoofing/tampering).

  Theft of logins and passwords

Theft of logins and passwords

  Processes on a system share no resources

Assume that processes on a system share no resources. Is it possible for one process to block another processes' access to a resource? Why or why not? From your answer, argue that denial of service attacks are possible or impossible.

  List three key things employees remember on data privacy

List at three key things employees should remember on data privacy, security practices, and the legal implications of data privacy. The document should be something which draws someone to look at it while still maintaining professional appearan..

  What factors might an organization consider

What factors might an organization consider when choosing to implement an AD-integrated DNS zone versus a traditional zone? Describe a scenario in which it would be preferable

  Configuring dhcp with alternate ip address configuration

By configuring DHCP with an Alternate IP Address Configuration. Describe how this technique could be used in an IT environment of your choosing.

  It project management

Assume your corporation is trying to decide whether it should buy special equipment to prepare some of its high-quality publications itself or lease the equipment from another corporation.

  Create alternative message which has hash value

Generates the alternative message which has a hash value which collides with Bob's original hash value. Illustrate a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

  Encrypt block in block cipher using key

Suppose that there is block cipher ABC that always encrypts block of b=72 bits using key of k= 60 bits. Prove that XYZ doesn't give much stronger security than ABC.

  Explain the purpose of using cvss scores

Select a recent vulnerability from that Database and analyse it from the what problems they can cause (malicious activities an attacker may use them for, including attack types)

  What is the value of shared secret key

You have secretly picked the value SA = 17. You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Question about virtue ethics

Based on virtue ethics, the right action to take in a particular situation is the action that a person with a strong moral character would take.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd