Subnet masking and designing small networks

Assignment Help Computer Network Security
Reference no: EM13254141

Subnet masking and designing small networks for fictitious organizations.

Task

Imagine you work for a firm which provides system administration and networking services to organizations. One day an organization which runs a hotel contracts to your organization. They provide the attached plans.

The hotel has a class C public address space. The network number is 203.220.72.0/24. The hotel provides a number of eatery, office, accommodation and conference like services. This particular organization would like to claim that all facilities have access to the Internet.

The Hotel has the following features.

1. 90 hotel rooms which have access to the Internet, spread over 5 floors (that is five floors of hotel rooms). Each room is to have one fixed Ethernet interface. Please note on each floor there is a hotel room which has got an attached bedroom. That room will also require a fixed Ethernet connection.

2. Each floor consisting of hotel rooms has a rack in a communications closet - there is a suitable riser between floors.

3. A large conference room capable of housing up to 15 fixed users is located the ground floor. Fixed networking is required in this room.

4. The owners of the hotel recommend supporting up to 200 wireless users concurrently. Users of such facilities should have access to the Internet through out all floors of the hotel.

5. The hotel has a small office that manages reservations and the hotel's programs/ facilities. There are no more then 20 people in these offices (very crowded) requiring access to the Internet. These offices are situated on the ground floor and are directly attached to the Administrative Offices.

6. The hotel wishes to have Internet functionality in the lobby bar providing customers with access to the Internet. There would be no more then 5 concurrent customers - these are built into the tables adjacent to the concierge desks.

7. The concierge and reception tables will require at least 3 network connections each.

8. The hotel also wishes to have machine room. The machine room would have no more then 16 hosts and is situated on the ground floor in the communications room.

9. Your carrier gives you a high end DSL (perhaps a Juniper) router that advertises your network to the rest of the world. The external interface of your router will be bound to an address, which you nominate from your address space. The internal interface of the router should connect directly to your routing core. You not need to worry about routing from the outside worlds perspective. But you will need to worry about routing for your entire internal network. You should advise your infrastructure that the public interface is you default gateway.

A basic floor plan is attached.

You now know what the hotel requires in terms of connectivity. Using this partial specification, proposes a tructure for the network to be used by the hotel. Your design of the network should describe the nfrastructure you have and how it is connected from both a Layer 1 perspective. Some of the considerations

o address include:

1. Do have switches on each floor?
2. How will these switches be connected to one another?
3. What kind of switches do you plan to use?
4. What media will you use to connect edge devices to the switches and/or routers?
5. What kind of routers will you use?
6. How many interfaces will they have of what type?
7. How will you distribute the cabling up the floors of the building and within the floors?
8. What components will you need in addition to the switches and routers required?

Once you have done a physical design of the network you are then to define a network structure. When doing his you are to work out network numbers and sizes along with the number of routers you wish to have. You hould provide a logical diagram of this.

Once a design is complete for each device you are to provide a configuration - as this hotel has an alliance with Cisco you can assume you will be using Cisco kit. You will need to outline the routing rules you put in place (only inside and default gateway). You should aim to use as much of your address space as possible but you MAY need to use NAT/PAT.

You will also need to nominate an address for a DHCP server for both wired and wireless infrastructure, you can use the DHCP servers on the switches. You will need to set up these DHCP servers the DHCP can come hosted in the machine room. Your network configuration should include whats needed to support this from a outing/ switching perspective.

To do this task you will have to make assumptions as to security, segmentation, isolation and other aspects. For each assumption you make be sure justify it using common sense and/or evidence provided above. You are free to use VLANS and VLAN trunking protocols such as 802.1q where appropriate.

You will need to define appropriate ACL's on your infrastructure. The rules are as follows:

1. Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks.

2. Users on the hotels corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.

Finally you will need to set up a DNS server. The server should be in the machine room network and assigned a static address. The server will be accessible from both inside and outside the hotel. The server will have forward and reverse zones, the forward zone will be myhotel.net. The DNS server should have a secondary server in the machine room network which is a replica of the primary. For now you can leave the zone empty. Please document your configuration.

Verified Expert

In this projects, we are designing the small network infrastructure for hotels because the fictitious organizations runs a hotel contracts to provide the networking services. Basically, hotels network infrastructure requires in terms of connectivity. The network design is completed by using the Cisco kit. The basic configurations are done and also nominate an address for a DHCP server for both wired and wireless infrastructure. The hotel proposed network infrastructure is used to provides the security and flexibility.

Reference no: EM13254141

Questions Cloud

What is the production for each alternative : What is the production (output per hour) for each alternative? What is the productivity (output per labor hour)?
Convert the twos compliment numbers to decimal : Convert the following Two's Compliment numbers to decimal: 1) 0101 1110 10112C 2) 1001 1111 10002C 3) 1111 1111 11112C 4) -1001 0110 10012C  5) 1010 1010 10102C 6) 1000 0000 00002C
Calculate the economic order quantity : Calculate the annual holding cost plus the annual ordering cost to get the total annual cost when using an order quamtity of 200 boxes. Please show your work.
Preparing for contract negotiations : You are preparing for contract negotiations. To achieve your desired contract negotiation results, you need not only a strategy but also tactics and countertactics.
Subnet masking and designing small networks : Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks and corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.
What are major components of a strategic management process : What are the major components of a strategic management process? Which component is most difficult for managers to perform? Explain your answer.
Calculate the series resistance of the led : GaAs LED emitting surface size is 180 um by 180 um. The doping levels are NA = 9 E+15 cm-3 and ND = 5 E+17 cm-3. The n-layer is 70 um thick, and the p-layer is 8 um thick.
Why is it important for a company to have a cash budget : What are some steps an entrepreneur can take to improve the company's cash position?
Find the power for given resistance and current : The power P of an Electric circuit varies jointly with resistance , R and with the square of the current, I. find the power if the current is 2.00 A and the resistance is 2.00 ohms

Reviews

Write a Review

Computer Network Security Questions & Answers

  How is biometric method more beneficial than keypad

Those links are just for downloading required files. There is no work needed from any links. How is this biometric method more beneficial than keypad where the employee just presses in Pin number?

  Analysis of a small publishing company

A small magazine publisher wishes to determine the best combination of 2-possible magazines to print for the month of July. Backyard magazine, which he has published for years, is a contant seller.

  Securing several desktop computers connected to network

Securing numerous desktop computers connected to the network. Explain the access control that you would put in place for each and explain why.

  Explain hardware and software used to support personal

Write 700-1050 word paper explaining hardware and software used to support personal, workgroup, and enterprise computing within current organization, an organization.

  Explain why asynchronous i/o activity is a problem

Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem.

  Malicious attacks and / or threats that you identified

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your ..

  Prepare a graph of the storage requirements

Prepare a graph of the storage requirements for the project.

  Recall that a computer virus is malware

Recall that a computer virus is malware that relies on someone or something (other than itself) to propagate from one system to another. Write a computer virus that can be written to other empty text documents by running the batch program.

  Processes on a system share no resources

Assume that processes on a system share no resources. Is it possible for one process to block another processes' access to a resource? Why or why not? From your answer, argue that denial of service attacks are possible or impossible.

  A firewall works by blocking incoming

A firewall works by blocking incoming requests. Explain how a firewall can distinguish between two incoming requests allowing one while denying the other??

  What factors might an organization consider

What factors might an organization consider when choosing to implement an AD-integrated DNS zone versus a traditional zone? Describe a scenario in which it would be preferable

  Controls to detect or prevent salami attacks

List three controls that could be applied to detect or prevent salami attacks. Modularity can have a negative as well as a positive effect. A program that is overmodularized performs its operations in very small modules.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd