A major australian data analytics company

Assignment Help Computer Networking
Reference no: EM131692676

Networking Case Study

Introduction

This case study has been divided into five components.

You are to design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc.), subnet the network using VLSM, and assign IP addresses to the appropriate devices. You will also be required to implement security by applying access control lists to filter traffic.

Deliverables

1. A single Word document(.docx) - containing all parts

Assignment breakdown

Scenario

 major Australian data analytics company has asked you to assess and redesign their network. They are opening new branches in Brisbane and Adelaide, which will require new equipment. They have existing contracts and hardware to maintain fibre optic leased line WAN links between sites.


PART 1 - Network specifications and diagram

PART 2 - Subnet the network using VLSM, and assign IP addresses to the appropriate devices

PART 3 - Research and source appropriate devices justifying choices (feasibility, efficiency, etc.) with a Weighted Scoring Model (WSM) and documented report

PART 4- Security by applying Access Control Lists (ACLs) to filter traffic

PART 5 - Cloud computing proposal


PART 1 - Network specifications and diagram

Network Specifications

You have been given a rough sketch of the network topology below. You are to draw the network using Visio, subnet the network (see case study part 2), and assign port numbers and IP addresses to ports.

Network Structure

 

 

617_Network-structure.jpg

 

Hardware

Only include one switch in you diagram for each LAN and one wireless access point for each WLAN (even if more are required)

The Internet router port address is 104.200.16.26/30

The Sydney router is connected to the Internet, and provides access to the public backbone containing a web server and a database server.

 

PART 2 - Subnet the network using VLSM, and assign IP addresses to the appropriate devices.

Each location has the following number of hosts

Sydney, Melbourne, and Brisbane each include a wireless LAN for clients to use.

 

Location

Workstations

WLAN addresses

Sydney

910

14

Melbourne

200

6

Brisbane

40

6

Canberra

120

 

Adelaide

70

 

Hobart

20

 

 

Subnetting

Use VLSM to subnet the network topology using a public class B network. You are to use the table format below to provide the subnet details.

Table 1. Subnets (including WAN subnets)

Spreadsheet Columns:  Subnet name, subnet address, subnet mask (in slash format), first useable address, last useable address, broadcast address, static address range and DHCP address range (all addresses to be in dotted decimal notation)

Table 2. Router Interfaces

Spreadsheet Columns:  Location, interface, IP address, subnet mask (in slash format)

Table 3. Servers

Spreadsheet Columns:  Location, server name, IP address, subnet mask (in slash format)

 

Additional requirements:

Choose one public B class network address for the entire network and subnet this block of addresses to optimise spare addresses for future expansion.

Place the WAN subnets in the blocks directly following the LAN address space.

Add 100% to each subnet to allow for growth in the number of hosts specified for each LAN (i.e. workstations ×2). Do not allow for any growth in the number of servers or size of WLANs

DHCP will to be used for IP address allocation for hosts in each subnet and these ranges are to be allocated for each LAN.

Static IP addresses are to be allocated where appropriate.

The ISP has given us an IP address of 104.200.16.26/30 for our Internet connection at Sydney.

You must also provide your working to show how you calculated the subnet sizes and determined the appropriate addresses and ranges. Do not include working in your tables, present it after the tables.

 

PART 3 - Research and source appropriate devices justifying choices (feasibility, efficiency, etc.)

You are to research and submit a project procurement plan for the Adelaide and Brisbanenetworks. The devices you must include are routers, switches, and wireless access points.Make sure the devices you select can handle the number of workstations required at each site, and provide a good quality of service to wired and wireless users.

Your project plan and final recommendations should be based on a Weighted Decision Matrix (similar to the WDM you did in the Procurement Practical). You are to compare five (5) devices from each category and to base the decision on reasonable and well-justified attributes.

The budget for all procurement is $10,000. You may exceed this if you can justify it well.

Your project plan is to contain the following components:

Executive summary

Briefly describe the goals of the procurement plan

Weighted Decision Matrix - hardware resource requirements analysis

Include a written justification for priorities and attributes given in the matrix

Create your WDMs in Excel and copy and paste them into your Word doc

Budget

Create a well-presented table of the prices of all devices and the total cost

Include hardware only, not labour

 

PART 4- Security by applying access control lists to filter traffic

Write ACL tables, in the format taught in the lectures, to address the following security requirements.

Requirements for all ACLs

ACLs are to be placed in the optimal position to minimise bandwidth unless the location of the ACL is specified

You are not to rely on the implicit deny any any.

No ACL is required on a port where all traffic is permitted.

Create one ACL table per router.

a) Access to the Internet and public backbone:

Apply these ACL/s to serial 0/0 on the SydneyRouter

 

External hosts outside the organisation (on the Internet) must only be able to access the Sydney Web server on the public backbone using HTTP and HTTPS.

No other external access is permitted into the organisation from the Internet.

Internal hosts must only be able to communicate out to the Internet using HTTP and HTTPS (Hint: established connections must be allowed to communicate back into the private network).

b) Sydney and Melbourne

The Sydney and Melbourne LANs should have unrestricted access to the Internet, and to the Sydney servers.

The Sydney and Melbourne WLANs should have HTTP and HTTPS access to the Internet, and to the Sydney Web server, but no access to anywhere else on the corporate network.

The Sydney Web server should have unrestricted communication via HTTP and HTTPS, and be able to respond to ping requests from internal hosts.

The Sydney Database server should be able to respond to established connections via port 1433.

c) Brisbane, Adelaide, and Canberra

The Brisbane, Adelaide, and Canberra WANs should have HTTP and HTTPS access to the Internet and to the Sydney Web server

9. The Brisbane WLAN should have HTTP and HTTPS access to the Internet, and to the Sydney Web server, but no access to anywhere else on the corporate network.

d) Hobart

The Hobart servers should be able to initiate connections anywhere within the corporate network without restriction.

Only traffic from established connections and from the Hobart LAN is permitted to reach the Hobart servers. All other access should be blocked.

The Hobart LAN should have unrestricted access to the Internet, the Sydney servers, and the Hobart servers.

 

PART 5-Cloud computing proposal

You have been asked to prepare a proposal about how cloud computing could be used to reduce the company's hardware, service, and energy costs. You are to consider the following three scenarios, and make a recommendation on which to choose:

1. Replacing ALL workstations within the organisation with thin clients, which will access a desktop environment provided by a cloud service provider (such as Amazon).

2. Replacing ALL workstations within the organisation with thin clients, which will access a desktop environment provided by a private cloud infrastructure, created in-house and based in Sydney.

3. Continuing to use workstations.

The company's current contract is $800 per workstation, per year, for hardware and service. On average, each workstation currently consumes 200 kWh per year of electricity. In making your recommendation, you should consider not just costs, but the security implications of moving to a cloud service.

Your proposal should not exceed 2000 words. You must provide citations for any references that you use.

 

 

Reference no: EM131692676

Questions Cloud

Prepare the consolidated balance sheet of Zeus Group : AF5141 Corporate Financial Accounting Assignment. Instructions: You are required to prepare the consolidated balance sheet of Zeus Group as at 31 December 2017
How would you fix the issues mentioned : Think about what that person said of their experience. Now, imagine that you have the power to fix anything; how would you fix the issues mentioned?
What percentage of values expect to be out of bounds : Assuming a normal distribution of item values, what percentage of values would you expect to be out of bounds when the process is in control?
Draw the network using visio : CP1402 - design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc.), subnet the network, assign IP addresses
A major australian data analytics company : A major Australian data analytics company has asked you to assess and redesign their network. They are opening new branches in Brisbane and Adelaide, which will
How talent can be managed effectively in an organization : First, you will note how talent can be managed effectively in an organization operating across globe. Keep in mind that shifting from a domestic to a balanced.
Compare cesear beccaria and jeremy bentham : Compare Cesear Beccaria, Jeremy Bentham, and John Howard's theories and roles in the early correctional systems
Find the mean and the variance of annual sales : Total annual textbook sales in a certain discipline are normally distributed. Forty-five percent of the time, sales are above 671,000 copies.
Find the mean and the standard deviation of typing speed : The probability that the speed will be more than 70 words per minute is 0.15. Find the mean and the standard deviation of typing speed.

Reviews

Write a Review

Computer Networking Questions & Answers

  Why virtualization is gaining so much popularity

Discuss why virtualization is gaining so much popularity, and compare it with other types of networks that are currently available - Evaluate security implications of implementing virtualization.

  List five companies that provide p2p file-sharing services

List five companies that provide P2P file-sharing services. Identify what types of files P2P file-sharing services can deliver, and if there are different approaches for different file types.

  What are the key elements of protocols in network management

What are the key elements of protocols in network management

  Project for implementation of wireless access network

Wireless Networks& Security - The cutting edge wireless technologies and your critical thinking about them

  List the important antenna parameters

List the important antenna parameters and give the definition of three of parameters of your choice. What are differences between MS antennas and BS antennas?

  Explain how switched backbones work

Explain how switched backbones work.- What are the key advantages and disadvantages of routed and switched backbones?

  How cloud computing is utilized in your day-to-day life

Consider your own environment and the manner in which you connect with people. Explain how cloud computing is utilized in your day-to-day life.

  Advantages and disadvantages of moving to a saas provider

Should SoftArc move to a SaaS provider in order to provide email and office automation services for their employees? What are the advantages and disadvantages of moving to a SaaS provider for these services?

  How can the company connect all of its offices to the intern

How can the company connect all of its offices to the Interne

  Compile a list of products names and capabilities

Using your favorite browser, open the search engine of your choice Search the Web to locate some useful resources related to active Web page development.

  The wireless lan technology had a profound impact

The wireless LAN technology (IEEE802.11x standards) has had a profound impact in short-range communications. Other wireless technologies, particularly Bluetooth, Zigbee, IrDA, RFID and NFC offer shorter-range communication services for various typ..

  Examine UBR-CBR and ABR technologies

Choose one of these as the preferred method for transmitting data when bit-rate and minimum quality of service are top priorities and defend why this technology is the best of the three.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd