Design a network, research and source appropriate devices

Assignment Help Computer Network Security
Reference no: EM133132299

Assignment - Networking Case Study

Introduction
This case study has been divided into three (3) components.
You are to design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc.), subnet the network, and assign IP addresses to the appropriate devices.

Assignment breakdown

Scenario

myData Services Inc., an Australian data analytics company, has asked you to assess and redesign their network. They are opening a new branch in Glasgow, which will require new equipment. They have existing contracts and hardware to maintain fibre-optic leased line WAN links between sites.
PART 1 - Network diagram
PART 2 - Subnet the network and assign IP addresses to the appropriate devices
PART 3 - Research and source appropriate devices justifying choices (feasibility, efficiency, etc.) with a Weighted Scoring Model (WSM)

PART 1 - Network specifications and diagram

Network Specifications
You have been given a rough sketch of the network topology below. You are to draw the network using draw.io subnet the network (see Part 2), and assign port numbers and IP addresses to ports.

Network Structure

1483_Network Structure.jpg

Hardware
• Only include one switch in you diagram for each LAN or WLAN (even if more are required).
• Servers should be on their own LAN.
• The Internet router port address is 202.234.68.1/30.
• The Perth router is connected to the Internet and provides access to the public backbone containing a database server, a mail server, and a web server.

PART 2 - Subnet the network using VLSM, and assign IP addresses to the appropriate devices.

Each location has the following number of hosts
Perth, Glasgow, and Zurich each include a wireless LAN for clients to use.

Location

Workstations

WLAN addresses

Perth

1100

48

Glasgow

90

10

Zurich

450

115

Auckland

100

 

Denver

125

 

Subnetting
Use VLSM to subnet the network topology using a public class B network. You are to use the table format below to provide the subnet details.
Table 1. Subnets (including WAN subnets)
Spreadsheet Columns: Subnet name, subnet address, subnet mask (in slash format ONLY), first useable address, last useable address, broadcast address, static address range and DHCP address range (all addresses to be in dotted decimal notation)
Table 2. Router Interfaces
Spreadsheet Columns: Location, interface, IP address, subnet mask (in slash format ONLY) Table 3. Servers
Spreadsheet Columns: Location, server name, IP address, subnet mask (in slash format ONLY) Additional requirements:
• Choose one public B class network address for the entire network and subnet this block of addresses to optimise spare addresses for future expansion.
• Place the WAN subnets in the blocks directly following the LAN/WLAN address space (i.e., finish putting all the LAN/WLAN subnets in the table first, then follows by the WAN subnets).
• ADD 100% to each subnet to allow for growth in the number of hosts specified for each LAN (i.e., workstations × 2). DO NOT ALLOW for any growth in the number of servers or size of WLANs.
• DHCP will to be used for IP address allocation for hosts in each subnet and these ranges are to be allocated for each LAN.
• Static IP addresses are to be allocated where appropriate: router interfaces and servers.
• The ISP has given us an IP address of 202.234.68.1/30 for our Internet connection at Perth. Note: this address is part of the ISP's network, and is not involved in subnetting for the corporate network.

PART 3 - Research and source appropriate devices justifying choices (feasibility, efficiency, etc.)

You are to research and submit a project procurement plan for the Glasgow network. The devices you must include are routers, switches, and wireless access points. Make sure the devices you select can handle the number of workstations required and provide a good quality of service to wired and wireless users. Devices should be enterprise-grade, not home or gaming equipment.

Your project plan and final recommendations should be based on a Weighted Decision Matrix (like the WDM you did in the Procurement Practical). You are to compare three (3) devices from each category and to base the decision on reasonable and well-justified attributes.

The budget for procurement is $4,000. You may exceed this if you can justify it well. Your project plan is to contain the following components:

Weighted Decision Matrix - hardware resource requirements analysis
• Include a written justification for priorities and attributes given in the matrix
• Create your WDMs in Excel and copy and paste them into your Word doc
Budget
• Create a well-presented table of the prices of all devices and the total cost
• Include hardware only, not labour

Attachment:- Networking Case Study.rar

Reference no: EM133132299

Questions Cloud

Compute the labor rate and efficiency variances for month : Huron Company produces a commercial cleaning compound known as Zoom. Compute the labor rate and efficiency variances for the month
What is turntabling : What is "turntabling" and talk about how it forces a description of structure in music?
How much is the provision to be recognized : Other entities have incurred around Php60M for similar cleanup; however, How much is the provision to be recognized
How much is the gross receipts tax due : On June 30, 2021, the client pre-terminated the loan by repaying the principal in full. How much is the gross receipts tax due in 2021
Design a network, research and source appropriate devices : Design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc.), subnet the network, and assign IP addresses
Pass the journal entries in the books of the company : Salman Ltd. was registered with an authorized capital of Rs. 1000,000 divided into 100,000 ordinary shares of Rs.10 each. Pass the journal entries in the books
Describe the technology : Describe the technology. What were the political effects of this technology? Describe at least one negative political outcome.
How much was allocated to Amos in total : Julie's ending capital balances were $100,000, $50,000, and $150,000 respectively. If there was a partnership net profit of $400,000, how much was allocated
Prepare the income statement and classified balance sheet : Prepare the income statement and classified balance sheet (in report format) for Copy Central Company for the quarter ended December 31, 2020

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd