Integrity and availability of networked services

Assignment Help Computer Networking
Reference no: EM133564933

Case Study

Company profile:

You are working as a Network Engineer for Harbour Technology Pty Ltd. Harbour Technology is currently in the process of setting of seven global DHCP servers as a part of their company expansion across the world.

Your main job is to design the network architecture design for all 7 LANs and WAN connection to connect all LAN across the world. You are also asked to design IP address scopes for seven global DHCP servers as part of a project to deploy your organisation's international email system. Since RIP will be the standard routing protocol, zero subnets will be used to conserve IP addresses. You have been told that Harbour Technology Pty Ltd is going to use private address 10.0.0.0

After discussion with the company's IT Manager, you have identified the number of nodes needed for each LAN which is tabulated below. Now you need to work out the IP address and subnet mask needed to configure each LAN. You also need to design IP address for serial link to connect various LANs.

New Project along with Organisational requirements:

You are the network engineer in your company. Theorganisation has assigned the project to you and you will configure, install, manage and troubleshoot on medium enterprise routers on different locations The management of the organisation wants you to apply network topologies, routing and security protocols. This includes:
• Prepare to install router
• Configure basic router operation
• Configure dynamic classless routing protocols
• Apply troubleshooting processes

1 Policy Statement

To meet the enterprise business objectives and ensure continuity of its operations, Harbour Technology Pty Ltd shall adopt and follow well-defined and time-tested plans and procedures, to ensure the protection of its network services. To support its business functions, Harbour Technology Pty Ltd encourages the use of, and provides access to, information technologies and network resources. This enables employees to access global information resources, as well as the ability to communicate with other users worldwide. In keeping with its role and values, Harbour Technology Pty Ltd supports the use of electronic communication for the conduct of official business and for individual professional needs.

2 Purpose
The purpose of this policy is to protect the integrity and availability of networked services. This represents the company-wide guidelines and responsibilities required to maintain acceptable and proper use of all network resources and services. The intent of this policy is to educate users about their responsibilities regarding computing resources and services while identifying certain unacceptable uses of network resources and services.

3 Scope
3.1 IT Assets
This policy applies to all organisational network systems, end devices which access networks and information systems.
3.2 Documentation
The documentation shall consist of Network Services Security Policy, and related procedures & guidelines. The Network Services Security Policy document and all other referenced documents shall be controlled. Version control shall be to preserve the latest release and the previous version of any document. However, the previous version of the documents shall be retained only for a period of two years for legal and knowledge preservation purposes.
3.3 Records
Records being generated as part of the Network Services Security Policy shall be retained for a period of two years. Records shall be in hard copy or electronic media. The records shall be owned by the respective system administrators and shall be audited once a year.
3.4 Distribution and Maintenance
The Network Services Security Policy document shall be made available to all the employees covered in the scope. All the changes and new releases of this document shall be made available to the persons concerned. The maintenance responsibility of the document shall be with the CISO and system administrators.
Privacy
The Network Services Security Policy document shall be considered as "confidential" and shall be made available to the concerned persons with proper access control. Subsequent changes and versions of this document shall be controlled.
1.1.1 5 Responsibility
The Network Services Security Policy shall be implemented by the CISO / designated personnel and network administrator.
1. Courtesy and respect for the rights of others.
The Harbour Technology Pty Ltd community has the responsibility to foster a positive and secure campus community by respecting and valuing the right of privacy and the diversity of the population and opinion in the community. In addition, all are responsible for complying with Company policy and all laws and contracts regarding the use of information.
2. Use of resources.
Users are responsible for knowing what information resources are available including those shared by the campus community. Users should refrain from all acts that waste or prevent others from using these resources. Users have a responsibility to ensure the security and integrity of the computer and network resources and services they use or access. Responsibilities include performing regular data backups, controlling physical access to information and computer equipment, using virus protection software, and keeping the virus definition file (DAT file) up to date. Responsibilities may also include updating Windows Critical Updates as requested by Computer and Information Services.

3. Information integrity.
Users are responsible for the accuracy, completeness, trustworthiness, timeliness, and relevance of the data they enter into and extract from information systems. Users should not unconditionally depend on information or communications to be correct when they appear contrary to expectations. It is important to verify the integrity of the data entered into information systems because the information contained on information systems may be used for reporting at a future date.

6. Policy
The organisational network shall be designed and configured to deliver high performance and reliability to meet the needs of the business whilst providing a high degree of access control and a range of privilege restrictions. Suitably qualified staff shall be designated to manage the organisation's network, and preserve its integrity in collaboration with the nominated individual system owners. The networks and networked services, which are allowed to be accessed, shall be clearly specified. There shall be an authorisation process for determining who shall be allowed to access which networks and networked services. Unauthorised access to network connections and network services shall be minimised.

7. Rules
1. Users shall not place confidential information on the computer's local hard drive without protecting the information appropriately. Employee, Client and Vendor/Supplier details to be kept confidential. If you store confidential or sensitive information on your computer, you are required to take all precautionary steps to safeguard the information.
2. Users are responsible for adhering to the Internal Network Equipment Policy when connecting any devices to theHarbour Technology Pty Ltd. Devices include, but are not limited to computers, laptops, servers, routers, switches, hubs, wireless devices.
3. No one shall use any Company network resources or services without proper authorisation. No one shall assist in, encourage or conceal any unauthorised use or attempt at unauthorised use of any of the Company's network resources and services.
• Use of network resources and services without permission is theft of services and is illegal under state and company law.
• Authorised use of Harbour Technology Pty Ltd -owned or operated computing and network resources use consistent with the service missions of the Company.
4. No one shall knowingly endanger the security of any network resource, nor willfully interfere with others' authorised network usage.
5. No one shall use Harbour Technology Pty Ltd network resources or services to attempt unauthorised use, nor to interfere with others' legitimate use, of any network facility anywhere.
• The ability to use a remote computer does not constitute permission.
• Users are not permitted to run software that searches for means of obtaining unauthorised access (ie. port scans, password crackers, etc.) even if the user does not plan to make unauthorised access after finding an access point.
• Users are not permitted to run software that burdens the network with unnecessary traffic or intentionally degrades the performance of the network. (i.e.. unnecessary repetitive pings and traceroutes)
6. No one shall connect any computer or network equipment to any of the Company's network resources or services until the equipment has been registered with the IT Infrastructure Department. Users are responsible for adhering to the Internal Network Equipment Policy when connecting any devices to the Harbour Technology Pty Ltd. One improperly configured computer or network device on a network can cause company-wide disruption. Devices include, but are not limited to computers, laptops, servers, routers, switches, hubs, wireless devices.
7. No one without specific authorisation shall use any Company network resource or service for non-Company business. By law, the Company can only provide computer resources and services for its own work, not for private use. Therefore, using Company resources or services to establish, run or support a personal and/or non-Company related business venture (e.g. via email, web site, listserv, etc.) is prohibited. Users in need of computing/printing resources for private or personal purposes will need to contact local computer vendors for procurement options.
8. No one shall create, install or knowingly distribute a computer virus or other surreptitiously destructive program on any network resource, regardless of whether any demonstrable harm results.
9. File sharing software is not permitted.
8. Enforcement
Any employee found to have violated this policy may be subjected to disciplinary action in line with the HR Policy.

Procedure to set Router Firmware

Step 1: Enter your router's IP address into any web browser's search box. If you don't know your router's IP address, see our guide on how to locate your router's IP address.

Step 2: Enter your e-mail address and password. If this is your first time signing into your router, the log-in information can be found in the router's manual or on the router itself.

Step 3: Search for the Firmware or Update section. This is commonly seen in the Advanced, Administration, or
Management sections. Depending on the make and type of your router, it may be located in a different position.

Step 4: Navigate to the website of the router's manufacturer. To get the firmware update files, simply search for your router's model number.

Step 5: Save the firmware upgrade file to your computer. This is frequently found in a ".ZIP" file, which is a compressed folder containing one or more files. Make certain that you are downloading the firmware update for your router model.

Step 6: Move the file to your desktop after extracting it. Because the contents are in a ZIP file, you must extract them, which means you must move the files from the compressed folder to a different location. Extract the firmware files from the ZIP file.

Step 7: Choose File or Browse in the Update section.
On your desktop, locate the router update file. This is often an image file, and it is the biggest file in the ZIP folder you downloaded.

Step 8: Begin the upgrading procedure. This may be accomplished by clicking on a button like
Update, or it may begin automatically.

Step 9: Wait for the procedure to be completed. It's crucial to keep in mind that the update process might take a few minutes, and you shouldn't disrupt it. Unplugging or turning off the router may leave the device inoperable and may cause permanent damage to the router.

Step 10: Once the firmware has been properly installed, reboot the router. This should happen automatically, but if it doesn't, you may restart the router manually by pushing and holding the reset button, which is generally located on the back of the device.

Step 11: Hold the button down for at least 10 seconds. Your lights should flicker or switch off and on.

Procedure to set Basic Parameters
Step 1:
The number of the interface type
Example:
Router (config) # fastethernet interface 0 Router (config-int) #
enters the router's setup mode for a Fast Ethernet WAN interface.
On Cisco 1800 series routers, Fast Ethernet WAN ports are designated 0-1.

Step 2:
IP address mask IP-address IP-addressIP-addressIP-address
Example:
Router (config-int) # ip address 192.1.12.2 255.255.255.0 Router (config-int) # ip address 192.1.12.2 255.255.255.0 Router (config-int) # ip address 192.1.12.2 255.255.255.0
It sets the IP address and subnet mask for the Fast Ethernet interface provided.

Step 3:
There will be no shutdown.
Example:
Router (config-int) # do not shut down
Router (config-int) #
It enables the Ethernet interface, changing its administrative status from down to up.

Step 4:
exit
Example:
exit Router (config-int) #
Router (config) #
It returns to global configuration mode after exiting the interface configuration mode.

Activity 1: Identify and analyse existing router performance against organisational requirements.

This part of the activity requires you toidentify and analyse existing router performance against organisational requirements and document the outcomes using ‘Template 1'.
Description of the activity
This activity requires you toidentify and analyse existing router performance against organisational requirements based on the information provided in the case study.
To do so you need to:
• Identify the existing router performance using debug, ping and trace commands and document using Template 1.
• Analyse the router's performance on the following key metricsand document using Template 1:
o Throughput
o Latency
o Uptime and availability
o Packet loss
o Retransmits

Analyse the router's performance on the following key metrics (200-250 words)

Activity 2: Evaluate existing software against requirements and determine and document alignment.
This part of the activity requires you to evaluate existing software against requirements and determine
and document alignment and document the outcomes using ‘Template 2'.
Description of the activity
This activity is a continuation of Activity 1.
This activity requires you evaluate existing software against requirements (based on the information provided in the case study) and determine and document alignment.

To do so you need to:
• Evaluate existing network design documentation given in the case study.
• Compare the network design documentation against the organisational requirements.
• Determine whether the existing network design documentation align with the organisational requirements and document the following using Template 2.
o Key factors of evaluation
o Whether the existing network design documentation align with the organisational requirements.

Evaluate existing software against requirements and determine and document alignment. (200-300 words)

Activity 3: Determine network element additions and upgrades according to organisational requirements.
This part of the activity requires you todetermine network element additions and upgrades according to organisational requirements and document the outcomes using ‘Template 3'
Description of the activity
This activity is a continuation of Activity 2.
This activity requires you to determine network element additions and upgrades according to organisational requirements based on the information provided in the case study.

To do so you need to:
• Analyse the network design of the organisation.
• Determine if additional network elements and upgrades are required.
• Document the additional network elements and upgrades using Template 3.

Additional network elements and upgrades (200-300 words)

Activity 4: Develop and document installation plan and submit document to required personnel.
This part of the activity requires you to develop and document installation plan and submit document to required personnel and respond to feedback the outcomes using ‘Template 4'.
Description of the activity
This activity is a continuation of Activity 3.
This activity requires you to develop and document installation plan and submit document to required Supervisor.

To do so, you must follow the guidelines provided below:
• The implementation plan must be developed using Template 4.
• The implementation plan must include the following information:
o Purpose of the implementation plan
o Basic routing requirements
o Operating parameters
o Steps you would implement to install the router
o Place of the network
o Source of the internet
o Key considerations in the installation of the router
o A section for sign-off
• Submit the router implementation plan to the Supervisor via e-mail and request for sign-off.

Develop installation plan (300-400 words)

Activity 5: Obtain installation plansign-off from required personnel.

Description of the activity

This activity is a continuation of Activity 4.

To do so you need to:
• Discuss the following components of the implementation plan prepared in Activity 5.
o Purpose of the implementation plan
o Basic routing requirements
o Operating parameters
o Steps you would implement to install the router
o Place of the network
o Source of the internet
o Key considerations in the installation of the router
• Gain feedback on the implementation plan.
• Make changes to the router implementation plan, if required.
• Submit the router implementation plan to the Supervisor and obtain sign-off.

Activity 6: Determine basic routing requirements and operating parameters according to installation plan specifications.
This part of the activity requires you to determine basic routing requirements and operating parameters according to installation plan specifications and document the outcomes using ‘Template 5'
Description of the activity
This activity is a continuation of Activity 5.
This activity requires you to determine basic routing requirements and operating parameters according to installation plan specifications created in previous activities.

To do so you need to:
• Determine the following basic Requirements for Routing and document using Template 5:
o Router, with or without Internet access.
o The Wi-Fi Standard (802.11 a/b/g/n/ac) of the Router
o The wireless frequency of the router (2.4GHz or 5GHz)
o Router performance
• Determine the following Operating Parameters and document using Template 5:
o Admin Status
o ARP Proxy
o ICMP Error Messages

Activity 7: Select required media, cables, ports, connectors and connect routers to network devices and hosts according to installation plan specifications.

This part of the activity requires you to select required media, cables, ports, connectors and connect routers to network devices and hosts according to installation plan specificationsand document the outcomes using ‘Template 6'.

Description of the activity

This activity is a continuation of Activity 6.

This activity requires you to select required media, cables, ports, connectors based on the information provided in the case study and connect routers to network devices and hosts according to installation plan specifications.

To do so you need to:
• Select required media, cables, ports and connectors based on the design requirements and document the selected media, cables, ports and connectors using Template 6.
• Connect routers to network devices and hosts according to installation plan specifications.
• Further, document the steps implemented to connect routers to network devices and hosts using Template 6.

Activity 8: Set basic parameters and router firmware according to installation plan specifications

This part of the activity requires you to set basic parameters and router firmware according to installation plan specifications and document the outcomes using ‘Template 7'.

Description of the activity

This activity is a continuation of Activity 7.

This activity requires you determine set basic parameters and router firmware (based on the information provided in the case study) according to installation plan specifications.

To do so you need to:
• Set basic parameters according to installation plan specifications
• Set router firmware according to installation plan specifications.

Further, document the steps implemented to set basic parameters and router firmware using template 7.  

Activity 9: Save and back up router configuration files according to installation plan specifications.

This part of the activity requires you to save and back up router configuration files according to installation plan specifications and document the outcomes using ‘Template 8'.

Description of the activity

This activity is a continuation of Activity 8.

This activity requires you to save and back up router configuration files according to installation plan specifications

To do so you need to:
• Save router configuration files according to installation plan specifications.
• Back up router configuration files according to installation plan specifications

Further, document the steps implemented to Save and back up router configuration files using template 8.

Activity 10: Implement required router security and configure static and default routes according to installation plan specifications.

This part of the activity requires you to implement required router security and configure static and default routes according to installation plan specifications and document the outcomes using ‘Template 9'

Description of the activity

This activity is a continuation of Activity 9.

This activity requires you to implement required router security and configure static and default routes according to installation plan specifications

To do so, you need to:
• Implement required router securityaccording to installation plan specifications using the below steps:
o Keep your router up to date by updating its firmware.
o Change your login information and router password
o To secure your wireless network, always use WPA2
o Timetable the online schedule of your wireless network
o Remove any hazardous or unverified services
• Configure static and default routes according to installation plan specifications.
Further, you must:
• Document the steps implemented to perform the following using Template 9.
o Implement required router security according to installation plan specifications.

Activity 11: Calculate and apply the required classless IP addressing scheme using variable length subnet mapping (VLSM) to a local area network (LAN) and a wide area network (WAN) environment according to router specifications.

This part of the activity requires you tocalculate and apply the required classless IP addressing scheme using variable length subnet mapping (VLSM) to a local area network (LAN) and a wide area network (WAN) environment according to router specifications and document the outcomes using ‘Template 10'

Description of the activity

This activity is a continuation of Activity 10.

This activity requires you to calculate and apply the required classless IP addressing scheme using variable length subnet mapping (VLSM) to a local area network (LAN) and a wide area network (WAN) environment according to router specifications.

To do so, you need to:

• Calculate the required classless IP addressing scheme and document using Template 10.
• Document the steps implemented to apply IP addressing to LAN and WAN environment using Template 10.

Activity 12: Configure and verify required classless routing protocols according to router specifications.

This part of the activity requires you toconfigure and verify required classless routing protocols according to router specifications and document the outcomes using ‘Template 11.'

Description of the activity

This activity is a continuation of Activity 11.

This activity requires you to configure and verify required classless routing protocols according to router specifications

To do so, you need to:
• Configure Access Passwords
• Configure a Router Hostname
• Configure IP addresses for Router Interfaces
• Configure Routing (Static or Dynamic)
• Save your configuration
• Configure DHCP
• Verify the configurations against the below classless routing protocols:
o RIP (RIPv2)
o EIGRP
o OSPF
Further, you must:
• Take a screenshot of each step implemented to configure and verify required classless routing protocols and submit it to the trainer/assessor via e-mail.
• Document the steps implemented to configure and verify required classless routing protocols using Template 11.

Activity 13: Troubleshoot device configuration and network connectivity according to network specifications.

This part of the activity requires you totroubleshoot device configuration and network connectivity according to network specifications and document the outcomes using ‘Template 12.'

Description of the activity

This activity is a continuation of Activity 13.

This activity requires you to troubleshoot device configuration and network connectivity according to network specifications based on the information provided in the case study.

To do so, you need to:
• Troubleshoot device configuration by following the below steps:
o Turn off your router and then turn it back on
o Check to see if there are any problems with your service provider
o Attempt to connect with a different device
o Change to an Ethernet cable
o Attempt to use a different Ethernet cable
o Keep an eye on the router's lights
• Troubleshoot network connectivity keeping in mind the below issues:
o Verifying cable connection Problem
o Port Faulty Scenario
o Traffic overload
o Setting Issues
Further, document the steps implemented to troubleshoot device configuration and network connectivity using Template 12.

Activity 14: Identify and correct problems with IP addressing and host configurations according to network specifications.
This part of the activity requires you toidentify and correct problems with IP addressing and host configurations according to network specifications and document the outcomes using ‘Template 13.'
Description of the activity

This activity is a continuation of Activity 13.

This activity requires you to identify and correct problems with IP addressing and host configurations according to network specifications.

To do so, you need to:
• Identify problems with IP addressing and host configurations and document using Template 13; common issues include:
o IP Addresses that are duplicates
o Exhaustion of IP Addresses
o DNS Issues
o A single computer is unable to connect to the network
o The Local Network Cannot Connect to the Internet
• Correct problems identifiedaccording to network specificationsand document using Template 13.

Activity 15: Seek and respond to feedback from required personnel as required.

This part of the activity requires you to seek and respond to feedback from required personnel as required and document the outcomes using ‘Template 14'.

Attachment:- Network Services Security Policy.rar

Reference no: EM133564933

Questions Cloud

Determine the univer of their study with respective sampling : Each student should determine the universe/population of their study with the respective sampling or analysis unit of their (individual) research problem.
Find friend of the court case related to health policy : Find a "friend of the court" case related to health policy.
Explain how you would recruit your sample : Explain how you would recruit your sample. Detail questions you would ask your participants. Explain issues that may affect quality of your data collection.
Experiencing placental abruption : The nurse is caring for a client after experiencing a placental abruption
Integrity and availability of networked services : Responsibilities regarding computing resources and services while identifying certain unacceptable uses of network resources and services
Explain how digital marketing has impacted how people learn : Explain how digital marketing has impacted how people learn. Explain why a social media presence is necessary for the business. Describe at least 2 social media
What are good guidelines for a good study schedule : What are good guidelines for a good study schedule? What are three tips or strategies that are helpful? Explain how you will apply one of those tips to be
Explain why this opportunity cannot wait until appropriate : Explanation how you plan to manage both the internship course and the rest of your Doctoral Project process.
Which treatment center takes into the account : Read about the development of the P-CAT, a tool created to measure the degree of which a treatment center takes into the account

Reviews

Write a Review

Computer Networking Questions & Answers

  Switch configured for three different vlan

A switch has been configured for three different VLANs: VLAN2, VLAN3, and VLAN4. A router has been added to provide communication between the VLANs. What type of interface is necessary on the router if only one connection is to be made between the..

  How http works explain in detail

How HTTP works? Kindly explain in detail with proper examples. The response must be typed, single spaced.

  ICT120 Introduction to Computer Networks Assignment

ICT120 Introduction to Computer Networks Assignment Help and Solution, University of the Sunshine Coast - Assessment Writing Service - Demonstrate the path

  Write an IT REPORT on Modern technology

Write an IT REPORT on Modern technology. The main aim is to evaluate the difference in between the traditional WAN technology and the software defined WAN

  Illustrate the complete network and boardroom design

Illustrate the complete network and boardroom design. Design a boardroom in which any department's information can be accessed and expressed.

  Plan for how a vlan could be implemented

Explain in a 350- to 700-word plan for how a VLAN could be implemented so that bandwidth is not consumed. Your plan must ensure that the network is not flooded with packets, and that members of the same VLAN can be located in different buildings o..

  Tcb subsets are said to leverage purely hierarchical

tcb subsets are said to leverage purely hierarchical domains ordered by privilege.explain the relation between these

  Describe legal and ethical issues of expert system

Describe the legal and ethical issues of expert system providing incorrect information? Must Food and Drug Administration review and approve medical expert systems?

  Calculate the fragmentation offset for each fragment

COIT20261 Network Routing and Switching, Central Queensland University - Calculate the fragmentation offset for each fragment and What routes were unknown

  Identify and evaluate project management concepts

MN691 - Research Methods and Project Design - Develop and apply research methods and analytical, technical, managerial and time-management skills

  Network management in organisations

Network Management in Organisations - develop skills in research, critical analysis an academic writing of high standard. In this assignment students

  Describe how ping program works

Describe the difference between clients and peers in terms of networking and Describe why peer-to-peer networks are not ideal for campus sized networks

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd