Problem on subnet masking and designing small networks

Assignment Help Computer Networking
Reference no: EM13269007

The aim of this assignment is to become familiar with subnet masking and designing small networks for fictitious organizations.

Imagine you work for a firm which provides system administration and networking services to organizations. One day an organization which runs a hotel contracts to your organization. They provide the attached plans.

The hotel has a class C public address space. The network number is 203.220.72.0/24. The hotel provides a number of eatery, office, accommodation and conference like services. This particular organization would like to claim that all facilities have access to the Internet.

The Hotel has the following features.

1. 90 hotel rooms which have access to the Internet, spread over 5 floors (that is five floors of hotel rooms). Each room is to have one fixed Ethernet interface. Please note on each floor there is a hotel room which has got an attached bedroom. That room will also require a fixed Ethernet connection.

2. Each floor consisting of hotel rooms has a rack in a communications closet - there is a suitable riser between floors.

3. A large conference room capable of housing up to 15 fixed users is located the ground floor. Fixed networking is required in this room.

4. The owners of the hotel recommend supporting up to 200 wireless users concurrently. Users of such facilities should have access to the Internet through out all floors of the hotel.

5. The hotel has a small office that manages reservations and the hotel's programs/ facilities. There are no more then 20 people in these offices (very crowded) requiring access to the Internet. These offices are situated on the ground floor and are directly attached to the Administrative Offices.

6. The hotel wishes to have Internet functionality in the lobby bar providing customers with access to the Internet. There would be no more then 5 concurrent customers - these are built into the tables adjacent to the concierge desks.

7. The concierge and reception tables will require at least 3 network connections each.

8. The hotel also wishes to have machine room. The machine room would have no more then 16 hosts and is situated on the ground floor in the communications room.

9. Your carrier gives you a high end DSL (perhaps a Juniper) router that advertises your network to the rest of the world. The external interface of your router will be bound to an address, which you nominate from your address space. The internal interface of the router should connect directly to your routing core. You not need to worry about routing from the outside worlds perspective. But you will need to worry about routing for your entire internal network. You should advise your infrastructure that the public interface is you default gateway.

A basic floor plan is attached.

You now know what the hotel requires in terms of connectivity. Using this partial specification, proposes a structure for the network to be used by the hotel. Your design of the network should describe the infrastructure you have and how it is connected from both a Layer 1 perspective. Some of the considerations to address include:

1. Do have switches on each floor?
2. How will these switches be connected to one another?
3. What kind of switches do you plan to use?
4. What media will you use to connect edge devices to the switches and/or routers?
5. What kind of routers will you use?
6. How many interfaces will they have of what type?
7. How will you distribute the cabling up the floors of the building and within the floors?
8. What components will you need in addition to the switches and routers required?

Once you have done a physical design of the network you are then to define a network structure. When doing this you are to work out network numbers and sizes along with the number of routers you wish to have. You should provide a logical diagram of this.

Once a design is complete for each device you are to provide a configuration - as this hotel has an alliance with Cisco you can assume you will be using Cisco kit. You will need to outline the routing rules you put in place (only inside and default gateway). You should aim to use as much of your address space as possible but you MAY need to use NAT/PAT.

You will also need to nominate an address for a DHCP server for both wired and wireless infrastructure, you can use the DHCP servers on the switches. You will need to set up these DHCP servers the DHCP can come hosted in the machine room. Your network configuration should include whats needed to support this from a routing/ switching perspective.

To do this task you will have to make assumptions as to security, segmentation, isolation and other aspects. For each assumption you make be sure justify it using common sense and/or evidence provided above. You are free to use VLANS and VLAN trunking protocols such as 802.1q where appropriate.

You will need to define appropriate ACL's on your infrastructure. The rules are as follows:

1. Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks.

2. Users on the hotels corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.

Finally you will need to set up a DNS server. The server should be in the machine room network and assigned a static address. The server will be accessible from both inside and outside the hotel. The server will have forward and reverse zones, the forward zone will be myhotel.net. The DNS server should have a secondary server in the machine room network which is a replica of the primary. For now you can leave the zone empty. Please document your configuration.

Attachment:- Assignment.rar

Reference no: EM13269007

Questions Cloud

What is the difficulty with the original tcp srtt estimator : In the absence of any special knowledge of network conditions, the typical approach is to pick an arbitrary value, such as 3 s, and hope that this will converge quickly to an accurate value. If this estimate is too small, TCP will perform unnecess..
Competitive intelligence community : Buffalo Wild Wings with a Strengths, Weaknesses, Opportunities, and Threats analysis also referred to as SWOT in the competitive intelligence community.
What kind of business law system would you adopt : what kind of business law system would you adopt -a civil law system or a common law system, and why? 2) What kind of business regulations would you impose?
What is the apparent weight of a cube of iron : What is the apparent weight of a cube of iron of volume 0.2 m3 when it is submerged in water? The density of iron is 7800 kg/m3
Problem on subnet masking and designing small networks : Subnet masking and designing small networks for fictitious organizations - provides system administration and networking services to organizations
Find the rate of change in entropy of the ice : A copper rod 25 cm long having a cross-sectional area of 7.5 cm2 is used to connect a boiler maintained at 100 oC to a large block of ice at 0 oC. What is the rate of change in entropy of the ice
What is now the angular speed of the carousel : A woman stands at the edge of a carousel that is rotating without friction at 0.80 rad/s. The carousel has a radius of 2.0m and a moment of inertia of 600 kg m2. What is now the angular speed of the carousel
How far will object travel in first 2 seconds of its journey : Suppose an object with initial acceleration of 10 ft/s^2 is dropped from 300 ft. above the earth, how far would it travel in the first 2 seconds of its journey. Assume initial velocity is zero.
Management-union relationship-legislation : Why are the laws you chose important and what role did they play in shaping today’s management-union relationship?

Reviews

Write a Review

Computer Networking Questions & Answers

  Value of server farms-virtualization to large organization

Describe at lease 750 words(in your own words) what is meant by "server farm" and by "virtualization". What is the value of server farms and virtualization to large organization?

  Explain main components of good security policy

Write down the main components of good security policy? Write down some of the most common attacks, and how can the network be protected against these attacks?

  Reason to include padding block when padding is not required

It is considered good practice for the sender to pad every message, including messages in which the final message block is already complete. What is the motivation for including a padding block when padding is not needed.

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Prepare a budget for the whole project

Prepare a budget for the whole project in terms of the cost of procurement, deployment, man power, scalability, security etc and prepare a time line which will serve as a guideline for you and your client.

  Reason why you would not install cables

Give me two reason why you would not install cables in ducts that are used to transport dust loos stock, flammable vapors or in those ducts that are used for ventilattion for cooking?

  Define the type of packet filters

Define the type of packet filters that you might build to capture traffic destined to you six critical Web servers?

  Snmp security

SNMPv1 is the most commonly used version of SNMP even though it provides little support for security. Why not change to another version of SNMP?

  Explain ping sweeps and port scans

Your boss has just heard about some nefarious computer activities known as ping sweeps and port scans. He wishesto know more about them and what the impact of these activities might be on company.

  Crack encryption key using brute force attack

Was Charlie exaggerating when he gave Peter an estimate for the time that would be required to crack the encryption key using a brute force attack?

  Why is it critical to label patch cables-ports and data jack

What do you consider the single most important reason to pay attention to faulty terminations and excessive horizontal wiring spans? Why is it critical to label patch cables, ports, and data jacks?

  Role of project managers and telecommunications managers

Describe in scholarly detail "technical jargon" and describe the role of project managers and telecommunications managers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd