Subnet masking and designing small networks

Assignment Help Computer Network Security
Reference no: EM13254141

Subnet masking and designing small networks for fictitious organizations.

Task

Imagine you work for a firm which provides system administration and networking services to organizations. One day an organization which runs a hotel contracts to your organization. They provide the attached plans.

The hotel has a class C public address space. The network number is 203.220.72.0/24. The hotel provides a number of eatery, office, accommodation and conference like services. This particular organization would like to claim that all facilities have access to the Internet.

The Hotel has the following features.

1. 90 hotel rooms which have access to the Internet, spread over 5 floors (that is five floors of hotel rooms). Each room is to have one fixed Ethernet interface. Please note on each floor there is a hotel room which has got an attached bedroom. That room will also require a fixed Ethernet connection.

2. Each floor consisting of hotel rooms has a rack in a communications closet - there is a suitable riser between floors.

3. A large conference room capable of housing up to 15 fixed users is located the ground floor. Fixed networking is required in this room.

4. The owners of the hotel recommend supporting up to 200 wireless users concurrently. Users of such facilities should have access to the Internet through out all floors of the hotel.

5. The hotel has a small office that manages reservations and the hotel's programs/ facilities. There are no more then 20 people in these offices (very crowded) requiring access to the Internet. These offices are situated on the ground floor and are directly attached to the Administrative Offices.

6. The hotel wishes to have Internet functionality in the lobby bar providing customers with access to the Internet. There would be no more then 5 concurrent customers - these are built into the tables adjacent to the concierge desks.

7. The concierge and reception tables will require at least 3 network connections each.

8. The hotel also wishes to have machine room. The machine room would have no more then 16 hosts and is situated on the ground floor in the communications room.

9. Your carrier gives you a high end DSL (perhaps a Juniper) router that advertises your network to the rest of the world. The external interface of your router will be bound to an address, which you nominate from your address space. The internal interface of the router should connect directly to your routing core. You not need to worry about routing from the outside worlds perspective. But you will need to worry about routing for your entire internal network. You should advise your infrastructure that the public interface is you default gateway.

A basic floor plan is attached.

You now know what the hotel requires in terms of connectivity. Using this partial specification, proposes a tructure for the network to be used by the hotel. Your design of the network should describe the nfrastructure you have and how it is connected from both a Layer 1 perspective. Some of the considerations

o address include:

1. Do have switches on each floor?
2. How will these switches be connected to one another?
3. What kind of switches do you plan to use?
4. What media will you use to connect edge devices to the switches and/or routers?
5. What kind of routers will you use?
6. How many interfaces will they have of what type?
7. How will you distribute the cabling up the floors of the building and within the floors?
8. What components will you need in addition to the switches and routers required?

Once you have done a physical design of the network you are then to define a network structure. When doing his you are to work out network numbers and sizes along with the number of routers you wish to have. You hould provide a logical diagram of this.

Once a design is complete for each device you are to provide a configuration - as this hotel has an alliance with Cisco you can assume you will be using Cisco kit. You will need to outline the routing rules you put in place (only inside and default gateway). You should aim to use as much of your address space as possible but you MAY need to use NAT/PAT.

You will also need to nominate an address for a DHCP server for both wired and wireless infrastructure, you can use the DHCP servers on the switches. You will need to set up these DHCP servers the DHCP can come hosted in the machine room. Your network configuration should include whats needed to support this from a outing/ switching perspective.

To do this task you will have to make assumptions as to security, segmentation, isolation and other aspects. For each assumption you make be sure justify it using common sense and/or evidence provided above. You are free to use VLANS and VLAN trunking protocols such as 802.1q where appropriate.

You will need to define appropriate ACL's on your infrastructure. The rules are as follows:

1. Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks.

2. Users on the hotels corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.

Finally you will need to set up a DNS server. The server should be in the machine room network and assigned a static address. The server will be accessible from both inside and outside the hotel. The server will have forward and reverse zones, the forward zone will be myhotel.net. The DNS server should have a secondary server in the machine room network which is a replica of the primary. For now you can leave the zone empty. Please document your configuration.

Verified Expert

In this projects, we are designing the small network infrastructure for hotels because the fictitious organizations runs a hotel contracts to provide the networking services. Basically, hotels network infrastructure requires in terms of connectivity. The network design is completed by using the Cisco kit. The basic configurations are done and also nominate an address for a DHCP server for both wired and wireless infrastructure. The hotel proposed network infrastructure is used to provides the security and flexibility.

Reference no: EM13254141

Questions Cloud

What is the production for each alternative : What is the production (output per hour) for each alternative? What is the productivity (output per labor hour)?
Convert the twos compliment numbers to decimal : Convert the following Two's Compliment numbers to decimal: 1) 0101 1110 10112C 2) 1001 1111 10002C 3) 1111 1111 11112C 4) -1001 0110 10012C  5) 1010 1010 10102C 6) 1000 0000 00002C
Calculate the economic order quantity : Calculate the annual holding cost plus the annual ordering cost to get the total annual cost when using an order quamtity of 200 boxes. Please show your work.
Preparing for contract negotiations : You are preparing for contract negotiations. To achieve your desired contract negotiation results, you need not only a strategy but also tactics and countertactics.
Subnet masking and designing small networks : Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks and corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.
What are major components of a strategic management process : What are the major components of a strategic management process? Which component is most difficult for managers to perform? Explain your answer.
Calculate the series resistance of the led : GaAs LED emitting surface size is 180 um by 180 um. The doping levels are NA = 9 E+15 cm-3 and ND = 5 E+17 cm-3. The n-layer is 70 um thick, and the p-layer is 8 um thick.
Why is it important for a company to have a cash budget : What are some steps an entrepreneur can take to improve the company's cash position?
Find the power for given resistance and current : The power P of an Electric circuit varies jointly with resistance , R and with the square of the current, I. find the power if the current is 2.00 A and the resistance is 2.00 ohms

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd