CP1402 Case Study
Page 1 of 8
1
CP5631 Assignment - Networking Case Study
Introduction
This case study has been divided into four (4) components.
You are to design a network, research and source appropriate devices justifying choices
(feasibility, efficiency, etc.), subnet the network, assign IP addresses to the appropriate
devices, and design ACLs to satisfy security requirements.
Note: This is not a group project. Each student must individually
complete all parts of their submission.
Students must start with a new document, and they must not have
another person’s file in their possession at any time. Students may
discuss the task with each other, but each student must write their
assignment independently and not show their work to other students.
Deliverables
1. A single Word document (.docx) – containing all parts
Assignment
eakdown
Scenario
myData Services Inc., an Australian data analytics company, has asked you to assess and redesign
their network. They are opening a new
anch in Glasgow, which will require new equipment. They
have existing contracts and hardware to maintain fi
e-optic leased line WAN links between sites.
PART 1 - Network diagram
PART 2 - Subnet the network and assign IP addresses to the appropriate devices
PART 3 - Research and source appropriate devices justifying choices (feasibility, efficiency, etc.) with a
Weighted Scoring Model (WSM)
PART 4 – Security by applying Access Control Lists (ACLs) to filter traffic
Page 2 of 8
2
PART 1 - Network specifications and diagram
Network Specifications
You have been given a rough sketch of the network topology below. You are to draw the network
using draw.io (https:
app.diagrams.net/), subnet the network (see Part 2), and assign port numbers
and IP addresses to ports.
Network Structure
Hardware
• Only include one switch in you diagram for each LAN or WLAN (even if more are required).
• Servers should be on their own LAN.
• The Internet router port address is XXXXXXXXXX/30.
• The Perth router is connected to the Internet and provides access to the public backbone
containing a database server, a mail server, and a web server.
https:
app.diagrams.net
Page 3 of 8
3
PART 2 - Subnet the network using VLSM, and assign IP addresses to the appropriate devices.
Each location has the following number of hosts
Melbourne, Ontario, and Vancouver each include a wireless LAN for clients to use.
Location Workstations WLAN addresses
Perth XXXXXXXXXX
Glasgow 90 10
Zurich XXXXXXXXXX
Auckland 100
Denver 125
Subnetting
Use VLSM to subnet the network topology using a public class B network. You are to use the table
format below to provide the subnet details.
Table 1. Subnets (including WAN subnets)
Spreadsheet Columns: Subnet name, subnet address, subnet mask (in slash format ONLY),
first useable address, last useable address,
oadcast address, static address range and DHCP
address range (all addresses to be in dotted decimal notation)
Table 2. Router Interfaces
Spreadsheet Columns: Location, interface, IP address, subnet mask (in slash format ONLY)
Table 3. Servers
Spreadsheet Columns: Location, server name, IP address, subnet mask (in slash format ONLY)
Additional requirements:
• Choose one public B class network address for the entire network and subnet this block of
addresses to optimise spare addresses for future expansion.
• Place the WAN subnets in the blocks directly following the LAN/WLAN address space (i.e.,
finish putting all the LAN/WLAN subnets in the table first, then follows by the WAN subnets).
• ADD 100% to each subnet to allow for growth in the number of hosts specified for each LAN
(i.e., workstations × 2). DO NOT ALLOW for any growth in the number of servers or size of
WLANs.
• DHCP will to be used for IP address allocation for hosts in each subnet and these ranges are to
e allocated for each LAN.
• Static IP addresses are to be allocated where appropriate: router interfaces and servers.
• The ISP has given us an IP address of XXXXXXXXXX/30 for our Internet connection at Perth.
Note: this address is part of the ISP’s network, and is not involved in subnetting for the
corporate network.
Page 4 of 8
4
PART 3 - Research and source appropriate devices justifying choices (feasibility, efficiency, etc.)
You are to research and submit a project procurement plan for the Glasgow network. The devices
you must include are routers, switches, and wireless access points. Make sure the devices you select
can handle the number of workstations required and provide a good quality of service to wired and
wireless users. Devices should be enterprise-grade, not home or gaming equipment.
Your project plan and final recommendations should be based on a Weighted Decision Matrix (like
the WDM you did in the Procurement Practical). You are to compare three (3) devices from each
category and to base the decision on reasonable and well-justified attributes.
The budget for procurement is $4,000. You may exceed this if you can justify it well.
Your project plan is to contain the following components:
Weighted Decision Matrix - hardware resource requirements analysis
• Include a written justification for priorities and attributes given in the matrix
• Create your WDMs in Excel and copy and paste them into your Word doc
Budget
• Create a well-presented table of the prices of all devices and the total cost
• Include hardware only, not labour
PART 4 – Access Control Lists
Write ACL tables, in the format taught in the workshops, to address the following security
equirements.
Requirements for all ACLs
• ACLs are to be placed in the optimal position to minimise bandwidth unless the location of the
ACL is specified
• Do not rely on the implicit deny any any
• No ACL is required on a port where all traffic is permitted
• Create one ACL table per router
Requirement #1
Traffic from the Internet must only be allowed in where:
a) the destination is the Melbourne web server, and the protocol is HTTPS and HTTP only.
) or the connection is already established.
Requirement #2
Hosts on the wired LANs may access only:
a) the Perth web server (HTTP, HTTPS, and FTP only), Perth database servers (port 3306), and
Perth Mail Server (SMTP) but not the rest of the corporate network;
) the Internet generally.
Page 5 of 8
5
Requirement #3
Hosts on the wireless LANs (WLANs) may access only:
a) the Perth web server (HTTP, HTTPS, and FTP only), Perth database servers (port 3306), and
Perth Mail Server (SMTP) but not the rest of the corporate network;
) the Internet generally (HTTP and HTTPS only).
Requirement #4
The Auckland LAN specifically may also access the Auckland backup servers via any port.
Requirement #5
The backup servers must be able to initiate connections anywhere within the corporate
network on port 10001 only (hint: all subnets must be able to send traffic to the backup
servers on established connections). The backup servers may not connect to sites on the
Internet.
Page 6 of 8
6
CP5631 Marking Scheme
Ensure that you follow the processes and guidelines taught in class to produce high quality work. This assessment ru
ic provides you with the
characteristics of exemplary, good, satisfactory, and unacceptable work in relation to task criteria.
Criteria Exemplary XXXXXXXXXX)% Good (70-89)% Satisfactory (50-69)% Limited (20-49)% Very Limited (0-19)%
Part 1 Topology
Design
Diagram appearance
10
Created in draw.io using Cisco icon
set, and the diagram is:
1. Neat and professional
2. All lines at set angles
(vertical, horizontal, or
45°)_
3. Lines do not end short
4. Lines do not appear over
the top of devices
5. Lines align if on same level
Most of the criteria are
satisfactory (See criteria
under "exemplary") but some
minor issues.
Over half of the criteria are
satisfactory (See criteria
under "exemplary") but some
minor issues.
Under half of the criteria
are satisfactory (See criteria
under "exemplary") or
significant issues in some
areas.
Many problems (e.g. not done
in Draw.io, inconsistent
formatting, diagram does not
align to subnetting scheme, etc).
Diagram Labels and
Devices
5
Topology is accurate and
the diagram
1. Includes device names
2. Interface names
3. Interface IP addresses
4. Masks in slash format
5. Text neatly placed and sized
Most of the criteria are
satisfactory (See criteria
under "exemplary") but some
minor issues.
Over half of the criteria are
satisfactory (See criteria
under "exemplary") but some
minor issues.
Under half of the criteria
are satisfactory (See criteria
under "exemplary") or
significant issues in some
areas.
Many problems (e.g. topology
is inaccurate; devices are not
named, etc).
Part 2 Subnetting
Scheme
15
1. LANs and WLANs are the
co
ect size.
2. All required LANs and
WLANs are documented.
3. WANs are the co
ect size.
4. All required WANs are
documented.
Most of the criteria are
satisfactory (See criteria under
"exemplary") but one or two
minor issues, such as a missing
LAN, or inco
ect address block
choice.
Most of the criteria are
satisfactory (See criteria under
"exemplary") but several minor
issues (e.g. multiple missing
LANs or WANs) or a significant
issue such as inco
ect size.
Some LANs and WANs are
documented.
Sizes are co
ect, or at
least not outlandishly
inco
ect.
Few LANs and WANs are
co
ectly identified.
Nonsensical subnet size chosen.
Page 7 of 8
7
Subnet Tables
10
Based on the chosen
subnetting scheme, the
following specifications are