Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Case Study - Internet Fundamentals Page 1 of 8 CP5631 Assignment - Networking Case Study Introduction This case study has been divided into five components. You are to design a network, research and...

1 answer below »

Case Study - Internet Fundamentals
Page 1 of 8
CP5631 Assignment - Networking Case Study
Introduction
This case study has been divided into five components.
You are to design a network, research and source appropriate devices justifying choices
(feasibility, efficiency, etc.), subnet the network, assign IP addresses to the appropriate devices,
design ACLs to satisfy security requirements, and write a report introduction for the project.
Note: This is not a group project. Each student must individually
complete all parts of their submission.
Students must start with a new document and they must not have another
person’s file in their possession at any time. Students may discuss the task
with each other, but each student must write their assignment
independently and not show their work to other students.
Deliverables
1. A single Word document (.docx) – containing all parts
Assignment
eakdown
Scenario
Ausdata Services Inc., an Australian data analytics company, has asked you to assess and redesign
their network. They are opening a new
anch in Brisbane, which will require new equipment. They
have existing contracts and hardware to maintain fi
e-optic leased line WAN links between sites.
PART 1 - Introduction
PART 2 - Network diagram
PART 3 - Subnet the network and assign IP addresses to the appropriate devices
PART 4 - Research and source appropriate devices justifying choices (feasibility, efficiency, etc.) with
a Weighted Scoring Model (WSM)
PART 5 – Security by applying Access Control Lists (ACLs) to filter traffic
Page 2 of 8
PART 1 - Introduction
The first part of your report should be introduction to the project. Although this is the first part you
should include in your report, it should be the last part that you write. In your introduction you are to
provide an outline for each of parts 2, 3, and 4.
What to include:
• Describe the overall task of assessing and redesigning the network.
• Explain why it is important to produce a well-designed network diagram.
• Explain why it is necessary to create and document the separate subnets for the network.
• Explain why new equipment is needed for the new
anches, the basic role of the switches and
outers, and the process you used to select the equipment.
The introduction should be well-articulated: clear, concise, and use co
ect spelling and grammar. The
intended audience for the introduction can be assumed to have basic technical knowledge but are not
networking experts. The introduction should be no longer than a page.
PART 2 - Network specifications and diagram
Network Specifications
You have been given a rough sketch of the network topology below. You are to draw the network
using Visio, subnet the network (see part 3), and assign port numbers and IP addresses to ports.
Network Structure
Hardware
• Only include one switch in you diagram for each LAN or WLAN (even if more are required)
• Where a site has servers, these should be on a separate Server LAN, not the workstation LAN
• The Internet router port address is XXXXXXXXXX/30
• The Sydney router is connected to the Internet and provides access to the public backbone
containing a web server and a database server.
Page 3 of 8
PART 3 - Subnet the network using VLSM, and assign IP addresses to the
appropriate devices.
Each location has the following number of hosts
Sydney, Melbourne, and Brisbane each include a wireless LAN for clients to use.
Location Workstations WLAN addresses
Sydney XXXXXXXXXX
Melbourne 150 28
Brisbane 200 12
Canbe
a 100
Adelaide 50
Hobart 10
Subnetting
Use VLSM to subnet the network topology using a public class B network. You are to use the table
format below to provide the subnet details.
Table 1. Subnets (including WAN subnets)
Spreadsheet Columns: Subnet name, subnet address, subnet mask (in slash format), first
useable address, last useable address,
oadcast address, static address range and DHCP
address range (all addresses to be in dotted decimal notation)
Table 2. Router Interfaces
Spreadsheet Columns: Location, interface, IP address, subnet mask (in slash format)
Table 3. Servers
Spreadsheet Columns: Location, server name, IP address, subnet mask (in slash format)
Additional requirements:
• Choose one public B class network address for the entire network and subnet this block of
addresses to optimise spare addresses for future expansion.
• Place the WAN subnets in the blocks directly following the LAN address space.
• Add 100% to each subnet to allow for growth in the number of hosts specified for each LAN
(i.e. workstations × 2). Do not allow for any growth in the number of servers or size of WLANs
• DHCP will to be used for IP address allocation for hosts in each subnet and these ranges are to
e allocated for each LAN.
• Static IP addresses are to be allocated where appropriate.
• The ISP has given us an IP address of XXXXXXXXXX/30 for our Internet connection at
Sydney. Note: this address is part of the ISP’s network, and is not involved subnetting for
the Ausdata network.
Page 4 of 8
PART 4 - Research and source appropriate devices justifying choices
(feasibility, efficiency, etc.)
You are to research and submit a project procurement plan for the Brisbane network. The devices you
must include are a router, switches, and wireless access points. Make sure the devices you select can
handle the number of workstations required and provide a good quality of service to wired and
wireless users. Devices should be enterprise-grade, not home or gaming equipment.
Your project plan and final recommendations should be based on a Weighted Decision Matrix (like the
WDM you did in the Procurement Practical). You are to compare five (5) devices from each category
and to base the decision on reasonable and well-justified attributes. Provide weblinks for all hardware
options.
The budget for procurement is $4,000. You may exceed this if you can justify it well.
Your project plan is to contain the following components:
Weighted Decision Matrix - hardware resource requirements analysis
• Include a written justification for priorities and attributes given in the matrix
• Create your WDMs in Excel and copy and paste them into your Word doc
Budget
• Create a well-presented table of the prices of all devices and the total cost
• Include hardware only, not labou
Page 5 of 8
PART 5 – Access Control Lists
Write ACL tables, in the format taught in the workshops, to address the following security
equirements.
Requirements for all ACLs
• ACLs are to be placed in the optimal position to minimise bandwidth unless the location of the
ACL is specified
• Do not rely on the implicit deny any any
• No ACL is required on a port where all traffic is permitted
• Create one ACL table per router
a) Access to the Internet and public backbone
Apply these ACL/s to serial 0/0 on the Sydney router.
1. External hosts outside the organisation (on the Internet) must only be able to access the Sydney
Web server on the public backbone using HTTP and HTTPS.
2. No other external access is permitted into the organisation from the Internet.
3. Established connections must be allowed to communicate back into the private network.
) Sydney and Melbourne
4. The Sydney and Melbourne WLANs should have HTTP and HTTPS access to the Internet, and
to the Sydney Web server, but no access to anywhere else on the corporate network.
5. The Sydney Web server should have unrestricted communication via HTTP and HTTPS and be
able to respond to ping requests from internal hosts.
6. No traffic from outside the corporate network should be able to reach the Sydney database
server.
c) The other sites
7. The other LANs should have HTTP and HTTPS access to the Internet and to the Sydney Web
server. The exception is the Hobart LAN, which should have unrestricted Internet access.
8. The Brisbane WLAN should have HTTP and HTTPS access to the Internet, and to the Sydney
Web server, but no access to anywhere else on the corporate network.
9. The Hobart Backup servers should be able to initiate connections anywhere within the
corporate network without restriction.
10. Only traffic from established connections and from the Hobart LAN is permitted to reach the
Hobart Backup servers. All other access should be blocked.
Page 6 of 8
Marking Scheme
Ensure that you follow the processes and guidelines taught in class to produce high quality work. This assessment ru
ic provides you with the
characteristics of exemplary, good, satisfactory, and unacceptable work in relation to task criteria.
Criteria Exemplary XXXXXXXXXX)% Good (70-80)% Satisfactory (50-60)% Limited (20-40)% Very Limited (0-10)%
Part 1 Introduction

10
Accurate outline of report
contents that demonstrates
excellent understanding of
networking content.
Suitable for a semi-technical
audience.
Excellent writing:
1. Well-structured into
paragraphs.
2. Co
ect grammar.
3. Co
ect spelling.

Accurate outline of report
contents that demonstrates good
understanding of networking
content.
Generally suitable for a semi-
technical audience.
Generally accurate outline of
eport contents that demonstrates
understanding of networking
content.
Writing is generally readable,
with some lapses in spelling or
grammar.
Provides basic outline of
eport contents.
Incomprehensible, negligible
attempt, or not done.
Part 2 Topology
Design
Diagram appearance
5
1. Created in MS Visio (or
draw.io for external
students) using Cisco icon
set, and the diagram is:
2. Neat and professional
3. All lines at set angles
(multiples of 30, 45, 90
degrees)
4. Lines do not end short
5. Lines do not appear over the
top of devices
6. Lines align if on same level
Most of the criteria are
satisfactory (See criteria under
"exemplary") but some minor
issues.
Over half of the criteria are
satisfactory (See criteria under
"exemplary") but some minor
issues.
Under half of the criteria are
satisfactory (See criteria
under "exemplary") or
significant issues in some
Answered Same Day Oct 17, 2021

Solution

Ritu answered on Oct 21 2021
136 Votes
Contents
Introduction    2
Network specifications and diagram    3
Subnet the network using VLSM, and assign IP addresses to the appropriate devices    3
Table 1. Subnets (including WAN subnets)    3
Table 2. Router Interfaces    5
Table 3. Servers    6
Research and source appropriate devices justifying choices    6
Access Control Lists    12
Introduction
The Importance of budget, planning and implementation is necessary in every organisation and if the company already has the contracts and the WAN links then the cost of developing the new network will be very less compared to creating an entire network. So, it really depends on how the company wants to develop the network. As in this report the scenarios are going to be discussed and the output can be determined according to requirements of the organisation.
As creating a private cloud will be a good option and reliable at this point of the stage the company is in as this will at least give minimum security to the data stored in the cloud. Also, this will help in the long term because there are many beneficial features in the private cloud. Spending a couple of hundred thousand dollars on shifting to the private server is a very good idea. The other options are also good, but the importance given to the data security will be higher than anything else in this sector.
The Initial investment is very high, but the organisation will be getting the extra amount of security in the process. As the payment is high for the private cloud and even it can be accessed not only from the two places but can access the files all over the world. It also has the tunneling connection which is very hard for the hackers to get through.
Network specifications and diagram
Subnet the network using VLSM, and assign IP addresses to the appropriate devices
Table 1. Subnets (including WAN subnets)
    Subnet name
    Subnet address
    Subnet mask
    First usable address
    Last useable address
    Broadcast address range
    Static address range
    DHCP address range
    Sydney_LAN
    141.168.144.27
    /27
    141.168.144.29
    141.168.144.254
    141.168.144.255
    141.168.144.1
    141.168.144.1 - 141.168.144.254
    Brisbane_LAN
    141.168.24.0
    /28
    141.168.144.1
    141.168.144.254
    141.168.144.255
    141.168.144.1
    141.168.144.1 - 141.168.144.254
    Adelaide_LAN
    141.168.28.0
    /29
    141.168.28.1
    141.168.28.254
    141.168.28.255
    141.168.28.1
    141.168.144.1 - 141.168.28.254
    Melbourne_LAN
    141.168.32.0
    /30
    141.168.32.1
    141.168.32.254
    141.168.32.255
    141.168.32.1
    141.168.144.1 - 141.168.32.254
    Canbe
a_LAN
    141.168.34.0
    /31
    141.168.34.1
    141.168.34.254
    141.168.34.255
    141.168.34.1
    141.168.144.1 - 141.168.34.254
    Hobart_LAN
    141.168.36.0
    /32
    141.168.36.1
    141.168.36.254
    141.168.36.255
    141.168.36.1
    141.168.144.1 - 141.168.36.254
    Brisbane_WLAN
    141.168.38.0
    /28
    141.168.38.1
    141.168.38.254
    141.168.38.255
    141.168.38.1
    141.168.144.1...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here