Questions:
This assignment is designed to assess students’ knowledge and skills related to the following learning outcomes:
1. Analyse and report on the current and future state of the internetworking infrastructure and its applications.
2. Implement a process to support the administration and management of internetworking.
Answer:
Project Scope:
A primary school needs a network for conducting its various business process and this is the main scope of the project. The users of this network can be classified into two type and this includes the daily user and the guest users. There are almost 50 daily users and the number of guest user is around 10. The network would be divided so as to provide the guest users with a limited access. Whereas the daily users would be capable of accessing the entire network. The guest users would be only accessing the FTP server.
Project Requirements:
The major requirements of the primary school while creating the network has been listed below:
There would be existing separate subnet for the guest users along with a separate LAN connection which would be used by them to download certain files and they won’t be having any kind of access to the main network. The guests would only be provided with the services that are present the FTP server whereas the other LAN which are to be provide to the daily users would remain blocked for the guest users. And in order to do this an IP network design is to be created for the school. Along with this the hardware’s that are to be used for creating the network are also to be identified and this mainly includes the routers, the switches and many more which are to be used for the purpose of developing the network. Once the identification of the hardware’s are done then they are configured according to the needs of the school.
Network design – Consider Human factor (User-Centric Design) concepts
The network which is to be developed would be consisting of two kinds of servers and this includes the DCP server and another one is the FTP server. All this servers are to be connected with the switches along with the routers and the other kind of electronic devices. The user devices would be mainly consisting of the various electronic devices that are having access to the network. After this the access point which is to be included in the network would be connected with the routers by making use of wired mediums, and this access points are associated with providing the users to have a wireless access to the network. The routers are generally connected with the service providers and after receiving the data packages they are associated with distributing this data packages all over the network and after this the switches are associated with receiving this data packages which are then distributed to the users who are connected to the network. The switches would that are to be deployed into the network would be configured accordingly so as to provide the daily users with a full access of the network and restricted access of the network to the guest users. The main function of the router in the network would be collection of data packages form the service providers followed by forwarding of the data packages to the switches ad this switches are responsible for distribution of the network signal to various kind of users. So it can be considered that the routers are associated with transportation of the data packets all across the network and this goes on unless and until the destination is reaches. DHCP or the Dynamic Host configuration which is to be included in the network can be considered as the basic configuration which can be used by the user devices in order to get connected to the network. This is also automatically enabled by the routers and switches which are to be included in the new network. All this process looks like a complicated one but once they are implemented then all the network would be working in such a way that all the business processes of the school are conducted in an easy way. The configuration of the access points would be done in such a way that only access is provided to the authorized users. Besides all this the security of the network is one of the major concern which is to be taken care of in order to protect the network form any kind of risks. While considering the security of the network a access control list is also to be included which would be associated with providing access to the users whose IP addresses have been already registered to the list and once any unknown IP address is detected then that IP address would be blocked immediately and no access would be provided to the network. This blocking would be initially responsible for saving all the important data present in the network from any kind of unauthorized access. This mainly happens by formation of a virtual wall between the computer and the other type of networks. The router security is also to be configured by making use of various authentication techniques one of the best way of providing security to the router is by making use of Double layer password.
IP Addressing Schema
Subnet Name
|
Address
|
Mask
|
Dec Mask
|
Assignable Range
|
Broadcast
|
user
|
162.16.2.0
|
/24
|
255.255.255.0
|
162.16.2.1 - 162.16.2.254
|
162.16.2.255
|
Guest
|
162.16.3.0
|
/24
|
255.255.255.0
|
162.16.3.1 - 162.16.3.254
|
162.16.3.255
|
Server
|
162.16.1.0
|
/24
|
255.255.255.0
|
162.16.1.1 - 162.16.1.254
|
162.16.1.255
|
Bibliography
- Larson, B. and Walker, M., 2014. CCENT Cisco Certified Entry Networking Technician ICND1 Study Guide (Exam 100-101) with Boson NetSim Limited Edition. McGraw-Hill Education Group.
- Mohtasin, R., Prasad, P.W.C., Alsadoon, A., Zajko, G., Elchouemi, A. and Singh, A.K., 2016, March. Development of a virtualized networking lab using GNS3 and VMware workstation. In Wireless Communications, Signal Processing and Networking (WiSPNET), International Conference on(pp. 603-609). IEEE.
- Li, M. and Lin, H.J., 2015. Design and implementation of smart home control systems based on wireless sensor networks and power line communications. IEEE Transactions on Industrial Electronics, 62(7), pp.4430-4442.
- Pfaff, B., Pettit, J., Koponen, T., Jackson, E.J., Zhou, A., Rajahalme, J., Gross, J., Wang, A., Stringer, J., Shelar, P. and Amidon, K., 2015, May. The Design and Implementation of Open vSwitch. In NSDI(pp. 117-130).
- Wang, Y., Bi, J. and Zhang, K., 2015. Design and implementation of a software-defined mobility architecture for IP networks. Mobile Networks and Applications, 20(1), pp.40-52.