BE202 Assignment 2: Group Project Requirements And Expectations

Submission Requirements

1. Identification of the client needs

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The needs of Moonlight Pty Ltd. that has been identified from the provided case study are presented as below:

  • Sharing of files within departments.
  • Accessing of files in one department from other department.
  • Interconnection between different branches of the organization.
  • An intranet that is cost efficient and effective to meet the requirements.

2. Demonstrating support provided by the intranet

The intranet being designed reflects that there is interconnection between the different branches of the organization that are divided into subnetworks. The major network has been divided with the help of subnetting so that files or media can be shared between different departments in five branches of the organization. VoIP provides communication facilities so that voice can transmitted through internet as per requirement of users of the network for Moonlight Pty Ltd.

3. Number and types of workstations, file servers and other networking devices

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Cisco Catalyst 2960 24 Port Layer 3 switch

5

The switch is required to distribute the major network into different subnetworks.

Acer Altos R720 Rackmount Servers

2

The servers are required for information storage or backup as well as sharing the information.

Cisco Catalyst 2811 Series Router

1

The router is required for connecting different networks as well as packet forwarding.

LaCie 2 TB 10/100/1000 Back-up Device

2

This device is required for data backup and recovery.

APC Back UPS RS

2

This device is required to provide power backup to the device in case of power failure.

Netgear WG302 Managed Wireless Access Point

6

The wireless access point provides access to the network through mobile or wireless devices.

Netgear GS108 Switch 8-port

1

This switch is required as the Core switch through which the network will be distributed to different sub networks.

Acer Verizon S480 including 17” LCD monitors

2

The monitors are required so that the users can interact with the system.

Cisco IP Phone

2

The IP phone is required for voice facilities through the internet.

Server Cabinets

2

It is required as compartment to hold the components of a server.

Cabling (Cat 6)

n

It will be used as the transmission media for the network.

4. Name, cost and manufacturer of each device

Device

Manufacturer

Cost

Quantity

Total Cost

Cisco Catalyst 2960 24 Port Layer 3 switch

Cisco

$7,943.00

5

$ 39,715.00

Acer Altos R720 Rackmount Servers

Acer

$3,233.00

2

$ 6,466.00

Cisco Catalyst 2811 Series Router

Cisco

$8,500.00

1

$ 8,500.00

LaCie 2 TB 10/100/1000 Back-up Device

LaCie

659

2

$ 1,318.00

APC Back UPS RS

APC

202

2

$ 404.00

Netgear WG302 Managed Wireless Access Point

Netgear

1500

6

$ 9,000.00

Netgear GS108 Switch 8-port

Netgear

159

1

$ 159.00

Acer Verizon S480 including 17” LCD monitors

Acer

760

2

$ 1,520.00

Cisco IP Phone

Cisco

312

2

$ 624.00

Server Cabinets

Cisco

1400

2

$ 2,800.00

Cabling (Cat 6)

Ibiza Store

n

$ 2,000.00

Sub total

$ 72,506.00

 The devices that has been chosen for implementation of the network are the best possible solution for the needs of Moonlight Pty Ltd. The devices being presented above will help to meet the demands of the employees within the organization by providing support for voice, video and data sharing through the network.

5. Type and number of IP addresses assigned to each network

The IP addressing that has been decided for implementing the network of Moonlight Pty Ltd is presented as below:

Subnet Name

Needed Size

Allocated Size

Address

Mask

Dec Mask

Assignable Range

Broadcast

Adelaide

127

254

10.10.8.0

/24

255.255.255.0

10.10.8.1 – 10.10.8.254

10.10.8.255

Canberra

100

126

10.10.9.0

/25

255.255.255.128

10.10.9.1 – 10.10.9.126

10.10.9.127

Sydney

80

126

10.10.9.128

/25

255.255.255.128

10.10.9.129 – 10.10.9.254

10.10.9.255

Melbourne

25

30

10.10.10.0

/27

255.255.255.224

10.10.10.1 – 10.10.10.30

10.10.10.31

Perth

18

30

10.10.10.32

/27

255.255.255.224

10.10.10.33 – 10.10.10.62

10.10.10.63

 The IP addressing has been done with the help of subnetting and each subnetwork for the different branches has been done with the help of following mechanism:

Major Network: 10.10.8.0/22
Available IP addresses in major network: 1022
Number of IP addresses needed: 350
Available IP addresses in allocated subnets: 566

About 56% of available major network address space is used

About 62% of subnetted network address space is used

The VLSM technique has been applied to divide the subnetwork for the five branches of Moonlight Pty Ltd. The VLSM is denoted as Variable Length Subnet Masking which is a technique for dividing an IP address space to different subnets with different sizes like subnetting of simple networks.

6. Interconnection between devices and each subnetwork

The intranet is divided into different subnets to separate the distribution of IP addresses for each device in the network. The devices in each subnetwork is connected through the switch and router that distributes the network for five branches of the organization. The four subnetworks are interconnected with the help of Core switch that acts as a medium for connecting different branches of the organization.

7. Hierarchical Model and justifications

The hierarchical model in context to the Moonlight Pty Ltd has been prepared to support the needs of the client. The designed model is presented as below: The hierarchical model has been designed to separate the subnetworks for all the five branches of Moonlight Pty Ltd that is Canberra, Adelaide, Sydney, Perth and Melbourne. The division of the subnetwork has to been done with the help of distribution switch. A wireless router is connected to the distribution switch to provide intercommunication between the different branches of the organization. The subnet masking has been done to divide the network for the five branches so that the network becomes more stable and efficient.

8. Software applications installed on each part and entire intranet  The software applications that will be installed on each part and entire intranet are listed as below:

Software

Vendor

Cost

Quantity

Total Cost

Microsoft Windows Server Enterprise 2012

Microsoft

1000

2

$2,000.00

Microsoft Office 2016

Microsoft

51

2

$102.00

3CX VoIP application

VoIP Provider

16

2

$32.00

Symantec End User Protection

Soft Licensing

1109

2

$2,218.00

Internet Plan (including ISP provided Router)

Telstra

3720

1

$3,720.00

 

 

Sub Total

 

 

 

$ 8,072.00

 The justifications for installation of the identified software application is described as below:

Software

Justification

Microsoft Windows Server Enterprise 2012

This software is required as it is the operating system that is required operating servers. The application will help to provide a centralized system for the users of the network.

Microsoft Office 2016

This software application will fulfill requirements of the system so that the users can perform the business activities easily. The MS Office application also supports the mailing services in which Outlook can be used to manage the mailing system and the files sharing can be easily carried out.

3CX VoIP application

This software application is essential for operating the VoIP means the IP phones that will help to meet the voice, video and data needs of the client. This software application will help to connect the client to a VoIP Provider for making calls to any mobile or landline number.

Symantec End User Protection

This software application is a security tool that will installed for the entire intranet so that intrusion detection and prevention can be carried out easily. This software application will provide protection from virus or vulnerabilities that may have impact on the network. 

Internet Plan (including ISP provided Router)

This is not a software application to brief but it is an essential requirement for Moonlight Pty Ltd as it will provide internet services to the different branches of the organization. Telstra has been chosen as the suitable ISP to cater needs of the organization as it is provides services nationwide and provides internet through DSL, NBN, Cable, Mobile and Satellite networks.

 9. Security mechanisms implemented on the network

The security measures that have to be implemented on the designed network for Moonlight Pty Ltd are discussed as below:

Restrictions for guests: A separate network has to be designed so that the guests or intruders cannot gain access to the main network. The intruder’s access to the main network may lead to theft of information or confidential data. Hence, a separate guest network will be designed for external users so that they cannot gain access to the main network.

Authentication of User: Proper authentication measures will be implemented for the network so that unauthorized users are not able to access the network. The users will be provided with unique credentials to login into the network and perform required operations.

Naming of the Network: Each wireless network have to be named so that checking of client’s connectivity can be easily monitored. Whenever a client attempts to access the network through a wireless access point, the name of the network is checked and then only authentication is requested from the users otherwise the connectivity is rejected.

Wired Equivalent Privacy: This method provides data encryption facilities by using 40-bit or 128-bit algorithms for encryption. A shared key method is being utilized by this method for WEP implementation where a password is created then installation will be carried out on every wireless device as well as access point.

Firewalls/VPN: The installation of firewalls is essential for maintaining security of networks. The firewall will help to prevent intrusion from outsiders and provide virus protection so that the information does not gets corrupted or there is occurrence of information theft. 

  • Bernardos, C.J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L.M., Jin, H. and Zúñiga, J.C., 2014. An architecture for software defined wireless networking. IEEE wireless communications, 21(3), pp.52-61.
  • Biswas, S., Bicket, J., Wong, E., Musaloiu-e, R., Bhartia, A. and Aguayo, D., 2015, August. Large-scale measurements of wireless network behavior. In ACM SIGCOMM Computer Communication Review (Vol. 45, No. 4, pp. 153-165). ACM.
  • Chen, T., Matinmikko, M., Chen, X., Zhou, X. and Ahokangas, P., 2015. Software defined mobile networks: concept, survey, and research directions. IEEE Communications Magazine, 53(11), pp.126-133.
  • Child, J., 2015. Organization: contemporary principles and practice. John Wiley & Sons.
  • Gao, J., Barzel, B. and Barabási, A.L., 2016. Universal resilience patterns in complex networks. Nature, 530(7590), p.307.
  • Kizza, J.M., 2017. Guide to computer network security. Springer.
  • Kolluri, S.K.P.K., 2016. APPLYING LEAN PRINCIPLES FOR PERFORMANCE ORIENTED SERVICE DESIGN OF VIRTUAL NETWORK FUNCTIONS FOR NFV INFRASTRUCTURE: Roles and Relationships.
  • Liang, C. and Yu, F.R., 2015. Wireless network virtualization: A survey, some research issues and challenges. IEEE Communications Surveys & Tutorials, 17(1), pp.358-380.
  • Loo, J., Mauri, J.L. and Ortiz, J.H. eds., 2016. Mobile ad hoc networks: current status and future trends. CRC Press.
  • Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press.
  • Perlman, R., Kaufman, C. and Speciner, M., 2016. Network security: private communication in a public world. Pearson Education India.
  • Sarkar, S.K., Basavaraju, T.G. and Puttamadappa, C., 2016. Ad hoc mobile wireless networks: principles, protocols, and applications. CRC Press.