logo

Assignment Network Design

   

Added on  2020-05-11

66 Pages9319 Words59 Views
PROJECT 2-SSM NETWORK
DESIGN

Abstract
The network will be designed for the Seven Star Motors Company for all the departments with
Virtual Local Area Network (VLAN) by following the access rules given. The network will be
designed in order to develop the company’s business. An advance security will be used for
designing the network. Each and every department of the company will control and manage the
network by giving access to all other departments. There are four branches and a head office for
the company connected via Wireless Local Area Network (WLAN).
1

Table of Contents
1. Introduction 3
2. Requirements 3
3. Design 3
3.1 Security Policies 8
3.2 Disaster Recovery Plan 12
3.3 Disaster Recovery Policies 12
4. Network diagram and implementation 17
5. Configurations 17
ACL Configuration 36
VLAN configuration 42
Ping test 46
6. Tables 51
7. Equipment used 53
8. Conclusions 60
References 61
2

1. Introduction
Seven Star Motors company located in Australia and they have six branches in Melbourne,
Brisbane, Perth, Sydney and just started. The company has a head office located in Sydney and it
has two branches. The four branches and a head office of the company will be connected through
WLAN. All the branches will be designed by LAN network and WAN network will be used for
connecting all the departments. All the departments and branches will be designed by VLAN.
The security to all the branches of network will be provided by the device called Firewall. More
devices will be used for completing overall network design with the security. The network
configuration will be made by the following devices such as ISP, DHCP, Router, SSH server,
NAT server and switch etc.
2. Requirements
SSM Company spreads its branches all over the world and has six branches having many
departments. Six LAN configuration is provided to each branch of the network. WAN
configuration is provided for the connection between all the branches. One of the branch which
is in Sydney has two buildings named as Sydney-A and Sydney-B. Seventeen VLAN
connections are given since seventeen departments are there for whole branches. We need
seventeen printers for the branches since seventeen VLANs are present for seventeen
departments. Firewall is the security system used by all the systems for site security. An internet
standard named Network address translation (NAT) is the used for enabling LAN to use one set
of IP addresses for internal traffic and another set of IP addresses for external traffic used for
limiting the count of public IP addresses. All the system of the branches are provided with
technical support and a server is provided for all department each. Router, switch hub and more
required devices are used in the project as per the network requirement provided.
3. Design
Designing phase considers the development of lifecycle for designing large network.
Using this lifecycle, it is possible to design a network to improve the network security and
network maintenance. The development lifecycle contains the following phases:
i. Analysis requirement
3

ii. Plan
iii. Design
iv. Implementation
v. Test
vi. Maintenance
By using these phases, the network can be improved.
Phase 1: ANALYSIS-In analysis phase, analysis is about the problem and how to solve the
problem and how it takes place.
Phase 2: PLAN -In planning, the plan is made to rectify the problem and what is required to
solve the problem is checked subsequently.
Phase 3: DESIGN-In designing phase, the sample design for the network is designed where a
physical network is designed.
Phase 4: IMPLEMENTATION-In implementation phase, it configures the devices which are
used in the networks.
Phase 5: TEST-In testing phase, it tests the network connectivity and then the configuration Ping
command is used to check the connectivity of the devices. For checking the configuration “show
run” command is used.
Phase 6: MAINTENANCE-In maintenance phase, it shows how to maintain the network
security, service and data.
The Company’s PC Set-up and Internet Access Rule
Rider
4

The internet is a universal system and it contains million pages. It is caused by offensive,
and inappropriate materials. It avoids some unwanted pages and materials. It provides internet
connection to company.
Use of Internet and Company Computer Network
It uses legitimate business purposes and it provides computer network jobs. It allows
internet through the computer network. It includes possible termination and criminal liability. It
uses company’s PC properties, internet, legal and moral mode.
PC Setup Usage Boundaries
Forbidden Usage
In the organization, previously the printed agreement was lagging, an organization’s PC
setup did not distribute, vision or collection personal and profitable information like virus, self-
replicating programs and political materials. Employees should not download games and
entertaining software using organization’s networks. Employee’s should not store or send
computer network materials through email or chat room. If employee is encountered doing such
things, the materials will alert their supervisor instantly.
Illegal Copying
People should not copy or make duplicate of protected material illegally. People are
responsible for making copyright law and apply license for software, graphics, message and
documents. Other thing user can download or copy it easily. User can download the file easily
which is a license free version.
Communication of Trade Secrets
Employees are banned from sending and transmitting or distributing other private
information of the organization, but there is an exception for certain authorized individual. If an
employee shares those banned information, it is taken as a disciplinary action or criminal penalty
under the “Economic Espionage laws”.
PC Resources
Make sure safety, so employees using setup via a PC connected through the
organization’s setup should compulsory switch on the firewall or other security software from
computer. Organizations restrict network connector devices like modem which belongs to
employees.
Frivolous Use
5

An organization provides limited resources. Network bandwidth and system storage
capacity are limited. Networks have responsibility to keep those resources. Some range of
resources are allocated to each employee, if employees are over using the resources then it will
notify the same to the network administrator.
Anticipation of Secrecy
Each organization provides computer and internet access to employees for improving the
presentation of their jobs. Workers would not take any secrecy to send, make or save any
information using organization’s equipment.
Relinquishment of Secrecy Privileges
Consumer particularly surrenders to claim some privileges of secrecy like share, save,
and make by organization’s tools. The users agree to allow organizations personal access, where
the materials created, shared or are saved through employee via any computer networks
otherwise through a setup construction.
Watching PC Setup Usage.
An organization has rights toward monitoring the computers including internet sites that
are visited by the employees. Monitoring employee activities like downloads newsgroup and
chat.
Delaying Places by Unsuitable Information
An organization takes rights toward using the software for identifying the employee’s
activity and blocks the internet access of particular employees.
Strategies Happening Worm Protection Events
The following events are recommended for stopping the worm difficulties:
Continuously track the organization’s rules and reinforce worm protection software
which is obtainable in the company websites. Take that software then track the latest
types.
NEVER open unknown or unauthorized source in company’s system. If macros files or
any other files are opened just close it immediately.
Delete junk file and spam and chain from Emails do not have promoting with the
Hospital’s message rule.
Never transfer records from unidentified, unauthorized websites and sources.
Avoid disk sharing with Read/Write rights directly.
6

Before using floppy disk from unknown source, ensure to scan always. After scanning
the disk employee can use it.
In regular basis, backup the critical information and system configuration files. Finally,
keep this in a safe location.
Doubt laboratory challenging differences with virus protection software, then track the
virus protection software and clean the machine or system. After that, stop the software
and perform the lab test. Permit virus protection software to function. If virus protection
software is not permitted, don’t run any applications. Because, it can transfer virus into
the system (Example: File sharing and Email).
Latest viruses are noticed in each diurnal. Check the Laboratory virus protection rule
regularly, then update the advised process.
Message Rule in Wireless
Outline
The determination of wireless communication rule stands to keep the data resources that
belong to the company. The company offers computers, nets then additional electric data system
toward see assignments, initiatives and its goals. This permits admission toward properties
upholds the privacy, honesty and obtainability of information. WC rule includes that the
circumstances of wireless substructure device should convince to join to the company.
Possibility
In the company, all the employees, consultants, temporary workers and contractors and
third party groups are connected, with a Wireless Infrastructure device and holds on this
Wireless Communication rule. The rule smears to every Wireless Substructure plans connected
in this l network. This network includes all types of wireless communication devices like cellular
phones, PDA, and desktops that are able to transfer the data packets.
Rule Statement
General Network Access Requirements
Every wireless device infrastructure devices located in company site and for providing
internet access company must deny the following:
1) An approved supported team must install and maintain the system.
2) Apply hospital accepted authentication protocols and infrastructure.
3) Apply encryption protocols which are approved by the company.
7

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
SSM DELL Project Management SSM Australia Network Design
|22
|6191
|492

Basic Requirements of a Network
|13
|822
|11

A Presentation on rectifying Faults.
|9
|477
|26

Proposal of a WAN Solution for the School Campus of Singapore Gaming Academy
|25
|4952
|250

ICT106 Data Communications and Networks
|11
|681
|11

A Presentation on ICT Networks
|13
|828
|10