Local and Wide Area Network Technologies
VerifiedAdded on 2023/06/11
|9
|2290
|173
AI Summary
This article discusses the identification of client needs, support provided by the intranet, number and types of workstations, file servers and other networking devices, IP addresses assigned to each network, interconnection between devices and each subnetwork, hierarchical model and justifications, software applications installed on each part and entire intranet, and security mechanisms implemented on the network.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: LOCAL AND WIDE AREA NETWORK
Local and Wide Area Network Technologies
Student Name:
University Name:
Local and Wide Area Network Technologies
Student Name:
University Name:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1LOCAL AND WIDE AREA NETWORK
Table of Contents
1. Identification of the client needs.........................................................................................................................2
2. Demonstrating support provided by the intranet.................................................................................................2
3. Number and types of workstations, file servers and other networking devices...................................................2
4. Name, cost and manufacturer of each device......................................................................................................3
5. Type and number of IP addresses assigned to each network..............................................................................3
6. Interconnection between devices and each subnetwork......................................................................................4
7. Hierarchical Model and justifications.................................................................................................................4
8. Software applications installed on each part and entire intranet.........................................................................5
9. Security mechanisms implemented on the network............................................................................................6
Bibliography...........................................................................................................................................................8
Table of Contents
1. Identification of the client needs.........................................................................................................................2
2. Demonstrating support provided by the intranet.................................................................................................2
3. Number and types of workstations, file servers and other networking devices...................................................2
4. Name, cost and manufacturer of each device......................................................................................................3
5. Type and number of IP addresses assigned to each network..............................................................................3
6. Interconnection between devices and each subnetwork......................................................................................4
7. Hierarchical Model and justifications.................................................................................................................4
8. Software applications installed on each part and entire intranet.........................................................................5
9. Security mechanisms implemented on the network............................................................................................6
Bibliography...........................................................................................................................................................8
2LOCAL AND WIDE AREA NETWORK
1. Identification of the client needs
The needs of Moonlight Pty Ltd. that has been identified from the provided case study are presented as
below:
Sharing of files within departments.
Accessing of files in one department from other department.
Interconnection between different branches of the organization.
An intranet that is cost efficient and effective to meet the requirements.
2. Demonstrating support provided by the intranet
The intranet being designed reflects that there is interconnection between the different branches of the
organization that are divided into subnetworks. The major network has been divided with the help of subnetting
so that files or media can be shared between different departments in five branches of the organization. VoIP
provides communication facilities so that voice can transmitted through internet as per requirement of users of
the network for Moonlight Pty Ltd.
3. Number and types of workstations, file servers and other networking devices
Device Quantity Reason
Cisco Catalyst 2960 24 Port
Layer 3 switch
5 The switch is required to distribute the major network
into different subnetworks.
Acer Altos R720 Rackmount
Servers
2 The servers are required for information storage or
backup as well as sharing the information.
Cisco Catalyst 2811 Series
Router
1 The router is required for connecting different
networks as well as packet forwarding.
LaCie 2 TB 10/100/1000
Back-up Device
2 This device is required for data backup and recovery.
APC Back UPS RS 2 This device is required to provide power backup to
the device in case of power failure.
Netgear WG302 Managed
Wireless Access Point
6 The wireless access point provides access to the
network through mobile or wireless devices.
Netgear GS108 Switch 8-port 1 This switch is required as the Core switch through
which the network will be distributed to different sub
networks.
Acer Verizon S480 including 17”
LCD monitors
2 The monitors are required so that the users can
interact with the system.
Cisco IP Phone 2 The IP phone is required for voice facilities through
the internet.
Server Cabinets 2 It is required as compartment to hold the components
of a server.
Cabling (Cat 6) n It will be used as the transmission media for the
network.
1. Identification of the client needs
The needs of Moonlight Pty Ltd. that has been identified from the provided case study are presented as
below:
Sharing of files within departments.
Accessing of files in one department from other department.
Interconnection between different branches of the organization.
An intranet that is cost efficient and effective to meet the requirements.
2. Demonstrating support provided by the intranet
The intranet being designed reflects that there is interconnection between the different branches of the
organization that are divided into subnetworks. The major network has been divided with the help of subnetting
so that files or media can be shared between different departments in five branches of the organization. VoIP
provides communication facilities so that voice can transmitted through internet as per requirement of users of
the network for Moonlight Pty Ltd.
3. Number and types of workstations, file servers and other networking devices
Device Quantity Reason
Cisco Catalyst 2960 24 Port
Layer 3 switch
5 The switch is required to distribute the major network
into different subnetworks.
Acer Altos R720 Rackmount
Servers
2 The servers are required for information storage or
backup as well as sharing the information.
Cisco Catalyst 2811 Series
Router
1 The router is required for connecting different
networks as well as packet forwarding.
LaCie 2 TB 10/100/1000
Back-up Device
2 This device is required for data backup and recovery.
APC Back UPS RS 2 This device is required to provide power backup to
the device in case of power failure.
Netgear WG302 Managed
Wireless Access Point
6 The wireless access point provides access to the
network through mobile or wireless devices.
Netgear GS108 Switch 8-port 1 This switch is required as the Core switch through
which the network will be distributed to different sub
networks.
Acer Verizon S480 including 17”
LCD monitors
2 The monitors are required so that the users can
interact with the system.
Cisco IP Phone 2 The IP phone is required for voice facilities through
the internet.
Server Cabinets 2 It is required as compartment to hold the components
of a server.
Cabling (Cat 6) n It will be used as the transmission media for the
network.
3LOCAL AND WIDE AREA NETWORK
4. Name, cost and manufacturer of each device
Device Manufacturer Cost Quantity Total Cost
Cisco Catalyst 2960 24 Port
Layer 3 switch
Cisco $7,943.0
0
5 $ 39,715.00
Acer Altos R720 Rackmount
Servers
Acer $3,233.0
0
2 $ 6,466.00
Cisco Catalyst 2811 Series
Router
Cisco $8,500.0
0
1 $ 8,500.00
LaCie 2 TB
10/100/1000 Back-up
Device
LaCie 659 2 $ 1,318.00
APC Back UPS RS APC 202 2 $ 404.00
Netgear WG302 Managed
Wireless Access Point
Netgear 1500 6 $ 9,000.00
Netgear GS108 Switch 8-port Netgear 159 1 $ 159.00
Acer Verizon S480 including
17” LCD monitors
Acer 760 2 $ 1,520.00
Cisco IP Phone Cisco 312 2 $ 624.00
Server Cabinets Cisco 1400 2 $ 2,800.00
Cabling (Cat 6) Ibiza Store n $ 2,000.00
Sub total $ 72,506.00
The devices that has been chosen for implementation of the network are the best possible solution for the
needs of Moonlight Pty Ltd. The devices being presented above will help to meet the demands of the employees
within the organization by providing support for voice, video and data sharing through the network.
5. Type and number of IP addresses assigned to each network
The IP addressing that has been decided for implementing the network of Moonlight Pty Ltd is presented
as below:
Subnet
Name
Needed
Size
Allocated
Size
Address Mas
k
Dec Mask Assignable
Range
Broadcast
Adelaide 127 254 10.10.8.0 /24 255.255.255.0 10.10.8.1 -
10.10.8.254
10.10.8.255
Canberra 100 126 10.10.9.0 /25 255.255.255.128 10.10.9.1 -
10.10.9.126
10.10.9.127
Sydney 80 126 10.10.9.128 /25 255.255.255.128 10.10.9.129 -
10.10.9.254
10.10.9.255
Melbourn
e
25 30 10.10.10.0 /27 255.255.255.224 10.10.10.1 -
10.10.10.30
10.10.10.31
Perth 18 30 10.10.10.32 /27 255.255.255.224 10.10.10.33 -
10.10.10.62
10.10.10.63
4. Name, cost and manufacturer of each device
Device Manufacturer Cost Quantity Total Cost
Cisco Catalyst 2960 24 Port
Layer 3 switch
Cisco $7,943.0
0
5 $ 39,715.00
Acer Altos R720 Rackmount
Servers
Acer $3,233.0
0
2 $ 6,466.00
Cisco Catalyst 2811 Series
Router
Cisco $8,500.0
0
1 $ 8,500.00
LaCie 2 TB
10/100/1000 Back-up
Device
LaCie 659 2 $ 1,318.00
APC Back UPS RS APC 202 2 $ 404.00
Netgear WG302 Managed
Wireless Access Point
Netgear 1500 6 $ 9,000.00
Netgear GS108 Switch 8-port Netgear 159 1 $ 159.00
Acer Verizon S480 including
17” LCD monitors
Acer 760 2 $ 1,520.00
Cisco IP Phone Cisco 312 2 $ 624.00
Server Cabinets Cisco 1400 2 $ 2,800.00
Cabling (Cat 6) Ibiza Store n $ 2,000.00
Sub total $ 72,506.00
The devices that has been chosen for implementation of the network are the best possible solution for the
needs of Moonlight Pty Ltd. The devices being presented above will help to meet the demands of the employees
within the organization by providing support for voice, video and data sharing through the network.
5. Type and number of IP addresses assigned to each network
The IP addressing that has been decided for implementing the network of Moonlight Pty Ltd is presented
as below:
Subnet
Name
Needed
Size
Allocated
Size
Address Mas
k
Dec Mask Assignable
Range
Broadcast
Adelaide 127 254 10.10.8.0 /24 255.255.255.0 10.10.8.1 -
10.10.8.254
10.10.8.255
Canberra 100 126 10.10.9.0 /25 255.255.255.128 10.10.9.1 -
10.10.9.126
10.10.9.127
Sydney 80 126 10.10.9.128 /25 255.255.255.128 10.10.9.129 -
10.10.9.254
10.10.9.255
Melbourn
e
25 30 10.10.10.0 /27 255.255.255.224 10.10.10.1 -
10.10.10.30
10.10.10.31
Perth 18 30 10.10.10.32 /27 255.255.255.224 10.10.10.33 -
10.10.10.62
10.10.10.63
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4LOCAL AND WIDE AREA NETWORK
The IP addressing has been done with the help of subnetting and each subnetwork for the different
branches has been done with the help of following mechanism:
Major Network: 10.10.8.0/22
Available IP addresses in major network: 1022
Number of IP addresses needed: 350
Available IP addresses in allocated subnets: 566
About 56% of available major network address space is used
About 62% of subnetted network address space is used
The VLSM technique has been applied to divide the subnetwork for the five branches of Moonlight Pty
Ltd. The VLSM is denoted as Variable Length Subnet Masking which is a technique for dividing an IP address
space to different subnets with different sizes like subnetting of simple networks.
6. Interconnection between devices and each subnetwork
The intranet is divided into different subnets to separate the distribution of IP addresses for each device
in the network. The devices in each subnetwork is connected through the switch and router that distributes the
network for five branches of the organization. The four subnetworks are interconnected with the help of Core
switch that acts as a medium for connecting different branches of the organization.
7. Hierarchical Model and justifications
The hierarchical model in context to the Moonlight Pty Ltd has been prepared to support the needs of the
client. The designed model is presented as below:
The IP addressing has been done with the help of subnetting and each subnetwork for the different
branches has been done with the help of following mechanism:
Major Network: 10.10.8.0/22
Available IP addresses in major network: 1022
Number of IP addresses needed: 350
Available IP addresses in allocated subnets: 566
About 56% of available major network address space is used
About 62% of subnetted network address space is used
The VLSM technique has been applied to divide the subnetwork for the five branches of Moonlight Pty
Ltd. The VLSM is denoted as Variable Length Subnet Masking which is a technique for dividing an IP address
space to different subnets with different sizes like subnetting of simple networks.
6. Interconnection between devices and each subnetwork
The intranet is divided into different subnets to separate the distribution of IP addresses for each device
in the network. The devices in each subnetwork is connected through the switch and router that distributes the
network for five branches of the organization. The four subnetworks are interconnected with the help of Core
switch that acts as a medium for connecting different branches of the organization.
7. Hierarchical Model and justifications
The hierarchical model in context to the Moonlight Pty Ltd has been prepared to support the needs of the
client. The designed model is presented as below:
5LOCAL AND WIDE AREA NETWORK
The hierarchical model has been designed to separate the subnetworks for all the five branches of
Moonlight Pty Ltd that is Canberra, Adelaide, Sydney, Perth and Melbourne. The division of the subnetwork has
to been done with the help of distribution switch. A wireless router is connected to the distribution switch to
provide intercommunication between the different branches of the organization. The subnet masking has been
done to divide the network for the five branches so that the network becomes more stable and efficient.
8. Software applications installed on each part and entire intranet
The software applications that will be installed on each part and entire intranet are listed as below:
Software Vendor Cost Quantity Total Cost
Microsoft Windows Server Enterprise 2012 Microsoft 1000 2 $2,000.00
Microsoft Office 2016 Microsoft 51 2 $102.00
3CX VoIP application VoIP Provider 16 2 $32.00
Symantec End User Protection Soft Licensing 1109 2 $2,218.00
Internet Plan (including ISP provided Router) Telstra 3720 1 $3,720.00
Sub Total $ 8,072.00
The justifications for installation of the identified software application is described as below:
The hierarchical model has been designed to separate the subnetworks for all the five branches of
Moonlight Pty Ltd that is Canberra, Adelaide, Sydney, Perth and Melbourne. The division of the subnetwork has
to been done with the help of distribution switch. A wireless router is connected to the distribution switch to
provide intercommunication between the different branches of the organization. The subnet masking has been
done to divide the network for the five branches so that the network becomes more stable and efficient.
8. Software applications installed on each part and entire intranet
The software applications that will be installed on each part and entire intranet are listed as below:
Software Vendor Cost Quantity Total Cost
Microsoft Windows Server Enterprise 2012 Microsoft 1000 2 $2,000.00
Microsoft Office 2016 Microsoft 51 2 $102.00
3CX VoIP application VoIP Provider 16 2 $32.00
Symantec End User Protection Soft Licensing 1109 2 $2,218.00
Internet Plan (including ISP provided Router) Telstra 3720 1 $3,720.00
Sub Total $ 8,072.00
The justifications for installation of the identified software application is described as below:
6LOCAL AND WIDE AREA NETWORK
Software Justification
Microsoft Windows
Server Enterprise 2012
This software is required as it is the operating system that is required operating
servers. The application will help to provide a centralized system for the users of
the network.
Microsoft Office 2016
This software application will fulfill requirements of the system so that the users
can perform the business activities easily. The MS Office application also
supports the mailing services in which Outlook can be used to manage the mailing
system and the files sharing can be easily carried out.
3CX VoIP application
This software application is essential for operating the VoIP means the IP phones
that will help to meet the voice, video and data needs of the client. This software
application will help to connect the client to a VoIP Provider for making calls to
any mobile or landline number.
Symantec End User
Protection
This software application is a security tool that will installed for the entire intranet
so that intrusion detection and prevention can be carried out easily. This software
application will provide protection from virus or vulnerabilities that may have
impact on the network.
Internet Plan (including
ISP provided Router)
This is not a software application to brief but it is an essential requirement for
Moonlight Pty Ltd as it will provide internet services to the different branches of
the organization. Telstra has been chosen as the suitable ISP to cater needs of the
organization as it is provides services nationwide and provides internet through
DSL, NBN, Cable, Mobile and Satellite networks.
9. Security mechanisms implemented on the network
The security measures that have to be implemented on the designed network for Moonlight Pty Ltd are
discussed as below:
Restrictions for guests: A separate network has to be designed so that the guests or intruders cannot gain
access to the main network. The intruder’s access to the main network may lead to theft of information or
confidential data. Hence, a separate guest network will be designed for external users so that they cannot gain
access to the main network.
Authentication of User: Proper authentication measures will be implemented for the network so that
unauthorized users are not able to access the network. The users will be provided with unique credentials to
login into the network and perform required operations.
Naming of the Network: Each wireless network have to be named so that checking of client’s
connectivity can be easily monitored. Whenever a client attempts to access the network through a wireless
access point, the name of the network is checked and then only authentication is requested from the users
otherwise the connectivity is rejected.
Wired Equivalent Privacy: This method provides data encryption facilities by using 40-bit or 128-bit
algorithms for encryption. A shared key method is being utilized by this method for WEP implementation where
a password is created then installation will be carried out on every wireless device as well as access point.
Software Justification
Microsoft Windows
Server Enterprise 2012
This software is required as it is the operating system that is required operating
servers. The application will help to provide a centralized system for the users of
the network.
Microsoft Office 2016
This software application will fulfill requirements of the system so that the users
can perform the business activities easily. The MS Office application also
supports the mailing services in which Outlook can be used to manage the mailing
system and the files sharing can be easily carried out.
3CX VoIP application
This software application is essential for operating the VoIP means the IP phones
that will help to meet the voice, video and data needs of the client. This software
application will help to connect the client to a VoIP Provider for making calls to
any mobile or landline number.
Symantec End User
Protection
This software application is a security tool that will installed for the entire intranet
so that intrusion detection and prevention can be carried out easily. This software
application will provide protection from virus or vulnerabilities that may have
impact on the network.
Internet Plan (including
ISP provided Router)
This is not a software application to brief but it is an essential requirement for
Moonlight Pty Ltd as it will provide internet services to the different branches of
the organization. Telstra has been chosen as the suitable ISP to cater needs of the
organization as it is provides services nationwide and provides internet through
DSL, NBN, Cable, Mobile and Satellite networks.
9. Security mechanisms implemented on the network
The security measures that have to be implemented on the designed network for Moonlight Pty Ltd are
discussed as below:
Restrictions for guests: A separate network has to be designed so that the guests or intruders cannot gain
access to the main network. The intruder’s access to the main network may lead to theft of information or
confidential data. Hence, a separate guest network will be designed for external users so that they cannot gain
access to the main network.
Authentication of User: Proper authentication measures will be implemented for the network so that
unauthorized users are not able to access the network. The users will be provided with unique credentials to
login into the network and perform required operations.
Naming of the Network: Each wireless network have to be named so that checking of client’s
connectivity can be easily monitored. Whenever a client attempts to access the network through a wireless
access point, the name of the network is checked and then only authentication is requested from the users
otherwise the connectivity is rejected.
Wired Equivalent Privacy: This method provides data encryption facilities by using 40-bit or 128-bit
algorithms for encryption. A shared key method is being utilized by this method for WEP implementation where
a password is created then installation will be carried out on every wireless device as well as access point.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7LOCAL AND WIDE AREA NETWORK
Firewalls/VPN: The installation of firewalls is essential for maintaining security of networks. The
firewall will help to prevent intrusion from outsiders and provide virus protection so that the information does
not gets corrupted or there is occurrence of information theft.
Firewalls/VPN: The installation of firewalls is essential for maintaining security of networks. The
firewall will help to prevent intrusion from outsiders and provide virus protection so that the information does
not gets corrupted or there is occurrence of information theft.
8LOCAL AND WIDE AREA NETWORK
Bibliography
[1.] Bernardos, C.J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L.M., Jin, H. and Zúñiga, J.C.,
2014. An architecture for software defined wireless networking. IEEE wireless communications, 21(3), pp.52-
61.
[2.] Biswas, S., Bicket, J., Wong, E., Musaloiu-e, R., Bhartia, A. and Aguayo, D., 2015, August. Large-scale
measurements of wireless network behavior. In ACM SIGCOMM Computer Communication Review (Vol. 45,
No. 4, pp. 153-165). ACM.
[3.] Chen, T., Matinmikko, M., Chen, X., Zhou, X. and Ahokangas, P., 2015. Software defined mobile
networks: concept, survey, and research directions. IEEE Communications Magazine, 53(11), pp.126-133.
[4.] Child, J., 2015. Organization: contemporary principles and practice. John Wiley & Sons.
[5.] Gao, J., Barzel, B. and Barabási, A.L., 2016. Universal resilience patterns in complex networks. Nature,
530(7590), p.307.
[6.] Kizza, J.M., 2017. Guide to computer network security. Springer.
[7.] Kolluri, S.K.P.K., 2016. APPLYING LEAN PRINCIPLES FOR PERFORMANCE ORIENTED
SERVICE DESIGN OF VIRTUAL NETWORK FUNCTIONS FOR NFV INFRASTRUCTURE: Roles and
Relationships.
[8.] Liang, C. and Yu, F.R., 2015. Wireless network virtualization: A survey, some research issues and
challenges. IEEE Communications Surveys & Tutorials, 17(1), pp.358-380.
[9.] Loo, J., Mauri, J.L. and Ortiz, J.H. eds., 2016. Mobile ad hoc networks: current status and future trends.
CRC Press.
[10.] Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC
press.
[11.] Perlman, R., Kaufman, C. and Speciner, M., 2016. Network security: private communication in a public
world. Pearson Education India.
[12.] Sarkar, S.K., Basavaraju, T.G. and Puttamadappa, C., 2016. Ad hoc mobile wireless networks: principles,
protocols, and applications. CRC Press.
Bibliography
[1.] Bernardos, C.J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L.M., Jin, H. and Zúñiga, J.C.,
2014. An architecture for software defined wireless networking. IEEE wireless communications, 21(3), pp.52-
61.
[2.] Biswas, S., Bicket, J., Wong, E., Musaloiu-e, R., Bhartia, A. and Aguayo, D., 2015, August. Large-scale
measurements of wireless network behavior. In ACM SIGCOMM Computer Communication Review (Vol. 45,
No. 4, pp. 153-165). ACM.
[3.] Chen, T., Matinmikko, M., Chen, X., Zhou, X. and Ahokangas, P., 2015. Software defined mobile
networks: concept, survey, and research directions. IEEE Communications Magazine, 53(11), pp.126-133.
[4.] Child, J., 2015. Organization: contemporary principles and practice. John Wiley & Sons.
[5.] Gao, J., Barzel, B. and Barabási, A.L., 2016. Universal resilience patterns in complex networks. Nature,
530(7590), p.307.
[6.] Kizza, J.M., 2017. Guide to computer network security. Springer.
[7.] Kolluri, S.K.P.K., 2016. APPLYING LEAN PRINCIPLES FOR PERFORMANCE ORIENTED
SERVICE DESIGN OF VIRTUAL NETWORK FUNCTIONS FOR NFV INFRASTRUCTURE: Roles and
Relationships.
[8.] Liang, C. and Yu, F.R., 2015. Wireless network virtualization: A survey, some research issues and
challenges. IEEE Communications Surveys & Tutorials, 17(1), pp.358-380.
[9.] Loo, J., Mauri, J.L. and Ortiz, J.H. eds., 2016. Mobile ad hoc networks: current status and future trends.
CRC Press.
[10.] Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC
press.
[11.] Perlman, R., Kaufman, C. and Speciner, M., 2016. Network security: private communication in a public
world. Pearson Education India.
[12.] Sarkar, S.K., Basavaraju, T.G. and Puttamadappa, C., 2016. Ad hoc mobile wireless networks: principles,
protocols, and applications. CRC Press.
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.