Network and Security Assignment

Verified

Added on  2023/04/23

|18
|4007
|286
AI Summary
This Network & Security Assignment is based on the implementation of a branched network to meet the needs of the company. It includes objectives, design, disaster recovery plan, IP addressing, and maintenance. Additionally, the paper gives a brief overview of IoT technology and its impacts on lifestyle.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
NETWORK AND SECURITY ASSIGNMENT 1
NETWORK & SECURITY ASSIGNMENT
Student Name
Institution Affiliation
Facilitator
Course
Date

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
NETWORK AND SECURITY ASSIGNMENT 2
ICA COMPONENT 1
INTRODUCTION
The fresh fruit organization in this case study needs to have a network to coordinate all its
operations. This organization distributes fresh fruits. This company aspires to coordinate all the
operations across its depots in Leeds, Manchester, Liverpool, and Edinburgh through a large data
center. According to company needs, it must coordinate all its depots, its inter-depot transfer
services as well as its collection and delivery services. The head offices for this company are
based in London and its depots in the four towns listed above. The company must have a data
center and a disaster recovery plan which will be helpful in case of emergencies. Also, because
not all its depots have limited technologies, the ways to connect some of those depots will be
discussed. This report will, therefore, be based on the implementation of a branched network to
meet the needs of the company (Risso, Nesmachnow and Robledo, 2018, p.600).
OBJECTIVES
Based on the company needs, below are the six major objectives of the network design to be
implemented
Realizing a reliable network design that can interconnect the company depots and head
offices
Realizing remote access to the network by the employees
Implementation of a data center
A disaster recovery plan
IP PBX to facilitate communication among the depots
Video conferencing capabilities among depots
Document Page
NETWORK AND SECURITY ASSIGNMENT 3
DESIGN
This section describes both the technical and physical aspects of the proposed network design.
The figure below describes the geographical location of the network to be implemented.
(Yıldız, Karaşan and Yaman, 2018, p.160)
As observed in the above diagram, all the company depots: Leeds, Manchester,
Liverpool, and Edinburgh will be connected to a VPN through the internet. The VPN services
will be outsourced from the local service providers. Some of the reasons behind using the VPN
are: (1) through it, it’s easier to add more sites as the company expands (2) It’s cheaper and
secure (3) it will allow the company employees to remotely connect to the company’s internal
Document Page
NETWORK AND SECURITY ASSIGNMENT 4
network at any place and lastly (4) it can easily allow new depots to be added on the network as
the company grows (Cheruku et al, 2018, p.103).
Since not all depots have wireless connections or wired connections for them to be
directly connected to the VPN, microwaves will be used in such cases to link the depots to the
nearest one where they can then be comfortably connected to the VPN. In order to facilitate
company meetings without necessarily traveling, video conferencing and voice calling
capabilities among the depots will be established. The Head offices in London will be connected
to the depot offices through the global VPN. The design will mainly use Cisco networking
devices for routing and switching. This is because they are trustworthy and the best in the field.
They are sold with warranties; the company gives support after selling their devices, affordable
and durable (Soleimani and Kannan, 2015, p.4000).
THE HEAD OFFICE

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
NETWORK AND SECURITY ASSIGNMENT 5
(Mollah et al, 2018, p.400)
In the ground floor of this building, the servers will be installed. The total number of
servers, in this case, is four: Database server, Web Server, File server and Proxy server. Each
floor will have a separated LAN facilitated by a single switch per floor. Also, each floor will
have a dedicated printer and workstations interconnected via a switch. There will also be a Wi-Fi
router on each floor to facilitate internet connection for smartphones and laptops. The building
will be networked using CAT 6 cables and wall plates in each office, room and so on. A single
ASA (Adaptive security appliance) firewall will be used for the purposes of routing and
accessing the VPN. The ground floor will have 30 workstations; the second floor will have 20
workstations; while the third floor will have 40 workstations. Cisco 50 port switch will be used
on each floor in order to make it easy to add more workstations in the future ( Mbuagbaw et al,
2017, p.79).
There will be two more unique buildings with storehouse connected directly to the head
office. The key network features will be incorporated in each floor of the building but the
number of workstations in each floor will be different. The storehouse will have10 workstations
interlinked by a small switch.
DEPOTS AND REGIONAL CENTRES
The major depots for this company are situated in Leeds, Manchester, Liverpool, and
Edinburgh. In case any of these depots doesn’t have wired connections but has WiMAX and 3G,
such a depot will be connected to the internet through a high-speed mobile broadband connection
which then will be used to connect the depot to the VPN. Alternatively, a microwave link
Document Page
NETWORK AND SECURITY ASSIGNMENT 6
between such a depot and the nearest one will then be set up in order to connect the depot to a
VPN.
( KOÇ et al, 2018, p.5)
To use a microwave, the distance between any two depots will have to be 20km or less.
The line of sight will also be considered when the antennas are being set. In this scenario, a
microwave broadband antenna with a range of approximately 30Km and speed of 100Mbps will
be used. This is in consideration of the fact that the shorter the distance as compared with the
maximum range, the lesser the accuracy of the mounted antennas.
The regional centers will be based in the four major depots including Leeds, Manchester,
Liverpool, and Edinburgh. The network design for all the depots will also be identical to make it
Document Page
NETWORK AND SECURITY ASSIGNMENT 7
easier to manage. Additionally, just like in the case depots, all regional centers will be equipped
with VoIP and video conferencing capabilities.
The personal computers belonging to top-level managers in the regional centers and the
head offices will be equipped with the Cisco webcams with the ability to integrate with
Communication Servers and Call Manager Express. The webcams will be installed on top level
manager’s computers because not all the employees will require video conferencing facility.
However, in case additional webcams are required they will be purchased. A high-performance
MCU will be used to set up video conferencing to make it easier when it comes to configurations
in the head office to control and access the depots as shown below
DATA CENTER

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK AND SECURITY ASSIGNMENT 8
Establishing a data center is among the objectives of this company. The data center will
be designed as follows: First of all, the data center will have a power backup plan as a measure
of ensuring that the company data is secure. Additionally, all the company workstations either in
the head office or in the depots, the company servers, and other important devices will have
backup batteries to support them for some time in case of power failure. In this case,
CyberPower CP600LCD backup facilities will be used and replaced with a backup generator
whenever power failure persists for a long period (Cheruku et al, 2018, p.103). The Courier
officers, Database Administrators, System administrators will be able to access the database
remotely using VPN client software. On the other hand, customers will also be able to check the
availability of fruits to purchase through the company’s website.
Document Page
NETWORK AND SECURITY ASSIGNMENT 9
DISASTER RECOVERY PLAN
As a firm measure to company data security measure, a full data backup will be made on
a weekly basis. This will include all data in the company servers as well as the data center. Also,
a daily basis data backup will be made to cater for changes which will be taking place since the
last full backup. A 75 tape drive will be used in the disaster site as a backup (Cheruku et al,
2018, p.103). The main reason behind the implementation of the disaster recovery plan is to
enable access to the company information in case a natural disaster occurs and damages the
servers to an extent that system administrators are unable to access them.
IP ADDRESSING
Document Page
NETWORK AND SECURITY ASSIGNMENT 10
A private IP addressing scheme within the range of 10.0.0.0/16 will be used in this network
design and which is within the range of a Class A IP address
The Head office in London will be given an IP address range of 10.1.0.0/24. To separate the
LANs inside this network, a VLSM subnetting approach will be used. Below are the LANs on
each floor of the Head office building.
10.1. 00 00 0000.0 – 10.1.0.0 the unused subnet
10.1. 01 00 0000.0 – 10.1.64.0 Third floor
10.1. 10 00 0000.0 – 10.1.128.0 Second floor
10.1. 11 00 0000.0 – 10.1.192.0 First floor
Subnet mask – 255.255.192.0
The IP range to be used for all the routers which will be connected to the VPN is 10.0.10.0/24
while the subnet mask will be 255.255.255.0
Likewise, all the depots, regional centers, disaster recovery site, couriers etc will be using an IP
ranges of 10.2.0.0/24, 10.3.0.0/24 etc.
MAINTENANCE
An inclusive training session will be provided for to all the company IT staff on a day to
day maintenance of company servers and other network equipment. Because troubleshooting
won’t be effective if done by the company’s IT staff, the company may embark on outsourcing
the service from other companies which provide such services on contract bases. The VPN will,
however, be maintained by the service providers while Internet connections will be maintained
by Internet Service Providers.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
NETWORK AND SECURITY ASSIGNMENT 11
ICA COMONENT 2
Internet of Things (IoT)
Introduction
IoT is an abbreviation for the Internet of Things. It refers to an emerging network of
devices that utilizes the IP addressing technology for internet connectivity and communication
between devices and other internet-based systems. IoT technology has extended internet
connectivity beyond the traditional devices such as laptops, desktops, tablets, and smartphones to
a diverse range of devices that use embedded technology for communication and interaction
purposes with external environments through the Internet. Some of the devices that fall under the
scope of IoT include thermostats, networked security systems, electronic appliances, alarm
clocks, speaker systems, and vending machines (Beyene et al, 2017, p.26). IoT technology has
impacted the world in different ways. For instance, business organizations are currently
leveraging on IoT applications to performing real-time testing using networked cameras,
automate safety measures and to detect customer-product engagement using sensors. This paper
gives a brief overview of IoT technology and its impacts on lifestyle.
Description of the area of research
IoT has increasingly hit the headlines as a hot topic of discussion both in the workplaces
and other sectors. It's a technology that has shown its potential to impact the current lifestyle as
well as how people work. This technology has been engulfed with a lot of complexities but the
paper will stick to the basics. It’s important to understand some few things which have played a
major role in realizing the current trend in the growth of this technology like the wide coverage
of broadband internet. The wide availability of broadband internet has seen the average cost of
Document Page
NETWORK AND SECURITY ASSIGNMENT 12
internet connectivity decrease, the creation of more devices with Wi-Fi capabilities and inbuilt
sensors, a decline in the cost of technology and smartphone penetration has sky-rocketed. All of
these trends have created a “perfect storm” for the IoT (Dan et al, 2015, p.490).
So, the Internet of Things is basically the concept of connecting all the devices with an on
and an off switch to the internet. This entails all devices from cellphones, headphones, wearable
devices, coffee makers, lamps, washing machines and all other devices which can be thought of.
The technology also applies to other machine components such as jet engines of airplanes and
drillers of oil rigs. As mentioned earlier, if a device has an on and off switch, the chances of it
being used as part of IoT technology are very high (Qian and WANG, 2012, p.26).
According to the technology innovators, any device that can be connected will be
connected and this will have huge impacts on people’s lifestyle. The burning question is,
however, why so many devices must be connected and talking to each other? The potential value
for this large network of devices has been demonstrated in various incidences. For instance,
when a person is on his way to a business meeting; the car will be able to access his calendar and
decide on the best route to follow. When the traffic is heavy, the car will be able to send texts to
other members to notify them that the person will be late. Alarm clocks will have the ability to
wake a person at the set time and notify his/her coffee maker to start preparing the coffee.
Offices equipment will be able to detect when running short of resource supply and re-order
more automatically (Watteyne et al, 2016, p.30). Wearable devices used in the workplace will be
in a position to tell when a person is highly active and productive and share the information with
other devices used by the same person.
Document Page
NETWORK AND SECURITY ASSIGNMENT 13
On a broader scale, IoT technology has also been used in sectors like transportation,
communication, and city monitoring: Through “smart cities”, improved efficiency and reduced
waste for things like energy use will be achieved. This will help people understand and improve
how they work and live. Below is a visual demonstration of an IoT framework.
(Gandhi, 2017, p.250)
Research findings, the current state of technology
From the above discussion, it comes out clearly that IoT technology has emerged as a
game changer in many areas. Through this technology, communication between devices has
highly been encouraged. Through it, physical devices can stay connected to enhance
transparency and minimize inefficiencies and maintaining high quality. Through this technology,
automation and control have been achieved. This is in consideration of the fact that devices can
be connected and controlled both digitally and centrally in wireless infrastructure (El-Tawab et
al, 2017, p.500). The increasing availability of information will also help in making better

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK AND SECURITY ASSIGNMENT 14
decisions, especially in the business sector. Further, this technology will facilitate a high level of
monitoring to improve the security and safety of assets. Through these and other benefits linked
with this technology, it is clear that this technology will impact the lives of people in a positive
way.
There are however some serious concerns which have not been tackled sufficiently in the
implementation IoT. The first concern touches on the security aspect of the technology. Some of
the devices expected to be utilized heavily like sensors will be gathering sensitive data which can
be easily compromised (Del Giudice, 2016, p.40). Keeping such information secure is an
important step to win consumer trust, but the track record on IoT's security aspect is extremely
poor because most of its devices have not paid attention to security basics such as data
encryption.
The privacy of people using IoT devices is another potential problem which is likely to
face technology. This is in consideration of the high number of devices which will be collecting
data on everything done by people. Smart homes, for instance, will be collecting data on a person
right from the time he wakes up until he goes back to sleep (Mekki et al, 2018, p.46). The data
collected must, therefore, be handled with the privacy policies in place to avoid it being sold for
self-interests. Privacy policies have not been taken into consideration in many IoT devices being
implemented and that is becoming an issue of concern.
Conclusion
In summary, the component one of this paper has given an overview of the branched
network which will enable the company to coordinate all its functional components in real-time
basis. The depots will be connected through a VPN to increase the network redundancy as well
Document Page
NETWORK AND SECURITY ASSIGNMENT 15
as to increase the security of the network. Where wireless or wired connection approach is not
possible, microwaves will be used to link the depots to the VPN. Designs of different depots
have been presented to show how coordination will be taking place. Important also, the company
data center design has been presented as prove of the networks approach to ensure its data is
safe. Lastly, the disaster recovery plan for the company has been tabled as a way of mitigating
the risk of data loss. Moving forward to component two, the paper has presented IoT technology
as an emerging technology which is changing the lives of people in a positive way. Right from
making work easier through smart homes to increasing economic productivity through smart
cities, this technology has shown its positive influence on how this used to be done some few
decades ago. However, for it to fully take its course several aspects touching on its impacts must
be put in place. The first concern is the security of user data while the second concern is the
privacy of the user data.
Reflection
Considering the trend in which IoT technology is entering the market, I think it’s likely to
become the next big thing in the world of technology. First of all, unlike some decades ago
where most of the electronic devices manufactured had no capability to connect, the current
devices being manufactured currently have the ability to connect. Also, people are adopting
smart devices into their homes at a higher rate than ever before. Statistics have also indicated that
in just a single year, IoT devices connected to the internet rose from 5 million to billions. From
these statistics, I think in the next 5 years almost all IoT devices will be connected and the
technology will have fully taken off to facilitate change in the technological world.
Document Page
NETWORK AND SECURITY ASSIGNMENT 16
References
Beyene, Y.D., Jantti, R., Tirkkonen, O., Ruttik, K., Iraji, S., Larmo, A., Tirronen, T. and Torsner,
J., 2017. NB-IoT technology overview and experience from cloud-RAN implementation. IEEE
wireless communications, 24(3), pp.26-32.
Cheruku, R., Tripathi, D., Reddy, Y.N. and Racharla, S.P., 2018. Review on RBFNN Design
Approaches: A Case Study on Diabetes Data. In Advances in Machine Learning and Data
Science (pp. 103-112). Springer, Singapore.
Dan, L.I.U., Xin, C., Chongwei, H. and Liangliang, J., 2015, December. Intelligent agriculture
greenhouse environment monitoring system based on IOT technology. In 2015 International
Conference on Intelligent Transportation, Big Data and Smart City (pp. 487-490). IEEE.
Del Giudice, M., 2016. Discovering the Internet of Things (IoT): technology and business
process management, inside and outside the innovative firms. Business Process Management
Journal, 22(2).
El-Tawab, S., Oram, R., Garcia, M., Johns, C. and Park, B.B., 2017, March. Data analysis of
transit systems using low-cost IoT technology. In 2017 IEEE International Conference on
Pervasive Computing and Communications Workshops (PerCom Workshops) (pp. 497-502).
IEEE.
Gandhi, S.L., 2017, April. Smart Education Service Model Based On Iot Technology.
In International Interdisciplinary Conference on Science Technology Engineering
Management(pp. 273-276).

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
NETWORK AND SECURITY ASSIGNMENT 17
KOÇ, Ç., ÖZCEYLAN, E., Kesen, S.E., Cil, Z.A. and METE, S., 2018. Forward supply Chain
network design problem: Heuristic approaches. Pamukkale University Journal of Engineering
Sciences, 24(4).
Mbuagbaw, L., Rochwerg, B., Jaeschke, R., Heels-Andsell, D., Alhazzani, W., Thabane, L. and
Guyatt, G.H., 2017. Approaches to interpreting and choosing the best treatments in network
meta-analyses. Systematic reviews, 6(1), p.79.
Mekki, K., Bajic, E., Chaxel, F. and Meyer, F., 2018. A comparative study of LPWAN
technologies for large-scale IoT deployment. ICT Express.
Mollah, M.A., Faizian, P., Rahman, M.S., Yuan, X., Pakin, S. and Lang, M., 2018, May. A
Comparative Study of Topology Design Approaches for HPC Interconnects. In 2018 18th
IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID) (pp.
392-401). IEEE.
Qian, Z.H. and WANG, Y.J., 2012. IoT technology and application. Acta Electronica Sinica, 5,
p.026.
Risso, C., Nesmachnow, S. and Robledo, F., 2018. Metaheuristic approaches for IP/MPLS
network design. International Transactions in Operational Research, 25(2), pp.599-625.
Soleimani, H. and Kannan, G., 2015. A hybrid particle swarm optimization and genetic
algorithm for closed-loop supply chain network design in large-scale networks. Applied
Mathematical Modelling, 39(14), pp.3990-4012.
Document Page
NETWORK AND SECURITY ASSIGNMENT 18
Watteyne, T., Diedrichs, A.L., Brun-Laguna, K., Chaar, J.E., Dujovne, D., Taffernaberry, J.C.
and Mercado, G., 2016. Peach: Predicting frost events in peach orchards using iot
technology. EAI Endorsed Transactions on the Internet of Things.
Yıldız, B., Karaşan, O.E. and Yaman, H., 2018. Branch-and-price approaches for the network
design problem with relays. Computers & Operations Research, 92, pp.155-169.
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]