The report has been prepared for MEC which is a small educational organization and it has a requirement of preparation of a small educational organization. For the preparation of the report the needs and requirement of the organization is analyzed and the key features required to be implemented for the development of the network is identified. For the preparation of the network design the building block network approach is followed and simulation of the network is done in cisco packet tracer. The issues found during the preparation of the network is discusses in the report and the mitigation techniques that should be followed for resolving the issues is also documented.
The network prepared for MEC (Middle East College) is designed for its 5000 students and 145 staffs. The network is divided into different subnet for separating the departments of the college and the levels of the buildings. A server is required to be configured with DNS and Web service such that it can handle the request of the client using the www.mec.edu.au website. The servers is also required to be configured with SMTP protocol for sending and receiving emails between the users. The network of the computer labs of the college is designed to accommodate 25 computers for accessing the internet and the college learning system. A wireless device is also connected in the network for providing wireless access to the students in the campus area.
Figure 1: Logical Network Diagram of MEC
(Source: Created by author)
The network is designed for the Middle East College that has two departments such as the Accounting and the Business department. The Business Department has a three storied building and the Accounts department has a two storied building. Separate switch is used for connecting the host of the servers. The switch is required to be configured with Vlan for separating the student with the staffs. Separate IP address is used for the student and the staffs for increasing the security of the network. The router is configured with IP routing protocol for communicating with both the ends of the network. A cabling plan id followed for interconnecting the network devices such as the routers and the switches and for the same type of devices cropper straight through cable is used and for interconnecting the different devices such as the switch and the router or the switch and the host a copper cross over cable is used. The connection between the two routers are done using a serial cable. The IP address scheme is used for configuring the router with the IP address and a static IP address is provided to each of the host connected in the network for connecting between them and they are checked if the PCs are pinging with each other.
The network model is prepared such that it can handle the large number of client request generated from the student and the web server. The server is required to be available all the time and is required to respond against the client request. A proper cabbing plan is used for interconnecting the devices and increase the performance of the network. The hierarchical internetworking model is followed for the preparation of the network design and it consists of the following layers such as:
Core Layer- The core layer consists of the router and the protocols used for configuring the router and handling the translation of the address and permitting or denying the hosts for accessing the web server of the college.
The Distribution Layer- It is used as a bypass gateway for the network and it decides the users who should be permitted to enter the core layer and act a barrier for the intruder to get the access of the core components used in the network. The distribution is located between the core layer and the access layer of the network and it also helps to manage the network traffic coming from different point of the network.
The Access Layer- The access layer is used for managing the user entering the network and it acts as a front door of the network. The access layer works on the access control list for blocking and permitting the user entering the network.
There are three servers installed in the college network for managing the different operation of the college such as managing the web portals and online mailing system of the college.
The first server is configures as a web server and it is configured to serve the users with Http content. The web server of the college is designed to handle the static contents and different plugins are used for supporting the scripting languages. The web server is also configured with application server for handling the dynamic web contents.
The second server is configured as an Email server for increasing the efficiency of communication such that the staffs can send and receive emails to share the organizational resources. For configuring the email server an SMTP protocol is used and there is a requirement (Hinds, Atojoko & Zhu, 2013) to set the domain name and the web services is also required to be configured on the other server. The username and password is required to be stored in the email server for configuring the network.
The third server is configured as a file server to store the records of the student and the organization. The file server is also required to be connected with the other server to increase the efficiency of the network. An access control list is required to be prepared and configured in the router to provide permission for accessing or denying the request of the user.
The IP address and the subnet mask created for the creation of the network is demonstrated below in the following table:
Major Network: 192.168.0.0/16
Available IP addresses in major network: 65534
Number of IP addresses needed: 5195
Available IP addresses in allocated subnets: 6358
About 10% of available major network address space is used
About 82% of subnetted network address space is used
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
Accounts Students |
3000 |
4094 |
192.168.0.0 |
/20 |
255.255.240.0 |
192.168.0.1 – 192.168.15.254 |
192.168.15.255 |
Business student |
2000 |
2046 |
192.168.16.0 |
/21 |
255.255.248.0 |
192.168.16.1 – 192.168.23.254 |
192.168.23.255 |
Accounts Staffs |
125 |
126 |
192.168.24.0 |
/25 |
255.255.255.128 |
192.168.24.1 – 192.168.24.126 |
192.168.24.127 |
Lab network |
50 |
62 |
192.168.24.128 |
/26 |
255.255.255.192 |
192.168.24.129 – 192.168.24.190 |
192.168.24.191 |
Business staff |
20 |
30 |
192.168.24.192 |
/27 |
255.255.255.224 |
192.168.24.193 – 192.168.24.222 |
192.168.24.223 |
The IP addressing scheme is designed for the Middle East College and it demonstrates subnet mask and the range of the IP address that is required to be allocated to the host Pc for configuring the network. The subnets can be further broken down for dividing the host PC in smaller segment and increase the efficiency of the proposed network solution.
Figure 2: Design of Accounts Department
(Source: Created by author)
Figure 3: Simulation of the PC and routers
(Source: Creatre by author)
Middle East College is an educational institution and it is required to handle a large number of request from the student and manage the website for facilitating the student and the staffs to increase the efficiency of their education by sharing the study materials and other components with the student. The proposal of a network design is provided for creation of the network infrastructure for the organization. The propose network design helps the network engineer to get the details about the devices and the routers used for designing the network design for the company.
The web server of the organization is required to be configured with DNS and Email for sending and receiving emails from the clients. The staffs can communicate within themselves and share resources for teaching the students via the emails. The project scope identified for the development of the project is that the design of the network is required to be created after analyzing the requirement of the Middle East College. The website created for communicating with the staffs and the students is required to be accessed from remote hosts and the email option is required to be provided to the students also for sharing the report cards and assignments.
The schedule prepared for the development of the project is tabulated as follows:
Activity |
Duration |
Requirement Analysis |
15 days |
Project Planning |
20 days |
Deployment of the network |
25 days |
Testing |
15 days |
Execution |
30 days |
Project Closure |
2 days |
The cost incurred for the development of the project is calculated by assigning the cost of the resource and the materials with each of the activities identified in the development of the project.
Activity |
Cost |
Requirement Analysis |
$2500 |
Project Planning |
$20000 |
Deployment of the network |
$35000 |
Testing |
$15000 |
Execution |
$15000 |
Project Closure |
$0 |
Raw material Cost |
$50000 |
Total Cost |
137,500 |
The cost of the hardware required for the development of the network of MEC are listed as follows:
Software
Windows Server 2016 Standard edition is required to be installed in the server computers for running the operating system and ManageEngine OPManager is required to be used for mapping the network and increase the efficiency of the network design.
The router is required to be configured with IRC or Internet Relay chat for communicating with the each other in text format. There is also a requirement to configure a chat server for sending one to one primate communication messages (Mulder & Dekker, 2014). The service provider selected for providing the internet should provide both the web and the mail service for the organizational network. The following service is required to be implemented for increasing the efficiency of the current network design of the Middle East College:
A firewall constrains the introduction of inside system to the web and it will control the getting to it from unapproved clients. A firewall keeps the programmers out. Likewise, it gives valuable administrations, for example, Virtual Private Networks (VPNs).
Firewalls can be programming or equipment yet a thought firewall comprises them both. It concedes or rejects arrange access to movement streams between an untrusted zone and a confided in zone. All the correspondence between the system and the web experiences it, in both courses (Internet to network and system to Internet).
Figure 4: Firewall
(Source: Simmons, 2014)
Firewalls don’t shield the PCs from infections. Introducing and utilizing antivirus programming will keep them out. Infections can originate from connections in e?mail messages, documents on CDs or DVDs, or records downloaded from the Internet (Jia et al., 2014). In this way, all around antivirus programming can distinguish the infections and tell them, and in addition to expel them. Checking the end client PCs in the system utilizing that product will dependably have a maintainable security inside the system.
The clients can be furnished with interesting client names and passwords to get to the PCs in the system. They need to keep those IDs and passwords to themselves and ought to be mindful so as to not to give them away. The infection monitors toward the end client gadgets in the proposed arrangement can be refreshed with a very much planned arrangement.
There are such a large number of alternatives for this measure. The clients can utilize cloud arrangements, and sky drive also. Likewise, moving down to outside hard drives, and even committed equipment gadgets is an alternative that goes under this measure.
Figure 5: IPS
(Source: Farahani et al., 2014)
An Intruder Prevention System has been utilized as a part of the proposed organize arrangement of MEC. The IPS strategies and principles in the system has the capacity of anticipating interlopers assaulting to the system
Figure 6: IDS
(Source: Dowler et al., 2013)
The proposed answer for Middle East College contains an Intruder Detection System which is used to assists the system executive for detecting strange information movement in the system since it cautions the system chairman when such thing going ahead in the system.
Neglecting to secure switch design resembles sending programmers an encouragement to assault your system (Wang et al., 2014). It enables them to get into the system and view the points of interest and not just that; they even can take or crush the subtle elements also.
Giving access authorizations or as it were setting up security in the switches ought to be a fundamental element in a system execution prepare. Along these lines, it is critical to actualize port security for the ports of the switches, so regardless of the possibility that the interloper set up an alternate switch, he won’t be conceded to change anything in the system.
The router is required to be configured with access control list for denying the students from accessing the file server and the emails server and providing access of the email server to the staffs.
The protocol filtering is used for securing the network and filter the communication with different protocol such as UDP, ICMP, HTTP, etc. The protocol filtering helps to filter the network with some of the specified protocol and follow a rule for accessing the different resources of the network.
Demilitarized Zone (DMZ) can be configured in the Core layer of the network. It considers the data that comes from the internet and decides what should and should not be entering the network (Sánchez et al., 2013). This adds an extra protection to the proposed solution.
Summary and Conclusion
From the above report it can be concluded that different protocol filtering is such as ICP, UDP, ICMP and IGMP protocol is required to be used for development of the network. A DMZ protocol is required to be configured on the core layer of the network for giving permission to the data user requesting for the access of the resources of the network. The local area network is one of the systems administration that are broadly utilized as a part of a proficient way, in numerous associations on the network topology for the MEC network. This task truly distinguished its advantages by giving the chance to plan a system for a certifiable situation. It was genuinely a motivation for the change of the information with respect to systems administration. Outlining this system enticed to look more into the universe of various sorts of systems administration innovations and systems administration media too. By adapting more about system security, it gives the feeling of acknowledging system dangers and how to get ready for them also.
Altenbach, H., Eremeyev, V. A., & Naumenko, K. (2015). On the use of the first order shear deformation plate theory for the analysis of three?layer plates with thin soft core layer. ZAMM?Journal of Applied Mathematics and Mechanics/Zeitschrift für Angewandte Mathematik und Mechanik, 95(10), 1004-1011.
Carthern, C., Wilson, W., Bedwell, R., & Rivera, N. (2015). The Network Layer with IP. In Cisco Networks (pp. 49-68). Apress.
Dowler, P., Demleitner, M., Taylor, M., & Tody, D. (2013). Data access layer interface, version 1.0. IVOA Recommendation. URL: https://www. ivoa. net/documents/DALI.
Farahani, R.Z., Rezapour, S., Drezner, T. and Fallah, S., 2014. Competitive supply chain network design: An overview of classifications, models, solution techniques and applications. Omega, 45, pp.92-118.
Hinds, A., Atojoko, A., & Zhu, S. Y. (2013). Evaluation of OSPF and EIGRP routing protocols for ipv6. International Journal of Future Computer and Communication, 2(4), 287.
Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., … & Darrell, T. (2014, November). Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the 22nd ACM international conference on Multimedia (pp. 675-678). ACM.
Jo, J., Jang, H., Lee, K., & Kong, J. (2015). SDN-Based Intrusion Prevention System for Science DMZ. The Journal of Korean Institute of Communications and Information Sciences, 40(6), 1070-1080.
Kliazovich, D., Bouvry, P., & Khan, S. U. (2013). DENS: data center energy-efficient network-aware scheduling. Cluster computing, 16(1), 65-75.
Kumari, N., Sharma, E. B., & Saini, R. K. (2016). Comparative Study of RIPng and OSPFV3 with IPV6. International Journal, 6(9).
Morgan, W., Tam, R., Gerasimova, N., Gastauer, K., Rasgado, S., Einstein, K., … & Townsend, E. (2016). U.S. Patent Application No. 15/361,769.
Mulder, J., & Dekker, R. (2014). Methods for strategic liner shipping network design. European Journal of Operational Research, 235(2), 367-377.
Nanda, S., & Hansen, R. A. (2016, July). Forensics as a Service: Three-tier Architecture for Cloud based Forensic Analysis. In Parallel and Distributed Computing (ISPDC), 2016 15th International Symposium on (pp. 178-183). IEEE.
Özceylan, E., Paksoy, T. and Bekta?, T., 2014. Modeling and optimizing the integrated problem of closed-loop supply chain network design and disassembly line balancing. Transportation research part E: logistics and transportation review, 61, pp.142-164.
Rohrer, J. P., LaFever, B., & Beverly, R. (2016). Empirical Study of Router IPv6 Interface Address Distributions. IEEE Internet Computing, 20(4), 36-45.
Sánchez, A., Villarrubia, G., Zato, C., Rodríguez, S. and Chamoso, P., 2013. A gateway protocol based on FIPA-ACL for the new agent platform PANGEA. In Trends in Practical Applications of Agents and Multiagent Systems (pp. 41-51). Springer International Publishing.
Simmons, J. M. (2014). Optical network design and planning. Springer.
Sun, Y., & Schonfeld, P. (2015). Stochastic capacity expansion models for airport facilities. Transportation Research Part B: Methodological, 80, 1-18.
Wan, W. and Li, J., 2014, February. Investigation of state division in botnet detection model. In Advanced Communication Technology (ICACT), 2014 16th International Conference on (pp. 265-268). IEEE.
Wang, G., Gao, Z., Xu, M., & Sun, H. (2014). Joint link-based credit charging and road capacity improvement in continuous network design problem. Transportation Research Part A: Policy and Practice, 67, 1-14.
Xu, S., Qian, Y., & Hu, R. Q. (2015). On reliability of smart grid neighborhood area networks. IEEE Access, 3, 2352-2365.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download