1. Identification of the client needs
The needs of Moonlight Pty Ltd. that has been identified from the provided case study are presented as below:
2. Demonstrating support provided by the intranet
The intranet being designed reflects that there is interconnection between the different branches of the organization that are divided into subnetworks. The major network has been divided with the help of subnetting so that files or media can be shared between different departments in five branches of the organization. VoIP provides communication facilities so that voice can transmitted through internet as per requirement of users of the network for Moonlight Pty Ltd.
3. Number and types of workstations, file servers and other networking devices
Cisco Catalyst 2960 24 Port Layer 3 switch |
5 |
The switch is required to distribute the major network into different subnetworks. |
Acer Altos R720 Rackmount Servers |
2 |
The servers are required for information storage or backup as well as sharing the information. |
Cisco Catalyst 2811 Series Router |
1 |
The router is required for connecting different networks as well as packet forwarding. |
LaCie 2 TB 10/100/1000 Back-up Device |
2 |
This device is required for data backup and recovery. |
APC Back UPS RS |
2 |
This device is required to provide power backup to the device in case of power failure. |
Netgear WG302 Managed Wireless Access Point |
6 |
The wireless access point provides access to the network through mobile or wireless devices. |
Netgear GS108 Switch 8-port |
1 |
This switch is required as the Core switch through which the network will be distributed to different sub networks. |
Acer Verizon S480 including 17” LCD monitors |
2 |
The monitors are required so that the users can interact with the system. |
Cisco IP Phone |
2 |
The IP phone is required for voice facilities through the internet. |
Server Cabinets |
2 |
It is required as compartment to hold the components of a server. |
Cabling (Cat 6) |
n |
It will be used as the transmission media for the network. |
4. Name, cost and manufacturer of each device
Device |
Manufacturer |
Cost |
Quantity |
Total Cost |
Cisco Catalyst 2960 24 Port Layer 3 switch |
Cisco |
$7,943.00 |
5 |
$ 39,715.00 |
Acer Altos R720 Rackmount Servers |
Acer |
$3,233.00 |
2 |
$ 6,466.00 |
Cisco Catalyst 2811 Series Router |
Cisco |
$8,500.00 |
1 |
$ 8,500.00 |
LaCie 2 TB 10/100/1000 Back-up Device |
LaCie |
659 |
2 |
$ 1,318.00 |
APC Back UPS RS |
APC |
202 |
2 |
$ 404.00 |
Netgear WG302 Managed Wireless Access Point |
Netgear |
1500 |
6 |
$ 9,000.00 |
Netgear GS108 Switch 8-port |
Netgear |
159 |
1 |
$ 159.00 |
Acer Verizon S480 including 17” LCD monitors |
Acer |
760 |
2 |
$ 1,520.00 |
Cisco IP Phone |
Cisco |
312 |
2 |
$ 624.00 |
Server Cabinets |
Cisco |
1400 |
2 |
$ 2,800.00 |
Cabling (Cat 6) |
Ibiza Store |
n |
$ 2,000.00 |
|
Sub total |
$ 72,506.00 |
The devices that has been chosen for implementation of the network are the best possible solution for the needs of Moonlight Pty Ltd. The devices being presented above will help to meet the demands of the employees within the organization by providing support for voice, video and data sharing through the network.
5. Type and number of IP addresses assigned to each network
The IP addressing that has been decided for implementing the network of Moonlight Pty Ltd is presented as below:
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
Adelaide |
127 |
254 |
10.10.8.0 |
/24 |
255.255.255.0 |
10.10.8.1 – 10.10.8.254 |
10.10.8.255 |
Canberra |
100 |
126 |
10.10.9.0 |
/25 |
255.255.255.128 |
10.10.9.1 – 10.10.9.126 |
10.10.9.127 |
Sydney |
80 |
126 |
10.10.9.128 |
/25 |
255.255.255.128 |
10.10.9.129 – 10.10.9.254 |
10.10.9.255 |
Melbourne |
25 |
30 |
10.10.10.0 |
/27 |
255.255.255.224 |
10.10.10.1 – 10.10.10.30 |
10.10.10.31 |
Perth |
18 |
30 |
10.10.10.32 |
/27 |
255.255.255.224 |
10.10.10.33 – 10.10.10.62 |
10.10.10.63 |
The IP addressing has been done with the help of subnetting and each subnetwork for the different branches has been done with the help of following mechanism:
Major Network: 10.10.8.0/22
Available IP addresses in major network: 1022
Number of IP addresses needed: 350
Available IP addresses in allocated subnets: 566
About 56% of available major network address space is used
About 62% of subnetted network address space is used
The VLSM technique has been applied to divide the subnetwork for the five branches of Moonlight Pty Ltd. The VLSM is denoted as Variable Length Subnet Masking which is a technique for dividing an IP address space to different subnets with different sizes like subnetting of simple networks.
6. Interconnection between devices and each subnetwork
The intranet is divided into different subnets to separate the distribution of IP addresses for each device in the network. The devices in each subnetwork is connected through the switch and router that distributes the network for five branches of the organization. The four subnetworks are interconnected with the help of Core switch that acts as a medium for connecting different branches of the organization.
7. Hierarchical Model and justifications
The hierarchical model in context to the Moonlight Pty Ltd has been prepared to support the needs of the client. The designed model is presented as below: The hierarchical model has been designed to separate the subnetworks for all the five branches of Moonlight Pty Ltd that is Canberra, Adelaide, Sydney, Perth and Melbourne. The division of the subnetwork has to been done with the help of distribution switch. A wireless router is connected to the distribution switch to provide intercommunication between the different branches of the organization. The subnet masking has been done to divide the network for the five branches so that the network becomes more stable and efficient.
8. Software applications installed on each part and entire intranet The software applications that will be installed on each part and entire intranet are listed as below:
Software |
Vendor |
Cost |
Quantity |
Total Cost |
Microsoft Windows Server Enterprise 2012 |
Microsoft |
1000 |
2 |
$2,000.00 |
Microsoft Office 2016 |
Microsoft |
51 |
2 |
$102.00 |
3CX VoIP application |
VoIP Provider |
16 |
2 |
$32.00 |
Symantec End User Protection |
Soft Licensing |
1109 |
2 |
$2,218.00 |
Internet Plan (including ISP provided Router) |
Telstra |
3720 |
1 |
$3,720.00 |
|
||||
Sub Total |
|
|
|
$ 8,072.00 |
The justifications for installation of the identified software application is described as below:
Software |
Justification |
Microsoft Windows Server Enterprise 2012 |
This software is required as it is the operating system that is required operating servers. The application will help to provide a centralized system for the users of the network. |
Microsoft Office 2016 |
This software application will fulfill requirements of the system so that the users can perform the business activities easily. The MS Office application also supports the mailing services in which Outlook can be used to manage the mailing system and the files sharing can be easily carried out. |
3CX VoIP application |
This software application is essential for operating the VoIP means the IP phones that will help to meet the voice, video and data needs of the client. This software application will help to connect the client to a VoIP Provider for making calls to any mobile or landline number. |
Symantec End User Protection |
This software application is a security tool that will installed for the entire intranet so that intrusion detection and prevention can be carried out easily. This software application will provide protection from virus or vulnerabilities that may have impact on the network. |
Internet Plan (including ISP provided Router) |
This is not a software application to brief but it is an essential requirement for Moonlight Pty Ltd as it will provide internet services to the different branches of the organization. Telstra has been chosen as the suitable ISP to cater needs of the organization as it is provides services nationwide and provides internet through DSL, NBN, Cable, Mobile and Satellite networks. |
9. Security mechanisms implemented on the network
The security measures that have to be implemented on the designed network for Moonlight Pty Ltd are discussed as below:
Restrictions for guests: A separate network has to be designed so that the guests or intruders cannot gain access to the main network. The intruder’s access to the main network may lead to theft of information or confidential data. Hence, a separate guest network will be designed for external users so that they cannot gain access to the main network.
Authentication of User: Proper authentication measures will be implemented for the network so that unauthorized users are not able to access the network. The users will be provided with unique credentials to login into the network and perform required operations.
Naming of the Network: Each wireless network have to be named so that checking of client’s connectivity can be easily monitored. Whenever a client attempts to access the network through a wireless access point, the name of the network is checked and then only authentication is requested from the users otherwise the connectivity is rejected.
Wired Equivalent Privacy: This method provides data encryption facilities by using 40-bit or 128-bit algorithms for encryption. A shared key method is being utilized by this method for WEP implementation where a password is created then installation will be carried out on every wireless device as well as access point.
Firewalls/VPN: The installation of firewalls is essential for maintaining security of networks. The firewall will help to prevent intrusion from outsiders and provide virus protection so that the information does not gets corrupted or there is occurrence of information theft.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download