Executive Summary
This report cover the Australian data analytic company that requires the assessment of the current network so that it can be re-designed in order to accommodate the newly opened braches which need new equipments.
The main purpose of this project is to design the network, allocate IP addresses to the various subnets, and calculate the expected budget to implement the entire network.
This project has a large scope where it involves the sub-netting of the proposed network branches by assigning respective IP addresses, identification of the hardware devices to be used, approximation of the network budget and analyzing the various cloud computing proposals and through this the management will be able to identify the best way to implement the network.
This project had been carried out in order to achieve some set objectives by the company which includes the following:
- Enable the company have internet access.
- To enable the company wide local area network to have wireless access.
- To enable the share the database facilities.
- To enable the company have the web services to the users.
- To enable the network users back up their information.
- To enable the company to make use of the cloud based services in their operations.
The below table shows the number of the IP addresses that are required in the various network subnets where each location is allocated the IP addresses depending on the number of work stations.
Location |
Workstations |
WLAN addresses |
LAN ADDRESSES |
Sydney |
400×2=800 |
30 |
800 |
Melbourne |
70 x2=140 |
14 |
140 |
Brisbane |
150 x2=300 |
14 |
300 |
Canberra |
50 x2=100 |
– |
100 |
Adelaide |
80 x2=160 |
– |
160 |
Hobart |
15 x2=30 |
– |
30 |
3.1 Sub-netting
The network sub-netting is done to assign the various locations their IP addresses, in this case the class B IP address 128.1.0.0/20 is used to assign the IP addresses accordingly and this is obtained through the calculations of the IP addresses subnet masks (Andrew 2015) , broadcast addresses and the address range where the addresses assigned will allow the future expansion of the network as below.
3.1.1 Sydney branch
This branch will be having 800 workstations on the LAN, 30 IP addresses in the WLAN which make a total of 830 therefore.
There are 830hosts therefore
Number of Hosts = 830
2x = (830 + 4).
210 = (1024> 834)
Network bits = 32 – 10 = 22
Network IP-Address = 128.1.0.0 /22
Broadcast IP-Address: – 128.1.3.255
Subnets mask = 255.255.252.0
Range IP address = 128.1.0.1- 128.1.3.254
3.1.1.1 Sydney branch LAN subnet
There are 800 hosts therefore
Number of Hosts = 800
2x = (800 + 2).
210 = (1024> 802)
Network bits = 32 – 10 = 22
Network IP-Address = 128.1.0.0 /22
Broadcast IP-Address: – 128.1.3.38
Range IP address = 128.1.0.1-128.1.3.37
Subnets mask = 255.255.252.0
3.1.1.2 Sydney branch WAN subnet
There are 30 hosts therefore
Number of Hosts = 30
2x = (30 + 2).
210 = (1024> 32)
Network bits = 32 – 10 = 22
Network IP-Address = 128.1.3.39/22
Broadcast IP-Address: – 128.1.3.72
Subnets mask = 255.255.252.0
Range IP address =128.1.3.40-128.1.3.71 (Behrouz 2016).
Network Diagram
3.1.2 Melbourne branch
This branch will be having 140 workstations on the LAN and 14 IP addresses in the WLAN which make a total of 154 therefore.
There are 154 hosts therefore
Number of Hosts = 154
2x = (154 + 2).
28 = (256> 156)
Network bits = 32 – 8 = 24
Network IP-Address = 128.1.4.0 /24
Broadcast IP-Address: – 128.1.4.255
Subnets mask = 255.255.255.0
Range IP address =128.1.4.1-128.1.4.254
3.1.2.1 Melbourne branch LAN subnet
There are 140 hosts therefore
Number of Hosts = 140
2x = (140 + 2).
28 = (256> 142)
Network bits = 32 – 8 = 24
Network IP-Address = 128.1.4.0 /24
Broadcast IP-Address: – 128.1.4.141
Range IP address =128.1.4.1 -128.1.4.140
Subnets mask = 255.255.255.0
3.1.2.2 Melbourne branch WAN subnet
There are 14 hosts therefore
Number of Hosts = 14
2x = (14 + 2).
28 = (256> 16)
Network bits = 32 – 8 = 24
Network IP-Address = 128.1.4.142 /24
Broadcast IP-Address: – 128.1.4.160
Range IP address =128.1.4.143-128.1.4.159
Subnets mask = 255.255.255.0
3.1.3 Brisbane branch
This branch will be having 300 workstations on the LAN and 14 IP addresses in the WLAN which make a total of 314 therefore.
There are 316 hosts therefore
Number of Hosts = 316
2x = (316 + 2).
29 = (512> 318)
Network bits = 32 – 9 = 23
Network IP-Address = 128.1.6.0/23
Broadcast IP-Address: – 128.1.7.255
Range IP address = 128.1.6.1- 128.1.7.254
Subnets mask = 255.255.254.
3.1.3.1 Brisbane branch LAN subnet
There are 300 hosts therefore
Number of Hosts = 300
2x = (300 + 2).
29 = (512> 302)
Network bits = 32 – 9 = 23
Network IP-Address = 128.1.6.0/23
Broadcast IP-Address: – 128.1.7.46
Range IP address = 128.1.6.1- 128.1.7.45
Subnets mask = 255.255.254.0
3.1.3.2 Brisbane branch WAN subnet
There are 14 hosts therefore
Number of Hosts = 14
2x = (14 + 2).
29 = (512> 16)
Network bits = 32 – 9 = 23
Network IP-Address = 128.1.7.47/23
Broadcast IP-Address: – 128.1.7.62
Range IP address = 128.1.7.48- 128.1.7.61
Subnets mask = 255.255.254.0
3.1.4 Canberra branch
3.1.4.1 Canberra branch LAN subnet
There are 100 hosts therefore
Number of Hosts = 100
2x = (100 + 2).
27 = (128> 102)
Network bits = 32 – 7 = 25
Network IP-Address = 128.1.8.0 /25
Broadcast IP-Address: – 128.1.8.101
Subnets mask = 255.255.255.128
Range IP address =128.1.8.1- 128.1.8.100
3.1.5 Adelaide branch
3.1.5.1 Adelaide branch LAN subnet
There are 160 hosts therefore
Number of Hosts = 160
2x = (80 + 2).
28 = (256> 160)
Network bits = 32 – 8 = 24
Network IP-Address = 128.1.9.0 /24
Sub-netting the Network and Assigning IP Addresses to Devices
Broadcast IP-Address: – 128.1.9.127
Subnets mask = 255.255.255.128
Range IP address =128.1.9.1- 128.1.9.160
3.1.6 Hobart branch
3.1.6.1 Hobart branch LAN subnet
There are 30 hosts therefore
Number of Hosts = 32
2x = (32 + 2).
26 = (64> 34)
Network bits = 32 – 6= 26
Network IP-Address = 128.1.10.0/26
Broadcast IP-Address: – 128.1.10.35
Range IP address = 128.1.10.1- 128.1.10.34
Subnets mask = 255.255.255.192
Table 1 Subnets (WAN and LAN subnets)
Subnet name |
subnet address |
subnet mask |
first useable address |
last useable address |
broadcast address |
static address range |
DHCP address range |
Sydney LAN |
128.1.0.0 |
/22 |
128.1.0.1 |
128.1.3.37 |
128.1.3.38 |
128.1.0.1-128.1.0.2 |
128.1.0.3-128.1.3.37 |
Sydney WAN |
128.1.3.39 |
/22 |
128.1.3.40 |
128.1.3.71 |
128.1.3.72 |
128.1.3.40-128.1.2.41 |
128.1.2.42-128.1.2.71 |
Melbourne LAN |
128.1.4.0 |
/24 |
128.1.4.1 |
128.1.4.140 |
128.1.4.141 |
128.1.4.1-128.1.4.2 |
128.1.4.3-128.1.4.140 |
Melbourne WAN |
128.1.4.142 |
/24 |
128.1.4.143 |
128.1.4.159 |
128.1.4.160 |
128.1.5.1-128.1.5.2 |
128.1.5.3-128.1.5.159 |
Brisbane LAN |
128.1.6.0 |
/23 |
128.1.6.1 |
128.1.7.45 |
128.1.7.46 |
128.1.7.1-128.1.7.2 |
128.1.6.3-128.1.7.45 |
Brisbane WAN |
128.1.7.47 |
/23 |
128.1.7.48 |
128.1.7.61 |
128.1.7.62 |
128.1.7.48-128.1.7.49 |
128.1.7.50-128.1.7.61 |
Canberra LAN |
128.1.8.0 |
/25 |
128.1.8.1 |
128.1.8.100 |
128.1.8.101 |
128.1.8.1-128.1.8.2 |
128.1.8.3-128.1.8.100 |
Adelaide LAN |
128.1.9.0 |
/24 |
128.1.9.1 |
128.1.9.160 |
128.1.9.161 |
128.1.9.1-128.1.9.2 |
128.1.9.3-128.1.9.160 |
Hobart LAN |
128.1.10.0 |
/26 |
128.1.10.1 |
128.1.10.34 |
128.1.10.35 |
128.1.10.1-128.1.10.2 |
128.1.10.3-128.1.10.36 |
(Douglas 2017).
Table 2 Router interfaces.
Location |
interface |
IP address |
subnet mask |
Sydney |
Fa1/1 |
128.1.0.1 |
/22 |
Sydney |
Fa0/1 |
128.1.3.40 |
/22 |
Sydney |
Fa1/2 |
128.1.11.1 |
/28 |
Sydney |
Fa1/3 |
128.1.13.1 |
/28 |
Sydney |
Fa1/4 |
128.1.14.1 |
/28 |
Sydney |
Fa1/5 |
128.1.15.1 |
/28 |
Sydney |
Fa1/6 |
128.1.16.1 |
/28 |
Melbourne |
Fa1/1 |
128.1.4.1 |
/24 |
Melbourne |
Fa0/1 |
128.1.4.143 |
/24 |
Melbourne |
Fa1/2 |
128.1.13.2 |
/28 |
Melbourne |
Fa1/3 |
128.1.17.1 |
/28 |
Melbourne |
Fa1/4 |
128.1.18.1 |
/28 |
Melbourne |
Fa1/5 |
128.1.19.1 |
/28 |
Brisbane |
Fa0/1 |
128.1.6.1 |
/23 |
Brisbane |
Fa1/1 |
128.1.7.48 |
/23 |
Brisbane |
Fa1/2 |
128.1.14.2 |
/28 |
Canberra |
Fa0/1 |
128.1.8.1 |
/25 |
Canberra |
Fa1/1 |
128.1.15.2 |
/28 |
Canberra |
Fa1/2 |
128.1.17.2 |
/28 |
Adelaide |
Fa0/1 |
128.1.9.1 |
/24 |
Adelaide |
Fa1/1 |
128.1.18.2 |
/28 |
Hobart |
Fa0/1 |
128.1.10.1 |
/26 |
Hobart |
Fa1/1 |
128.1.12.0 |
/28 |
Hobart |
Fa1/2 |
128.1.19.2 |
/28 |
(Forouzan 2014).
Table 3 Servers
Location |
server name |
IP address |
subnet mask |
Sydney |
Web server |
128.1.11.2 |
/28 |
Sydney |
DB server |
128.1.11.2 |
/28 |
Hobart |
Back-up server1 |
128.1.12.1 |
/28 |
Hobart |
Back-up server2 |
128.1.12.2 |
/28 |
Hobart |
Back-up server3 |
128.1.12.3 |
/28 |
4.1 Executive summary
In the network implementation there are various items that will be used in the network connection and this will be obtained through the procurement plan which has the following goals.
- To ensure all the selected devices are able to accommodate all the workstations in the entire network.
- To ensure that all the devices are able to offer good and quality services to the users.
- To ensure all the devices selected will be acquired within the set budget of $10000.
4.2 Weighted Decision Matrix – hardware resource requirements analysis
4.2.0.1 Matrix attributes justification.
In the analysis and selection of the required network hardware which includes the switch, router and wireless access devices the following attributes are used to weigh their priorities in selection process.
- This attribute will be used to measure the ease of use and installation in the network and it will have 20%.
- This will be used to test how efficient the device is in the network without having downtime and it will have 20%.
- Number of ports. This will measure the number of ports or connections that a device will support for current use or future growth and will weigh 10%.
- This attribute will be used to measure how long can the device be used in the network without replacement and will weigh 20%.
- This attribute will be used to measure the acquisition price of the device and it will weigh 30%.
4.2.0.2 Weighted Decision Matrix
- Router WDM
Routers Weighted Decision Matrix |
||||||
Device type and scores |
||||||
Attribute |
Weight (%) |
Cisco-2901 |
Cisco-2911 |
Cisco- CGR1240 |
Cisco- 2620XM |
Cisco-2621XM |
Feasibility |
20 |
12 |
14 |
19 |
17 |
20 |
Efficiency |
20 |
17 |
15 |
17 |
18 |
19 |
Ports |
10 |
9 |
10 |
10 |
10 |
10 |
Durability |
17 |
17 |
19 |
17 |
15 |
20 |
Cost |
24 |
28 |
29 |
27 |
29 |
25 |
TOTAL SCORE |
91 |
83 |
87 |
90 |
89 |
94 |
(Tom 2015).
Switches WDM
Switch Weighted Decision Matrix |
||||||
Device type and scores |
||||||
Attribute |
Weight (%) |
Cisco- 2960-24TT |
Cisco-2950-24 |
Cisco- 2950T-24 |
Cisco- 3560-24PS |
Cisco- 3650-24PS |
Feasibility |
20 |
19 |
14 |
15 |
17 |
15 |
Efficiency |
15 |
20 |
15 |
17 |
18 |
19 |
Ports |
10 |
10 |
10 |
10 |
10 |
10 |
Durability |
17 |
18 |
19 |
17 |
15 |
18 |
Cost |
24 |
25 |
29 |
27 |
29 |
25 |
TOTAL SCORE |
86 |
92 |
87 |
86 |
89 |
87 |
Wireless access devices WDM.
Wireless access devices Weighted Decision Matrix |
||||||
Device type and scores |
||||||
Attribute |
Weight (%) |
Cisco-WRT300N |
Cisco-3702i |
Cisco-WLC-2504 |
Cisco-WLC-PT |
Cisco-DLC100 |
Feasibility |
20 |
17 |
14 |
19 |
17 |
15 |
Efficiency |
15 |
19 |
15 |
19 |
18 |
16 |
Ports |
10 |
10 |
10 |
10 |
10 |
10 |
Durability |
17 |
1 |
19 |
19 |
15 |
18 |
Cost |
26 |
25 |
29 |
25 |
29 |
27 |
TOTAL SCORE |
88 |
72 |
87 |
92 |
89 |
86 |
Budget
HARDWARE NAME |
TYPE |
UNITS |
UNIT COST |
TOTAL COST |
Router |
Cisco-2621XM |
7 |
261 |
1827 |
Switch |
Cisco-2960-24TT |
41 |
170 |
6970 |
Wireless access device |
Cisco-WLC-2504 |
3 |
401 |
1203 |
10000 |
In this organization the management propose to adopt the cloud computing service where their services will be managed in the cloud facilities in order to enhance the security and the operational costs, there are three options that are highlighted in this proposal as follows.
5.1 Using desktop Environment provided by a Cloud service provider (such as Amazon)
In this case there are some advantages where the workstation in the organization will be replaced and replaced with thin clients which will minimize the cost of the hardware and services ,below is a table indicating the cost of the using the cloud service provider.
- cost
Device required |
units |
Unit Hardware and service cost |
Electricity cost |
Total cost |
Virtual –machines |
765 |
$589.59 |
0 |
$451,036.35 |
In terms of the security there will be enough security for the items that are stored in the vendor’s server but the only challenge other people can also access the company’s information especially the vendor’s staffs which can cause some security threat to the company data (William 2014).
5.2 Using desktop environment provided by a private cloud infrastructure based in Sydney
In this second option the company should replace all the workstations in the entire network and use the private cloud infrastructure where the desktop environment will be located in Sydney and the users can access the information from there.
- Cost
Below is the cost summary of using this option.
Device name |
units |
Unit Hardware and service cost |
Electricity cost |
Total cost |
Virtual –Machines |
765 |
$108.0 |
0 |
$82,620 |
Workstations |
1 |
$850 |
230 kWh per year |
$850 |
OVERALL COST |
$83,470 |
- Security
This option of adopting the private cloud service provider to set up a desktop environment in Sydney branch has more security since the management has direct control of the sensitive information and therefore it is more recommendable in terms of security.
5.3 Continuing to use workstations
The other option is to continue making use of the workstations in the network, where each workstation has its cost and power consumption expense as in the table below.
Device required |
units |
Unit Hardware and service cost |
Electricity units |
Total cost |
Workstations |
765 |
$850 |
230×765 kWh |
$650,250 |
OVERALL COST |
$650,250 |
Using the current network there is enough security and the company management has full control of their information without interference from the third party.
After analyzing the three major options to adopt I recommend the company to adopt the second option, this is because the operation cost will highly reduce and the power consumption will be reduced to almost zero, however this option is more secure since the company will be able to have direct access to the information since the desktop environment will be in-housed at Sydney branch
Reference
Andrew, S. (2015) Computer Networks.2nd edn. New York: Prentice Hall.
Behrouz ,A.(2016) Data Communication and Networking. 4th edn.New York: McGraw-Hill Education.
Douglas,C.(2017) Internetworking with TCP/IP, Volume1.1st edn.California: Addison-Wesley Professional.
Forouzan,I.(2014) Computer Networks: A Top – Down Approach.5th edn.New York: McGraw-Hill.
Tom ,C.(2015) IPv6 Address Planning: Designing an Address Plan for the Future.3rd edn. San Francisco: O’Reilly Media.
William,S.(2014) Data and Computer Communication. 2nd edn. New Delhi: Tata McGraw Hill.