Description of the Campuses and Departments
The following report reflects on ABC which is an American institute of technology. This particular organization has moved to Canberra. ABC has come up with two medium size of campuses which is mainly located in Canberra. The distance between the two campus is around 2.5 km. The first campus is of dimension 1800 meters in length and 1200 metres in width. The second kind of campus is of dimension 1300 metres in length to 700 meters in width. The first kinds of campus consist of four blocks for buildings and three colleges that is IT, physics and chemistry in addition to library. The second campus has three blocks that is administrative office, business college and a library.
In the coming pages of the report an idea has been provided regarding description of proposal for the given project. After that an analysis has been done regarding the various kinds of requirements of the network diagram. A proper kind of analysis has been done with respect to the given network diagram. A proper kind of table has been provided with respect to design of IP address. A proper network topology diagram has been provided for this ABC institute. In the end of the report a brief analysis has been done on the various kinds of hardware and software which are used for the network diagram.
Discussion
Proposal description and requirements
ABC is a well-known American institute of technology that has moved to Canberra. The institutes need to stay in use with latest kind of technology that is mainly available for use. In every kind of login, users’ needs to focus on various honor of code policy. If anyhow user is violated from downloading of any kind of content like inappropriate material, then the suggested name can be easily used for identification of various kinds of users and followed by reporting him to office of admin.
A DHCP server is mainly required for assigning IP address dynamically to large number of users which is mainly inclusive of various kinds of guest users. The fact can be easily understood that guest user does not get any kind of authentication before proper kind of login. A proper kind of authentication system and network design is mainly used for developing for maintaining the security of ABC network.
Analysis of network design
The following institute that is ABC has developed two medium size organization which are located in Canberra. The distance between two campus is about 2.5 km. The dimension of first campus is about 1800 meters in length to 1200 meters in width. The dimension of second campus is around 1300 meters in length and 700 meters in breadth. The first campus comes up four block for three kind of available college (IT, physics and chemistry) along with a library. While the second kind of block comes up with three kinds of blocks for administration office, library and business college. A proper kind of DHCP server is mainly used for assigning IP address dynamically to large number of users that is inclusive of guest users.
Analysis of the Network Design
The fact can be easily understood that guest user does not need any kind of authentication before the login. A proper kind of authentication system and design of network needs to be developed for providing security to ABC network. Currently, this organization consist of 650 IT students, 330 students in physics department, 100 students in business department. Apart from this there are 250 staff members in administration department. So for the requirements of various members of ABC institute a proper kind of network diagram has been provided.
Network Topology diagram
The network diagram of ABC institute has been prepared by the help of well k known networking software that is Packet Tracer. The network infrastructure of ABC institute requires five routers that one of which is central router and under it four other routers are connected. A switch is used for establishing connection with the other kind of associated system.
A router can be easily defined as a kind of network device which is used establishing proper kind of connection with two are more kind of network which is mainly used for establishing connection with one or more network. It comes up with various kinds of software which is used for changing data from one particular location to another. Switch is defined to be a proper kind of bridge which is used for establishing connection between the various data link layer which is provided in the OSI layer. A firewall can be easily defined as a kind of protective layer of barrier between PC and cyber world. A firewall can be easily categorizing into types that is hardware and software.
A hardware firewall can be easily stated router or any kind of security product which is mainly placed between PC and outside the world. In a network more than one kind of PC can be easily used for establishing connection with security and router and each of this device will be mainly protected by the firewall. A software firewall is mainly installed in the given device. It will deflect the various kinds of incoming attacks along with hidden ports.
IP addressing Schema
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
IT |
650 |
1022 |
172.168.0.0 |
/22 |
255.255.252.0 |
172.168.0.1 – 172.168.3.254 |
172.168.3.255 |
Physics |
330 |
510 |
172.168.4.0 |
/23 |
255.255.254.0 |
172.168.4.1 – 172.168.5.254 |
172.168.5.255 |
Admin |
250 |
254 |
172.168.6.0 |
/24 |
255.255.255.0 |
172.168.6.1 – 172.168.6.254 |
172.168.6.255 |
Chemistry |
200 |
254 |
172.168.7.0 |
/24 |
255.255.255.0 |
172.168.7.1 – 172.168.7.254 |
172.168.7.255 |
Business |
100 |
126 |
172.168.8.0 |
/25 |
255.255.255.128 |
172.168.8.1 – 172.168.8.126 |
172.168.8.127 |
Admin-Business |
2 |
2 |
172.168.8.128 |
/30 |
255.255.255.252 |
172.168.8.129 – 172.168.8.130 |
172.168.8.131 |
Admin-Chemistry |
2 |
2 |
172.168.8.132 |
/30 |
255.255.255.252 |
172.168.8.133 – 172.168.8.134 |
172.168.8.135 |
Admin-IT |
2 |
2 |
172.168.8.136 |
/30 |
255.255.255.252 |
172.168.8.137 – 172.168.8.138 |
172.168.8.139 |
Admin-Physics |
2 |
2 |
172.168.8.140 |
/30 |
255.255.255.252 |
172.168.8.141 – 172.168.8.142 |
172.168.8.143 |
IT branch Router
Needed Size – 650
Allocated – 1022
Address range – 172.168.0.1 – 172.168.3.254
Mask – 255.255.252.0
Broadcast Address – 172.168.3.255
Physic Department Router
Needed Size – 330
Allocated – 510
Address range – 172.168.4.1 – 172.168.5.254
Mask – 255.255.255.0
Design of IP Address
Broadcast Address – 172.168.5.255
Administrative Department Router
Needed Size – 250
Allocated – 254
Address range – 172.168.6.1 – 172.168.6.254
Mask – 255.255.254.0
Broadcast Address – 172.168.6.255
Chemistry Department Router
Needed Size – 200
Allocated – 254
Address range – 172.168.7.1 – 172.168.7.254
Mask – 255.255.255.0
Broadcast Address – 172.168.7.255
Business Router
Needed Size – 100
Allocated – 126
Address range – 172.168.8.1 – 172.168.8.126
Mask – 255.255.255.128
Broadcast Address – 172.168.8.127
Analysis of hardware and software
Hardware Requirement –
Router – Cisco 2811 Router
Features –
- Two Integrated 10/100 Fast Ethernet ports
- Support of up to 1500 VPN tunnels with the AIM-EPII-PLUS Module
- Voice call support
- IOS firewall support
- Support for majority of existing AIMs, NMs, WICs, VWICs, and VICs
Switch – Cisco 2960-24TT switch
Features –
- 24 Ethernet 10/100 ports
- 32 Gbps Switching Bandwidth
- 2 Ethernet 10/100/1000 ports Uplinks
- DRAM 64 MB
- LAN Base Layer 2 Model
Conclusion
From the above discussion it can be easily concluded that this report is all about ABC which is American institute of technology. At present the organization has moved to Canberra. The fact can be easily understood that ABC would like to be stay in use for use of internet in latest wireless technology. All the given kind of users can easily make use of mobile device and wireless technology. Only the fact needs to expect for large number of administrative users as they can easily be used in both the given technology that is wired and wireless.
A DHCP server has been provided which is used for assigning IP addresses to large number of users. It can be easily understood that various kinds of guest users do not to get any kind of authentication before any kind of login. At present the number of students in each of the college in IT department is 60, physics 330, chemistry -200 and lastly 200 students in business. Apart from this it comes up with 250 staff for administration.
References
[1] Biswas, S., Bicket, J., Wong, E., Musaloiu-e, R., Bhartia, A. and Aguayo, D. Large-scale measurements of wireless network behavior. In ACM SIGCOMM Computer Communication Review (Vol. 45, No. 4, pp. 153-165). ACM, 2015, August.
[2] Ermakov, S.A., Zavorykin, A.S., Kolenbet, N.S., Ostapenko, A.G. and Kalashnikov, A.O. Optimization of expert methods used to analyze information security risk in modern wireless networks. Life Science Journal, 11(10), p.511, 2014.
[3] Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D. Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), pp.2481-2501, 2014.
[4] Liang, C. and Yu, F.R. Wireless network virtualization: A survey, some research issues and challenges. IEEE Communications Surveys & Tutorials, 17(1), pp.358-380, 2015.
[5] Rodríguez, L.J., Tran, N.H., Duong, T.Q., Le-Ngoc, T., Elkashlan, M. and Shetty, S. Physical layer security in wireless cooperative relay networks: State of the art and beyond. IEEE Communications Magazine, 53(12), pp.32-39, 2015.
[6] Tsang, K.F., Gidlund, M. and Åkerberg, J. Guest editorial industrial wireless networks: Applications, challenges, and future directions. IEEE Transactions on Industrial Informatics, 12(2), pp.755-757, 2016.
[7] Turland, J., Coventry, L., Jeske, D., Briggs, P. and van Moorsel, A. Nudging towards security: Developing an application for wireless network selection for android phones. In Proceedings of the 2015 British HCI conference(pp. 193-201). ACM, 2015, July.
[8] Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J. and Di Renzo, M. Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4), pp.20-27, 2015.
[9] Zou, Y., Zhu, J., Wang, X. and Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), pp.1727-1765, 2016.
[10] Zou, Y., Zhu, J., Wang, X. and Leung, V.C. Improving physical-layer security in wireless communications using diversity techniques. IEEE Network, 29(1), pp.42-48, 2015.