Questions -
Q1. Design a network for an SME. You need to consider that this SME has at least two main branches at different cities in Australia, and servicing customers across Internet from anywhere in the world.
Q2. Build VPN services for the users. The network solution would be built on a simulator (such as Packet Tracer or NetSim) and include establishing a VPN from remote site to main branch in a city in Australia.
ORDER NEW VPN NETWORK DESIGN ASSIGNMENT & GET 100% ORIGINAL SOLUTION AND QUALITY WRITTEN CONTENTS IN WELL FORMATS AND PROPER REFERENCING.
Answer -
Introduction
Car and General leads in the distribution of laundry equipment, generators, tuktuks, motor bikes, lawn mowers, huge range of power generators, automotive products, engineering products and marine engines in Australia. This SME Company is headquartered in Melbourne and with another branch in Brisbane. The company has an average employee 100 employees evenly distributed between the two branches
Scopes and Limitations
Car and General being in the market like any other company, they have realized that they cannot continue working without the aid of IT infrastructure. IT Infrastructure services have become key elements in the running business activities. Such IT Infrastructure services include but are not limited to VPN, email, print, dns, dhcp, voip, internet access, file sharing and storage and content management system. It should be noted that employees from Brisbane branch would want to access network resources at Melbourne - headquarter. The only secure way to access this is through the deployment of VPN.
In this task, we are going to develop a network system which IT infrastructure resources such as applications will accessed from one branch to another remotely.
Requirements (Network parts and VPN service parts)
A hardware requirement denotes to hardware material that are needed in the project implementation. Below are our hardware project requirements (Koelsch, 2016).
Hardware component name
|
Quantity Required
|
Switch
|
2
|
UTP Cables
|
10 boxes (305m each)
|
Router
|
2
|
Patch panel
|
1-48 port patch panel
|
Wireless access-point
|
Cisco Systems
|
Cabinet
|
1
|
RJ-45
|
10 - 100 pack
|
Face wall plate
|
1000
|
Server
|
3
|
Desktops
|
80
|
GET GUARANTEED SATISFACTION OR MONEY BACK UNDER VPN NETWORK DESIGN ASSIGNMENT HELP SERVICES OF EXPERTSMINDS.COM - ORDER TODAY NEW COPY OF THIS ASSIGNMENT!
Solution Design
Logical Design
A logical network denotes to the virtual representation network which appears to the as wholly separate and self - contained network. This could be a portion of the entire network or a local area network. The logical design primarily shows how data flows in a networked system. Furthermore, it shows the IP addressing and the naming scheme used in a network design (Cain, Luescher, & Flynn, 2015). Below is our logical network diagram for Car and General Company.
Note that this a logical diagram and not all of the components are shown. We use 1 pc in each branch to represent a number of PCs that exist on that branch. More so, this diagram is used to bring out the VPN implementation.
Physical Design
Physical design refers to the actual arrangement network devices which are connected to a specified network. This includes the cables used and the location of the network. The figure below displays the physical layout of our network design.
Network Topologies
Network topologies refer to the pattern by which the computer workstations, printers, routers are connected to the Local Area network. Sample network topologies include bus, star, mesh and ring topologies. In our network design, we are going to implement star topology. In star topology, computing devices are connected to a central device which could be a switch, hub or even a router. For our case, the central device will be the switch. Below is sample star topology diagram
DO WANT TO HIRE TUTOR FOR ORIGINAL VPN NETWORK DESIGN ASSIGNMENT SOLUTION? AVAIL QUALITY XXXX ASSIGNMENT WRITING SERVICE AT BEST RATES!
IP addressing
IP addressing refer to the assignment of IP address, subnet mask, dns address and the default gateway to a computing device. This can either be done through dynamic address assignment or static IP assignment. Dynamic IP assignment involves deployment of dhcp server which issues IP addresses and other parameters to a computing device. For static IP address assignment, the systems administrator is required to issue IP address together with other devices manually. This technique is so tedious (Bianco & Neri, 2013).
Assuming that we have been provided an IP address of 192.168.97.0/21 by our ISP, our network will be subnetted as below:
Region name
|
Hosts Required
|
IP addresses Allocated
|
IP addresses reserved
|
Network Address
|
Slash
|
Mask
|
Valid IP address Range
|
Broadcast
|
Wildcard
|
Brisbane
|
100
|
126
|
26
|
192.168.1.0
|
/25
|
255.255.255.128
|
192.168.1.1 - 192.168.1.126
|
192.168.1.127
|
0.0.0.127
|
Melbourne
|
100
|
126
|
26
|
192.168.1.128
|
/25
|
255.255.255.128
|
192.168.1.129 - 192.168.1.254
|
192.168.1.255
|
0.0.0.127
|
Btn ISP and Brsibane
|
2
|
2
|
0
|
192.168.2.0
|
/30
|
255.255.255.252
|
192.168.2.1 - 192.168.2.2
|
192.168.2.3
|
0.0.0.3
|
Betn ISP and Melbourne
|
2
|
2
|
0
|
192.168.2.4
|
/30
|
255.255.255.252
|
192.168.2.5 - 192.168.2.6
|
192.168.2.7
|
0.0.0.3
|
Security features and Policies
It should be noted that there exist no secure or an immune network system from the attackers. owever, a secure system must be developed to ensure that the activities of an intruder are slowed down hence protecting our network system. In our network design above we deploy VPN to ensure that traffic that leaves our network is highly secured. No interception efforts by an attacker should succeed. Furthermore, we will instil a security policy to our network users and they will required not to share any network credential nor information to their colleagues. Note that employees poses a very huge threat to network security (Carthern & Wilson, 2016).
Redundancy and Failover plans
Redundancy and failover plans ensures that a system is reliable and available at all times. Our network design implements redundancy by use two ISPs to ensure that the networked system is 99.97% up. Most of down times in many of the organizations is a result of power loss. We are going to mitigate this by having power backup.
GETTING STUCK WITH SIMILAR VPN NETWORK DESIGN ASSIGNMENT? ENROL WITH EXPERTSMINDS'S VPN NETWORK DESIGN ASSIGNMENT HELP SERVICES AND GET DISTRESSED WITH YOUR ASSIGNMENT WORRIES!
VPN service implementation
Virtual Private Network technology deploys the private encrypted tunnelling which allows networked remote branch office locations or workers and access the corporate sites with no dedicated physical circuits (Hooper, 2012). The VPN in our project is implemented as below:
ISP router
Mel_Router
Brisbane
ORDER NEW COPY OF VPN NETWORK DESIGN ASSIGNMENT AND SECURE HIGHER MARKS!