internet fundamentals

internet fundamentals

instruction

 

          INDIVIDUAL TASK COVER SHEET

 

 

CP5631-SIN-INT-SP52: 17-CP5631-SIN-INT-SP52 Internet Fundamentals

 

Student

Please sign, date and attach cover sheet to front of assessment task for all hard copy submissions 

SUBJECT CODE  CP5631
STUDENT FAMILY NAME Student Given Name JCU Student Number
 KUNAM MANJINDER SINGH  1  

3

 

4

 

1

 

9

 

3

 

9

 

3

ASSESSMENT TITLE ( ASSIGNMENT- CASE STUDY)
DUE DATE  28/009/2017
LECTURER NAME  Mr. JAIKISHIN LAKHYANI
TUTOR NAME
 

Student Declaration

 

1.       This assignment is my original work and no part has been copied/ reproduced from any other person’s work or from any other source, except where acknowledgement has been made (see Learning, Teaching and Assessment Policy

5.1).

2.       This work has not been submitted for any other course/subject (see Learning, Teaching and Assessment Policy 5.9).

3.       This assignment has not been written for me.

4.       I hold a copy of this assignment and can produce a copy if requested.

5.       This work may be used for the purposes of moderation and identifying plagiarism.

6.       I give permission for a copy of this marked assignment to be retained by the College for benchmarking and course review and accreditation purposes.

 

 

Learning, Teaching and Assessment Policy5.1. A student who submits work containing plagiarised material for assessment will be subject to the provisions of the Student Academic Misconduct Requirements.

 

Note definition of plagiarism and self-plagiarism in Learning, Teaching and Assessment Policy:

Plagiarism: reproduction without acknowledgement of another person’s words, work or expressed thoughts from any source. The definition of words, works and thoughts includes such representations as diagrams, drawings, sketches, pictures, objects, text, lecture hand-outs, artistic works and other such expressions of ideas, but hereafter the term ‘work’ is used to embrace all of these. Plagiarism comprises not only direct copying of aspects of another person’s work but also the reproduction, even if slightly rewritten or adapted, of someone else’s ideas. In both cases, someone else’s work is presented as the student’s own. Under the Australian Copyright Act 1968 a copyright owner can take legal action in the courts against a party who has infringed their copyright.

Self-Plagiarism: theuse of one’s own previously assessed material being resubmitted without acknowledgement or citing of the original.

 

Student Signature

 

 

Manjinder Singh                                                                           Submission date   28/09/ 2017

Part 1

Summary

In this case study I will explain you about all parts like , Network diagram, sub netting, Research and source devices and Cloud computing proposal.

First of all I completed third part (sub netting) because network diagram is based on the third part and third part is also related to Network and in this part I will be write subnet name , subnet address, subnet mask , first usable name, last usable address, Broadcast address,  static address range, DHCP address range.

In Fourth part, I will search on  internet about routers and switches , and will see different five different switch and routers within $10,000 and each has different speed and also cost , and after that it will compare each other according to price and equipments’ . At the last compare all the prices and make it total but price must be less than $10,000.

In the last I will explain cloud computing proposal and explain what is the inside and three case and complete explanations.

Part-2

NETWORK STRUCTURE

 

 

 

 

 

 

 

 

Part-3

Subnet the network and assign IP addresses to the appropriate devices

LAN Number of Hosts per Subnet (largest to smallest) Subnet Size Number of Host bits required
Aarhus LAN 600 1024 10
Durbin-LAN 300 1024 10
          Milan-LAN 100 1024 10
Oslo-LAN 200 1024 10
Porto-LAN 20 1024 10
Riga- LAN 65 1024 10
Aarhus-WLAN 50 1024 10
Dublin-WLAN 35 1024 10
Riga-WLAN 15 1024 10
Aarhus-Server 2 1024 10
Milan-Server 3 1024 10
WAN AH-I 2 1024 10
WAN DU-AH 2 1024 10
WAN AH-OS 2 1024 10
WAN AH-ML 2 1024 10
WAN OS-RG 2 1024 10
WAN OS-ML 2 1024 10
WAN ML-PR 2 1024 10

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Table 1: LAN Subnets

 

Subnet Name Subnet Address Subnet Mask First Usable address Last Usable Address Broadcast Address Static Address Range DHCP Address Range
Aarhus LAN 170.100.0.0

(/22)

255.255.252.0

(/22)

170.100.0.1

(/22)

170.100.3.254

(/22)

170.100.3.255

(/22)

170.100.0.2 – 170.100.3.254
Dublin-LAN 170.100.4.0

(/22)

255.255.252.0

(/22)

170.100.4.1

(/22)

170.100.7.254

(/22)

170.100.7.255 (/22) 170.100.4.2 – 170.100.7.254
Milan-LAN 170.100.8.0

(/22)

255.255.252.0

(/22)

170.100.8.1

(/22)

170.100.11.254

(/22)

170.100.11.255 (/22) 170.100.8.2 – 170.100.11.254
Oslo-LAN 170.100.12.0

(/22)

255.255.252.0

(/22)

170.100.12.1

(/22)

170.100.15.254

(/22)

170.100.15.255 (/22) 170.100.12.2 – 170.100.15.254
Porto-LAN 170.100.16.0

(/22)

255.255.252.0

(/22)

170.100.16.1

(/22)

170.100.19.254

(/22)

170.100.19.255

(/22)

170.100.16.2 – 170.100.19.254
Riga- LAN 170.100.20.0

(/22)

255.255.252.0

(/22)

170.100.20.1

(/22)

170.100.23.254

(/22)

170.100.23.255 (/22) 170.100.20.2

– 170.100.23.254

Aarhus-WLAN 170.100.24.0

(/22)

255.255.252.0

(/22)

170.100.24.1

(/22)

170.100.27.254

(/22)

170.100.27.255 (/22) 170.100.24.2 – 170.100.27.254
Dublin-WLAN 170.100.28.0

(/22)

255.255.252.0

(/22)

170.100.28.1

(/22)

170.100.31.254

(/22)

170.100.31.255 (/22) 170.100.28.2

– 170.100.31.254

Riga -WLAN 170.100.32.0

(/22)

255.255.252.0

(/22)

170.100.32.1

(/22)

170.100.35.254

(/22)

170.100.35.255 (/22) 170.100.32.2 – 170.100.35.254
Aarhus-server 170.100.36.0

(/22)

255.255.252.0

(/22)

170.100.36.1

(/22)

170.100.39.254

(/22)

170.100.39.255 (/22) 170.100.36.2 – 170.100.39.254
Milan

Server

170.100.40.0

(/22)

255.255.252.0

(/22)

170.100.40.1

(/22)

170.100.43.254

(/22)

170.100.43.255

(/22)

170.100.40.2—

170.100.43.254

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Table 3:- WAN Subnets

 

Subnet

Name

Subnet

Address

Subnet

Mask

First Usable

Address

Last Usable

Address

Broadcast

Address

Static Address

Range

DHCP Address

Range

WAN AH-I 170.100.44.0

(/2)

255.255.252.0

(/22)

170.100.44.1

(22)

170.100.47.254

(/22)

170.100.47.255 (/22) 170.100.44.2 – 170.100.47.254
WAN DU-AH 170.100.48.0

(/22)

255.255.252.0

(/22)

170.100.48.1

(/22)

170.100.51.254

(/22)

170.100.51.255 (/22) 170.100.48.2 –

170.100.51.254

WAN AH-OS 170.100.52.0

(/22)

255.255.252.0

(/22)

170.100.52.1

(/22)

170.100.55.254

(/22)

170.100.55.255

(/22)

170.100.52.2-170.100.55.254
WAN AH-ML 170.100.56.0

(/22)

255.255.252.0

(/22)

170.100.56.1 (/22) 170.100.59.254

(/22)

170.100.59.255

(/2)

170.100.56.2-170.100.59.254
WAN OS-RG 170.100.60.0

(/22)

255.255.252.0

(/22)

170.100.60.1

(/22)

170.100.63.254

(/22)

170.100.63.255

(/22)

170.100.60.2-170.100.63.254
WAN OS-ML 170.100.64.0

(/22)

255.255.252.0

(/22)

170.100.64.1

(/22)

170.100.67.254 (/22) 170.100.67.255

(/22)

170.100.64.2-170.100.67.254
WAN ML-PR 170.100.68.0

(/22)

255.255.252.0

(/22)

170.100.68.1

(/22)

170.100.71.254

(/22)

170.100.71.255

(/22)

170.100.68.2-170.100.71.254

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Table 2 – Router Interfaces

 

 

 

Location Interface IP Address Subnet Mask
Aarhus S0/0 170.100.44.1(/22) 255.255.252.0(/22)
Aarhus S0/1 170.100.48.1(/22) 255.255.252.0(/22)
Aarhus S0/2 170.100.52.1(/22) 255.255.252.0(/22)
Aarhus S0/3 170.100.56.1(/22) 255.255.252.0(/22)
Aarhus Fa0/0 170.100.0.1(/22) 255.255.252.0(/22)
Aarhus Fa0/1 170.100.24.1(/22) 255.255.252.0(/22)
Aarhus Fa0/2 170.100.36.1(/22) 255.255.252.0(/22)
Milan S0/0 170.100.64.1(/22) 255.255.252.0(/22)
Milan S0/1 170.100.56.2(/22) 255.255.252.0(/22)
Milan S0/2 170.100.68.1(/22) 255.255.252.0(/22)
Milan Fa0/0 170.100.8.1(22) 255.255.252.0(/22)
Milan Fa0/1 170.100.40.1(/22) 255.255.252.0(/22)
Oslo S0/0 170.100.52.2(/22) 255.255.252.0(/22)
Oslo S0/1 170.100.60.1(/22) 255.255.252.0(/22)
Oslo S0/2 170.100.64.2(/22) 255.255.252.0(/22)
Oslo Fa0/0 170.100.12.1(/22) 255.255.252.0(/22)
Dublin S0/0 170.100.48.2(/22) 255.255.252.0(/22)
Dublin Fa0/0 170.100.4.1(/22) 255.255.252.0(/22)
Dublin Fa0/1 170.100.28.1(/22) 255.255.252.0(/22)
Porto S0/0 170.100.68.2(/22) 255.255.252.0(/22)
Porto Fa0/0 170.100.16.1(/22) 255.255.252.0(/22)
Riga S0/0 170.100.60.2(/22) 255.255.252.0(/22)
Riga Fa0/0 170.100.20.2(/22) 255.255.252.0(/22)
Riga Fa0/1 170.100.32.1(/22) 255.255.252.0(/22)

 

 

 

 

 

 

 

Table 3 – Servers

 

Location Server Name IP Address Subnet Mask
Aarhus Web 170.100.36.2(/22) 255.255.252.0 (/22)
Aarhus Mail 170.100.36.3(/22) 255.255.252.0 (/22)
Milan Backup server1 170.100.40.2(/22) 255.255.252.0 (/22)
Milan Backup server2 170.100.40.3(22) 255.255.252.0 (/22)
Milan Backup server3 170.100.40.4(/22) 255.255.252.0 (/22)

 

 

 

 

Part-4

We will look at about each one of the gadgets in perspective of determinations and distinctive highlights. The examination demonstrated as follows.

 

Weighted Decision Matrix:

 

Performance Score Description(requirement)
0 Requirement is not meet
2 Requirement Partially met
4 Requirement Met
6 Exceeds that of what is needed

 

 

 

 

 

 

 

 

 

 

Importance Score    Description
0 Requirement does not apply
1 Not very important
3 Important
5 Critical

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

ROUTERS

 

MODEL FUNCTION1(VPN support) YES FUNCTION 2(WPA/VPA2 Encryption) YES Speed

>=1000Mbps

USB Ports

>=4 ports

COST(US$)

<$2000

Cisco SGE2010 48 Port Gigabit Layer 2+

 

YES YES 5334Mbps 3 $353.00
Cisco SG500-52P-K9 52 10/100/1000

 

YES YES 1000Mbps 5 $305.00
Cisco SF 300-48P 48-port 10/100 PoE M YES YES 4200Mbps 6 $520.00
D-Link DES-1210-52 48-PORT

 

YES YES 750Mbps 2 $179.00
Cisco SG 300-52 48-port

 

YES YES 1000Mbps 5 $265.00

 

 

 

 

 

 

 

Weighted Matrix

 

 

 

 

 

 

 

 

 

 

 

Total Weighted Matrix:

 

Justification:

  • From the above table, we got to know cisco 887 ADSL2+Router is suited for both Tokyo and Osaka, which met the requirement as mentioned above:
  • ROUTER COST is $520

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

SWITCHES

 

  NO. OF PORTS SPEED MANAGED/

UNMANAGED

LAYER 3

SWITCHES

COST
Cisco SG500 28 1000Mbps Managed Layer 3 $506
Net Gear

Prosafe

GS752TP

52 1000Mbps Smart Managed Layer2/Layer3 Lite $729
HP 48-Port L3 Switch Managed(JG540A#ABA) 48 1000Mbps Managed Layer3 $449
Aten US221 30 1000Mbps Smart Managed Layer2/layer3 Lite $398
Dell Networking X1052P- Switch-48 Ports-Managed-Rack-Mountable, Black (463-5912) 48 1000Mbps Smart Managed Layer 3 $823

 

 

 

 

 

 

Weighted matrix

    

 

 

 

 

 

 

 

Total Weighted Matrix: –

 

 

 

 

 

 

Justification:

 

  • From the above table, Net Gear Prosafe GS752TP is suitable as a switch for both Tokyo and Osaka which met the requirement that is 52 ports and having a speed of 1000Mbps.
  • As per requirement Tokyo needs 1 switch and Osaka needs 2 switches
  • Cost of The Switch is $ 729

 

 

 

 

 

 

 

 

 

 

 

 

 

WAP (WIRELESS ACCESS POINT)

MODEL FUNCTION1(VPN support) YES FUNCTION2

(WAP/VPA2 encrypt)

Speed

>=1000Mbps

USB Ports

>=3 ports

COST(US$)

<$2000

Cisco SGE2010 48 Port Gigabit Layer 2+

 

YES YES 1000Mbps 6 $309
Billion BP7800VDOX YES YES 1000Mbps 6 $210
D-Link DSL-287AL

 

YES YES 750Mbps 5 $99
D-Link Systems Wireless AC1750 Simultaneous Dual Band Plenum-Rated PoE Access Point(DAP-2695) YES YES 450Mbps 2 $285
Asus DSL-AC56U

 

YES YES 900Mbps 6 $199

 

 

 

 

 

 

 

 

 

 

 

 

Weighted Matrix

 

 

 

 

 

 

 

 

TOTAL Weighted Matrix

 

 

 

 

 

Justification:

  • From the above table Billion BP7800VDOX is suitable as a wireless Access point for Tokyo
  • Which met the requirement that is 6 ports and having a speed of 1000Mbps.
  • WAP COST is $210

 

 

 

 

 

 

 

 

 

Budget

Total cost:$520 + $729 + $210 + $520 + $1458 = $3437

 

 

 

 

 

 

 

 

 

PART 5

 

Cloud computing proposal

 

Cloud computing is a general term for the conveyance of facilitated benefits over the web.

 

Cloud computing empowers organizations to devour a figure asset, for example, a virtual machine (VM), stockpiling or an application, as an utility – simply like power – as opposed to building and keep up processing frameworks in house.

 

 

 

Advantages  of Cloud Computing:

Cost Advantages:

1.The innovation decreases the spend on foundation

2.The capital expenses decrease programming, equipment and allowing charges.

3.The assets joining into cloud balances out vitality utilize.

growth factor Advantages:

  1. Increases the volume yield or profitability
  2. No need to buy and setup hardware physically
  3. Multiple clients can use the cloud assets at the same time, thusly, a higher speed is proficient.
  4. IT staffs can stay up with the product by basically getting to a pc with a web relationship with see the data they require

Technical Advantages:

 

  1. Cloud empowers us to avoid the burdens connected with equipment, programming and updates bolster.
  2. It can be gotten to with an extensive variety of gadgets in the event that on the off chance that we have the web association.
  3. Customizing the business applications is possible.
  4. Customers are offered increasingly and most recent innovations, totally virtualized if essential, keeping up an aggressive edge in the business innovation.
  5. Cloud processing handles any kind of equipment breakdown for business.
  6. It empowers the associations to have more rooms to store the records and information in the event that in the event that we use the web with the cloud administrations.

 

 

Business-level Advantages:

 

  1. Cloud ensures that the business is moving faster, more prominent efficiency is kept up and requests are met or not.

 

  1. With distributed computing organizations give careful consideration to the advancement procedure bringing about speedier improvement.

 

  1. Cloud is the snappiest, most cost-effectivebusiness empowering innovation that encourages the associations to accomplish an upper hand.

 

case 1:

 

The main case comprises of foundation where the expenses are low which are identified with the client benefits. In-house having low in scale when contrasted with others these is one of the fundamental favorable position installment can done as one client on his premise VLAN support and firewalls which are utilized to improve security and these are controlled by cloud suppliers. With specific arrangements clients decrepit same infrastructures. These web administrations are much of the time known as cloud administrations or remote figure administrations. Online administrations are accommodated both customer side applications and site by Amazon web administrations.

 

A solitary comfort for checking your physical, virtual and cloud system. Screen applications encouraged in the cloud and furthermore inside your corporate server cultivate. Guarantee high uptime and pinnacle execution of your Amazon cloud assets. Get understanding into the execution of your distributed computing condition; investigate and resolve issues before end customers are affected. Orchestrate utmost and settle on instructed decisions about dispensing cloud assets. Agent less watching arrangement that is definitely not hard to set up and direct.

 

 

 

 

Its benefits are:

 

  • Cloud assets are available on request from numerous assets in the cloud.

 

  • Most of the advantages can be shared over all the cloud an administration. A part of the proposals are accessible allowed to the customer.

 

  • The servers and frameworks are incorporated into a significant number which suggested that if one physical segment falls flat; the cloud benefit is still given. Therefore, there is no occasion of disillusionment which could influence the cloud to benefit powerless.

 

  • They are set up to get gotten to from any web empowered gadget. organizations can likewise incorporate their open cloud benefits alongside private mists to make half breed mists

 

  • These administrations can be gotten to wherever the client is found. This empowers a venture for huge open doors as remote access to an IT establishment or even a joint effort of online record from different areas.

 

 

They rely on shared physical equipment that is possessed and kept up by outsider suppliers, proposes that there are no equipment costs or costs of upkeep experienced in our business. The perfect response for little spending arrangement to medium measured organizations or those which have going astray requests, the favorable circumstances are the speed that pass on IT assets, and besides it offers certain utility charging. By partitioning the foundation costs over a grouping of customers, each customer can work it easily, pay as you go strategy to the outfitting of IT administrations. Due to its gigantic size, organizations can figure control here and there as business demands are changing, inside a littler timeframe. It incorporates using the system for shared framework; something which is delighted in by numerous people the extent that cost yet not as for the security. Thus, organizations require considering what is encouraged in individuals as a rule cloud pro specialist co-op. This cloud is accessible over the Internet and it serves a practically a boundless number of customers with the same shared foundation.

 

Cost of saving a dependable framework is over 70% as assessed which incorporates exertion and time. System repetition and limit put a key part in cloud methodology where this both ought to be examined. For business summon readiness and capacity put a key part for use and these is most preferred standpoint moreover. It gets to source documents dependability and cost viably which have a huge availability and toughness to store.

 

 

case 2:

 

Private cloud associations are those in which are fabricated only for a person which can be organized into an individual undertaking. This organization can have application purposes in the cloud which is resolved, while in regards to about information security, which can be a regularly in an open cloud administration of the association. The two types of general society cloud are:

 

 

 

 

 

 

On-Premise Private Cloud:

It is known as an “internal  cloud,” that is facilitated inside an association. This gives a most elevated security and are likewise for best utilized for applications in indicated which can be required an aggregate control on the framework and its security of the approval of the association.

 

Externally-Hosted Private Cloud:

This is suited by a distributed computing supplier externally. In this specifically, the cloud condition with full security of the approval and validation will be a guaranteed. It is an appropriate for those associations that does not utilize  an open cloud benefit on account of the risks connected with the sharing of the physical assets of the association remotely. Expenses are higher when contrasting and an open cloud in determined. It will incorporate a settled and approved cloud based condition that can be worked only a client connected with the association. These administrations draw their assets from an unmistakable pool of physical desktops which is facilitated either inside or remotely by means of open systems.

 

Its advantages are:

 

  • By utilizing strategy, for example, positive pool of assets with get to constrained to associations made outside an association’s firewall – can guarantee that operations are avoided curious people.

 

  • As it is recently gotten to by a solitary association, that particular affiliation have the specialist to design and keep up it inline. This level of control additionally has a brought together administration of the physical equipment.

 

  • The dissemination of assets inside an association is improved along these lines ensuring the accessibility of cloud assets to individual authoritative offices.

 

  • Virtualized conditions imply that the system is adaptable to the occasion of individual disappointments over the physical foundation. Virtual parcels haul out their assets from the current unaffected servers.

 

  • Cloud blasting servers empowers the master supplier to change certain non-touchy capacities to clear space in the private cloud with the goal that delicate capacities can amass it. Private mists can be composed with open mists to make half and half mists bringing about amplification of effectiveness. A private cloud foundation is simply committed to the business, which is facilitated either on area or at a pro supplier server farm. The private cloud conveys all the readiness, versatility and productivity of general society cloud, yet in like manner it furthermore gives more noteworthy levels of control and security, making it as a perfect answer for greater organizations or those with strict information, direction and administration commitments.

 

Another key preferred standpoint of private cloud is the capacity to modify the process, stockpiling and systems administration segments to best suit your specific IT necessities, something which can’t be accomplished so effortlessly in people in general cloud condition. Private cloud is frequently picked by most of the organizations dealing with touchy data or retailers who need to agree to specific directions. To put it plainly, it can offer some cost funds yet gives a more elevated amount of security.

 

Case 3:

 

As figuring continues moving to the cloud, customary workstations can’t be utilized as a contrasting option to thin customers as they don’t have a quicker processer. They have poor virtualization includes subsequently it can’t bolster numerous solicitations in one session.

On looking at the three cases,

 

Security ramifications of moving to a cloud benefit.

 

  • Managing the individual character information and empowering the entrance to PCs, information, and administrations are controlled.

 

  • Businesses must have the capacity to separate amongst authentic and ill-conceived activities, as there is a more grater probability of an unapproved client getting to the cloud.

 

  • Encryption ought to be conceivable with the goal that a code is utilized to secure our private information assets as cloud-based PC frameworks are shared by countless.

 

  • An association is one substance, and thusly every one of within that association must be incorporated as one for reasonability purposes.

 

  • Cloud standard ensures interoperability to utilize gadgets and applications in another cloud condition without the need of doing any revamp.

 

  • Governance elucidates the parts and obligations that ought to be taken after. Cloud administration incorporates the possess framework and besides the establishment which is wild.

 

  • Data is overseen and put away in the cloud which requires additional information security and protection, including information stockpiling and information preparing assets.

 52903_1526020907

         $10 per 275 words - Purchase Now