instruction
INDIVIDUAL TASK COVER SHEET
CP5631-SIN-INT-SP52: 17-CP5631-SIN-INT-SP52 Internet Fundamentals |
Student
Please sign, date and attach cover sheet to front of assessment task for all hard copy submissions |
|||||||||
SUBJECT CODE | CP5631 | ||||||||
STUDENT FAMILY NAME | Student Given Name | JCU Student Number | |||||||
KUNAM | MANJINDER SINGH | 1 |
3 |
4 |
1 |
9 |
3 |
9 |
3 |
ASSESSMENT TITLE | ( ASSIGNMENT- CASE STUDY) | ||||||||
DUE DATE | 28/009/2017 | ||||||||
LECTURER NAME | Mr. JAIKISHIN LAKHYANI | ||||||||
TUTOR NAME | |||||||||
Student Declaration
1. This assignment is my original work and no part has been copied/ reproduced from any other person’s work or from any other source, except where acknowledgement has been made (see Learning, Teaching and Assessment Policy 5.1). 2. This work has not been submitted for any other course/subject (see Learning, Teaching and Assessment Policy 5.9). 3. This assignment has not been written for me. 4. I hold a copy of this assignment and can produce a copy if requested. 5. This work may be used for the purposes of moderation and identifying plagiarism. 6. I give permission for a copy of this marked assignment to be retained by the College for benchmarking and course review and accreditation purposes.
Learning, Teaching and Assessment Policy5.1. A student who submits work containing plagiarised material for assessment will be subject to the provisions of the Student Academic Misconduct Requirements.
Note definition of plagiarism and self-plagiarism in Learning, Teaching and Assessment Policy: Plagiarism: reproduction without acknowledgement of another person’s words, work or expressed thoughts from any source. The definition of words, works and thoughts includes such representations as diagrams, drawings, sketches, pictures, objects, text, lecture hand-outs, artistic works and other such expressions of ideas, but hereafter the term ‘work’ is used to embrace all of these. Plagiarism comprises not only direct copying of aspects of another person’s work but also the reproduction, even if slightly rewritten or adapted, of someone else’s ideas. In both cases, someone else’s work is presented as the student’s own. Under the Australian Copyright Act 1968 a copyright owner can take legal action in the courts against a party who has infringed their copyright. Self-Plagiarism: theuse of one’s own previously assessed material being resubmitted without acknowledgement or citing of the original.
Student Signature
Manjinder Singh Submission date 28/09/ 2017 |
Part 1
Summary
In this case study I will explain you about all parts like , Network diagram, sub netting, Research and source devices and Cloud computing proposal.
First of all I completed third part (sub netting) because network diagram is based on the third part and third part is also related to Network and in this part I will be write subnet name , subnet address, subnet mask , first usable name, last usable address, Broadcast address, static address range, DHCP address range.
In Fourth part, I will search on internet about routers and switches , and will see different five different switch and routers within $10,000 and each has different speed and also cost , and after that it will compare each other according to price and equipments’ . At the last compare all the prices and make it total but price must be less than $10,000.
In the last I will explain cloud computing proposal and explain what is the inside and three case and complete explanations.
Part-2
NETWORK STRUCTURE
Part-3
Subnet the network and assign IP addresses to the appropriate devices
LAN | Number of Hosts per Subnet (largest to smallest) | Subnet Size | Number of Host bits required |
Aarhus LAN | 600 | 1024 | 10 |
Durbin-LAN | 300 | 1024 | 10 |
Milan-LAN | 100 | 1024 | 10 |
Oslo-LAN | 200 | 1024 | 10 |
Porto-LAN | 20 | 1024 | 10 |
Riga- LAN | 65 | 1024 | 10 |
Aarhus-WLAN | 50 | 1024 | 10 |
Dublin-WLAN | 35 | 1024 | 10 |
Riga-WLAN | 15 | 1024 | 10 |
Aarhus-Server | 2 | 1024 | 10 |
Milan-Server | 3 | 1024 | 10 |
WAN AH-I | 2 | 1024 | 10 |
WAN DU-AH | 2 | 1024 | 10 |
WAN AH-OS | 2 | 1024 | 10 |
WAN AH-ML | 2 | 1024 | 10 |
WAN OS-RG | 2 | 1024 | 10 |
WAN OS-ML | 2 | 1024 | 10 |
WAN ML-PR | 2 | 1024 | 10 |
Table 1: LAN Subnets
Subnet Name | Subnet Address | Subnet Mask | First Usable address | Last Usable Address | Broadcast Address | Static Address Range | DHCP Address Range |
Aarhus LAN | 170.100.0.0
(/22) |
255.255.252.0
(/22) |
170.100.0.1
(/22) |
170.100.3.254
(/22) |
170.100.3.255
(/22) |
170.100.0.2 – 170.100.3.254 | |
Dublin-LAN | 170.100.4.0
(/22) |
255.255.252.0
(/22) |
170.100.4.1
(/22) |
170.100.7.254
(/22) |
170.100.7.255 (/22) | 170.100.4.2 – 170.100.7.254 | |
Milan-LAN | 170.100.8.0
(/22) |
255.255.252.0
(/22) |
170.100.8.1
(/22) |
170.100.11.254
(/22) |
170.100.11.255 (/22) | 170.100.8.2 – 170.100.11.254 | |
Oslo-LAN | 170.100.12.0
(/22) |
255.255.252.0
(/22) |
170.100.12.1
(/22) |
170.100.15.254
(/22) |
170.100.15.255 (/22) | 170.100.12.2 – 170.100.15.254 | |
Porto-LAN | 170.100.16.0
(/22) |
255.255.252.0
(/22) |
170.100.16.1
(/22) |
170.100.19.254
(/22) |
170.100.19.255
(/22) |
170.100.16.2 – 170.100.19.254 | |
Riga- LAN | 170.100.20.0
(/22) |
255.255.252.0
(/22) |
170.100.20.1
(/22) |
170.100.23.254
(/22) |
170.100.23.255 (/22) | 170.100.20.2
– 170.100.23.254 |
|
Aarhus-WLAN | 170.100.24.0
(/22) |
255.255.252.0
(/22) |
170.100.24.1
(/22) |
170.100.27.254
(/22) |
170.100.27.255 (/22) | 170.100.24.2 – 170.100.27.254 | |
Dublin-WLAN | 170.100.28.0
(/22) |
255.255.252.0
(/22) |
170.100.28.1
(/22) |
170.100.31.254
(/22) |
170.100.31.255 (/22) | 170.100.28.2
– 170.100.31.254 |
|
Riga -WLAN | 170.100.32.0
(/22) |
255.255.252.0
(/22) |
170.100.32.1
(/22) |
170.100.35.254
(/22) |
170.100.35.255 (/22) | 170.100.32.2 – 170.100.35.254 | |
Aarhus-server | 170.100.36.0
(/22) |
255.255.252.0
(/22) |
170.100.36.1
(/22) |
170.100.39.254
(/22) |
170.100.39.255 (/22) | 170.100.36.2 – 170.100.39.254 | |
Milan
Server |
170.100.40.0
(/22) |
255.255.252.0
(/22) |
170.100.40.1
(/22) |
170.100.43.254
(/22) |
170.100.43.255
(/22) |
170.100.40.2—
170.100.43.254 |
Table 3:- WAN Subnets
Subnet
Name |
Subnet
Address |
Subnet
Mask |
First Usable
Address |
Last Usable
Address |
Broadcast
Address |
Static Address
Range |
DHCP Address
Range |
WAN AH-I | 170.100.44.0
(/2) |
255.255.252.0
(/22) |
170.100.44.1
(22) |
170.100.47.254
(/22) |
170.100.47.255 (/22) | 170.100.44.2 – 170.100.47.254 | |
WAN DU-AH | 170.100.48.0
(/22) |
255.255.252.0
(/22) |
170.100.48.1
(/22) |
170.100.51.254
(/22) |
170.100.51.255 (/22) | 170.100.48.2 –
170.100.51.254 |
|
WAN AH-OS | 170.100.52.0
(/22) |
255.255.252.0
(/22) |
170.100.52.1
(/22) |
170.100.55.254
(/22) |
170.100.55.255
(/22) |
170.100.52.2-170.100.55.254 | |
WAN AH-ML | 170.100.56.0
(/22) |
255.255.252.0
(/22) |
170.100.56.1 (/22) | 170.100.59.254
(/22) |
170.100.59.255
(/2) |
170.100.56.2-170.100.59.254 | |
WAN OS-RG | 170.100.60.0
(/22) |
255.255.252.0
(/22) |
170.100.60.1
(/22) |
170.100.63.254
(/22) |
170.100.63.255
(/22) |
170.100.60.2-170.100.63.254 | |
WAN OS-ML | 170.100.64.0
(/22) |
255.255.252.0
(/22) |
170.100.64.1
(/22) |
170.100.67.254 (/22) | 170.100.67.255
(/22) |
170.100.64.2-170.100.67.254 | |
WAN ML-PR | 170.100.68.0
(/22) |
255.255.252.0
(/22) |
170.100.68.1
(/22) |
170.100.71.254
(/22) |
170.100.71.255
(/22) |
170.100.68.2-170.100.71.254 |
Table 2 – Router Interfaces
Location | Interface | IP Address | Subnet Mask |
Aarhus | S0/0 | 170.100.44.1(/22) | 255.255.252.0(/22) |
Aarhus | S0/1 | 170.100.48.1(/22) | 255.255.252.0(/22) |
Aarhus | S0/2 | 170.100.52.1(/22) | 255.255.252.0(/22) |
Aarhus | S0/3 | 170.100.56.1(/22) | 255.255.252.0(/22) |
Aarhus | Fa0/0 | 170.100.0.1(/22) | 255.255.252.0(/22) |
Aarhus | Fa0/1 | 170.100.24.1(/22) | 255.255.252.0(/22) |
Aarhus | Fa0/2 | 170.100.36.1(/22) | 255.255.252.0(/22) |
Milan | S0/0 | 170.100.64.1(/22) | 255.255.252.0(/22) |
Milan | S0/1 | 170.100.56.2(/22) | 255.255.252.0(/22) |
Milan | S0/2 | 170.100.68.1(/22) | 255.255.252.0(/22) |
Milan | Fa0/0 | 170.100.8.1(22) | 255.255.252.0(/22) |
Milan | Fa0/1 | 170.100.40.1(/22) | 255.255.252.0(/22) |
Oslo | S0/0 | 170.100.52.2(/22) | 255.255.252.0(/22) |
Oslo | S0/1 | 170.100.60.1(/22) | 255.255.252.0(/22) |
Oslo | S0/2 | 170.100.64.2(/22) | 255.255.252.0(/22) |
Oslo | Fa0/0 | 170.100.12.1(/22) | 255.255.252.0(/22) |
Dublin | S0/0 | 170.100.48.2(/22) | 255.255.252.0(/22) |
Dublin | Fa0/0 | 170.100.4.1(/22) | 255.255.252.0(/22) |
Dublin | Fa0/1 | 170.100.28.1(/22) | 255.255.252.0(/22) |
Porto | S0/0 | 170.100.68.2(/22) | 255.255.252.0(/22) |
Porto | Fa0/0 | 170.100.16.1(/22) | 255.255.252.0(/22) |
Riga | S0/0 | 170.100.60.2(/22) | 255.255.252.0(/22) |
Riga | Fa0/0 | 170.100.20.2(/22) | 255.255.252.0(/22) |
Riga | Fa0/1 | 170.100.32.1(/22) | 255.255.252.0(/22) |
Table 3 – Servers
Location | Server Name | IP Address | Subnet Mask |
Aarhus | Web | 170.100.36.2(/22) | 255.255.252.0 (/22) |
Aarhus | 170.100.36.3(/22) | 255.255.252.0 (/22) | |
Milan | Backup server1 | 170.100.40.2(/22) | 255.255.252.0 (/22) |
Milan | Backup server2 | 170.100.40.3(22) | 255.255.252.0 (/22) |
Milan | Backup server3 | 170.100.40.4(/22) | 255.255.252.0 (/22) |
Part-4
We will look at about each one of the gadgets in perspective of determinations and distinctive highlights. The examination demonstrated as follows.
Weighted Decision Matrix:
Performance Score | Description(requirement) |
0 | Requirement is not meet |
2 | Requirement Partially met |
4 | Requirement Met |
6 | Exceeds that of what is needed |
Importance Score | Description |
0 | Requirement does not apply |
1 | Not very important |
3 | Important |
5 | Critical |
ROUTERS
MODEL | FUNCTION1(VPN support) YES | FUNCTION 2(WPA/VPA2 Encryption) YES | Speed
>=1000Mbps |
USB Ports
>=4 ports |
COST(US$)
<$2000 |
Cisco SGE2010 48 Port Gigabit Layer 2+
|
YES | YES | 5334Mbps | 3 | $353.00 |
Cisco SG500-52P-K9 52 10/100/1000
|
YES | YES | 1000Mbps | 5 | $305.00 |
Cisco SF 300-48P 48-port 10/100 PoE M | YES | YES | 4200Mbps | 6 | $520.00 |
D-Link DES-1210-52 48-PORT
|
YES | YES | 750Mbps | 2 | $179.00 |
Cisco SG 300-52 48-port
|
YES | YES | 1000Mbps | 5 | $265.00 |
Weighted Matrix
Total Weighted Matrix:
Justification:
- From the above table, we got to know cisco 887 ADSL2+Router is suited for both Tokyo and Osaka, which met the requirement as mentioned above:
- ROUTER COST is $520
SWITCHES
NO. OF PORTS | SPEED | MANAGED/
UNMANAGED |
LAYER 3
SWITCHES |
COST | |
Cisco SG500 | 28 | 1000Mbps | Managed | Layer 3 | $506 |
Net Gear
Prosafe GS752TP |
52 | 1000Mbps | Smart Managed | Layer2/Layer3 Lite | $729 |
HP 48-Port L3 Switch Managed(JG540A#ABA) | 48 | 1000Mbps | Managed | Layer3 | $449 |
Aten US221 | 30 | 1000Mbps | Smart Managed | Layer2/layer3 Lite | $398 |
Dell Networking X1052P- Switch-48 Ports-Managed-Rack-Mountable, Black (463-5912) | 48 | 1000Mbps | Smart Managed | Layer 3 | $823 |
Weighted matrix
Total Weighted Matrix: –
Justification:
- From the above table, Net Gear Prosafe GS752TP is suitable as a switch for both Tokyo and Osaka which met the requirement that is 52 ports and having a speed of 1000Mbps.
- As per requirement Tokyo needs 1 switch and Osaka needs 2 switches
- Cost of The Switch is $ 729
WAP (WIRELESS ACCESS POINT)
MODEL | FUNCTION1(VPN support) YES | FUNCTION2
(WAP/VPA2 encrypt) |
Speed
>=1000Mbps |
USB Ports
>=3 ports |
COST(US$)
<$2000 |
Cisco SGE2010 48 Port Gigabit Layer 2+
|
YES | YES | 1000Mbps | 6 | $309 |
Billion BP7800VDOX | YES | YES | 1000Mbps | 6 | $210 |
D-Link DSL-287AL
|
YES | YES | 750Mbps | 5 | $99 |
D-Link Systems Wireless AC1750 Simultaneous Dual Band Plenum-Rated PoE Access Point(DAP-2695) | YES | YES | 450Mbps | 2 | $285 |
Asus DSL-AC56U
|
YES | YES | 900Mbps | 6 | $199 |
Weighted Matrix
TOTAL Weighted Matrix
Justification:
- From the above table Billion BP7800VDOX is suitable as a wireless Access point for Tokyo
- Which met the requirement that is 6 ports and having a speed of 1000Mbps.
- WAP COST is $210
Budget
Total cost:$520 + $729 + $210 + $520 + $1458 = $3437
PART 5
Cloud computing proposal
Cloud computing is a general term for the conveyance of facilitated benefits over the web.
Cloud computing empowers organizations to devour a figure asset, for example, a virtual machine (VM), stockpiling or an application, as an utility – simply like power – as opposed to building and keep up processing frameworks in house.
Advantages of Cloud Computing:
Cost Advantages:
1.The innovation decreases the spend on foundation
2.The capital expenses decrease programming, equipment and allowing charges.
3.The assets joining into cloud balances out vitality utilize.
growth factor Advantages:
- Increases the volume yield or profitability
- No need to buy and setup hardware physically
- Multiple clients can use the cloud assets at the same time, thusly, a higher speed is proficient.
- IT staffs can stay up with the product by basically getting to a pc with a web relationship with see the data they require
Technical Advantages:
- Cloud empowers us to avoid the burdens connected with equipment, programming and updates bolster.
- It can be gotten to with an extensive variety of gadgets in the event that on the off chance that we have the web association.
- Customizing the business applications is possible.
- Customers are offered increasingly and most recent innovations, totally virtualized if essential, keeping up an aggressive edge in the business innovation.
- Cloud processing handles any kind of equipment breakdown for business.
- It empowers the associations to have more rooms to store the records and information in the event that in the event that we use the web with the cloud administrations.
Business-level Advantages:
- Cloud ensures that the business is moving faster, more prominent efficiency is kept up and requests are met or not.
- With distributed computing organizations give careful consideration to the advancement procedure bringing about speedier improvement.
- Cloud is the snappiest, most cost-effectivebusiness empowering innovation that encourages the associations to accomplish an upper hand.
case 1:
The main case comprises of foundation where the expenses are low which are identified with the client benefits. In-house having low in scale when contrasted with others these is one of the fundamental favorable position installment can done as one client on his premise VLAN support and firewalls which are utilized to improve security and these are controlled by cloud suppliers. With specific arrangements clients decrepit same infrastructures. These web administrations are much of the time known as cloud administrations or remote figure administrations. Online administrations are accommodated both customer side applications and site by Amazon web administrations.
A solitary comfort for checking your physical, virtual and cloud system. Screen applications encouraged in the cloud and furthermore inside your corporate server cultivate. Guarantee high uptime and pinnacle execution of your Amazon cloud assets. Get understanding into the execution of your distributed computing condition; investigate and resolve issues before end customers are affected. Orchestrate utmost and settle on instructed decisions about dispensing cloud assets. Agent less watching arrangement that is definitely not hard to set up and direct.
Its benefits are:
- Cloud assets are available on request from numerous assets in the cloud.
- Most of the advantages can be shared over all the cloud an administration. A part of the proposals are accessible allowed to the customer.
- The servers and frameworks are incorporated into a significant number which suggested that if one physical segment falls flat; the cloud benefit is still given. Therefore, there is no occasion of disillusionment which could influence the cloud to benefit powerless.
- They are set up to get gotten to from any web empowered gadget. organizations can likewise incorporate their open cloud benefits alongside private mists to make half breed mists
- These administrations can be gotten to wherever the client is found. This empowers a venture for huge open doors as remote access to an IT establishment or even a joint effort of online record from different areas.
They rely on shared physical equipment that is possessed and kept up by outsider suppliers, proposes that there are no equipment costs or costs of upkeep experienced in our business. The perfect response for little spending arrangement to medium measured organizations or those which have going astray requests, the favorable circumstances are the speed that pass on IT assets, and besides it offers certain utility charging. By partitioning the foundation costs over a grouping of customers, each customer can work it easily, pay as you go strategy to the outfitting of IT administrations. Due to its gigantic size, organizations can figure control here and there as business demands are changing, inside a littler timeframe. It incorporates using the system for shared framework; something which is delighted in by numerous people the extent that cost yet not as for the security. Thus, organizations require considering what is encouraged in individuals as a rule cloud pro specialist co-op. This cloud is accessible over the Internet and it serves a practically a boundless number of customers with the same shared foundation.
Cost of saving a dependable framework is over 70% as assessed which incorporates exertion and time. System repetition and limit put a key part in cloud methodology where this both ought to be examined. For business summon readiness and capacity put a key part for use and these is most preferred standpoint moreover. It gets to source documents dependability and cost viably which have a huge availability and toughness to store.
case 2:
Private cloud associations are those in which are fabricated only for a person which can be organized into an individual undertaking. This organization can have application purposes in the cloud which is resolved, while in regards to about information security, which can be a regularly in an open cloud administration of the association. The two types of general society cloud are:
On-Premise Private Cloud:
It is known as an “internal cloud,” that is facilitated inside an association. This gives a most elevated security and are likewise for best utilized for applications in indicated which can be required an aggregate control on the framework and its security of the approval of the association.
Externally-Hosted Private Cloud:
This is suited by a distributed computing supplier externally. In this specifically, the cloud condition with full security of the approval and validation will be a guaranteed. It is an appropriate for those associations that does not utilize an open cloud benefit on account of the risks connected with the sharing of the physical assets of the association remotely. Expenses are higher when contrasting and an open cloud in determined. It will incorporate a settled and approved cloud based condition that can be worked only a client connected with the association. These administrations draw their assets from an unmistakable pool of physical desktops which is facilitated either inside or remotely by means of open systems.
Its advantages are:
- By utilizing strategy, for example, positive pool of assets with get to constrained to associations made outside an association’s firewall – can guarantee that operations are avoided curious people.
- As it is recently gotten to by a solitary association, that particular affiliation have the specialist to design and keep up it inline. This level of control additionally has a brought together administration of the physical equipment.
- The dissemination of assets inside an association is improved along these lines ensuring the accessibility of cloud assets to individual authoritative offices.
- Virtualized conditions imply that the system is adaptable to the occasion of individual disappointments over the physical foundation. Virtual parcels haul out their assets from the current unaffected servers.
- Cloud blasting servers empowers the master supplier to change certain non-touchy capacities to clear space in the private cloud with the goal that delicate capacities can amass it. Private mists can be composed with open mists to make half and half mists bringing about amplification of effectiveness. A private cloud foundation is simply committed to the business, which is facilitated either on area or at a pro supplier server farm. The private cloud conveys all the readiness, versatility and productivity of general society cloud, yet in like manner it furthermore gives more noteworthy levels of control and security, making it as a perfect answer for greater organizations or those with strict information, direction and administration commitments.
Another key preferred standpoint of private cloud is the capacity to modify the process, stockpiling and systems administration segments to best suit your specific IT necessities, something which can’t be accomplished so effortlessly in people in general cloud condition. Private cloud is frequently picked by most of the organizations dealing with touchy data or retailers who need to agree to specific directions. To put it plainly, it can offer some cost funds yet gives a more elevated amount of security.
Case 3:
As figuring continues moving to the cloud, customary workstations can’t be utilized as a contrasting option to thin customers as they don’t have a quicker processer. They have poor virtualization includes subsequently it can’t bolster numerous solicitations in one session.
On looking at the three cases,
Security ramifications of moving to a cloud benefit.
- Managing the individual character information and empowering the entrance to PCs, information, and administrations are controlled.
- Businesses must have the capacity to separate amongst authentic and ill-conceived activities, as there is a more grater probability of an unapproved client getting to the cloud.
- Encryption ought to be conceivable with the goal that a code is utilized to secure our private information assets as cloud-based PC frameworks are shared by countless.
- An association is one substance, and thusly every one of within that association must be incorporated as one for reasonability purposes.
- Cloud standard ensures interoperability to utilize gadgets and applications in another cloud condition without the need of doing any revamp.
- Governance elucidates the parts and obligations that ought to be taken after. Cloud administration incorporates the possess framework and besides the establishment which is wild.
- Data is overseen and put away in the cloud which requires additional information security and protection, including information stockpiling and information preparing assets.
52903_1526020907