Design And Implementation Of Wireless Network For AIT Campus In Sydney

Campus Overview

This report explain the design and implementation of network of AIT Company that plans to move to Sydney. The company that plans to build two mid-size campuses in the city. The two campuses are 2km away from each other. Each of the campuses have different dimensions. The first campus contains three blocks of IT, physics and Chemistry colleges. While on the other hand the second campus has three blocks for administration. These report explains how wireless network will be implemented in the network. The flow plans and the position of each network equipment is drawn and explained in this report in each block of the building.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The AIT campus has two buildings, the first campus that holds the college of IT, Physics, Chemistry, and the Library. While the other campus has three buildings that hold administrative offices, Business College and also the Library. The organization needs to set up a correspondence channel for information and data sharing among the college and the users to be able to access and converse with each other through wireless network(Administrative offices can use both wired communication and wireless that’s the use of access point that will be set on designated areas for proper coverage).

Wireless access is required in each department [1]. Given different perspectives, for example, Business College or some other field, the system must almost certainly acclimate to changing traffic hindrance and support the system consistency and have the capacity to interface independent segments without cautious arranging and structure. We are going to concentrate on the huge issues that are confronted while arranging and planning an internetwork foundation.

On configuring the network, there four stages that ought to be secured for a total and fruitful system .

  • Configuring the fast cable in the LAN network
  • Settting the WAN network mainly among network devices this are the routers.
  • Dynamic Routing Protocol by passing on packets through various routers and a channel given the goal of the framework in the present condition.
  • Verifying our network.

The approach that will preferably be used in this type of topology is the top-down approach. The main goal that is attained by starting at the application layer perspective in the same line is that, the firm might interconnect with the partner to enable communication on the platform. This approach doesn’t begin in the technical element of communication. This approach is focused on improving majorly the business goal of the firm and its technical goals

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

A network access control list (ACL) is a security layer for your VPC that goes about as a firewall that concentrated on overseeing and controlling information traffic all through at least one subnets.

  • Each subnet in should have  a network ACL. On the off chance that you don’t expressly relate a subnet with a system ACL, the subnet is designed with the accessible ACL [2].
  • Various subnets can be related with given ACL in a system

ACL will by and large be connected in numerous reasons, for example, in the conveying join that will be utilized in separating directing updates. It can likewise be utilized in sifting information traffic on the interface or even in a dialler rundown to distinguish the fascinating traffic. At long last, it very well may be connected in the arrangement based steering that will be used in settling on various choice of the switch and some other practical reason.

Wireless Network Implementation

A virtual private network prolongs a private network over an open network and empowers clients to share and get data and information over a given shared or public network as though their specialized gadgets as devices are connected to a private network. It was essentially created to permit remote client access to branch workplaces to safely get to applications among others. To guarantee wellbeing, information goes through secure passages, and VPN clients must utilize validation strategies, including passwords to access the network.

VPN server.

In a network, there is dependably a plan issue that may emerge, for example, picking the most ideal channel between the sender and the collector when more than one course is found and accessible for bundle exchange. Another example is the rate of sending and accepting that must be flawless and coordinate. In the event that at any possibility the rate of sending is too high which overwhelms the rate in which the beneficiary gets it and devours the parcels, at that point it prompts information misfortune and clog of information traffic. Stream control can be utilized in such a case. The sender and beneficiary recognizable proof should be made feasible for every one of the layers. Tending to of each can make it simpler for them to convey. Another serious issue is the greatest size of information that can be sent and got one at a given time. This prompts the need of division at the sender and gathering at the beneficiary. Not to overlook information exchange manages, the convention decides the quantity of channels required and needs to be utilized.

For a solitary WAN network type, it utilizes a Layer 2 convention to embody a parcel while it passes on the WAN connection. For an appropriate embodiment, the layer 2 type must be utilized in every switch sequential interface and must be arranged [3].

Given an Example, when a beneficiary makes a telephone call, the dialled number is utilized to set switches in the exchange along the way of the call so that there is a constant circuit from the guest to the called party. On account of the changing activity used to set up the circuit, the phone framework is known as a circuit-exchanged system. On the off chance that the phones are supplanted with modems, the exchanged circuit can convey PC information.

  1. IP Address Design & Network Topology

FIRST CAMPUS

DEVICE NAME

IP ADDRESS

SUBNEST MAST

INTERFACE

FIRST CAMPUS ROUTER

172.168.0.1

255.255.0.0

FA0/0

 

10.0.01

255.0.0.0

SE1/0

INFORMATION TECHNOLOGY COLLEGE

 

IT1

172.168.0.3

255.255.0.0

WIRELESS

IT2

172.168.0.2

255.255.0.1

WIRELESS

PHYSICS COLLEGE

 

PHY1

172.168.1.2

255.255.0.3

WIRELESS

PHY2

172.168.1.3

255.255.0.4

WIRELESS

PHY3

172.168.1.4

255.255.0.5

WIRELESS

CHEMISTRY COLLEGE

 

CHE 1

172.168.2.3

255.255.0.7

WIRELESS

CHE2

172.168.2.4

255.255.0.8

WIRELESS

LIBRARY

LIB1

172.168.3.2

255.255.0.10

WIRELESS

LIB 2

172.168.3.3

255.255.0.11

WIRELESS

SECOND CAMPUS

DEVICE NAME

IP ADDRESS

SUBNET MAST

INTERFACE

SECOND CAMPUS ROUTER

172.168.50.1

255.255.0.0

FA0/1

 

10.0.0.2

255.0.0.0

SE1/0

BUSINESS COLLEGE

BS01

172.168.52.1

255.255.0.0.

WIRELESS

BS02

172.168.52.2

255.255.0.0.

WIRELESS

BS03

172.168.52.3

255.255.0.0.

WIRELESS

LIBRARY

LIB01

172.168.50.2

255.255.0.0.

WIRELESS

LIB02

172.168.50.3

255.255.0.0.

WIRELESS

ADMINISTRATION OFFICE

ADM1

172.168.51.2

255.255.0.0.

WIRELESS

ADM2

172.168.51.4

255.255.0.0.

WIRELESS

ADM3

172.168.51.5

255.255.0.0.

WIRELESS

ADM4

175.168.51.7

255.255.0.0.

WIRELESS

ADM00

172.168.51.3

255.255.0.0.

WIRELESS

Device

Price of the piece in US dollars ($)

NO of devices

T. Amount

Router

$700

2

1400

Switch

$220

2

440

Access Point

$650

21

13650

Machines (pc)

$300

11

3300

Laptops

$300

4

1200

Printer

$200

2

400

Server

$2,250

2

4500

Cabling

300

TOTAL

11580

  1. Describe the required tools to test the WLAN network security.

This determines the speed test and signal strength. It’s a super convenient way to look up for the Aps and monitoring the device signal and power. It’s a free tool to be used with the administrator. It can show the detailed summary of the Aps and their signal strength, channels and the type of encryption that is used (WEP/WPA/WP2). 

  1. Compare 128-bit WEP and 64-bit WEP and explain if one provides a better security solution than the other?

Network Configuration Stages

128-bit WEP consists of 26 hexadecimal digits which simply blocks other malicious users from accessing the wireless network that is laid. The other 64 bit consist of 10 hexadecimal digits. 128-bit encryption is much stronger than the 64 since it provides many authorizations of security and that of security to the client. 

  1. Describe the MAC spoofing and its effect on the wireless network, and describe how to protect against Spoofing and Unauthorized Attacks

This is the ability to change production line appointed media get to control Mac deliver to a given system interface on a communication device. By the use of packet filtering that is used to inspect the amount of data traffic in the network, it’s helpful because it has the capability to filter out and the capability to block with conflict vendors address.

  1. How to secure the data sent between the two campuses if the internet will be used to provide the connectivity between the two campuses?

In the network system, it tends to be utilized to execute specifically the kind of rationale that can give the section access of even deny certain information bundle to go through the system interface. Given, for example, a firewall that fundamentally looks at the information traffic going through a piece of a system and settle on choices on what and what not to release it through the system layer [4].

Following the network design, the best-needed path for efficient data packet transportation is the first Campus. This is because the switch port is not configured to multiple functions hence making it more reliable and efficient in the performance of the network.

The traffic flow basically focuses on many issues such as id threats, identity access, Id vulnerability, and design for security among others. Issues such and exploiting passwords and poor configurations is one that leads to the fall out of a network set up which leads to the intrusion of many eavesdroppers to the network [5]. The more the information one has is easier and attracts successful attackers.

Conclusion

In conclusion, we can say that the system can meet the distinctive criteria required for arranging the structure and design of the network gadgets in the locale. The firm can actualize arrangement on the college for information transmission and data sharing will be fruitful and secure for end to end communication.

References

[1] A, Jain., V, Pardikar., and S.R., Pratihast., Tracing based solution for ubiquitous connectivity of mobile nodes for NDN: A RA Kite. In Computing, Communication and Networking Technologies (ICCCNT), 2017 8th International Conference on (pp. 1-7). IEEE, July , 2017.

[2] G , Robertson., L.P, Haines., R, Sanche and W., Biffart Positive change through computer networking. Teaching Exceptional Children, 29(6), p.22, 2009.

[3] L.A, Mandarano. Social network analysis of social capital in collaborative planning. Society and natural resources, 22(3), pp.245-260, 2009.

[4] J ,Millard. and W. Owens, UNIFIEDMARKET Inc. Method and system for a network-based securities marketplace. U.S. Patent Application 09/814,987, 2010.

[5] J.D, Wegner, R, Rockell and, C. Brandon,. IP addressing and subnetting including IPv6. Syngress Media, 2010.

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.