Business Case Airport IT Network Expansion Authority ✓ Solved

Business Case Airport It Network Expansionan Airport Authority Is See

Develop network diagrams to visualize the proposed IT network infrastructure for an airport authority, including a LAN for one administrative section, an intranet connecting all internal computers, an extranet linking branches in multiple cities, and an update to include internet connectivity while maintaining security.

Sample Paper For Above instruction

Network Diagram 1: Local Area Network (LAN) for One Administrative Section

The LAN for a single administrative section within the airport terminal provides a local, high-speed network connecting 30 desktop computers, 10 portable laptops, and a network printer. The core component of this LAN is a managed switch that facilitates communication among all connected devices. Each desktop computer and laptop connects to the switch via Ethernet cables or WiFi for laptops, respectively.

A Wireless Access Point (WAP) is integrated into the LAN to support wireless connectivity for the portable laptops. The network printer is also connected to the switch via Ethernet to enable shared access. The LAN employs a dedicated IP subnet, for instance, 192.168.1.0/24, with static IP addresses allocated to each device for easier management and security. Proper VLAN segmentation can be implemented to separate administrative traffic from other network segments, improving security and performance.

For security, network access controls are established, including MAC address filtering and port security on the switch. Additionally, internal firewalls and network segmentation restrict unauthorized access. The diagram also indicates connections to the central data room for accessing shared databases and resources.

Network Diagram 2: Internal Intranet for Central Terminal Building

The intranet connects all four administrative sections, data room servers, and other organizational units within the terminal building. This network ensures seamless communication and resource sharing across the entire internal infrastructure.

At the core, a high-capacity core switch consolidates connections from each administrative section’s switch, forming a backbone network. Each section’s switch connects to the core switch via fiber optic links or Gigabit Ethernet to support high-speed data transfer. Wireless access points are strategically placed throughout the terminal to provide WiFi coverage for mobile devices and laptops, connected back to their respective switches.

The data room contains critical servers such as database servers (passenger, flight info, employee records), the printer server, web server, and email server. These servers are interconnected through a server switch, which connects to the core switch via secure, high-bandwidth links.

Network security measures include VLAN segmentation, firewall deployment, and access control lists (ACLs). Virtual LANs separate administrative staff, guest WiFi, and server infrastructure, enhancing security.

Network Diagram 3: Extranet Connecting Airport Branches in DC, NYC, and MIAMI

The extranet establishes a secure private network connecting the three airport branches in different cities. The goal is to facilitate resource sharing while maintaining strict security protocols.

Each branch has its own local network, including switches, routers, and WiFi access points for staff and mobile devices. To connect these remote sites securely, a Virtual Private Network (VPN) tunnels are established over the internet, utilizing secure tunneling protocols such as IPsec or SSL VPN.

A central VPN gateway, managed at the main airport, facilitates secure communication between branches. The VPN connects the branch routers to this gateway, creating a virtual private network that encrypts data during transit. Shared resources such as databases, document repositories, and collaborative portals are hosted on a dedicated server within the main data center, accessible to all authorized sites via the VPN.

Network security measures include multi-factor authentication, access controls, and encryption protocols to prevent unauthorized access. Firewalls at each site and the central gateway strengthen the security posture.

Network Diagram 4: Extranet with Internet Connectivity for All Sites

The network diagram is expanded to include internet access for each branch and the central terminal. This setup allows users to access web applications, email, and external resources while safeguarding internal data.

Each site’s router connects to a dedicated firewall device that manages both outbound internet traffic and inbound requests, enforcing security policies such as URL filtering, intrusion detection, and malware scanning.

The central data center’s network infrastructure includes a perimeter firewall that consolidates traffic from all branch firewalls, implementing network segmentation and providing access control to internal resources.

Additionally, secure VPN tunnels are maintained for remote access, and quality of service (QoS) policies prioritize critical business applications and security protocols. Redundant internet connections (e.g., multiple ISPs) can be established at each site for high availability.

This updated configuration ensures that all airports and branches have safe, reliable internet access, with security measures protecting their network infrastructure and sensitive data assets.

References

  • Odom, W. (2018). CCNA 200-301 Official Cert Guide, Volume 1. Cisco Press.
  • Kurose, J. F., & Ross, K. W. (2020). Computer Networking: A Top-Down Approach. Pearson.
  • Tanenbaum, A. S., & Wetherall, D. J. (2011). Computer Networks. Pearson.
  • Stallings, W. (2017). Data and Computer Communications. Pearson.
  • Scott, M., & Boles, S. (2019). Modern Network Security: Best Practices. Elsevier.
  • Implementing VPNs: Cisco. Cisco Documentation. (2020).
  • Linux Foundation. (2022). Network Security Fundamentals. Linux Foundation.
  • Cybersecurity & Infrastructure Security Agency. (2021). Securing Enterprise Networks. CISA Publications.
  • ISO/IEC 27001:2013. Information Security Management Systems. International Organization for Standardization.
  • Gibson, D. (2019). Practical Network Security. Wiley.