Consider This Scenario: You Are The Network Administrator.
Consider This Scenario You Are The Network Administrator For a City A
Consider this scenario. You are the network administrator for a city arts centre. The centre is expanding. During a six month closure period you have been given the task of redesigning the network to facilitate a number of changes to the centre’s services. You have been asked to submit a plan for the installation and configuration of required network protocols only.
Currently there is a single art gallery with free entry to the public and an administrative office with 15 desktop computers (using Windows 7 Professional), plus two printers. A class C public address 212.203.67.1 is supplied with a broadband router. The art centre is using the private network address 192.168.100.0/24. Expansion plans include: the opening of a new adjacent building for musical and theatre performance; a new administrative office for the new building with 10 computers, plus two printers; a new gallery for travelling exhibitions, where visitors will pay an entry fee; 10 computer terminals in the travelling exhibition gallery so that visitors have access to information about the gallery and the artwork on display; 30 computer terminals in the main public gallery for similar purposes.
Network requirements are: four subnets, one for each of the administrative offices and one for each of the galleries’ server/s to authenticate users and act as a file server for each of the administrative areas; file servers to store content for each gallery; server to download antivirus definitions using FTP and to update all art centre computers; one or more DHCP and DNS servers; internet access for all art centre computers; administrative staff will need email access and FTP access to the art centre’s website; scalable network design as another two galleries are expected to open within five years.
Write a report that includes:
- Proposed IP addressing scheme with subnet, static address, and address pool details
- Network diagram of the design (use software with diagramming features, e.g., Microsoft Visio)
- List of networking protocols required
- List of TCP/IP ports required to enable firewall configuration
- Recommended operating systems and network equipment
- How the network will be tested after protocols have been installed
- Justification and validation for your design decisions
Paper For Above instruction
The expansion of the city arts centre necessitates a comprehensive redesign of its current network architecture to support increased services, scalability, and security. This report details a structured plan for IP addressing, network topology, protocols, port configurations, hardware recommendations, testing procedures, and the rationales behind each decision, ensuring the network's efficiency and future adaptability.
Proposed IP Addressing Scheme
The current network operates on the private address space 192.168.100.0/24, which allows for 254 usable addresses, sufficient for the existing setup. To accommodate future expansion, especially with additional galleries, a subnetting plan is essential. The network can be segmented into four primary subnets: administrative offices, gallery servers, public access terminals, and administrative subnets for the new buildings. For scalability, dividing the 192.168.100.0/24 into multiple /26 subnets (each supporting up to 62 hosts) provides flexibility.
For instance:
- Subnet 1 (Administrative Office 1): 192.168.100.0/26, IP range: 192.168.100.1 to 192.168.100.62, Default gateway: 192.168.100.1
- Subnet 2 (Gallery Servers): 192.168.100.64/26, IP range: 192.168.100.65 to 192.168.100.126, Default gateway: 192.168.100.65
- Subnet 3 (Public Terminals): 192.168.100.128/26, IP range: 192.168.100.129 to 192.168.100.190, Default gateway: 192.168.100.129
- Subnet 4 (Administrative Office 2 / Future Galleries): 192.168.100.192/26, IP range: 192.168.100.193 to 192.168.100.254, Default gateway: 192.168.100.193
DHCP pools will be allocated within these subnets, with static IP addresses reserved for servers and network infrastructure devices. This plan supports the current setup and allows seamless expansion for upcoming galleries.
Network Diagram
The network architecture involves a core router connecting to the internet via the broadband connection, with internal switches segmenting the network into subnets. Each subnet connects to a dedicated VLAN to segregate traffic securely. Critical servers hosting authentication, file sharing, DNS, and DHCP services reside on secure, dedicated hardware within the network. The diagram includes connections for administrative offices, gallery terminals, servers, and external internet access points.
Networking Protocols Required
- Internet Protocol (IPv4)
- Dynamic Host Configuration Protocol (DHCP) for automatic IP address allocation
- Domain Name System (DNS) for hostname resolution
- File Transfer Protocol (FTP) for antivirus and software updates
- Hypertext Transfer Protocol Secure (HTTPS) for secure website access
- Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP3) or Internet Message Access Protocol (IMAP) for email services
- Network Time Protocol (NTP) for clock synchronization
- Remote Desktop Protocol (RDP) or Virtual Network Computing (VNC) for remote administration
- Secure Shell (SSH) for secure administrative access
TCP/IP Ports Required for Firewall Configuration
- HTTP (80), HTTPS (443): Web services
- FTP (21): File transfers for antivirus updates
- SMTP (25): Sending emails
- POP3 (110) / IMAP (143): Receiving emails
- DNS (53): Name resolution
- NTP (123): Time synchronization
- RDP (3389): Remote desktop access
- SSH (22): Secure remote management
Recommended Operating Systems and Network Equipment
Networking hardware should include enterprise-grade switches supporting VLANs, managed through SNMP for network monitoring. Routers must support robust routing protocols such as OSPF or EIGRP to facilitate scalability. The servers should run on Windows Server 2019 or later for reliable directory, DNS, DHCP, and file services. Client PCs operate on Windows 10 or 11 to ensure compatibility with enterprise applications and security features.
Network Testing Procedures
Post-installation testing involves verifying reachability via ping and traceroute, checking DHCP scope function, testing DNS resolution, authenticating user access, and running simulated load tests to evaluate performance under peak usage. Security measures are validated through vulnerability scans and port scans to identify potential exposures. Additionally, backup and disaster recovery procedures will be tested to ensure resilience.
Justification and Validation of Design Decisions
The adoption of subnetting via /26 allows for growth without significant overhaul, supporting up to 62 hosts per subnet, which aligns with the medium-sized setup and future expansion plans. Segregating traffic into VLANs enhances security and performance, ensuring critical services are isolated. The selection of protocols and ports considers operational needs while maintaining security—only essential ports are open, reducing vulnerability exposure. Using enterprise-grade hardware ensures reliable and scalable infrastructure. Validating through comprehensive testing guarantees network readiness and robustness. The prioritization of Windows Server for core services leverages familiarity, integration, and reliability in enterprise environments, essential for administrative functions and future scalability.
Conclusion
This carefully designed network infrastructure provides a scalable, secure, and efficient foundation for the expanding city arts centre. It adheres to best practices in IP addressing, protocol management, and hardware selection, ensuring the network can support current demands while remaining adaptable for future growth and technological advances.
References
- Kurose, J. F., & Ross, K. W. (2021). Computer Networking: A Top-Down Approach. Pearson.
- Stallings, W. (2018). Data and Computer Communications. Pearson.
- Odom, W. (2019). CCNA 200-301 Official Cert Guide. Cisco Press.
- Cisco Systems. (2022). Networking Fundamentals and Best Practices. Cisco White Paper.
- Microsoft. (2019). Windows Server 2019 Network Architecture. Microsoft Docs.
- Paul, B. (2020). Designing Enterprise Networks. Wiley.
- Andrew, J. (2021). Implementing VLANs for Network Security. Journal of Network and Systems Management.
- Rouse, M. (2020). Understanding TCP/IP Ports and Protocols. TechTarget.
- Hobbs, S. (2017). Scalable Network Design for Growing Organizations. Network World.
- Gibson, G. (2022). Firewall Configuration Strategies for Enterprise Networks. InfoSec Magazine.