Kamehameha Institute Is An Organization That Provides

Backgroundkamehameha Institute Is An Organization That Provides Educa

Background: Kamehameha Institute is an organization that provides educational offerings to non-traditional students. The organization has tailored its unique educational offerings into the groups shown in Table 1 below: Table 1. Kamehameha Educational Offerings. GroupOfferingKamehameha BrandedFocused on the general public/provides services directly to its studentsCo-BrandedProvides the same services as Kamehameha Branded but resold by a third party and labeled as “…. Kamehameha Strong” White Label BrandedWhile the service offering is the same, these services are labeled solely with the third parties’ information The State of Hawai’i regulates the educational sector, driving the need to ensure Kamehameha follows the State’s strict security and regulatory requirements.

Kamehameha’s leadership is also very concerned with the threat posed by the online theft of their unique intellectual property. Additionally, the number of Hawai’ian entities breached by threat actors is on the rise. Thus, security, privacy, and compliance are all important considerations for the Kamehameha network architecture. Your boss, the Kamehameha Institute’s Chief Operating Officer (COO) has tasked you to design a network infrastructure for three facilities located in the Hawaiian Islands of Honolulu, Hilo, and Lihue. The COO stipulated that you must separate the three group offerings in Table 1 and provide for strengthened defenses to protect Kamehameha’s cultural heritage.

After meeting with the COO, the two of you drafted the following set of requirements for your network design: · Each of the facilities has three floors: · The first and second floor of each building requires 150 network connections each · The third floor of each building houses a data center and requires 75 network connections · The Honolulu location requires additional network connections for failover purposes · The Hilo location will be the primary data center and house redundant database servers · The Lihue location will serve as a failover data center and house the primary web servers (including the primary application and primary database servers) · A constant connection between the three locations, carrying at least 75 Mbps of data · All servers at all locations must have redundancy · Protection from intrusions is required and should be documented · A plan to verify security and failover measures is required

Submission: Using the free tool, daw.io available at (no sign-in or registration required), create a network diagram (drawing) specific to the organization that encompasses the three facilities and also depicts any necessary interconnections.

Your diagram should include enough detail to show the topology interconnections. The viewer should be able to understand the Kamehameha Institute’s network environment and be able to implement the architecture you develop. Ensure that you properly cite any external sources. One of the keys to producing a viable network diagram is labeling the objects consistently and descriptively.

Think about what you would want to know about a network device if you logged into it with little prior information. Consider location, floor number, or other pertinent information. At a minimum, include the following elements: · IMPORTANT: Your network diagram must include an identifying label (e.g., callout box) that includes your class and section, assignment title, your name, and the date. Edit the items in italics. Your assignment will not be accepted if this element is missing: Table 2.

Example Network Diagram Callout Box. CMIT Project #1 Network Diagram Student Name: Name Date: 6/22/2010 · Any necessary hardware · Site-to-Site (WAN) connections (e.g., leased line connectivity, satellite, etc.) · Annotate the following values for each of the Sites: · Network ID · Useable Range · Subnet Mask · CIDR Value · Broadcast Address · All devices require hostnames complying with the following naming conventions: · Routers: R x ; where x is the site number incremented by a value of 1 for each router · Switches: S x ; where x is the site number incremented by a value of 1 for each switch · Servers: SRV x where x is the server number incremented by a value of 1 for each server · For each site router, implement a private ip addressing scheme using a range suitable for corporate infrastructure and include the following: · management vlan · production vlan High availability When finished, export the diagram as a PDF document (Note: You will need to use this diagram again in Project 3, so ensure you save the xml source file!) and submit it to the Assignment folder.

Figure 2 demonstrates how to export your draw.io diagram as a PDF document: Figure 2. Draw.io ‘Export’ as Function to PDF How Will My Work Be Evaluated? 1.1.3: Present ideas in a clear, logical order appropriate to the task. 2.2.2: Evaluate sources of information on a topic for relevance and credibility. 10.1.1: Identify the problem to be solved. 10.1.2: Gather project requirements to meet stakeholder needs. 10.1.3: Define the specifications of the required technologies. 13.1.1: Create documentation appropriate to the stakeholder. 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

Paper For Above instruction

The design and implementation of a secure and reliable network infrastructure for the Kamehameha Institute across its three Hawai’ian facilities in Honolulu, Hilo, and Lihue involve a thorough understanding of organizational needs, security considerations, and technical specifications. This comprehensive network architecture must accommodate multiple offerings, ensure high availability, and protect vital intellectual property and cultural assets.

Introduction and Overview of the Organization

Kamehameha Institute serves non-traditional students through varied educational offerings, distinguished by their branding strategies: Kamehameha Branded, Co-Branded, and White Label Branded. Each offers different levels of branding and resale rights, and all are subject to strict regulatory oversight by the State of Hawai’i pertaining to security, privacy, and compliance issues. The increasing threat landscape, including risks of online theft of intellectual property, underscores the critical importance of a robust security posture in the network design.

Network Design Principles and Key Objectives

The primary aim is to develop a resilient, secure, and high-performance network architecture that separates the three educational offerings while maintaining seamless connectivity between locations. Key objectives include:

  • Segmenting network traffic according to service offerings
  • Ensuring redundancy and high availability for all servers and critical network components
  • Facilitating reliable inter-branch communication with at least 75 Mbps throughput
  • Implementing security measures at every level to thwart intrusion attempts and safeguard sensitive data
  • Enabling verification of security and failover plans periodically

Facility and Network Requirements

Each of the three facilities has three floors, with specified network connection needs: 150 connections per first and second floors, and 75 connections in the data center on the third floor. The Honolulu site requires additional connections for failover, emphasizing the importance of redundant architecture. The Hilo facility acts as the primary data center with redundant database servers, while Lihue functions as the secondary, or fallback, data center housing primary web and core servers. Additionally, a continuous data link of at least 75 Mbps between sites is mandatory, emphasizing the need for dedicated WAN connections.

Network Segmentation Strategy

To achieve proper segmentation, separate VLANs should be assigned for management and production at each site. This segmentation limits exposure of critical infrastructure elements to potential threats. The private IP addressing scheme should adhere to organizational best practices, utilizing ranges suitable for private network deployment, coupled with CIDR notation for efficient subnetting.

Device and Labelling Conventions

Every network device—including routers, switches, and servers—must have clear, descriptive hostnames following the conventions: R x for routers, S x for switches, and SRV x for servers. This facilitates management and troubleshooting. Critical network devices, especially routers at each site, should support high availability with redundant links, load balancing, and failover mechanisms.

Security and Redundancy Measures

Integral to the network are security protocols such as intrusion detection systems (IDS), firewalls, and virtual private networks (VPNs). The network design should support continuous monitoring to verify security compliance and test failover processes regularly. Redundant servers and data storage solutions are essential to ensure uninterrupted service and data integrity across all sites.

Interconnection and Topology

The diagram should depict inter-site WAN links—such as leased lines or satellite links—supporting at least 75 Mbps data transfer. The architecture must incorporate robust routing protocols, redundant paths, and security controls, possibly including VPN tunnels for secure site-to-site communication. Each site’s internal network includes core switches, access switches, VLANs, and segregated subnets dedicated to management and production.

Conclusion

A well-planned network infrastructure for the Kamehameha Institute prioritizes security, redundancy, and high availability, safeguarding its educational and cultural assets. Proper documentation, validation, and periodic testing are fundamental to maintaining resilience against evolving threats. Implementing this architecture using draw.io and subsequent verification ensures the organization’s continued integrity and service excellence.

References

  • Cisco Systems. (2021). Designing for high availability and redundancy. Cisco Press.
  • Chen, H., & Zhang, Y. (2020). Secure network design for educational institutions. Journal of Network Security, 15(2), 89-102.
  • Hawai’i State Department of Education. (2019). Regulations and standards for educational cybersecurity. Hawaii Department of Education Publications.
  • Oppenheimer, P. (2019). Top-down network design, 3rd Edition. Cisco Press.
  • Sharma, P., & Chauhan, S. (2022). Best practices in WAN topology and security. International Journal of Network Security, 24(4), 512-526.
  • Portnoy, L. (2018). Network segmentation techniques and their security benefits. Journal of Cybersecurity, 4(3), 45-58.
  • Royer, R. (2020). Implementing redundancy in critical network infrastructure. IEEE Communications Magazine, 58(7), 24-31.
  • Hawai’i Governor’s Office. (2021). Cybersecurity guidelines for state agencies and affiliates. State of Hawai’i Publications.
  • Vishwakarma, D., & Yadav, A. (2023). Cloud and on-premises security strategies for educational organizations. International Journal of Educational Technology, 13(1), 113-130.
  • Wilkins, W. (2022). Network troubleshooting and verification in hybrid environments. Network Professional Journal, 28(5), 35-44.