Networkingreport
Networkingreport
NewtonAd agency is an advertising company with three branches that requiresharing of data amongst themselves and since they are geographicallyseparated, this can be achieved by choosing a good WAN connectivity,IP addressing and wireless access strategies. The report below willlook into these strategies plus the business and technical rationalefor the recommendations on the strategies used.
TheWAN connectivity at Austin’s headquarters and New York branch
WideArea Network (WAN) is a network of computers that are connected overa large geographical area, this network is appropriate when one needsa network to facilitate communication between distributed sites thatneed access to shared data and also allows for remote access of thesystem by remote users. The recommended services to achieve aneffective WAN connectivity strategy would be Multi-ProtocolLabel Switching (MPLS), Ethernet and internet access services.MPLS service guarantees the performance of real time, IP basedapplications for instance video and voice. Furthermore, it eliminatesthe need for a hub in networks and saves money. MPLS prioritizesvarious applications types (voice, video and data) in order tooptimize the performance of the network, this is achieved through theuse of the MPLS class of service (CoS) protocol. Furthermore, MPLSsupports applications such as imaging, video and audio streaming.With this protocol implemented the Austin’s headquarters and NewYork office fast WAN connectivity will have been achieved (ChoosingWAN connectivity and services wisely, 2009).
Diagramsshowing the WAN connectivity 
BackupWAN connectivity is a critical aspect, the data centers should havetheir data distributed and duplicated among multiple sites so as toreduce the risk of losing data completely in the event of occurrenceof a calamity. Availability for Connection to these distributed sitesis crucial. MPLS services provide the any-to-any site connectivityservice with the class of service (CoS) capability with minimalcosts. With the MPLS service taking care of distributed computing,then this will allow the uptime of resources to be up to 99.999%.Thiswill make it possible for the Austin’s headquarters (the site withthe network bandwidth and data center) to have a very highavailability of its data as it frequently will exchange large fileswith the New York office and the remote workers who will need toaccess the network at Austin’s remotely.
Explanationof why the MPLS WAN technology
MPLSsupports wireless remote access the major factor is to consider thenumber of users estimated to access the network remotely. For thiswireless remote access to be reliable and secure, it has to bemanaged centrally, this will be managed by CISCO centralized wirelesscontrollers which are designed to centralize and manage thousands ofaccess points. This controller will enable the administrator tocreate clusters of groups for various purposes such as security andgeographical management from the Austin headquarters. The Austin’sheadquarters will have numerous access points to allow for wirelessaccess of the network by the users. This, however, will beimplemented using a secure access control authentication process. Thewireless LAN (WLAN) will be enabled with capabilities ranging fromcaptive portals to firewall filters, unique guest login credentialsand traffic shaping that require no configurations from the networkengineers. In this setup, users will request for their accounts to becreated on a splash portal that will only be activated by theadministrator, for users who have not been approved, they can beallowed to access the network at a shallow level, that is, varioususers in the organization are assigned various access rights to thenetwork, the network will have other guest management strategies tomonitor the user activities and resources that they are consuming,these strategies include a unique dynamic pre-shared key(DPSK) perguest, use of web forms to request for a pass and  serviceset identifiers (SSID)(WirelessLAN access control: Managing users and their devices, 2011).
IPaddress strategies at each location
Nowthat we have looked on how to securely access and protect the data inthe New York server, let’s look at how we can ensure that everyuser has the credentials for accessing the system that brings us toIP addressing. An IP address is a unique label that is assigneddevice within the network using the IP for communication. An IPaddress is divided into two parts, the network and host bits. Networkbits are used to identify the class of network (A, B or C) while thehost bits are assigned to individual employees. Each IP address isunique and can therefore be assigned to a single person. The rangespecified from 192.168.100.0 to 192.168.103.255 can accommodate up to765(255*3) employees. This number will be sufficient to serve all the700 users/PCs, the 500 hosts at Austin’s headquarters and 200 atNew York office (IPAddressing and Sub-netting for New Users-Cisco, 2016).The sectionbelow is going to look at the IP assignments of each location indetail. First let us familiarize ourselves with the following terms
Address - The unique identifier assigned to a single user/host in a network.
Subnet - A section of the network that shares the same subnet address.
Subnet mask - A 32-bit address combination used to show which address section points to the subnet and which one points to the host.
Network bits – the part of the IP address that identifies the network type in a subnet.
Host bits – the part of the IP address that identifies the host/user in a subnet.
SinceNewton Ad Agency has three offices, the network IP address rangegiven (192.168.100.0 to 192.168.103.255) would be best utilized bydividing it into sub networks and interconnecting each subnet using agateway. Each subnet will be assigned a unique IP address and thegateway interconnecting the sub networks must have those Addressesfor each subnet. There are 4 classes of networks namely A, B, C, D.The subnet masks are used to identify the class in which a networkbelong to. For instance:
ClassA: 255.0.0.0
ClassB: 255.255.0.0
ClassC: 255.255.255.0
ClassD: 255.255.255.255
TheAustin’s Headquarters IP addressing
Sincethis office will be having 200 hosts, the network will be sub-nettedinto eight subnets and each subnet will have its unique IP addressand all the eight will be interconnected using a single gateway. TheIP address 192.168.100.0belongs to class C with a subnet mask of 255.255.255.0. Thistherefore requires that some host bits have to be borrowed to form asubnet mask 255.255.255.110(a number between 1 and 254). With thissubnet mask, we can than have then create eight subnets that willserve the entire office (200 hosts).
Subnet number | From | To | Subnet mask | description |
1 | 192.168.100.1 | 192.168.100.30 | 255.255.255.110 | host address range 1 to 30 |
2 | 192.168.100.32 | 192.168.100.62 | 255.255.255.110 | host address range 33 to 62 |
3 | 192.168.100.64 | 192.168.100.94 | 255.255.255.110 | host address range 65 to 94 |
4 | 192.168.100.96 | 192.168.100.126 | 255.255.255.110 | host address range 97 to 126 |
5 | 192.168.100.128 | 192.168.100.158 | 255.255.255.110 | host address range 129 to 158 |
6 | 192.168.100.160 | 192.168.100.190 | 255.255.255.110 | host address range 161 to 190 |
7 | 192.168.100.192 | 192.168.100.222 | 255.255.255.110 | host address range 193 to 222 |
8 | 192.168.100.224 | 192.168.100.254 | 255.255.255.110 | host address range 225 to 254 |
Withsub-netting, it is now possible to have create numerous IP addressesfor a given subnet mask. From the table above, we are going to havehost addresses ranging from 1 to 254, the total host addresses willbe 246(254-8 addresses that will be used by the gateway tointerconnect these subnets).246 IP addresses will be sufficient forthis office (IPAddressing and Sub-netting for New Users-Cisco, 2016).
NewYork branch office
TheNew York office appears to be busiest of the three offices as ithosts the server where users can download files from. Due to its busyenvironment, it has a requirement of 500 hosts. To achieve this, thenetwork will need to be subdivided so as to offer better service interms of latency, response time, reliability and performance. Toachieve this number of IP addresses, the network will be subdividedto two address ranges but using the same subnet mask. The table belowis going to show how that will be achieved.
Subnet number | From | To | Subnet mask | description |
1 | 192.168.101.1 | 192.168.101.30 | 255.255.255.110 | host address range 1 to 30 |
2 | 192.168.101.32 | 192.168.101.62 | 255.255.255.110 | host address range 33 to 62 |
3 | 192.168.101.64 | 192.168.101.94 | 255.255.255.110 | host address range 65 to 94 |
4 | 192.168.101.96 | 192.168.101.126 | 255.255.255.110 | host address range 97 to 126 |
5 | 192.168.101.128 | 192.168.101.158 | 255.255.255.110 | host address range 129 to 158 |
6 | 192.168.101.160 | 192.168.101.190 | 255.255.255.110 | host address range 161 to 190 |
7 | 192.168.101.192 | 192.168.101.222 | 255.255.255.110 | host address range 193 to 222 |
8 | 192.168.101.224 | 192.168.101.254 | 255.255.255.110 | host address range 225 to 254 |
9 | 192.168.102.1 | 192.168.102.30 | 255.255.255.110 | host address range 1 to 30 |
10 | 192.168.102.32 | 192.168.102.62 | 255.255.255.110 | host address range 33 to 62 |
11 | 192.168.102.64 | 192.168.102.94 | 255.255.255.110 | host address range 65 to 94 |
12 | 192.168.102.96 | 192.168.102.126 | 255.255.255.110 | host address range 97 to 126 |
13 | 192.168.102.128 | 192.168.102.158 | 255.255.255.110 | host address range 129 to 158 |
14 | 192.168.102.160 | 192.168.102.190 | 255.255.255.110 | host address range 161 to 190 |
15 | 192.168.102.192 | 192.168.102.222 | 255.255.255.110 | host address range 193 to 222 |
16 | 192.168.102.224 | 192.168.102.254 | 255.255.255.110 | host address range 225 to 254 |
17 | 192.168.103.1 | 192.168.103.30 | 255.255.255.110 | host address range 1 to 30 |
Fromthe table above, we are going to have host addresses ranging from 1to 254, the total host addresses will be 246(254-8 addresses thatwill be used by the gateway to interconnect these subnets) spreadover the range 192.168.100.0 to 192.168.103.30. 522 IP addresses willbe available (246*3), this will be more than sufficient for the twoNew York office.
TheRural satellite office
Thisoffice also expects to host 200 users, to achieve this, the remaining IP address from the 255.255.255.110 subnet mask will besufficient as shown in the table below.
Subnet number | From | To | Subnet mask | description |
18 | 192.168.103.32 | 192.168.103.62 | 255.255.255.110 | host address range 33 to 62 |
19 | 192.168.103.64 | 192.168.103.94 | 255.255.255.110 | host address range 65 to 94 |
20 | 192.168.103.96 | 192.168.103.126 | 255.255.255.110 | host address range 97 to 126 |
21 | 192.168.103.128 | 192.168.103.158 | 255.255.255.110 | host address range 129 to 158 |
22 | 192.168.103.160 | 192.168.103.190 | 255.255.255.110 | host address range 161 to 190 |
23 | 192.168.103.192 | 192.168.103.222 | 255.255.255.110 | host address range 193 to 222 |
24 | 192.168.103.224 | 192.168.103.254 | 255.255.255.110 | host address range 225 to 254 |
Fromthe table above, we are going to have 202 IP address (210-7 bits forgateway location).
Wirelessaccess strategy at the Austin office
Themain service that will be used to allow for wireless access is theservice set identifier (SSID). This service provides a uniqueidentifier that is added to the header of the packets that are beingtransmitted over the wireless LAN. This identifier then acts as thepassword that a device will need in order to access the basic serviceset (BSS).BSS is the main building block of the IEEE 802.11 WirelessLAN, it is a combination of an individual access point and itsassociated stations. Since we are setting up a wireless network, SSIDwill be a basic service to enable the administrator to change thename of the network so as to distinguish it from the other wirelessnetworks around. The administrator can also adjust the visibility ofthe network to either hidden or broadcast using SSID (WirelessLAN access control: Managing users and their devices, 2011).
Servicesthat will support remote workers
Thecompany also requires that access to the network workstations be doneremotely. This is to allow the employees to work from home full time.For this to be achieved, the remote desktop service (RDS) will be thebest option, this is because it encrypts it’s sessions making itincredibly difficult for an attacker to view your session throughlistening to the network or performing traffic analysis to deduce thepattern of packet transmissions across the network, the session issecured using secure socket layer (SSL) protocol. The virtual networkcomputing is an alternative but it does not encrypt its session hencemaking it susceptible to various attacks such as man-in-the-middleattacks and session attacks (Border,2007).
Servicesthat IT will use to access all workstations on the network 
Butto ensure a secure RDS, the administrator will be required to set upstrong passwords, this will enhance the password complexity when itis hashed, regularly update the software as new releases/updates always contain the latest security fixes. This is also another majorreason for the use of this service as opposed to other third partysoftware, restricting access to the RDS using both hardware andsoftware firewalls to as to monitor access to RDS listening ports(TCP 3389).The remote desktop gateway will be the firewall of choicefor this restriction, to make the remote desktop (RDP) fully attackproof, it is going to be tunneled through IPsec-a built in windowsservice application. . Network level authentication (NLA) serviceprovides an extra level of security before connecting to the RDS. Itis also best practice for the administrator to on regular intervalschange the listening port for Remote desktop and using remotedesktop gateways as the firewall, servers with highly sensitive datawill involve a two-factor authentication system RDP gateways can beused to achieve this.
Austin’sheadquarters internet options
Austin’sheadquarters will require the T1 line to subscribe to the internet.T1line has a bandwidth of 192 kilobyte per second. This bandwidth wouldbe sufficient for the 200 hosts.The New York office on the other handwould use the fibre optic for internet subscription. This is becausethis office will serve 500 hosts and will host a server where clientscan download files from it and fibre optics capability of deliveringdata at rates of up to 1Gbps, server access would be fast andefficient. These two will amount to $1,000 per month and will fallwithin the company budget.
Explanationof the terms and concepts used in the paper
Remotedesktop connection (RDP)-awindows application that allow users to remotely connect to a remoteserver or workstation
Serviceset identifier (SSID)-aunique identifier used to label a network and provide administrativecapabilities.
Dynamicpre-shared key (DPSK)-aunique dynamically created key by users that allows for a securecommunication between two parties
Multi-protocollabel switching( MPLS)-aWAN connectivity service that save on bandwidth while allowing fortransmission of various type of media including audio, data, video,and imaging.
WirelessLocal Area Network (WLAN)-anetwork technology that allows devices to connect to access pointwithout being physically linked.
Instituteof Electrical and Electronics Engineers (IEEE)–anAmerican based body responsible for setting required standards andpolicies in engineering and technology.
References
Border,C. (2007). The development and deployment of a multi-user, remoteaccess virtualization system for networking, security, and systemadministration classes. ACMSIGCSE Bulletin, 39(1),576-580.
ChoosingWAN connectivity and services wisely. (2009). Choosing WANconnectivity and services wisely. Retrieved April, 2016, fromhttp://searchenterprisewan.techtarget.com/Choosing-WAN-connectivity-and-services-wisely.
IPAddressing and Sub-netting for New Users – Cisco. (2016). IPAddressing and Sub-netting for New Users-Cisco. Retrieved April,2016, fromhttp://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13788-3.html.
WirelessLAN access control: Managing users and their devices.(2011). Wireless LAN access .control: Managing users and theirdevices. Retrieved April, 2016, fromhttp://searchnetworking.techtarget.com/tip/Wireless-LAN-access-control-Managing-users-and-their-devices.