Professional Documents
Culture Documents
Assessment 3
Assessment 3
INTRODUCTION
The primary purpose of this technical report is to design a robust and secure
network infrastructure for Ford which is a rapidly expanding American
enterprise headquartered in New York. The company’s growth trajectory
includes expansion into other cities such as Los Angeles and New Jersey, as
well as Sydney, Australia.The report will provide the right network topology
and detail the implementation of a subnetting scheme using Variable Length
Subnet Masking (VLSM) to efficiently assign subnet addresses to the
networks and their links across all branches. The report will also address the
need for connectivity between the large company headquarters in New York
and other branches in the United States and Sydney. Cost-effectiveness will
be a key consideration throughout this process.Given the recent wireless
attacks, annual ransomware attacks, and insider threats faced by the
company, this report will propose solutions to mitigate these types of attacks.
This comprehensive network design aims to provide Ford Company with a
secure, efficient, and scalable infrastructure that supports its current
operations and future growth.
The first and last addresses are reserved for network usage. Usable IP
address range:
New York: 172.45.0.1 - 172.45.63.254
Los Angeles: 172.45.64.1 - 172.45.127.254
New Jersey: 172.45.128.1 - 172.45.191.254
Sydney: 172.45.192.1 - 172.45.223.254
New York, Los Angeles and New Jersey new subnet masks are /18
while Sydney is /19.
07. HARDWARE
a. Routers. Routers are used to connect different networks together. In
this case, they would be used to connect the Local Area Network (LAN)
of each branch to the Wide Area Network (WAN), allowing for
inter-branch communication and internet access4.
b. Switches. Switches are used within each branch’s LAN to connect
computers on each floor and servers in the server room. They allow for
efficient and fast communication within the LAN.
c. Servers. Servers are located on the fourth floor of each branch in the
server room. They provide services such as file storage, email, and
intranet applications which are important for data storage and
processing4.
d. Wireless Access Points (WAPs): WAPs are used to provide wireless
internet access to devices on each floor.
e. Ethernet Cables: Ethernet cables are used to connect devices like
computers and servers to switches within the LAN. They provide
high-speed, reliable, and secure wired connections.
f. Fiber Optic Cables: Fiber optic cables are used for connections that
require high bandwidth and long distances, such as the connection
between routers in different branches over the WAN. They provide
faster speeds and are less susceptible to interference compared to
traditional copper cables4.
08. CONCLUSION
The geographical locations of the four Ford’s branches provided a unique
challenge since every design choice has tradeoffs and impact on the day to
day operation of the network. The design work started at choosing the most
appropriate network topology. A star topology was chosen for each branch’s
LAN due to its simplicity, scalability and performance. The next step was to
use the provided IP address range to efficiently allocate IP addresses to each
branch based on the number of users usingVLSM. The following step was to
set up an intranet using 5 local servers in each branch, and provide internet
access through an ISP. A VPN was also set up for secure inter-branch
communication through the internet. Network security is a cornerstone of
network design right now due to the prevalence of cyber attacks from various
bad actors in the ecosystem. Measures were implemented to mitigate wireless
attacks, ransomware attacks, insider attacks, and attacks on server rooms,
IDF and MDF rooms.
09. REFERENCES
1
: GeeksforGeeks. (2022). Advantages and Disadvantages of Star Topology.
2
: Javatpoint. (n.d.). Star Topology Advantages and Disadvantages.
3
: Online Tutorials Library. (2023). Advantages and Disadvantages of Star
Topology.
4
: O’Reilly Media. (2010). Top-Down Network Design, Third Edition
5
: SpringerLink. (2017). Ransomware Revealed: A Beginner’s Guide to
Protecting and Recovering from Ransomware Attacks