NETWORK SYSTEMS DESIGN AND MANAGEMENT

  

You work for a company that has branches in different cities and you have been tasked to design the network for your organization. Your initial plan is to show a layer three topology diagram and then cascade down to more details.

Task:

a) Your first diagram is as shown below:

Refer to IMG 1

Assuming R1 is for the central site and R2 is for a branch office, draw a detailed diagram that shows more detail about the physical cabling with less detail about the IP subnets and addresses connecting the central office with the branch office. Show all the labels and details appropriately.

6 Marks

b) Armed with the cabling details (a) above, describe in detail how you can physically install a router ( Assumption: because your devices will be in the same place, you can create Ethernet WAN links by using the RJ-45 ports and a UTP cable without the need to purchase an SFP for each router).  6 Marks

c) You have just configured your router and the following are the details: 

Refer to IMG 2

Using the parameters above, match the networking parameters from the left onto the correct values on the right: 4 Marks

Refer to IMG 3

d) Using your understanding of AAA functions, choose the appropriate functions on the left that fall under each heading on the right. 4 Marks

Refer to IMG 4

e) In the following exhibit, what needs to be changed for Computer A to successfully

communicate with Computer B (assume the least amount of effort to fix the problem)?   2 Marks

Refer to IMG 5

f) You are installing IP phones in a new office. The phones and office computers

connect to the same device. To ensure maximum throughout for the phone data sessions,  the company needs to make sure that the phone traffic is on a different network from that  of the office computer data traffic. What is the best network device to which to directly  connect the phones and computers and what technology should be implemented on this  device?  3 Marks

QUESTION TWO [25 MARKS]

a) Explain any five ways that network managers can enhance availability and reliability of their networks. 5 Marks

c) Explain how the following diagrams help in troubleshooting a network. 

(i) Physical Network Diagram 2 Marks

(ii) Logical Network Diagram 2 Marks

d) Study the diagram below very carefully. Using the IP address 192.168.15.0, and by using VLSM, create the subnets and show where they fit on the interfaces. 16 Marks

Refer to IMG 6

5

Produce an ER Model for the following scenario (presented in Step 1 below) and business need, for the Pythagoras Math Academy.

Deliverables:

· ER Model for the scenario presented.

· You have the option to use MS Visio (if you have the software) to produce your ER Model.

· Alternatively, if you do not have MS Visio, you can use the ERD PLUS (Open source ER Modeling Software) and produce your ER Model.

Lab Steps:

Step 1: Read and understand the Scenario and Business needs presented below. Define and document the ENTITIES, and RELATIONSHIPS, required to address the business needs. The nouns in the scenario below will give the ENTITIES that you will need. Finally, the verbs will describe the RELATIONSHIPS.

Scenario and Business Need:

The Pythagoras Math Academy is in need to develop a database to keep track and control of his students, teachers, and classes offered.

Teachers are able to teach multiple courses. But they are required to be certified on the course they are teaching. For example, only a group of teachers are certified to teach Algebra, and other Geometry.

Students can take multiple courses. Courses are taught by teachers with the proper certification and have multiple certs as needed.  Courses are taught in one of the classrooms at one of the School’s several sites.

Each classroom is optimized to serve the needs for a course (for example some courses might require computer labs and whiteboards). The school needs to keep track of the math courses delivered in each of the sites.

Step 2: For this project, you are required to use MS Visio or ERD PLUS to produce the deliverables.

If you are using MS Visio follow the steps below:

· Open MS Visio

· Click on the Software Database Template in the main window

· Select the Database Model Diagram Template to open a new file.

If you are using ERD PLUS.

· From the ERP PLUS main interface, select DOCUMENTS –> NEW DIAGRAM (NAME YOUR DIAGRAM) –>ER DIAGRAM –> CREATE

Step 3: Define and Database ENTITIES

· Add an entity for each Table you identified in the Scenario and Business Need.

Step 4: ADD the required ENTITY ATTRIBUTES  

· Add the required Attributes for each Entity that you feel would help to define each Entity as needed.

· Select one of the attributes to be PRIMARY KEY (PK)

Step 5: Define RELATIONSHIPS

· Use the Crow’s Feet Notation.

· Drag and drop (draw) relationships between the entities you defined.

· Connect the ends to the two entities for each relation.

· Defined the Primary Key for the parent entity.

Step 6: Define CARDINALITY RELATIONSHIP

Set the cardinality for each of your relationships defined in Step 5.  

For MS Visio: select a relationship line in the drawing area that is connecting two entities. In the Database Properties window, select the miscellaneous category. Select the cardinality for the selected relationship.

Potential Targets Responses

Provide (3) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1, 2 and 3 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

I would imagine myself as a state-sponsored actor planning an attack on a fictional country. The target I would select would be the supervisory control and data acquisition (SCADA) systems on national resource companies. I would use weak security on the SCADA systems to infiltrate different industrial systems that control physical switches. I would mimic the attack that happened last week that attacked the Colonial Pipeline gas pipeline going up the east coast (Greenberg, 2021). The difference would be I wouldn’t have put ransomware on the system since I am a state-sponsored actor; I would try to input false information into the PLCs within the network. One example would be to input false information into a pump pushing the gas stating that the pressure of the gas coming out was less than what it should be experiencing. This would cause the pumps to work harder trying to hit the pressure they should be at. Eventually, the pumps would overheat and fail, causing the shut down of the pipelines. This type of attack could potentially cause a disruption of natural resources that the county I am a part of could then sell its own natural resources at a higher cost to gouge the country experiencing the shortage in a specific region that is being affected by the hacking. I would choose a country with relaxed guidelines on infrastructure systems hardening. The hope would be the SCADA systems would be located on an unsecured network that would be easily accessed by spoofing an internal IP address to gain access to local resources. It would be better to ensure deniability since the attack isn’t meant to physically harm anyone but to extort the nation of financial means.

-ANDREW

References:

Greenberg, A. (2021, May 8). The Colonial Pipeline Hack is a New Extreme for Ransomware. Wired. https://www.wired.com/story/colonial-pipeline-ransomware-attack/

RESPONSE 2:

This week i am going to be taking the role of a terrorist organization that is attacking a country to cause the most up roar possible. Since i a a terrorist in this situation the biggest concern for me is to cause the biggest and most server attack I can to this country. Well what is something that most people use on a daily bases and many need to live a functional life in todays world? That would be electricity and attacking the power grid can cause a extremely terrorizing event that leads to many deaths an mass panic across the targeted country. It would take a team of highly skilled hackers and lots of funding to pull off such an attack if it is even possible. Also recruiting of an insider would be the best option to insure the attack is success full. Choosing a insider someone who is in finical debt or can be black mailed would be the best to persuade to be the insider threat. The goal would be to overload and shut down multiple power stations that causes an over load on the entire power grid causing it to crash the entire country’s power shutting it off. If an entire country’s power was shut off the chaos that would follow would be detrimental to the country. There would be many deaths and panic would spread leading to rioting and looting across the country. Essential supplies would be bought up and even stolen as well as an overload for emergency services. The biggest thing that would effect this plan is the amount of security in place to protect the power grid of the country. Since this is such a vital utility it is heavily protected from this exact thing.

-JACKSON

SANS (2001) “Can Hackers Turn Your Lights Off?  The Vulnerability of the US Power Grid to Electronic Attack” from the SANS Institute website:  http://www.sans.org/reading_room/whitepapers/hackers/hackers-turn-lights-off-vulnerability-power-grid-electronic-attack_606 

RESPONSE 3

As a terrorist, I would select military information as a cyber target. To attack the military systems, I would hack into the servers containing important information communicated by the military personnel regarding the country’s security. The technology available for military personnel is very advanced and gives access only to senior security officers responsible for the country’s security. The systems are well automated to detect any potential security threats that might not be authorized to access the information (Jarvis et al., 2017). To have a positive outcome, I would devise a better plan that contains advanced measures than the one available for the military at the moment. I would also use critical servers currently available to hide any form of identity that might expose my identity before completing the task. Better technologies are available that have not been adopted in significant security software, making the military more vulnerable to terrorist threats. The high levels of corruption in major military bases would also be effective in accomplishing my task and finally making a breakthrough in hacking the systems and gaining critical information that the highest-ranking officers should also know. It would be better to ensure the deniability of my attack to avoid future consequences. This would make it hard for the responsible authorities to take any action against my deeds.

QUESTION:  I think your plan would be very successful because even if the cyber attack was not as effective as you hoped for.  The fact that it created confusion, fear, and misunderstanding among the local populace maybe enough.   Would attempt to do this again?  Or look for another target?

Discussion post

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

Computer Homework

computer

Question 1: Please translate the MIPS instruction to Machine code- Binary.

  • Add $t1, $t2, $S0
  • addi $S1, $S2, 41
  • beq $t0, $t1, 41

Question 2: Please list and describe at least 5 different MIPS addressing.

Software Management -2Ass

 Describe how organizational culture is related to project management. What type of culture promotes a strong project environment? Please give a specific example. 

Professional Consulting in Information System (IS) – Project plan and report

Professional Consulting in Information System (IS) – Project plan and report

Project Idea:

development, adoption and implementation of Customer Relationship management system (CRM) in business.

Requirement:

————-

1. Project Plan and Proposal Development

2. The plan is a detailed document that answers the questions why, what, and how. It includes the

following sections and information (attached)

3. Project Implementation

4. The Project Report