───✱*.。:。✱*.:。✧*.。✰*.:。✧*.。:。*.。✱ ───

Skynet Facility Overview

Facility Type and Concept

  • Skynet Development Complex - AI Research and Development Integration
  • A secure R&D site supporting 40 personnel across five divisions with distinct security and performance requirements. The network emphasizes segmented research VLANs, centralized shared services, a hardened core, and strict guest isolation.

Divisions and Functions

  • Neural Intelligence Lab (NIL) → model training & evaluation; requires high-throughput access to lab compute/storage and access to shared code repos
  • Defense Systems Prototyping (DSP) → simulation/test rigs; needs isolated, low-latency segments & controlled data exchange with ISE
  • Integration & Systems Engineering (ISE) → CI/CD, staging, and development; requires reliable access to shared services and selective interop with NIL/DSP
  • Corporate Operations (COO) → admin/finance/PMO; standard office connectivity with access to shared services, VoIP, and printers
  • Personnel & Security (P&S) → HR and facility security (badge controllers, CCTV/NVR); strong isolation and limited northbound flows to auth/time services

Personnel Structure and Endpoints

  • Per spec → each division has 1 division chief, 1 administrative coordinator, 5 research specialists
  • Executive Command → facility director, executive assistant, security liaison, administrative secretary
  • Systems Administrator → 1 (shared)
  • Endpoints per User → workstation (wired for researchers), VoIP phone, mobile device (Wi-Fi)
  • Shared Equipment → 1 MFP per division; conference room VC endpoints; central servers (AD/DNS/DHCP, file, Git/CI runners); lab compute nodes (GPU for NIL, sim servers for DSP); NVR/storage for P&S

Initial Networking Requirements Assessment

  • Availability → core services hosted in Central Processing Core with UPS and environmental monitoring; target single-core stack with room for future HA
  • Segmentation → per division VLANs; shared services voice, management, guest VLANs; default-deny inter-VLAN, allow by policy
  • Addressing → RFC1918 with VLSM; DHCP for endpoints; static for infrastructure and servers
  • Internet → business-class ISP to edge firewall/router performing NAT/PAT, future-ready dual-WAN
  • Security → stateful firewall at edge; ACLs between VLANs; device hardening; management VLAN with restricted jump host access; logging/syslog and NetFlow
  • Wireless → STAFF SSID (WPA3-Enterprise preferred or WPA2-Enterprise fallback), GUEST SSID (PSK, internet-only), VLAN-backed with L2 isolation for guests
  • QoS → prioritize VoIP (EF) and interactive traffic over bulk data; printing and backups treated as low priority
  • Management/Monitoring → centralized syslog, NTP, and SNMPv3; backup configs and documented change control

Scope Definition and Boundaries

In Scope (Alpha)

  • Team charter and roles, facility concept, initial requirements and constraints
  • Basic logical topology and connectivity plan
  • Preliminary VLAN/subnet sketch
  • Packet Tracer starter with core, access, DHCP, and sample hosts

Out of Scope (for later phases)

  • Final hardware SKUs and costs (Beta)
  • Complete IP plan with VLSM tables (Gamma)
  • Full routing/VLAN configs (Delta)
  • Firewall/ACL specifics (Epsilon)
  • Wireless placement survey and tuning (Zeta)

───✱*.。:。✱*.:。✧*.。✰*.:。✧*.。:。*.。✱ ───